From a3043036d09fb6aca274d71f7b02a19d90bfb1ef Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 12 Jan 2025 03:03:49 +0000 Subject: [PATCH] Auto-Update: 2025-01-12T03:00:19.531309+00:00 --- CVE-2015/CVE-2015-14xx/CVE-2015-1427.json | 2 +- CVE-2015/CVE-2015-16xx/CVE-2015-1635.json | 2 +- CVE-2015/CVE-2015-16xx/CVE-2015-1641.json | 2 +- CVE-2015/CVE-2015-16xx/CVE-2015-1642.json | 2 +- CVE-2015/CVE-2015-16xx/CVE-2015-1671.json | 2 +- CVE-2015/CVE-2015-17xx/CVE-2015-1701.json | 2 +- CVE-2015/CVE-2015-17xx/CVE-2015-1769.json | 2 +- CVE-2015/CVE-2015-17xx/CVE-2015-1770.json | 2 +- CVE-2015/CVE-2015-22xx/CVE-2015-2291.json | 2 +- CVE-2015/CVE-2015-23xx/CVE-2015-2360.json | 2 +- CVE-2015/CVE-2015-23xx/CVE-2015-2387.json | 2 +- CVE-2015/CVE-2015-24xx/CVE-2015-2419.json | 2 +- CVE-2015/CVE-2015-24xx/CVE-2015-2424.json | 2 +- CVE-2015/CVE-2015-24xx/CVE-2015-2425.json | 2 +- CVE-2015/CVE-2015-24xx/CVE-2015-2426.json | 2 +- CVE-2015/CVE-2015-25xx/CVE-2015-2502.json | 2 +- CVE-2015/CVE-2015-25xx/CVE-2015-2545.json | 2 +- CVE-2015/CVE-2015-25xx/CVE-2015-2546.json | 2 +- CVE-2015/CVE-2015-25xx/CVE-2015-2590.json | 2 +- CVE-2015/CVE-2015-30xx/CVE-2015-3035.json | 2 +- CVE-2015/CVE-2015-30xx/CVE-2015-3043.json | 2 +- CVE-2015/CVE-2015-31xx/CVE-2015-3113.json | 2 +- CVE-2015/CVE-2015-40xx/CVE-2015-4068.json | 2 +- CVE-2015/CVE-2015-44xx/CVE-2015-4495.json | 2 +- CVE-2015/CVE-2015-48xx/CVE-2015-4852.json | 2 +- CVE-2015/CVE-2015-49xx/CVE-2015-4902.json | 2 +- CVE-2015/CVE-2015-51xx/CVE-2015-5119.json | 2 +- CVE-2015/CVE-2015-51xx/CVE-2015-5122.json | 2 +- CVE-2015/CVE-2015-51xx/CVE-2015-5123.json | 2 +- CVE-2015/CVE-2015-53xx/CVE-2015-5317.json | 2 +- CVE-2015/CVE-2015-61xx/CVE-2015-6175.json | 2 +- CVE-2015/CVE-2015-74xx/CVE-2015-7450.json | 2 +- CVE-2015/CVE-2015-76xx/CVE-2015-7645.json | 2 +- CVE-2015/CVE-2015-86xx/CVE-2015-8651.json | 2 +- CVE-2016/CVE-2016-00xx/CVE-2016-0034.json | 2 +- CVE-2016/CVE-2016-00xx/CVE-2016-0040.json | 2 +- CVE-2016/CVE-2016-00xx/CVE-2016-0099.json | 2 +- CVE-2016/CVE-2016-01xx/CVE-2016-0151.json | 2 +- CVE-2016/CVE-2016-01xx/CVE-2016-0162.json | 2 +- CVE-2016/CVE-2016-01xx/CVE-2016-0165.json | 2 +- CVE-2016/CVE-2016-01xx/CVE-2016-0167.json | 2 +- CVE-2016/CVE-2016-01xx/CVE-2016-0185.json | 2 +- CVE-2016/CVE-2016-01xx/CVE-2016-0189.json | 2 +- CVE-2016/CVE-2016-07xx/CVE-2016-0752.json | 2 +- CVE-2016/CVE-2016-09xx/CVE-2016-0984.json | 2 +- CVE-2016/CVE-2016-101xx/CVE-2016-10174.json | 2 +- CVE-2016/CVE-2016-10xx/CVE-2016-1010.json | 2 +- CVE-2016/CVE-2016-10xx/CVE-2016-1019.json | 2 +- CVE-2016/CVE-2016-110xx/CVE-2016-11021.json | 2 +- CVE-2016/CVE-2016-15xx/CVE-2016-1555.json | 2 +- CVE-2018/CVE-2018-118xx/CVE-2018-11816.json | 2 +- CVE-2018/CVE-2018-43xx/CVE-2018-4301.json | 2 +- CVE-2020/CVE-2020-18xx/CVE-2020-1820.json | 2 +- CVE-2020/CVE-2020-18xx/CVE-2020-1821.json | 2 +- CVE-2020/CVE-2020-18xx/CVE-2020-1822.json | 2 +- CVE-2020/CVE-2020-18xx/CVE-2020-1823.json | 2 +- CVE-2020/CVE-2020-18xx/CVE-2020-1824.json | 2 +- CVE-2020/CVE-2020-90xx/CVE-2020-9082.json | 2 +- CVE-2020/CVE-2020-90xx/CVE-2020-9085.json | 2 +- CVE-2020/CVE-2020-90xx/CVE-2020-9086.json | 2 +- CVE-2020/CVE-2020-90xx/CVE-2020-9089.json | 2 +- CVE-2020/CVE-2020-92xx/CVE-2020-9210.json | 2 +- CVE-2020/CVE-2020-92xx/CVE-2020-9211.json | 2 +- CVE-2020/CVE-2020-92xx/CVE-2020-9222.json | 2 +- CVE-2020/CVE-2020-92xx/CVE-2020-9236.json | 2 +- CVE-2020/CVE-2020-92xx/CVE-2020-9253.json | 2 +- CVE-2021/CVE-2021-204xx/CVE-2021-20455.json | 6 +- CVE-2021/CVE-2021-272xx/CVE-2021-27285.json | 2 +- CVE-2021/CVE-2021-296xx/CVE-2021-29669.json | 56 + CVE-2021/CVE-2021-319xx/CVE-2021-31982.json | 2 +- CVE-2021/CVE-2021-345xx/CVE-2021-34506.json | 2 +- CVE-2021/CVE-2021-470xx/CVE-2021-47082.json | 2 +- CVE-2021/CVE-2021-470xx/CVE-2021-47083.json | 2 +- CVE-2021/CVE-2021-470xx/CVE-2021-47086.json | 2 +- CVE-2021/CVE-2021-470xx/CVE-2021-47087.json | 2 +- CVE-2021/CVE-2021-470xx/CVE-2021-47088.json | 2 +- CVE-2021/CVE-2021-471xx/CVE-2021-47106.json | 2 +- CVE-2021/CVE-2021-471xx/CVE-2021-47123.json | 2 +- CVE-2021/CVE-2021-472xx/CVE-2021-47204.json | 2 +- CVE-2021/CVE-2021-473xx/CVE-2021-47341.json | 2 +- CVE-2021/CVE-2021-474xx/CVE-2021-47402.json | 2 +- CVE-2021/CVE-2021-474xx/CVE-2021-47459.json | 2 +- CVE-2021/CVE-2021-474xx/CVE-2021-47470.json | 2 +- CVE-2022/CVE-2022-219xx/CVE-2022-21979.json | 2 +- CVE-2022/CVE-2022-219xx/CVE-2022-21980.json | 2 +- CVE-2022/CVE-2022-220xx/CVE-2022-22035.json | 2 +- CVE-2022/CVE-2022-223xx/CVE-2022-22363.json | 6 +- CVE-2022/CVE-2022-224xx/CVE-2022-22491.json | 6 +- CVE-2022/CVE-2022-232xx/CVE-2022-23264.json | 2 +- CVE-2022/CVE-2022-244xx/CVE-2022-24477.json | 2 +- CVE-2022/CVE-2022-244xx/CVE-2022-24480.json | 2 +- CVE-2022/CVE-2022-245xx/CVE-2022-24504.json | 2 +- CVE-2022/CVE-2022-245xx/CVE-2022-24516.json | 2 +- CVE-2022/CVE-2022-268xx/CVE-2022-26804.json | 2 +- CVE-2022/CVE-2022-268xx/CVE-2022-26805.json | 2 +- CVE-2022/CVE-2022-268xx/CVE-2022-26806.json | 2 +- CVE-2022/CVE-2022-269xx/CVE-2022-26928.json | 2 +- CVE-2022/CVE-2022-269xx/CVE-2022-26929.json | 2 +- CVE-2022/CVE-2022-291xx/CVE-2022-29144.json | 2 +- CVE-2022/CVE-2022-291xx/CVE-2022-29147.json | 2 +- CVE-2022/CVE-2022-301xx/CVE-2022-30133.json | 2 +- CVE-2022/CVE-2022-301xx/CVE-2022-30134.json | 2 +- CVE-2022/CVE-2022-301xx/CVE-2022-30144.json | 2 +- CVE-2022/CVE-2022-301xx/CVE-2022-30170.json | 2 +- CVE-2022/CVE-2022-301xx/CVE-2022-30175.json | 2 +- CVE-2022/CVE-2022-301xx/CVE-2022-30176.json | 2 +- CVE-2022/CVE-2022-301xx/CVE-2022-30194.json | 2 +- CVE-2022/CVE-2022-301xx/CVE-2022-30196.json | 2 +- CVE-2022/CVE-2022-301xx/CVE-2022-30197.json | 2 +- CVE-2022/CVE-2022-301xx/CVE-2022-30198.json | 2 +- CVE-2022/CVE-2022-302xx/CVE-2022-30200.json | 2 +- CVE-2022/CVE-2022-336xx/CVE-2022-33631.json | 2 +- CVE-2022/CVE-2022-336xx/CVE-2022-33634.json | 2 +- CVE-2022/CVE-2022-336xx/CVE-2022-33635.json | 2 +- CVE-2022/CVE-2022-336xx/CVE-2022-33636.json | 2 +- CVE-2022/CVE-2022-336xx/CVE-2022-33640.json | 2 +- CVE-2022/CVE-2022-336xx/CVE-2022-33645.json | 2 +- CVE-2022/CVE-2022-336xx/CVE-2022-33646.json | 2 +- CVE-2022/CVE-2022-336xx/CVE-2022-33647.json | 2 +- CVE-2022/CVE-2022-336xx/CVE-2022-33648.json | 2 +- CVE-2022/CVE-2022-336xx/CVE-2022-33649.json | 2 +- CVE-2022/CVE-2022-336xx/CVE-2022-33670.json | 2 +- CVE-2022/CVE-2022-336xx/CVE-2022-33679.json | 2 +- CVE-2022/CVE-2022-343xx/CVE-2022-34357.json | 2 +- CVE-2022/CVE-2022-346xx/CVE-2022-34685.json | 2 +- CVE-2022/CVE-2022-346xx/CVE-2022-34686.json | 2 +- CVE-2022/CVE-2022-346xx/CVE-2022-34687.json | 2 +- CVE-2022/CVE-2022-346xx/CVE-2022-34689.json | 2 +- CVE-2022/CVE-2022-346xx/CVE-2022-34690.json | 2 +- CVE-2022/CVE-2022-346xx/CVE-2022-34691.json | 2 +- CVE-2022/CVE-2022-346xx/CVE-2022-34692.json | 2 +- CVE-2022/CVE-2022-346xx/CVE-2022-34696.json | 2 +- CVE-2022/CVE-2022-346xx/CVE-2022-34699.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34700.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34701.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34702.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34703.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34704.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34705.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34706.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34707.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34708.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34709.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34710.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34711.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34712.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34713.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34714.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34715.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34716.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34717.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34718.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34719.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34720.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34721.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34722.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34723.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34724.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34725.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34726.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34727.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34728.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34729.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34730.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34731.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34732.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34733.json | 2 +- CVE-2022/CVE-2022-347xx/CVE-2022-34734.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35742.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35743.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35744.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35745.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35746.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35747.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35748.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35749.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35750.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35751.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35752.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35753.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35754.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35755.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35756.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35757.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35758.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35759.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35760.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35761.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35762.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35763.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35764.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35765.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35766.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35767.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35768.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35769.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35770.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35771.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35772.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35773.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35774.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35775.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35776.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35777.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35779.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35780.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35781.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35782.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35783.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35784.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35785.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35786.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35787.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35788.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35789.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35790.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35791.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35792.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35793.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35794.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35795.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35796.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35797.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35798.json | 2 +- CVE-2022/CVE-2022-357xx/CVE-2022-35799.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35800.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35801.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35802.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35803.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35804.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35805.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35806.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35807.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35808.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35809.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35810.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35811.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35812.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35813.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35814.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35815.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35816.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35817.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35818.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35819.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35820.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35821.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35822.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35823.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35824.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35825.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35826.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35827.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35828.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35830.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35831.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35832.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35833.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35834.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35835.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35836.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35837.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35838.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35840.json | 2 +- CVE-2022/CVE-2022-358xx/CVE-2022-35841.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37954.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37955.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37956.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37957.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37958.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37959.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37961.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37962.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37963.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37964.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37965.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37966.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37967.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37968.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37969.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37970.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37971.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37972.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37974.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37975.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37976.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37977.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37978.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37979.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37980.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37981.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37982.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37983.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37984.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37985.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37987.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37988.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37989.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37990.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37991.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37992.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37993.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37994.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37995.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37996.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37997.json | 2 +- CVE-2022/CVE-2022-379xx/CVE-2022-37999.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38000.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38001.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38003.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38004.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38005.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38006.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38007.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38008.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38009.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38010.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38011.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38012.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38013.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38014.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38015.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38016.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38017.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38019.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38020.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38021.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38022.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38023.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38025.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38026.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38027.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38028.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38029.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38030.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38031.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38032.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38033.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38034.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38036.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38037.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38038.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38039.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38040.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38041.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38044.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38046.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38047.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38048.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38049.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38050.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38051.json | 2 +- CVE-2022/CVE-2022-380xx/CVE-2022-38053.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41031.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41033.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41034.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41035.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41036.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41037.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41038.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41039.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41040.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41042.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41044.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41045.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41047.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41048.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41049.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41050.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41051.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41052.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41053.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41054.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41055.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41056.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41057.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41058.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41060.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41061.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41062.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41063.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41064.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41066.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41073.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41074.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41077.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41078.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41079.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41080.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41081.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41082.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41085.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41086.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41088.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41090.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41091.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41092.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41093.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41094.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41095.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41096.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41097.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41098.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41099.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41100.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41101.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41102.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41103.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41104.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41105.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41106.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41107.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41109.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41113.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41114.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41116.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41118.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41119.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41120.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41122.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41123.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41125.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41127.json | 2 +- CVE-2022/CVE-2022-411xx/CVE-2022-41128.json | 2 +- CVE-2022/CVE-2022-415xx/CVE-2022-41572.json | 2 +- CVE-2022/CVE-2022-415xx/CVE-2022-41573.json | 2 +- CVE-2022/CVE-2022-438xx/CVE-2022-43842.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44666.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44667.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44668.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44669.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44670.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44671.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44673.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44674.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44675.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44676.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44677.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44678.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44679.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44680.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44681.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44682.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44683.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44684.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44687.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44688.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44690.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44691.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44692.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44693.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44694.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44695.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44696.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44697.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44698.json | 2 +- CVE-2022/CVE-2022-446xx/CVE-2022-44699.json | 2 +- CVE-2022/CVE-2022-447xx/CVE-2022-44707.json | 2 +- CVE-2022/CVE-2022-447xx/CVE-2022-44710.json | 2 +- CVE-2022/CVE-2022-447xx/CVE-2022-44713.json | 2 +- CVE-2022/CVE-2022-451xx/CVE-2022-45185.json | 2 +- CVE-2022/CVE-2022-451xx/CVE-2022-45186.json | 2 +- CVE-2022/CVE-2022-472xx/CVE-2022-47211.json | 2 +- CVE-2022/CVE-2022-472xx/CVE-2022-47212.json | 2 +- CVE-2022/CVE-2022-472xx/CVE-2022-47213.json | 2 +- CVE-2022/CVE-2022-484xx/CVE-2022-48470.json | 2 +- CVE-2022/CVE-2022-486xx/CVE-2022-48628.json | 2 +- CVE-2022/CVE-2022-486xx/CVE-2022-48681.json | 2 +- CVE-2023/CVE-2023-19xx/CVE-2023-1907.json | 2 +- CVE-2023/CVE-2023-208xx/CVE-2023-20888.json | 4 + CVE-2023/CVE-2023-208xx/CVE-2023-20889.json | 4 + CVE-2023/CVE-2023-215xx/CVE-2023-21524.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21525.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21526.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21527.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21528.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21529.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21531.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21532.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21535.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21536.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21537.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21538.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21539.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21540.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21541.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21542.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21543.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21546.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21547.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21548.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21549.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21550.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21551.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21552.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21553.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21554.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21555.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21556.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21557.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21558.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21559.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21560.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21561.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21563.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21564.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21565.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21566.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21567.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21568.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21569.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21570.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21571.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21572.json | 2 +- CVE-2023/CVE-2023-215xx/CVE-2023-21573.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21674.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21675.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21676.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21677.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21678.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21679.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21680.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21681.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21682.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21683.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21684.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21685.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21686.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21687.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21688.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21689.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21690.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21691.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21692.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21693.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21694.json | 2 +- CVE-2023/CVE-2023-216xx/CVE-2023-21699.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21700.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21701.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21702.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21704.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21705.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21706.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21707.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21708.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21709.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21710.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21712.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21713.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21714.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21717.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21718.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21719.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21720.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21721.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21722.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21724.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21725.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21726.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21727.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21728.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21730.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21732.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21733.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21734.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21735.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21736.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21737.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21738.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21739.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21740.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21741.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21742.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21743.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21744.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21745.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21746.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21747.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21748.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21749.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21750.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21751.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21752.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21753.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21754.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21755.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21757.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21758.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21759.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21760.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21761.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21762.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21763.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21764.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21765.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21766.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21767.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21768.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21769.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21771.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21772.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21773.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21774.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21775.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21776.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21778.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21779.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21780.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21781.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21782.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21783.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21784.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21785.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21786.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21787.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21788.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21789.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21790.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21791.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21792.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21793.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21794.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21795.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21796.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21797.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21798.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21799.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21800.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21801.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21802.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21803.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21804.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21805.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21806.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21807.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21808.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21809.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21811.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21812.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21813.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21815.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21816.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21817.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21818.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21819.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21820.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21822.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21823.json | 2 +- CVE-2023/CVE-2023-228xx/CVE-2023-22869.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23374.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23375.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23376.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23377.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23378.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23379.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23381.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23385.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23388.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23389.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23390.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23391.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23392.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23393.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23394.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23395.json | 2 +- CVE-2023/CVE-2023-233xx/CVE-2023-23399.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23400.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23401.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23402.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23403.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23404.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23405.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23406.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23407.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23408.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23409.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23410.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23411.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23412.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23414.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23415.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23416.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23417.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23418.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23419.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23420.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23421.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23422.json | 2 +- CVE-2023/CVE-2023-234xx/CVE-2023-23423.json | 2 +- CVE-2023/CVE-2023-239xx/CVE-2023-23913.json | 2 +- CVE-2023/CVE-2023-240xx/CVE-2023-24010.json | 6 +- CVE-2023/CVE-2023-240xx/CVE-2023-24011.json | 6 +- CVE-2023/CVE-2023-240xx/CVE-2023-24012.json | 6 +- CVE-2023/CVE-2023-248xx/CVE-2023-24856.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24858.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24859.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24860.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24861.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24862.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24863.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24864.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24865.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24866.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24867.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24868.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24869.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24870.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24871.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24872.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24876.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24879.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24880.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24881.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24882.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24884.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24886.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24887.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24890.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24891.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24892.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24893.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24895.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24896.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24897.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24898.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24899.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24900.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24901.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24902.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24903.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24904.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24905.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24906.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24907.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24908.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24909.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24910.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24911.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24912.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24913.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24914.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24919.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24920.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24921.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24923.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24924.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24925.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24926.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24929.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24930.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24931.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24932.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24935.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24936.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24937.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24938.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24939.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24940.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24941.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24942.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24943.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24944.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24945.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24946.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24947.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24948.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24949.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24950.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24953.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24954.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24955.json | 2 +- CVE-2023/CVE-2023-259xx/CVE-2023-25921.json | 2 +- CVE-2023/CVE-2023-259xx/CVE-2023-25922.json | 2 +- CVE-2023/CVE-2023-259xx/CVE-2023-25925.json | 2 +- CVE-2023/CVE-2023-259xx/CVE-2023-25926.json | 2 +- CVE-2023/CVE-2023-25xx/CVE-2023-2530.json | 4 + CVE-2023/CVE-2023-25xx/CVE-2023-2589.json | 4 + CVE-2023/CVE-2023-272xx/CVE-2023-27291.json | 2 +- CVE-2023/CVE-2023-275xx/CVE-2023-27531.json | 2 +- CVE-2023/CVE-2023-275xx/CVE-2023-27539.json | 2 +- CVE-2023/CVE-2023-281xx/CVE-2023-28120.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28216.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28217.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28218.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28219.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28220.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28221.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28222.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28223.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28224.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28225.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28226.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28227.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28228.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28229.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28232.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28233.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28234.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28235.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28236.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28237.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28238.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28240.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28241.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28243.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28244.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28246.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28247.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28248.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28250.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28251.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28252.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28253.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28254.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28255.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28256.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28260.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28261.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28262.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28263.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28266.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28267.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28268.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28270.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28271.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28272.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28273.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28274.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28275.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28276.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28277.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28278.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28283.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28285.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28286.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28287.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28288.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28290.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28292.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28293.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28295.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28296.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28297.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28298.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28300.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28301.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28302.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28303.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28304.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28305.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28306.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28307.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28308.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28310.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28311.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28312.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28313.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28314.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28362.json | 2 +- CVE-2023/CVE-2023-285xx/CVE-2023-28517.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29326.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29328.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29330.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29331.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29333.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29334.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29335.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29336.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29337.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29338.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29340.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29341.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29343.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29345.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29346.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29348.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29349.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29350.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29351.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29352.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29353.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29354.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29355.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29356.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29357.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29358.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29359.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29360.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29361.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29362.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29363.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29364.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29365.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29366.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29367.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29368.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29369.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29370.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29371.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29372.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29373.json | 2 +- CVE-2023/CVE-2023-304xx/CVE-2023-30400.json | 4 + CVE-2023/CVE-2023-309xx/CVE-2023-30996.json | 2 +- CVE-2023/CVE-2023-311xx/CVE-2023-31114.json | 4 + CVE-2023/CVE-2023-311xx/CVE-2023-31115.json | 4 + CVE-2023/CVE-2023-311xx/CVE-2023-31116.json | 4 + CVE-2023/CVE-2023-320xx/CVE-2023-32008.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32009.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32010.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32011.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32012.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32013.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32014.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32015.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32016.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32017.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32018.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32019.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32020.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32021.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32022.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32024.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32025.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32026.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32027.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32028.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32029.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32030.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32031.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32032.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32037.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32038.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32043.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32044.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32045.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32046.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32047.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32049.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32051.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32052.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32054.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32057.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32084.json | 2 +- CVE-2023/CVE-2023-320xx/CVE-2023-32085.json | 2 +- CVE-2023/CVE-2023-323xx/CVE-2023-32344.json | 2 +- CVE-2023/CVE-2023-330xx/CVE-2023-33099.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33100.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33101.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33111.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33115.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33119.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33126.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33127.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33128.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33129.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33130.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33131.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33132.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33133.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33134.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33136.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33137.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33139.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33140.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33141.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33142.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33144.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33145.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33146.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33148.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33149.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33150.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33151.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33155.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33157.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33158.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33159.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33160.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33161.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33162.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33163.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33164.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33170.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33174.json | 2 +- CVE-2023/CVE-2023-332xx/CVE-2023-33282.json | 4 + CVE-2023/CVE-2023-332xx/CVE-2023-33283.json | 4 + CVE-2023/CVE-2023-332xx/CVE-2023-33284.json | 4 + CVE-2023/CVE-2023-334xx/CVE-2023-33496.json | 4 + CVE-2023/CVE-2023-334xx/CVE-2023-33498.json | 4 + CVE-2023/CVE-2023-335xx/CVE-2023-33510.json | 4 + CVE-2023/CVE-2023-335xx/CVE-2023-33536.json | 4 + CVE-2023/CVE-2023-335xx/CVE-2023-33537.json | 4 + CVE-2023/CVE-2023-335xx/CVE-2023-33553.json | 4 + CVE-2023/CVE-2023-335xx/CVE-2023-33556.json | 4 + CVE-2023/CVE-2023-337xx/CVE-2023-33781.json | 4 + CVE-2023/CVE-2023-338xx/CVE-2023-33865.json | 4 + CVE-2023/CVE-2023-33xx/CVE-2023-3309.json | 2 +- CVE-2023/CVE-2023-352xx/CVE-2023-35297.json | 2 +- CVE-2023/CVE-2023-352xx/CVE-2023-35298.json | 2 +- CVE-2023/CVE-2023-352xx/CVE-2023-35299.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35300.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35302.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35303.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35304.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35305.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35306.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35308.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35309.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35310.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35312.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35313.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35315.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35317.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35320.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35322.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35323.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35324.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35325.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35326.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35328.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35329.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35330.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35331.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35332.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35335.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35337.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35338.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35339.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35340.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35342.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35343.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35344.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35345.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35346.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35347.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35348.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35349.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35350.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35351.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35352.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35353.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35355.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35356.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35357.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35358.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35359.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35360.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35361.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35362.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35363.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35364.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35365.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35366.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35367.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35368.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35371.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35372.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35374.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35376.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35377.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35378.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35379.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35380.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35381.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35382.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35383.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35385.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35386.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35387.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35388.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35389.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35390.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35392.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35393.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35394.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35618.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35619.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35621.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35622.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35624.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35625.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35628.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35629.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35630.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35631.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35632.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35633.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35635.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35636.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35638.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35639.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35641.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35642.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35643.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35644.json | 2 +- CVE-2023/CVE-2023-360xx/CVE-2023-36004.json | 2 +- CVE-2023/CVE-2023-360xx/CVE-2023-36006.json | 2 +- CVE-2023/CVE-2023-360xx/CVE-2023-36009.json | 2 +- CVE-2023/CVE-2023-360xx/CVE-2023-36010.json | 2 +- CVE-2023/CVE-2023-360xx/CVE-2023-36011.json | 2 +- CVE-2023/CVE-2023-360xx/CVE-2023-36012.json | 2 +- CVE-2023/CVE-2023-363xx/CVE-2023-36391.json | 2 +- CVE-2023/CVE-2023-364xx/CVE-2023-36431.json | 2 +- CVE-2023/CVE-2023-364xx/CVE-2023-36434.json | 2 +- CVE-2023/CVE-2023-364xx/CVE-2023-36435.json | 2 +- CVE-2023/CVE-2023-364xx/CVE-2023-36436.json | 2 +- CVE-2023/CVE-2023-364xx/CVE-2023-36438.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36557.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36562.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36564.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36567.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36570.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36571.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36572.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36573.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36574.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36575.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36576.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36577.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36578.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36579.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36581.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36582.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36584.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36585.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36589.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36590.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36591.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36592.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36594.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36598.json | 2 +- CVE-2023/CVE-2023-366xx/CVE-2023-36602.json | 2 +- CVE-2023/CVE-2023-366xx/CVE-2023-36603.json | 2 +- CVE-2023/CVE-2023-366xx/CVE-2023-36606.json | 2 +- CVE-2023/CVE-2023-366xx/CVE-2023-36696.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36701.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36702.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36703.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36704.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36706.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36709.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36710.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36711.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36712.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36713.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36717.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36718.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36719.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36720.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36721.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36722.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36723.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36724.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36725.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36726.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36727.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36729.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36731.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36732.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36735.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36736.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36739.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36740.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36742.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36743.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36744.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36745.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36756.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36757.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36759.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36760.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36762.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36763.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36764.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36770.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36771.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36772.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36773.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36776.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36777.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36787.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36788.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36790.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36792.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36793.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36794.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36796.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36799.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36801.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36802.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36803.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36804.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36805.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36865.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36866.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36867.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36868.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36869.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36871.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36872.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36874.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36876.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36877.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36878.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36880.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36881.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36882.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36883.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36884.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36887.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36888.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36889.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36890.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36891.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36892.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36893.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36894.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36895.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36896.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36898.json | 2 +- CVE-2023/CVE-2023-369xx/CVE-2023-36900.json | 2 +- CVE-2023/CVE-2023-369xx/CVE-2023-36902.json | 2 +- CVE-2023/CVE-2023-369xx/CVE-2023-36904.json | 2 +- CVE-2023/CVE-2023-369xx/CVE-2023-36909.json | 2 +- CVE-2023/CVE-2023-369xx/CVE-2023-36910.json | 2 +- CVE-2023/CVE-2023-369xx/CVE-2023-36911.json | 2 +- CVE-2023/CVE-2023-369xx/CVE-2023-36912.json | 2 +- CVE-2023/CVE-2023-369xx/CVE-2023-36914.json | 2 +- CVE-2023/CVE-2023-373xx/CVE-2023-37328.json | 2 +- CVE-2023/CVE-2023-373xx/CVE-2023-37396.json | 2 +- CVE-2023/CVE-2023-374xx/CVE-2023-37400.json | 2 +- CVE-2023/CVE-2023-380xx/CVE-2023-38037.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38139.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38140.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38141.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38142.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38143.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38144.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38146.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38147.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38148.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38149.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38150.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38152.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38154.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38156.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38157.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38158.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38159.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38160.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38161.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38162.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38163.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38166.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38167.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38169.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38170.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38171.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38172.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38173.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38174.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38175.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38176.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38178.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38180.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38181.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38182.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38184.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38185.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38187.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38188.json | 2 +- CVE-2023/CVE-2023-382xx/CVE-2023-38254.json | 2 +- CVE-2023/CVE-2023-383xx/CVE-2023-38359.json | 2 +- CVE-2023/CVE-2023-399xx/CVE-2023-39990.json | 2 +- CVE-2023/CVE-2023-404xx/CVE-2023-40474.json | 2 +- CVE-2023/CVE-2023-404xx/CVE-2023-40475.json | 2 +- CVE-2023/CVE-2023-404xx/CVE-2023-40476.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41764.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41765.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41766.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41767.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41768.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41769.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41770.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41771.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41772.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41773.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41774.json | 2 +- CVE-2023/CVE-2023-430xx/CVE-2023-43051.json | 2 +- CVE-2023/CVE-2023-430xx/CVE-2023-43054.json | 2 +- CVE-2023/CVE-2023-430xx/CVE-2023-43078.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43515.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43521.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43524.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43525.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43526.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43527.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43528.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43529.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43530.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43531.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43537.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43538.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43542.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43543.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43544.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43545.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43551.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43555.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43556.json | 2 +- CVE-2023/CVE-2023-475xx/CVE-2023-47540.json | 2 +- CVE-2023/CVE-2023-475xx/CVE-2023-47541.json | 2 +- CVE-2023/CVE-2023-477xx/CVE-2023-47742.json | 4 +- CVE-2023/CVE-2023-477xx/CVE-2023-47745.json | 2 +- CVE-2023/CVE-2023-478xx/CVE-2023-47874.json | 2 +- CVE-2023/CVE-2023-487xx/CVE-2023-48775.json | 4 + CVE-2023/CVE-2023-508xx/CVE-2023-50850.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51388.json | 2 +- CVE-2023/CVE-2023-513xx/CVE-2023-51389.json | 2 +- CVE-2023/CVE-2023-516xx/CVE-2023-51634.json | 2 +- CVE-2023/CVE-2023-516xx/CVE-2023-51638.json | 2 +- CVE-2023/CVE-2023-516xx/CVE-2023-51639.json | 2 +- CVE-2023/CVE-2023-516xx/CVE-2023-51640.json | 2 +- CVE-2023/CVE-2023-516xx/CVE-2023-51641.json | 2 +- CVE-2023/CVE-2023-516xx/CVE-2023-51642.json | 2 +- CVE-2023/CVE-2023-516xx/CVE-2023-51643.json | 2 +- CVE-2023/CVE-2023-516xx/CVE-2023-51645.json | 2 +- CVE-2023/CVE-2023-516xx/CVE-2023-51646.json | 2 +- CVE-2023/CVE-2023-516xx/CVE-2023-51647.json | 2 +- CVE-2023/CVE-2023-516xx/CVE-2023-51648.json | 2 +- CVE-2023/CVE-2023-516xx/CVE-2023-51653.json | 2 +- CVE-2023/CVE-2023-523xx/CVE-2023-52332.json | 2 +- CVE-2023/CVE-2023-523xx/CVE-2023-52333.json | 2 +- CVE-2023/CVE-2023-523xx/CVE-2023-52334.json | 2 +- CVE-2023/CVE-2023-524xx/CVE-2023-52480.json | 2 +- CVE-2023/CVE-2023-524xx/CVE-2023-52482.json | 2 +- CVE-2023/CVE-2023-524xx/CVE-2023-52483.json | 2 +- CVE-2023/CVE-2023-524xx/CVE-2023-52486.json | 2 +- CVE-2023/CVE-2023-524xx/CVE-2023-52499.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52500.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52501.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52505.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52506.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52507.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52517.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52519.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52523.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52524.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52525.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52527.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52532.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52547.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52548.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52559.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52562.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52569.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52580.json | 2 +- CVE-2023/CVE-2023-525xx/CVE-2023-52582.json | 2 +- CVE-2023/CVE-2023-527xx/CVE-2023-52710.json | 2 +- CVE-2023/CVE-2023-527xx/CVE-2023-52711.json | 2 +- CVE-2023/CVE-2023-527xx/CVE-2023-52712.json | 2 +- CVE-2023/CVE-2023-527xx/CVE-2023-52718.json | 2 +- CVE-2023/CVE-2023-527xx/CVE-2023-52777.json | 2 +- CVE-2023/CVE-2023-528xx/CVE-2023-52859.json | 2 +- CVE-2023/CVE-2023-529xx/CVE-2023-52953.json | 6 +- CVE-2023/CVE-2023-529xx/CVE-2023-52954.json | 6 +- CVE-2023/CVE-2023-529xx/CVE-2023-52955.json | 6 +- CVE-2023/CVE-2023-66xx/CVE-2023-6601.json | 6 +- CVE-2023/CVE-2023-66xx/CVE-2023-6602.json | 4 + CVE-2023/CVE-2023-66xx/CVE-2023-6603.json | 4 + CVE-2023/CVE-2023-66xx/CVE-2023-6604.json | 6 +- CVE-2023/CVE-2023-66xx/CVE-2023-6605.json | 6 +- CVE-2023/CVE-2023-68xx/CVE-2023-6841.json | 2 +- CVE-2023/CVE-2023-72xx/CVE-2023-7263.json | 2 +- CVE-2023/CVE-2023-72xx/CVE-2023-7266.json | 2 +- CVE-2024/CVE-2024-00xx/CVE-2024-0056.json | 2 +- CVE-2024/CVE-2024-03xx/CVE-2024-0334.json | 2 +- CVE-2024/CVE-2024-04xx/CVE-2024-0403.json | 2 +- CVE-2024/CVE-2024-05xx/CVE-2024-0588.json | 2 +- CVE-2024/CVE-2024-08xx/CVE-2024-0871.json | 2 +- CVE-2024/CVE-2024-09xx/CVE-2024-0983.json | 2 +- CVE-2024/CVE-2024-09xx/CVE-2024-0984.json | 2 +- CVE-2024/CVE-2024-100xx/CVE-2024-10033.json | 2 +- CVE-2024/CVE-2024-100xx/CVE-2024-10041.json | 6 +- CVE-2024/CVE-2024-101xx/CVE-2024-10102.json | 2 +- CVE-2024/CVE-2024-101xx/CVE-2024-10106.json | 6 +- CVE-2024/CVE-2024-101xx/CVE-2024-10151.json | 2 +- CVE-2024/CVE-2024-102xx/CVE-2024-10215.json | 6 +- CVE-2024/CVE-2024-102xx/CVE-2024-10234.json | 2 +- CVE-2024/CVE-2024-103xx/CVE-2024-10393.json | 2 +- CVE-2024/CVE-2024-104xx/CVE-2024-10400.json | 2 +- CVE-2024/CVE-2024-105xx/CVE-2024-10527.json | 6 +- CVE-2024/CVE-2024-105xx/CVE-2024-10536.json | 6 +- CVE-2024/CVE-2024-105xx/CVE-2024-10562.json | 2 +- CVE-2024/CVE-2024-105xx/CVE-2024-10585.json | 6 +- CVE-2024/CVE-2024-108xx/CVE-2024-10815.json | 2 +- CVE-2024/CVE-2024-108xx/CVE-2024-10866.json | 6 +- CVE-2024/CVE-2024-109xx/CVE-2024-10932.json | 6 +- CVE-2024/CVE-2024-109xx/CVE-2024-10957.json | 4 + CVE-2024/CVE-2024-109xx/CVE-2024-10966.json | 2 +- CVE-2024/CVE-2024-10xx/CVE-2024-1089.json | 2 +- CVE-2024/CVE-2024-10xx/CVE-2024-1090.json | 2 +- CVE-2024/CVE-2024-10xx/CVE-2024-1091.json | 2 +- CVE-2024/CVE-2024-10xx/CVE-2024-1093.json | 2 +- CVE-2024/CVE-2024-110xx/CVE-2024-11004.json | 2 +- CVE-2024/CVE-2024-111xx/CVE-2024-11157.json | 2 +- CVE-2024/CVE-2024-112xx/CVE-2024-11270.json | 6 +- CVE-2024/CVE-2024-112xx/CVE-2024-11271.json | 6 +- CVE-2024/CVE-2024-112xx/CVE-2024-11282.json | 6 +- CVE-2024/CVE-2024-112xx/CVE-2024-11290.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11328.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11337.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11338.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11350.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11356.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11363.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11364.json | 2 +- CVE-2024/CVE-2024-113xx/CVE-2024-11369.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11375.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11377.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11378.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11382.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11383.json | 6 +- CVE-2024/CVE-2024-114xx/CVE-2024-11423.json | 6 +- CVE-2024/CVE-2024-114xx/CVE-2024-11434.json | 6 +- CVE-2024/CVE-2024-114xx/CVE-2024-11437.json | 6 +- CVE-2024/CVE-2024-114xx/CVE-2024-11445.json | 6 +- CVE-2024/CVE-2024-114xx/CVE-2024-11465.json | 6 +- CVE-2024/CVE-2024-114xx/CVE-2024-11496.json | 6 +- CVE-2024/CVE-2024-115xx/CVE-2024-11512.json | 2 +- CVE-2024/CVE-2024-115xx/CVE-2024-11577.json | 2 +- CVE-2024/CVE-2024-115xx/CVE-2024-11579.json | 2 +- CVE-2024/CVE-2024-115xx/CVE-2024-11581.json | 2 +- CVE-2024/CVE-2024-116xx/CVE-2024-11606.json | 2 +- CVE-2024/CVE-2024-116xx/CVE-2024-11613.json | 6 +- CVE-2024/CVE-2024-116xx/CVE-2024-11625.json | 6 +- CVE-2024/CVE-2024-116xx/CVE-2024-11626.json | 6 +- CVE-2024/CVE-2024-116xx/CVE-2024-11627.json | 6 +- CVE-2024/CVE-2024-116xx/CVE-2024-11633.json | 2 +- CVE-2024/CVE-2024-116xx/CVE-2024-11634.json | 2 +- CVE-2024/CVE-2024-116xx/CVE-2024-11635.json | 6 +- CVE-2024/CVE-2024-116xx/CVE-2024-11642.json | 6 +- CVE-2024/CVE-2024-116xx/CVE-2024-11681.json | 6 +- CVE-2024/CVE-2024-116xx/CVE-2024-11686.json | 6 +- CVE-2024/CVE-2024-116xx/CVE-2024-11690.json | 6 +- CVE-2024/CVE-2024-117xx/CVE-2024-11725.json | 6 +- CVE-2024/CVE-2024-117xx/CVE-2024-11733.json | 6 +- CVE-2024/CVE-2024-117xx/CVE-2024-11749.json | 6 +- CVE-2024/CVE-2024-117xx/CVE-2024-11756.json | 6 +- CVE-2024/CVE-2024-117xx/CVE-2024-11764.json | 6 +- CVE-2024/CVE-2024-117xx/CVE-2024-11777.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11810.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11815.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11816.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11826.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11830.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11849.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11868.json | 2 +- CVE-2024/CVE-2024-118xx/CVE-2024-11887.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11899.json | 6 +- CVE-2024/CVE-2024-119xx/CVE-2024-11907.json | 6 +- CVE-2024/CVE-2024-119xx/CVE-2024-11916.json | 6 +- CVE-2024/CVE-2024-119xx/CVE-2024-11929.json | 6 +- CVE-2024/CVE-2024-119xx/CVE-2024-11930.json | 6 +- CVE-2024/CVE-2024-119xx/CVE-2024-11934.json | 6 +- CVE-2024/CVE-2024-119xx/CVE-2024-11939.json | 6 +- CVE-2024/CVE-2024-119xx/CVE-2024-11974.json | 6 +- CVE-2024/CVE-2024-11xx/CVE-2024-1123.json | 2 +- CVE-2024/CVE-2024-11xx/CVE-2024-1124.json | 2 +- CVE-2024/CVE-2024-11xx/CVE-2024-1125.json | 2 +- CVE-2024/CVE-2024-11xx/CVE-2024-1126.json | 2 +- CVE-2024/CVE-2024-11xx/CVE-2024-1127.json | 2 +- CVE-2024/CVE-2024-11xx/CVE-2024-1128.json | 2 +- CVE-2024/CVE-2024-11xx/CVE-2024-1133.json | 2 +- CVE-2024/CVE-2024-11xx/CVE-2024-1191.json | 2 +- CVE-2024/CVE-2024-120xx/CVE-2024-12022.json | 6 +- CVE-2024/CVE-2024-120xx/CVE-2024-12030.json | 6 +- CVE-2024/CVE-2024-120xx/CVE-2024-12033.json | 6 +- CVE-2024/CVE-2024-120xx/CVE-2024-12045.json | 6 +- CVE-2024/CVE-2024-120xx/CVE-2024-12047.json | 6 +- CVE-2024/CVE-2024-120xx/CVE-2024-12049.json | 6 +- CVE-2024/CVE-2024-120xx/CVE-2024-12067.json | 6 +- CVE-2024/CVE-2024-120xx/CVE-2024-12073.json | 6 +- CVE-2024/CVE-2024-120xx/CVE-2024-12077.json | 6 +- CVE-2024/CVE-2024-120xx/CVE-2024-12098.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12112.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12122.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12124.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12126.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12131.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12140.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12152.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12153.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12157.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12158.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12159.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12170.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12176.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12195.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12202.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12205.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12206.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12207.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12208.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12214.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12218.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12221.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12222.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12237.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12249.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12252.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12256.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12261.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12264.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12279.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12285.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12288.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12290.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12291.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12302.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12311.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12313.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12316.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12322.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12324.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12327.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12328.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12330.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12332.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12337.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12383.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12384.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12394.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12402.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12416.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12419.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12425.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12426.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12429.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12430.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12431.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12435.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12437.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12438.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12439.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12440.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12445.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12453.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12457.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12462.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12464.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12470.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12471.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12473.json | 2 +- CVE-2024/CVE-2024-124xx/CVE-2024-12475.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12491.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12493.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12495.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12496.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12499.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12514.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12515.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12516.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12521.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12528.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12532.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12535.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12538.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12540.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12541.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12542.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12545.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12557.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12559.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12569.json | 2 +- CVE-2024/CVE-2024-125xx/CVE-2024-12583.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12584.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12585.json | 2 +- CVE-2024/CVE-2024-125xx/CVE-2024-12590.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12592.json | 6 +- CVE-2024/CVE-2024-126xx/CVE-2024-12605.json | 6 +- CVE-2024/CVE-2024-126xx/CVE-2024-12606.json | 2 +- CVE-2024/CVE-2024-126xx/CVE-2024-12616.json | 6 +- CVE-2024/CVE-2024-126xx/CVE-2024-12618.json | 6 +- CVE-2024/CVE-2024-126xx/CVE-2024-12621.json | 6 +- CVE-2024/CVE-2024-126xx/CVE-2024-12624.json | 6 +- CVE-2024/CVE-2024-126xx/CVE-2024-12633.json | 6 +- CVE-2024/CVE-2024-126xx/CVE-2024-12699.json | 6 +- CVE-2024/CVE-2024-127xx/CVE-2024-12701.json | 6 +- CVE-2024/CVE-2024-127xx/CVE-2024-12711.json | 6 +- CVE-2024/CVE-2024-127xx/CVE-2024-12712.json | 6 +- CVE-2024/CVE-2024-127xx/CVE-2024-12713.json | 6 +- CVE-2024/CVE-2024-127xx/CVE-2024-12714.json | 2 +- CVE-2024/CVE-2024-127xx/CVE-2024-12715.json | 2 +- CVE-2024/CVE-2024-127xx/CVE-2024-12717.json | 2 +- CVE-2024/CVE-2024-127xx/CVE-2024-12719.json | 4 +- CVE-2024/CVE-2024-127xx/CVE-2024-12731.json | 2 +- CVE-2024/CVE-2024-127xx/CVE-2024-12736.json | 2 +- CVE-2024/CVE-2024-127xx/CVE-2024-12738.json | 6 +- CVE-2024/CVE-2024-127xx/CVE-2024-12781.json | 6 +- CVE-2024/CVE-2024-128xx/CVE-2024-12802.json | 2 +- CVE-2024/CVE-2024-128xx/CVE-2024-12803.json | 2 +- CVE-2024/CVE-2024-128xx/CVE-2024-12805.json | 2 +- CVE-2024/CVE-2024-128xx/CVE-2024-12806.json | 2 +- CVE-2024/CVE-2024-128xx/CVE-2024-12819.json | 6 +- CVE-2024/CVE-2024-128xx/CVE-2024-12848.json | 6 +- CVE-2024/CVE-2024-128xx/CVE-2024-12849.json | 6 +- CVE-2024/CVE-2024-128xx/CVE-2024-12851.json | 6 +- CVE-2024/CVE-2024-128xx/CVE-2024-12852.json | 6 +- CVE-2024/CVE-2024-128xx/CVE-2024-12853.json | 6 +- CVE-2024/CVE-2024-128xx/CVE-2024-12854.json | 6 +- CVE-2024/CVE-2024-128xx/CVE-2024-12855.json | 6 +- CVE-2024/CVE-2024-129xx/CVE-2024-12970.json | 6 +- CVE-2024/CVE-2024-12xx/CVE-2024-1242.json | 2 +- CVE-2024/CVE-2024-12xx/CVE-2024-1279.json | 2 +- CVE-2024/CVE-2024-130xx/CVE-2024-13041.json | 6 +- CVE-2024/CVE-2024-130xx/CVE-2024-13070.json | 4 + CVE-2024/CVE-2024-130xx/CVE-2024-13072.json | 4 + CVE-2024/CVE-2024-130xx/CVE-2024-13074.json | 4 + CVE-2024/CVE-2024-130xx/CVE-2024-13077.json | 4 + CVE-2024/CVE-2024-130xx/CVE-2024-13080.json | 4 + CVE-2024/CVE-2024-130xx/CVE-2024-13081.json | 4 + CVE-2024/CVE-2024-130xx/CVE-2024-13082.json | 4 + CVE-2024/CVE-2024-130xx/CVE-2024-13083.json | 4 + CVE-2024/CVE-2024-130xx/CVE-2024-13084.json | 4 + CVE-2024/CVE-2024-130xx/CVE-2024-13085.json | 4 + CVE-2024/CVE-2024-131xx/CVE-2024-13129.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13132.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13133.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13134.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13135.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13143.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13144.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13145.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13153.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13173.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13183.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13185.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13186.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13187.json | 4 + CVE-2024/CVE-2024-131xx/CVE-2024-13188.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13189.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13190.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13191.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13192.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13193.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13194.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13195.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13196.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13197.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13198.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13199.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13200.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13201.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13202.json | 2 +- CVE-2024/CVE-2024-132xx/CVE-2024-13203.json | 2 +- CVE-2024/CVE-2024-132xx/CVE-2024-13204.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13205.json | 2 +- CVE-2024/CVE-2024-132xx/CVE-2024-13206.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13209.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13210.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13211.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13212.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13213.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13237.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13238.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13245.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13247.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13252.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13262.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13265.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13266.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13267.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13268.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13269.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13270.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13271.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13272.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13273.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13274.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13275.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13283.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13288.json | 2 +- CVE-2024/CVE-2024-132xx/CVE-2024-13290.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13299.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13300.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13308.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13309.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13310.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13311.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13312.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13318.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1317.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1318.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1320.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1321.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1326.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1327.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1334.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1335.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1336.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1338.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1339.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1361.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1362.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1407.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1411.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1502.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1503.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1512.json | 2 +- CVE-2024/CVE-2024-16xx/CVE-2024-1644.json | 2 +- CVE-2024/CVE-2024-16xx/CVE-2024-1680.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1748.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1749.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1750.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1751.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1769.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1786.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1817.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1831.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1867.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1868.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1918.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1919.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1920.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1921.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1922.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1924.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1925.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1926.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1927.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1970.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1971.json | 2 +- CVE-2024/CVE-2024-201xx/CVE-2024-20105.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20140.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20143.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20144.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20145.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20146.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20148.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20149.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20150.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20151.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20152.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20153.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20154.json | 4 + CVE-2024/CVE-2024-206xx/CVE-2024-20652.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20653.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20654.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20655.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20656.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20657.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20658.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20660.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20661.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20662.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20663.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20664.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20666.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20667.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20671.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20672.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20673.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20674.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20675.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20676.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20677.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20680.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20681.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20682.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20683.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20684.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20686.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20687.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20690.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20691.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20694.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20695.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20696.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20697.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20698.json | 2 +- CVE-2024/CVE-2024-206xx/CVE-2024-20699.json | 2 +- CVE-2024/CVE-2024-207xx/CVE-2024-20700.json | 2 +- CVE-2024/CVE-2024-207xx/CVE-2024-20754.json | 2 +- CVE-2024/CVE-2024-207xx/CVE-2024-20758.json | 2 +- CVE-2024/CVE-2024-207xx/CVE-2024-20759.json | 2 +- CVE-2024/CVE-2024-207xx/CVE-2024-20765.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2065.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2066.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2067.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2068.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2069.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2070.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2071.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2072.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2073.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21302.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21304.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21305.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21306.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21307.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21309.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21310.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21311.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21312.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21313.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21314.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21316.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21318.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21319.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21322.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21323.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21324.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21325.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21326.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21327.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21328.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21329.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21330.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21334.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21336.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21337.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21338.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21339.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21340.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21341.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21342.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21344.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21345.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21346.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21347.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21348.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21349.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21350.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21351.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21352.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21353.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21354.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21355.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21356.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21357.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21358.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21359.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21360.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21361.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21362.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21364.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21365.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21366.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21367.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21368.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21369.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21370.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21371.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21372.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21374.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21375.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21376.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21377.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21378.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21379.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21380.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21381.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21382.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21383.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21384.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21385.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21386.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21387.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21388.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21389.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21390.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21391.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21392.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21393.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21394.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21395.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21396.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21397.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21399.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21400.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21401.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21402.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21403.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21404.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21405.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21406.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21407.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21408.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21410.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21411.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21412.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21413.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21418.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21420.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21421.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21423.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21426.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21427.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21429.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21432.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21433.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21434.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21435.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21436.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21437.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21438.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21439.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21440.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21441.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21443.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21444.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21445.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21446.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21448.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21450.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21451.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21452.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21453.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21454.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21463.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21468.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21470.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21471.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21472.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21473.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21474.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21475.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21476.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21477.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21478.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21480.json | 2 +- CVE-2024/CVE-2024-217xx/CVE-2024-21755.json | 2 +- CVE-2024/CVE-2024-217xx/CVE-2024-21756.json | 2 +- CVE-2024/CVE-2024-217xx/CVE-2024-21786.json | 4 +- CVE-2024/CVE-2024-218xx/CVE-2024-21814.json | 2 +- CVE-2024/CVE-2024-218xx/CVE-2024-21855.json | 4 +- CVE-2024/CVE-2024-21xx/CVE-2024-2132.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2146.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2147.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2148.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2151.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2152.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2153.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2154.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2156.json | 2 +- CVE-2024/CVE-2024-223xx/CVE-2024-22355.json | 2 +- CVE-2024/CVE-2024-223xx/CVE-2024-22356.json | 2 +- CVE-2024/CVE-2024-233xx/CVE-2024-23351.json | 2 +- CVE-2024/CVE-2024-233xx/CVE-2024-23354.json | 2 +- CVE-2024/CVE-2024-236xx/CVE-2024-23671.json | 2 +- CVE-2024/CVE-2024-23xx/CVE-2024-2353.json | 2 +- CVE-2024/CVE-2024-247xx/CVE-2024-24779.json | 2 +- CVE-2024/CVE-2024-249xx/CVE-2024-24975.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2485.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2486.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2487.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2488.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2489.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2490.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2491.json | 2 +- CVE-2024/CVE-2024-250xx/CVE-2024-25037.json | 6 +- CVE-2024/CVE-2024-251xx/CVE-2024-25133.json | 4 + CVE-2024/CVE-2024-25xx/CVE-2024-2550.json | 2 +- CVE-2024/CVE-2024-25xx/CVE-2024-2551.json | 2 +- CVE-2024/CVE-2024-25xx/CVE-2024-2552.json | 2 +- CVE-2024/CVE-2024-260xx/CVE-2024-26016.json | 2 +- CVE-2024/CVE-2024-260xx/CVE-2024-26050.json | 2 +- CVE-2024/CVE-2024-260xx/CVE-2024-26051.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26135.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26158.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26159.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26160.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26161.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26162.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26163.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26164.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26165.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26166.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26167.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26169.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26170.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26173.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26174.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26176.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26177.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26178.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26181.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26182.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26184.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26185.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26186.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26188.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26190.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26191.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26192.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26196.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26197.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26198.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26199.json | 2 +- CVE-2024/CVE-2024-262xx/CVE-2024-26201.json | 2 +- CVE-2024/CVE-2024-262xx/CVE-2024-26208.json | 2 +- CVE-2024/CVE-2024-262xx/CVE-2024-26209.json | 2 +- CVE-2024/CVE-2024-262xx/CVE-2024-26210.json | 2 +- CVE-2024/CVE-2024-262xx/CVE-2024-26213.json | 2 +- CVE-2024/CVE-2024-262xx/CVE-2024-26214.json | 2 +- CVE-2024/CVE-2024-262xx/CVE-2024-26232.json | 2 +- CVE-2024/CVE-2024-262xx/CVE-2024-26244.json | 2 +- CVE-2024/CVE-2024-262xx/CVE-2024-26247.json | 2 +- CVE-2024/CVE-2024-262xx/CVE-2024-26254.json | 2 +- CVE-2024/CVE-2024-262xx/CVE-2024-26257.json | 2 +- CVE-2024/CVE-2024-266xx/CVE-2024-26621.json | 2 +- CVE-2024/CVE-2024-266xx/CVE-2024-26653.json | 2 +- CVE-2024/CVE-2024-266xx/CVE-2024-26689.json | 2 +- CVE-2024/CVE-2024-267xx/CVE-2024-26704.json | 2 +- CVE-2024/CVE-2024-267xx/CVE-2024-26734.json | 2 +- CVE-2024/CVE-2024-267xx/CVE-2024-26748.json | 2 +- CVE-2024/CVE-2024-267xx/CVE-2024-26749.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26892.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26895.json | 2 +- CVE-2024/CVE-2024-269xx/CVE-2024-26941.json | 2 +- CVE-2024/CVE-2024-269xx/CVE-2024-26944.json | 2 +- CVE-2024/CVE-2024-270xx/CVE-2024-27059.json | 2 +- CVE-2024/CVE-2024-272xx/CVE-2024-27255.json | 2 +- CVE-2024/CVE-2024-273xx/CVE-2024-27315.json | 2 +- CVE-2024/CVE-2024-273xx/CVE-2024-27395.json | 2 +- CVE-2024/CVE-2024-273xx/CVE-2024-27396.json | 2 +- CVE-2024/CVE-2024-279xx/CVE-2024-27980.json | 2 +- CVE-2024/CVE-2024-287xx/CVE-2024-28778.json | 6 +- CVE-2024/CVE-2024-288xx/CVE-2024-28852.json | 2 +- CVE-2024/CVE-2024-288xx/CVE-2024-28853.json | 2 +- CVE-2024/CVE-2024-288xx/CVE-2024-28892.json | 4 +- CVE-2024/CVE-2024-288xx/CVE-2024-28899.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28904.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28905.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28907.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28976.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28977.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2819.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2820.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2823.json | 2 +- CVE-2024/CVE-2024-290xx/CVE-2024-29052.json | 4 +- CVE-2024/CVE-2024-290xx/CVE-2024-29053.json | 2 +- CVE-2024/CVE-2024-290xx/CVE-2024-29054.json | 2 +- CVE-2024/CVE-2024-290xx/CVE-2024-29055.json | 2 +- CVE-2024/CVE-2024-290xx/CVE-2024-29056.json | 2 +- CVE-2024/CVE-2024-290xx/CVE-2024-29060.json | 2 +- CVE-2024/CVE-2024-290xx/CVE-2024-29061.json | 2 +- CVE-2024/CVE-2024-290xx/CVE-2024-29062.json | 2 +- CVE-2024/CVE-2024-291xx/CVE-2024-29101.json | 2 +- CVE-2024/CVE-2024-291xx/CVE-2024-29106.json | 2 +- CVE-2024/CVE-2024-292xx/CVE-2024-29224.json | 4 +- CVE-2024/CVE-2024-299xx/CVE-2024-29988.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29995.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29997.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29998.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29999.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30000.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30001.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30002.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30003.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30004.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30005.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30013.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30040.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30051.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30052.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30057.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30062.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30063.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30064.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30065.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30066.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30067.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30068.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30069.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30070.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30071.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30072.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30073.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30074.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30075.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30076.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30077.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30078.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30079.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30080.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30081.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30082.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30083.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30084.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30085.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30086.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30087.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30088.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30089.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30090.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30091.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30093.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30094.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30095.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30096.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30097.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30098.json | 2 +- CVE-2024/CVE-2024-300xx/CVE-2024-30099.json | 2 +- CVE-2024/CVE-2024-301xx/CVE-2024-30100.json | 2 +- CVE-2024/CVE-2024-301xx/CVE-2024-30101.json | 2 +- CVE-2024/CVE-2024-301xx/CVE-2024-30102.json | 2 +- CVE-2024/CVE-2024-301xx/CVE-2024-30103.json | 2 +- CVE-2024/CVE-2024-301xx/CVE-2024-30104.json | 2 +- CVE-2024/CVE-2024-302xx/CVE-2024-30258.json | 2 +- CVE-2024/CVE-2024-302xx/CVE-2024-30259.json | 2 +- CVE-2024/CVE-2024-303xx/CVE-2024-30377.json | 2 +- CVE-2024/CVE-2024-30xx/CVE-2024-3049.json | 2 +- CVE-2024/CVE-2024-30xx/CVE-2024-3056.json | 4 +- CVE-2024/CVE-2024-314xx/CVE-2024-31487.json | 2 +- CVE-2024/CVE-2024-314xx/CVE-2024-31495.json | 2 +- CVE-2024/CVE-2024-319xx/CVE-2024-31913.json | 6 +- CVE-2024/CVE-2024-319xx/CVE-2024-31914.json | 6 +- CVE-2024/CVE-2024-319xx/CVE-2024-31981.json | 2 +- CVE-2024/CVE-2024-319xx/CVE-2024-31982.json | 2 +- CVE-2024/CVE-2024-319xx/CVE-2024-31983.json | 2 +- CVE-2024/CVE-2024-319xx/CVE-2024-31984.json | 2 +- CVE-2024/CVE-2024-319xx/CVE-2024-31985.json | 2 +- CVE-2024/CVE-2024-319xx/CVE-2024-31986.json | 2 +- CVE-2024/CVE-2024-319xx/CVE-2024-31987.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3143.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3144.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3145.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3146.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3147.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3148.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3161.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3162.json | 2 +- CVE-2024/CVE-2024-321xx/CVE-2024-32113.json | 2 +- CVE-2024/CVE-2024-327xx/CVE-2024-32721.json | 2 +- CVE-2024/CVE-2024-327xx/CVE-2024-32791.json | 2 +- CVE-2024/CVE-2024-327xx/CVE-2024-32793.json | 2 +- CVE-2024/CVE-2024-327xx/CVE-2024-32794.json | 2 +- CVE-2024/CVE-2024-32xx/CVE-2024-3215.json | 2 +- CVE-2024/CVE-2024-33xx/CVE-2024-3382.json | 2 +- CVE-2024/CVE-2024-33xx/CVE-2024-3383.json | 2 +- CVE-2024/CVE-2024-33xx/CVE-2024-3384.json | 2 +- CVE-2024/CVE-2024-33xx/CVE-2024-3385.json | 2 +- CVE-2024/CVE-2024-33xx/CVE-2024-3386.json | 2 +- CVE-2024/CVE-2024-33xx/CVE-2024-3388.json | 2 +- CVE-2024/CVE-2024-33xx/CVE-2024-3393.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35248.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35249.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35250.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35252.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35253.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35254.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35255.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35263.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35264.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35265.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35270.json | 2 +- CVE-2024/CVE-2024-353xx/CVE-2024-35365.json | 6 +- CVE-2024/CVE-2024-355xx/CVE-2024-35532.json | 2 +- CVE-2024/CVE-2024-358xx/CVE-2024-35811.json | 2 +- CVE-2024/CVE-2024-359xx/CVE-2024-35979.json | 2 +- CVE-2024/CVE-2024-35xx/CVE-2024-3553.json | 2 +- CVE-2024/CVE-2024-366xx/CVE-2024-36613.json | 6 +- CVE-2024/CVE-2024-368xx/CVE-2024-36899.json | 2 +- CVE-2024/CVE-2024-372xx/CVE-2024-37277.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37325.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37335.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37338.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37339.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37340.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37372.json | 2 +- CVE-2024/CVE-2024-378xx/CVE-2024-37899.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37922.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37947.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37968.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37969.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37970.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37971.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37972.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37973.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37974.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37975.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37976.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37977.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37978.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37981.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37984.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37986.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37987.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37988.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37989.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38010.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38011.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38013.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38014.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38015.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38016.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38017.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38018.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38019.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38022.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38025.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38027.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38028.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38029.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38030.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38031.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38032.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38033.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38034.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38041.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38043.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38044.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38045.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38046.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38047.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38048.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38050.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38051.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38052.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38053.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38054.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38055.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38056.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38057.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38058.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38059.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38060.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38061.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38062.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38063.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38064.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38065.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38066.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38067.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38068.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38069.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38070.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38071.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38072.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38073.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38074.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38076.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38077.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38079.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38080.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38081.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38082.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38083.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38084.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38085.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38091.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38093.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38098.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38099.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38100.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38101.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38102.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38104.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38105.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38106.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38107.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38108.json | 4 +- CVE-2024/CVE-2024-381xx/CVE-2024-38109.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38112.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38114.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38115.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38116.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38117.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38118.json | 4 +- CVE-2024/CVE-2024-381xx/CVE-2024-38119.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38120.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38121.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38122.json | 4 +- CVE-2024/CVE-2024-381xx/CVE-2024-38123.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38124.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38125.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38126.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38127.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38128.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38130.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38131.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38132.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38133.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38134.json | 4 +- CVE-2024/CVE-2024-381xx/CVE-2024-38135.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38136.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38137.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38138.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38140.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38141.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38142.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38143.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38144.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38145.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38146.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38147.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38148.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38149.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38150.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38151.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38152.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38153.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38154.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38155.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38157.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38158.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38159.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38160.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38161.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38162.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38165.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38166.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38167.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38168.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38169.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38170.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38171.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38172.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38173.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38177.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38178.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38180.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38184.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38185.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38186.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38187.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38188.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38189.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38191.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38193.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38195.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38196.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38197.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38198.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38199.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38200.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38201.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38202.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38206.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38208.json | 4 +- CVE-2024/CVE-2024-382xx/CVE-2024-38209.json | 4 +- CVE-2024/CVE-2024-382xx/CVE-2024-38210.json | 4 +- CVE-2024/CVE-2024-382xx/CVE-2024-38211.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38212.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38213.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38214.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38215.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38217.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38220.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38221.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38223.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38226.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38227.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38228.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38232.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38233.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38234.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38235.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38236.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38237.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38238.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38239.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38241.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38242.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38243.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38244.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38245.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38246.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38247.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38248.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38249.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38250.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38252.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38253.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38256.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38257.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38259.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38260.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38261.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38262.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38263.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38264.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38265.json | 2 +- CVE-2024/CVE-2024-388xx/CVE-2024-38856.json | 2 +- CVE-2024/CVE-2024-38xx/CVE-2024-3819.json | 2 +- CVE-2024/CVE-2024-38xx/CVE-2024-3872.json | 2 +- CVE-2024/CVE-2024-38xx/CVE-2024-3885.json | 2 +- CVE-2024/CVE-2024-38xx/CVE-2024-3887.json | 2 +- CVE-2024/CVE-2024-39xx/CVE-2024-3994.json | 2 +- CVE-2024/CVE-2024-404xx/CVE-2024-40427.json | 2 +- CVE-2024/CVE-2024-406xx/CVE-2024-40679.json | 6 +- CVE-2024/CVE-2024-407xx/CVE-2024-40702.json | 6 +- CVE-2024/CVE-2024-407xx/CVE-2024-40747.json | 6 +- CVE-2024/CVE-2024-407xx/CVE-2024-40748.json | 2 +- CVE-2024/CVE-2024-407xx/CVE-2024-40749.json | 2 +- CVE-2024/CVE-2024-407xx/CVE-2024-40762.json | 2 +- CVE-2024/CVE-2024-407xx/CVE-2024-40765.json | 2 +- CVE-2024/CVE-2024-40xx/CVE-2024-4003.json | 2 +- CVE-2024/CVE-2024-411xx/CVE-2024-41163.json | 4 +- CVE-2024/CVE-2024-416xx/CVE-2024-41665.json | 2 +- CVE-2024/CVE-2024-417xx/CVE-2024-41763.json | 6 +- CVE-2024/CVE-2024-417xx/CVE-2024-41765.json | 6 +- CVE-2024/CVE-2024-417xx/CVE-2024-41766.json | 6 +- CVE-2024/CVE-2024-417xx/CVE-2024-41767.json | 6 +- CVE-2024/CVE-2024-417xx/CVE-2024-41768.json | 6 +- CVE-2024/CVE-2024-417xx/CVE-2024-41780.json | 4 + CVE-2024/CVE-2024-417xx/CVE-2024-41787.json | 2 +- CVE-2024/CVE-2024-419xx/CVE-2024-41922.json | 4 +- CVE-2024/CVE-2024-41xx/CVE-2024-4156.json | 2 +- CVE-2024/CVE-2024-42xx/CVE-2024-4203.json | 2 +- CVE-2024/CVE-2024-42xx/CVE-2024-4205.json | 2 +- CVE-2024/CVE-2024-42xx/CVE-2024-4222.json | 2 +- CVE-2024/CVE-2024-42xx/CVE-2024-4223.json | 2 +- CVE-2024/CVE-2024-42xx/CVE-2024-4275.json | 2 +- CVE-2024/CVE-2024-42xx/CVE-2024-4277.json | 2 +- CVE-2024/CVE-2024-42xx/CVE-2024-4279.json | 2 +- CVE-2024/CVE-2024-430xx/CVE-2024-43064.json | 6 +- CVE-2024/CVE-2024-431xx/CVE-2024-43176.json | 6 +- CVE-2024/CVE-2024-432xx/CVE-2024-43231.json | 2 +- CVE-2024/CVE-2024-432xx/CVE-2024-43243.json | 6 +- CVE-2024/CVE-2024-432xx/CVE-2024-43282.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43447.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43449.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43450.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43451.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43452.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43453.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43454.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43457.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43461.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43464.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43465.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43467.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43469.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43470.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43475.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43479.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43482.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43483.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43484.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43487.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43491.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43492.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43495.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43500.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43501.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43502.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43506.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43508.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43509.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43511.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43513.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43514.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43515.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43516.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43517.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43518.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43519.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43520.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43521.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43522.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43523.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43524.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43525.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43526.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43527.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43528.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43529.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43530.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43532.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43533.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43534.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43535.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43536.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43537.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43538.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43540.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43541.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43542.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43543.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43544.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43545.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43546.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43549.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43550.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43551.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43552.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43554.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43555.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43556.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43557.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43558.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43559.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43560.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43561.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43562.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43563.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43564.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43565.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43567.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43572.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43574.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43575.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43581.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43582.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43583.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43585.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43589.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43592.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43593.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43599.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43601.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43607.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43608.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43611.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43615.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43620.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43621.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43622.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43623.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43624.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43626.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43627.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43628.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43629.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43630.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43633.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43634.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43635.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43636.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43637.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43638.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43639.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43640.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43641.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43642.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43643.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43644.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43648.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43649.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43650.json | 6 +- CVE-2024/CVE-2024-436xx/CVE-2024-43651.json | 6 +- CVE-2024/CVE-2024-436xx/CVE-2024-43652.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43653.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43654.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43655.json | 6 +- CVE-2024/CVE-2024-436xx/CVE-2024-43656.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43657.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43658.json | 6 +- CVE-2024/CVE-2024-436xx/CVE-2024-43659.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43660.json | 6 +- CVE-2024/CVE-2024-436xx/CVE-2024-43661.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43662.json | 6 +- CVE-2024/CVE-2024-436xx/CVE-2024-43663.json | 2 +- CVE-2024/CVE-2024-43xx/CVE-2024-4318.json | 2 +- CVE-2024/CVE-2024-43xx/CVE-2024-4351.json | 2 +- CVE-2024/CVE-2024-43xx/CVE-2024-4352.json | 2 +- CVE-2024/CVE-2024-43xx/CVE-2024-4376.json | 2 +- CVE-2024/CVE-2024-43xx/CVE-2024-4379.json | 2 +- CVE-2024/CVE-2024-43xx/CVE-2024-4397.json | 2 +- CVE-2024/CVE-2024-444xx/CVE-2024-44450.json | 6 +- CVE-2024/CVE-2024-44xx/CVE-2024-4434.json | 2 +- CVE-2024/CVE-2024-44xx/CVE-2024-4444.json | 2 +- CVE-2024/CVE-2024-44xx/CVE-2024-4448.json | 2 +- CVE-2024/CVE-2024-44xx/CVE-2024-4449.json | 2 +- CVE-2024/CVE-2024-450xx/CVE-2024-45033.json | 2 +- CVE-2024/CVE-2024-450xx/CVE-2024-45070.json | 6 +- CVE-2024/CVE-2024-451xx/CVE-2024-45100.json | 6 +- CVE-2024/CVE-2024-455xx/CVE-2024-45541.json | 6 +- CVE-2024/CVE-2024-455xx/CVE-2024-45542.json | 6 +- CVE-2024/CVE-2024-455xx/CVE-2024-45546.json | 6 +- CVE-2024/CVE-2024-455xx/CVE-2024-45547.json | 6 +- CVE-2024/CVE-2024-455xx/CVE-2024-45548.json | 6 +- CVE-2024/CVE-2024-455xx/CVE-2024-45550.json | 6 +- CVE-2024/CVE-2024-455xx/CVE-2024-45553.json | 6 +- CVE-2024/CVE-2024-455xx/CVE-2024-45555.json | 6 +- CVE-2024/CVE-2024-455xx/CVE-2024-45558.json | 6 +- CVE-2024/CVE-2024-455xx/CVE-2024-45559.json | 6 +- CVE-2024/CVE-2024-456xx/CVE-2024-45619.json | 2 +- CVE-2024/CVE-2024-456xx/CVE-2024-45620.json | 2 +- CVE-2024/CVE-2024-456xx/CVE-2024-45640.json | 6 +- CVE-2024/CVE-2024-457xx/CVE-2024-45760.json | 2 +- CVE-2024/CVE-2024-457xx/CVE-2024-45761.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4585.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4586.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4587.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4588.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4589.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4590.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4591.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4592.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4593.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4594.json | 2 +- CVE-2024/CVE-2024-460xx/CVE-2024-46073.json | 6 +- CVE-2024/CVE-2024-462xx/CVE-2024-46242.json | 6 +- CVE-2024/CVE-2024-465xx/CVE-2024-46505.json | 6 +- CVE-2024/CVE-2024-469xx/CVE-2024-46978.json | 2 +- CVE-2024/CVE-2024-469xx/CVE-2024-46979.json | 2 +- CVE-2024/CVE-2024-469xx/CVE-2024-46981.json | 6 +- CVE-2024/CVE-2024-46xx/CVE-2024-4624.json | 2 +- CVE-2024/CVE-2024-46xx/CVE-2024-4629.json | 2 +- CVE-2024/CVE-2024-472xx/CVE-2024-47239.json | 6 +- CVE-2024/CVE-2024-473xx/CVE-2024-47390.json | 2 +- CVE-2024/CVE-2024-473xx/CVE-2024-47398.json | 6 +- CVE-2024/CVE-2024-475xx/CVE-2024-47526.json | 2 +- CVE-2024/CVE-2024-475xx/CVE-2024-47528.json | 2 +- CVE-2024/CVE-2024-478xx/CVE-2024-47822.json | 2 +- CVE-2024/CVE-2024-479xx/CVE-2024-47934.json | 6 +- CVE-2024/CVE-2024-482xx/CVE-2024-48245.json | 6 +- CVE-2024/CVE-2024-484xx/CVE-2024-48455.json | 2 +- CVE-2024/CVE-2024-484xx/CVE-2024-48456.json | 2 +- CVE-2024/CVE-2024-484xx/CVE-2024-48457.json | 2 +- CVE-2024/CVE-2024-488xx/CVE-2024-48806.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48814.json | 4 + CVE-2024/CVE-2024-48xx/CVE-2024-4812.json | 2 +- CVE-2024/CVE-2024-490xx/CVE-2024-49019.json | 2 +- CVE-2024/CVE-2024-490xx/CVE-2024-49039.json | 2 +- CVE-2024/CVE-2024-490xx/CVE-2024-49046.json | 2 +- CVE-2024/CVE-2024-490xx/CVE-2024-49051.json | 2 +- CVE-2024/CVE-2024-491xx/CVE-2024-49138.json | 2 +- CVE-2024/CVE-2024-492xx/CVE-2024-49222.json | 6 +- CVE-2024/CVE-2024-492xx/CVE-2024-49249.json | 6 +- CVE-2024/CVE-2024-492xx/CVE-2024-49294.json | 6 +- CVE-2024/CVE-2024-495xx/CVE-2024-49513.json | 4 +- CVE-2024/CVE-2024-495xx/CVE-2024-49595.json | 2 +- CVE-2024/CVE-2024-495xx/CVE-2024-49596.json | 2 +- CVE-2024/CVE-2024-495xx/CVE-2024-49597.json | 2 +- CVE-2024/CVE-2024-496xx/CVE-2024-49633.json | 6 +- CVE-2024/CVE-2024-496xx/CVE-2024-49644.json | 6 +- CVE-2024/CVE-2024-496xx/CVE-2024-49649.json | 6 +- CVE-2024/CVE-2024-496xx/CVE-2024-49686.json | 4 + CVE-2024/CVE-2024-496xx/CVE-2024-49687.json | 4 + CVE-2024/CVE-2024-496xx/CVE-2024-49694.json | 4 + CVE-2024/CVE-2024-496xx/CVE-2024-49698.json | 4 + CVE-2024/CVE-2024-497xx/CVE-2024-49761.json | 2 +- CVE-2024/CVE-2024-497xx/CVE-2024-49767.json | 2 +- CVE-2024/CVE-2024-497xx/CVE-2024-49785.json | 56 + CVE-2024/CVE-2024-506xx/CVE-2024-50603.json | 6 +- CVE-2024/CVE-2024-506xx/CVE-2024-50658.json | 2 +- CVE-2024/CVE-2024-506xx/CVE-2024-50659.json | 2 +- CVE-2024/CVE-2024-506xx/CVE-2024-50660.json | 2 +- CVE-2024/CVE-2024-50xx/CVE-2024-5073.json | 2 +- CVE-2024/CVE-2024-511xx/CVE-2024-51111.json | 6 +- CVE-2024/CVE-2024-514xx/CVE-2024-51442.json | 4 + CVE-2024/CVE-2024-514xx/CVE-2024-51472.json | 6 +- CVE-2024/CVE-2024-514xx/CVE-2024-51480.json | 6 +- CVE-2024/CVE-2024-516xx/CVE-2024-51651.json | 6 +- CVE-2024/CVE-2024-516xx/CVE-2024-51667.json | 4 + CVE-2024/CVE-2024-517xx/CVE-2024-51700.json | 6 +- CVE-2024/CVE-2024-517xx/CVE-2024-51715.json | 6 +- CVE-2024/CVE-2024-517xx/CVE-2024-51737.json | 6 +- CVE-2024/CVE-2024-517xx/CVE-2024-51741.json | 6 +- CVE-2024/CVE-2024-51xx/CVE-2024-5189.json | 2 +- CVE-2024/CVE-2024-520xx/CVE-2024-52048.json | 4 + CVE-2024/CVE-2024-520xx/CVE-2024-52049.json | 4 + CVE-2024/CVE-2024-520xx/CVE-2024-52050.json | 4 + CVE-2024/CVE-2024-523xx/CVE-2024-52366.json | 6 +- CVE-2024/CVE-2024-523xx/CVE-2024-52367.json | 6 +- CVE-2024/CVE-2024-528xx/CVE-2024-52813.json | 6 +- CVE-2024/CVE-2024-528xx/CVE-2024-52869.json | 6 +- CVE-2024/CVE-2024-528xx/CVE-2024-52891.json | 6 +- CVE-2024/CVE-2024-528xx/CVE-2024-52893.json | 2 +- CVE-2024/CVE-2024-531xx/CVE-2024-53165.json | 2 +- CVE-2024/CVE-2024-531xx/CVE-2024-53171.json | 2 +- CVE-2024/CVE-2024-531xx/CVE-2024-53173.json | 2 +- CVE-2024/CVE-2024-531xx/CVE-2024-53179.json | 2 +- CVE-2024/CVE-2024-531xx/CVE-2024-53186.json | 2 +- CVE-2024/CVE-2024-532xx/CVE-2024-53206.json | 2 +- CVE-2024/CVE-2024-532xx/CVE-2024-53237.json | 2 +- CVE-2024/CVE-2024-533xx/CVE-2024-53345.json | 6 +- CVE-2024/CVE-2024-535xx/CVE-2024-53526.json | 6 +- CVE-2024/CVE-2024-536xx/CVE-2024-53647.json | 4 + CVE-2024/CVE-2024-537xx/CVE-2024-53704.json | 2 +- CVE-2024/CVE-2024-537xx/CVE-2024-53705.json | 2 +- CVE-2024/CVE-2024-537xx/CVE-2024-53706.json | 2 +- CVE-2024/CVE-2024-538xx/CVE-2024-53800.json | 6 +- CVE-2024/CVE-2024-539xx/CVE-2024-53931.json | 6 +- CVE-2024/CVE-2024-539xx/CVE-2024-53932.json | 6 +- CVE-2024/CVE-2024-539xx/CVE-2024-53933.json | 2 +- CVE-2024/CVE-2024-539xx/CVE-2024-53934.json | 2 +- CVE-2024/CVE-2024-539xx/CVE-2024-53935.json | 2 +- CVE-2024/CVE-2024-539xx/CVE-2024-53936.json | 2 +- CVE-2024/CVE-2024-539xx/CVE-2024-53995.json | 6 +- CVE-2024/CVE-2024-53xx/CVE-2024-5327.json | 2 +- CVE-2024/CVE-2024-540xx/CVE-2024-54006.json | 6 +- CVE-2024/CVE-2024-540xx/CVE-2024-54007.json | 6 +- CVE-2024/CVE-2024-540xx/CVE-2024-54010.json | 6 +- CVE-2024/CVE-2024-540xx/CVE-2024-54030.json | 6 +- CVE-2024/CVE-2024-541xx/CVE-2024-54100.json | 2 +- CVE-2024/CVE-2024-541xx/CVE-2024-54101.json | 2 +- CVE-2024/CVE-2024-541xx/CVE-2024-54102.json | 2 +- CVE-2024/CVE-2024-541xx/CVE-2024-54119.json | 2 +- CVE-2024/CVE-2024-541xx/CVE-2024-54120.json | 6 +- CVE-2024/CVE-2024-541xx/CVE-2024-54121.json | 6 +- CVE-2024/CVE-2024-541xx/CVE-2024-54122.json | 2 +- CVE-2024/CVE-2024-546xx/CVE-2024-54676.json | 2 +- CVE-2024/CVE-2024-547xx/CVE-2024-54724.json | 6 +- CVE-2024/CVE-2024-547xx/CVE-2024-54731.json | 6 +- CVE-2024/CVE-2024-547xx/CVE-2024-54763.json | 2 +- CVE-2024/CVE-2024-547xx/CVE-2024-54764.json | 2 +- CVE-2024/CVE-2024-547xx/CVE-2024-54767.json | 2 +- CVE-2024/CVE-2024-548xx/CVE-2024-54818.json | 4 + CVE-2024/CVE-2024-548xx/CVE-2024-54819.json | 2 +- CVE-2024/CVE-2024-548xx/CVE-2024-54887.json | 6 +- CVE-2024/CVE-2024-550xx/CVE-2024-55074.json | 4 + CVE-2024/CVE-2024-550xx/CVE-2024-55075.json | 6 +- CVE-2024/CVE-2024-550xx/CVE-2024-55076.json | 6 +- CVE-2024/CVE-2024-550xx/CVE-2024-55078.json | 4 + CVE-2024/CVE-2024-552xx/CVE-2024-55218.json | 2 +- CVE-2024/CVE-2024-554xx/CVE-2024-55410.json | 6 +- CVE-2024/CVE-2024-554xx/CVE-2024-55412.json | 2 +- CVE-2024/CVE-2024-554xx/CVE-2024-55413.json | 2 +- CVE-2024/CVE-2024-554xx/CVE-2024-55414.json | 2 +- CVE-2024/CVE-2024-554xx/CVE-2024-55494.json | 6 +- CVE-2024/CVE-2024-555xx/CVE-2024-55507.json | 4 + CVE-2024/CVE-2024-555xx/CVE-2024-55517.json | 4 + CVE-2024/CVE-2024-555xx/CVE-2024-55529.json | 6 +- CVE-2024/CVE-2024-555xx/CVE-2024-55553.json | 2 +- CVE-2024/CVE-2024-555xx/CVE-2024-55555.json | 6 +- CVE-2024/CVE-2024-556xx/CVE-2024-55605.json | 6 +- CVE-2024/CVE-2024-556xx/CVE-2024-55626.json | 6 +- CVE-2024/CVE-2024-556xx/CVE-2024-55627.json | 6 +- CVE-2024/CVE-2024-556xx/CVE-2024-55628.json | 6 +- CVE-2024/CVE-2024-556xx/CVE-2024-55629.json | 6 +- CVE-2024/CVE-2024-556xx/CVE-2024-55631.json | 4 + CVE-2024/CVE-2024-556xx/CVE-2024-55632.json | 4 + CVE-2024/CVE-2024-556xx/CVE-2024-55656.json | 6 +- CVE-2024/CVE-2024-558xx/CVE-2024-55896.json | 6 +- CVE-2024/CVE-2024-558xx/CVE-2024-55897.json | 6 +- CVE-2024/CVE-2024-559xx/CVE-2024-55917.json | 4 + CVE-2024/CVE-2024-559xx/CVE-2024-55955.json | 4 + CVE-2024/CVE-2024-559xx/CVE-2024-55991.json | 4 + CVE-2024/CVE-2024-559xx/CVE-2024-55995.json | 4 + CVE-2024/CVE-2024-55xx/CVE-2024-5553.json | 2 +- CVE-2024/CVE-2024-55xx/CVE-2024-5591.json | 4 + CVE-2024/CVE-2024-55xx/CVE-2024-5594.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56002.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56020.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56021.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56031.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56039.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56040.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56041.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56042.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56043.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56044.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56045.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56046.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56056.json | 6 +- CVE-2024/CVE-2024-560xx/CVE-2024-56061.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56062.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56063.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56064.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56066.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56067.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56068.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56070.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56071.json | 4 + CVE-2024/CVE-2024-561xx/CVE-2024-56114.json | 6 +- CVE-2024/CVE-2024-561xx/CVE-2024-56198.json | 4 + CVE-2024/CVE-2024-562xx/CVE-2024-56203.json | 4 + CVE-2024/CVE-2024-562xx/CVE-2024-56204.json | 4 + CVE-2024/CVE-2024-562xx/CVE-2024-56205.json | 4 + CVE-2024/CVE-2024-562xx/CVE-2024-56206.json | 4 + CVE-2024/CVE-2024-562xx/CVE-2024-56207.json | 4 + CVE-2024/CVE-2024-562xx/CVE-2024-56270.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56271.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56272.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56273.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56274.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56275.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56276.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56278.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56279.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56280.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56281.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56282.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56283.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56284.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56285.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56286.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56287.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56288.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56289.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56290.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56291.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56292.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56293.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56294.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56296.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56297.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56298.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56299.json | 6 +- CVE-2024/CVE-2024-563xx/CVE-2024-56300.json | 6 +- CVE-2024/CVE-2024-563xx/CVE-2024-56320.json | 4 + CVE-2024/CVE-2024-563xx/CVE-2024-56321.json | 4 + CVE-2024/CVE-2024-563xx/CVE-2024-56322.json | 4 + CVE-2024/CVE-2024-563xx/CVE-2024-56324.json | 4 + CVE-2024/CVE-2024-563xx/CVE-2024-56332.json | 6 +- CVE-2024/CVE-2024-563xx/CVE-2024-56365.json | 4 + CVE-2024/CVE-2024-563xx/CVE-2024-56366.json | 4 + CVE-2024/CVE-2024-563xx/CVE-2024-56376.json | 6 +- CVE-2024/CVE-2024-563xx/CVE-2024-56377.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56408.json | 4 + CVE-2024/CVE-2024-564xx/CVE-2024-56409.json | 4 + CVE-2024/CVE-2024-564xx/CVE-2024-56410.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56411.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56412.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56434.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56435.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56436.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56437.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56438.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56439.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56440.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56441.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56442.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56443.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56444.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56445.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56446.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56447.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56448.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56449.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56450.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56451.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56452.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56453.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56454.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56455.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56456.json | 6 +- CVE-2024/CVE-2024-565xx/CVE-2024-56513.json | 4 + CVE-2024/CVE-2024-565xx/CVE-2024-56514.json | 4 + CVE-2024/CVE-2024-565xx/CVE-2024-56538.json | 2 +- CVE-2024/CVE-2024-565xx/CVE-2024-56554.json | 2 +- CVE-2024/CVE-2024-565xx/CVE-2024-56556.json | 2 +- CVE-2024/CVE-2024-565xx/CVE-2024-56561.json | 2 +- CVE-2024/CVE-2024-565xx/CVE-2024-56581.json | 2 +- CVE-2024/CVE-2024-565xx/CVE-2024-56582.json | 2 +- CVE-2024/CVE-2024-566xx/CVE-2024-56600.json | 2 +- CVE-2024/CVE-2024-566xx/CVE-2024-56601.json | 2 +- CVE-2024/CVE-2024-566xx/CVE-2024-56602.json | 2 +- CVE-2024/CVE-2024-566xx/CVE-2024-56603.json | 2 +- CVE-2024/CVE-2024-566xx/CVE-2024-56604.json | 2 +- CVE-2024/CVE-2024-566xx/CVE-2024-56605.json | 2 +- CVE-2024/CVE-2024-566xx/CVE-2024-56640.json | 2 +- CVE-2024/CVE-2024-568xx/CVE-2024-56802.json | 4 + CVE-2024/CVE-2024-568xx/CVE-2024-56803.json | 4 + CVE-2024/CVE-2024-568xx/CVE-2024-56826.json | 6 +- CVE-2024/CVE-2024-568xx/CVE-2024-56827.json | 6 +- CVE-2024/CVE-2024-568xx/CVE-2024-56828.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57686.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57822.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57823.json | 2 +- CVE-2024/CVE-2024-57xx/CVE-2024-5769.json | 6 +- CVE-2024/CVE-2024-59xx/CVE-2024-5913.json | 2 +- CVE-2024/CVE-2024-59xx/CVE-2024-5917.json | 2 +- CVE-2024/CVE-2024-59xx/CVE-2024-5919.json | 2 +- CVE-2024/CVE-2024-59xx/CVE-2024-5920.json | 2 +- CVE-2024/CVE-2024-61xx/CVE-2024-6155.json | 6 +- CVE-2024/CVE-2024-63xx/CVE-2024-6324.json | 6 +- CVE-2024/CVE-2024-63xx/CVE-2024-6350.json | 6 +- CVE-2024/CVE-2024-64xx/CVE-2024-6495.json | 2 +- CVE-2024/CVE-2024-68xx/CVE-2024-6815.json | 2 +- CVE-2024/CVE-2024-68xx/CVE-2024-6817.json | 2 +- CVE-2024/CVE-2024-70xx/CVE-2024-7012.json | 4 +- CVE-2024/CVE-2024-71xx/CVE-2024-7125.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7143.json | 2 +- CVE-2024/CVE-2024-72xx/CVE-2024-7234.json | 2 +- CVE-2024/CVE-2024-72xx/CVE-2024-7237.json | 2 +- CVE-2024/CVE-2024-72xx/CVE-2024-7260.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7318.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7319.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7341.json | 2 +- CVE-2024/CVE-2024-75xx/CVE-2024-7565.json | 2 +- CVE-2024/CVE-2024-75xx/CVE-2024-7571.json | 2 +- CVE-2024/CVE-2024-76xx/CVE-2024-7696.json | 6 +- CVE-2024/CVE-2024-77xx/CVE-2024-7700.json | 2 +- CVE-2024/CVE-2024-80xx/CVE-2024-8002.json | 6 +- CVE-2024/CVE-2024-82xx/CVE-2024-8285.json | 2 +- CVE-2024/CVE-2024-83xx/CVE-2024-8355.json | 2 +- CVE-2024/CVE-2024-83xx/CVE-2024-8361.json | 6 +- CVE-2024/CVE-2024-84xx/CVE-2024-8443.json | 2 +- CVE-2024/CVE-2024-84xx/CVE-2024-8474.json | 6 +- CVE-2024/CVE-2024-84xx/CVE-2024-8482.json | 2 +- CVE-2024/CVE-2024-84xx/CVE-2024-8495.json | 2 +- CVE-2024/CVE-2024-85xx/CVE-2024-8539.json | 2 +- CVE-2024/CVE-2024-88xx/CVE-2024-8806.json | 2 +- CVE-2024/CVE-2024-88xx/CVE-2024-8807.json | 2 +- CVE-2024/CVE-2024-88xx/CVE-2024-8808.json | 2 +- CVE-2024/CVE-2024-88xx/CVE-2024-8855.json | 2 +- CVE-2024/CVE-2024-88xx/CVE-2024-8857.json | 2 +- CVE-2024/CVE-2024-88xx/CVE-2024-8883.json | 4 +- CVE-2024/CVE-2024-91xx/CVE-2024-9112.json | 2 +- CVE-2024/CVE-2024-91xx/CVE-2024-9113.json | 2 +- CVE-2024/CVE-2024-92xx/CVE-2024-9208.json | 6 +- CVE-2024/CVE-2024-93xx/CVE-2024-9354.json | 6 +- CVE-2024/CVE-2024-94xx/CVE-2024-9420.json | 2 +- CVE-2024/CVE-2024-95xx/CVE-2024-9502.json | 6 +- CVE-2024/CVE-2024-96xx/CVE-2024-9638.json | 2 +- CVE-2024/CVE-2024-96xx/CVE-2024-9671.json | 4 +- CVE-2024/CVE-2024-96xx/CVE-2024-9673.json | 6 +- CVE-2024/CVE-2024-96xx/CVE-2024-9697.json | 6 +- CVE-2024/CVE-2024-97xx/CVE-2024-9702.json | 6 +- CVE-2024/CVE-2024-97xx/CVE-2024-9712.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9713.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9714.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9715.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9716.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9718.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9719.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9720.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9721.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9722.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9723.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9724.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9725.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9727.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9728.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9729.json | 2 +- CVE-2024/CVE-2024-98xx/CVE-2024-9842.json | 2 +- CVE-2024/CVE-2024-98xx/CVE-2024-9843.json | 2 +- CVE-2024/CVE-2024-98xx/CVE-2024-9844.json | 2 +- CVE-2024/CVE-2024-98xx/CVE-2024-9864.json | 2 +- CVE-2024/CVE-2024-98xx/CVE-2024-9865.json | 2 +- CVE-2024/CVE-2024-99xx/CVE-2024-9939.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0194.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0195.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0196.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0197.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0198.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0199.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0200.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0201.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0202.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0203.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0204.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0205.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0206.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0214.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0218.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0219.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0220.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0221.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0222.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0223.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0224.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0225.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0226.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0227.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0244.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0245.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0246.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0282.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0283.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0291.json | 4 + CVE-2025/CVE-2025-02xx/CVE-2025-0294.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0295.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0296.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0297.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0298.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0299.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0300.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0301.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0306.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0311.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0328.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0331.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0333.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0334.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0335.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0336.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0339.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0340.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0341.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0342.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0344.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0345.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0346.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0347.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0348.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0349.json | 6 +- CVE-2025/CVE-2025-200xx/CVE-2025-20033.json | 6 +- CVE-2025/CVE-2025-201xx/CVE-2025-20123.json | 6 +- CVE-2025/CVE-2025-201xx/CVE-2025-20126.json | 6 +- CVE-2025/CVE-2025-201xx/CVE-2025-20166.json | 6 +- CVE-2025/CVE-2025-201xx/CVE-2025-20167.json | 6 +- CVE-2025/CVE-2025-201xx/CVE-2025-20168.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21102.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21111.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21380.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21385.json | 6 +- CVE-2025/CVE-2025-215xx/CVE-2025-21592.json | 6 +- CVE-2025/CVE-2025-215xx/CVE-2025-21593.json | 6 +- CVE-2025/CVE-2025-215xx/CVE-2025-21596.json | 6 +- CVE-2025/CVE-2025-215xx/CVE-2025-21598.json | 6 +- CVE-2025/CVE-2025-215xx/CVE-2025-21599.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21600.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21602.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21603.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21604.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21609.json | 4 + CVE-2025/CVE-2025-216xx/CVE-2025-21610.json | 4 + CVE-2025/CVE-2025-216xx/CVE-2025-21611.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21612.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21613.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21614.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21615.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21616.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21617.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21618.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21620.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21622.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21623.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21624.json | 6 +- CVE-2025/CVE-2025-216xx/CVE-2025-21628.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22130.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22132.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22133.json | 2 +- CVE-2025/CVE-2025-221xx/CVE-2025-22136.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22137.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22139.json | 4 + CVE-2025/CVE-2025-221xx/CVE-2025-22140.json | 4 + CVE-2025/CVE-2025-221xx/CVE-2025-22141.json | 4 + CVE-2025/CVE-2025-221xx/CVE-2025-22143.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22145.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22149.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22151.json | 6 +- CVE-2025/CVE-2025-222xx/CVE-2025-22215.json | 2 +- CVE-2025/CVE-2025-222xx/CVE-2025-22261.json | 6 +- CVE-2025/CVE-2025-222xx/CVE-2025-22293.json | 6 +- CVE-2025/CVE-2025-222xx/CVE-2025-22294.json | 6 +- CVE-2025/CVE-2025-222xx/CVE-2025-22295.json | 6 +- CVE-2025/CVE-2025-222xx/CVE-2025-22296.json | 6 +- CVE-2025/CVE-2025-222xx/CVE-2025-22297.json | 6 +- CVE-2025/CVE-2025-222xx/CVE-2025-22298.json | 6 +- CVE-2025/CVE-2025-222xx/CVE-2025-22299.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22300.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22301.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22302.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22303.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22304.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22305.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22306.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22307.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22308.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22309.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22310.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22312.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22313.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22315.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22316.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22319.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22320.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22321.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22323.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22324.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22325.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22326.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22327.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22328.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22330.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22331.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22333.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22334.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22335.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22336.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22338.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22339.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22342.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22343.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22345.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22347.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22348.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22349.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22350.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22351.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22352.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22353.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22354.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22355.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22357.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22358.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22359.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22361.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22362.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22363.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22364.json | 2 +- CVE-2025/CVE-2025-223xx/CVE-2025-22365.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22383.json | 4 + CVE-2025/CVE-2025-223xx/CVE-2025-22384.json | 4 + CVE-2025/CVE-2025-223xx/CVE-2025-22385.json | 4 + CVE-2025/CVE-2025-223xx/CVE-2025-22386.json | 4 + CVE-2025/CVE-2025-223xx/CVE-2025-22387.json | 4 + CVE-2025/CVE-2025-223xx/CVE-2025-22388.json | 4 + CVE-2025/CVE-2025-223xx/CVE-2025-22389.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22390.json | 4 + CVE-2025/CVE-2025-223xx/CVE-2025-22395.json | 6 +- CVE-2025/CVE-2025-224xx/CVE-2025-22445.json | 6 +- CVE-2025/CVE-2025-224xx/CVE-2025-22449.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22500.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22502.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22503.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22504.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22505.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22507.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22508.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22510.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22511.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22512.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22515.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22516.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22517.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22518.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22519.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22520.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22521.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22522.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22524.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22525.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22527.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22528.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22529.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22530.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22531.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22532.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22533.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22534.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22535.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22536.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22537.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22538.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22539.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22540.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22541.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22542.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22543.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22544.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22545.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22546.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22547.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22548.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22549.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22550.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22551.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22552.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22554.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22555.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22556.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22557.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22558.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22559.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22560.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22561.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22562.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22563.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22571.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22572.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22573.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22574.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22577.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22578.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22579.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22580.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22581.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22582.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22584.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22585.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22589.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22590.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22591.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22592.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22593.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22594.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22595.json | 6 +- CVE-2025/CVE-2025-226xx/CVE-2025-22621.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22801.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22802.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22803.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22804.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22805.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22806.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22807.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22808.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22809.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22810.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22811.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22812.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22813.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22814.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22815.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22817.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22818.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22819.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22820.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22821.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22822.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22823.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22824.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22826.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22827.json | 6 +- CVE-2025/CVE-2025-229xx/CVE-2025-22946.json | 2 +- CVE-2025/CVE-2025-230xx/CVE-2025-23016.json | 2 +- README.md | 58 +- _state.csv | 6446 ++++++++++--------- 3207 files changed, 9600 insertions(+), 6346 deletions(-) create mode 100644 CVE-2021/CVE-2021-296xx/CVE-2021-29669.json create mode 100644 CVE-2024/CVE-2024-497xx/CVE-2024-49785.json diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1427.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1427.json index 1c6782041e9..657ebbb4619 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1427.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1427.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2015-02-17T15:59:04.560", "lastModified": "2024-11-21T02:25:24.233", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1635.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1635.json index ac3ddc95e75..67906a043f2 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1635.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1635.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:01.263", "lastModified": "2024-11-21T02:25:49.760", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1641.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1641.json index 46f75bf586a..d6522125f2b 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1641.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1641.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:05.250", "lastModified": "2024-11-21T02:25:50.510", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json index d31392f7db1..1a7154597fe 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-08-15T00:59:00.110", "lastModified": "2024-11-21T02:25:50.630", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1671.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1671.json index 36e2f0be827..aa88a643c27 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1671.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1671.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:03.910", "lastModified": "2024-11-21T02:25:53.453", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json index 57bc87f5b24..e457e20caa3 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-21T10:59:00.073", "lastModified": "2024-11-21T02:25:57.643", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1769.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1769.json index 88ec54e896c..e1a7a18d03a 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1769.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1769.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-08-15T00:59:01.467", "lastModified": "2024-11-21T02:26:05.500", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json index 34536dca237..6d6cdc3553b 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-06-10T01:59:36.483", "lastModified": "2024-11-21T02:26:05.623", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2291.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2291.json index ae42dae3b07..d44ca271a42 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2291.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2291.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-08-09T18:29:00.933", "lastModified": "2024-11-21T02:27:09.427", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2360.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2360.json index c0af97823a6..fe27c15b1ea 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2360.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2360.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-06-10T01:59:38.890", "lastModified": "2024-11-21T02:27:16.887", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2387.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2387.json index 4f2f4d60f07..3ef7e60663a 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2387.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2387.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-07-14T22:59:08.103", "lastModified": "2024-11-21T02:27:19.600", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json b/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json index 8a2cfbb90a9..6b48ff947e9 100644 --- a/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json +++ b/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-07-14T21:59:33.283", "lastModified": "2024-11-21T02:27:21.957", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-24xx/CVE-2015-2424.json b/CVE-2015/CVE-2015-24xx/CVE-2015-2424.json index c60ae00c32d..39862a65ad1 100644 --- a/CVE-2015/CVE-2015-24xx/CVE-2015-2424.json +++ b/CVE-2015/CVE-2015-24xx/CVE-2015-2424.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-07-14T21:59:35.987", "lastModified": "2024-11-21T02:27:22.517", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-24xx/CVE-2015-2425.json b/CVE-2015/CVE-2015-24xx/CVE-2015-2425.json index ebd97ccea6a..5a08bcde8e4 100644 --- a/CVE-2015/CVE-2015-24xx/CVE-2015-2425.json +++ b/CVE-2015/CVE-2015-24xx/CVE-2015-2425.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-07-14T21:59:36.813", "lastModified": "2024-11-21T02:27:22.633", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-24xx/CVE-2015-2426.json b/CVE-2015/CVE-2015-24xx/CVE-2015-2426.json index 60980ba77a6..f7c04eddee2 100644 --- a/CVE-2015/CVE-2015-24xx/CVE-2015-2426.json +++ b/CVE-2015/CVE-2015-24xx/CVE-2015-2426.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-07-20T18:59:01.210", "lastModified": "2024-11-21T02:27:22.747", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2502.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2502.json index 2b3287ffebc..a09aa6ece15 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2502.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2502.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-08-19T10:59:00.090", "lastModified": "2024-11-21T02:27:30.230", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json index 8e488b032a7..c9690314229 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-09-09T00:59:52.190", "lastModified": "2024-11-21T02:27:34.900", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2546.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2546.json index 73551335744..179868941bd 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2546.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2546.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-09-09T00:59:53.207", "lastModified": "2024-11-21T02:27:35.020", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2590.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2590.json index 8f9b237c38f..9289c7b4797 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2590.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2590.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-07-16T10:59:17.050", "lastModified": "2024-11-21T02:27:39.980", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3035.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3035.json index 3ee02ebcb25..a686e97d179 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3035.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3035.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2015-04-22T01:59:02.553", "lastModified": "2024-11-21T02:28:31.600", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3043.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3043.json index 9fa1546394f..8256724862c 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3043.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3043.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:21.323", "lastModified": "2024-11-21T02:28:32.663", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-31xx/CVE-2015-3113.json b/CVE-2015/CVE-2015-31xx/CVE-2015-3113.json index ff7be5d3a9a..151276acf20 100644 --- a/CVE-2015/CVE-2015-31xx/CVE-2015-3113.json +++ b/CVE-2015/CVE-2015-31xx/CVE-2015-3113.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2015-06-23T21:59:01.960", "lastModified": "2024-11-21T02:28:41.810", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-40xx/CVE-2015-4068.json b/CVE-2015/CVE-2015-40xx/CVE-2015-4068.json index e2f5a311b89..cfe5b88cd0f 100644 --- a/CVE-2015/CVE-2015-40xx/CVE-2015-4068.json +++ b/CVE-2015/CVE-2015-40xx/CVE-2015-4068.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2015-05-29T15:59:23.327", "lastModified": "2024-11-21T02:30:23.753", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-44xx/CVE-2015-4495.json b/CVE-2015/CVE-2015-44xx/CVE-2015-4495.json index 8a4ee398dc7..311ebd55786 100644 --- a/CVE-2015/CVE-2015-44xx/CVE-2015-4495.json +++ b/CVE-2015/CVE-2015-44xx/CVE-2015-4495.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2015-08-08T00:59:04.597", "lastModified": "2024-11-21T02:31:12.170", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-48xx/CVE-2015-4852.json b/CVE-2015/CVE-2015-48xx/CVE-2015-4852.json index 28f1f9a8b50..3f877898679 100644 --- a/CVE-2015/CVE-2015-48xx/CVE-2015-4852.json +++ b/CVE-2015/CVE-2015-48xx/CVE-2015-4852.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-11-18T15:59:00.133", "lastModified": "2024-11-21T02:31:52.913", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-49xx/CVE-2015-4902.json b/CVE-2015/CVE-2015-49xx/CVE-2015-4902.json index c9d2f44f38f..6f0135040c2 100644 --- a/CVE-2015/CVE-2015-49xx/CVE-2015-4902.json +++ b/CVE-2015/CVE-2015-49xx/CVE-2015-4902.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-10-22T00:00:03.093", "lastModified": "2024-11-21T02:31:59.317", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-51xx/CVE-2015-5119.json b/CVE-2015/CVE-2015-51xx/CVE-2015-5119.json index 249ac8d0527..aff18b83921 100644 --- a/CVE-2015/CVE-2015-51xx/CVE-2015-5119.json +++ b/CVE-2015/CVE-2015-51xx/CVE-2015-5119.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2015-07-08T14:59:05.677", "lastModified": "2024-11-21T02:32:24.047", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-51xx/CVE-2015-5122.json b/CVE-2015/CVE-2015-51xx/CVE-2015-5122.json index ae7dceb18b5..0970cfcb857 100644 --- a/CVE-2015/CVE-2015-51xx/CVE-2015-5122.json +++ b/CVE-2015/CVE-2015-51xx/CVE-2015-5122.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2015-07-14T10:59:00.213", "lastModified": "2024-11-21T02:32:24.423", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-51xx/CVE-2015-5123.json b/CVE-2015/CVE-2015-51xx/CVE-2015-5123.json index 589fca890c6..362dbddb81b 100644 --- a/CVE-2015/CVE-2015-51xx/CVE-2015-5123.json +++ b/CVE-2015/CVE-2015-51xx/CVE-2015-5123.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2015-07-14T10:59:01.337", "lastModified": "2024-11-21T02:32:24.590", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-53xx/CVE-2015-5317.json b/CVE-2015/CVE-2015-53xx/CVE-2015-5317.json index b9efdc662d4..84329acb5f8 100644 --- a/CVE-2015/CVE-2015-53xx/CVE-2015-5317.json +++ b/CVE-2015/CVE-2015-53xx/CVE-2015-5317.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2015-11-25T20:59:07.680", "lastModified": "2024-11-21T02:32:47.013", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-61xx/CVE-2015-6175.json b/CVE-2015/CVE-2015-61xx/CVE-2015-6175.json index fb19bfe0e0d..ced48ac5557 100644 --- a/CVE-2015/CVE-2015-61xx/CVE-2015-6175.json +++ b/CVE-2015/CVE-2015-61xx/CVE-2015-6175.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2015-12-09T11:59:56.580", "lastModified": "2024-11-21T02:34:35.057", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-74xx/CVE-2015-7450.json b/CVE-2015/CVE-2015-74xx/CVE-2015-7450.json index 23b171d1422..0e3992dbfb1 100644 --- a/CVE-2015/CVE-2015-74xx/CVE-2015-7450.json +++ b/CVE-2015/CVE-2015-74xx/CVE-2015-7450.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2016-01-02T21:59:15.800", "lastModified": "2024-11-21T02:36:48.753", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-76xx/CVE-2015-7645.json b/CVE-2015/CVE-2015-76xx/CVE-2015-7645.json index 7a34e7a7d39..0dfc5a8e75d 100644 --- a/CVE-2015/CVE-2015-76xx/CVE-2015-7645.json +++ b/CVE-2015/CVE-2015-76xx/CVE-2015-7645.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2015-10-15T10:59:10.530", "lastModified": "2024-11-21T02:37:07.620", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-86xx/CVE-2015-8651.json b/CVE-2015/CVE-2015-86xx/CVE-2015-8651.json index 9946fad62b4..0ff22628cd3 100644 --- a/CVE-2015/CVE-2015-86xx/CVE-2015-8651.json +++ b/CVE-2015/CVE-2015-86xx/CVE-2015-8651.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2015-12-28T23:59:19.050", "lastModified": "2024-11-21T02:38:53.790", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json b/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json index 06265d7f3ed..658b207e54a 100644 --- a/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json +++ b/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-01-13T05:59:22.657", "lastModified": "2024-11-21T02:40:58.077", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json b/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json index ff425854720..624e34eee7a 100644 --- a/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json +++ b/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-02-10T11:59:06.440", "lastModified": "2024-11-21T02:40:58.783", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-00xx/CVE-2016-0099.json b/CVE-2016/CVE-2016-00xx/CVE-2016-0099.json index 26334f8534b..9018cb6314e 100644 --- a/CVE-2016/CVE-2016-00xx/CVE-2016-0099.json +++ b/CVE-2016/CVE-2016-00xx/CVE-2016-0099.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-03-09T11:59:09.590", "lastModified": "2024-11-21T02:41:04.300", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-01xx/CVE-2016-0151.json b/CVE-2016/CVE-2016-01xx/CVE-2016-0151.json index feed4a682ab..d4a00418fa5 100644 --- a/CVE-2016/CVE-2016-01xx/CVE-2016-0151.json +++ b/CVE-2016/CVE-2016-01xx/CVE-2016-0151.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-04-12T23:59:15.890", "lastModified": "2024-11-21T02:41:09.857", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-01xx/CVE-2016-0162.json b/CVE-2016/CVE-2016-01xx/CVE-2016-0162.json index d727e19a3e6..fbfbcc99a56 100644 --- a/CVE-2016/CVE-2016-01xx/CVE-2016-0162.json +++ b/CVE-2016/CVE-2016-01xx/CVE-2016-0162.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-04-12T23:59:26.410", "lastModified": "2024-11-21T02:41:11.123", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-01xx/CVE-2016-0165.json b/CVE-2016/CVE-2016-01xx/CVE-2016-0165.json index fc2bac4bfd7..c1b1237120d 100644 --- a/CVE-2016/CVE-2016-01xx/CVE-2016-0165.json +++ b/CVE-2016/CVE-2016-01xx/CVE-2016-0165.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-04-12T23:59:28.303", "lastModified": "2024-11-21T02:41:11.413", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-01xx/CVE-2016-0167.json b/CVE-2016/CVE-2016-01xx/CVE-2016-0167.json index 448c9e6d33f..9050c62c4ab 100644 --- a/CVE-2016/CVE-2016-01xx/CVE-2016-0167.json +++ b/CVE-2016/CVE-2016-01xx/CVE-2016-0167.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-04-12T23:59:30.430", "lastModified": "2024-11-21T02:41:11.650", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-01xx/CVE-2016-0185.json b/CVE-2016/CVE-2016-01xx/CVE-2016-0185.json index 134819fbc55..690fe9e325a 100644 --- a/CVE-2016/CVE-2016-01xx/CVE-2016-0185.json +++ b/CVE-2016/CVE-2016-01xx/CVE-2016-0185.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-05-11T01:59:26.097", "lastModified": "2024-11-21T02:41:13.873", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-01xx/CVE-2016-0189.json b/CVE-2016/CVE-2016-01xx/CVE-2016-0189.json index d9a6836d236..f63cf575898 100644 --- a/CVE-2016/CVE-2016-01xx/CVE-2016-0189.json +++ b/CVE-2016/CVE-2016-01xx/CVE-2016-0189.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-05-11T01:59:30.537", "lastModified": "2024-11-21T02:41:14.313", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-07xx/CVE-2016-0752.json b/CVE-2016/CVE-2016-07xx/CVE-2016-0752.json index 1e98700dcea..83409b44b98 100644 --- a/CVE-2016/CVE-2016-07xx/CVE-2016-0752.json +++ b/CVE-2016/CVE-2016-07xx/CVE-2016-0752.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2016-02-16T02:59:06.783", "lastModified": "2024-11-21T02:42:18.493", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-09xx/CVE-2016-0984.json b/CVE-2016/CVE-2016-09xx/CVE-2016-0984.json index 6f12aa80f01..96d6eb8456f 100644 --- a/CVE-2016/CVE-2016-09xx/CVE-2016-0984.json +++ b/CVE-2016/CVE-2016-09xx/CVE-2016-0984.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2016-02-10T20:59:32.563", "lastModified": "2024-11-21T02:42:46.840", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-101xx/CVE-2016-10174.json b/CVE-2016/CVE-2016-101xx/CVE-2016-10174.json index f2d2b4a36be..8438e006387 100644 --- a/CVE-2016/CVE-2016-101xx/CVE-2016-10174.json +++ b/CVE-2016/CVE-2016-101xx/CVE-2016-10174.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-01-30T04:59:00.157", "lastModified": "2024-11-21T02:43:28.730", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-10xx/CVE-2016-1010.json b/CVE-2016/CVE-2016-10xx/CVE-2016-1010.json index 45fc34a6852..9ff30c0d4fb 100644 --- a/CVE-2016/CVE-2016-10xx/CVE-2016-1010.json +++ b/CVE-2016/CVE-2016-10xx/CVE-2016-1010.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2016-03-12T15:59:25.090", "lastModified": "2024-11-21T02:45:35.210", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-10xx/CVE-2016-1019.json b/CVE-2016/CVE-2016-10xx/CVE-2016-1019.json index 9b8077ced00..3ddb6fbb85b 100644 --- a/CVE-2016/CVE-2016-10xx/CVE-2016-1019.json +++ b/CVE-2016/CVE-2016-10xx/CVE-2016-1019.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2016-04-07T10:59:01.447", "lastModified": "2024-11-21T02:45:36.547", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-110xx/CVE-2016-11021.json b/CVE-2016/CVE-2016-110xx/CVE-2016-11021.json index 014d30f7335..b53413c0112 100644 --- a/CVE-2016/CVE-2016-110xx/CVE-2016-11021.json +++ b/CVE-2016/CVE-2016-110xx/CVE-2016-11021.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-03-09T01:15:10.780", "lastModified": "2024-11-21T02:45:19.083", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-15xx/CVE-2016-1555.json b/CVE-2016/CVE-2016-15xx/CVE-2016-1555.json index 670831bfd60..0e9346895c9 100644 --- a/CVE-2016/CVE-2016-15xx/CVE-2016-1555.json +++ b/CVE-2016/CVE-2016-15xx/CVE-2016-1555.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cret@cert.org", "published": "2017-04-21T15:59:00.333", "lastModified": "2024-11-21T02:46:37.843", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-118xx/CVE-2018-11816.json b/CVE-2018/CVE-2018-118xx/CVE-2018-11816.json index 8b291ac37c3..e7ca7cad503 100644 --- a/CVE-2018/CVE-2018-118xx/CVE-2018-11816.json +++ b/CVE-2018/CVE-2018-118xx/CVE-2018-11816.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-26T14:15:17.723", "lastModified": "2024-11-26T14:15:17.723", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-43xx/CVE-2018-4301.json b/CVE-2018/CVE-2018-43xx/CVE-2018-4301.json index fb896bbd216..d0ced679e6e 100644 --- a/CVE-2018/CVE-2018-43xx/CVE-2018-4301.json +++ b/CVE-2018/CVE-2018-43xx/CVE-2018-4301.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-08T00:15:24.030", "lastModified": "2025-01-08T18:15:12.493", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-18xx/CVE-2020-1820.json b/CVE-2020/CVE-2020-18xx/CVE-2020-1820.json index 45dc7cf36b3..cf2c958f282 100644 --- a/CVE-2020/CVE-2020-18xx/CVE-2020-1820.json +++ b/CVE-2020/CVE-2020-18xx/CVE-2020-1820.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:17.230", "lastModified": "2024-12-28T07:15:17.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-18xx/CVE-2020-1821.json b/CVE-2020/CVE-2020-18xx/CVE-2020-1821.json index 48ca692e3a5..d606189cf49 100644 --- a/CVE-2020/CVE-2020-18xx/CVE-2020-1821.json +++ b/CVE-2020/CVE-2020-18xx/CVE-2020-1821.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:17.973", "lastModified": "2024-12-28T07:15:17.973", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-18xx/CVE-2020-1822.json b/CVE-2020/CVE-2020-18xx/CVE-2020-1822.json index 12a80938192..571abe5e733 100644 --- a/CVE-2020/CVE-2020-18xx/CVE-2020-1822.json +++ b/CVE-2020/CVE-2020-18xx/CVE-2020-1822.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:18.170", "lastModified": "2024-12-28T07:15:18.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-18xx/CVE-2020-1823.json b/CVE-2020/CVE-2020-18xx/CVE-2020-1823.json index 1060db091c8..1ccf3a3f475 100644 --- a/CVE-2020/CVE-2020-18xx/CVE-2020-1823.json +++ b/CVE-2020/CVE-2020-18xx/CVE-2020-1823.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:18.357", "lastModified": "2024-12-28T07:15:18.357", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-18xx/CVE-2020-1824.json b/CVE-2020/CVE-2020-18xx/CVE-2020-1824.json index 88c61832759..c0560a4c069 100644 --- a/CVE-2020/CVE-2020-18xx/CVE-2020-1824.json +++ b/CVE-2020/CVE-2020-18xx/CVE-2020-1824.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:18.530", "lastModified": "2024-12-28T07:15:18.530", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-90xx/CVE-2020-9082.json b/CVE-2020/CVE-2020-90xx/CVE-2020-9082.json index 0bb3fdf3880..cf1dc1646d9 100644 --- a/CVE-2020/CVE-2020-90xx/CVE-2020-9082.json +++ b/CVE-2020/CVE-2020-90xx/CVE-2020-9082.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-27T10:15:11.687", "lastModified": "2024-12-27T10:15:11.687", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-90xx/CVE-2020-9085.json b/CVE-2020/CVE-2020-90xx/CVE-2020-9085.json index d202190b2d2..95a338dae88 100644 --- a/CVE-2020/CVE-2020-90xx/CVE-2020-9085.json +++ b/CVE-2020/CVE-2020-90xx/CVE-2020-9085.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-27T10:15:12.217", "lastModified": "2024-12-27T10:15:12.217", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-90xx/CVE-2020-9086.json b/CVE-2020/CVE-2020-90xx/CVE-2020-9086.json index 959f1665e02..8a1d105f6b6 100644 --- a/CVE-2020/CVE-2020-90xx/CVE-2020-9086.json +++ b/CVE-2020/CVE-2020-90xx/CVE-2020-9086.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-27T10:15:12.800", "lastModified": "2024-12-27T10:15:12.800", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-90xx/CVE-2020-9089.json b/CVE-2020/CVE-2020-90xx/CVE-2020-9089.json index b38c37cb9db..e0c7ff78846 100644 --- a/CVE-2020/CVE-2020-90xx/CVE-2020-9089.json +++ b/CVE-2020/CVE-2020-90xx/CVE-2020-9089.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-27T10:15:13.487", "lastModified": "2024-12-27T10:15:13.487", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-92xx/CVE-2020-9210.json b/CVE-2020/CVE-2020-92xx/CVE-2020-9210.json index 25f30ff92b0..0678b075eb4 100644 --- a/CVE-2020/CVE-2020-92xx/CVE-2020-9210.json +++ b/CVE-2020/CVE-2020-92xx/CVE-2020-9210.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-27T10:15:14.037", "lastModified": "2024-12-27T10:15:14.037", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-92xx/CVE-2020-9211.json b/CVE-2020/CVE-2020-92xx/CVE-2020-9211.json index 744a6c9a1a2..b441eff9dc0 100644 --- a/CVE-2020/CVE-2020-92xx/CVE-2020-9211.json +++ b/CVE-2020/CVE-2020-92xx/CVE-2020-9211.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-27T10:15:14.620", "lastModified": "2024-12-27T10:15:14.620", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-92xx/CVE-2020-9222.json b/CVE-2020/CVE-2020-92xx/CVE-2020-9222.json index 598221dffd1..6dad478be51 100644 --- a/CVE-2020/CVE-2020-92xx/CVE-2020-9222.json +++ b/CVE-2020/CVE-2020-92xx/CVE-2020-9222.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-27T10:15:15.270", "lastModified": "2024-12-27T10:15:15.270", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-92xx/CVE-2020-9236.json b/CVE-2020/CVE-2020-92xx/CVE-2020-9236.json index d8aa1f98120..1d073097417 100644 --- a/CVE-2020/CVE-2020-92xx/CVE-2020-9236.json +++ b/CVE-2020/CVE-2020-92xx/CVE-2020-9236.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-27T10:15:15.930", "lastModified": "2024-12-27T10:15:15.930", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-92xx/CVE-2020-9253.json b/CVE-2020/CVE-2020-92xx/CVE-2020-9253.json index e4fee284bb4..58934bdd808 100644 --- a/CVE-2020/CVE-2020-92xx/CVE-2020-9253.json +++ b/CVE-2020/CVE-2020-92xx/CVE-2020-9253.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-27T10:15:16.610", "lastModified": "2024-12-27T10:15:16.610", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-204xx/CVE-2021-20455.json b/CVE-2021/CVE-2021-204xx/CVE-2021-20455.json index 84afc0d7e3a..27f6fced7f6 100644 --- a/CVE-2021/CVE-2021-204xx/CVE-2021-20455.json +++ b/CVE-2021/CVE-2021-204xx/CVE-2021-20455.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T16:15:27.430", "lastModified": "2025-01-07T16:15:27.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Cognos Controller 11.0.0 through 11.0.1 and IBM Controller 11.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system." + }, + { + "lang": "es", + "value": "IBM Cognos Controller 11.0.0 a 11.0.1 e IBM Controller 11.1.0 podr\u00edan permitir que un atacante remoto obtenga informaci\u00f3n confidencial cuando se devuelve un mensaje de error t\u00e9cnico detallado en el navegador. Esta informaci\u00f3n podr\u00eda utilizarse en futuros ataques contra el sistema." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-272xx/CVE-2021-27285.json b/CVE-2021/CVE-2021-272xx/CVE-2021-27285.json index 495ed898d44..800366569ae 100644 --- a/CVE-2021/CVE-2021-272xx/CVE-2021-27285.json +++ b/CVE-2021/CVE-2021-272xx/CVE-2021-27285.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:07.590", "lastModified": "2025-01-07T17:15:09.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-296xx/CVE-2021-29669.json b/CVE-2021/CVE-2021-296xx/CVE-2021-29669.json new file mode 100644 index 00000000000..992789eb57a --- /dev/null +++ b/CVE-2021/CVE-2021-296xx/CVE-2021-29669.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2021-29669", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-12T02:15:18.750", + "lastModified": "2025-01-12T02:15:18.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Jazz Foundation 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7180689", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-319xx/CVE-2021-31982.json b/CVE-2021/CVE-2021-319xx/CVE-2021-31982.json index ce91c0b285d..b08c464a676 100644 --- a/CVE-2021/CVE-2021-319xx/CVE-2021-31982.json +++ b/CVE-2021/CVE-2021-319xx/CVE-2021-31982.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2021/CVE-2021-345xx/CVE-2021-34506.json b/CVE-2021/CVE-2021-345xx/CVE-2021-34506.json index 128ad271217..8e23c9a6629 100644 --- a/CVE-2021/CVE-2021-345xx/CVE-2021-34506.json +++ b/CVE-2021/CVE-2021-345xx/CVE-2021-34506.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47082.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47082.json index 350ffb8d305..e0e5cbc870b 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47082.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47082.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T18:15:07.120", "lastModified": "2024-11-21T06:35:21.873", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47083.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47083.json index 7ce5ae3e6d0..5bc59a4508f 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47083.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47083.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T18:15:07.193", "lastModified": "2024-11-21T06:35:22.000", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47086.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47086.json index 6e28f0a2dea..b5ab4f8704f 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47086.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47086.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T18:15:07.393", "lastModified": "2024-11-21T06:35:22.150", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47087.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47087.json index c9c50b50a3a..9e29f22d384 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47087.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47087.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T18:15:07.457", "lastModified": "2024-11-21T06:35:22.267", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47088.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47088.json index d93e67a1dbe..acac263bb99 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47088.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47088.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T18:15:07.510", "lastModified": "2024-11-21T06:35:22.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47106.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47106.json index bbf2375a84b..03d972dbe77 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47106.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47106.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T19:15:18.750", "lastModified": "2024-11-21T06:35:24.633", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47123.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47123.json index b09837ac703..d97825e0e4f 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47123.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47123.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:07.217", "lastModified": "2024-11-21T06:35:26.560", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47204.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47204.json index 106a8ff1c2b..23bc4511748 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47204.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47204.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.270", "lastModified": "2024-11-21T06:35:37.460", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47341.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47341.json index 2ef165f91e6..fd1fa6428a7 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47341.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47341.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:20.850", "lastModified": "2024-11-21T06:35:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47402.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47402.json index a8c47885b05..11fcfb66938 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47402.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47402.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:25.690", "lastModified": "2024-11-21T06:36:04.283", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47459.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47459.json index 6bbda868c9c..214a95b0e35 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47459.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47459.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-22T07:15:10.863", "lastModified": "2024-11-21T06:36:11.650", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47470.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47470.json index cd693b63a23..259ae71e028 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47470.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47470.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-22T07:15:11.763", "lastModified": "2024-11-21T06:36:14.467", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21979.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21979.json index 5313529320d..b3dae13bebf 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21979.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21979.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21980.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21980.json index 85e009a99ab..475466bc50f 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21980.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21980.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22035.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22035.json index e5f3e43f839..5457afdfed1 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22035.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22035.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-223xx/CVE-2022-22363.json b/CVE-2022/CVE-2022-223xx/CVE-2022-22363.json index 36b38f45563..11ebec1ce41 100644 --- a/CVE-2022/CVE-2022-223xx/CVE-2022-22363.json +++ b/CVE-2022/CVE-2022-223xx/CVE-2022-22363.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T16:15:28.050", "lastModified": "2025-01-07T16:15:28.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Cognos Controller 11.0.0 through 11.0.1 and IBM Controller 11.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system." + }, + { + "lang": "es", + "value": "IBM Cognos Controller 11.0.0 a 11.0.1 e IBM Controller 11.1.0 podr\u00edan permitir que un atacante remoto obtenga informaci\u00f3n confidencial cuando se devuelve un mensaje de error t\u00e9cnico detallado en el navegador. Esta informaci\u00f3n podr\u00eda utilizarse en futuros ataques contra el sistema." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-224xx/CVE-2022-22491.json b/CVE-2022/CVE-2022-224xx/CVE-2022-22491.json index 3b5e43b12e5..c34912b1e74 100644 --- a/CVE-2022/CVE-2022-224xx/CVE-2022-22491.json +++ b/CVE-2022/CVE-2022-224xx/CVE-2022-22491.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-09T14:15:25.927", "lastModified": "2025-01-09T15:15:09.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM App Connect Enterprise Certified Container\u00a07.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, and 12.4 operands running in Red Hat OpenShift do not restrict writing to the local filesystem, which may result in exhausting the available storage in a Pod, resulting in that Pod being restarted." + }, + { + "lang": "es", + "value": "Los operandos de IBM App Connect Enterprise Certified Container 7.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3 y 12.4 que se ejecutan en Red Hat OpenShift no restringen la escritura en el sistema de archivos local, lo que puede provocar que se agote el almacenamiento disponible en un pod, lo que hace que ese pod se reinicie." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-232xx/CVE-2022-23264.json b/CVE-2022/CVE-2022-232xx/CVE-2022-23264.json index ea0262369f1..0d5ba9ad937 100644 --- a/CVE-2022/CVE-2022-232xx/CVE-2022-23264.json +++ b/CVE-2022/CVE-2022-232xx/CVE-2022-23264.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", diff --git a/CVE-2022/CVE-2022-244xx/CVE-2022-24477.json b/CVE-2022/CVE-2022-244xx/CVE-2022-24477.json index a53eec53596..75bda172d18 100644 --- a/CVE-2022/CVE-2022-244xx/CVE-2022-24477.json +++ b/CVE-2022/CVE-2022-244xx/CVE-2022-24477.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-244xx/CVE-2022-24480.json b/CVE-2022/CVE-2022-244xx/CVE-2022-24480.json index 451ceb5ff71..e6609bea61b 100644 --- a/CVE-2022/CVE-2022-244xx/CVE-2022-24480.json +++ b/CVE-2022/CVE-2022-244xx/CVE-2022-24480.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-245xx/CVE-2022-24504.json b/CVE-2022/CVE-2022-245xx/CVE-2022-24504.json index 7576ca76d85..6d5bb6c378d 100644 --- a/CVE-2022/CVE-2022-245xx/CVE-2022-24504.json +++ b/CVE-2022/CVE-2022-245xx/CVE-2022-24504.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-245xx/CVE-2022-24516.json b/CVE-2022/CVE-2022-245xx/CVE-2022-24516.json index 5f18ebbbe88..18e12e4bb89 100644 --- a/CVE-2022/CVE-2022-245xx/CVE-2022-24516.json +++ b/CVE-2022/CVE-2022-245xx/CVE-2022-24516.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-268xx/CVE-2022-26804.json b/CVE-2022/CVE-2022-268xx/CVE-2022-26804.json index a907ddc794b..8317160c48a 100644 --- a/CVE-2022/CVE-2022-268xx/CVE-2022-26804.json +++ b/CVE-2022/CVE-2022-268xx/CVE-2022-26804.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-268xx/CVE-2022-26805.json b/CVE-2022/CVE-2022-268xx/CVE-2022-26805.json index b167ca47d70..42980658881 100644 --- a/CVE-2022/CVE-2022-268xx/CVE-2022-26805.json +++ b/CVE-2022/CVE-2022-268xx/CVE-2022-26805.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-268xx/CVE-2022-26806.json b/CVE-2022/CVE-2022-268xx/CVE-2022-26806.json index cdbc95cdefa..480fcaab958 100644 --- a/CVE-2022/CVE-2022-268xx/CVE-2022-26806.json +++ b/CVE-2022/CVE-2022-268xx/CVE-2022-26806.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26928.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26928.json index e1e75870e21..c61c081a193 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26928.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26928.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26929.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26929.json index c760f546038..3738ae56c89 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26929.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26929.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29144.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29144.json index 64f11fd5078..914afbe045c 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29144.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29144.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29147.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29147.json index 6ee3d26aa55..ffce0bf51c9 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29147.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29147.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30133.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30133.json index 1bfcab731d1..923f7b8817e 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30133.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30133.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30134.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30134.json index cbcb5aa6fa0..26023734c9d 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30134.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30134.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30144.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30144.json index ca5a9555c62..126fee50569 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30144.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30144.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30170.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30170.json index 17a88f9957d..f76a8a2b63d 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30170.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30170.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30175.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30175.json index 9a333a5538f..a6b7631e7d9 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30175.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30175.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30176.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30176.json index 60897d050c5..5a1858ed24f 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30176.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30176.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30194.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30194.json index 3093926c80b..37da83b8f05 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30194.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30194.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30196.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30196.json index 2c850880a86..ac9826f502e 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30196.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30196.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30197.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30197.json index 99dc0ef14ed..5188a46843b 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30197.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30197.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30198.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30198.json index 633ba95f145..6df927523ce 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30198.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30198.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-302xx/CVE-2022-30200.json b/CVE-2022/CVE-2022-302xx/CVE-2022-30200.json index 2bd1b47f1a8..8b52c887940 100644 --- a/CVE-2022/CVE-2022-302xx/CVE-2022-30200.json +++ b/CVE-2022/CVE-2022-302xx/CVE-2022-30200.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33631.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33631.json index f3f07d20b1f..3902fddb130 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33631.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33631.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33634.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33634.json index 59f220fb5b3..40dca2a16c9 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33634.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33634.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33635.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33635.json index 6ae7643ecbf..4bfa989b478 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33635.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33635.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33636.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33636.json index d801a283f28..1b2c50f03f3 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33636.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33636.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33640.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33640.json index c74f6296048..8b6e38c6ec1 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33640.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33640.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33645.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33645.json index 411de351238..ac00b135e0d 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33645.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33645.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33646.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33646.json index f4d431a98fe..7e99376410b 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33646.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33646.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33647.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33647.json index d1c2fc6c7bb..3bfe922c4a5 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33647.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33647.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33648.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33648.json index 3f494288769..59b30c58cef 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33648.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33648.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33649.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33649.json index 278d9bcea74..9c747a8d9b4 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33649.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33649.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33670.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33670.json index c8a0695ba8a..206ba99d8d6 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33670.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33670.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33679.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33679.json index 6568db119d8..f6468e0615e 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33679.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33679.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-343xx/CVE-2022-34357.json b/CVE-2022/CVE-2022-343xx/CVE-2022-34357.json index 7f142f15b8e..65806132036 100644 --- a/CVE-2022/CVE-2022-343xx/CVE-2022-34357.json +++ b/CVE-2022/CVE-2022-343xx/CVE-2022-34357.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34685.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34685.json index 867db44eb63..9bc188fc733 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34685.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34685.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34686.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34686.json index ea1c4ad3340..76dc50b5b01 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34686.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34686.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34687.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34687.json index 2e08c931c63..b0c3b69e144 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34687.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34687.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34689.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34689.json index 2d3cdb80249..ccd75b1e00a 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34689.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34689.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34690.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34690.json index 42fb6994bc4..90625c95bc5 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34690.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34690.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34691.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34691.json index 62fb2bc499e..af85fffbc2d 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34691.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34691.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34692.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34692.json index d10ef5b0435..f3186a8699c 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34692.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34692.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34696.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34696.json index 9d18c64b696..9337251a65a 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34696.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34696.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34699.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34699.json index 9a06c8d4883..f4066f1c8c3 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34699.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34699.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34700.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34700.json index 6d4b0d1708e..3afb3ef958f 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34700.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34700.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34701.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34701.json index d84e8f7b33a..5581014cc61 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34701.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34701.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34702.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34702.json index b77f758bb5c..3a072bcf341 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34702.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34702.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34703.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34703.json index 9b5c42c1ccb..1591ea6dde9 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34703.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34703.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34704.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34704.json index c5c80a7aba7..efbf4381ffb 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34704.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34704.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34705.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34705.json index 4d531c627ba..62e9ff1d7f8 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34705.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34705.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34706.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34706.json index 6b67b66436f..b73624632f1 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34706.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34706.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34707.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34707.json index 946dd526166..921ef6ad486 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34707.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34707.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34708.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34708.json index c84073523ee..b8526a8abe3 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34708.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34708.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34709.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34709.json index bd6668845b2..4dfe6badebc 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34709.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34709.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34710.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34710.json index aa8a06c9934..463bdb78e24 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34710.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34710.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34711.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34711.json index bbeb1ff9c3d..1cf5b757dbd 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34711.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34711.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34712.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34712.json index 2a72c3b2015..41578bde9b0 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34712.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34712.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34713.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34713.json index 4cca8d8359f..8264f037fa7 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34713.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34713.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34714.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34714.json index f19ae52665f..4ab42aa5cf6 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34714.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34714.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34715.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34715.json index b120c78b224..dfc11131354 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34715.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34715.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34716.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34716.json index 605fbd2ba1a..429bac8fc97 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34716.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34716.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34717.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34717.json index 33a089f9d81..7164aa6f9f6 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34717.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34717.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34718.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34718.json index cbf4d787d72..76204c2e02e 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34718.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34718.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34719.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34719.json index 3b101e9d794..6d4eed699bb 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34719.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34719.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34720.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34720.json index 281d97f47a1..e7849c9bef0 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34720.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34720.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34721.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34721.json index cf9823e7b81..a1d9654cd82 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34721.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34721.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34722.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34722.json index 6bcf02c2303..0f89cef0032 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34722.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34722.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34723.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34723.json index c34b64249c1..2e29762f0b1 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34723.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34723.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34724.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34724.json index 5d1b19d2875..bb21a97f04a 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34724.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34724.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34725.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34725.json index 129eccee0fa..f4c7404ced8 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34725.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34725.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34726.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34726.json index e07bfde8e79..1986856cd2e 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34726.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34726.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34727.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34727.json index 47c1c6514c6..6d057b7268c 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34727.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34727.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34728.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34728.json index 46f5f47fb3c..527bfcfcc1a 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34728.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34728.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34729.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34729.json index e88235848f1..ab59850643e 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34729.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34729.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34730.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34730.json index 39410b05e1a..2a96e6134a8 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34730.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34730.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34731.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34731.json index 27785a5ed63..443c98b6be7 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34731.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34731.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34732.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34732.json index fecf3256971..4a797304652 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34732.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34732.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34733.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34733.json index 816c0f0d3fb..8ae85031fd1 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34733.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34733.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34734.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34734.json index 5f39eee29c2..7f8e658f302 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34734.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34734.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35742.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35742.json index aea2f5974ab..b246a2b3357 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35742.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35742.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35743.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35743.json index ac2ddbda775..7b405a7adcd 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35743.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35743.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35744.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35744.json index ae51876eecc..13f09603315 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35744.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35744.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35745.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35745.json index bac9ea521ae..acf4feb3764 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35745.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35745.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35746.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35746.json index fab99db692c..05974b3ea1d 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35746.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35746.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35747.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35747.json index 25230df3d1a..1b55d7b64b6 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35747.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35747.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35748.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35748.json index 51f5b85d16b..1ced6f3502f 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35748.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35748.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35749.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35749.json index bbc63626e88..a4a6959f4c3 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35749.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35749.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35750.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35750.json index fd00f656a0f..53f361036fb 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35750.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35750.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35751.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35751.json index 9e9d3f80c93..fd31fd0a7be 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35751.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35751.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35752.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35752.json index 748024ad9f1..df47be0829d 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35752.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35752.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35753.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35753.json index 41233ca507f..e3de5815afe 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35753.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35753.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35754.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35754.json index ee9bf74c27b..0033e2ada00 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35754.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35754.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35755.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35755.json index 9330c701802..b8f666314b7 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35755.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35755.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35756.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35756.json index f5ab1b03f4a..2a207c07a1c 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35756.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35756.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35757.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35757.json index 0a414f0e131..73083381df1 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35757.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35757.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35758.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35758.json index 24b973edfb1..c965cc2bc3c 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35758.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35758.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35759.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35759.json index 940ef38d8fb..35e3d57e0e5 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35759.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35759.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35760.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35760.json index c9c6c76389d..6e5634c8b25 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35760.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35760.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35761.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35761.json index 814217ebcd8..607a8fddaf8 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35761.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35761.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35762.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35762.json index a43d02b8ca3..8d40c774dba 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35762.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35762.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35763.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35763.json index 8c426c43432..68836e0f4bb 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35763.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35763.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35764.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35764.json index d9f3ad0db5b..20d65a2e546 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35764.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35764.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35765.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35765.json index 311056b39b4..bde2de181b1 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35765.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35765.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35766.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35766.json index 8c28c91ee85..c49b9d9c213 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35766.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35766.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35767.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35767.json index 9d606a80c1d..f253b22d3f2 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35767.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35767.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35768.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35768.json index 9d7a4142b1c..ab9d96a7eb2 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35768.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35768.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35769.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35769.json index f97ae16ed7f..8220c3602a9 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35769.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35769.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35770.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35770.json index 25bec044716..93a87e92ae6 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35770.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35770.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35771.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35771.json index d3c5b3e2712..0cd2ef44e3b 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35771.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35771.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35772.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35772.json index 9fb36907796..ee1c9d3d876 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35772.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35772.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35773.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35773.json index 080cd3a2ea9..b2477fa86e8 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35773.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35773.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35774.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35774.json index 722ea2d0ce1..da9ac8f8f78 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35774.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35774.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35775.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35775.json index 6ac374a8061..b749be437df 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35775.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35775.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35776.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35776.json index 6058f564585..fe8eddb1375 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35776.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35776.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35777.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35777.json index 2c52d6d196e..6cd1e91a836 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35777.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35777.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35779.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35779.json index cc39f652406..273385e1677 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35779.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35779.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35780.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35780.json index c68d67b8ec6..4a0f82cc0bc 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35780.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35780.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35781.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35781.json index 508dc1cba93..85cc16cae04 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35781.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35781.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35782.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35782.json index ac8c71a7b9d..47c6affcd90 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35782.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35782.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35783.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35783.json index cdca5618a65..e53d94883ff 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35783.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35783.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35784.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35784.json index bb41738cece..4185628b471 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35784.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35784.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35785.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35785.json index be777e2f3df..f9c3d0bf6fb 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35785.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35785.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35786.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35786.json index f95e4febc0e..a252bb2becb 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35786.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35786.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35787.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35787.json index e413b904f37..5c8c6aae133 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35787.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35787.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35788.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35788.json index 49728ec085d..7ae7d28433c 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35788.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35788.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35789.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35789.json index 1c65f5f06e1..d3873dba1ac 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35789.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35789.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35790.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35790.json index 4a129962aa7..bc0ab471dc0 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35790.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35790.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35791.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35791.json index 4842e48615e..bec7aacb9f7 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35791.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35791.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35792.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35792.json index 7d0c878d11b..c36e178420b 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35792.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35792.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35793.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35793.json index d2995f6eb18..2cc932cc745 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35793.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35793.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35794.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35794.json index 9bc517aa95d..3d1b3c87681 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35794.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35794.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35795.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35795.json index 3ea92863184..930e994db45 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35795.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35795.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35796.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35796.json index aab91ca71b9..d92382a4ab4 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35796.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35796.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35797.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35797.json index 3197d70fa8d..6a9dc1ca53a 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35797.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35797.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35798.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35798.json index 1863fc60c85..55b9447725c 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35798.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35798.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2022/CVE-2022-357xx/CVE-2022-35799.json b/CVE-2022/CVE-2022-357xx/CVE-2022-35799.json index 9265d0e4c4e..6feb9f27481 100644 --- a/CVE-2022/CVE-2022-357xx/CVE-2022-35799.json +++ b/CVE-2022/CVE-2022-357xx/CVE-2022-35799.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35800.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35800.json index d07270c6675..a83e84d0c42 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35800.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35800.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35801.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35801.json index 96a3742db86..eb80d3d3a3b 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35801.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35801.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35802.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35802.json index 6ff7d2a3c4f..f68e235e57b 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35802.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35802.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35803.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35803.json index 1d7d27ff13b..27786f379ce 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35803.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35803.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35804.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35804.json index 28cabbad3d2..58e45eb62da 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35804.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35804.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35805.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35805.json index 0f3494fa7bb..8b3076cc389 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35805.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35805.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35806.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35806.json index 962473a9226..43077c7e995 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35806.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35806.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35807.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35807.json index 70dd26e523a..cfd1af3237c 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35807.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35807.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35808.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35808.json index 992bc8f36d3..66de6574731 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35808.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35808.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35809.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35809.json index 7d8f8bf3886..0e3acb46f88 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35809.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35809.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35810.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35810.json index 7664cc540e4..56f282097f3 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35810.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35810.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35811.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35811.json index 539cdc3372b..ab982d2adf1 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35811.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35811.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35812.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35812.json index b4f94d40191..ebb251fd960 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35812.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35812.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35813.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35813.json index 2cc975a4203..a2984ecafa3 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35813.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35813.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35814.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35814.json index 7c161c002f2..5cc46581782 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35814.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35814.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35815.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35815.json index 6f8407063f4..b4f0df57a44 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35815.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35815.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35816.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35816.json index 0bd45ef557b..ae57ebb6cff 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35816.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35816.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35817.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35817.json index e91b0f6d945..6d4fc7ecfc2 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35817.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35817.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35818.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35818.json index 6b5f7bb8389..69ce716799a 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35818.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35818.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35819.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35819.json index cdcd3ba3995..b88d55895de 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35819.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35819.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35820.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35820.json index 864ff145214..9e3726d8bd0 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35820.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35820.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35821.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35821.json index ba2f0d959db..acc8dcf999e 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35821.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35821.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35822.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35822.json index 7e092dd20b1..aa545d3bcb9 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35822.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35822.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35823.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35823.json index f9996683864..ea2f404d03e 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35823.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35823.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35824.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35824.json index 4f9de77c3be..91e553396a5 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35824.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35824.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35825.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35825.json index 3623d1ab532..849a494e7c1 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35825.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35825.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35826.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35826.json index b64e0e71042..74604f62e6e 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35826.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35826.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35827.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35827.json index 85738c09145..e9f4406cfd1 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35827.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35827.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35828.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35828.json index 3005320feca..33b35b29270 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35828.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35828.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35830.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35830.json index 7d324dade68..fb95036c1ad 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35830.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35830.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35831.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35831.json index 44af69de903..9371b6659bb 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35831.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35831.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35832.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35832.json index c73014cb133..d4e8dc5b5fe 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35832.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35832.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35833.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35833.json index c8f25a9d6de..81c53ccaeda 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35833.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35833.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35834.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35834.json index cf9bb73dcfa..e8b8917779a 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35834.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35834.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35835.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35835.json index 8f6a36b250a..7b6d85aa7e1 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35835.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35835.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35836.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35836.json index 14423b24ed4..dbf2b332701 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35836.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35836.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35837.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35837.json index 19907cb80c7..7ebe105696e 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35837.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35837.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35838.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35838.json index c2c71cdc4eb..10675ebce9a 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35838.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35838.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35840.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35840.json index ee4b49c4b19..9ce1145b115 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35840.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35840.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35841.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35841.json index 9780bafd3bc..899119255a0 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35841.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35841.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37954.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37954.json index ee43bd02e36..daace5c8d16 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37954.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37954.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37955.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37955.json index 149c2dcc01d..348986f8710 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37955.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37955.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37956.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37956.json index 3ae5be43bec..d2c2a33a41a 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37956.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37956.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37957.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37957.json index bf066348181..f5a7a511570 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37957.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37957.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37958.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37958.json index 729b5f46290..9b3fd6318ee 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37958.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37958.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37959.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37959.json index 8e72bec9809..10a0493887e 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37959.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37959.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37961.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37961.json index cd272de0ac1..750db119a7a 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37961.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37961.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37962.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37962.json index 28a615b77b4..c9c3841dcca 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37962.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37962.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37963.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37963.json index 009f3860754..ba7b45a04f6 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37963.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37963.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37964.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37964.json index 0f8bfa939fb..8c8750cf7f1 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37964.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37964.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37965.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37965.json index 9afbf7ca6f1..d878bd65b7b 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37965.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37965.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37966.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37966.json index b8276a9d9b9..d60dd9191dc 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37966.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37966.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37967.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37967.json index ea6f8f19b38..a9de5e5f662 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37967.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37967.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37968.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37968.json index 0ab8421c060..d0c5a42f216 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37968.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37968.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37969.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37969.json index d1aad50bbd4..ecb8cc4f19f 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37969.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37969.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37970.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37970.json index d28a29ad1b7..40af9bb206a 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37970.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37970.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37971.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37971.json index e78a1fb7652..7ca201fdcac 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37971.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37971.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37972.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37972.json index 413dee81104..5ec9572bb4a 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37972.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37972.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37974.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37974.json index ccf89d6b1be..56b64b1c552 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37974.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37974.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37975.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37975.json index ca8b6c38f5c..b101e0e0383 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37975.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37975.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37976.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37976.json index f850ca03888..02dc65227ba 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37976.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37976.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37977.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37977.json index e97427da013..52f2fd76ebd 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37977.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37977.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37978.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37978.json index 1b958845388..89454a1fb0e 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37978.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37978.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37979.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37979.json index 60cda6e6af2..74a6165ebd1 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37979.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37979.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37980.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37980.json index d6f95f805fa..1c6533cd787 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37980.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37980.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37981.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37981.json index 4a9019ed2f2..0331745d0f7 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37981.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37981.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37982.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37982.json index 2882bc1e138..b3e2658e54b 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37982.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37982.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37983.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37983.json index 271dcff5792..4eeca902865 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37983.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37983.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37984.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37984.json index 856e0d4357f..eacd780b64c 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37984.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37984.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37985.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37985.json index 326089a38f5..ea26df5b87b 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37985.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37985.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37987.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37987.json index 4ca1e00ec81..b2222c6b9fd 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37987.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37987.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37988.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37988.json index 51bae7c2620..85bc9cec785 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37988.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37988.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37989.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37989.json index 829aa879feb..8b1c6c0a735 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37989.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37989.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37990.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37990.json index cc34c2e834e..4409e242b67 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37990.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37990.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37991.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37991.json index 500bbb5957c..ce468b46493 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37991.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37991.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37992.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37992.json index e6741150cfb..d8e843ecc02 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37992.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37992.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37993.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37993.json index bbe10ff5014..d8aa3e8e194 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37993.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37993.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37994.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37994.json index cc6032c88ab..84e830a7d0a 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37994.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37994.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37995.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37995.json index 376e03f33ce..dbcdeac951e 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37995.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37995.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37996.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37996.json index 867263d497b..c0943dc5611 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37996.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37996.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37997.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37997.json index 073ce8ee0b7..fb38b0183cc 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37997.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37997.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37999.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37999.json index 87c83f41927..11b84769b8e 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37999.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37999.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38000.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38000.json index 55377865481..47846c5cca5 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38000.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38000.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38001.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38001.json index b84c935471c..daa6b18beee 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38001.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38001.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38003.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38003.json index f494f54c64e..78d668e6abd 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38003.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38003.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38004.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38004.json index 7036bcf5261..3be2676e960 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38004.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38004.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38005.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38005.json index 12c6116d909..6b0f5ab33fa 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38005.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38005.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38006.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38006.json index c199e8150e4..8918b159209 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38006.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38006.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38007.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38007.json index 497e6b390a0..ddf41affd2a 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38007.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38007.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38008.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38008.json index ff652fbbdb5..2b1df09b688 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38008.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38008.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38009.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38009.json index 104daa5042c..cc88338e668 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38009.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38009.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38010.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38010.json index 6c48357898a..af41a0605de 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38010.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38010.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38011.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38011.json index c9c42ddccb9..cc2d3bad6b2 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38011.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38011.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38012.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38012.json index 7f5c684c0c7..a5474976dde 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38012.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38012.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38013.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38013.json index 767845f4e77..159deaadf68 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38013.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38013.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38014.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38014.json index 3912ae24418..39507a534a3 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38014.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38014.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38015.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38015.json index 40d90c13629..acca845f40f 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38015.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38015.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38016.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38016.json index d1d3c37970c..96aeeb33470 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38016.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38016.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38017.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38017.json index 31632140bfb..b051d505ff4 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38017.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38017.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38019.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38019.json index 716a0fcfe32..79a12aa5423 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38019.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38019.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38020.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38020.json index f98ac597f85..9a5aba16817 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38020.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38020.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38021.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38021.json index 0f2e7118360..f8ca734cb1f 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38021.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38021.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38022.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38022.json index 05ff826c911..e2bd1d81dfc 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38022.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38022.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38023.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38023.json index b3ed2735d10..7a7daa02ae2 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38023.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38023.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38025.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38025.json index 5ef30268e09..80a94be712e 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38025.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38025.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38026.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38026.json index c0c4ea5b268..fac4eb3fe59 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38026.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38026.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38027.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38027.json index 526f44a1332..9ef828e1719 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38027.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38027.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38028.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38028.json index bc5bb96da17..36eb1ca6e4a 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38028.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38028.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38029.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38029.json index 2e0b3a57b6a..5b939a422a2 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38029.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38029.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38030.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38030.json index 4caff0d1e96..ff70791cf07 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38030.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38030.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38031.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38031.json index c7180c6c224..a3bce09c930 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38031.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38031.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38032.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38032.json index c1db722aec9..17cdea773b9 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38032.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38032.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38033.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38033.json index 0869b63bb0c..b384dbd2200 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38033.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38033.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38034.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38034.json index d47342e23cc..8ec4d48261f 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38034.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38034.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38036.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38036.json index f534716fa9b..44a53d774e6 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38036.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38036.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38037.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38037.json index a67291ff567..898be861ece 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38037.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38037.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38038.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38038.json index 8d67abbace5..e41c4491db7 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38038.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38038.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38039.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38039.json index 74cb22bff29..93f5e255231 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38039.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38039.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38040.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38040.json index d25272ec9a1..8646ca5de1a 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38040.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38040.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38041.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38041.json index f78364d044e..09b3519ee57 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38041.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38041.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38044.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38044.json index 49c5fc69d1e..95afcb20fa6 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38044.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38044.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38046.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38046.json index 5351d7b1691..4363a90fa32 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38046.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38046.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38047.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38047.json index df108dc5b42..054a4c098fa 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38047.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38047.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38048.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38048.json index a5ac3735a45..b220ec08ed6 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38048.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38048.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38049.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38049.json index 3b84ffee727..eca64e8ef20 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38049.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38049.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38050.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38050.json index 8140b32f762..f46e85c1042 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38050.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38050.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38051.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38051.json index 3a78bda574b..0fd89cdf913 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38051.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38051.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38053.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38053.json index 4938a68844c..e3771f5d0e3 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38053.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38053.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41031.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41031.json index ddd31c2eaa4..4e94a10f270 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41031.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41031.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41033.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41033.json index 0dbe3c6441d..a4da8d08295 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41033.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41033.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41034.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41034.json index 0970abfd796..d42ac099b60 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41034.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41034.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41035.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41035.json index e93e9404a3f..ea22dae65a4 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41035.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41035.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41036.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41036.json index faf3cf3bb66..879ea017186 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41036.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41036.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41037.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41037.json index 91d161a5b1d..278a02c4bc0 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41037.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41037.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41038.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41038.json index 7477e473392..f47ea1408ce 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41038.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41038.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41039.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41039.json index 78ca1608755..f879d04b2a9 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41039.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41039.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json index 73d2cc62545..8b26c0b1495 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41042.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41042.json index 466e1c14aea..f5f2d2ebdeb 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41042.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41042.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41044.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41044.json index f0c8582d61e..123f3318214 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41044.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41044.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41045.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41045.json index e3a7b21b0d4..b04f247360e 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41045.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41045.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41047.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41047.json index d79f306589e..f3d62434876 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41047.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41047.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41048.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41048.json index 70140b60350..a9f1ec5c910 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41048.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41048.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41049.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41049.json index de5d35ccb18..c698a78b2e6 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41049.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41049.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41050.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41050.json index f400e4c31bd..f1e9881efe9 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41050.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41050.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41051.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41051.json index e4d88953b3a..9947561437a 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41051.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41051.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41052.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41052.json index adff35cf323..7b3bd3e418b 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41052.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41052.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41053.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41053.json index c0fdbcf3d7e..7c869302c68 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41053.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41053.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41054.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41054.json index 27366e5d862..af8a5acb068 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41054.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41054.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41055.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41055.json index c8da8a6f256..2d3aedd0999 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41055.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41055.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41056.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41056.json index 2d03f85daed..18f6e6995b4 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41056.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41056.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41057.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41057.json index 7be8b4af396..d5f653fa81b 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41057.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41057.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41058.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41058.json index eda42edefcb..06853427991 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41058.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41058.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41060.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41060.json index 8be9213f873..653f8c827b5 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41060.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41060.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41061.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41061.json index cf60a14e0f7..ad2b0d9a591 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41061.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41061.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41062.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41062.json index 0d48fa606dd..8db5a621105 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41062.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41062.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41063.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41063.json index a83526676e2..d5b3c7acce3 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41063.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41063.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41064.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41064.json index ed7cbbdc654..c138a763911 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41064.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41064.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41066.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41066.json index bf3a6cbba23..5bbfa963363 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41066.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41066.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json index 2248ee9c8c9..807c92366ef 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41074.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41074.json index c427a41f7fd..a7762fcd0d6 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41074.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41074.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41077.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41077.json index 7adaa5e2473..9da733dedc6 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41077.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41077.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41078.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41078.json index 0b3277cb1dd..021de4c29d6 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41078.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41078.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41079.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41079.json index 4c5a355266a..940e6b888e4 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41079.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41079.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41080.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41080.json index 42d0cea75c3..763a3f72a9d 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41080.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41080.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41081.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41081.json index 8e4c0d0a41f..e5f2c2c346d 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41081.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41081.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json index 846b5bce5df..853f8f6050d 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41085.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41085.json index b8cd07351f8..1975aa01f06 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41085.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41085.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41086.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41086.json index e8698b29bdf..d71b114d920 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41086.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41086.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41088.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41088.json index 89411f08828..4ba5fbcd5a4 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41088.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41088.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41090.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41090.json index dbb04db8af1..acd65a45ce7 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41090.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41090.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json index 90f0b8a5b82..56245b0cfe0 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41092.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41092.json index b83fe0f9c9e..49dfa3f4f93 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41092.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41092.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41093.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41093.json index c835e2423f3..21bc861a586 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41093.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41093.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41094.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41094.json index b369aa3bede..f836a6e57dd 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41094.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41094.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41095.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41095.json index f8ce639180e..d63f2063368 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41095.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41095.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41096.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41096.json index 32594c28e15..370c089f78d 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41096.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41096.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41097.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41097.json index 3e645fb9721..4073e582e02 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41097.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41097.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41098.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41098.json index ba0805dbfac..a122a8e4764 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41098.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41098.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41099.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41099.json index 3407de2a7a0..dd4317056fe 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41099.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41099.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41100.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41100.json index 8317a6f5bf1..8ed9f7ed44b 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41100.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41100.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41101.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41101.json index 927481759eb..67cad9870ba 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41101.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41101.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41102.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41102.json index bbb9983f80b..3020d0fe99f 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41102.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41102.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41103.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41103.json index 4363e265125..26ff3430b3c 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41103.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41103.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41104.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41104.json index 032b20d0725..cf90fd00eaa 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41104.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41104.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41105.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41105.json index 3ce6a90efb9..524e582646f 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41105.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41105.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41106.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41106.json index fbc808d0a68..c552856b7a4 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41106.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41106.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41107.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41107.json index 12f1c103c1d..9954f7f3cde 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41107.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41107.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41109.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41109.json index 73dd9f96fcd..69f419faa36 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41109.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41109.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41113.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41113.json index 23b278517af..de12447540d 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41113.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41113.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41114.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41114.json index a56ab374918..0b0e2127323 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41114.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41114.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41116.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41116.json index cac81a05c60..238bf9c154a 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41116.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41116.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41118.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41118.json index 05b594c7e32..81bd78608c6 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41118.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41118.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41119.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41119.json index 74f102caad9..3c3ce641854 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41119.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41119.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41120.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41120.json index 2380dffaadf..8e1e89bb8e3 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41120.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41120.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41122.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41122.json index 0fa304c1a75..6ba10487410 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41122.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41122.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41123.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41123.json index 604d843c08f..b61738d26f9 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41123.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41123.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json index ab263eb471c..3480acc8cda 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41127.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41127.json index e6da9b13787..a17069fb81f 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41127.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41127.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41128.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41128.json index 24d7113b214..621e28ff1a8 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41128.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41128.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-415xx/CVE-2022-41572.json b/CVE-2022/CVE-2022-415xx/CVE-2022-41572.json index bcc2e2f6293..e4189d8fbd5 100644 --- a/CVE-2022/CVE-2022-415xx/CVE-2022-41572.json +++ b/CVE-2022/CVE-2022-415xx/CVE-2022-41572.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T20:15:27.943", "lastModified": "2025-01-08T15:15:09.427", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-415xx/CVE-2022-41573.json b/CVE-2022/CVE-2022-415xx/CVE-2022-41573.json index da8780c723c..b72dfebc3ee 100644 --- a/CVE-2022/CVE-2022-415xx/CVE-2022-41573.json +++ b/CVE-2022/CVE-2022-415xx/CVE-2022-41573.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T20:15:28.057", "lastModified": "2025-01-08T15:15:09.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43842.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43842.json index 40a583b5a21..d3fd755343d 100644 --- a/CVE-2022/CVE-2022-438xx/CVE-2022-43842.json +++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43842.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44666.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44666.json index 6f7c6968473..151e48e1e19 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44666.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44666.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44667.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44667.json index a45ba7c539a..dc599624d33 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44667.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44667.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44668.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44668.json index 866351ab0cd..0eafce8f2db 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44668.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44668.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44669.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44669.json index 8fa5109fee6..c1d290ee9ac 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44669.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44669.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44670.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44670.json index 96a6ff33b96..6ae5ea40907 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44670.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44670.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44671.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44671.json index b9e2e018e55..1a328c04926 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44671.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44671.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44673.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44673.json index 0ce8d19fab7..63debdf5bbb 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44673.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44673.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44674.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44674.json index 7d173a4aca0..f329c68b585 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44674.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44674.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44675.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44675.json index bd677d57e2e..8ed579fb2b7 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44675.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44675.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44676.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44676.json index b7e0fc79e9d..10a9372ede2 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44676.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44676.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44677.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44677.json index 496e64910e0..9b3b93f0830 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44677.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44677.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44678.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44678.json index b770a9693b9..7caaf5af300 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44678.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44678.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44679.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44679.json index a8c817ffa08..92c98a3c815 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44679.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44679.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44680.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44680.json index ad6651b8e1d..57f084c72e5 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44680.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44680.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44681.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44681.json index 506f31a8c60..ba360b80cbd 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44681.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44681.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44682.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44682.json index 6aa6318c3e8..92afb0a45be 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44682.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44682.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44683.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44683.json index 8027d3e01be..e25641216be 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44683.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44683.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44684.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44684.json index 50a4820caca..cb616836fe3 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44684.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44684.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44687.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44687.json index 4f8c7bffc6a..8d3b2366297 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44687.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44687.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44688.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44688.json index d571a816f4e..13a632482e4 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44688.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44688.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44690.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44690.json index 4c502846609..35862b16430 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44690.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44690.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44691.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44691.json index c1e9066ac63..d4e0fbf6f72 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44691.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44691.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44692.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44692.json index 7f7bedeecc0..d55ef83645c 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44692.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44692.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44693.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44693.json index 55818ede030..cfe4376b960 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44693.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44693.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44694.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44694.json index dc5f5712086..fc1bd23b98f 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44694.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44694.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44695.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44695.json index 6869b29dba8..cb4b5f6d087 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44695.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44695.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44696.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44696.json index 5f1a6a7e1e0..36976671b9b 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44696.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44696.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44697.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44697.json index 50db95751b8..68f2b48ca60 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44697.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44697.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44698.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44698.json index 8456e634098..6414716290d 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44698.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44698.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44699.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44699.json index 26473ff868a..f2a8dfb60b8 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44699.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44699.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44707.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44707.json index f09da34fc20..88c574c803f 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44707.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44707.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44710.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44710.json index e9d82983c4c..cb30e6d764e 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44710.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44710.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44713.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44713.json index 23d7bb3e8e2..a626d029a55 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44713.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44713.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45185.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45185.json index 63ba20fb269..22e805fae6f 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45185.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45185.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T20:15:28.173", "lastModified": "2025-01-08T18:15:13.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45186.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45186.json index 6160d8f0e71..55bf15dd42e 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45186.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45186.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T20:15:28.293", "lastModified": "2025-01-08T16:15:26.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-472xx/CVE-2022-47211.json b/CVE-2022/CVE-2022-472xx/CVE-2022-47211.json index 59c23bca877..44e02f71f29 100644 --- a/CVE-2022/CVE-2022-472xx/CVE-2022-47211.json +++ b/CVE-2022/CVE-2022-472xx/CVE-2022-47211.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-472xx/CVE-2022-47212.json b/CVE-2022/CVE-2022-472xx/CVE-2022-47212.json index fa49f1a1d64..5e88ff3669b 100644 --- a/CVE-2022/CVE-2022-472xx/CVE-2022-47212.json +++ b/CVE-2022/CVE-2022-472xx/CVE-2022-47212.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-472xx/CVE-2022-47213.json b/CVE-2022/CVE-2022-472xx/CVE-2022-47213.json index eda35898821..477eed4af6f 100644 --- a/CVE-2022/CVE-2022-472xx/CVE-2022-47213.json +++ b/CVE-2022/CVE-2022-472xx/CVE-2022-47213.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48470.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48470.json index 3fde61b525f..91813acfa84 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48470.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48470.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:19.087", "lastModified": "2024-12-28T07:15:19.087", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48628.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48628.json index 1a483225991..3b25d6a4750 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48628.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48628.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:47.000", "lastModified": "2024-11-21T07:33:38.693", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48681.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48681.json index 58c8dbfe108..fd3b1e01cd7 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48681.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48681.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-28T04:15:08.623", "lastModified": "2024-11-21T07:33:45.550", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1907.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1907.json index 05b1d375962..121da73831f 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1907.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1907.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-09T08:15:24.477", "lastModified": "2025-01-09T15:15:10.753", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20888.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20888.json index e4056ad9f6b..a8d8c39ebe4 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20888.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20888.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Aria Operations for Networks contains an authenticated deserialization vulnerability.\u00a0A malicious actor with network access to VMware Aria Operations for Networks and valid 'member' role credentials may be able to perform a deserialization attack resulting in remote code execution." + }, + { + "lang": "es", + "value": "Aria Operations para Networks contiene una vulnerabilidad de deserializaci\u00f3n autenticada. Un actor malintencionado con acceso de red a VMware Aria Operations para Networks y credenciales de rol de \"member\" v\u00e1lidas podr\u00eda realizar un ataque de deserializaci\u00f3n que d\u00e9 como resultado la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20889.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20889.json index 6c1083ca9bc..f8d348689d9 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20889.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20889.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Aria Operations for Networks contains an information disclosure vulnerability.\u00a0A malicious actor with network access to VMware Aria Operations for Networks may be able to perform a command injection attack resulting in information disclosure." + }, + { + "lang": "es", + "value": "Aria Operations para Networks contiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n. Un agente malintencionado con acceso a la red de VMware Aria Operations para Networks podr\u00eda realizar un ataque de inyecci\u00f3n de comandos que de como resultado la divulgaci\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21524.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21524.json index ddb4c494414..16df857169c 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21524.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21524.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21525.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21525.json index cd794bf2881..dade1457b5b 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21525.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21525.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21526.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21526.json index 5db767e6c2e..6a56b9ba29c 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21526.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21526.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21527.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21527.json index ed77b8791be..910bcbe143d 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21527.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21527.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21528.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21528.json index 98fa57d5b0d..857d20c23ed 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21528.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21528.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21529.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21529.json index 72154955155..c11528ca4f1 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21529.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21529.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21531.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21531.json index 8ee00ae558f..9b0c7a8102e 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21531.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21531.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21532.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21532.json index 5c2101f63b1..22cb180fa53 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21532.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21532.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21535.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21535.json index a878c843d99..ad69b5ac0fa 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21535.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21535.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21536.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21536.json index 126d102c004..7cc86e41363 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21536.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21536.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21537.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21537.json index ab1e3efbcb6..a59512bc4be 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21537.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21537.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21538.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21538.json index cef3dd7a396..160d24ab1f3 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21538.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21538.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21539.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21539.json index ca6d147425a..1d3fca79b0c 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21539.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21539.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21540.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21540.json index 11aa0901522..0c2fcebd61b 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21540.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21540.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21541.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21541.json index eaeaf358b17..0f2fdac0417 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21541.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21541.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21542.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21542.json index aff193fc048..bcf60825eb9 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21542.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21542.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21543.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21543.json index 1a53cbe3251..9c77ad369cd 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21543.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21543.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21546.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21546.json index 4bf4bd51edf..318906bfeee 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21546.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21546.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21547.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21547.json index f6878e88f40..f0aa669dfc2 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21547.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21547.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21548.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21548.json index f6d3ce7b68f..d7a73b5f012 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21548.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21548.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21549.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21549.json index 6862062c963..fed9dbf0c04 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21549.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21549.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21550.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21550.json index b532b3cf99d..28820d363b7 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21550.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21550.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21551.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21551.json index a8ad57da8f2..47988f00933 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21551.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21551.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21552.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21552.json index b77e47ab239..ebd65263084 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21552.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21552.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21553.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21553.json index cf698022ab9..b6ff53543bf 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21553.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21553.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21554.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21554.json index 5040dfc7f61..9189a949e47 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21554.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21554.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21555.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21555.json index 987a2b74021..5e7b32fb9d5 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21555.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21555.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21556.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21556.json index 1b79576ec27..6de246aeb51 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21556.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21556.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21557.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21557.json index 4e05bdc7fa8..1f3972c9f28 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21557.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21557.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21558.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21558.json index 7d2b8bbadd3..299c4d8eeb5 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21558.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21558.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21559.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21559.json index 4b5f2e7c635..0ec3cda3325 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21559.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21559.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21560.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21560.json index 5ca87eac9fd..2acfe780c0a 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21560.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21560.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21561.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21561.json index d7d195d3502..e59df32a03d 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21561.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21561.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21563.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21563.json index 71340b2ea6f..0f63c7ea1be 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21563.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21563.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21564.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21564.json index 30aa719b200..c7f9929f24a 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21564.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21564.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21565.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21565.json index bbf46ef90af..407c950ecda 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21565.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21565.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21566.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21566.json index d801c9fad43..e7075a8aead 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21566.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21566.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21567.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21567.json index 9ace3498d51..9743ce52edb 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21567.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21567.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21568.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21568.json index 5afa8f2df8c..0872defad0b 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21568.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21568.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21569.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21569.json index 0900c6fff5d..247d645de4e 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21569.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21569.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21570.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21570.json index c80e53472a4..c89dc3b70e7 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21570.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21570.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21571.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21571.json index 38e7cd78751..db3b900b59c 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21571.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21571.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21572.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21572.json index e7637d0d36a..191b714ca55 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21572.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21572.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21573.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21573.json index 2167fbdc313..821af0cba15 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21573.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21573.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21674.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21674.json index af8891aa702..2be42c0a457 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21674.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21674.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21675.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21675.json index fdfca3ed8f4..5bba3acf679 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21675.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21675.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21676.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21676.json index ca24a9abf98..4add6ccfc17 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21676.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21676.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21677.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21677.json index a80e5658d32..b38143c4a58 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21677.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21677.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21678.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21678.json index eebbf577977..2c784695dcf 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21678.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21678.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21679.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21679.json index 6c54da30a14..f8f235efa8f 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21679.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21679.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21680.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21680.json index d694443de23..7313314e3dc 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21680.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21680.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21681.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21681.json index 6428d461f91..123f5850eba 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21681.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21681.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21682.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21682.json index fbf579ae005..19431b3359e 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21682.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21682.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21683.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21683.json index 147a59d35d6..5ab20708c29 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21683.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21683.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21684.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21684.json index 2de63ef14a4..1de9ff457c3 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21684.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21684.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21685.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21685.json index bb3301e893c..b3ec4d95355 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21685.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21685.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21686.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21686.json index 6d418f30cd9..307c3f15480 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21686.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21686.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21687.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21687.json index 0d6495378aa..37554e73835 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21687.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21687.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21688.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21688.json index 333714d5934..6122faf4b0f 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21688.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21688.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21689.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21689.json index f9fb2206768..c38e74528fc 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21689.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21689.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21690.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21690.json index 96f0be7f21e..b28a13fc57c 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21690.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21690.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21691.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21691.json index 077eb58f5fa..bfd5b42683b 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21691.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21691.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21692.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21692.json index 1ef403f807e..12e94d0480d 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21692.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21692.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21693.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21693.json index 26add4b2cd0..25b8e2f8aed 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21693.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21693.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21694.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21694.json index 39eb42eb12d..6f1917e9635 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21694.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21694.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21699.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21699.json index b7874fc18cb..8b932b1bf89 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21699.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21699.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21700.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21700.json index a4606c19ce9..ebf7e3fe8ba 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21700.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21700.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21701.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21701.json index 717f7e2ad4d..0a73f074a22 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21701.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21701.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21702.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21702.json index 341f9a0adbd..3107f15653d 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21702.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21702.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21704.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21704.json index a6e1b9e1617..47d5cedbbb5 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21704.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21704.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21705.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21705.json index 365f5af0fd9..248ab471ed0 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21705.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21705.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21706.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21706.json index fc20a675c79..069dd50f6fb 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21706.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21706.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21707.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21707.json index 03219839e5b..6868a3bae7f 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21707.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21707.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21708.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21708.json index b145a34472d..41f31c8c64b 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21708.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21708.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21709.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21709.json index 47621323c5e..ac078a03f6b 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21709.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21709.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21710.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21710.json index f091a0c00e1..0c18d32c2bc 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21710.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21710.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21712.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21712.json index 61521e72680..cb5c205c7ce 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21712.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21712.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21713.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21713.json index 589ccec1fe5..d8309ad67ca 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21713.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21713.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21714.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21714.json index 5c7fb15fbc6..c27c0093ba6 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21714.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21714.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21717.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21717.json index 62575931001..0ec993051ac 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21717.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21717.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21718.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21718.json index 22da3445e03..dc1020d1bc8 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21718.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21718.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21719.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21719.json index 1357c63e504..f70633cdf33 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21719.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21719.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21720.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21720.json index 83b767dd5e7..805bcda1941 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21720.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21720.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21721.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21721.json index fd73144bdc8..30975c6ccac 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21721.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21721.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21722.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21722.json index 8d837da53e2..341ef04fe6c 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21722.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21722.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21724.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21724.json index 7d1f0569729..9d65e2bae6e 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21724.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21724.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21725.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21725.json index 05034e453af..a6f63c72489 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21725.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21725.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21726.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21726.json index 6eca75da224..baafa3b8be4 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21726.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21726.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21727.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21727.json index 3cde4c37980..1b45efe4741 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21727.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21727.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21728.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21728.json index a38b6db81eb..5d271297367 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21728.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21728.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21730.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21730.json index 2e1340bddc2..86e6d6714b6 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21730.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21730.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21732.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21732.json index 0f2aa65ba0f..47bc2d3ba38 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21732.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21732.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21733.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21733.json index 971ed9f6c3e..6b33a17aa92 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21733.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21733.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21734.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21734.json index 05c7a2522da..39c455ad23a 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21734.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21734.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21735.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21735.json index 7df84032693..929d22dbb1e 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21735.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21735.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21736.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21736.json index 46d6a9fee06..0009293d2bd 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21736.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21736.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21737.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21737.json index 6a190108218..4401ec997b1 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21737.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21737.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21738.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21738.json index 5dbbfff96cb..2915fe75115 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21738.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21738.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21739.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21739.json index 2e8dd945d30..02764d5ca06 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21739.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21739.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21740.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21740.json index c254dce6654..c620bca6686 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21740.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21740.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21741.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21741.json index 538214e20ca..272748d2e7c 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21741.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21741.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21742.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21742.json index 652d3c3d6a0..b7d3d097045 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21742.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21742.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21743.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21743.json index a7b77b8a6e9..42db8475fd6 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21743.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21743.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21744.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21744.json index 4efc982109d..8f12a394fc0 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21744.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21744.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21745.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21745.json index cb042092aa8..0e828c39565 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21745.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21745.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21746.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21746.json index 7f7e5bdcb48..219e260530a 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21746.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21746.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21747.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21747.json index 48c4f7450a0..04272a4a342 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21747.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21747.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21748.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21748.json index 932ed3c9245..547c0a6be28 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21748.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21748.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21749.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21749.json index 3de00080650..f124982ad6e 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21749.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21749.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21750.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21750.json index c89c1b2f81c..0b3b642250c 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21750.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21750.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21751.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21751.json index 2489ba46996..255fe2f79f4 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21751.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21751.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21752.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21752.json index d3a51b40c7c..d39114adcf3 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21752.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21752.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21753.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21753.json index 0c96a4b5f24..ee1004fbb04 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21753.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21753.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21754.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21754.json index a6a2f6b0cf2..b30eea6d4d3 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21754.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21754.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21755.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21755.json index fc00a764108..fbffc3aa52a 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21755.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21755.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21757.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21757.json index 72c89c12c9a..744c5b117d8 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21757.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21757.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21758.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21758.json index ff612aa88db..082ee2deac7 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21758.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21758.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21759.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21759.json index bd4aeb773f2..24035957090 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21759.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21759.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21760.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21760.json index 89f2d693afd..24eaf03edbe 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21760.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21760.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21761.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21761.json index aee7f3fb8eb..1eb61b320f3 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21761.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21761.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21762.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21762.json index 5f993a8e9a7..71c7d22fe59 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21762.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21762.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21763.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21763.json index bb3be390828..be3fd6a20c1 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21763.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21763.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21764.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21764.json index d9f9ff260a5..fcb71218634 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21764.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21764.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21765.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21765.json index e2c8c45c826..3c6b95d605d 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21765.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21765.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21766.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21766.json index a97529b9f0a..450ef22c84d 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21766.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21766.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21767.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21767.json index 2097d0be9e2..985a44ae1b2 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21767.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21767.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21768.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21768.json index 7933b3b5652..35fa3b27282 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21768.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21768.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21769.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21769.json index 4a63a4f0979..8f47746e681 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21769.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21769.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21771.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21771.json index 24366dcf254..06cc51fd972 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21771.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21771.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21772.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21772.json index 6756014b6e0..386a43b96af 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21772.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21772.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21773.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21773.json index d2a985ddd5d..65f0d5c1a2c 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21773.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21773.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21774.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21774.json index 5f2ea222a56..5540b35cf41 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21774.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21774.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21775.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21775.json index 4d9ec96efc2..b5b257aa449 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21775.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21775.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21776.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21776.json index ad6fcf182c2..c9b67e9d4f0 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21776.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21776.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21778.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21778.json index 6cada2afe2d..fbacf1d8c1e 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21778.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21778.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21779.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21779.json index 5d38086afc2..0dcebf0c993 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21779.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21779.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21780.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21780.json index ff3e0e6cd87..6419ab443bd 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21780.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21780.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21781.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21781.json index b17f0b66019..e5e32629d73 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21781.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21781.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21782.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21782.json index 8c2c9866507..5d05f057031 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21782.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21782.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21783.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21783.json index eab26f85ce5..890431fcc8f 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21783.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21783.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21784.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21784.json index c59ff50e3e5..4e50901fb62 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21784.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21784.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21785.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21785.json index 1309f77a3f2..c4cff1abeec 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21785.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21785.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21786.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21786.json index 2198391e2e6..7e87ca2cca4 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21786.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21786.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21787.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21787.json index 7c341e1e74f..829aed1cd6c 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21787.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21787.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21788.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21788.json index ca1c1b0f46f..60a4295b26b 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21788.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21788.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21789.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21789.json index e16a47ae0a5..d26153dcb2c 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21789.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21789.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21790.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21790.json index c4d019d2b3c..6604586faaf 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21790.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21790.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21791.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21791.json index 86a2566d756..911eafeda8f 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21791.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21791.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21792.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21792.json index 3c8e97bb29c..0e1e0de8309 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21792.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21792.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21793.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21793.json index 748a944c8c9..c2aa83dbbb4 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21793.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21793.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json index 7e2f8783536..f000b568da2 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21795.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21795.json index 21aab53cff5..d2ff9c8a214 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21795.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21795.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21796.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21796.json index 53c95e54410..dd6977b55de 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21796.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21796.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21797.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21797.json index 39ac87762e8..90ea0a95cca 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21797.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21797.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21798.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21798.json index d7023568e07..5de2ca7b7e5 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21798.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21798.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21799.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21799.json index 78b9209dccc..f158bf2c48e 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21799.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21799.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21800.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21800.json index 2a0cec5cc04..1e2d77e57ca 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21800.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21800.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21801.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21801.json index 5fa0a6e8468..e073f4078b9 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21801.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21801.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21802.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21802.json index e407f5c097f..1277b3c5d34 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21802.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21802.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21803.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21803.json index 49882b46787..84a6f8fe0bf 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21803.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21803.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21804.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21804.json index dad05650dcf..76b01d494e4 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21804.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21804.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21805.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21805.json index 59aef030ca5..b1f889085c7 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21805.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21805.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21806.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21806.json index 906fb8e3576..1d3ac7ade4b 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21806.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21806.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21807.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21807.json index 0830a5e6cb0..56028ffea7a 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21807.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21807.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21808.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21808.json index 9d9638324f9..5b58f79a595 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21808.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21808.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21809.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21809.json index 1385042983d..43ea3bc93bb 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21809.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21809.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21811.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21811.json index 3491c9f9bcd..0d81a97a743 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21811.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21811.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21812.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21812.json index c991697e85b..6dac037a022 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21812.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21812.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21813.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21813.json index f21a0426467..8a5f3c616f7 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21813.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21813.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21815.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21815.json index 54a1e345b80..3be8fb06be6 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21815.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21815.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21816.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21816.json index 2e3b9f9f28e..0849206650d 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21816.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21816.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21817.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21817.json index 67e3dc46349..83c65302372 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21817.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21817.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21818.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21818.json index 27a93d50686..c4b9baaca7c 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21818.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21818.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21819.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21819.json index fac732f359a..73d9e1f39d5 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21819.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21819.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21820.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21820.json index 45b500cac05..9fd7c44179c 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21820.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21820.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21822.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21822.json index b4ded4fb581..84a034b01d1 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21822.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21822.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21823.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21823.json index 0cd9c232b4c..8791e3aedc4 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21823.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21823.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22869.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22869.json index d377e76b89f..6878a536aba 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22869.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22869.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23374.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23374.json index bca0caab545..d75f0153cd5 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23374.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23374.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23375.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23375.json index 2cd541ffcc3..870d78252ba 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23375.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23375.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23376.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23376.json index e8e7482c366..ccb84dd6820 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23376.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23376.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23377.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23377.json index b78f5db925a..7c598fcf290 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23377.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23377.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23378.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23378.json index fd54a8c1182..6ab280a196f 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23378.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23378.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23379.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23379.json index d229b506e7c..3404fcc993d 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23379.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23379.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23381.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23381.json index 276d2bb9ead..bdd709ed221 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23381.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23381.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23385.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23385.json index 4c01fea1b0e..0dabda25a89 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23385.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23385.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23388.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23388.json index 406ee4a3777..bf60e921639 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23388.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23388.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23389.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23389.json index 703bcee9fa5..2adc8869b53 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23389.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23389.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23390.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23390.json index d6164b6cf4c..0deb3fcce31 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23390.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23390.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23391.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23391.json index c1a22a6cda6..2a99a5034c8 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23391.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23391.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23392.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23392.json index f7fe644f2e9..b44ea19a17e 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23392.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23392.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23393.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23393.json index 76070e17e4f..fb8a25ba0cd 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23393.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23393.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23394.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23394.json index e7dcb9bc613..2d545e33cc1 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23394.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23394.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23395.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23395.json index 63b7bbb5a43..4f12e9d9368 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23395.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23395.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23399.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23399.json index 4fb6e174d0a..2ded920c371 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23399.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23399.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23400.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23400.json index 632daeaa774..42bc6757ca2 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23400.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23400.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23401.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23401.json index c728b31fc8e..140b4b06f65 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23401.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23401.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23402.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23402.json index 5c5e73017a9..f091c626139 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23402.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23402.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23403.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23403.json index b075a8ce1ed..1a61a92bb4f 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23403.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23403.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23404.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23404.json index 9ccaee31881..8e770aa5959 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23404.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23404.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23405.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23405.json index c9094b4b199..5693bfe9d4a 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23405.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23405.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23406.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23406.json index 85977264222..3065396329c 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23406.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23406.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23407.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23407.json index e8b911b74ce..64003f3acc5 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23407.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23407.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23408.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23408.json index 00198a2e63b..d3e3a71320f 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23408.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23408.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23409.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23409.json index bf7da0acb32..9b9edac1944 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23409.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23409.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23410.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23410.json index 791f54f1108..4107c65527b 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23410.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23410.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23411.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23411.json index e89f17744bd..27ad183766a 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23411.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23411.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23412.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23412.json index 46991670e15..e41bbaa50fb 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23412.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23412.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23414.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23414.json index b67357f066a..65dd92b87f7 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23414.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23414.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23415.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23415.json index eb799b1ac8b..d12b7111297 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23415.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23415.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23416.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23416.json index ab324ea17e0..812f132e366 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23416.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23416.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23417.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23417.json index 4a3560856a8..571a3e3c86f 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23417.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23417.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23418.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23418.json index c63fa62697f..656263babb8 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23418.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23418.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23419.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23419.json index d651ea98414..e721629c9b5 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23419.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23419.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23420.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23420.json index c537d95abbf..568117c6074 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23420.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23420.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23421.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23421.json index 1bdd1e005ad..efe582bb8d8 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23421.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23421.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23422.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23422.json index a7e8eee1774..4303b95c587 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23422.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23422.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23423.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23423.json index 47428a18624..e3e362425b0 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23423.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23423.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23913.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23913.json index c7868121580..e430daaa436 100644 --- a/CVE-2023/CVE-2023-239xx/CVE-2023-23913.json +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23913.json @@ -3,7 +3,7 @@ "sourceIdentifier": "support@hackerone.com", "published": "2025-01-09T01:15:07.257", "lastModified": "2025-01-09T18:15:24.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24010.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24010.json index a3f9334534f..227f4c98bab 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24010.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24010.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-09T15:15:11.467", "lastModified": "2025-01-09T16:15:30.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate\u2019s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures." + }, + { + "lang": "es", + "value": "Un atacante puede manipular de forma arbitraria participantes maliciosos de DDS (o nodos ROS 2) con certificados v\u00e1lidos para comprometer y obtener el control total del sistema de bus de datos DDS seguro atacado explotando atributos vulnerables en la configuraci\u00f3n de validaci\u00f3n del certificado PKCS#7. Esto se debe a una implementaci\u00f3n no conforme de la verificaci\u00f3n de documentos de permiso utilizada por algunos proveedores de DDS. En concreto, un uso indebido de la funci\u00f3n PKCS7_verify de OpenSSL utilizada para validar firmas S/MIME." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24011.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24011.json index 455b687657a..1228b9ffa2c 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24011.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24011.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-09T15:15:11.657", "lastModified": "2025-01-09T16:15:31.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate\u2019s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures." + }, + { + "lang": "es", + "value": "Un atacante puede manipular de forma arbitraria participantes maliciosos de DDS (o nodos ROS 2) con certificados v\u00e1lidos para comprometer y obtener el control total del sistema de bus de datos DDS seguro atacado explotando atributos vulnerables en la configuraci\u00f3n de validaci\u00f3n del certificado PKCS#7. Esto se debe a una implementaci\u00f3n no conforme de la verificaci\u00f3n de documentos de permiso utilizada por algunos proveedores de DDS. En concreto, un uso indebido de la funci\u00f3n PKCS7_verify de OpenSSL utilizada para validar firmas S/MIME." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24012.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24012.json index 1a3f93ced51..d124ce32d30 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24012.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24012.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-09T15:15:11.810", "lastModified": "2025-01-09T16:15:31.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate\u2019s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures." + }, + { + "lang": "es", + "value": "Un atacante puede manipular de forma arbitraria participantes maliciosos de DDS (o nodos ROS 2) con certificados v\u00e1lidos para comprometer y obtener el control total del sistema de bus de datos DDS seguro atacado explotando atributos vulnerables en la configuraci\u00f3n de validaci\u00f3n del certificado PKCS#7. Esto se debe a una implementaci\u00f3n no conforme de la verificaci\u00f3n de documentos de permiso utilizada por algunos proveedores de DDS. En concreto, un uso indebido de la funci\u00f3n PKCS7_verify de OpenSSL utilizada para validar firmas S/MIME." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24856.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24856.json index c14c21380f9..32073dc6577 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24856.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24856.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24858.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24858.json index 34feee632fe..37216810caa 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24858.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24858.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24859.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24859.json index 4fb3bc4d5af..aa8da3ff9e7 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24859.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24859.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24860.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24860.json index d5d1f0bdf3b..d8c257308d1 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24860.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24860.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24861.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24861.json index 75ec493d7a8..d574f6d9c2a 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24861.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24861.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24862.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24862.json index f36238a7ffa..983119adf61 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24862.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24862.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24863.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24863.json index b61b38a9cb3..bf4d0e2b5b7 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24863.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24863.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24864.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24864.json index cd9289004d4..8bac7abe4f9 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24864.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24864.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24865.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24865.json index cfc07f17707..274163b361f 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24865.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24865.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24866.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24866.json index 33459a9b5dc..10de37d1193 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24866.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24866.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24867.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24867.json index bf4bd964567..bc9ba7f87f8 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24867.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24867.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24868.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24868.json index d039d02499c..32d444c3994 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24868.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24868.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24869.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24869.json index c5e2dbcf30e..ae51a4fab1b 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24869.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24869.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24870.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24870.json index e257f79f36e..afb93dfd769 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24870.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24870.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24871.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24871.json index 3d823a4b8ab..21f49326d64 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24871.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24871.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24872.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24872.json index 82a4210e0c7..153d0a8cdad 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24872.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24872.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24876.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24876.json index 44d7440abc0..3f12734d7e7 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24876.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24876.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24879.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24879.json index 9542b58f1bc..bf41ddcd6ce 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24879.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24879.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json index 2fffb60f4f4..0ac7842737b 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24881.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24881.json index d39f46361ad..e9d33e8d1e2 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24881.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24881.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24882.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24882.json index f7d42ba02b2..409a44f6089 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24882.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24882.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24884.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24884.json index 1af7c77d382..7de00f44366 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24884.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24884.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24886.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24886.json index 15527548ca8..3c88c7897f1 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24886.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24886.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24887.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24887.json index b6d8ddd1956..5c50847341f 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24887.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24887.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24890.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24890.json index df79deca418..4b815b80591 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24890.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24890.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24891.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24891.json index be84e2610de..b16185f2845 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24891.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24891.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24892.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24892.json index f815a5dc93a..325ed4dabb7 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24892.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24892.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24893.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24893.json index 5349ed18355..c8c375e9f5e 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24893.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24893.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24895.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24895.json index 37185d05cc1..fce5eb67dd9 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24895.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24895.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24896.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24896.json index 11b2e0ea719..3ce2877c00e 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24896.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24896.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24897.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24897.json index 9911147346d..2bfdd9564ab 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24897.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24897.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24898.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24898.json index b6dd10c2f7f..313aa2630e8 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24898.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24898.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24899.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24899.json index ee313adb1d7..4c3c36b6ffe 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24899.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24899.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24900.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24900.json index d87a641c089..13b1f8faf11 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24900.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24900.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24901.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24901.json index 1dd00bf3e71..b250201d039 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24901.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24901.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24902.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24902.json index 50f30cb591e..a036395633f 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24902.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24902.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24903.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24903.json index 0dc2e21185d..b050bb40f62 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24903.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24903.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24904.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24904.json index 02df2ca05fe..5a88aea7796 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24904.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24904.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24905.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24905.json index 10394b54f4e..22a8e0d4cd3 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24905.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24905.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24906.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24906.json index a7d1ca7d76f..09a2753b130 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24906.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24906.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24907.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24907.json index df82aad185f..cd6d86a6c05 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24907.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24907.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24908.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24908.json index a8a78e0d510..3eb57abb5d8 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24908.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24908.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24909.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24909.json index cb62c6ee37b..586a0150b77 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24909.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24909.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24910.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24910.json index 2df472d9eba..d8551210992 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24910.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24910.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24911.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24911.json index 650c7bae2db..27a96f4f94b 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24911.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24911.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24912.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24912.json index b2869c164fe..8e38b6fb02b 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24912.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24912.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24913.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24913.json index 0f4b59f1fda..762c522ae60 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24913.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24913.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24914.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24914.json index a6a02572ce5..c5e47430481 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24914.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24914.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24919.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24919.json index 9d749c127c8..0d399e3de45 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24919.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24919.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24920.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24920.json index d4c302f099f..bf2f45482ab 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24920.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24920.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24921.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24921.json index 70cdee6ee5e..44406574ee0 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24921.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24921.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24923.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24923.json index 0efd1878e86..0f84266b81a 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24923.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24923.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24924.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24924.json index 55e2ac428a2..ff2b546266f 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24924.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24924.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24925.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24925.json index 6283f72a321..ebc68dcada7 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24925.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24925.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24926.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24926.json index 8c975297291..d63607ffc51 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24926.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24926.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24929.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24929.json index 4f87ffa5d6a..123f3fc4329 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24929.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24929.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24930.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24930.json index 74bd8401867..eca0ea5238e 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24930.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24930.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24931.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24931.json index 1601990b68f..dd083cb28f4 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24931.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24931.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json index 93875d096e4..a444abb3d75 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24935.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24935.json index fe33aea1ea2..1d8255e83ac 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24935.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24935.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24936.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24936.json index 0b35f0f5d64..e63bff8de65 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24936.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24936.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24937.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24937.json index 29a20617929..bc3b2a6c30a 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24937.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24937.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24938.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24938.json index e98d0af8b8a..c9fbc37eaad 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24938.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24938.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24939.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24939.json index 2c6340d5f8f..b1ea62d0636 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24939.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24939.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24940.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24940.json index 4302becc8be..18c5f058a16 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24940.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24940.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24941.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24941.json index 0590e6d39ae..22fdd8f9357 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24941.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24941.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24942.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24942.json index 594e507d3c8..bc69e7f2534 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24942.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24942.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24943.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24943.json index 4630962dd6b..10455ec51f5 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24943.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24943.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24944.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24944.json index 6b663462a60..23b925a054b 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24944.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24944.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24945.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24945.json index a1920e45f21..087d60e9c6b 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24945.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24945.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24946.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24946.json index 15be9daeff2..61f035f3663 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24946.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24946.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24947.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24947.json index ea8eb75cb6e..f0431595c7f 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24947.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24947.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24948.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24948.json index 1fe9b8760bc..11432d66d83 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24948.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24948.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24949.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24949.json index e8fbb6e5894..1f7a42de3dc 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24949.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24949.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24950.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24950.json index 00c3e0aa5c0..5c9192fef6e 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24950.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24950.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24953.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24953.json index 3a7a62fde58..a9dd02d4810 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24953.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24953.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24954.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24954.json index 63abfbeeea2..9a774aabc42 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24954.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24954.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24955.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24955.json index 3e270d25acf..f003285e22f 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24955.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24955.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25921.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25921.json index 2e2cdffbdf9..b6506169d4f 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25921.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25921.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25922.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25922.json index abb0cb3740d..2070168a6ad 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25922.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25922.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25925.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25925.json index e2216a5beb1..8cdd02ef681 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25925.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25925.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25926.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25926.json index 05d708894a4..b39bb81d309 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25926.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25926.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2530.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2530.json index f28eea285b1..a57c9736857 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2530.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2530.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A privilege escalation allowing remote code execution was discovered in the orchestration service." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una escalada de privilegios que permite la ejecuci\u00f3n remota de c\u00f3digo en el servicio de orquestaci\u00f3n." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2589.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2589.json index e3c1072c670..a857bed8b1e 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2589.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2589.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An attacker can clone a repository from a public project, from a disallowed IP, even after the top-level group has enabled IP restrictions on the group." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab EE que afecta a todas las versiones a partir de la 12.0 hasta la 15.10.8, a todas las versiones a partir de la 15.11 hasta la 15.11.7 y a todas las versiones a partir de la 16.0 hasta la 16.0.2. Un atacante puede clonar un repositorio de un proyecto p\u00fablico, desde una direcci\u00f3n IP no permitida, incluso despu\u00e9s de que el grupo de nivel superior haya habilitado restricciones de IP en el grupo." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27291.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27291.json index a1e76e8ee19..a9393177747 100644 --- a/CVE-2023/CVE-2023-272xx/CVE-2023-27291.json +++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27291.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27531.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27531.json index 7e26c384def..db3e16d5d97 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27531.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27531.json @@ -3,7 +3,7 @@ "sourceIdentifier": "support@hackerone.com", "published": "2025-01-09T01:15:07.380", "lastModified": "2025-01-09T22:15:26.207", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27539.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27539.json index 08f0372685b..8f4c8ad1990 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27539.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27539.json @@ -3,7 +3,7 @@ "sourceIdentifier": "support@hackerone.com", "published": "2025-01-09T01:15:07.483", "lastModified": "2025-01-09T22:15:26.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28120.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28120.json index 9b73e2d9754..da32105e87d 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28120.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28120.json @@ -3,7 +3,7 @@ "sourceIdentifier": "support@hackerone.com", "published": "2025-01-09T01:15:07.637", "lastModified": "2025-01-09T22:15:26.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28216.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28216.json index c7d836f5e28..6008d279b95 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28216.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28216.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28217.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28217.json index c92e7fec876..53ab4c90c8d 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28217.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28217.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28218.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28218.json index faf9ff2ca8b..f2fd2446f62 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28218.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28218.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28219.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28219.json index 15031dc672b..f6838791832 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28219.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28219.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28220.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28220.json index d8a888568c4..2671b710aa1 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28220.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28220.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28221.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28221.json index aadbb1b79ed..9caa961d6a4 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28221.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28221.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28222.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28222.json index fb62777de6f..b1863908008 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28222.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28222.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28223.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28223.json index d8b30c16fbf..d78c38b2500 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28223.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28223.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28224.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28224.json index 7202e785a85..e255166597e 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28224.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28224.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28225.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28225.json index 10d39d5e86b..8b6718c800c 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28225.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28225.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28226.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28226.json index 8a83c57c498..bdef918d8ae 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28226.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28226.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28227.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28227.json index 6c86f8e130d..46c169da36d 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28227.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28227.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28228.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28228.json index f7e99e985ff..294213b3599 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28228.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28228.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28229.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28229.json index c52f7fa56e2..c272e0ef805 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28229.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28229.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28232.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28232.json index 55eb7ddb88e..83773331e0d 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28232.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28232.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28233.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28233.json index 2e69d5aca75..8cc0b454a1b 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28233.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28233.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28234.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28234.json index b4d97eee5e4..1f60530df93 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28234.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28234.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28235.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28235.json index 0e5545d2ec9..47885101709 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28235.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28235.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28236.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28236.json index b7be4f5dac6..70eee9490a7 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28236.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28236.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28237.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28237.json index 1ca60e45cd7..096f8d7ac29 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28237.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28237.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28238.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28238.json index d8e7da29644..5944ba9ecee 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28238.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28238.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28240.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28240.json index 3887c141955..d49bb01e7d8 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28240.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28240.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28241.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28241.json index 1a5468f3a19..96066ae21fe 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28241.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28241.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28243.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28243.json index 4e989e1567f..e04b757d705 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28243.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28243.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28244.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28244.json index da3811c07b1..4b469ee3de4 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28244.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28244.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28246.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28246.json index 0ab7f294d42..f7963b10330 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28246.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28246.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28247.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28247.json index 7327e9a8123..2321653cb30 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28247.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28247.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28248.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28248.json index f1734eeb3b2..a41ebc6d382 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28248.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28248.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28250.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28250.json index 52aa69e8c63..74a00fc4e31 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28250.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28250.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28251.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28251.json index 9f3238d6414..a4dc335183c 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28251.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28251.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28252.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28252.json index e3fd454931f..4d5ea2c1dae 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28252.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28252.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28253.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28253.json index c475ecdd9cf..95ba2b82a59 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28253.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28253.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28254.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28254.json index 93ac9a10690..ce4d025978c 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28254.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28254.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28255.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28255.json index 9933d58b260..044a121df50 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28255.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28255.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28256.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28256.json index 008d5da454b..9adc544e800 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28256.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28256.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28260.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28260.json index d0fd21bd91b..ada7b4af04f 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28260.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28260.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json index 2fe0d0b28d8..97f470dcf39 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28262.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28262.json index 3e65333f623..f258d490417 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28262.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28262.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28263.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28263.json index 29e17dc313d..d199e7df51f 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28263.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28263.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28266.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28266.json index 52f59d9b8ad..86666f4d6b7 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28266.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28266.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28267.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28267.json index 75e93efb46a..07edcff482a 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28267.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28267.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28268.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28268.json index 529c1608a9b..a7eae06a955 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28268.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28268.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28270.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28270.json index db7d1f189f5..00838d74462 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28270.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28270.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28271.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28271.json index c763e21385b..47c60804366 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28271.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28271.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28272.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28272.json index 642a6eb0597..dfb53d329a1 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28272.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28272.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28273.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28273.json index 9e6c70be841..3323ead1824 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28273.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28273.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28274.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28274.json index 888ad199332..7cc3086fd96 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28274.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28274.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28275.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28275.json index 574f97b1742..b5d75e587cb 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28275.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28275.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28276.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28276.json index 3ec777ac429..3cb55672e8b 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28276.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28276.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28277.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28277.json index 269924450ed..bd8ecc263f2 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28277.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28277.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28278.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28278.json index 2c8cfad2d6d..f4805f53b20 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28278.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28278.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28283.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28283.json index 4221a7f16e8..4fb8650b309 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28283.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28283.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28285.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28285.json index 75b5f2e0fd2..ec23645b554 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28285.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28285.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json index 37afd832ac1..7d369a2db6c 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28287.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28287.json index 9ffbda72c72..4f35a9f673f 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28287.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28287.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28288.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28288.json index 53313442786..c3666f8a117 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28288.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28288.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28290.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28290.json index ce82fc13ab4..20c05be2949 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28290.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28290.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28292.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28292.json index 6180e758a43..954ee07fb98 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28292.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28292.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28293.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28293.json index b8eacc89e75..35bf1f33c81 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28293.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28293.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28295.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28295.json index 4830f910dd0..52d29fa05d0 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28295.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28295.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28296.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28296.json index fd456e754d9..5c0c623e536 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28296.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28296.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28297.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28297.json index 7d9c4bbfab3..3cfd6b1146d 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28297.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28297.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28298.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28298.json index c13c5a437ea..3cd801658ec 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28298.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28298.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28300.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28300.json index 2f055f31c4a..ba3325080c8 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28300.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28300.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json index d4e237e4d28..95968c55c48 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28302.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28302.json index 69b2562c99c..5c8ad53ecca 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28302.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28302.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28303.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28303.json index 895afd00dc4..b8f36e552c9 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28303.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28303.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28304.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28304.json index 76a8e856170..d9c226f407b 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28304.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28304.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28305.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28305.json index 1dfda224501..74a3a620990 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28305.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28305.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28306.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28306.json index 4e6ea8e1bc8..43a4fb597aa 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28306.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28306.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28307.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28307.json index 92cab359572..67830db70ba 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28307.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28307.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28308.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28308.json index d8cf38e24a7..be8215003c9 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28308.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28308.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28310.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28310.json index d2312b20af2..13c1315812f 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28310.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28310.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28311.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28311.json index 1aa78f782b4..4b6e1aeaf57 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28311.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28311.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28312.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28312.json index bcfc7a8bfd6..6e3a0a4fb38 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28312.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28312.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28313.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28313.json index 8f8436c7c00..179beb4d48d 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28313.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28313.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28314.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28314.json index 00c90e493fe..9a720061c69 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28314.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28314.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28362.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28362.json index 1a26a991fbd..51704bf9387 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28362.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28362.json @@ -3,7 +3,7 @@ "sourceIdentifier": "support@hackerone.com", "published": "2025-01-09T01:15:07.750", "lastModified": "2025-01-09T22:15:26.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28517.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28517.json index a2c7a19694e..615e18b66d2 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28517.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28517.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-13T10:15:06.790", "lastModified": "2024-11-21T07:55:16.223", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29326.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29326.json index 75a45c5b1b2..3ee7e359fd5 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29326.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29326.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29328.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29328.json index acfdc22b940..7c5d138be95 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29328.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29328.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29330.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29330.json index 842066dc62c..dd8b487f081 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29330.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29330.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29331.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29331.json index 699b377c215..d4a04ee4034 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29331.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29331.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json index 58281eb2c9a..258b897c0d9 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json index 1af6ddc3b71..ae11ac85c53 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29335.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29335.json index 8155f872138..2f01ea09626 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29335.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29335.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29336.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29336.json index dd119fb9214..a6dc9737fd1 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29336.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29336.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29337.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29337.json index af9915b885d..b237ef2cc2d 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29337.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29337.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29338.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29338.json index 1229091a621..c2c5153eb66 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29338.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29338.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29340.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29340.json index f45fe89e61a..5ac74fd115e 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29340.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29340.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29341.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29341.json index 74a7634d80e..4ad0d256bf8 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29341.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29341.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29343.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29343.json index 62535d83a45..25d068ef65f 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29343.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29343.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29345.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29345.json index 87db04b20b7..3fe3f706e40 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29345.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29345.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29346.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29346.json index d36cf3fadec..066355351f7 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29346.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29346.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29348.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29348.json index 59f6849dc70..ef3ed2ca849 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29348.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29348.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29349.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29349.json index 3a8ea21d5d6..796d501299f 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29349.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29349.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29350.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29350.json index 1d994e826ae..07f5a3260b8 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29350.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29350.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29351.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29351.json index 4caf5aeae75..fd5e650cf5c 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29351.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29351.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29352.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29352.json index 0974bb82318..b952d9c3b64 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29352.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29352.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29353.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29353.json index 809c3104b45..d4577d5e792 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29353.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29353.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json index e806a429fe1..852190a115e 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29355.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29355.json index 34acdf1f084..982ff140ca4 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29355.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29355.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29356.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29356.json index ade98ed7cad..87cd53e1253 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29356.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29356.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29357.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29357.json index 5c989610368..28fc803b55c 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29357.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29357.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29358.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29358.json index 8d9e4cd68a6..0620f2d9b45 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29358.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29358.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29359.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29359.json index 2fa9ca802a8..986b8104268 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29359.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29359.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29360.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29360.json index 3b3244b6d31..d0e43b0e0c6 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29360.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29360.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29361.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29361.json index 64308b8feea..5a44541f6ec 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29361.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29361.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29362.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29362.json index 6e84f00182b..91f4d0242e8 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29362.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29362.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29363.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29363.json index b5530121ca9..dbaf1a1e5a1 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29363.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29363.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29364.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29364.json index 6dd5ac7bfcc..94a892614bb 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29364.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29364.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29365.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29365.json index 89f226572b9..2a3ac90219d 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29365.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29365.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29366.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29366.json index 154038a2d32..b4ad9ee9f78 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29366.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29366.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29367.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29367.json index 38a07448b98..6ccfa1244b5 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29367.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29367.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29368.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29368.json index be792f53a26..7c6c5b3f446 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29368.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29368.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29369.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29369.json index af2463dc4cd..bd13e4a1dcf 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29369.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29369.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29370.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29370.json index 4a4c344862c..4f609ddc0ca 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29370.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29370.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29371.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29371.json index 9afdd4b2ee4..004eec3609b 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29371.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29371.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29372.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29372.json index 55d87f5faee..e699ee432f9 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29372.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29372.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29373.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29373.json index 9d4808d0de6..61e479c053e 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29373.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29373.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30400.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30400.json index 25c658abe01..0705bac4652 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30400.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30400.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Anyka Microelectronics AK3918EV300 MCU v18. A command injection vulnerability in the network configuration script within the MCU's operating system allows attackers to perform arbitrary command execution via a crafted wifi SSID or password." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Anyka Microelectronics AK3918EV300 MCU v18. Una vulnerabilidad de inyecci\u00f3n de comandos en el script de configuraci\u00f3n de red dentro del sistema operativo de la MCU permite a los atacantes ejecutar comandos arbitrarios a trav\u00e9s de una contrase\u00f1a o SSID de wifi manipulados." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30996.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30996.json index ae307da074b..6a1db16abb7 100644 --- a/CVE-2023/CVE-2023-309xx/CVE-2023-30996.json +++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30996.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31114.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31114.json index 57a8cee9d7f..b6e0999b158 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31114.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31114.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in the Shannon RCS component in Samsung Exynos Modem 5123 and 5300. Incorrect resource transfer between spheres can cause unintended querying of the SIM status via a crafted application." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Shannon RCS component en Samsung Exynos Modem 5123 y 5300. La transferencia incorrecta de recursos entre esferas puede provocar una consulta no deseada del estado de la SIM a trav\u00e9s de una aplicaci\u00f3n manipulada espec\u00edficamente para ello." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31115.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31115.json index 099f9b469d6..0ce343dd6b2 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31115.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31115.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in the Shannon RCS component in Samsung Exynos Modem 5123 and 5300. Incorrect resource transfer between spheres can cause changes to the activation mode of RCS via a crafted application." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Shannon RCS component en Samsung Exynos Modem 5123 y 5300. La transferencia incorrecta de recursos entre esferas puede provocar cambios en el modo de activaci\u00f3n de RCS a trav\u00e9s de una aplicaci\u00f3n manipulada espec\u00edficamente para ello." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31116.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31116.json index d5fcffcbcf7..52740a9ff81 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31116.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31116.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in the Shannon RCS component in Samsung Exynos Modem 5123 and 5300. An incorrect default permission can cause unintended querying of RCS capability via a crafted application." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Shannon RCS component en Samsung Exynos Modem 5123 y 5300. Un permiso predeterminado incorrecto puede provocar una consulta no deseada de la capacidad RCS a trav\u00e9s de una aplicaci\u00f3n manipulada espec\u00edficamente para ello." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32008.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32008.json index 0936089b927..742bf3cc64a 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32008.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32008.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32009.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32009.json index bc43ec72139..7e5bdffa4a2 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32009.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32009.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32010.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32010.json index 50a6d9f535e..ffe7c8d1fd5 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32010.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32010.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32011.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32011.json index baee17e03bf..b5d6bd3fb31 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32011.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32011.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32012.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32012.json index 4bc1ae36cfe..2b2a8713db3 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32012.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32012.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32013.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32013.json index ab5b7327a30..0414c120fcf 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32013.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32013.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32014.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32014.json index 57da8c1c88f..f2e7a212149 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32014.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32014.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32015.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32015.json index 7f729d9d158..b1a29079d24 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32015.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32015.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32016.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32016.json index 06215101479..387262e494f 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32016.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32016.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32017.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32017.json index 4a7131f3963..9d0cda48488 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32017.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32017.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32018.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32018.json index 44dbc1f92cc..ae450bdd158 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32018.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32018.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32019.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32019.json index aa137d0895b..bd4e3d1851b 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32019.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32019.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32020.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32020.json index 852e76247f9..607680d1bfc 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32020.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32020.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32021.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32021.json index 67ca49407b6..f5f45b4a601 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32021.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32021.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32022.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32022.json index 18a5f09f25c..8a3dcb655dc 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32022.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32022.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32024.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32024.json index c71cfec7f90..6c0167b6468 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32024.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32024.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32025.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32025.json index 57b50573d93..8088b307d22 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32025.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32025.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32026.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32026.json index ac937181722..18e782396c5 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32026.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32026.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32027.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32027.json index b6ad761c7e8..7b47736bc4d 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32027.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32027.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32028.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32028.json index a5c95d294f4..60adf32afd5 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32028.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32028.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32029.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32029.json index 559872222ef..95fb0cc4991 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32029.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32029.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32030.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32030.json index 5148bd30b2e..154038fe30f 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32030.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32030.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32031.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32031.json index 7da63289569..d9c8058d223 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32031.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32031.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32032.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32032.json index f3f0f616902..6f4538bf769 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32032.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32032.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32037.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32037.json index c91dfa8a637..f97c7a2815b 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32037.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32037.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32038.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32038.json index a33fd72a027..8106354bdd2 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32038.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32038.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32043.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32043.json index dfc2444235c..7face1ae998 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32043.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32043.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32044.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32044.json index 7d00b36fada..ba43030bb19 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32044.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32044.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32045.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32045.json index 143cb36405f..fc429ab71d2 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32045.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32045.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32046.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32046.json index bef913f2b27..b85ef7285f5 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32046.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32046.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32047.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32047.json index b2242e119e9..381ec546249 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32047.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32047.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32049.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32049.json index a835e2b849b..82c3f8cbb47 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32049.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32049.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32051.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32051.json index cb347258658..7fb1f3cb2b6 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32051.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32051.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32052.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32052.json index 5dfc5600549..b2e3b4b6f50 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32052.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32052.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32054.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32054.json index 16d7ef3941e..089fece581b 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32054.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32054.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32057.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32057.json index 02e85fb2691..07713c228c4 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32057.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32057.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32084.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32084.json index fa5a2309de9..2af6ac62a49 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32084.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32084.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32085.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32085.json index 0b559d277ed..a74389b1f70 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32085.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32085.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32344.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32344.json index 63ba3f73634..122f113beb7 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32344.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32344.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33099.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33099.json index e623c124b3e..b20979e3774 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33099.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33099.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:47.000", "lastModified": "2024-11-21T08:04:49.630", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33100.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33100.json index 0378bb84462..afea3ac0a78 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33100.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33100.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:47.207", "lastModified": "2024-11-21T08:04:49.790", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33101.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33101.json index c71d3e29eac..6b9f89304ec 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33101.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33101.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:47.430", "lastModified": "2024-11-21T08:04:49.923", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33111.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33111.json index 645b18242df..196311279e7 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33111.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33111.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:47.630", "lastModified": "2024-11-21T08:04:53.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33115.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33115.json index 3dd8acfeea3..43ea77553d6 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33115.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33115.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:47.823", "lastModified": "2024-11-21T08:04:54.283", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33119.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33119.json index 89737010a43..e36884fb028 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33119.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33119.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:19.680", "lastModified": "2024-11-21T08:04:55.413", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33126.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33126.json index 2a9bd0f60f4..bf48332a2e1 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33126.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33126.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33127.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33127.json index 027f988f78b..d0771a0a589 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33127.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33127.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33128.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33128.json index 5b65e020e51..2e04f80266f 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33128.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33128.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33129.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33129.json index 110b25ab9b2..2fe5356947e 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33129.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33129.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33130.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33130.json index 8c68229d94f..8ae64f9f7f9 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33130.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33130.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33131.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33131.json index 10cc6e1e823..f03310a3507 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33131.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33131.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33132.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33132.json index 402b3b28d1f..eb5cf066659 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33132.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33132.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33133.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33133.json index e8bee15c8c7..5c0df487f3a 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33133.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33133.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33134.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33134.json index ad3247602b4..aaeb5f2638e 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33134.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33134.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33136.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33136.json index 56d8fc44acb..282352d373b 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33136.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33136.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33137.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33137.json index 85e8fa56584..e70074769a9 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33137.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33137.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33139.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33139.json index 774630a23de..1d0985654ae 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33139.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33139.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json index 32870cd07c6..4524febd553 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33141.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33141.json index 060e9a6ae88..59e967fd637 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33141.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33141.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33142.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33142.json index 9503e0d7ecd..a0e110930be 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33142.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33142.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33144.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33144.json index 0b1bb32a029..e3b44f1ac13 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33144.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33144.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33145.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33145.json index 55fed245d11..194b383715c 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33145.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33145.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33146.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33146.json index 86395e14a35..7e7e0cd5c83 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33146.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33146.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33148.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33148.json index 74a7e863d9b..3bfd3c96b54 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33148.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33148.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33149.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33149.json index f7502e81664..b949fe19b02 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33149.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33149.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33150.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33150.json index e7b949b9e3e..470303679de 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33150.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33150.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33151.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33151.json index 707e68f5c45..92ca97ffe3f 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33151.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33151.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33155.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33155.json index 63e9991c8f1..695f9413be1 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33155.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33155.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33157.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33157.json index 2179583292b..b49b4d13416 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33157.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33157.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33158.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33158.json index 4e6015125e8..3008bd71ad1 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33158.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33158.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33159.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33159.json index 8940464c96f..9ff46f56573 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33159.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33159.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33160.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33160.json index 0e284531de7..e2dc8e2edfa 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33160.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33160.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33161.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33161.json index f3f77e97b1f..761ad8a62da 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33161.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33161.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33162.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33162.json index bba2217fc2a..af64a6a42c6 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33162.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33162.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33163.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33163.json index 0ec70ad0199..19f0eea975d 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33163.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33163.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33164.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33164.json index 98a5aed1c22..9dbfc2571b8 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33164.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33164.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33170.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33170.json index a9b3b54b79c..0bc73744790 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33170.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33170.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33174.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33174.json index 74abf7e4ab9..7949365fa2a 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33174.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33174.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33282.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33282.json index d51ba4a8ce7..2a5ab38c2ca 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33282.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33282.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Marval MSM through 14.19.0.12476 and 15.0 has a System account with default credentials. A remote attacker is able to login and create a valid session. This makes it possible to make backend calls to endpoints in the application." + }, + { + "lang": "es", + "value": "Marval MSM hasta 14.19.0.12476 y 15.0 tiene una cuenta de sistema con credenciales predeterminadas. Un atacante remoto puede iniciar sesi\u00f3n y crear una sesi\u00f3n v\u00e1lida. Esto permite realizar llamadas de backend a endpoints en la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33283.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33283.json index 9fec46a6ef3..d57c884a45e 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33283.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33283.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Marval MSM through 14.19.0.12476 uses a static encryption key for secrets. An attacker that gains access to encrypted secrets can decrypt them by using this key." + }, + { + "lang": "es", + "value": "Marval MSM hasta la versi\u00f3n 14.19.0.12476 utiliza una clave de cifrado est\u00e1tica para los secretos. Un atacante que obtenga acceso a secretos cifrados puede descifrarlos utilizando esta clave." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33284.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33284.json index 11b2cd5a98a..7fd5f97cfbf 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33284.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33284.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Marval MSM through 14.19.0.12476 and 15.0 has a Remote Code Execution vulnerability. A remote attacker authenticated as any user is able to execute code in context of the web server." + }, + { + "lang": "es", + "value": "Marval MSM hasta 14.19.0.12476 y 15.0 tiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. Un atacante remoto autenticado como cualquier usuario puede ejecutar c\u00f3digo en el contexto del servidor web." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33496.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33496.json index 4104e94c68c..fca26149411 100644 --- a/CVE-2023/CVE-2023-334xx/CVE-2023-33496.json +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33496.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "xxl-rpc v1.7.0 was discovered to contain a deserialization vulnerability via the component com.xxl.rpc.core.remoting.net.impl.netty.codec.NettyDecode#decode." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que xxl-rpc v1.7.0 conten\u00eda una vulnerabilidad de deserializaci\u00f3n a trav\u00e9s del componente com.xxl.rpc.core.remoting.net.impl.netty.codec.NettyDecode#decode." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33498.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33498.json index 4b6cf13e225..58236542a9d 100644 --- a/CVE-2023/CVE-2023-334xx/CVE-2023-33498.json +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33498.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file." + }, + { + "lang": "es", + "value": "alist <=3.16.3 es vulnerable a un control de acceso incorrecto. Las cuentas con poco nivel de privilegios pueden cargar cualquier archivo." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33510.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33510.json index d6a0f2417d0..def24ecbb86 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33510.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33510.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Jeecg P3 Biz Chat 1.0.5 allows remote attackers to read arbitrary files through specific parameters." + }, + { + "lang": "es", + "value": "Jeecg P3 Biz Chat 1.0.5 permite a atacantes remotos leer archivos arbitrarios a trav\u00e9s de par\u00e1metros espec\u00edficos." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33536.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33536.json index 4c7ed3a4957..846efe35351 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33536.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33536.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a buffer overflow via the component /userRpm/WlanMacFilterRpm." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10 y TL-WR740N V1/V2 conten\u00edan un desbordamiento de b\u00fafer a trav\u00e9s del componente /userRpm/WlanMacFilterRpm." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33537.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33537.json index ff175c40a80..c7c4a615121 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33537.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33537.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a buffer overflow via the component /userRpm/FixMapCfgRpm." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10 y TL-WR740N V1/V2 conten\u00edan un desbordamiento de b\u00fafer a trav\u00e9s del componente /userRpm/FixMapCfgRpm." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33553.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33553.json index 4a1eea6949a..434474c3931 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33553.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33553.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue in Planet Technologies WDRT-1800AX v1.01-CP21 allows attackers to bypass authentication and escalate privileges to root via manipulation of the LoginStatus cookie." + }, + { + "lang": "es", + "value": "Un problema en Planet Technologies WDRT-1800AX v1.01-CP21 permite a los atacantes eludir la autenticaci\u00f3n y escalar privilegios a superusuario mediante la manipulaci\u00f3n de la cookie LoginStatus." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33556.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33556.json index 1fedfb74147..b773493af1c 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33556.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33556.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "TOTOLink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the staticGw parameter at /setting/setWanIeCfg." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLink A7100RU V7.4cu.2313_B20191024 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro staticGw en /setting/setWanIeCfg." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33781.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33781.json index ecb0cfbbfa3..1e6f9f1abcd 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33781.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33781.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue in D-Link DIR-842V2 v1.0.3 allows attackers to execute arbitrary commands via importing a crafted file." + }, + { + "lang": "es", + "value": "Un problema en D-Link DIR-842V2 v1.0.3 permite a los atacantes ejecutar comandos arbitrarios mediante la importaci\u00f3n de un archivo manipulado." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33865.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33865.json index 3bf24034622..2194a8032d1 100644 --- a/CVE-2023/CVE-2023-338xx/CVE-2023-33865.json +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33865.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "RenderDoc before 1.27 allows local privilege escalation via a symlink attack. It relies on the /tmp/RenderDoc directory regardless of ownership." + }, + { + "lang": "es", + "value": "RenderDoc anterior a la versi\u00f3n 1.27 permite la escalada de privilegios locales mediante un ataque de enlace simb\u00f3lico. Se basa en el directorio /tmp/RenderDoc independientemente del propietario." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json index 2e875dbb826..593a00dad59 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json @@ -83,7 +83,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-352xx/CVE-2023-35297.json b/CVE-2023/CVE-2023-352xx/CVE-2023-35297.json index ba550ca2d78..4c1ac534452 100644 --- a/CVE-2023/CVE-2023-352xx/CVE-2023-35297.json +++ b/CVE-2023/CVE-2023-352xx/CVE-2023-35297.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-352xx/CVE-2023-35298.json b/CVE-2023/CVE-2023-352xx/CVE-2023-35298.json index 311a9d6de7d..ce53db3b1da 100644 --- a/CVE-2023/CVE-2023-352xx/CVE-2023-35298.json +++ b/CVE-2023/CVE-2023-352xx/CVE-2023-35298.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-352xx/CVE-2023-35299.json b/CVE-2023/CVE-2023-352xx/CVE-2023-35299.json index 89f90252f18..87fe3d93dbc 100644 --- a/CVE-2023/CVE-2023-352xx/CVE-2023-35299.json +++ b/CVE-2023/CVE-2023-352xx/CVE-2023-35299.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35300.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35300.json index fe640d3f485..940beba5c29 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35300.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35300.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35302.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35302.json index d06a374d549..f2147ae5668 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35302.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35302.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35303.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35303.json index b1de5788bea..bd0926e03b6 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35303.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35303.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35304.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35304.json index 854b414637f..0a2b137c04f 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35304.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35304.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35305.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35305.json index fd3aa2d4c5f..93a4571f4f0 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35305.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35305.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35306.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35306.json index 62f7d3b65fe..227285e9847 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35306.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35306.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35308.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35308.json index a8722dc0791..c599480dc0c 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35308.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35308.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35309.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35309.json index a258ae00d4c..97ad369035e 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35309.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35309.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35310.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35310.json index 879bf36a9b2..105e495ec8b 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35310.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35310.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35312.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35312.json index 78b0367c900..2fe969af407 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35312.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35312.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35313.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35313.json index cb0cc5e202a..0ed5f7f8bb2 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35313.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35313.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35315.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35315.json index c1fb9d2bf15..ecb8f7854cc 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35315.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35315.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35317.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35317.json index c6592a473c2..b32e110b3c7 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35317.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35317.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35320.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35320.json index 9312a6f6ef2..c51e079a6f3 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35320.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35320.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35322.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35322.json index ebfbbc7326f..f1325c7efb2 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35322.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35322.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35323.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35323.json index 3e154204ffd..0821cbfb703 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35323.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35323.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35324.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35324.json index ccfa8b46ab1..3e39276e6fd 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35324.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35324.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35325.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35325.json index c270ae47b26..fb65d40578a 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35325.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35325.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35326.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35326.json index b82a752b14a..e4b70fa30cc 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35326.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35326.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35328.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35328.json index 6405ea366d6..19d842db468 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35328.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35328.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35329.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35329.json index 31b448e58d5..c08e3089a5a 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35329.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35329.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35330.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35330.json index edf7abdfcb8..019535151a6 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35330.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35330.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35331.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35331.json index 4e5c30695cc..81d053fd1b7 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35331.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35331.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35332.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35332.json index 5a161ec74e6..070de8ec033 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35332.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35332.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35335.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35335.json index a4e182f7903..52a4df55eab 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35335.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35335.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35337.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35337.json index ee864dad483..4684b9c08ef 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35337.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35337.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35338.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35338.json index 3f15148185e..ace1dd61d59 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35338.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35338.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35339.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35339.json index 6b251a7562f..1567f49922d 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35339.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35339.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35340.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35340.json index 4c80b32c594..04edea6620a 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35340.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35340.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35342.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35342.json index cc59d0da8be..55ee88ba8b4 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35342.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35342.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35343.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35343.json index 11cdd43e9e7..d68683d8bbf 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35343.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35343.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35344.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35344.json index ea215be15d3..3a992bc562b 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35344.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35344.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35345.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35345.json index 37e486084f4..8e3a2149784 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35345.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35345.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35346.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35346.json index f4557466316..e5587d3b6ba 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35346.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35346.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35347.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35347.json index e840f1ae005..447627e1a2b 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35347.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35347.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35348.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35348.json index d75683bc3a0..4a101996e04 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35348.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35348.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35349.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35349.json index 6102dc2872d..fd7d4edc499 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35349.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35349.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35350.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35350.json index 9463cc19387..7c9690e3819 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35350.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35350.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35351.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35351.json index afdfeabd3e8..20c3201bb66 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35351.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35351.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35352.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35352.json index ff88e0aaea7..a9a32855063 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35352.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35352.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35353.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35353.json index a4657daf042..3cd3ec3de29 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35353.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35353.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35355.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35355.json index eb3cbf086a0..5351e5c81e7 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35355.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35355.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35356.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35356.json index e0dd1ff8338..18626bd83c6 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35356.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35356.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35357.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35357.json index 0259238f1fb..6ce906b296c 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35357.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35357.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35358.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35358.json index 56892622ab2..d584e59f387 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35358.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35358.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35359.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35359.json index 9669492fc4b..8779868b169 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35359.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35359.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35360.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35360.json index 99e995eaab7..bf61af5d914 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35360.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35360.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35361.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35361.json index da0c99e930d..b253c6fc74d 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35361.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35361.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35362.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35362.json index e002a01dea6..8af1cd223d0 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35362.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35362.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35363.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35363.json index 8911f9524bb..c657216c29a 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35363.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35363.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35364.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35364.json index 33e3612a4ff..5c68540854a 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35364.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35364.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35365.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35365.json index b090a3c2de2..46d58019d42 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35365.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35365.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35366.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35366.json index f7ec219fc62..264909555e1 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35366.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35366.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35367.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35367.json index 9bc32a203ca..d92178c2b18 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35367.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35367.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35368.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35368.json index 55fc24cffec..def0a3eac49 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35368.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35368.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35371.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35371.json index 916ede11242..a338bc62852 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35371.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35371.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35372.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35372.json index a36cc9e94e9..0c10fb1130d 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35372.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35372.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35374.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35374.json index 2bcda1cdbfa..641b427c0f6 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35374.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35374.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35376.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35376.json index 07b6ddfae2f..47a87e23e26 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35376.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35376.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35377.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35377.json index 81b54339d3c..c1730a23678 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35377.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35377.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35378.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35378.json index 1b9f9e67924..8cfca2d1bb8 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35378.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35378.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35379.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35379.json index 5f082efcc4d..d3c97f4acfe 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35379.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35379.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35380.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35380.json index 8fc747502d1..590f9d80b50 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35380.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35380.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35381.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35381.json index b9c33265c5f..903bc3a9ad1 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35381.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35381.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35382.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35382.json index f50552ecb03..ae018736cd2 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35382.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35382.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35383.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35383.json index 0fb6f315502..b222d1f06fe 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35383.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35383.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35385.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35385.json index 79f35df5591..e7547e108e5 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35385.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35385.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35386.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35386.json index 806a2cbfa2d..fe174496dfe 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35386.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35386.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35387.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35387.json index a028b471cad..c1656e4b9d4 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35387.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35387.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35388.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35388.json index 88881c178cf..0a9cad9fa51 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35388.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35388.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35389.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35389.json index 53e50a5f576..ebf8de82d7d 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35389.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35389.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35390.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35390.json index 884793355c3..4d8e3315074 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35390.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35390.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35392.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35392.json index b8238c6461a..b4d888ec701 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35392.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35392.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35393.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35393.json index 4228c45dbc8..e74b74f4cdb 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35393.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35393.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35394.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35394.json index 2b378ec419f..f8ea56da270 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35394.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35394.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35618.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35618.json index 4937f1eecc2..241f9fda780 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35618.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35618.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35619.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35619.json index 4639e749700..9cec89a3ece 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35619.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35619.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35621.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35621.json index c1547a33ad0..38bf71b671f 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35621.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35621.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35622.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35622.json index 636d268ae7f..ebc5d246921 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35622.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35622.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35624.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35624.json index caaac3fd17b..e53818ada8b 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35624.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35624.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35625.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35625.json index 2b732d8b0c0..90b4b9eb722 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35625.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35625.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35628.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35628.json index b0dcf2a6029..c0288ddee42 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35628.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35628.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35629.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35629.json index 755f7ad10ad..456de8b75ef 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35629.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35629.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35630.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35630.json index a2cf1958d36..a3a633054d8 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35630.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35630.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35631.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35631.json index f9a8547b458..c9d24dabfd8 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35631.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35631.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35632.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35632.json index 4b7aea6423c..8bbd888ed29 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35632.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35632.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35633.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35633.json index 354a3ede1f5..e0a72950d68 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35633.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35633.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35635.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35635.json index e4b524e6e14..1ec7b4a2ff8 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35635.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35635.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35636.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35636.json index 544400034e2..a73bad6b1fa 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35636.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35636.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35638.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35638.json index c7098b00a8a..a9d75aa39e5 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35638.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35638.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json index 9bab7afb48f..539716e65e5 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json index 9cc0df7172e..ee8ec88bfb0 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json index 8609d7bbc6f..0be8dfd0787 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json index e448c804772..bc9c1cb8630 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json index 7523d274fbf..cf281127b3c 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36004.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36004.json index ba91cadb506..3ff061ade22 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36004.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36004.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36006.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36006.json index 358a6482c21..e9e81d5200f 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36006.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36006.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36009.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36009.json index 0bc0941d001..3b4973c8c43 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36009.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36009.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36010.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36010.json index 08d9cbc0de7..1c2eb47da69 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36010.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36010.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36011.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36011.json index 356a5ea1522..b6ef17eee31 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36011.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36011.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36012.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36012.json index 4e3a8030d5f..9d67c18f0a9 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36012.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36012.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36391.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36391.json index 5d52d184316..9f2e6dd21d2 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36391.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36391.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36431.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36431.json index 7806f541b15..51fcb03baea 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36431.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36431.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36434.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36434.json index dc46ae7cd79..95fcb446a5a 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36434.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36434.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36435.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36435.json index e0565da6902..8ea58dbea41 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36435.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36435.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36436.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36436.json index 29dc03e88ff..7b1e690666f 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36436.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36436.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36438.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36438.json index b9f3baf8274..e0199a61675 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36438.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36438.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36557.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36557.json index 116320aeadc..6a0a23cf747 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36557.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36557.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36562.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36562.json index b9c22f788a9..5487affca38 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36562.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36562.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36564.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36564.json index 2aa281a81f6..8e5e674831b 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36564.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36564.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36567.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36567.json index a3a88b72e8b..fffd2d369e1 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36567.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36567.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36570.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36570.json index 7f847acf93d..3db57576285 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36570.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36570.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36571.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36571.json index d8eefe60fed..5c469642f0b 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36571.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36571.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36572.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36572.json index d4c98d083b6..b630cdb0ac9 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36572.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36572.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36573.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36573.json index 6f6b3bdfb1f..c87d6c105cc 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36573.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36573.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36574.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36574.json index 9c39680797e..8d75f39549e 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36574.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36574.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36575.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36575.json index 9effb385375..92c324a33c2 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36575.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36575.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36576.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36576.json index 7e1d246b780..040a0b41d9c 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36576.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36576.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36577.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36577.json index a8679566485..f0e33948eff 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36577.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36577.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36578.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36578.json index ee318af2b9a..19e321aa680 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36578.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36578.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36579.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36579.json index 91a2343d21e..977b0f7b6ae 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36579.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36579.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36581.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36581.json index f1bd2059cfc..c91d85f891b 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36581.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36581.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36582.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36582.json index d9f6e60f8a8..85f5a470877 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36582.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36582.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36584.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36584.json index be5e1be06e2..468b92bed59 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36584.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36584.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36585.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36585.json index 19fcc787019..a54a253c0ee 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36585.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36585.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36589.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36589.json index 42788adb50a..67293190ccc 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36589.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36589.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36590.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36590.json index d419b9064d2..594324bf791 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36590.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36590.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36591.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36591.json index 5c5aedd4045..e26366bf7bc 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36591.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36591.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36592.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36592.json index d2e0f0b3045..7c650a6f9bb 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36592.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36592.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36594.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36594.json index 45e4f6fb763..77321e29959 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36594.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36594.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36598.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36598.json index 2a1e8ddf45e..b7bac336609 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36598.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36598.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36602.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36602.json index 76489726ad5..aaa46cbca0e 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36602.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36602.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36603.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36603.json index 1b80a3524f8..578430f5d3e 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36603.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36603.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36606.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36606.json index b0d846b74bb..110d510a02b 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36606.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36606.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36696.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36696.json index f21ef4bb981..f6c1c3d484a 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36696.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36696.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36701.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36701.json index 1e2bee8f9f3..8420db81aad 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36701.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36701.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36702.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36702.json index 6dc0f8280da..b4a23a2ace5 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36702.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36702.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36703.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36703.json index 49d32c0354d..babf636bc19 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36703.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36703.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36704.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36704.json index dda16cc867c..98d3fcdd6fd 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36704.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36704.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36706.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36706.json index decab694f6a..67ad004f52e 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36706.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36706.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36709.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36709.json index b81adfe266c..80792fa275e 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36709.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36709.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36710.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36710.json index 6c90812b0d3..80ecb4a3904 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36710.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36710.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36711.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36711.json index 5e6b99b123f..f8131d35a0f 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36711.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36711.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36712.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36712.json index 4d1ce995d77..48eef7129cd 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36712.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36712.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36713.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36713.json index ce0acc6ff2f..c18f58e001b 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36713.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36713.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36717.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36717.json index ca2585ea5cb..b75ff69d615 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36717.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36717.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36718.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36718.json index 452f7b96b13..5390a353724 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36718.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36718.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36719.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36719.json index f4c6590ef6a..b220707bded 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36719.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36719.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36720.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36720.json index 8f654d9f5d3..1b5644cb898 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36720.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36720.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36721.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36721.json index d5974f62cff..0e83e9803b5 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36721.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36721.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36722.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36722.json index 11e94531083..50971dee96e 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36722.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36722.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36723.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36723.json index e1b49a26998..bcc6c08ce01 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36723.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36723.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36724.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36724.json index bf75e8bafb0..09c0034aa0a 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36724.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36724.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36725.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36725.json index 5e20c72176b..7a7f3f9022e 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36725.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36725.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36726.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36726.json index 2221b310b8b..4bff7ba1e95 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36726.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36726.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36727.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36727.json index 1d8e385dc1d..98f62aaa855 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36727.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36727.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36729.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36729.json index ebdaf0e2d8f..2cdac1a2381 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36729.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36729.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36731.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36731.json index 88ad400d77b..d2656e1c5b5 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36731.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36731.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36732.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36732.json index 2abc96ac188..603ca58c1c2 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36732.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36732.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36735.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36735.json index eed24575fac..546907fb7df 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36735.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36735.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36736.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36736.json index b4cbbca5365..e6edc59bf80 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36736.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36736.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36739.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36739.json index e2090b67dc2..be7606ee4a4 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36739.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36739.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36740.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36740.json index b2fcc528715..7a383af2a38 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36740.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36740.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36742.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36742.json index c5994810441..165fc094aa1 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36742.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36742.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36743.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36743.json index 079a5db10c8..fe526c6ffa4 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36743.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36743.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36744.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36744.json index 20e6bbcdd86..a6eae54c7fc 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36744.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36744.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36745.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36745.json index 618ae1181fc..1519521b699 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36745.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36745.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36756.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36756.json index 3ebb4b3feba..c0239538f00 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36756.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36756.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36757.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36757.json index fa5b3f29247..a77d7323997 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36757.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36757.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36759.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36759.json index cf25034b0fa..52ed8e561c1 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36759.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36759.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36760.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36760.json index 962fafb0fee..278ad1834ff 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36760.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36760.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36762.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36762.json index e0ba3326887..8cbe452d957 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36762.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36762.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36763.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36763.json index 9442039cbed..b1fca84f22a 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36763.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36763.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36764.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36764.json index efd0ef9aa54..372aa4d3760 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36764.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36764.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36770.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36770.json index 9f2af0fdf4e..e8877528311 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36770.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36770.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36771.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36771.json index e199ee637ba..d6962ebdda9 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36771.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36771.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36772.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36772.json index 19e4045ea9e..0cb42d63803 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36772.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36772.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36773.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36773.json index a3fe43faa84..6eeaf761868 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36773.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36773.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36776.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36776.json index 8e93c5ebc29..67a1b8c75e6 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36776.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36776.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36777.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36777.json index 472cd709f54..a0f4b73e1de 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36777.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36777.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36787.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36787.json index 45913deef04..a1105397c20 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36787.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36787.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36788.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36788.json index 53d35761a42..c3c1739db45 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36788.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36788.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36790.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36790.json index 090f56d07a0..7245865d140 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36790.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36790.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36792.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36792.json index 9683ad861fb..402c2e5d54e 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36792.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36792.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36793.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36793.json index bbb95964578..d3b0ade484a 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36793.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36793.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36794.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36794.json index 73e1a14bc81..db83ab93482 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36794.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36794.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36796.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36796.json index 4c1de3cbbbc..e42bc2fe57a 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36796.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36796.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36799.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36799.json index 23bd915a05f..95e15673d14 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36799.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36799.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36801.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36801.json index d0651c6b5e4..be1f1609da7 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36801.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36801.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36802.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36802.json index afb6deb715d..35f8e51ad71 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36802.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36802.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36803.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36803.json index 69510e5bb27..839214d8c9d 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36803.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36803.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36804.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36804.json index 46e36582423..8f6dbc3782b 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36804.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36804.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36805.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36805.json index 310bdab3b61..d5e9cae3565 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36805.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36805.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36865.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36865.json index 46a7db3d4b6..8de86d2b0db 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36865.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36865.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36866.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36866.json index 5e7d64a0453..cd8e49a9e97 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36866.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36866.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36867.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36867.json index c49aa128725..12fe75af847 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36867.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36867.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36868.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36868.json index 28f8de11e58..1f8e3634476 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36868.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36868.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36869.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36869.json index 32d918796de..2869c7be233 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36869.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36869.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36871.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36871.json index 7bc40c5ddb6..f312978f503 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36871.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36871.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36872.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36872.json index 270cf8b7672..189f90dbab8 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36872.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36872.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36874.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36874.json index b132087b294..349e1d42a63 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36874.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36874.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36876.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36876.json index cd23442703d..2cef14f8187 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36876.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36876.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36877.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36877.json index 033423db4c0..50e9f509875 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36877.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36877.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36878.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36878.json index 77afe562dd2..b0b783cb95e 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36878.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36878.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36880.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36880.json index 80fdfa5a555..286bc0e0912 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36880.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36880.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36881.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36881.json index cd66788e495..b2bd0284a89 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36881.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36881.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36882.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36882.json index 8a75bbc16fb..7846e4cbb74 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36882.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36882.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36883.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36883.json index 22da591b65a..86a9f75139b 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36883.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36883.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36884.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36884.json index 30c9e2d24eb..d567e57ce81 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36884.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36884.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36887.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36887.json index a7e581af2b8..cdcbcdbfea5 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36887.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36887.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36888.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36888.json index 130ac246268..64c35cca27a 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36888.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36888.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36889.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36889.json index 6cdaa8d9150..7dc11366a4c 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36889.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36889.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36890.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36890.json index 165ed010078..87d2f644e32 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36890.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36890.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36891.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36891.json index b7546f8af9f..e02a039b5cb 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36891.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36891.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36892.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36892.json index d04dd775357..e50c9a03537 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36892.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36892.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36893.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36893.json index e76b9f17d90..f88e5b6640b 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36893.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36893.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36894.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36894.json index c2d5594036f..53f65ebe483 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36894.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36894.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36895.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36895.json index a96085938f3..5850ecd65f5 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36895.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36895.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36896.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36896.json index 60eb7656d31..7d9fee81ffc 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36896.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36896.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36898.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36898.json index 6600fe2219c..5bc4a8f1a5a 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36898.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36898.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36900.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36900.json index 6a5b527ea15..b492b3d7476 100644 --- a/CVE-2023/CVE-2023-369xx/CVE-2023-36900.json +++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36900.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36902.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36902.json index 184c3898e64..342b363a4d7 100644 --- a/CVE-2023/CVE-2023-369xx/CVE-2023-36902.json +++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36902.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36904.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36904.json index 229ebadc25a..f331ca54f8e 100644 --- a/CVE-2023/CVE-2023-369xx/CVE-2023-36904.json +++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36904.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36909.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36909.json index 27086ad3889..165be42c8a0 100644 --- a/CVE-2023/CVE-2023-369xx/CVE-2023-36909.json +++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36909.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36910.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36910.json index 19c4a23eddc..5282b07f2c2 100644 --- a/CVE-2023/CVE-2023-369xx/CVE-2023-36910.json +++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36910.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36911.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36911.json index c6337da554e..ebb001a82f7 100644 --- a/CVE-2023/CVE-2023-369xx/CVE-2023-36911.json +++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36911.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36912.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36912.json index 8abf3e1879e..390cf51e707 100644 --- a/CVE-2023/CVE-2023-369xx/CVE-2023-36912.json +++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36912.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36914.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36914.json index 1c7e8173aa9..88f7f9c164d 100644 --- a/CVE-2023/CVE-2023-369xx/CVE-2023-36914.json +++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36914.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37328.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37328.json index 92ee0dd021d..88144861c1b 100644 --- a/CVE-2023/CVE-2023-373xx/CVE-2023-37328.json +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37328.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37396.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37396.json index 70bd4c6880e..dce435f02b0 100644 --- a/CVE-2023/CVE-2023-373xx/CVE-2023-37396.json +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37396.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37400.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37400.json index fbd28363d36..2d52a3b3b48 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37400.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37400.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38037.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38037.json index 5a43bbc9b5c..e47c880f754 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38037.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38037.json @@ -3,7 +3,7 @@ "sourceIdentifier": "support@hackerone.com", "published": "2025-01-09T01:15:07.853", "lastModified": "2025-01-09T22:15:27.647", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38139.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38139.json index 58b63369148..62d21e3c42a 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38139.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38139.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38140.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38140.json index eae8e69fecb..2b4b3baf4d2 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38140.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38140.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38141.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38141.json index 5ed5ed9a14b..bae3e6c62f2 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38141.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38141.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38142.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38142.json index f4b1d0bed33..fce79d63869 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38142.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38142.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38143.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38143.json index 58260381092..bc203f01cf9 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38143.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38143.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38144.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38144.json index 7ed19af1e1f..479e0b04fff 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38144.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38144.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38146.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38146.json index e67e32a01b4..f262d738938 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38146.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38146.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38147.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38147.json index d4b91585f79..9be429efc3d 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38147.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38147.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38148.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38148.json index b1dff90f0ab..2014cb0af23 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38148.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38148.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38149.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38149.json index 986c8f9aba4..802adb2def6 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38149.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38149.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38150.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38150.json index 964d61b37a9..c1c34b0de79 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38150.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38150.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38152.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38152.json index 265cd008e84..8acaf7a4f38 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38152.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38152.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38154.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38154.json index 6c9c2bd5642..9f594ed1f96 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38154.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38154.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38156.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38156.json index 1b384656582..bdd1ed31b66 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38156.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38156.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38157.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38157.json index a0aeb5bf0f5..98255187787 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38157.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38157.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38158.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38158.json index c6d7ad7ef09..177da3ad716 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38158.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38158.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38159.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38159.json index 880e2d84ac1..d4b1c7da5de 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38159.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38159.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38160.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38160.json index 9427873b2bc..b47009c19ec 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38160.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38160.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38161.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38161.json index effc39ef5eb..f4283b45903 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38161.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38161.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38162.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38162.json index b60cbec6a48..e33dcc08f5a 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38162.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38162.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38163.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38163.json index e37f92736fb..566db20db9a 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38163.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38163.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38166.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38166.json index 1c28cba193d..27cc79fa1a1 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38166.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38166.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38167.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38167.json index 18116921cea..cd22cce8451 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38167.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38167.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38169.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38169.json index 767b6778670..5f4cdb72208 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38169.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38169.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38170.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38170.json index ba60668f3b3..4e1d8ab0098 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38170.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38170.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38171.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38171.json index d876578a153..c2278976349 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38171.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38171.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38172.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38172.json index dd080698de4..1eba7ef87df 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38172.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38172.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38173.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38173.json index c43ef2eca5d..03e4567ee71 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38173.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38173.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38174.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38174.json index b479e832a8c..4adeba075de 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38174.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38174.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38175.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38175.json index 8d8734d9bdf..15bbb1b546e 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38175.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38175.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38176.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38176.json index 159f107a797..2480331bfd8 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38176.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38176.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38178.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38178.json index 76dc3bda37e..0a0d0c3f191 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38178.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38178.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38180.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38180.json index e9497bd0ce8..caa31ac40fc 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38180.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38180.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38181.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38181.json index 144df3bfa1f..b8dc865bc61 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38181.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38181.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38182.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38182.json index a6005054b8b..7cb723b7813 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38182.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38182.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38184.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38184.json index cd62f01b9b3..ebf878ca819 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38184.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38184.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38185.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38185.json index 2fac7da22d8..d0ccac9dd4c 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38185.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38185.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38187.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38187.json index a2f1763bc49..c71fe8e7bb8 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38187.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38187.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38188.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38188.json index af12920a5a9..e84cc6f7c50 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38188.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38188.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38254.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38254.json index 645d755bf9d..13cf7717009 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38254.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38254.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38359.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38359.json index debac9b4498..c7fab88c123 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38359.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38359.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39990.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39990.json index a6f33c9ee98..c2bf04ccece 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39990.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39990.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-19T13:15:54.157", "lastModified": "2024-11-21T08:16:11.787", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40474.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40474.json index f7428d94610..deacf697e91 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40474.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40474.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40475.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40475.json index fd5fe8046e0..3a4a21b563c 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40475.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40475.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40476.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40476.json index 0f4d331c542..4ba9cc5dbeb 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40476.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40476.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41764.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41764.json index 75e13b333b8..b878eae4911 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41764.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41764.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41765.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41765.json index 535efe67c07..780330f1866 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41765.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41765.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41766.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41766.json index f53e72e3825..de70ecdfdf5 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41766.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41766.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41767.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41767.json index 09e29472032..2fc7153ca43 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41767.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41767.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41768.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41768.json index d484b5faa41..576bcf71d8a 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41768.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41768.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41769.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41769.json index bb057835729..7825c0df187 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41769.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41769.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41770.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41770.json index d0c43db64f5..bc418593f58 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41770.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41770.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41771.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41771.json index dbb349d46c0..064d088f495 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41771.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41771.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41772.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41772.json index a7da07e4d96..d21062a7927 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41772.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41772.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41773.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41773.json index 1e616acba2c..945a5b45397 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41773.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41773.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41774.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41774.json index 6d31975fbdb..d0519c74f12 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41774.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41774.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43051.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43051.json index c3ab2532b85..7a8571d799f 100644 --- a/CVE-2023/CVE-2023-430xx/CVE-2023-43051.json +++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43051.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43054.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43054.json index a748137d728..69be070eeb6 100644 --- a/CVE-2023/CVE-2023-430xx/CVE-2023-43054.json +++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43054.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43078.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43078.json index 4c3f217ec43..e853a5c08a5 100644 --- a/CVE-2023/CVE-2023-430xx/CVE-2023-43078.json +++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43078.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43515.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43515.json index 0785acb0086..3844c1c7eb6 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43515.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43515.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:48.027", "lastModified": "2024-11-21T08:24:13.047", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43521.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43521.json index 8ba000f023c..3b0f89943a3 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43521.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43521.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:19.900", "lastModified": "2024-11-21T08:24:14.420", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43524.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43524.json index d88aa1d2c86..711e1da3e7a 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43524.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43524.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:20.080", "lastModified": "2024-11-21T08:24:15.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43525.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43525.json index f49c027a6bc..aa373ab4431 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43525.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43525.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:20.253", "lastModified": "2024-11-21T08:24:15.660", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43526.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43526.json index 3523ae875bd..48b9b3a7dff 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43526.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43526.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:20.430", "lastModified": "2024-11-21T08:24:15.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43527.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43527.json index dbd1dd95d70..da165c302d1 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43527.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43527.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:20.610", "lastModified": "2024-11-21T08:24:15.957", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43528.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43528.json index 3752a3624fb..a1ce155f606 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43528.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43528.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:20.803", "lastModified": "2024-11-21T08:24:16.143", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43529.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43529.json index b3f91f71051..646d000c318 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43529.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43529.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:20.990", "lastModified": "2024-11-21T08:24:16.330", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43530.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43530.json index a594cca762a..ed7e3ffa9cd 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43530.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43530.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:21.197", "lastModified": "2024-11-21T08:24:16.510", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43531.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43531.json index 232f33cba66..15bb3b5de4f 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43531.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43531.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:21.387", "lastModified": "2024-11-21T08:24:16.663", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43537.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43537.json index 068317b6f45..8e6a6563654 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43537.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43537.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:09.063", "lastModified": "2024-11-21T08:24:18.383", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43538.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43538.json index 431527c525a..3cbfd1d6852 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43538.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43538.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:09.937", "lastModified": "2024-11-21T08:24:18.560", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43542.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43542.json index bf1159ab3a1..4588021a4a6 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43542.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43542.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:10.220", "lastModified": "2024-11-21T08:24:19.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43543.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43543.json index 52f8d1bcbc6..e4783b5ccf7 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43543.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43543.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:10.467", "lastModified": "2024-11-21T08:24:19.650", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43544.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43544.json index 373ddaa2e06..04de58194a6 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43544.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43544.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:10.700", "lastModified": "2024-11-21T08:24:19.787", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43545.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43545.json index 04be7618a64..0023f3be655 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43545.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43545.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:10.907", "lastModified": "2024-11-21T08:24:19.920", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43551.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43551.json index 7d127b9cc51..c50556a73ea 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43551.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43551.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:11.147", "lastModified": "2024-11-21T08:24:21.137", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json index 0ba0de09523..979bf8ad149 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:11.420", "lastModified": "2024-11-21T08:24:22.017", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json index 4c47a1882c6..2e0eae0994c 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:11.673", "lastModified": "2024-11-21T08:24:22.213", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47540.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47540.json index 64f0cd7f9ae..47c2696a51c 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47540.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47540.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47541.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47541.json index cb8a64a6981..61f2dc7668a 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47541.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47541.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47742.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47742.json index 397738fe670..685ec041a62 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47742.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47742.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47745.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47745.json index 2d38e3b2b19..b50cb08d0b1 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47745.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47745.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47874.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47874.json index ba7713bafb2..da84f58cc99 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47874.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47874.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48775.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48775.json index 558487ce9a0..db3a8efa7cb 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48775.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48775.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Gfazioli WP Cleanfix allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Cleanfix: from n/a through 5.6.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Gfazioli WP Cleanfix permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP Cleanfix: desde n/a hasta 5.6.2." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50850.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50850.json index c60088c7011..456dfad4be0 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50850.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50850.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Woo WooCommerce Subscriptions allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WooCommerce Subscriptions: from n/a before 5.8.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en WooCommerce Subscriptions permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WooCommerce Subscriptions: desde n/a antes de 5.8.0." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51388.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51388.json index 9165f134d8e..9a63b50e234 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51388.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51388.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-22T16:15:53.413", "lastModified": "2024-11-21T08:38:00.467", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51389.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51389.json index bba9a2f7493..53f924b29c5 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51389.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51389.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-22T16:15:53.623", "lastModified": "2024-11-21T08:38:00.603", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51634.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51634.json index 198d0db8ae3..eb70252dd4b 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51634.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51634.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51638.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51638.json index da76b715c3f..9627adc5e19 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51638.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51638.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51639.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51639.json index 4dde18dce50..3d6ab6e4b52 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51639.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51639.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51640.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51640.json index a0b16fc7e2c..0cca0137afe 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51640.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51640.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51641.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51641.json index ec51edbbf76..f338bfaeaae 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51641.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51641.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51642.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51642.json index d3c2810e9ca..8003a7388b7 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51642.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51642.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51643.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51643.json index 5dedaceb28d..476b4720fc6 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51643.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51643.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51645.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51645.json index 31e45f71b79..8f98578a8c2 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51645.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51645.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51646.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51646.json index 45b0e70d77b..3b8db148be2 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51646.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51646.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51647.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51647.json index 55f0efe2463..f2b45a28d40 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51647.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51647.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51648.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51648.json index 8e10601b08f..227d973d894 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51648.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51648.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51653.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51653.json index 69ad09769bf..596df6da554 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51653.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51653.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-22T16:15:53.800", "lastModified": "2024-11-21T08:38:32.677", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52332.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52332.json index 8634ede0a59..c97682c125e 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52332.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52332.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52333.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52333.json index 07a5db14fd8..0b76bbba09f 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52333.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52333.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52334.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52334.json index 2a2a1793e61..805606e0966 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52334.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52334.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52480.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52480.json index c01c57a8803..fe289be27c5 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52480.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52480.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T06:15:46.017", "lastModified": "2024-11-21T08:39:52.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52482.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52482.json index ff6879e1b17..52913341bc7 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52482.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52482.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T06:15:46.103", "lastModified": "2024-11-21T08:39:52.390", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52483.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52483.json index 3a9ebbf8b76..baa22bcd4ec 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52483.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52483.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T06:15:46.147", "lastModified": "2024-11-21T08:39:52.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52486.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52486.json index f116b54102f..3da0d0d4b2f 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52486.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52486.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-11T18:15:16.427", "lastModified": "2024-11-21T08:39:52.863", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52499.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52499.json index 91914f3c914..b3f3198ccfd 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52499.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52499.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:47.057", "lastModified": "2024-11-21T08:39:54.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52500.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52500.json index 989921c0a58..743016cc84b 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52500.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52500.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:47.103", "lastModified": "2024-11-21T08:39:54.610", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52501.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52501.json index cb892fd9840..8efb9ea05f7 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52501.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52501.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:47.153", "lastModified": "2024-11-21T08:39:54.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52505.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52505.json index c76165e3c59..5e9cbf696b0 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52505.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52505.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:47.350", "lastModified": "2024-11-21T08:39:55.273", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52506.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52506.json index fdfa792ec64..89b0c82e3f0 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52506.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52506.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:47.390", "lastModified": "2024-11-21T08:39:55.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52507.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52507.json index 7098d03dff1..7ac6275cc17 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52507.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52507.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:47.443", "lastModified": "2024-11-21T08:39:55.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52517.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52517.json index 022e80327a3..e4b2150cd77 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52517.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52517.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:47.923", "lastModified": "2024-11-21T08:39:56.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52519.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52519.json index 6de55d23e33..3c6037d8c51 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52519.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52519.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.027", "lastModified": "2024-11-21T08:39:57.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52523.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52523.json index 615b9b216bc..18bd8e72bf9 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52523.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52523.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.213", "lastModified": "2024-11-21T08:39:57.693", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52524.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52524.json index df53dc2a0af..6355215d43a 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52524.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52524.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.263", "lastModified": "2024-11-21T08:39:57.813", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52525.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52525.json index 4c9ac040433..94bb2c17546 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52525.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52525.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.313", "lastModified": "2024-11-21T08:39:57.940", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52527.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52527.json index 35b0cdcf689..b00d5c1de0c 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52527.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52527.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.403", "lastModified": "2024-11-21T08:39:58.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52532.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52532.json index 573ae337362..2030d9871a6 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52532.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52532.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.660", "lastModified": "2024-11-21T08:39:58.847", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52547.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52547.json index c158d908f42..28e0200dafc 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52547.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52547.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-28T07:15:08.930", "lastModified": "2024-11-21T08:40:01.370", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52548.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52548.json index de9a3f32344..428c44e07b8 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52548.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52548.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-28T07:15:09.753", "lastModified": "2024-11-21T08:40:01.510", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52559.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52559.json index a8270a52722..5f5da84f657 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52559.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52559.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.700", "lastModified": "2024-11-21T08:40:03.650", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52562.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52562.json index d9a605ed16d..3246fb2cb54 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52562.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52562.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.843", "lastModified": "2024-11-21T08:40:04.087", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52569.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52569.json index 2d9f96a37ac..fb0de28dd2b 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52569.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52569.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:49.163", "lastModified": "2024-11-21T08:40:05.503", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52580.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52580.json index 8bf17825f4f..f84d20b014c 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52580.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52580.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:49.677", "lastModified": "2024-11-21T08:40:06.887", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52582.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52582.json index d5bf5e68539..2b880285c82 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52582.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52582.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:49.770", "lastModified": "2024-11-21T08:40:07.197", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52710.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52710.json index 31e15fe0fb8..c43ffd9f08d 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52710.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52710.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-28T07:15:10.100", "lastModified": "2024-11-21T08:40:24.760", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52711.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52711.json index f17be0b1614..161e40410a6 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52711.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52711.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-28T07:15:10.490", "lastModified": "2024-11-21T08:40:24.883", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52712.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52712.json index e2e6cf5cba4..1c81e8faec1 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52712.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52712.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-28T07:15:10.810", "lastModified": "2024-11-21T08:40:24.993", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52718.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52718.json index 8869983bf4e..e91139edf34 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52718.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52718.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T08:15:04.797", "lastModified": "2024-12-28T08:15:04.797", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52777.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52777.json index f771e302174..da0126a9bb2 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52777.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52777.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:16.747", "lastModified": "2024-11-21T08:40:34.063", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52859.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52859.json index 56937d70f15..dd43ca6fc70 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52859.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52859.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:22.933", "lastModified": "2024-11-21T08:40:44.387", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52953.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52953.json index aef09413be5..ab5230f7b8c 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52953.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52953.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:07.990", "lastModified": "2025-01-08T03:15:07.990", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path traversal vulnerability in the Medialibrary module\nImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Path Traversal en el m\u00f3dulo Medialibrary Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la integridad y la confidencialidad." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52954.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52954.json index 71221ac7811..beef1981d3b 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52954.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52954.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:08.130", "lastModified": "2025-01-08T03:15:08.130", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of improper permission control in the Gallery module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control de permisos indebido en el m\u00f3dulo Galer\u00eda Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52955.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52955.json index b997c27c6a5..8eb1128476a 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52955.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52955.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:08.263", "lastModified": "2025-01-08T03:15:08.263", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of improper authentication in the ANS system service module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autenticaci\u00f3n incorrecta en el m\u00f3dulo de servicio del sistema ANS Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6601.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6601.json index 02a61924e18..bde69358b65 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6601.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6601.json @@ -3,12 +3,16 @@ "sourceIdentifier": "patrick@puiterwijk.org", "published": "2025-01-06T17:15:14.217", "lastModified": "2025-01-06T17:15:14.217", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in FFmpeg's HLS demuxer. This vulnerability allows bypassing unsafe file extension checks and triggering arbitrary demuxers via base64-encoded data URIs appended with specific file extensions." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un fallo en FFmpeg's HLS demuxer. Esta vulnerabilidad permite eludir controles de extensi\u00f3n de archivos no seguros y activar demuxers arbitrarios a trav\u00e9s de URL de datos codificados en base64 con extensiones de archivo espec\u00edficas adjuntas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6602.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6602.json index 543d06b2fda..9b3a2adceea 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6602.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6602.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in FFmpeg's TTY Demuxer. This vulnerability allows possible data exfiltration via improper parsing of non-TTY-compliant input files in HLS playlists." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en FFmpeg's TTY Demuxer. Esta vulnerabilidad permite la posible exfiltraci\u00f3n de datos mediante el an\u00e1lisis incorrecto de archivos de entrada que no cumplen con los requisitos TTY en las listas de reproducci\u00f3n HLS." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6603.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6603.json index 1095081e50a..658908f2f21 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6603.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6603.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in FFmpeg's HLS playlist parsing. This vulnerability allows a denial of service via a maliciously crafted HLS playlist that triggers a null pointer dereference during initialization." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en FFmpeg's HLS playlist parsing. Esta vulnerabilidad permite una denegaci\u00f3n de servicio a trav\u00e9s de una lista de reproducci\u00f3n HLS manipulada con fines malintencionados que desencadena una desreferencia de puntero nulo durante la inicializaci\u00f3n." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6604.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6604.json index dea20fca82c..e7c1b3f5c93 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6604.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6604.json @@ -3,12 +3,16 @@ "sourceIdentifier": "patrick@puiterwijk.org", "published": "2025-01-06T17:15:14.413", "lastModified": "2025-01-06T17:15:14.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in FFmpeg. This vulnerability allows unexpected additional CPU load and storage consumption, potentially leading to degraded performance or denial of service via the demuxing of arbitrary data as XBIN-formatted data without proper format validation." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un fallo en FFmpeg. Esta vulnerabilidad permite una carga de CPU adicional inesperada y un consumo de almacenamiento adicional, lo que puede provocar una degradaci\u00f3n del rendimiento o la denegaci\u00f3n del servicio mediante la demultiplexaci\u00f3n de datos arbitrarios como datos con formato XBIN sin una validaci\u00f3n de formato adecuada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6605.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6605.json index 78d08c7385b..1b180e3584d 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6605.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6605.json @@ -3,12 +3,16 @@ "sourceIdentifier": "patrick@puiterwijk.org", "published": "2025-01-06T17:15:14.613", "lastModified": "2025-01-06T17:15:14.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in FFmpeg's DASH playlist support. This vulnerability allows arbitrary HTTP GET requests to be made on behalf of the machine running FFmpeg via a crafted DASH playlist containing malicious URLs." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un fallo en FFmpeg's DASH playlist support. Esta vulnerabilidad permite que se realicen solicitudes HTTP GET arbitrarias en nombre de la m\u00e1quina que ejecuta FFmpeg a trav\u00e9s de una lista de reproducci\u00f3n DASH dise\u00f1ada que contiene URL maliciosas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6841.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6841.json index 1e428a743ee..73d2e55d4c5 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6841.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6841.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7263.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7263.json index 2bce15fbce8..2ae16aec5db 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7263.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7263.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:19.580", "lastModified": "2024-12-28T07:15:19.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7266.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7266.json index 6fd8cd3dfe5..5bb978d473d 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7266.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7266.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:19.967", "lastModified": "2024-12-28T07:15:19.967", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0056.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0056.json index 677033ce4e3..5a4f5712a34 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0056.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0056.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0334.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0334.json index a6a66e02a19..5036bdee950 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0334.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0334.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-01T13:15:48.517", "lastModified": "2024-11-21T08:46:20.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0403.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0403.json index fdabff05390..e5be98ab80c 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0403.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0403.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "help@fluidattacks.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0588.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0588.json index b27b186f60f..2510e457feb 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0588.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0588.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:14.363", "lastModified": "2024-11-21T08:46:57.253", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0871.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0871.json index 5afeb9664cb..ce5cef8739f 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0871.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0871.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0983.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0983.json index 8257f4523a3..6df1f72090f 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0983.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0983.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0984.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0984.json index 99fb9dedd7c..d080c388f2a 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0984.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0984.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10033.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10033.json index 150d8ee40da..e07f04a9dcf 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10033.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10033.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json index 8da7e4e7744..a4ada132451 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -62,7 +62,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10102.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10102.json index 8f3842bf377..2d00220ecd3 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10102.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10102.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-07T06:15:13.730", "lastModified": "2025-01-07T17:15:17.017", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10106.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10106.json index 3fcc44b50e2..3e0d6d833a2 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10106.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10106.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@silabs.com", "published": "2025-01-09T15:15:12.770", "lastModified": "2025-01-09T15:15:12.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability in the packet handoff plugin allows an attacker to overwrite memory outside the plugin's buffer." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en el complemento de entrega de paquetes permite a un atacante sobrescribir la memoria fuera del b\u00fafer del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10151.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10151.json index 67542a20f63..d1659f1a038 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10151.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10151.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-08T06:15:14.343", "lastModified": "2025-01-08T16:15:33.753", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10215.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10215.json index 3d3df1f6ea2..be5aae74884 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10215.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10215.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T20:15:34.410", "lastModified": "2025-01-09T20:15:34.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WPBookit plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.6.4. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts." + }, + { + "lang": "es", + "value": "El complemento WPBookit para WordPress es vulnerable al cambio arbitrario de contrase\u00f1as de usuario en versiones hasta la 1.6.4 incluida. Esto se debe a que el complemento proporciona acceso controlado por el usuario a los objetos, lo que permite que un usuario eluda la autorizaci\u00f3n y acceda a los recursos del sistema. Esto hace posible que atacantes no autenticados cambien las contrase\u00f1as de los usuarios y potencialmente se apropien de las cuentas de administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json index 24e7b991c04..450cdad8e9e 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10393.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10393.json index 9d15eac6246..e913cfae7ce 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10393.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10393.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-11-21T11:15:16.040", "lastModified": "2024-11-21T13:57:24.187", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10400.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10400.json index c447e11efd4..47381765375 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10400.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10400.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-11-21T11:15:16.297", "lastModified": "2024-11-21T13:57:24.187", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10527.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10527.json index d2317d1c679..a7afed95f85 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10527.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10527.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:09.497", "lastModified": "2025-01-07T05:15:09.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Spacer plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the motech_spacer_callback() function in all versions up to, and including, 3.0.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view limited setting information." + }, + { + "lang": "es", + "value": "El complemento Spacer para WordPress es vulnerable al acceso no autorizado a los datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n motech_spacer_callback() en todas las versiones hasta la 3.0.7 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, vean informaci\u00f3n de configuraci\u00f3n limitada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10536.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10536.json index 1f66442b168..5e89c9ae895 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10536.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10536.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:13.920", "lastModified": "2025-01-07T06:15:13.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FancyPost \u2013 Best Ultimate Post Block, Post Grid, Layouts, Carousel, Slider For Gutenberg & Elementor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the handle_block_shortcode_export() function in all versions up to, and including, 6.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export shortcodes." + }, + { + "lang": "es", + "value": "El complemento FancyPost \u2013 Best Ultimate Post Block, Post Grid, Layouts, Carousel, Slider For Gutenberg y Elementor para WordPress es vulnerable al acceso no autorizado a los datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n handle_block_shortcode_export() en todas las versiones hasta la 6.0.0 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, exporten c\u00f3digos cortos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10562.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10562.json index 29ffc1aa9ff..4414d154f39 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10562.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10562.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-07T06:15:14.120", "lastModified": "2025-01-07T17:15:17.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10585.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10585.json index 8666b7db50a..1323a1756ff 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10585.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10585.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T06:15:15.677", "lastModified": "2025-01-08T06:15:15.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The InfiniteWP Client plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.13.0 via the 'historyID' parameter of the ~/debug-chart/index.php file. This makes it possible for unauthenticated attackers to read .txt files outside of the intended directory." + }, + { + "lang": "es", + "value": "El complemento InfiniteWP Client para WordPress es vulnerable a Path Traversal en todas las versiones hasta la 1.13.0 incluida a trav\u00e9s del par\u00e1metro 'historyID' del archivo ~/debug-chart/index.php. Esto permite que atacantes no autenticados lean archivos .txt fuera del directorio previsto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10815.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10815.json index 40728e09df2..5bce1cf5be8 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10815.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10815.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:14.533", "lastModified": "2025-01-09T16:15:35.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10866.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10866.json index f10be672685..ad20c9c9d3c 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10866.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10866.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T08:15:23.060", "lastModified": "2025-01-07T08:15:23.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Export Import Menus plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the dsp_export_import_menus() function in all versions up to, and including, 1.9.1. This makes it possible for unauthenticated attackers to export menu data and settings." + }, + { + "lang": "es", + "value": "El complemento Export Import Menus para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n dsp_export_import_menus() en todas las versiones hasta la 1.9.1 incluida. Esto permite que atacantes no autenticados exporten datos y configuraciones de men\u00fas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10932.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10932.json index bce53e74854..92f70dc0d39 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10932.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10932.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-04T08:15:05.713", "lastModified": "2025-01-04T08:15:05.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Backup Migration plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.6 via deserialization of untrusted input in the 'recursive_unserialize_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must create a staging site in order to trigger the exploit." + }, + { + "lang": "es", + "value": "El complemento Backup Migration para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 1.4.6 incluida, a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables en la funci\u00f3n 'recursive_unserialize_replace'. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. La presencia adicional de una cadena POP permite a los atacantes eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo. Un administrador debe crear un sitio de prueba para activar el exploit." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10957.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10957.json index d6ddec6b71e..07f1d39370b 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10957.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10957.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The UpdraftPlus: WP Backup & Migration Plugin plugin for WordPress is vulnerable to PHP Object Injection in all versions from 1.23.8 to 1.24.11 via deserialization of untrusted input in the 'recursive_unserialized_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. An administrator must perform a search and replace action to trigger the exploit." + }, + { + "lang": "es", + "value": "El complemento UpdraftPlus: WP Backup y Migration Plugin para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones desde la 1.23.8 hasta la 1.24.11 a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables en la funci\u00f3n 'recursive_unserialized_replace'. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. No hay ninguna cadena POP conocida presente en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que otro complemento o tema que contenga una cadena POP est\u00e9 instalado en el sitio. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo seg\u00fan la cadena POP presente. Un administrador debe realizar una acci\u00f3n de b\u00fasqueda y reemplazo para activar el exploit." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10966.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10966.json index 058eb5c9bd3..204db9c0e34 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10966.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10966.json @@ -131,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1089.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1089.json index cff5021dde5..fababaa284b 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1089.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1089.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1090.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1090.json index 2708d0fbbf1..9e0154cb909 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1090.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1090.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1091.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1091.json index 29f40e69559..2c001f5ee74 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1091.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1091.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1093.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1093.json index 97192cd46f7..565df5c41bb 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1093.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1093.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11004.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11004.json index 2b481a2d77d..909260413c1 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11004.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11004.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-11-12T17:15:06.943", "lastModified": "2024-11-21T17:15:10.277", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11157.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11157.json index 25b3b9dd773..05ed6940d01 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11157.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11157.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-12-19T21:15:07.283", "lastModified": "2024-12-19T21:15:07.283", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11270.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11270.json index 84226a90961..0d8d02a876b 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11270.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11270.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T05:15:07.783", "lastModified": "2025-01-08T05:15:07.783", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordPress Webinar Plugin \u2013 WebinarPress plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the 'sync-import-imgs' function and missing file type validation in all versions up to, and including, 1.33.24. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary files that can lead to remote code execution." + }, + { + "lang": "es", + "value": "El complemento WordPress Webinar Plugin \u2013 WebinarPress para WordPress, es vulnerable a la creaci\u00f3n arbitraria de archivos debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n 'sync-import-imgs' y a la falta de validaci\u00f3n del tipo de archivo en todas las versiones hasta la 1.33.24 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, creen archivos arbitrarios que pueden provocar la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11271.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11271.json index b72f476e0ca..c0172c8a803 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11271.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11271.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T05:15:09.273", "lastModified": "2025-01-08T05:15:09.273", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordPress Webinar Plugin \u2013 WebinarPress plugin for WordPress is vulnerable to modification of data due to a missing capability check on several functions in all versions up to, and including, 1.33.24. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify webinars." + }, + { + "lang": "es", + "value": "El complemento WordPress Webinar Plugin \u2013 WebinarPress para WordPress es vulnerable a la modificaci\u00f3n de datos debido a la falta de comprobaci\u00f3n de capacidad en varias funciones en todas las versiones hasta la 1.33.24 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, modifiquen los seminarios web." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11282.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11282.json index b18d1f8c80e..2e1a58f2ebb 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11282.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11282.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T07:15:25.293", "lastModified": "2025-01-07T07:15:25.293", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Passster \u2013 Password Protect Pages and Content plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.10 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator." + }, + { + "lang": "es", + "value": "El complemento Passster \u2013 Password Protect Pages y Content para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 4.2.10 incluida a trav\u00e9s de la funci\u00f3n de b\u00fasqueda principal de WordPress. Esto permite que atacantes no autenticados extraigan datos confidenciales de publicaciones que han sido restringidas a roles de nivel superior, como el de administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11290.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11290.json index a494bf9aa5f..3d5d7111382 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11290.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11290.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:11.117", "lastModified": "2025-01-07T05:15:11.117", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Member Access plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.1.6 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator." + }, + { + "lang": "es", + "value": "El complemento Member Access para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.1.6 incluida a trav\u00e9s de la funci\u00f3n de b\u00fasqueda principal de WordPress. Esto permite que atacantes no autenticados extraigan datos confidenciales de publicaciones que se han restringido a roles de nivel superior, como el de administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11328.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11328.json index 1d37a175ae5..eef29de547c 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11328.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11328.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:08.717", "lastModified": "2025-01-09T11:15:08.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CLUEVO LMS, E-Learning Platform plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.13.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento CLUEVO LMS, E-Learning Platform para WordPress es vulnerable a Cross-Site Scripting reflejado debido al uso de add_query_arg y remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 1.13.2 incluida. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11337.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11337.json index cefe94e9bbe..3c925e17d92 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11337.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11337.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:11.320", "lastModified": "2025-01-07T05:15:11.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Horoscope And Tarot plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'divine_horoscope' shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Horoscope And Tarot para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'divine_horoscope' del complemento en todas las versiones hasta la 1.3.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11338.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11338.json index b418c70f918..9c69df6c70a 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11338.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11338.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:11.520", "lastModified": "2025-01-07T05:15:11.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The PIXNET Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'gtm' and 'venue' parameters in all versions up to, and including, 2.9.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento PIXNET Plugin para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s de los par\u00e1metros 'gtm' y 'venue' en todas las versiones hasta la 2.9.10 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11350.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11350.json index 31b37ab98ef..2c89cb59575 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11350.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11350.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T09:15:06.460", "lastModified": "2025-01-08T09:15:06.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AdForest theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 5.1.6. This is due to the plugin not properly validating a user's identity prior to updating their password through the adforest_reset_password() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account." + }, + { + "lang": "es", + "value": "El tema AdForest para WordPress es vulnerable a la escalada de privilegios mediante la apropiaci\u00f3n de cuentas en todas las versiones hasta la 5.1.6 incluida. Esto se debe a que el complemento no valida correctamente la identidad de un usuario antes de actualizar su contrase\u00f1a a trav\u00e9s de la funci\u00f3n adforest_reset_password(). Esto hace posible que atacantes no autenticados cambien las contrase\u00f1as de usuarios arbitrarios, incluidos los administradores, y aprovechen esa posibilidad para obtener acceso a sus cuentas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11356.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11356.json index 1758aa67892..a257f3e837f 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11356.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11356.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-06T06:15:06.177", "lastModified": "2025-01-06T14:15:07.233", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The tourmaster WordPress plugin before 5.3.4 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated users to perform Cross-Site Scripting attacks." + }, + { + "lang": "es", + "value": "El complemento tourmaster para WordPress anterior a la versi\u00f3n 5.3.4 no desinfecta ni escapa algunos par\u00e1metros al mostrarlos en la p\u00e1gina, lo que podr\u00eda permitir que usuarios no autenticados realicen ataques de Cross-Site Scripting." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11363.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11363.json index 03e12c42f91..162950272a6 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11363.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11363.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:11.713", "lastModified": "2025-01-07T05:15:11.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Same but Different \u2013 Related Posts by Taxonomy plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Same but Different \u2013 Related Posts de Taxonomy para WordPress es vulnerable a Cross-Site Scripting reflejado debido al uso de add_query_arg y remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 1.0.16 incluida. Esto hace posible que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11364.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11364.json index bef60e31b5e..f108162949a 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11364.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11364.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-12-19T21:15:07.427", "lastModified": "2024-12-19T21:15:07.427", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11369.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11369.json index 2f2e1365dbe..29bf0e29f0a 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11369.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11369.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:14.233", "lastModified": "2025-01-07T06:15:14.233", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Store credit / Gift cards for woocommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'coupon', 'start_date', and 'end_date' parameters in all versions up to, and including, 1.0.49.46 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Store credit / Gift cards para woocommerce para WordPress es vulnerable a cross site scripting reflejado a trav\u00e9s de los par\u00e1metros 'coupon', 'start_date' y 'end_date' en todas las versiones hasta la 1.0.49.46 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11375.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11375.json index 3252fa85987..b1fa662a8d8 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11375.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11375.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:11.907", "lastModified": "2025-01-07T05:15:11.907", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WC1C plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.23.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WC1C para WordPress es vulnerable a ataques Cross-Site Scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 0.23.0 incluida. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11377.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11377.json index c55a0886afb..a292dbbd04a 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11377.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11377.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:12.083", "lastModified": "2025-01-07T05:15:12.083", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Automate Hub Free by Sperse.IO plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'id' parameter in all versions up to, and including, 1.7.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Automate Hub Free de Sperse.IO para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'id' en todas las versiones hasta la 1.7.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11378.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11378.json index d7cd162564d..38e179508a2 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11378.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11378.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:12.270", "lastModified": "2025-01-07T05:15:12.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Bizapp for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'error' parameter in all versions up to, and including, 2.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Bizapp para WooCommerce para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'error' en todas las versiones hasta la 2.0.8 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11382.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11382.json index 7517415ecf3..b7cb475c4c4 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11382.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11382.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:12.457", "lastModified": "2025-01-07T05:15:12.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Common Ninja: Fully Customizable & Perfectly Responsive Free Widgets for WordPress Websites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'commonninja' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Common Ninja: Fully Customizable y Perfectly Responsive Free Widgets para WordPress Websites para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo corto 'commonninja' del complemento en todas las versiones hasta la 1.1.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11383.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11383.json index 3be1c688866..79e348f9678 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11383.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11383.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:12.650", "lastModified": "2025-01-07T05:15:12.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CC Canadian Mortgage Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'cc-mortgage-canada' shortcode in all versions up to, and including, 2.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento CC Canadian Mortgage Calculator para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado \"cc-mortgage-canada\" del complemento en todas las versiones hasta la 2.1.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11423.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11423.json index 35a9d53d42d..cfa4eb936c2 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11423.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11423.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T11:15:06.003", "lastModified": "2025-01-08T11:15:06.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ultimate Gift Cards for WooCommerce \u2013 Create WooCommerce Gift Cards, Gift Vouchers, Redeem & Manage Digital Gift Coupons. Offer Gift Certificates, Schedule Gift Cards, and Use Advance Coupons With Personalized Templates plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several REST API endpoints such as /wp-json/gifting/recharge-giftcard in all versions up to, and including, 3.0.6. This makes it possible for unauthenticated attackers to recharge a gift card balance, without making a payment along with reducing gift card balances without purchasing anything." + }, + { + "lang": "es", + "value": "El complemento Ultimate Gift Cards para WooCommerce \u2013 Create WooCommerce Gift Cards, Gift Vouchers, Redeem y Manage Digital Gift Coupons. Offer Gift Certificates, Schedule Gift Cards, y Use Advance Coupons With Personalized Templates para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en varios endpoints de API REST como /wp-json/gifting/recharge-giftcard en todas las versiones hasta la 3.0.6 incluida. Esto hace posible que atacantes no autenticados recarguen el saldo de una tarjeta de regalo, sin realizar un pago, junto con la reducci\u00f3n de los saldos de las tarjetas de regalo sin comprar nada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11434.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11434.json index 7547d74238e..b90ec0ed0ab 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11434.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11434.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:12.873", "lastModified": "2025-01-07T05:15:12.873", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP \u2013 Bulk SMS \u2013 by SMS.to plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.0.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WP \u2013 Bulk SMS \u2013 de SMS.to para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'page' en todas las versiones hasta la 1.0.12 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11437.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11437.json index 04ec453a387..d2f92b2ea31 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11437.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11437.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:06.150", "lastModified": "2025-01-07T04:15:06.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Timeline Designer plugin for WordPress is vulnerable to SQL Injection via the 's' parameter in all versions up to, and including, 1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Timeline Designer para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 's' en todas las versiones hasta la 1.4 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11445.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11445.json index 019356ff93e..5e0f1668c53 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11445.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11445.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:13.077", "lastModified": "2025-01-07T05:15:13.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Image Magnify plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'image_magnify' shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Image Magnify para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'image_magnify' del complemento en todas las versiones hasta la 1.1 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11465.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11465.json index 75a47042c21..3af2508cd85 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11465.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11465.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:13.287", "lastModified": "2025-01-07T05:15:13.287", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Custom Product Tabs for WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.8.5 via deserialization of untrusted input in the 'yikes_woo_products_tabs' post meta parameter. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento Custom Product Tabs para WooCommerce para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 1.8.5 incluida, a trav\u00e9s de la deserializaci\u00f3n de una entrada no confiable en el par\u00e1metro meta de la publicaci\u00f3n 'yikes_woo_products_tabs'. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador de tienda y superior, inyecten un objeto PHP. No hay ninguna cadena POP presente en el software vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11496.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11496.json index cbac48eeec1..ba1f1599185 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11496.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11496.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:13.480", "lastModified": "2025-01-07T05:15:13.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Infility Global plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the infility_global_ajax function in all versions up to, and including, 2.9.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update plugin options and potentially break the site." + }, + { + "lang": "es", + "value": "El complemento Infility Global para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n infility_global_ajax en todas las versiones hasta la 2.9.8 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, actualicen las opciones del complemento y potencialmente da\u00f1en el sitio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-115xx/CVE-2024-11512.json b/CVE-2024/CVE-2024-115xx/CVE-2024-11512.json index 122b01745be..469d2789f10 100644 --- a/CVE-2024/CVE-2024-115xx/CVE-2024-11512.json +++ b/CVE-2024/CVE-2024-115xx/CVE-2024-11512.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-115xx/CVE-2024-11577.json b/CVE-2024/CVE-2024-115xx/CVE-2024-11577.json index 02d4f699bcb..a153d92a992 100644 --- a/CVE-2024/CVE-2024-115xx/CVE-2024-11577.json +++ b/CVE-2024/CVE-2024-115xx/CVE-2024-11577.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-115xx/CVE-2024-11579.json b/CVE-2024/CVE-2024-115xx/CVE-2024-11579.json index 024e53ecc77..86022db73ee 100644 --- a/CVE-2024/CVE-2024-115xx/CVE-2024-11579.json +++ b/CVE-2024/CVE-2024-115xx/CVE-2024-11579.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-115xx/CVE-2024-11581.json b/CVE-2024/CVE-2024-115xx/CVE-2024-11581.json index cd0c476f594..b5e03afb2cf 100644 --- a/CVE-2024/CVE-2024-115xx/CVE-2024-11581.json +++ b/CVE-2024/CVE-2024-115xx/CVE-2024-11581.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11606.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11606.json index 39037a90c6b..ce7773b232e 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11606.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11606.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-07T06:15:14.427", "lastModified": "2025-01-07T17:15:18.253", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11613.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11613.json index fac81a71860..2aaf37113d0 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11613.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11613.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T07:15:26.407", "lastModified": "2025-01-08T07:15:26.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server." + }, + { + "lang": "es", + "value": "El complemento WordPress File Upload para WordPress es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo, la lectura arbitraria de archivos y la eliminaci\u00f3n arbitraria de archivos en todas las versiones hasta la 4.24.15 incluida a trav\u00e9s del archivo 'wfu_file_downloader.php'. Esto se debe a la falta de una desinfecci\u00f3n adecuada del par\u00e1metro 'source' y a que se permite una ruta de directorio definida por el usuario. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digo en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11625.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11625.json index 1d7ec4667a6..10b10fcd859 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11625.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11625.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@progress.com", "published": "2025-01-07T08:15:24.447", "lastModified": "2025-01-07T09:15:06.560", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information Exposure Through an Error Message vulnerability in Progress Software Corporation Sitefinity.This issue affects Sitefinity: from 4.0 through 14.4.8142, from 15.0.8200 through 15.0.8229, from 15.1.8300 through 15.1.8327, from 15.2.8400 through 15.2.8421." + }, + { + "lang": "es", + "value": "Vulnerabilidad de exposici\u00f3n de informaci\u00f3n a trav\u00e9s de un mensaje de error en Sitefinity de Progress Software Corporation. Este problema afecta a Sitefinity: desde la versi\u00f3n 4.0 hasta la 14.4.8142, desde la versi\u00f3n 15.0.8200 hasta la 15.0.8229, desde la versi\u00f3n 15.1.8300 hasta la 15.1.8327, desde la versi\u00f3n 15.2.8400 hasta la 15.2.8421." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11626.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11626.json index 5cc2674a889..55fe233e3ec 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11626.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11626.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@progress.com", "published": "2025-01-07T08:15:24.613", "lastModified": "2025-01-07T09:15:07.533", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During CMS Backend (adminstrative section) Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Progress Sitefinity.This issue affects Sitefinity: from 4.0 through 14.4.8142, from 15.0.8200 through 15.0.8229, from 15.1.8300 through 15.1.8327, from 15.2.8400 through 15.2.8421." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web del backend de CMS (secci\u00f3n administrativa) (XSS o 'Cross-site Scripting') en Progress Sitefinity. Este problema afecta a Sitefinity: desde la versi\u00f3n 4.0 hasta la 14.4.8142, desde la versi\u00f3n 15.0.8200 hasta la 15.0.8229, desde la versi\u00f3n 15.1.8300 hasta la 15.1.8327, desde la versi\u00f3n 15.2.8400 hasta la 15.2.8421." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11627.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11627.json index f18571386d0..1e7eded2560 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11627.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11627.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@progress.com", "published": "2025-01-07T08:15:24.773", "lastModified": "2025-01-07T09:15:07.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ": Insufficient Session Expiration vulnerability in Progress Sitefinity allows : Session Fixation.This issue affects Sitefinity: from 4.0 through 14.4.8142, from 15.0.8200 through 15.0.8229, from 15.1.8300 through 15.1.8327,\u00a0from 15.2.8400 through 15.2.8421." + }, + { + "lang": "es", + "value": "La vulnerabilidad de expiraci\u00f3n de sesi\u00f3n insuficiente en Progress Sitefinity permite: fijaci\u00f3n de sesi\u00f3n. Este problema afecta a Sitefinity: desde la versi\u00f3n 4.0 hasta la 14.4.8142, desde la versi\u00f3n 15.0.8200 hasta la 15.0.8229, desde la versi\u00f3n 15.1.8300 hasta la 15.1.8327, desde la versi\u00f3n 15.2.8400 hasta la 15.2.8421." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11633.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11633.json index 81c5095e5ce..dfc08b791df 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11633.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11633.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-12-10T19:15:19.443", "lastModified": "2024-12-10T19:15:19.443", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11634.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11634.json index 9d171b04410..56ca2b730b9 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11634.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11634.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-12-10T19:15:19.570", "lastModified": "2024-12-10T19:15:19.570", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11635.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11635.json index 5eda97f5499..f459421084c 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11635.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11635.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T08:15:24.117", "lastModified": "2025-01-08T08:15:24.117", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server." + }, + { + "lang": "es", + "value": "El complemento WordPress File Upload para WordPress es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo en todas las versiones hasta la 4.24.12 incluida a trav\u00e9s del par\u00e1metro de cookie 'wfu_ABSPATH'. Esto permite que atacantes no autenticados ejecuten c\u00f3digo en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11642.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11642.json index 495b83e00ce..1138c46a880 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11642.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11642.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:10.187", "lastModified": "2025-01-09T11:15:10.187", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Post Grid Master \u2013 Custom Post Types, Taxonomies & Ajax Filter Everything with Infinite Scroll, Load More, Pagination & Shortcode Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.4.12 via the 'locate_template' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included. The file included must have a .php extension." + }, + { + "lang": "es", + "value": "El complemento Post Grid Master \u2013 Custom Post Types, Taxonomies y Ajax Filter Everything with Infinite Scroll, Load More, Pagination y Shortcode Builder para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 3.4.12 incluida a trav\u00e9s de la funci\u00f3n 'locate_template'. Esto hace posible que atacantes no autenticados incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\". El archivo incluido debe tener una extensi\u00f3n .php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11681.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11681.json index bd122e2dbf6..54aa1f1c3f5 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11681.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11681.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@google.com", "published": "2025-01-07T15:15:09.207", "lastModified": "2025-01-07T16:15:32.097", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious or compromised MacPorts mirror can execute arbitrary commands as root\u00a0on the machine of a client running port selfupdate\u00a0against the mirror." + }, + { + "lang": "es", + "value": "Un espejo MacPorts malintencionado o comprometido puede ejecutar comandos arbitrarios como superusuario en la m\u00e1quina de un cliente que ejecuta la actualizaci\u00f3n autom\u00e1tica de puertos contra el espejo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11686.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11686.json index 4a005d89a89..47a421ddb7a 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11686.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11686.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:10.447", "lastModified": "2025-01-09T11:15:10.447", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WhatsApp \ud83d\ude80 click to chat plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'manycontacts_code' parameter in all versions up to, and including, 3.0.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WhatsApp ? click para chat para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'manycontacts_code' en todas las versiones hasta la 3.0.4 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11690.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11690.json index f0d6a0abb92..aa238adba16 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11690.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11690.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:13.677", "lastModified": "2025-01-07T05:15:13.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Financial Stocks & Crypto Market Data Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'e' parameter in all versions up to, and including, 1.10.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Financial Stocks y Crypto Market Data Plugin para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro \"e\" en todas las versiones hasta la 1.10.3 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11725.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11725.json index 5ec2970b344..b6df44f7b8c 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11725.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11725.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T07:15:26.713", "lastModified": "2025-01-07T07:15:26.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SMS Alert Order Notifications \u2013 WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the updateWcWarrantySettings() function in all versions up to, and including, 3.7.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. Please note this requires the woocommerce-warranty plugin to be installed in order to be exploited." + }, + { + "lang": "es", + "value": "El complemento de WooCommerce para WordPress, Notificaciones de pedidos por SMS y alertas, es vulnerable a modificaciones no autorizadas de datos que pueden provocar una escalada de privilegios debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n updateWcWarrantySettings() en todas las versiones hasta la 3.7.6 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen opciones arbitrarias en el sitio de WordPress. Esto se puede aprovechar para actualizar la funci\u00f3n predeterminada de registro a administrador y habilitar el registro de usuarios para que los atacantes obtengan acceso de usuario administrativo a un sitio vulnerable. Tenga en cuenta que esto requiere que el complemento woocommerce-warranty est\u00e9 instalado para poder explotarlo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11733.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11733.json index 883ebe08324..fcc3a1469ab 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11733.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11733.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-03T23:15:06.313", "lastModified": "2025-01-03T23:15:06.313", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The WordPress Popular Posts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 7.1.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El complemento WordPress Popular Posts para WordPress es vulnerable a la ejecuci\u00f3n de c\u00f3digos cortos arbitrarios en todas las versiones hasta la 7.1.0 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11749.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11749.json index c11073f4115..3db957aad87 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11749.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11749.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:14.713", "lastModified": "2025-01-07T06:15:14.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The App Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'appizy' shortcode in all versions up to, and including, 2.3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento App Embed para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo corto 'appizy' del complemento en todas las versiones hasta la 2.3.2 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11756.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11756.json index d0aa726f9be..f4416ed1325 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11756.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11756.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:14.943", "lastModified": "2025-01-07T06:15:14.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SweepWidget Contests, Giveaways, Photo Contests, Competitions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sweepwidget' shortcode in all versions up to, and including, 2.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento SweepWidget Contests, Giveaways, Photo Contests, Competitions para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo corto 'sweepwidget' del complemento en todas las versiones hasta la 2.0.6 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11764.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11764.json index bd0a061a5f5..5f65c310a79 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11764.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11764.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T07:15:26.927", "lastModified": "2025-01-07T07:15:26.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Solar Wizard Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'solar_wizard' shortcode in all versions up to, and including, 1.2.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Solar Wizard Lite para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'solar_wizard' del complemento en todas las versiones hasta la 1.2.4 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11777.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11777.json index 0a3484e5591..aebfb1f78aa 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11777.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11777.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:07.200", "lastModified": "2025-01-07T04:15:07.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Sell Media plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sell_media_search_form_gutenberg' shortcode in all versions up to, and including, 2.5.8.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Sell Media para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'sell_media_search_form_gutenberg' del complemento en todas las versiones hasta la 2.5.8.5 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11810.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11810.json index a4c1a67dd81..e3cb9a857ea 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11810.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11810.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:13.883", "lastModified": "2025-01-07T05:15:13.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The PayGreen Payment Gateway plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'message_id' parameter in all versions up to, and including, 1.0.26 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento PayGreen Payment Gateway para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'message_id' en todas las versiones hasta la 1.0.26 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11815.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11815.json index 3f52be14664..70acdd76540 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11815.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11815.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:10.770", "lastModified": "2025-01-09T11:15:10.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The P\u00f3sturinn\\'s Shipping with WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the printed_marked and nonprinted_marked parameters in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento P\u00f3sturinn\\'s Shipping with WooCommerce para WordPress es vulnerable a ataques de Cross Site Scripting reflejado a trav\u00e9s de los par\u00e1metros printed_marked y nonprinted_marked en todas las versiones hasta la 1.3.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11816.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11816.json index 2d2af593c39..2dc0d5ecdd7 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11816.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11816.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T04:15:06.380", "lastModified": "2025-01-08T04:15:06.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to Remote Code Execution in version 3.0.11. This is due to a missing capability check on the 'wpext_handle_snippet_update' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute code on the server providing an admin has created at least one code snippet." + }, + { + "lang": "es", + "value": "El complemento Ultimate WordPress Toolkit \u2013 WP Extended para WordPress es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo en la versi\u00f3n 3.0.11. Esto se debe a una comprobaci\u00f3n de capacidad faltante en la funci\u00f3n 'wpext_handle_snippet_update'. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, ejecuten c\u00f3digo en el servidor siempre que un administrador haya creado al menos un fragmento de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11826.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11826.json index be123171e43..063756da15a 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11826.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11826.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T12:15:23.200", "lastModified": "2025-01-07T12:15:23.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Quill Forms | The Best Typeform Alternative | Create Conversational Multi Step Form, Survey, Quiz, Cost Estimation or Donation Form on WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'quillforms-popup' shortcode in all versions up to, and including, 3.10.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Quill Forms | The Best Typeform Alternative | Create Conversational Multi Step Form, Survey, Quiz, Cost Estimation or Donation Form on WordPress para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'quillforms-popup' del complemento en todas las versiones hasta la 3.10.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11830.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11830.json index 02f403bbd4a..200824b53eb 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11830.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11830.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T11:15:06.443", "lastModified": "2025-01-08T11:15:06.443", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The PDF Flipbook, 3D Flipbook\u2014DearFlip plugin for WordPress is vulnerable to Stored Cross-Site Scripting via outline settings in all versions up to 2.3.52 due to insufficient input sanitization and output escaping on user-supplied data. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento PDF Flipbook, 3D Flipbook\u2014DearFlip para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de configuraciones de esquema en todas las versiones hasta la 2.3.52 debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los datos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11849.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11849.json index 2739dd23fb4..ef8b67a3f55 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11849.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11849.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-06T06:15:06.390", "lastModified": "2025-01-06T14:15:07.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Pods WordPress plugin before 3.2.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Pods de WordPress anterior a la versi\u00f3n 3.2.8.1 no desinfecta ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11868.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11868.json index 35d2b54a2e9..b0db3695ee2 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11868.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11868.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-12-10T13:15:15.973", "lastModified": "2024-12-10T13:15:15.973", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11887.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11887.json index 3883fd86832..b9c13508c73 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11887.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11887.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:15.147", "lastModified": "2025-01-07T06:15:15.147", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Geo Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'geotargetlygeocontent' shortcode in all versions up to, and including, 6.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Geo Content para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'geotargetlygeocontent' del complemento en todas las versiones hasta la 6.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11899.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11899.json index 1cb5a25cfcf..ec1e151516e 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11899.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11899.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:07.350", "lastModified": "2025-01-07T04:15:07.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Slider Pro Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sliderpro' shortcode in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Slider Pro Lite para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo corto 'sliderpro' del complemento en todas las versiones hasta la 1.4.1 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11907.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11907.json index 50b49edf0fa..99cb6aab476 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11907.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11907.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:11.240", "lastModified": "2025-01-09T11:15:11.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Skyword API Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'skyword_iframe' shortcode in all versions up to, and including, 2.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Skyword API Plugin para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'skyword_iframe' del complemento en todas las versiones hasta la 2.5.2 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11916.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11916.json index a90c7f7de4b..2b808a9814b 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11916.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11916.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T04:15:06.537", "lastModified": "2025-01-08T04:15:06.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to unauthorized modification and retrieval of data due to a missing capability check on several functions in all versions up to, and including, 3.0.11. This makes it possible for authenticated attackers, with subscriber-level access and above, to import and activate arbitrary code snippets along with" + }, + { + "lang": "es", + "value": "El complemento The Ultimate WordPress Toolkit \u2013 WP Extended para WordPress es vulnerable a modificaciones y recuperaciones de datos no autorizadas debido a una verificaci\u00f3n de capacidad faltante en varias funciones en todas las versiones hasta la 3.0.11 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, importen y activen fragmentos de c\u00f3digo arbitrarios junto con" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11929.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11929.json index ae76d4e1157..a9a0bb8f178 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11929.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11929.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:11.447", "lastModified": "2025-01-09T11:15:11.447", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Responsive FlipBook Plugin Wordpress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the rfbwp_save_settings() functionin all versions up to, and including, 2.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Responsive FlipBook Plugin de Wordpress para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de la funci\u00f3n rfbwp_save_settings() en todas las versiones hasta la 2.5.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11930.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11930.json index 35041e300e7..59f8172b372 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11930.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11930.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-04T09:15:05.880", "lastModified": "2025-01-04T09:15:05.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Taskbuilder \u2013 WordPress Project & Task Management plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wppm_tasks shortcode in all versions up to, and including, 3.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Taskbuilder \u2013 WordPress Project y Task Management para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo corto wppm_tasks del complemento en todas las versiones hasta la 3.0.6 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11934.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11934.json index fa2abf92269..cdf7591827f 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11934.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11934.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:07.520", "lastModified": "2025-01-07T04:15:07.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Formaloo Form Maker & Customer Analytics for WordPress & WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018address\u2019 parameter in all versions up to, and including, 2.1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Formaloo Form Maker y Customer Analytics para WordPress y WooCommerce para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del par\u00e1metro 'address' en todas las versiones hasta la 2.1.3.2 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11939.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11939.json index 2218699af47..000bcf7fe44 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11939.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11939.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T09:15:06.630", "lastModified": "2025-01-08T09:15:06.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Cost Calculator Builder PRO plugin for WordPress is vulnerable to blind time-based SQL Injection via the \u2018data\u2019 parameter in all versions up to, and including, 3.2.15 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Cost Calculator Builder PRO para WordPress es vulnerable a la inyecci\u00f3n SQL a ciegas basada en tiempo a trav\u00e9s del par\u00e1metro 'data' en todas las versiones hasta la 3.2.15 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11974.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11974.json index bd4e8d1880b..27cc3362778 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11974.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11974.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-04T08:15:05.950", "lastModified": "2025-01-04T08:15:05.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Media Library Assistant plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018smc_settings_tab', 'unattachfixit-action', and 'woofixit-action\u2019 parameters in all versions up to, and including, 3.23 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Media Library Assistant para WordPress es vulnerable a ataques de cross site scripting reflejado a trav\u00e9s de los par\u00e1metros 'smc_settings_tab', 'unattachfixit-action' y 'woofixit-action' en todas las versiones hasta la 3.23 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1123.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1123.json index 39cc3479ad9..4436cc1b0c2 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1123.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1123.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-09T07:15:07.233", "lastModified": "2024-11-21T08:49:51.077", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1124.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1124.json index 6282783cee6..674214dbdcb 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1124.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1124.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-09T07:15:08.000", "lastModified": "2024-11-21T08:49:51.203", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1125.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1125.json index 910efde3945..751bb22d6a2 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1125.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1125.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-09T07:15:08.313", "lastModified": "2024-11-21T08:49:51.320", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1126.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1126.json index 32cc14a6973..c692781873b 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1126.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1126.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:17.267", "lastModified": "2024-11-21T08:49:51.430", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1127.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1127.json index d8e031d84b1..958e6e1edb5 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1127.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1127.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:17.507", "lastModified": "2024-11-21T08:49:51.547", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1128.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1128.json index b99ed1257b0..3952cc5494f 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1128.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1128.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:40.793", "lastModified": "2024-11-21T08:49:51.657", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1133.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1133.json index 680803f93fe..c912426c108 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1133.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1133.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:41.283", "lastModified": "2024-11-21T08:49:52.210", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1191.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1191.json index eb2c58a824e..2263826851a 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1191.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1191.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12022.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12022.json index 7d28cf2f248..b7baa577962 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12022.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12022.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:07.677", "lastModified": "2025-01-07T04:15:07.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Menu Image plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wmi_delete_img_menu' function in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to delete images from menus." + }, + { + "lang": "es", + "value": "El complemento WP Menu Image para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'wmi_delete_img_menu' en todas las versiones hasta la 2.2 incluida. Esto hace posible que atacantes no autenticados eliminen im\u00e1genes de los men\u00fas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12030.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12030.json index d893b7245bb..20cabe1df6c 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12030.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12030.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T05:15:09.510", "lastModified": "2025-01-08T05:15:09.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MDTF \u2013 Meta Data and Taxonomies Filter plugin for WordPress is vulnerable to SQL Injection via the 'key' attribute of the 'mdf_value' shortcode in all versions up to, and including, 1.3.3.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento MDTF \u2013 Meta Data y Taxonomies Filter para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del atributo 'key' del shortcode 'mdf_value' en todas las versiones hasta la 1.3.3.5 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12033.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12033.json index 078f5970c8f..3b3e243e844 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12033.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12033.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T12:15:23.900", "lastModified": "2025-01-07T12:15:23.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Jupiter X Core plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the sync_libraries() function in all versions up to, and including, 4.8.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to sync libraries" + }, + { + "lang": "es", + "value": "El complemento Jupiter X Core para WordPress es vulnerable al acceso no autorizado debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n sync_libraries() en todas las versiones hasta la 4.8.5 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, sincronicen librer\u00edas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12045.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12045.json index 7e5f0b95fe6..45154443933 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12045.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12045.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T08:15:24.683", "lastModified": "2025-01-08T08:15:24.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Essential Blocks \u2013 Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the maker title value of the Google Maps block in all versions up to, and including, 5.0.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Essential Blocks \u2013 Page Builder Gutenberg Blocks, Patterns y Templates para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del valor del t\u00edtulo del creador del bloque Google Maps en todas las versiones hasta la 5.0.9 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de administrador, inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones donde se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12047.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12047.json index d91e9008435..229c5762469 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12047.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12047.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-04T08:15:06.157", "lastModified": "2025-01-04T08:15:06.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Compress \u2013 Instant Performance & Speed Optimization plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018custom_server\u2019 parameter in all versions up to, and including, 6.30.03 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WP Compress \u2013 Instant Performance y Speed Optimization para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'custom_server' en todas las versiones hasta la 6.30.03 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12049.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12049.json index 73f52c4bf68..5e7eba7f564 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12049.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12049.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:14.147", "lastModified": "2025-01-07T05:15:14.147", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Woo Ukrposhta plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'order', 'post', and 'idd' parameters in all versions up to, and including, 1.17.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Woo Ukrposhta para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s de los par\u00e1metros 'order', 'post' e 'idd' en todas las versiones hasta la 1.17.11 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12067.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12067.json index fc247d64809..73cdfafa9c9 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12067.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12067.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:11.647", "lastModified": "2025-01-09T11:15:11.647", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Travel \u2013 Ultimate Travel Booking System, Tour Management Engine plugin for WordPress is vulnerable to SQL Injection via the 'booking_itinerary' parameter of the 'wptravel_get_booking_data' function in all versions up to, and including, 10.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento WP Travel \u2013 Ultimate Travel Booking System, Tour Management Engine para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'booking_itinerary' de la funci\u00f3n 'wptravel_get_booking_data' en todas las versiones hasta la 10.0.0 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12073.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12073.json index 509c986f260..7da86232104 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12073.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12073.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:15.367", "lastModified": "2025-01-07T06:15:15.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Meteor Slides plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'slide_url_value' parameter in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Meteor Slides para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del par\u00e1metro 'slide_url_value' en todas las versiones hasta la 1.5.7 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12077.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12077.json index ab9601e1e0e..cdddf750dff 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12077.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12077.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T08:15:24.927", "lastModified": "2025-01-07T08:15:24.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Booking Calendar and Booking Calendar Pro plugins for WordPress are vulnerable to Reflected Cross-Site Scripting via the \u2018calendar_id\u2019 parameter in all versions up to, and including, 3.2.19 and 11.2.19 respectively, due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "Los complementos Booking Calendar y Booking Calendar Pro para WordPress son vulnerables a ataques de cross site scripting reflejado a trav\u00e9s del par\u00e1metro 'calendar_id' en todas las versiones hasta la 3.2.19 y la 11.2.19, respectivamente, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12098.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12098.json index cae059bf05e..272aa272caf 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12098.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12098.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:07.837", "lastModified": "2025-01-07T04:15:07.837", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ARS Affiliate Page Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'utm_keyword' parameter in all versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento ARS Affiliate Page Plugin para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'utm_keyword' en todas las versiones hasta la 2.0.2 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12112.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12112.json index a7a52ed8684..f861cd7ba96 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12112.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12112.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T04:15:06.683", "lastModified": "2025-01-08T04:15:06.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Easy Form Builder \u2013 WordPress plugin form builder: contact form, survey form, payment form, and custom form builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'name' parameter of the 'add_form_Emsfb' AJAX action in all versions up to, and including, 3.8.8 due to insufficient input sanitization and output escaping and missing authorization checks. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Easy Form Builder \u2013 WordPress plugin form builder: contact form, survey form, payment form, and custom form builder para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'nombre' de la acci\u00f3n AJAX 'add_form_Emsfb' en todas las versiones hasta la 3.8.8 incluida, debido a una desinfecci\u00f3n de entrada y escape de salida insuficientes y a la falta de comprobaciones de autorizaci\u00f3n. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12122.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12122.json index 3b30984153a..40ec8bd5ef5 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12122.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12122.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:11.860", "lastModified": "2025-01-09T11:15:11.860", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ResAds plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in all versions up to, and including, 2.0.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento ResAds para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s de m\u00faltiples par\u00e1metros en todas las versiones hasta la 2.0.6 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12124.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12124.json index b663b81a112..e019df85ce9 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12124.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12124.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:14.340", "lastModified": "2025-01-07T05:15:14.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Role Includer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018user_id\u2019 parameter in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Role Includer para WordPress es vulnerable a ataques de cross site scripting reflejado a trav\u00e9s del par\u00e1metro 'user_id' en todas las versiones hasta la 1.6 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12126.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12126.json index 31f8dafaa70..2ef092dd38b 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12126.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12126.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:14.533", "lastModified": "2025-01-07T05:15:14.533", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SEO Keywords plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018google_error\u2019 parameter in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento SEO Keywords para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'google_error' en todas las versiones hasta la 1.1.3 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12131.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12131.json index fb2bba86097..dd37e18f848 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12131.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12131.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T13:15:06.440", "lastModified": "2025-01-07T13:15:06.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Job Portal \u2013 A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.5 due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit resumes for other applicants when applying for jobs." + }, + { + "lang": "es", + "value": "El complemento WP Job Portal \u2013 A Complete Recruitment System para Company o Job Board website para WordPress es vulnerable a Insecure Direct Object Reference en todas las versiones hasta la 2.2.5 incluida debido a la falta de validaci\u00f3n en una clave controlada por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, env\u00eden curr\u00edculums de otros solicitantes cuando solicitan empleo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12140.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12140.json index d3fa83a43e0..8d59eef8a4a 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12140.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12140.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:14.730", "lastModified": "2025-01-07T05:15:14.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Elementor Addons AI Addons \u2013 70 Widgets, Premium Templates, Ultimate Elements plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.2.1 via the render function due to insufficient restrictions on which templates can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft templates that they should not have access to." + }, + { + "lang": "es", + "value": "El complemento Elementor Addons AI Addons \u2013 70 Widgets, Premium Templates, Ultimate Elements para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 2.2.1 incluida a trav\u00e9s de la funci\u00f3n de renderizado debido a restricciones insuficientes sobre qu\u00e9 plantillas se pueden incluir. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de plantillas privadas o borradores a los que no deber\u00edan tener acceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12152.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12152.json index 8b1a985a3b0..2def7eef767 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12152.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12152.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T10:15:06.577", "lastModified": "2025-01-07T10:15:06.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MIPL WC Multisite Sync plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.5 via the 'mipl_wc_sync_download_log' action. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento MIPL WC Multisite Sync para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 1.1.5 incluida a trav\u00e9s de la acci\u00f3n 'mipl_wc_sync_download_log'. Esto permite que atacantes no autenticados lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12153.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12153.json index c8e02f4fcea..b7412668365 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12153.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12153.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:14.927", "lastModified": "2025-01-07T05:15:14.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GDY Modular Content plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.9.91. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento GDY Modular Content para WordPress es vulnerable a ataques de cross site scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 0.9.91 incluida. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12157.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12157.json index 8e6c1235d5d..d031b73efeb 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12157.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12157.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:15.133", "lastModified": "2025-01-07T05:15:15.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Popup \u2013 MailChimp, GetResponse and ActiveCampaign Intergrations plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the 'upc_delete_db_record' AJAX action in all versions up to, and including, 3.2.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Popup \u2013 MailChimp, GetResponse y ActiveCampaign Integrations para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'id' de la acci\u00f3n AJAX 'upc_delete_db_record' en todas las versiones hasta la 3.2.6 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12158.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12158.json index 4b8333aef30..56fc316c055 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12158.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12158.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:15.323", "lastModified": "2025-01-07T05:15:15.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Popup \u2013 MailChimp, GetResponse and ActiveCampaign Intergrations plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'upc_delete_db_data' AJAX action in all versions up to, and including, 3.2.6. This makes it possible for unauthenticated attackers to delete the DB data for the plugin." + }, + { + "lang": "es", + "value": "El complemento Popup \u2013 MailChimp, GetResponse y ActiveCampaign Integrations para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la acci\u00f3n AJAX 'upc_delete_db_data' en todas las versiones hasta la 3.2.6 incluida. Esto hace posible que atacantes no autenticados eliminen los datos de la base de datos del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12159.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12159.json index ebc5a2625a9..794e1bfb714 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12159.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12159.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:15.527", "lastModified": "2025-01-07T05:15:15.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Optimize Your Campaigns \u2013 Google Shopping \u2013 Google Ads \u2013 Google Adwords plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.1 due to the print_php_information.php being publicly accessible. This makes it possible for unauthenticated attackers to extract sensitive configuration data that can be leveraged in another attack." + }, + { + "lang": "es", + "value": "El complemento Optimize Your Campaigns \u2013 Google Shopping \u2013 Google Ads \u2013 Google Adwords para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 3.1 incluida, debido a que print_php_information.php es de acceso p\u00fablico. Esto permite que atacantes no autenticados extraigan datos de configuraci\u00f3n confidenciales que pueden aprovecharse en otro ataque." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12170.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12170.json index b4e7bd9430c..fc014a7a38a 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12170.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12170.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:15.713", "lastModified": "2025-01-07T05:15:15.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ViewMedica 9 plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.15. This is due to missing or incorrect nonce validation on the 'Viewmedica-Admin' page. This makes it possible for unauthenticated attackers to inject arbitrary SQL queries via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento ViewMedica 9 para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.4.15 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la p\u00e1gina 'Viewmedica-Admin'. Esto hace posible que atacantes no autenticados inyecten consultas SQL arbitrarias a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12176.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12176.json index 113df72b9ca..09ac297de36 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12176.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12176.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:15.900", "lastModified": "2025-01-07T05:15:15.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordLift \u2013 AI powered SEO \u2013 Schema plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'wl_config_plugin' AJAX action in all versions up to, and including, 3.54.0. This makes it possible for unauthenticated attackers to update the plugin's settings." + }, + { + "lang": "es", + "value": "El complemento WordLift \u2013 AI powered SEO \u2013 Schema para WordPress es vulnerable al acceso no autorizado debido a una falta de verificaci\u00f3n de capacidad en la acci\u00f3n AJAX 'wl_config_plugin' en todas las versiones hasta la 3.54.0 incluida. Esto hace posible que atacantes no autenticados actualicen la configuraci\u00f3n del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12195.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12195.json index 3a65f3a19ca..d1934772ba4 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12195.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12195.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-04T12:15:22.953", "lastModified": "2025-01-04T12:15:22.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to SQL Injection via the 'project_id' parameter of the /wp-json/pm/v2/projects/2/task-lists REST API endpoint in all versions up to, and including, 2.6.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, who have been granted access to a project, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento WP Project Manager \u2013 Task, team, y project management featuring kanban board y Gantt diagrams para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'project_id' del endpoint de la API REST /wp-json/pm/v2/projects/2/task-lists en todas las versiones hasta la 2.6.16 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, a los que se les ha otorgado acceso a un proyecto, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12202.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12202.json index 1dc775ad695..0f8d35e666a 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12202.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12202.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T08:15:25.090", "lastModified": "2025-01-07T08:15:25.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Croma Music plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'ironMusic_ajax' function in all versions up to, and including, 3.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site." + }, + { + "lang": "es", + "value": "El complemento Croma Music para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos que puede provocar una escalada de privilegios debido a una falta de comprobaci\u00f3n de capacidad en la funci\u00f3n 'ironMusic_ajax' en todas las versiones hasta la 3.6 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen opciones arbitrarias en el sitio de WordPress. Esto se puede aprovechar para actualizar el rol predeterminado para el registro a administrador y habilitar el registro de usuarios para que los atacantes obtengan acceso de usuario administrativo a un sitio vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12205.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12205.json index 57e0fc7e55a..92bea4d8b8a 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12205.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12205.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T05:15:09.667", "lastModified": "2025-01-08T05:15:09.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Themesflat Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the TF E Slider Widget in all versions up to, and including, 2.2.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Themesflat Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del widget deslizante TF E en todas las versiones hasta la 2.2.4 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12206.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12206.json index 70b0c75e4b9..a0df33f3c6d 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12206.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12206.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:12.070", "lastModified": "2025-01-09T11:15:12.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordPress Header Builder Plugin \u2013 Pearl plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.8. This is due to missing or incorrect nonce validation on the stm_header_builder page. This makes it possible for unauthenticated attackers to delete arbitrary headers via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WordPress Header Builder Plugin \u2013 Pearl para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.3.8 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la p\u00e1gina stm_header_builder. Esto hace posible que atacantes no autenticados eliminen encabezados arbitrarios a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12207.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12207.json index 17a21b833fe..b8687e06b09 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12207.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12207.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:16.080", "lastModified": "2025-01-07T05:15:16.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Toggles Shortcode and Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018content\u2019 parameter in all versions up to, and including, 1.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Toggles Shortcode y Widget para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del par\u00e1metro 'content' en todas las versiones hasta la 1.14 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de administrador, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones donde se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12208.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12208.json index 9829d945ca1..d863c21755f 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12208.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12208.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:16.270", "lastModified": "2025-01-07T05:15:16.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Backup and Restore WordPress \u2013 Backup Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.50. This is due to missing or incorrect nonce validation on the ajax_queue_manual_backup() function. This makes it possible for unauthenticated attackers to trigger backups via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Backup and Restore WordPress \u2013 Backup Plugin para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.50 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n ajax_queue_manual_backup(). Esto hace posible que atacantes no autenticados activen copias de seguridad a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12214.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12214.json index 77e0d244d35..b692ec9a081 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12214.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12214.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:16.470", "lastModified": "2025-01-07T05:15:16.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WooCommerce HSS Extension for Streaming Video plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018videolink\u2019 parameter in all versions up to, and including, 3.31 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WooCommerce HSS Extension para Streaming Video para WordPress es vulnerable a ataques de cross site scripting reflejado a trav\u00e9s del par\u00e1metro 'videolink' en todas las versiones hasta la 3.31 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12218.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12218.json index 07cf1871325..db7b8c917ef 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12218.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12218.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:12.280", "lastModified": "2025-01-09T11:15:12.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Woocommerce check pincode/zipcode for shipping plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.4. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Woocommerce check pincode/zipcode for shipping para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.0.4 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante. Esto hace posible que atacantes no autenticados inyecten web scripts maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12221.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12221.json index a26fa968914..6a00bd64ff2 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12221.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12221.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-04T10:15:06.410", "lastModified": "2025-01-04T10:15:06.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Turnkey bbPress by WeaverTheme plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018_wpnonce\u2019 parameter in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Turnkey bbPress de WeaverTheme para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro '_wpnonce' en todas las versiones hasta la 1.6.3 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12222.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12222.json index 81292a70544..b9c334580a5 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12222.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12222.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:12.490", "lastModified": "2025-01-09T11:15:12.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Deliver via Shipos for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018dvsfw_bulk_label_url\u2019 parameter in all versions up to, and including, 2.1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Deliver via Shipos para WooCommerce para WordPress es vulnerable a ataques de secuencias de comandos reflejadas entre sitios a trav\u00e9s del par\u00e1metro 'dvsfw_bulk_label_url' en todas las versiones hasta la 2.1.7 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12237.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12237.json index 02b17027116..6447e1ae132 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12237.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12237.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-03T23:15:06.473", "lastModified": "2025-01-03T23:15:06.473", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Photo Gallery Slideshow & Masonry Tiled Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.15 via the rjg_get_youtube_info_justified_gallery_callback function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to retrieve limited information from internal services." + }, + { + "lang": "es", + "value": "El complemento Photo Gallery Slideshow & Masonry Tiled Gallery para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 1.0.15 incluida a trav\u00e9s de la funci\u00f3n rjg_get_youtube_info_justified_gallery_callback. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y se pueden usar para recuperar informaci\u00f3n limitada de los servicios internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12249.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12249.json index bed7bf47569..820dcb0dd91 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12249.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12249.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:12.683", "lastModified": "2025-01-09T11:15:12.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GS Insever Portfolio plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_settings() function in all versions up to, and including, 1.4.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's CSS settings." + }, + { + "lang": "es", + "value": "El complemento GS Insever Portfolio para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n save_settings() en todas las versiones hasta la 1.4.5 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen la configuraci\u00f3n CSS del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12252.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12252.json index 7767fc33692..aef5300822c 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12252.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12252.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:16.660", "lastModified": "2025-01-07T05:15:16.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SEO LAT Auto Post plugin for WordPress is vulnerable to file overwrite due to a missing capability check on the remote_update AJAX action in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to overwrite the seo-beginner-auto-post.php file which can be leveraged to achieve remote code execution." + }, + { + "lang": "es", + "value": "El complemento SEO LAT Auto Post para WordPress es vulnerable a la sobrescritura de archivos debido a una falta de verificaci\u00f3n de capacidad en la acci\u00f3n AJAX remote_update en todas las versiones hasta la 2.2.1 incluida. Esto permite que atacantes no autenticados sobrescriban el archivo seo-beginner-auto-post.php, lo que puede aprovecharse para lograr la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12256.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12256.json index 6e59837d1e2..f2fea34e282 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12256.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12256.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:16.857", "lastModified": "2025-01-07T05:15:16.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Simple Video Management System plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'analytics_video' parameter in all versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Simple Video Management System para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'analytics_video' en todas las versiones hasta la 1.0.4 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12261.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12261.json index fe023374adf..af28b1f60bb 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12261.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12261.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:15.593", "lastModified": "2025-01-07T06:15:15.593", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SmartEmailing.cz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'se-lists-updated' parameter in all versions up to, and including, 2.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento SmartEmailing.cz para WordPress es vulnerable a ataques de cross site scripting reflejado a trav\u00e9s del par\u00e1metro 'se-lists-updated' en todas las versiones hasta la 2.2.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12264.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12264.json index 996f733b450..06d00b8beb9 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12264.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12264.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:17.047", "lastModified": "2025-01-07T05:15:17.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The PayU CommercePro Plugin plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.8.3. This is due to /wp-json/payu/v1/generate-user-token and /wp-json/payu/v1/get-shipping-cost REST API endpoints not properly verifying a user's identity prior to setting the users ID and auth cookies. This makes it possible for unauthenticated attackers to create new administrative user accounts." + }, + { + "lang": "es", + "value": "El complemento PayU CommercePro para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 3.8.3 incluida. Esto se debe a que los endpoints de la API REST /wp-json/payu/v1/generate-user-token y /wp-json/payu/v1/get-shipping-cost no verifican correctamente la identidad de un usuario antes de configurar el ID del usuario y las cookies de autenticaci\u00f3n. Esto hace posible que atacantes no autenticados creen nuevas cuentas de usuario administrativo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12279.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12279.json index efc4e127d8e..1d3ce128a50 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12279.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12279.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-04T12:15:24.453", "lastModified": "2025-01-04T12:15:24.453", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Social AutoConnect plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.6.2. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WP Social AutoConnect para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 4.6.2 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de un nonce en una funci\u00f3n. Esto hace posible que atacantes no autenticados inyecten web scripts maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12285.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12285.json index 995e03f6332..e18c6fb8fd0 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12285.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12285.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:12.883", "lastModified": "2025-01-09T11:15:12.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SEMA API plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018catid\u2019 parameter in all versions up to, and including, 5.27 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento SEMA API para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'catid' en todas las versiones hasta la 5.27 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12288.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12288.json index 801a25be06b..4717f8c868f 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12288.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12288.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:17.243", "lastModified": "2025-01-07T05:15:17.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Simple add pages or posts plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.0. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Simple Add Pages o Posts para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.0.0 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante. Esto permite que atacantes no autenticados actualicen configuraciones e inyecten web scripts maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12290.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12290.json index ad0061a9ab3..c446bac19a3 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12290.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12290.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:17.440", "lastModified": "2025-01-07T05:15:17.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Infility Global plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018set_type\u2019 parameter in all versions up to, and including, 2.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Infility Global para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'set_type' en todas las versiones hasta la 2.9.8 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12291.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12291.json index 070d3b38456..19bdee5689e 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12291.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12291.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:17.633", "lastModified": "2025-01-07T05:15:17.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ViewMedica 9 plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.15. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento ViewMedica 9 para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.4.15 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de un nonce en una funci\u00f3n. Esto hace posible que atacantes no autenticados inyecten web scripts maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12302.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12302.json index 8dfb98e1891..0569855fc9a 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12302.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12302.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-06T06:15:06.487", "lastModified": "2025-01-06T14:15:08.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Icegram Engage WordPress plugin before 3.1.32 does not sanitise and escape some of its Campaign settings, which could allow authors and above to perform Stored Cross-Site Scripting attacks" + }, + { + "lang": "es", + "value": "El complemento Icegram Engage para WordPress anterior a la versi\u00f3n 3.1.32 no desinfecta ni escapa a algunas de las configuraciones de su campa\u00f1a, lo que podr\u00eda permitir a los autores y a cargos superiores realizar ataques de cross site scripting almacenado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12311.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12311.json index 33394bcb2be..6c6fe7d36c1 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12311.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12311.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-06T06:15:06.583", "lastModified": "2025-01-06T14:15:08.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Email Subscribers by Icegram Express WordPress plugin before 5.7.44 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks" + }, + { + "lang": "es", + "value": "El complemento de WordPress Email Subscribers de Icegram Express anterior a la versi\u00f3n 5.7.44 no desinfecta ni escapa un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que permite a los administradores realizar ataques de inyecci\u00f3n SQL" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12313.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12313.json index 857d1d5759a..0541158c694 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12313.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12313.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:17.853", "lastModified": "2025-01-07T05:15:17.853", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Compare Products for WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.2.1 via deserialization of untrusted input from the 'woo_compare_list' cookie. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento Compare Products para WooCommerce para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 3.2.1 incluida, a trav\u00e9s de la deserializaci\u00f3n de la entrada no confiable de la cookie 'woo_compare_list'. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. No hay ninguna cadena POP presente en el software vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12316.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12316.json index 426aaeaaecd..cef19641cf1 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12316.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12316.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T12:15:24.040", "lastModified": "2025-01-07T12:15:24.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Jupiter X Core plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_popup_action() function in all versions up to, and including, 4.8.5. This makes it possible for unauthenticated attackers to export popup templates." + }, + { + "lang": "es", + "value": "El complemento Jupiter X Core para WordPress es vulnerable al acceso no autorizado a los datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n export_popup_action() en todas las versiones hasta la 4.8.5 incluida. Esto permite que atacantes no autenticados exporten plantillas de ventanas emergentes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12322.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12322.json index 1eae7c69ae0..a6c466125b9 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12322.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12322.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:18.063", "lastModified": "2025-01-07T05:15:18.063", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ThePerfectWedding.nl Widget plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.8. This is due to missing or incorrect nonce validation on the 'update_option' function. This makes it possible for unauthenticated attackers to update the 'tpwKey' option with stored cross-site scripting via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento de widget ThePerfectWedding.nl para WordPress es vulnerable a falsificaci\u00f3n de solicitud entre sitios en todas las versiones hasta la 2.8 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la funci\u00f3n 'update_option'. Esto hace posible que atacantes no autenticados actualicen la opci\u00f3n 'tpwKey' con cross site scripting almacenado a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12324.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12324.json index 5e9277e1b0a..e0d805f7881 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12324.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12324.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:18.267", "lastModified": "2025-01-07T05:15:18.267", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Unilevel MLM Plan plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018page\u2019 parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Unilevel MLM Plan para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'page' en todas las versiones hasta la 1.1.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12327.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12327.json index bd3e7dc6481..bead584fd77 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12327.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12327.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:18.470", "lastModified": "2025-01-07T05:15:18.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LazyLoad Background Images plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pblzbg_save_settings() function in all versions up to, and including, 1.0.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings." + }, + { + "lang": "es", + "value": "El complemento LazyLoad Background Images para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n pblzbg_save_settings() en todas las versiones hasta la 1.0.7 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, actualicen la configuraci\u00f3n del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12328.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12328.json index abe328e28a0..6965434cb2b 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12328.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12328.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T09:15:06.780", "lastModified": "2025-01-08T09:15:06.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MAS Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento MAS Elementor para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 1.1.7 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12330.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12330.json index 5294423c4b9..01fa2923636 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12330.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12330.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:13.090", "lastModified": "2025-01-09T11:15:13.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Database Backup \u2013 Unlimited Database & Files Backup by Backup for WP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.3 via publicly accessible back-up files. This makes it possible for unauthenticated attackers to extract sensitive data including all information stored in the database." + }, + { + "lang": "es", + "value": "El complemento WP Database Backup \u2013 Unlimited Database y Files Backup de Backup para WP para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 7.3 incluida a trav\u00e9s de archivos de respaldo de acceso p\u00fablico. Esto permite que atacantes no autenticados extraigan datos confidenciales, incluida toda la informaci\u00f3n almacenada en la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12332.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12332.json index c46d7e209eb..cd3959b2102 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12332.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12332.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:18.687", "lastModified": "2025-01-07T05:15:18.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The School Management System \u2013 WPSchoolPress plugin for WordPress is vulnerable to SQL Injection via the 'cid' parameter in all versions up to, and including, 2.2.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Student/Parent-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento School Management System \u2013 WPSchoolPress para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'cid' en todas las versiones hasta la 2.2.14 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de estudiante/padre y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12337.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12337.json index 6cebee0c8f8..4be282d3b57 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12337.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12337.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T11:15:06.613", "lastModified": "2025-01-08T11:15:06.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shipping via Planzer for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018processed-ids\u2019 parameter in all versions up to, and including, 1.0.25 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Shipping via Planzer para WooCommerce para WordPress es vulnerable a ataques de Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'processed-ids' en todas las versiones hasta la 1.0.25 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12383.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12383.json index 9b3cca08085..61138f83696 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12383.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12383.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:15.790", "lastModified": "2025-01-07T06:15:15.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Binary MLM Woocommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0. This is due to missing or incorrect nonce validation on the 'bmw_display_pv_set_page' function and insufficient input sanitization and output escaping of the 'product_points' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Binary MLM Woocommerce para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.0 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la funci\u00f3n 'bmw_display_pv_set_page' y a una desinfecci\u00f3n de entrada y un escape de salida insuficientes del par\u00e1metro 'product_points'. Esto hace posible que atacantes no autenticados inyecten web scripts arbitrarios a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador de un sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12384.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12384.json index 210ef42853b..0fbedf9aef6 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12384.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12384.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:15.983", "lastModified": "2025-01-07T06:15:15.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Binary MLM Woocommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page\u2019 parameter in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Binary MLM Woocommerce para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'page' en todas las versiones hasta la 2.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12394.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12394.json index a053b4e7eaf..586fd792030 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12394.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12394.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:13.310", "lastModified": "2025-01-09T11:15:13.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Action Network plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.4. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Action Network para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.4.4 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de un nonce en una funci\u00f3n. Esto hace posible que atacantes no autenticados inyecten web scripts maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12402.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12402.json index a183008ad12..9525fdfe59d 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12402.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12402.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:07.990", "lastModified": "2025-01-07T04:15:07.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Themes Coder \u2013 Create Android & iOS Apps For Your Woocommerce Site plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.3.4. This is due to the plugin not properly validating a user's identity prior to updating their password through the update_user_profile() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account." + }, + { + "lang": "es", + "value": "El complemento Themes Coder \u2013 Create Android y iOS Apps For Your Woocommerce Site para WordPress es vulnerable a la escalada de privilegios mediante la apropiaci\u00f3n de cuentas en todas las versiones hasta la 1.3.4 incluida. Esto se debe a que el complemento no valida correctamente la identidad de un usuario antes de actualizar su contrase\u00f1a a trav\u00e9s de la funci\u00f3n update_user_profile(). Esto hace posible que atacantes no autenticados cambien las contrase\u00f1as de usuarios arbitrarios, incluidos los administradores, y aprovechen eso para obtener acceso a su cuenta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12416.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12416.json index cf5198d605a..5df98d8c084 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12416.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12416.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:08.143", "lastModified": "2025-01-07T04:15:08.143", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Live Sales Notification for Woocommerce \u2013 Woomotiv plugin for WordPress is vulnerable to SQL Injection via the 'woomotiv_seen_products_.*' cookie in all versions up to, and including, 3.6.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Live Sales Notification para Woocommerce \u2013 Woomotiv plugin para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de la cookie 'woomotiv_seen_products_.*' en todas las versiones hasta la 3.6.1 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12419.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12419.json index 9b7adc50bcc..ec3a3a72a20 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12419.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12419.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:08.337", "lastModified": "2025-01-07T04:15:08.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The Design for Contact Form 7 Style WordPress Plugin \u2013 CF7 WOW Styler plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.7.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. This functionality is also vulnerable to Reflected Cross-Site Scripting. Version 1.7.0 patched the Reflected XSS issue, however, the arbitrary shortcode execution issue remains." + }, + { + "lang": "es", + "value": "El complemento de WordPress The Design for Contact Form 7 Style \u2013 CF7 WOW Styler para WordPress es vulnerable a la ejecuci\u00f3n arbitraria de c\u00f3digos cortos en todas las versiones hasta la 1.7.0 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios. Esta funcionalidad tambi\u00e9n es vulnerable a Cross-Site Scripting Reflejado. La versi\u00f3n 1.7.0 solucion\u00f3 el problema de XSS Reflejado, sin embargo, el problema de ejecuci\u00f3n arbitraria de c\u00f3digos cortos persiste." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12425.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12425.json index 60b5dbecc17..aa8dbade2b3 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12425.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12425.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@documentfoundation.org", "published": "2025-01-07T12:15:24.183", "lastModified": "2025-01-07T12:15:24.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The Document Foundation LibreOffice allows Absolute Path Traversal.\n\n\n\n\nAn attacker can write to arbitrary locations, albeit suffixed with \".ttf\", by supplying a file in a format that supports embedded font files.\n\n\nThis issue affects LibreOffice: from 24.8 before < 24.8.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en The Document Foundation LibreOffice permite un Path Traversal absoluto. Un atacante puede escribir en ubicaciones arbitrarias, aunque tengan el sufijo \".ttf\", proporcionando un archivo en un formato que admita archivos de fuentes incrustados. Este problema afecta a LibreOffice: desde la versi\u00f3n 24.8 hasta la versi\u00f3n < 24.8.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12426.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12426.json index 579b236e2cc..241b3f9197d 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12426.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12426.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@documentfoundation.org", "published": "2025-01-07T13:15:07.210", "lastModified": "2025-01-07T13:15:07.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of Environmental Variables and arbitrary INI file values to an Unauthorized Actor vulnerability in The Document Foundation LibreOffice.\n\n\n\n\nURLs could be constructed which expanded environmental variables or INI file values, so potentially sensitive information could be exfiltrated to a remote server on opening a document containing such links.\n\n\nThis issue affects LibreOffice: from 24.8 before < 24.8.4." + }, + { + "lang": "es", + "value": "Exposici\u00f3n de variables ambientales y valores arbitrarios de archivos INI a una vulnerabilidad de actor no autorizado en The Document Foundation LibreOffice. Se podr\u00edan construir URL que expandieran las variables ambientales o los valores de archivos INI, por lo que se podr\u00eda filtrar informaci\u00f3n potencialmente confidencial a un servidor remoto al abrir un documento que contenga dichos enlaces. Este problema afecta a LibreOffice: desde la versi\u00f3n 24.8 hasta la versi\u00f3n 24.8.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12429.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12429.json index d73948fc0fb..6cbdc046143 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12429.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12429.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2025-01-07T17:15:20.527", "lastModified": "2025-01-07T17:15:20.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker who successfully exploited these vulnerabilities could grant read access to files.\u00a0A vulnerability exists in the AC500 V3 version mentioned. A\u00a0successfully \nauthenticated attacker can use this vulnerability to read system wide files and configuration\n\n\nAll AC500 V3 products (PM5xxx) with firmware version earlier than 3.8.0 are affected by this vulnerability." + }, + { + "lang": "es", + "value": "Un atacante que aproveche con \u00e9xito estas vulnerabilidades podr\u00eda otorgar acceso de lectura a los archivos. Existe una vulnerabilidad en la versi\u00f3n AC500 V3 mencionada. Un atacante autenticado con \u00e9xito puede usar esta vulnerabilidad para leer archivos y configuraciones de todo el sistema. Todos los productos AC500 V3 (PM5xxx) con una versi\u00f3n de firmware anterior a la 3.8.0 se ven afectados por esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12430.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12430.json index 99ac53f413a..b4eabfefd9c 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12430.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12430.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2025-01-07T17:15:20.703", "lastModified": "2025-01-07T17:15:20.703", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker who successfully exploited these vulnerabilities could cause enable command execution. A vulnerability exists in the AC500 V3 version mentioned. After successfully exploiting CVE-2024-12429 (directory traversal), a successfully authenticated attacker can inject arbitrary commands into a specifically crafted file, which then will be executed by root user.\nAll AC500 V3 products (PM5xxx) with firmware version earlier than 3.8.0 are affected by this vulnerability." + }, + { + "lang": "es", + "value": "Un atacante que aproveche con \u00e9xito estas vulnerabilidades podr\u00eda provocar la ejecuci\u00f3n de comandos de habilitaci\u00f3n. Existe una vulnerabilidad en la versi\u00f3n AC500 V3 mencionada. Despu\u00e9s de explotar con \u00e9xito CVE-2024-12429 (directory traversal), un atacante autenticado con \u00e9xito puede inyectar comandos arbitrarios en un archivo espec\u00edficamente manipulado, que luego ser\u00e1 ejecutado por el usuario superusuario. Todos los productos AC500 V3 (PM5xxx) con una versi\u00f3n de firmware anterior a la 3.8.0 se ven afectados por esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12431.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12431.json index a07ae9887e3..e1f1ee20036 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12431.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12431.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-01-08T21:15:11.760", "lastModified": "2025-01-08T21:15:11.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 15.5 before 17.5.5, 17.6 before 17.6.3, and 17.7 before 17.7.1, in which unauthorized users could manipulate the status of issues in public projects." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afectaba a todas las versiones desde la 15.5 hasta la 17.5.5, la 17.6 hasta la 17.6.3 y la 17.7 hasta la 17.7.1, en el que usuarios no autorizados pod\u00edan manipular el estado de los problemas en proyectos p\u00fablicos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12435.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12435.json index bd6c00f3622..6089234c95a 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12435.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12435.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:18.887", "lastModified": "2025-01-07T05:15:18.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Compare Products for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018s_feature\u2019 parameter in all versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Compare Products para WooCommerce para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 's_feature' en todas las versiones hasta la 3.2.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12437.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12437.json index d63f67afbe4..5c85d095ed3 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12437.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12437.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T07:15:27.127", "lastModified": "2025-01-07T07:15:27.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Marketplace Items plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'envato' shortcode in all versions up to, and including, 1.5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Marketplace Items para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo corto \"envato\" del complemento en todas las versiones hasta la 1.5.5 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12438.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12438.json index 3edc4544d4a..2e97f3a0cfa 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12438.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12438.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:16.183", "lastModified": "2025-01-07T06:15:16.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WooCommerce Digital Content Delivery (incl. DRM) \u2013 FlickRocket plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'start_date\u2019 and 'end_date' parameters in all versions up to, and including, 4.74 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WooCommerce Digital Content Delivery (incl. DRM) \u2013 FlickRocket para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s de los par\u00e1metros 'start_date' y 'end_date' en todas las versiones hasta la 4.74 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12439.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12439.json index d15d74da106..c4a27de06ee 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12439.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12439.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:16.430", "lastModified": "2025-01-07T06:15:16.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Marketplace Items plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'marketplace' shortcode in all versions up to, and including, 1.5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Marketplace Items para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'marketplace' del complemento en todas las versiones hasta la 1.5.5 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12440.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12440.json index 6f1d5ce1e09..324ace1b877 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12440.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12440.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:16.630", "lastModified": "2025-01-07T06:15:16.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Candifly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'candifly' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Candifly para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo corto \"candifly\" del complemento en todas las versiones hasta la 1.0.6 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12445.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12445.json index 16eb700c4d8..b826ee51baf 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12445.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12445.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:19.083", "lastModified": "2025-01-07T05:15:19.083", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The RightMessage WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'rm_area' shortcode in all versions up to, and including, 0.9.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento RightMessage WP para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'rm_area' del complemento en todas las versiones hasta la 0.9.7 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12453.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12453.json index fa231bae6ef..489661bd5ef 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12453.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12453.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:19.260", "lastModified": "2025-01-07T05:15:19.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Uptodown APK Download Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'utd-widget' shortcode in all versions up to, and including, 0.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Uptodown APK Download Widget para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo corto 'utd-widget' del complemento en todas las versiones hasta la 0.1.2 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12457.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12457.json index 0f22b436662..9d3ec71e60a 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12457.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12457.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:19.453", "lastModified": "2025-01-07T05:15:19.453", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Chat Support for Viber \u2013 Chat Bubble and Chat Button for Gutenberg, Elementor and Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'vchat' shortcode in all versions up to, and including, 1.7.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Chat Support para Viber \u2013 Chat Bubble y Chat Button para Gutenberg, Elementor y Shortcode para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'vchat' del complemento en todas las versiones hasta la 1.7.2 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12462.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12462.json index e4be61eb9c8..2f2d6cac9f1 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12462.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12462.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:19.640", "lastModified": "2025-01-07T05:15:19.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The YOGO Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'yogo-calendar' shortcode in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento YOGO Booking para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'yogo-calendar' del complemento en todas las versiones hasta la 1.6.2 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12464.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12464.json index b3176a0aa08..0923bde0c1c 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12464.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12464.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:16.823", "lastModified": "2025-01-07T06:15:16.823", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Chatroll Live Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'chatroll' shortcode in all versions up to, and including, 2.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Chatroll Live Chat para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo corto 'chatroll' del complemento en todas las versiones hasta la 2.5.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12470.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12470.json index 101133e0517..e1237f9439c 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12470.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12470.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:19.823", "lastModified": "2025-01-07T05:15:19.823", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The School Management System \u2013 SakolaWP plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.0.8. This is due to the registration function not properly limiting what roles a user can register as. This makes it possible for unauthenticated attackers to register as an administrative user." + }, + { + "lang": "es", + "value": "El complemento School Management System \u2013 SakolaWP para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 1.0.8 incluida. Esto se debe a que la funci\u00f3n de registro no limita adecuadamente los roles con los que un usuario puede registrarse. Esto hace posible que atacantes no autenticados se registren como usuarios administrativos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12471.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12471.json index 9dc9609256b..bde1d544129 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12471.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12471.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:17.027", "lastModified": "2025-01-07T06:15:17.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Post Saint: ChatGPT, GPT4, DALL-E, Stable Diffusion, Pexels, Dezgo AI Text & Image Generator plugin for WordPress is vulnerable to arbitrary files uploads due to a missing capability check and file type validation on the add_image_to_library AJAX action function in all versions up to, and including, 1.3.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files that make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento The Post Saint: ChatGPT, GPT4, DALL-E, Stable Diffusion, Pexels, Dezgo AI Text y Image Generator para WordPress es vulnerable a la carga de archivos arbitrarios debido a una verificaci\u00f3n de capacidad y una validaci\u00f3n de tipo de archivo faltantes en la funci\u00f3n de acci\u00f3n AJAX add_image_to_library en todas las versiones hasta la 1.3.1 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, carguen archivos arbitrarios que posibilitan la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12473.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12473.json index 033074eec3a..8effe03d629 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12473.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12473.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-10T04:15:18.623", "lastModified": "2025-01-10T04:15:18.623", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12475.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12475.json index ee2140edcb2..045d45c7c59 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12475.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12475.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-04T12:15:24.650", "lastModified": "2025-01-04T12:15:24.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Multi Store Locator plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Multi Store Locator para WordPress es vulnerable a cross site scripting almacenado en todas las versiones hasta la 2.4.1 incluida debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12491.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12491.json index f0eca28e496..06920409e4e 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12491.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12491.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:13.520", "lastModified": "2025-01-09T11:15:13.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SimplyRETS Real Estate IDX plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sr_search_form' shortcode in all versions up to, and including, 2.11.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento SimplyRETS Real Estate IDX para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'sr_search_form' del complemento en todas las versiones hasta la 2.11.2 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12493.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12493.json index 2d162075a10..1c00935e65f 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12493.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12493.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:13.727", "lastModified": "2025-01-09T11:15:13.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Files Download Delay plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fddwrap' shortcode in all versions up to, and including, 1.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Files Download Delay para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'fddwrap' del complemento en todas las versiones hasta la 1.0.9 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12495.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12495.json index 60aec16f7f8..901c2c1c230 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12495.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12495.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T07:15:27.370", "lastModified": "2025-01-07T07:15:27.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Bootstrap Blocks for WP Editor v2 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'gtb-bootstrap/column' block in all versions up to, and including, 2.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Bootstrap Blocks para WP Editor v2 para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del bloque 'gtb-bootstrap/column' en todas las versiones hasta la 2.5.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12496.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12496.json index 88d516c52f5..ea8b9199f1c 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12496.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12496.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:13.937", "lastModified": "2025-01-09T11:15:13.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Linear plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'linear_block_buy_commissions' shortcode in all versions up to, and including, 2.7.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Linear para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'linear_block_buy_commissions' del complemento en todas las versiones hasta la 2.7.12 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12499.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12499.json index d71d543ee4f..bd4c0f7e7f9 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12499.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12499.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T07:15:27.570", "lastModified": "2025-01-07T07:15:27.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP jQuery DataTable plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_jdt' shortcode in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP jQuery DataTable para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'wp_jdt' del complemento en todas las versiones hasta la 4.0.1 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12514.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12514.json index a36de3dada9..888d1436047 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12514.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12514.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:14.137", "lastModified": "2025-01-09T11:15:14.137", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The 3DVieweronline plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's '3Dvo-model' shortcode in all versions up to, and including, 2.2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento 3DVieweronline para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado '3Dvo-model' del complemento en todas las versiones hasta la 2.2.2 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12515.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12515.json index d5d6da22692..75ad956156d 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12515.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12515.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:14.343", "lastModified": "2025-01-09T11:15:14.343", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Muslim Prayer Time-Salah/Iqamah plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Masjid ID parameter in all versions up to, and including, 1.8.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Muslim Prayer Time-Salah/Iqamah para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del par\u00e1metro Masjid ID en todas las versiones hasta la 1.8.8 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12516.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12516.json index 5c4548b226d..9087de38201 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12516.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12516.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T08:15:25.290", "lastModified": "2025-01-07T08:15:25.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Coupon Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Coupon Code' parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Coupon Plugin para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del par\u00e1metro 'Coupon Code' en todas las versiones hasta la 1.2.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12521.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12521.json index 0527c574b08..b5c7bc021c8 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12521.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12521.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T04:15:06.827", "lastModified": "2025-01-08T04:15:06.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Slotti Ajanvaraus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slotti-embed-ga' shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Slotti Ajanvaraus para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'slotti-embed-ga' del complemento en todas las versiones hasta la 1.3.1 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12528.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12528.json index 9067bc95998..4afdac8f6fa 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12528.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12528.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:08.543", "lastModified": "2025-01-07T04:15:08.543", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordPress Survey & Poll \u2013 Quiz, Survey and Poll Plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpsurveypoll_results' shortcode in all versions up to, and including, 1.7.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WordPress Survey y Poll \u2013 Quiz, Survey y Poll Plugin para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'wpsurveypoll_results' del complemento en todas las versiones hasta la 1.7.5 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12532.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12532.json index a35864409f4..2809715fd72 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12532.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12532.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T12:15:24.363", "lastModified": "2025-01-07T12:15:24.363", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The BWD Elementor Addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.18 in widgets/bwdeb-content-switcher.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft template data." + }, + { + "lang": "es", + "value": "El complemento BWD Elementor Addons para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 4.3.18 incluida en widgets/bwdeb-content-switcher.php. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos confidenciales de plantillas privadas, pendientes y en borrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12535.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12535.json index 502a2d48cbe..fe167c6d115 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12535.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12535.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:17.220", "lastModified": "2025-01-07T06:15:17.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Host PHP Info plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited." + }, + { + "lang": "es", + "value": "El complemento Host PHP Info para WordPress es vulnerable al acceso no autorizado a los datos debido a una comprobaci\u00f3n de capacidad que falta al incluir la funci\u00f3n 'phpinfo' en todas las versiones hasta la 1.0.4 incluida. Esto permite que atacantes no autenticados lean los ajustes de configuraci\u00f3n y las variables predefinidas en el servidor del sitio. No es necesario activar el complemento para que se aproveche la vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12538.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12538.json index b1789783978..df7028c0af7 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12538.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12538.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:08.720", "lastModified": "2025-01-07T04:15:08.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Duplicate Post, Page and Any Custom Post plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.5.3 via the 'dpp_duplicate_as_draft' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract potentially sensitive data from draft, scheduled (future), private, and password protected posts." + }, + { + "lang": "es", + "value": "El complemento Duplicate Post, Page y Any Custom Post para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 3.5.3 incluida a trav\u00e9s de la funci\u00f3n 'dpp_duplicate_as_draft'. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos potencialmente confidenciales de publicaciones en borradores, programadas (futuras), privadas y protegidas con contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12540.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12540.json index 3eed0a3afa9..55fc04408f7 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12540.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12540.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:08.917", "lastModified": "2025-01-07T04:15:08.917", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LDD Directory Lite plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento LDD Directory Lite para WordPress es vulnerable a ataques de cross site scripting reflejado debido al uso de remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 3.3 incluida. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12541.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12541.json index 9a422c3a203..3b2104dfaa3 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12541.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12541.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:09.083", "lastModified": "2025-01-07T04:15:09.083", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Chative Live chat and Chatbot plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing or incorrect nonce validation on the add_chative_widget_action() function. This makes it possible for unauthenticated attackers to change the channel ID or organization ID via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This could lead to redirecting the live chat widget to an attacker-controlled channel." + }, + { + "lang": "es", + "value": "El complemento de Chative Live chat y Chatbot para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.1 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la funci\u00f3n add_chative_widget_action(). Esto hace posible que atacantes no autenticados cambien el ID del canal o el ID de la organizaci\u00f3n a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. Esto podr\u00eda llevar a redirigir el widget de chat en vivo a un canal controlado por el atacante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12542.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12542.json index fb99e4e0928..1e12cd7e63a 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12542.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12542.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:14.550", "lastModified": "2025-01-09T11:15:14.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The linkID plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 0.1.2. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited." + }, + { + "lang": "es", + "value": "El complemento linkID para WordPress es vulnerable al acceso no autorizado a los datos debido a la falta de una comprobaci\u00f3n de capacidad al incluir la funci\u00f3n 'phpinfo' en todas las versiones hasta la 0.1.2 incluida. Esto permite que atacantes no autenticados lean los ajustes de configuraci\u00f3n y las variables predefinidas en el servidor del sitio. No es necesario activar el complemento para que se aproveche la vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12545.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12545.json index d62af4dbd70..527dcde98f8 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12545.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12545.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-04T08:15:06.363", "lastModified": "2025-01-04T08:15:06.363", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Scratch & Win \u2013 Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.1. This is due to missing nonce validation on the reset_installation() function. This makes it possible for unauthenticated attackers to reset the plugin\u2019s installation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Scratch & Win \u2013 Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.7.1 incluida. Esto se debe a la falta de validaci\u00f3n de nonce en la funci\u00f3n reset_installation(). Esto hace posible que atacantes no autenticados restablezcan la instalaci\u00f3n del complemento a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12557.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12557.json index 16b062e9364..dc353227f80 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12557.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12557.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:09.260", "lastModified": "2025-01-07T04:15:09.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Transporters.io plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.84. This is due to missing nonce validation on a function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Transporters.io para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.0.84 incluida. Esto se debe a la falta de validaci\u00f3n de nonce en una funci\u00f3n. Esto hace posible que atacantes no autenticados inyecten web scripts maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12559.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12559.json index 79d9d8f9e31..abca851cba1 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12559.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12559.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:09.433", "lastModified": "2025-01-07T04:15:09.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ClickDesigns plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'clickdesigns_add_api' and the 'clickdesigns_remove_api' functions in all versions up to, and including, 1.8.0. This makes it possible for unauthenticated attackers to modify or remove the plugin's API key." + }, + { + "lang": "es", + "value": "El complemento ClickDesigns para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de comprobaci\u00f3n de capacidad en las funciones 'clickdesigns_add_api' y 'clickdesigns_remove_api' en todas las versiones hasta la 1.8.0 incluida. Esto permite que atacantes no autenticados modifiquen o eliminen la clave API del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12569.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12569.json index 590cc5a498b..b3078fe2740 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12569.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12569.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "La divulgaci\u00f3n de informaci\u00f3n confidencial en el archivo de registro del controlador de la c\u00e1mara HikVision en XProtect Device Pack permite a un atacante leer las credenciales de la c\u00e1mara almacenadas en el servidor de grabaci\u00f3n bajo condiciones espec\u00edficas." + "value": "La divulgaci\u00f3n de informaci\u00f3n sensible en un archivo de registro del controlador Milestone XProtect Device Pack para c\u00e1maras de terceros, permite a un atacante leer las credenciales de la c\u00e1mara almacenadas en el servidor de grabaci\u00f3n bajo condiciones espec\u00edficas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12583.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12583.json index 7c906a4dbd9..79b15e4c3f2 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12583.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12583.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-04T09:15:06.090", "lastModified": "2025-01-04T09:15:06.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Dynamics 365 Integration plugin for WordPress is vulnerable to Remote Code Execution and Arbitrary File Read in all versions up to, and including, 1.3.23 via Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server." + }, + { + "lang": "es", + "value": "El complemento Dynamics 365 Integration para WordPress es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo y la lectura arbitraria de archivos en todas las versiones hasta la 1.3.23 incluida a trav\u00e9s de template injection del lado del servidor de Twig. Esto se debe a la falta de validaci\u00f3n y desinfecci\u00f3n de entradas en la funci\u00f3n de renderizado. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, ejecuten c\u00f3digo en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12584.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12584.json index 6a0e69825c6..14d2e522c35 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12584.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12584.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T07:15:26.833", "lastModified": "2025-01-08T07:15:26.833", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The 140+ Widgets | Xpro Addons For Elementor \u2013 FREE plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.6.2 via the 'duplicate' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract potentially sensitive data from draft, scheduled (future), private, and password protected posts." + }, + { + "lang": "es", + "value": "El complemento 140+ Widgets | Xpro Addons For Elementor \u2013 FREE para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.4.6.2 incluida a trav\u00e9s de la funci\u00f3n \"duplicar\". Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos potencialmente confidenciales de publicaciones en borrador, programadas (futuras), privadas y protegidas con contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12585.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12585.json index 289f567e693..f96f3e17591 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12585.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12585.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-08T06:15:16.160", "lastModified": "2025-01-08T16:15:34.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12590.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12590.json index 5eda02800a5..d87861866ad 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12590.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12590.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:09.607", "lastModified": "2025-01-07T04:15:09.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Youtube Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' parameter in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Youtube Gallery para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del par\u00e1metro 'id' en todas las versiones hasta la 1.9 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12592.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12592.json index 576279e4f07..33eb8114e3b 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12592.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12592.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:09.783", "lastModified": "2025-01-07T04:15:09.783", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Sellsy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'testSellsy' shortcode in all versions up to, and including, 2.3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Sellsy para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo corto 'testSellsy' del complemento en todas las versiones hasta la 2.3.3 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12605.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12605.json index 6517de99a90..efb4d4b4aa0 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12605.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12605.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:14.763", "lastModified": "2025-01-09T15:15:14.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AI Scribe \u2013 SEO AI Writer, Content Generator, Humanizer, Blog Writer, SEO Optimizer, DALLE-3, AI WordPress Plugin ChatGPT (GPT-4o 128K) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3. This is due to missing or incorrect nonce validation on the \"al_scribe_content_data\" actions. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento AI Scribe (SEO AI Writer, Content Generator, Humanizer, Blog Writer, SEO Optimizer, DALLE-3, AI WordPress Plugin ChatGPT (GPT-4o 128K) para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.3 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en las acciones \"al_scribe_content_data\". Esto hace posible que atacantes no autenticados actualicen la configuraci\u00f3n del complemento a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12606.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12606.json index 1483626df2d..499a2844769 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12606.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12606.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-10T04:15:19.667", "lastModified": "2025-01-10T04:15:19.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12616.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12616.json index 04da829396e..ded1bf548ce 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12616.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12616.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:14.970", "lastModified": "2025-01-09T11:15:14.970", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Bitly's WordPress Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several AJAX actions in all versions up to, and including, 2.7.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update and retrieve plugin settings." + }, + { + "lang": "es", + "value": "El complemento Bitly's WordPress Plugin para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de una comprobaci\u00f3n de capacidad en varias acciones AJAX en todas las versiones hasta la 2.7.3 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen y recuperen la configuraci\u00f3n del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12618.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12618.json index 21f0b652d4d..5ebfe046a0e 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12618.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12618.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:15.193", "lastModified": "2025-01-09T11:15:15.193", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Newsletter2Go plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'resetStyles' AJAX action in all versions up to, and including, 4.0.14. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset styles." + }, + { + "lang": "es", + "value": "El complemento Newsletter2Go para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de una comprobaci\u00f3n de capacidad en la acci\u00f3n AJAX 'resetStyles' en todas las versiones hasta la 4.0.14 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, restablezcan los estilos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12621.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12621.json index 1cdca1da43b..1f2b5848f67 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12621.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12621.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:15.417", "lastModified": "2025-01-09T11:15:15.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Yumpu E-Paper publishing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'YUMPU' shortcode in all versions up to, and including, 3.0.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Yumpu E-Paper publishing para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'YUMPU' del complemento en todas las versiones hasta la 3.0.8 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12624.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12624.json index b70387d69b8..257eb22dd1f 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12624.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12624.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T07:15:27.747", "lastModified": "2025-01-07T07:15:27.747", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Sina Extension for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Sina Image Differ widget in all versions up to, and including, 3.5.91 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Sina Extension para Elementor para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del widget Sina Image Differ del complemento en todas las versiones hasta la 3.5.91 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12633.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12633.json index e1699f65e23..8ff5182fa78 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12633.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12633.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:17.417", "lastModified": "2025-01-07T06:15:17.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The JoomSport \u2013 for Sports: Team & League, Football, Hockey & more plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018page parameter in all versions up to, and including, 5.6.17 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento JoomSport \u2013 para Sports: Team y League, Football, Hockey y more para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'page' en todas las versiones hasta la 5.6.17 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12699.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12699.json index 2514307b2d8..958c2e59918 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12699.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12699.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T10:15:07.143", "lastModified": "2025-01-07T10:15:07.143", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Service Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Service Box para WordPress es vulnerable a Cross-Site Scripting almacenado en todas las versiones hasta la 1.9 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12701.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12701.json index 2cbd0fd167b..0c2c90ba09b 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12701.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12701.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-04T08:15:06.670", "lastModified": "2025-01-04T08:15:06.670", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Smart Import : Import any XML File to WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018 page\u2019 parameter in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WP Smart Import: Import any XML File a WordPress para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'page' en todas las versiones hasta la 1.1.2 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12711.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12711.json index e8c64d39f8e..88fc4ec24e8 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12711.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12711.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T12:15:24.503", "lastModified": "2025-01-07T12:15:24.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The RSVP and Event Management plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX functions like bulk_delete_attendees() and bulk_delete_questions() in all versions up to, and including, 2.7.13. This makes it possible for unauthenticated attackers to delete questions and attendees and for authenticated users to update question menu orders." + }, + { + "lang": "es", + "value": "El complemento RSVP y Event Management para WordPress es vulnerable al acceso no autorizado debido a una verificaci\u00f3n de capacidad faltante en varias funciones AJAX como bulk_delete_attendees() y bulk_delete_questions() en todas las versiones hasta la 2.7.13 incluida. Esto permite que atacantes no autenticados eliminen preguntas y asistentes y que usuarios autenticados actualicen los pedidos del men\u00fa de preguntas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12712.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12712.json index 19efbcd630f..1d6831d384a 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12712.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12712.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T10:15:06.660", "lastModified": "2025-01-08T10:15:06.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shopping Cart & eCommerce Store plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the webhook function in all versions up to, and including, 5.7.8. This makes it possible for unauthenticated attackers to modify order statuses." + }, + { + "lang": "es", + "value": "El complemento Shopping Cart y eCommerce Store para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n webhook en todas las versiones hasta la 5.7.8 incluida. Esto permite que atacantes no autenticados modifiquen los estados de los pedidos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12713.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12713.json index 947fdba0024..4a98308d974 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12713.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12713.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T04:15:06.967", "lastModified": "2025-01-08T04:15:06.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SureForms \u2013 Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.2 via the handle_export_form() function due to a missing capability check. This makes it possible for unauthenticated attackers to export data from password protected, private, or draft posts that they should not have access to." + }, + { + "lang": "es", + "value": "El complemento SureForms \u2013 Drag y Drop Form Builder para WordPress para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.2.2 incluida a trav\u00e9s de la funci\u00f3n handle_export_form() debido a una verificaci\u00f3n de capacidad faltante. Esto permite que atacantes no autenticados exporten datos de publicaciones protegidas con contrase\u00f1a, privadas o en borrador a las que no deber\u00edan tener acceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12714.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12714.json index bbc92569c31..6032d73e122 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12714.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12714.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:14.797", "lastModified": "2025-01-09T16:15:36.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12715.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12715.json index cd41dccb1fb..fe93a84896e 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12715.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12715.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:14.917", "lastModified": "2025-01-09T16:15:36.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12717.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12717.json index 06c2ba66345..50721506786 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12717.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12717.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:15.040", "lastModified": "2025-01-09T15:15:14.493", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12719.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12719.json index 5b37fe58330..500cebcedb8 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12719.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12719.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T10:15:07.323", "lastModified": "2025-01-07T10:15:07.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "El complemento WordPress File Upload para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'wfu_ajax_action_read_subfolders' en todas las versiones hasta la 4.24.15 inclusive. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, realicen un recorrido de ruta limitado para ver directorios y subdirectorios en WordPress. No se pueden ver los archivos." + "value": "El complemento WordPress File Upload de WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'wfu_ajax_action_read_subfolders' en todas las versiones hasta la 4.24.15 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, realicen un path traversal limitado para ver directorios y subdirectorios en WordPress. No se pueden ver los archivos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12731.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12731.json index 677e9570055..8f11ff99f79 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12731.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12731.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:15.150", "lastModified": "2025-01-09T16:15:36.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12736.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12736.json index 570dfd87e2a..569eadd3d65 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12736.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12736.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:15.273", "lastModified": "2025-01-09T16:15:36.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12738.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12738.json index bef4521c75a..fd63bcbcc28 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12738.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12738.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T13:15:07.357", "lastModified": "2025-01-07T13:15:07.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The User Profile Builder \u2013 Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several user meta parameters in all versions up to, and including, 3.12.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page and clicks a link to show user meta." + }, + { + "lang": "es", + "value": "El complemento User Profile Builder \u2013 Beautiful User Registration Forms, User Profiles y User Role Editor para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s de varios par\u00e1metros meta de usuario en todas las versiones hasta la 3.12.9 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada y haga clic en un enlace para mostrar los metadatos del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12781.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12781.json index 7835621abe5..4f9f9dfa206 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12781.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12781.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T07:15:27.937", "lastModified": "2025-01-07T07:15:27.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Aurum - WordPress & WooCommerce Shopping Theme theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'lab_1cl_demo_install_package_content' function in all versions up to, and including, 4.0.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite content with imported demo content." + }, + { + "lang": "es", + "value": "El tema Aurum - WordPress & WooCommerce Shopping Theme para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n 'lab_1cl_demo_install_package_content' en todas las versiones hasta la 4.0.2 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, sobrescriban el contenido con contenido de demostraci\u00f3n importado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12802.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12802.json index c6b12661ff8..b920e969ce8 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12802.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12802.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T09:15:06.587", "lastModified": "2025-01-09T15:15:14.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12803.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12803.json index b598174afd7..0cfc39b31ed 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12803.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12803.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T08:15:26.007", "lastModified": "2025-01-09T15:15:14.877", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12805.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12805.json index 53fee877545..e3f1ca42694 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12805.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12805.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T08:15:26.247", "lastModified": "2025-01-09T15:15:15.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12806.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12806.json index c79af759d97..b19632f84e9 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12806.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12806.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T08:15:26.417", "lastModified": "2025-01-09T21:15:24.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12819.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12819.json index 8d98d8a1703..cd6a2890900 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12819.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12819.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:15.657", "lastModified": "2025-01-09T11:15:15.657", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Searchie plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sio_embed_media' shortcode in all versions up to, and including, 1.17.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Searchie para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'sio_embed_media' del complemento en todas las versiones hasta la 1.17.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12848.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12848.json index 8e23ff7bc9f..8a21e6c136e 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12848.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12848.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:15.870", "lastModified": "2025-01-09T11:15:15.870", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SKT Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the 'addLibraryByArchive' function in all versions up to, and including, 4.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files that make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento SKT Page Builder para WordPress es vulnerable a la carga de archivos arbitrarios debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'addLibraryByArchive' en todas las versiones hasta la 4.6 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, carguen archivos arbitrarios que hacen posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12849.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12849.json index 7b3f2a7d9d2..9bf2b17c9a1 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12849.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12849.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:17.607", "lastModified": "2025-01-07T06:15:17.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Error Log Viewer By WP Guru plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.0.1.3 via the wp_ajax_nopriv_elvwp_log_download AJAX action. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento Error Log Viewer de WP Guru para WordPress es vulnerable a la lectura arbitraria de archivos en todas las versiones hasta la 1.0.1.3 incluida a trav\u00e9s de la acci\u00f3n AJAX wp_ajax_nopriv_elvwp_log_download. Esto permite que atacantes no autenticados lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12851.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12851.json index adb78fb6067..d7400c2c270 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12851.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12851.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T07:15:27.027", "lastModified": "2025-01-08T07:15:27.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid, Carousel and Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom_attributes parameter of the Cookie Consent Widget in all versions up to, and including, 5.10.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid, Carousel y Remote Arrows) para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro custom_attributes del widget de consentimiento de cookies en todas las versiones hasta la 5.10.14 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12852.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12852.json index 2482ad87980..6578890dc5f 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12852.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12852.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T07:15:27.250", "lastModified": "2025-01-08T07:15:27.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ha_cmc_text' parameter of the Happy Mouse Cursor in all versions up to, and including, 3.15.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Happy Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'ha_cmc_text' del cursor del mouse Happy en todas las versiones hasta la 3.15.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12853.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12853.json index 3eec6e03861..03bacb91770 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12853.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12853.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T10:15:06.903", "lastModified": "2025-01-08T10:15:06.903", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the zip upload functionality in all versions up to, and including, 2.11.10. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento Modula Image Gallery para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n de carga de archivos zip en todas las versiones hasta la 2.11.10 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de autor o superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12854.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12854.json index f101f637803..cea909d37f3 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12854.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12854.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T10:15:07.120", "lastModified": "2025-01-08T10:15:07.120", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Garden Gnome Package plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the functionality that automatically extracts 'ggpkg' files that have been uploaded in all versions up to, and including, 2.3.0. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento Garden Gnome Package para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n que extrae autom\u00e1ticamente los archivos 'ggpkg' que se han cargado en todas las versiones hasta la 2.3.0 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de autor y superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12855.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12855.json index f10f0e0c664..7553a1a223f 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12855.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12855.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T09:15:06.927", "lastModified": "2025-01-08T09:15:06.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AdForest theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several AJAX actions like 'sb_remove_ad' in all versions up to, and including, 5.1.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete posts, attachments and deactivate a license." + }, + { + "lang": "es", + "value": "El tema AdForest para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de una comprobaci\u00f3n de capacidad en varias acciones AJAX como 'sb_remove_ad' en todas las versiones hasta la 5.1.7 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, eliminen publicaciones, archivos adjuntos y desactiven una licencia." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12970.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12970.json index 317897890ef..895ddd8a993 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12970.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12970.json @@ -3,12 +3,16 @@ "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2025-01-06T12:15:06.573", "lastModified": "2025-01-06T12:15:06.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TUBITAK BILGEM Pardus OS My Computer allows OS Command Injection.This issue affects Pardus OS My Computer: before 0.7.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('Inyecci\u00f3n de comando del sistema operativo') en TUBITAK BILGEM Pardus OS My Computer permite la inyecci\u00f3n de comandos del sistema operativo. Este problema afecta a Pardus OS My Computer: antes de 0.7.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1242.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1242.json index b8c250777cb..d16579b1ec8 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1242.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1242.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:44.673", "lastModified": "2025-01-08T18:36:55.487", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1279.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1279.json index be678490b22..8688d0d287c 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1279.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1279.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-11T18:15:17.950", "lastModified": "2024-11-21T08:50:13.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13041.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13041.json index d54d704bfa9..8fd324765b1 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13041.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13041.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-01-09T07:15:26.497", "lastModified": "2025-01-09T07:15:26.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. When a user is created via the SAML provider, the external groups setting overrides the external provider configuration. As a result, the user may not be marked as external thereby giving those users access to internal projects or groups." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 16.4 hasta la 17.5.5, desde la 17.6 hasta la 17.6.3 y desde la 17.7 hasta la 17.7.1. Cuando se crea un usuario a trav\u00e9s del proveedor SAML, la configuraci\u00f3n de grupos externos anula la configuraci\u00f3n del proveedor externo. Como resultado, es posible que el usuario no se marque como externo, lo que le otorga acceso a proyectos o grupos internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13070.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13070.json index 687a1ab7e43..9f3d99bb43a 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13070.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13070.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in CodeAstro Online Food Ordering System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/update_users.php of the component Update User Page. The manipulation of the argument user_upd leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en CodeAstro Online Food Ordering System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/update_users.php del componente Update User Page. La manipulaci\u00f3n del argumento user_upd conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13072.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13072.json index 1426ab92a39..4cb9fafbdba 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13072.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13072.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/add-customer-services.php of the component Customer Detail Handler. The manipulation of the argument sids[] leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en 1000 Projects Beauty Parlour Management System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /admin/add-customer-services.php del componente Customer Detail Handler. La manipulaci\u00f3n del argumento sids[] provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13074.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13074.json index 27dcf0f1be0..69dce393195 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13074.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13074.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in PHPGurukul Land Record System 1.0. This affects an unknown part of the file /index.php. The manipulation of the argument searchdata leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en PHPGurukul Land Record System 1.0. Afecta a una parte desconocida del archivo /index.php. La manipulaci\u00f3n del argumento searchdata provoca ataques de cross site scripting. Es posible iniciar el ataque de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13077.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13077.json index f67a30b42aa..9dd65f4c9c6 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13077.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13077.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in PHPGurukul Land Record System 1.0. Affected is an unknown function of the file /admin/add-property.php. The manipulation of the argument Land Subtype leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en PHPGurukul Land Record System 1.0. Se trata de una funci\u00f3n desconocida del archivo /admin/add-property.php. La manipulaci\u00f3n del argumento Land Subtype provoca cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13080.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13080.json index e19cf4c34e7..3f54bd5b589 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13080.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13080.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Land Record System 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/aboutus.php. The manipulation of the argument Page Description leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Land Record System 1.0. Se ha clasificado como problem\u00e1tica. Afecta a una parte desconocida del archivo /admin/aboutus.php. La manipulaci\u00f3n del argumento Page Description provoca cross site scripting. Es posible iniciar el ataque de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13081.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13081.json index 142c6139982..dfaf44c1040 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13081.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13081.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Land Record System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/contactus.php. The manipulation of the argument Page Description leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Land Record System 1.0. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/contactus.php. La manipulaci\u00f3n del argumento Page Description provoca cross site scripting. El ataque se puede iniciar de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13082.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13082.json index 6bc09d1759c..6e46ec913e4 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13082.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13082.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Land Record System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/search-property.php. The manipulation of the argument Search By leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Land Record System 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo /admin/search-property.php. La manipulaci\u00f3n del argumento Search By provoca cross site scripting. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13083.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13083.json index 632925763f7..53efa39066e 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13083.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13083.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in PHPGurukul Land Record System 1.0. Affected is an unknown function of the file /admin/admin-profile.php. The manipulation of the argument Admin Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en PHPGurukul Land Record System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/admin-profile.php. La manipulaci\u00f3n del argumento Admin Name provoca ataques de cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13084.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13084.json index 5cda31c1cb3..906d608f8cd 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13084.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13084.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in PHPGurukul Land Record System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/search-property.php. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Land Record System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/search-property.php. La manipulaci\u00f3n del argumento searchdata conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13085.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13085.json index 30954241dba..04dd3759de7 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13085.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13085.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Land Record System 1.0. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en PHPGurukul Land Record System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /admin/login.php. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13129.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13129.json index 111b2eef12a..17f4b1fc54b 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13129.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13129.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T22:15:06.677", "lastModified": "2025-01-03T22:15:06.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Roxy-WI up to 8.1.3. It has been declared as critical. Affected by this vulnerability is the function action_service of the file app/modules/roxywi/roxy.py. The manipulation of the argument action/service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 8.1.4 is able to address this issue. The identifier of the patch is 32313928eb9ce906887b8a30bf7b9a3d5c0de1be. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Roxy-WI hasta la versi\u00f3n 8.1.3. Se ha declarado como cr\u00edtica. La funci\u00f3n action_service del archivo app/modules/roxywi/roxy.py est\u00e1 afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento action/service provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 8.1.4 puede solucionar este problema. El identificador del parche es 32313928eb9ce906887b8a30bf7b9a3d5c0de1be. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13132.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13132.json index 853a7c6898a..b96f8d7d81f 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13132.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13132.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T05:15:06.400", "lastModified": "2025-01-05T05:15:06.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Emlog Pro up to 2.4.3. This vulnerability affects unknown code of the file /admin/article.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Emlog Pro hasta la versi\u00f3n 2.4.3. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/article.php del componente Subpage Handler. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13133.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13133.json index 9b9145ae064..0806b87e143 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13133.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13133.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T05:15:07.507", "lastModified": "2025-01-05T05:15:07.507", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in ZeroWdd studentmanager 1.0. This issue affects the function addStudent/editStudent of the file src/main/Java/com/wdd/studentmanager/controller/StudentController. java. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en ZeroWdd studentmanager 1.0. Este problema afecta a la funci\u00f3n addStudent/editStudent del archivo src/main/Java/com/wdd/studentmanager/controller/StudentController.java. La manipulaci\u00f3n del argumento file provoca una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13134.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13134.json index c435f7a8117..dcf8483d565 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13134.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13134.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T08:15:05.443", "lastModified": "2025-01-05T08:15:05.443", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in ZeroWdd studentmanager 1.0. Affected is the function addTeacher/editTeacher of the file src/main/Java/com/wdd/studentmanager/controller/TeacherController. java. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en ZeroWdd studentmanager 1.0. La funci\u00f3n addTeacher/editTeacher del archivo src/main/Java/com/wdd/studentmanager/controller/TeacherController.java se ve afectada. La manipulaci\u00f3n del argumento file permite la carga sin restricciones. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13135.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13135.json index b3486db9e3e..ebf30347ece 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13135.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13135.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T09:15:05.240", "lastModified": "2025-01-05T09:15:05.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Emlog Pro 2.4.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/twitter.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Emlog Pro 2.4.3 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/twitter.php del componente Subpage Handler. La manipulaci\u00f3n conduce a cross site scripting. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13143.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13143.json index 0f429d7dc0c..2a552c45e83 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13143.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13143.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-06T00:15:05.460", "lastModified": "2025-01-06T00:15:05.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ZeroWdd studentmanager 1.0. It has been rated as problematic. This issue affects the function submitAddPermission of the file src/main/java/com/zero/system/controller/PermissionController. java. The manipulation of the argument url leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en ZeroWdd studentmanager 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n submissionAddPermission del archivo src/main/java/com/zero/system/controller/PermissionController.java. La manipulaci\u00f3n del argumento url provoca cross site scripting. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13144.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13144.json index da43be08637..17bf98ee587 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13144.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13144.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-06T00:15:05.633", "lastModified": "2025-01-06T00:15:05.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in zhenfeng13 My-Blog 1.0. Affected is the function uploadFileByEditomd of the file src/main/java/com/site/blog/my/core/controller/admin/BlogController.java. The manipulation of the argument editormd-image-file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zhenfeng13 My-Blog 1.0. La funci\u00f3n uploadFileByEditomd del archivo src/main/java/com/site/blog/my/core/controller/admin/BlogController.java se ve afectada. La manipulaci\u00f3n del argumento editormd-image-file permite cargar sin restricciones. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13145.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13145.json index 0440af38504..bdecbfb0684 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13145.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13145.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-06T01:15:06.253", "lastModified": "2025-01-06T01:15:06.253", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in zhenfeng13 My-Blog 1.0. Affected by this vulnerability is the function upload of the file src/main/java/com/site/blog/my/core/controller/admin/uploadController. java. The manipulation of the argument file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zhenfeng13 My-Blog 1.0. Esta vulnerabilidad afecta la funci\u00f3n de carga del archivo src/main/java/com/site/blog/my/core/controller/admin/uploadController.java. La manipulaci\u00f3n del argumento file permite una carga sin restricciones. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13153.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13153.json index 1cda5908cf7..840c6b198d4 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13153.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13153.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T09:15:07.243", "lastModified": "2025-01-09T09:15:07.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Unlimited Elements For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 1.5.135 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: Since the widget code isn't part of the code, to apply the patch, the affected widgets: Image Tooltip, Notification, Simple Popup, Video Play Button, and Card Carousel, must be deleted and reinstalled manually." + }, + { + "lang": "es", + "value": "El complemento Unlimited Elements For Elementor para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de m\u00faltiples widgets en todas las versiones hasta la 1.5.135 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Nota: Dado que el c\u00f3digo del widget no forma parte del c\u00f3digo, para aplicar el parche, los widgets afectados: informaci\u00f3n sobre herramientas de imagen, notificaci\u00f3n, ventana emergente simple, bot\u00f3n de reproducci\u00f3n de video y carrusel de tarjetas, deben eliminarse y reinstalarse manualmente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13173.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13173.json index bdd21854681..f62eabb1f57 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13173.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13173.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vivo.com", "published": "2025-01-08T08:15:24.870", "lastModified": "2025-01-08T15:15:16.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13183.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13183.json index 943583ac737..1865cc6c5ae 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13183.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13183.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-10T08:15:25.967", "lastModified": "2025-01-10T08:15:25.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13185.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13185.json index 83d129553df..6d9ec509146 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13185.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13185.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vivo.com", "published": "2025-01-08T09:15:07.070", "lastModified": "2025-01-08T15:15:17.163", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13186.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13186.json index 3af60b810c2..6d5f2c83a68 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13186.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13186.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vivo.com", "published": "2025-01-08T09:15:07.180", "lastModified": "2025-01-08T14:15:26.227", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13187.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13187.json index c7e03e0b396..1bbf793645e 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13187.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13187.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Kingsoft WPS Office 6.14.0 on macOS. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component TCC Handler. The manipulation leads to code injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Kingsoft WPS Office 6.14.0 en macOS. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente TCC Handler. La manipulaci\u00f3n conduce a la inyecci\u00f3n de c\u00f3digo. Es posible lanzar el ataque en el host local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13188.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13188.json index b3097db9ebd..7e64429a05d 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13188.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13188.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T19:15:30.840", "lastModified": "2025-01-08T19:15:30.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been rated as critical. Affected by this issue is some unknown functionality of the file /opt/MicroWorld/var/ of the component Installation Handler. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en MicroWorld eScan Antivirus 7.0.32 en Linux. Se ha calificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /opt/MicroWorld/var/ del componente Installation Handler. La manipulaci\u00f3n da lugar a permisos predeterminados incorrectos. El ataque debe abordarse de forma local. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13189.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13189.json index 95a9559f082..ef00ca9aa6e 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13189.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13189.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T20:15:27.353", "lastModified": "2025-01-08T21:15:12.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in ZeroWdd myblog 1.0. This affects an unknown part of the file src/main/java/com/wdd/myblog/config/MyBlogMvcConfig.java. The manipulation leads to permission issues. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en ZeroWdd myblog 1.0. Afecta a una parte desconocida del archivo src/main/java/com/wdd/myblog/config/MyBlogMvcConfig.java. La manipulaci\u00f3n provoca problemas de permisos. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13190.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13190.json index bf9cdc6f5c7..dd5902d9bd4 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13190.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13190.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T21:15:12.303", "lastModified": "2025-01-08T21:15:12.303", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in ZeroWdd myblog 1.0. This vulnerability affects unknown code of the file src/main/resources/mapper/BlogMapper.xml. The manipulation of the argument findBlogList/getTotalBlogs leads to xml injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en ZeroWdd myblog 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo src/main/resources/mapper/BlogMapper.xml. La manipulaci\u00f3n del argumento findBlogList/getTotalBlogs provoca la inyecci\u00f3n de xml. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13191.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13191.json index 95d02df0da7..0f8cd9ed9d9 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13191.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13191.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:08.807", "lastModified": "2025-01-09T17:15:11.267", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13192.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13192.json index f52dc7190c1..9864e955aed 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13192.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13192.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:09.017", "lastModified": "2025-01-09T17:15:11.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13193.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13193.json index d6615ff6a0e..fb9e03d40c0 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13193.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13193.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:09.220", "lastModified": "2025-01-09T17:15:11.553", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13194.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13194.json index ab6f506dfbf..b3dee225231 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13194.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13194.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.357", "lastModified": "2025-01-09T17:15:11.690", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13195.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13195.json index f478bfdb244..548d831da9a 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13195.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13195.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.570", "lastModified": "2025-01-09T17:15:11.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13196.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13196.json index 32446365fc1..246a778a45a 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13196.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13196.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.760", "lastModified": "2025-01-09T17:15:11.957", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13197.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13197.json index b713d3f0f7c..5da7aa2b206 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13197.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13197.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.973", "lastModified": "2025-01-09T00:15:25.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in donglight bookstore\u7535\u5546\u4e66\u57ce\u7cfb\u7edf\u8bf4\u660e 1.0.0. It has been rated as problematic. This issue affects the function updateUser of the file src/main/Java/org/zdd/bookstore/web/controller/admin/AdminUserControlle.java. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en donglight bookstore???????? 1.0.0. Se la ha calificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n updateUser del archivo src/main/Java/org/zdd/bookstore/web/controller/admin/AdminUserControlle.java. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13198.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13198.json index dbd92e41525..c22d5d792b7 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13198.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13198.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T01:15:07.970", "lastModified": "2025-01-09T01:15:07.970", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in langhsu Mblog Blog System 3.5.0. Affected is an unknown function of the file /login. The manipulation leads to observable response discrepancy. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en langhsu Mblog Blog System 3.5.0. Se ve afectada una funci\u00f3n desconocida del archivo /login. La manipulaci\u00f3n provoca una discrepancia de respuesta observable. Es posible lanzar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. El exploit se ha revelado al p\u00fablico y puede usarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13199.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13199.json index 0de6018f682..7a0aaaf1eb6 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13199.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13199.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T01:15:08.170", "lastModified": "2025-01-09T01:15:08.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in langhsu Mblog Blog System 3.5.0. Affected by this vulnerability is an unknown functionality of the file /search of the component Search Bar. The manipulation of the argument kw leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en langhsu Mblog Blog System 3.5.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /search del componente Search Bar. La manipulaci\u00f3n del argumento kw provoca cross site scripting. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13200.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13200.json index 138c1d39685..0e6ade9d300 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13200.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13200.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:23.820", "lastModified": "2025-01-09T03:15:23.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in wander-chu SpringBoot-Blog 1.0. This affects the function preHandle of the file src/main/java/com/my/blog/website/interceptor/BaseInterceptor.java of the component HTTP POST Request Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad clasificada como cr\u00edtica en wander-chu SpringBoot-Blog 1.0. Afecta a la funci\u00f3n preHandle del archivo src/main/java/com/my/blog/website/interceptor/BaseInterceptor.java del componente HTTP POST Request Handler. La manipulaci\u00f3n conduce a controles de acceso inadecuados. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13201.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13201.json index 069566214b6..278f89a2ce8 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13201.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13201.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:24.020", "lastModified": "2025-01-09T03:15:24.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in wander-chu SpringBoot-Blog 1.0 and classified as critical. This vulnerability affects the function upload of the file src/main/java/com/my/blog/website/controller/admin/AttachtController.java of the component Admin Attachment Handler. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en wander-chu SpringBoot-Blog 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n de carga del archivo src/main/java/com/my/blog/website/controller/admin/AttachtController.java del componente Admin Attachment Handler. La manipulaci\u00f3n del archivo de argumentos provoca una carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13202.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13202.json index 27238cbe16b..b7907205112 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13202.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13202.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:24.220", "lastModified": "2025-01-09T17:15:12.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13203.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13203.json index 81c8f6befbb..6586abf6731 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13203.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13203.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:24.410", "lastModified": "2025-01-09T17:15:12.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13204.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13204.json index dd0b1fc50ea..924e156b415 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13204.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13204.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:24.603", "lastModified": "2025-01-09T03:15:24.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in kurniaramadhan E-Commerce-PHP 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /blog-details.php. The manipulation of the argument blog_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en kurniaramadhan E-Commerce-PHP 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /blog-details.php. La manipulaci\u00f3n del argumento blog_id provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13205.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13205.json index 916d55031d3..f08163b935c 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13205.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13205.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:24.800", "lastModified": "2025-01-10T13:15:09.097", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13206.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13206.json index 7a9a4338710..cdf811e7d1a 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13206.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13206.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T04:15:10.990", "lastModified": "2025-01-09T04:15:10.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in REVE Antivirus 1.0.0.0 on Linux. This affects an unknown part of the file /usr/local/reveantivirus/tmp/reveinstall. The manipulation leads to incorrect default permissions. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad clasificada como cr\u00edtica en REVE Antivirus 1.0.0.0 en Linux. Afecta a una parte desconocida del archivo /usr/local/reveantivirus/tmp/reveinstall. La manipulaci\u00f3n da lugar a permisos predeterminados incorrectos. Es posible lanzar el ataque en el host local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13209.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13209.json index 177a1c91cc3..39f47f5ded3 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13209.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13209.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T04:15:11.683", "lastModified": "2025-01-09T04:15:11.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Redaxo CMS 5.18.1. It has been classified as problematic. Affected is an unknown function of the file /index.php?page=structure&category_id=1&article_id=1&clang=1&function=edit_art&artstart=0 of the component Structure Management Page. The manipulation of the argument Article Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Redaxo CMS 5.18.1. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /index.php?page=structure&category_id=1&article_id=1&clang=1&function=edit_art&artstart=0 del componente Structure Management Page. La manipulaci\u00f3n del argumento Article Name provoca cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13210.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13210.json index 82c8c4c1e2c..6bfd8c6551e 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13210.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13210.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T04:15:11.890", "lastModified": "2025-01-09T04:15:11.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in donglight bookstore\u7535\u5546\u4e66\u57ce\u7cfb\u7edf\u8bf4\u660e 1.0. It has been declared as critical. Affected by this vulnerability is the function uploadPicture of the file src/main/java/org/zdd/bookstore/web/controller/admin/AdminBookController. java. The manipulation of the argument pictureFile leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en donglight bookstore???????? 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n uploadPicture del archivo src/main/java/org/zdd/bookstore/web/controller/admin/AdminBookController.java. La manipulaci\u00f3n del argumento pictureFile permite cargar im\u00e1genes sin restricciones. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13211.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13211.json index df3abd4cfad..7ee8c1a3cac 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13211.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13211.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T04:15:12.077", "lastModified": "2025-01-09T04:15:12.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SingMR HouseRent 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file src/main/java/com/house/wym/controller/AdminController.java. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SingMR HouseRent 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo src/main/java/com/house/wym/controller/AdminController.java. La manipulaci\u00f3n conduce a controles de acceso inadecuados. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13212.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13212.json index 2a867f1be7d..15d338165a8 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13212.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13212.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T04:15:12.277", "lastModified": "2025-01-09T04:15:12.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in SingMR HouseRent 1.0. This affects the function singleUpload/upload of the file src/main/java/com/house/wym/controller/AddHouseController.java. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SingMR HouseRent 1.0. Afecta a la funci\u00f3n singleUpload/upload del archivo src/main/java/com/house/wym/controller/AddHouseController.java. La manipulaci\u00f3n del archivo de argumentos provoca una carga sin restricciones. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13213.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13213.json index bf876761e3f..9b3175e8134 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13213.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13213.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T04:15:12.453", "lastModified": "2025-01-09T04:15:12.453", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in SingMR HouseRent 1.0. This vulnerability affects unknown code of the file /toAdminUpdateHousePage?hID=30. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en SingMR HouseRent 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /toAdminUpdateHousePage?hID=30. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13237.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13237.json index ab5c935bbe1..7e0ba2c8ee4 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13237.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13237.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:17.437", "lastModified": "2025-01-09T21:15:24.977", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal File Entity (fieldable files) allows Cross-Site Scripting (XSS).This issue affects File Entity (fieldable files): from 7.X-* before 7.X-2.38." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal File Entity (archivos que se pueden filtrar) permite la ejecuci\u00f3n de Cross Site Scripting (XSS). Este problema afecta a File Entity (archivos que se pueden filtrar): desde 7.X-* hasta 7.X-2.38." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13238.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13238.json index 1378a6160a6..2d2f2ade96f 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13238.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13238.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:17.557", "lastModified": "2025-01-09T21:15:25.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Typogrify allows Cross-Site Scripting (XSS).This issue affects Typogrify: from 0.0.0 before 1.3.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Typogrify permite Cross-Site Scripting (XSS). Este problema afecta a Typogrify: desde la versi\u00f3n 0.0.0 hasta la 1.3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13245.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13245.json index fbb39398739..12f1da4de8f 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13245.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13245.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.370", "lastModified": "2025-01-09T21:15:25.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal CKEditor 4 LTS - WYSIWYG HTML editor allows Cross-Site Scripting (XSS).This issue affects CKEditor 4 LTS - WYSIWYG HTML editor: from 1.0.0 before 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal CKEditor 4 LTS - WYSIWYG HTML editor permite Cross-Site Scripting (XSS). Este problema afecta a CKEditor 4 LTS - WYSIWYG HTML editor: desde 1.0.0 antes de 1.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13247.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13247.json index 37e35fac20e..b4eb3834371 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13247.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13247.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.610", "lastModified": "2025-01-09T21:15:25.443", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Coffee allows Cross-Site Scripting (XSS).This issue affects Coffee: from 0.0.0 before 1.4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Coffee permite Cross-Site Scripting (XSS). Este problema afecta a Coffee: desde la versi\u00f3n 0.0.0 hasta la 1.4.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13252.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13252.json index 0b92e9512b0..060ed673ffa 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13252.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13252.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.207", "lastModified": "2025-01-09T21:15:25.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal TacJS allows Cross-Site Scripting (XSS).This issue affects TacJS: from 0.0.0 before 6.5.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal TacJS permite Cross-Site Scripting (XSS). Este problema afecta a TacJS: desde 0.0.0 antes de 6.5.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13262.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13262.json index 985e4f09f51..f57cff7e3fe 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13262.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13262.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:34.890", "lastModified": "2025-01-09T21:15:25.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal View Password allows Cross-Site Scripting (XSS).This issue affects View Password: from 0.0.0 before 6.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal View Password permite Cross-Site Scripting (XSS). Este problema afecta a View Password: desde la versi\u00f3n 0.0.0 hasta la 6.0.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13265.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13265.json index cb0a8603304..df8cf29c87f 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13265.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13265.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:35.230", "lastModified": "2025-01-09T20:15:35.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') vulnerability in Drupal Opigno Learning path allows PHP Local File Inclusion.This issue affects Opigno Learning path: from 0.0.0 before 3.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de directivas en c\u00f3digo guardado est\u00e1ticamente ('inyecci\u00f3n de c\u00f3digo est\u00e1tico') en Drupal Opigno Learning path permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a Opigno Learning path: desde la versi\u00f3n 0.0.0 hasta la 3.1.2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13266.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13266.json index c04701d5997..b2310f1ed09 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13266.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13266.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:35.350", "lastModified": "2025-01-09T20:15:35.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Authorization vulnerability in Drupal Responsive and off-canvas menu allows Forceful Browsing.This issue affects Responsive and off-canvas menu: from 0.0.0 before 4.4.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n incorrecta en Drupal Responsive y off-canvas menu permite una navegaci\u00f3n forzada. Este problema afecta a Responsive and off-canvas menu: desde 0.0.0 antes de 4.4.4." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13267.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13267.json index 52c37436cc5..36870011066 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13267.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13267.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:35.470", "lastModified": "2025-01-09T20:15:35.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') vulnerability in Drupal Opigno TinCan Question Type allows PHP Local File Inclusion.This issue affects Opigno TinCan Question Type: from 7.X-1.0 before 7.X-1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de directivas en c\u00f3digo guardado est\u00e1ticamente ('inyecci\u00f3n de c\u00f3digo est\u00e1tico') en Drupal Opigno TinCan Question Type permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a Opigno TinCan Question Type: desde 7.X-1.0 antes de 7.X-1.3." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13268.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13268.json index 1f0a1781b59..7b29e0bde07 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13268.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13268.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:35.577", "lastModified": "2025-01-09T20:15:35.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') vulnerability in Drupal Opigno allows PHP Local File Inclusion.This issue affects Opigno: from 7.X-1.0 before 7.X-1.23." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de directivas en c\u00f3digo guardado est\u00e1ticamente ('inyecci\u00f3n de c\u00f3digo est\u00e1tico') en Drupal Opigno permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a Opigno: desde 7.X-1.0 hasta 7.X-1.23." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13269.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13269.json index d857f45222a..9c63b8018fb 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13269.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13269.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:35.687", "lastModified": "2025-01-09T20:15:35.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insertion of Sensitive Information Into Sent Data vulnerability in Drupal Advanced Varnish allows Forceful Browsing.This issue affects Advanced Varnish: from 0.0.0 before 4.0.11." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en datos enviados en Drupal Advanced Varnish permite una navegaci\u00f3n forzada. Este problema afecta a Advanced Varnish: desde la versi\u00f3n 0.0.0 hasta la 4.0.11." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13270.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13270.json index 35fe22eaad3..09d39e707d0 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13270.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13270.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:35.790", "lastModified": "2025-01-09T20:15:35.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Authorization vulnerability in Drupal Freelinking allows Forceful Browsing.This issue affects Freelinking: from 0.0.0 before 4.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n incorrecta en Drupal Freelinking permite la navegaci\u00f3n forzada. Este problema afecta a Freelinking: desde 0.0.0 antes de 4.0.1." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13271.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13271.json index 7364b408b20..e95daf8e2ec 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13271.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13271.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:35.910", "lastModified": "2025-01-09T20:15:35.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Authorization vulnerability in Drupal Content Entity Clone allows Forceful Browsing.This issue affects Content Entity Clone: from 0.0.0 before 1.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n incorrecta en Drupal Content Entity Clone permite una navegaci\u00f3n forzada. Este problema afecta a Content Entity Clone: desde la versi\u00f3n 0.0.0 hasta la 1.0.4." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13272.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13272.json index fc5aeacf858..0fe67496e6d 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13272.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13272.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:36.027", "lastModified": "2025-01-09T20:15:36.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient Granularity of Access Control vulnerability in Drupal Paragraphs table allows Content Spoofing.This issue affects Paragraphs table: from 0.0.0 before 1.23.0, from 2.0.0 before 2.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de granularidad insuficiente del control de acceso en Drupal Paragraphs table permite la suplantaci\u00f3n de contenido. Este problema afecta a Paragraphs table: desde 0.0.0 antes de 1.23.0, desde 2.0.0 antes de 2.0.2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13273.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13273.json index 9ae263ae04c..25b767c0365 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13273.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13273.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:36.137", "lastModified": "2025-01-09T21:15:25.913", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Open Social allows Cross-Site Scripting (XSS).This issue affects Open Social: from 0.0.0 before 12.3.8, from 12.4.0 before 12.4.5, from 13.0.0 before 13.0.0-alpha11." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Open Social permite Cross-Site Scripting (XSS). Este problema afecta a Open Social: desde la versi\u00f3n 0.0.0 hasta la 12.3.8, desde la versi\u00f3n 12.4.0 hasta la 12.4.5, desde la versi\u00f3n 13.0.0 hasta la 13.0.0-alpha11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13274.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13274.json index 1de92def70f..186575c767a 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13274.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13274.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:36.250", "lastModified": "2025-01-09T20:15:36.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Interaction Frequency vulnerability in Drupal Open Social allows Functionality Misuse.This issue affects Open Social: from 0.0.0 before 12.3.8, from 12.4.0 before 12.4.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control inadecuado de la frecuencia de interacci\u00f3n en Drupal Open Social permite un uso indebido de la funcionalidad. Este problema afecta a Open Social: desde la versi\u00f3n 0.0.0 hasta la 12.3.8, desde la versi\u00f3n 12.4.0 hasta la 12.4.5." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13275.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13275.json index 5afd706a050..fb9e9ac39ba 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13275.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13275.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:36.367", "lastModified": "2025-01-09T20:15:36.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Drupal Security Kit allows HTTP DoS.This issue affects Security Kit: from 0.0.0 before 2.0.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de acceso a recursos mediante un tipo incompatible ('Confusi\u00f3n de tipos') en Drupal Security Kit permite un ataque de denegaci\u00f3n de servicio HTTP. Este problema afecta a Security Kit: desde la versi\u00f3n 0.0.0 hasta la 2.0.3." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13283.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13283.json index 6fa621fdbd1..72577b39b06 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13283.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13283.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:37.230", "lastModified": "2025-01-09T21:15:26.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Facets allows Cross-Site Scripting (XSS).This issue affects Facets: from 0.0.0 before 2.0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Facets permite Cross-Site Scripting (XSS). Este problema afecta a Facets: desde la versi\u00f3n 0.0.0 hasta la 2.0.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13288.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13288.json index 50ead2ccd68..68899ad3db9 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13288.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13288.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T21:15:26.220", "lastModified": "2025-01-10T15:15:14.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13290.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13290.json index a2eb17599ca..bd5fccc784a 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13290.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13290.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T21:15:26.447", "lastModified": "2025-01-09T21:15:26.447", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Authorization vulnerability in Drupal OhDear Integration allows Forceful Browsing.This issue affects OhDear Integration: from 0.0.0 before 2.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n incorrecta en Drupal OhDear Integration permite la navegaci\u00f3n forzada. Este problema afecta a OhDear Integration: desde la versi\u00f3n 0.0.0 hasta la 2.0.4." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13299.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13299.json index 610523fb599..13158122395 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13299.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13299.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T21:15:27.460", "lastModified": "2025-01-09T21:15:27.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in Drupal Megamenu Framework.This issue affects Megamenu Framework: *.*." + }, + { + "lang": "es", + "value": "Vulnerabilidad en Drupal Megamenu Framework. Este problema afecta a Megamenu Framework: *.*." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13300.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13300.json index 2d95c3a443d..563b91a8158 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13300.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13300.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T21:15:27.563", "lastModified": "2025-01-09T21:15:27.563", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in Drupal Print Anything.This issue affects Print Anything: *.*." + }, + { + "lang": "es", + "value": "Vulnerabilidad en Drupal Print Anything. Este problema afecta a Print Anything: *.*." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13308.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13308.json index fa51eb05624..52d2a7e094c 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13308.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13308.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T21:15:28.623", "lastModified": "2025-01-09T21:15:28.623", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Browser Back Button allows Cross-Site Scripting (XSS).This issue affects Browser Back Button: from 1.0.0 before 2.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Browser Back Button permite Cross-Site Scripting (XSS). Este problema afecta al bot\u00f3n Atr\u00e1s del navegador: desde la versi\u00f3n 1.0.0 hasta la 2.0.2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13309.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13309.json index 26239a7b488..cb5d4129b60 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13309.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13309.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T21:15:28.740", "lastModified": "2025-01-09T21:15:28.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Authentication vulnerability in Drupal Login Disable allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Login Disable: from 2.0.0 before 2.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autenticaci\u00f3n incorrecta en Login Disable de Drupal permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Login Disable: desde 2.0.0 antes de 2.1.1." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13310.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13310.json index 6b66b823ffa..c8a99f1f3ea 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13310.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13310.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T21:15:28.867", "lastModified": "2025-01-09T21:15:28.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in Drupal Git Utilities for Drupal.This issue affects Git Utilities for Drupal: *.*." + }, + { + "lang": "es", + "value": "Vulnerabilidad en Drupal Git Utilities para Drupal. Este problema afecta a las utilidades Git para Drupal: *.*." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13311.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13311.json index 45cf3da04e6..fae09a8a4eb 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13311.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13311.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T21:15:28.970", "lastModified": "2025-01-09T21:15:28.970", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in Drupal Allow All File Extensions for file fields.This issue affects Allow All File Extensions for file fields: *.*." + }, + { + "lang": "es", + "value": "Vulnerabilidad en Drupal Allow All File Extensions para file fields.Este problema afecta a Allow All File Extensions for file fields: *.*." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13312.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13312.json index 1f1468597d6..376894067d4 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13312.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13312.json @@ -3,12 +3,16 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T21:15:29.077", "lastModified": "2025-01-09T21:15:29.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Drupal Open Social allows Forceful Browsing.This issue affects Open Social: from 11.8.0 before 12.3.10, from 12.4.0 before 12.4.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Drupal Open Social permite la navegaci\u00f3n forzada. Este problema afecta a Open Social: desde 11.8.0 hasta 12.3.10, desde 12.4.0 hasta 12.4.9." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13318.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13318.json index f741ca4ee53..a51e50be98d 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13318.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13318.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-10T12:15:24.257", "lastModified": "2025-01-10T12:15:24.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1317.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1317.json index 0c0c230e8e9..dd476324884 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1317.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1317.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1318.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1318.json index e2aea9ff606..9fabe8f4648 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1318.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1318.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1320.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1320.json index d579c1ddaa4..3d6345fce91 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1320.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1320.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-09T07:15:08.730", "lastModified": "2024-11-21T08:50:19.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1321.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1321.json index b57fd3f9098..e3dcb9edffd 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1321.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1321.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:19.663", "lastModified": "2024-11-21T08:50:19.770", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1326.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1326.json index 35bd379549a..fdb5f38f7f6 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1326.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1326.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-21T02:51:41.193", "lastModified": "2024-11-21T08:50:20.387", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1327.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1327.json index 990ea78cea1..7de21b08c44 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1327.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1327.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-03T03:15:08.703", "lastModified": "2024-11-21T08:50:20.510", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1334.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1334.json index 8913dc18373..137dab30907 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1334.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1334.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1335.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1335.json index 32f2332ed99..1fabac8ee81 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1335.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1335.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1336.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1336.json index 5dcd962afe5..f027ad9c010 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1336.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1336.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1338.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1338.json index 33af6ba235f..aee46f16729 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1338.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1338.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1339.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1339.json index d87aa2efe3f..000fe82e915 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1339.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1339.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1361.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1361.json index 77a26a88bf5..c00d1d73d97 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1361.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1361.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-02-23T11:15:08.567", "lastModified": "2024-11-21T08:50:24.830", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1362.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1362.json index e597b22835e..e846dcd1d40 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1362.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1362.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-02-23T11:15:08.750", "lastModified": "2024-11-21T08:50:24.963", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1407.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1407.json index da458114486..3427706a091 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1407.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1407.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-06-19T07:15:45.730", "lastModified": "2024-11-21T08:50:31.263", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1411.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1411.json index 706503e1f47..edfb856c837 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1411.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1411.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:50.103", "lastModified": "2024-11-21T08:50:31.793", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1502.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1502.json index 09e5cc35212..80c866bf29b 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1502.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1502.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-21T02:51:43.110", "lastModified": "2024-11-21T08:50:43.110", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1503.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1503.json index fe07efeab4d..bb73deabfa9 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1503.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1503.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-21T02:51:43.260", "lastModified": "2024-11-21T08:50:43.240", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1512.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1512.json index e7e98635d83..9f02e1202bb 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1512.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1512.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1644.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1644.json index 970cee6bd63..5d4ca86412b 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1644.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1644.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "help@fluidattacks.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1680.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1680.json index cca8cd27385..b0c024c98eb 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1680.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1680.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:25.773", "lastModified": "2024-11-21T08:51:04.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1748.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1748.json index 15611bfdf95..04056f1b6c3 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1748.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1748.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1749.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1749.json index 47809039475..37650a61b87 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1749.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1749.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1750.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1750.json index 49665c382e3..23472753600 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1750.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1750.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1751.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1751.json index 3e3135e4b5f..555ae097da1 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1751.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1751.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:26.683", "lastModified": "2024-11-21T08:51:13.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1769.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1769.json index 6003f29f20d..b38069b6157 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1769.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1769.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1786.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1786.json index 35f86f813de..eaba90d6aae 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1786.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1786.json @@ -94,7 +94,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1817.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1817.json index 1148761bf1e..d8f3dc4a8e5 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1817.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1817.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1831.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1831.json index 3e67fda91b1..07b2de64dbf 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1831.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1831.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1867.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1867.json index 25cea197e29..1c81d89453d 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1867.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1867.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1868.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1868.json index 3e63fa3e612..74ffe5dc303 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1868.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1868.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1918.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1918.json index bb50bf01de9..5b653633d09 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1918.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1918.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1919.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1919.json index 0b85e7aee82..4da44c4311b 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1919.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1919.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1920.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1920.json index 826914e7bf9..bed86e94ab1 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1920.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1920.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1921.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1921.json index 2495fe8e0b3..585600fc627 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1921.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1921.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1922.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1922.json index 13fa9982800..311b023ed0a 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1922.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1922.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1924.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1924.json index 1502a99a4bc..9d7bec35b9a 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1924.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1924.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1925.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1925.json index 8cb3443904a..f0f6a7ad64c 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1925.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1925.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1926.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1926.json index 186c08c21f4..7f9ed942dd4 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1926.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1926.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1927.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1927.json index eebf3639901..46d35842bbc 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1927.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1927.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1970.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1970.json index b0d0b555295..f7fe5e41852 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1970.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1970.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1971.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1971.json index 3e11dfb3495..1bd7ec141c0 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1971.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1971.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20105.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20105.json index 3eb72666116..bc3a402154e 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20105.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20105.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In m4u, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09062027; Issue ID: MSV-1743." + }, + { + "lang": "es", + "value": "En m4u, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios si un actor malintencionado ya obtuvo el privilegio del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09062027; ID de problema: MSV-1743." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20140.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20140.json index d346d0fa707..e2971a08694 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20140.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20140.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09270402; Issue ID: MSV-2020." + }, + { + "lang": "es", + "value": "En el estado de encendido, existe la posibilidad de una escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios si un actor malintencionado ya obtuvo el privilegio del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09270402; ID de problema: MSV-2020." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20143.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20143.json index c4e3f339c51..6a2838107f2 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20143.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20143.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069." + }, + { + "lang": "es", + "value": "En V6 DA, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09167056; ID de problema: MSV-2069." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20144.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20144.json index 68db4d3a478..aad9e77a59f 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20144.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20144.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2041." + }, + { + "lang": "es", + "value": "En V6 DA, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09167056; ID de problema: MSV-2041." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20145.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20145.json index 07c99d01fab..0361622a2d1 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20145.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20145.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09290940; Issue ID: MSV-2040." + }, + { + "lang": "es", + "value": "En V6 DA, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09290940; ID de problema: MSV-2040." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20146.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20146.json index bdf430936c2..4f7321d6205 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20146.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20146.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In wlan STA driver, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389496 / ALPS09137491; Issue ID: MSV-1835." + }, + { + "lang": "es", + "value": "En wlan STA driver, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00389496 / ALPS09137491; ID de problema: MSV-1835." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20148.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20148.json index 3aae9a0be1c..356ffb79920 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20148.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20148.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796." + }, + { + "lang": "es", + "value": "En WLAN STA FW, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00389045 / ALPS09136494; ID de problema: MSV-1796." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20149.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20149.json index 5cc52949d31..d83a639bc4d 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20149.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20149.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01231341 / MOLY01263331 / MOLY01233835; Issue ID: MSV-2165." + }, + { + "lang": "es", + "value": "En Modem, es posible que se produzca un bloqueo del sistema debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01231341 / MOLY01263331 / MOLY01233835; ID de problema: MSV-2165." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20150.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20150.json index abb465a2100..b9b4370ece3 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20150.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20150.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01412526; Issue ID: MSV-2018." + }, + { + "lang": "es", + "value": "En Modem, es posible que se produzca un bloqueo del sistema debido a un error l\u00f3gico. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01412526; ID de problema: MSV-2018." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20151.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20151.json index ad40b1739f5..3df0981e2d5 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20151.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20151.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: MOLY01399339; Issue ID: MSV-1928." + }, + { + "lang": "es", + "value": "En Modem, es posible que se produzca una escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n incorrecta de los l\u00edmites. Esto podr\u00eda provocar una escalada local de privilegios si un actor malintencionado ya ha obtenido el privilegio del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01399339; ID de problema: MSV-1928." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20152.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20152.json index ef10b747f9d..e1c73ec69d9 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20152.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20152.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798." + }, + { + "lang": "es", + "value": "En wlan STA driver, existe una posible aserci\u00f3n alcanzable debido a una gesti\u00f3n inadecuada de excepciones. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local si un actor malintencionado ya obtuvo el privilegio de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00389047 / ALPS09136505; ID de problema: MSV-1798." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20153.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20153.json index 429e8b0f9b4..eda5df848ab 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20153.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20153.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In wlan STA, there is a possible way to trick a client to connect to an AP with spoofed SSID. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08990446 / ALPS09057442; Issue ID: MSV-1598." + }, + { + "lang": "es", + "value": "En WLAN STA, existe una forma posible de enga\u00f1ar a un cliente para que se conecte a un punto de acceso con SSID falsificado. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08990446 / ALPS09057442; ID de problema: MSV-1598." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20154.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20154.json index b94193051de..17f1000a139 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20154.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20154.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00720348; Issue ID: MSV-2392." + }, + { + "lang": "es", + "value": "En Modem, existe la posibilidad de una escritura fuera de los l\u00edmites debido a la falta de una verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo, si un UE se ha conectado a una estaci\u00f3n base no autorizada controlada por el atacante, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY00720348; ID de problema: MSV-2392." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20652.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20652.json index 287673d5537..2c793360fd5 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20652.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20652.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20653.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20653.json index d595baf8f7c..ce34784b240 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20653.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20653.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20654.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20654.json index 6b16f4b720b..25ae8d8b8eb 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20654.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20654.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20655.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20655.json index 420ea65cc79..9e1d1ab9c79 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20655.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20655.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20656.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20656.json index 6aec50146c6..d234bb96b0d 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20656.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20656.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20657.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20657.json index b8f6c57b93c..57d694fd9c8 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20657.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20657.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20658.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20658.json index e9e57ccd527..7cdf467bea2 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20658.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20658.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20660.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20660.json index 5ceebff19c2..05e98cde1d6 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20660.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20660.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20661.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20661.json index ac1bd759e3d..dbdf02174f5 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20661.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20661.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20662.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20662.json index b48575bb32f..26b1b8d296a 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20662.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20662.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20663.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20663.json index 5449184098f..e3f121d9e62 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20663.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20663.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20664.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20664.json index e58e356df63..61175f18ac5 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20664.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20664.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20666.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20666.json index 0c2dc6320d0..cf78890d172 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20666.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20666.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20667.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20667.json index 91980e708c8..d487014d83d 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20667.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20667.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20671.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20671.json index fa842365210..ba8ccaecec2 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20671.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20671.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20672.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20672.json index fbdabe464cb..bda97d6fde0 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20672.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20672.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20673.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20673.json index 979fd5c4318..f6cec72f98c 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20673.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20673.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20674.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20674.json index 7015a43e37a..4b1e64f8ae7 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20674.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20674.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20675.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20675.json index 7822bf36f54..865ec43ba4c 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20675.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20675.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20676.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20676.json index f5bb140cb9b..12488423526 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20676.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20676.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20677.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20677.json index d0a41cb2016..e7fb7c3c05f 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20677.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20677.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20680.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20680.json index ae184d354e4..361ae050ea4 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20680.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20680.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20681.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20681.json index 9aa53a87b1d..9b4e2f9a268 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20681.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20681.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20682.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20682.json index e17aea26936..a3dfe3947b4 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20682.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20682.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20683.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20683.json index e188ff5b988..5a2a9f92db5 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20683.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20683.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20684.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20684.json index 5b15e06f8c9..ca3e1cfea4a 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20684.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20684.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20686.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20686.json index 13d4e032704..09dd26ecf9a 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20686.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20686.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20687.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20687.json index 8879db41209..39bf512c53f 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20687.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20687.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20690.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20690.json index 6424c9ac3b1..a2d04cd37f9 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20690.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20690.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20691.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20691.json index b29c666eb8a..f7ccdb3a99b 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20691.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20691.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20694.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20694.json index d8099888167..21c25f73863 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20694.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20694.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20695.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20695.json index 05285ad5a41..60a0c04ffd5 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20695.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20695.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20696.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20696.json index 4076db546ab..57ac0552eb5 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20696.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20696.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20697.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20697.json index 86930454af6..0d858a9144b 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20697.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20697.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20698.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20698.json index b11a496ec74..bbe6b233b4e 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20698.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20698.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20699.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20699.json index b583f6078de..f227b3680d9 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20699.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20699.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20700.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20700.json index d07d84ae4b6..2d702647529 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20700.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20700.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20754.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20754.json index 0f4e58cd215..2fd1a5c2158 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20754.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20754.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20758.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20758.json index cbe063d478f..4ca5867aacf 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20758.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20758.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T12:15:08.567", "lastModified": "2024-11-21T08:53:05.827", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20759.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20759.json index 11a5ee37747..30525c73516 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20759.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20759.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T12:15:08.893", "lastModified": "2024-11-21T08:53:05.953", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20765.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20765.json index 12355bc9b23..1f535989fa9 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20765.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20765.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-02-29T17:15:07.110", "lastModified": "2024-11-21T08:53:06.653", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2065.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2065.json index 91bf3528905..f25f2917faf 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2065.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2065.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2066.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2066.json index bf8aa09288e..23334da00ae 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2066.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2066.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2067.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2067.json index 9af5fc244d7..74851ca94c9 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2067.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2067.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2068.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2068.json index 502d1155995..3785d7ee0f4 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2068.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2068.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2069.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2069.json index bf69bb29297..16f5f505b00 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2069.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2069.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2070.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2070.json index ad41633027c..38feeb88cf3 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2070.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2070.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2071.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2071.json index 823eaca94eb..ab81eefc38a 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2071.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2071.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2072.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2072.json index 717750f6843..c68852766e6 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2072.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2072.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2073.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2073.json index 4c5c0a198c2..199db3ad838 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2073.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2073.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json index 52a47b4d03d..56a0de04d13 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21304.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21304.json index f1005127b13..d2f78ea9a46 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21304.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21304.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21305.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21305.json index 72f57cbecf6..683beae9975 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21305.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21305.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21306.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21306.json index 57cba60750e..0ade47d6cac 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21306.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21306.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21307.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21307.json index cff5cbd8e40..90a17262da8 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21307.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21307.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21309.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21309.json index 6a34b43c325..c60636da9b1 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21309.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21309.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21310.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21310.json index 29101701063..2d2e19a0094 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21310.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21310.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21311.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21311.json index 0c92d5516fc..2433b691e29 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21311.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21311.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21312.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21312.json index a80ef72b581..a0ebdca874a 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21312.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21312.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21313.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21313.json index d4d8b0572f1..c3f6c9ae3a6 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21313.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21313.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21314.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21314.json index e1efaa3167e..49eef9e3adf 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21314.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21314.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21316.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21316.json index 357934ba924..a819190f37e 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21316.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21316.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21318.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21318.json index ee4bcd38070..4315f2a15b2 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21318.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21318.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21319.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21319.json index d9078a0cc46..5f90ee374d9 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21319.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21319.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21322.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21322.json index c9cb0e8c8ce..ce7608db342 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21322.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21322.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21323.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21323.json index 66c7ca1cc9f..21500a35d48 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21323.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21323.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21324.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21324.json index af7998f78f3..5565dd6e33c 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21324.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21324.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21325.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21325.json index d1c424c3602..0e7445a596b 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21325.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21325.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21326.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21326.json index dc805efa374..cf685de0665 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21326.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21326.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21327.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21327.json index 2b011d9545d..c2b0d0b3ce7 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21327.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21327.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21328.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21328.json index 6b46ee646ee..4614c3cd6bf 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21328.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21328.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21329.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21329.json index 3499a6cece6..f7497c92496 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21329.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21329.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21330.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21330.json index e7547c52481..18104019ada 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21330.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21330.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21334.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21334.json index 328cfb3676b..311e3cab4bb 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21334.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21334.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21336.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21336.json index 00439aa6325..fbd100e0ab3 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21336.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21336.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21337.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21337.json index b50931c0ce1..11da77aefa8 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21337.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21337.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21338.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21338.json index 02e42e41ad0..229121e5dcc 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21338.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21338.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21339.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21339.json index 2775e3522ff..de0f05ac30d 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21339.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21339.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21340.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21340.json index 10ea581ae91..5268290fd85 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21340.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21340.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21341.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21341.json index e5a75755bdf..905b27c8140 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21341.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21341.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21342.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21342.json index 83408f947f7..370f1cf3100 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21342.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21342.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21344.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21344.json index 628613c848e..7353b68c2ca 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21344.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21344.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21345.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21345.json index faddb1def5e..544f6dd8f5a 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21345.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21345.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21346.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21346.json index 4fa74ceaffb..831b2f85298 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21346.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21346.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21347.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21347.json index d2eb01defd3..d7fdb1b36d4 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21347.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21347.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21348.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21348.json index c4b8da6c6e9..61b599c2ea3 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21348.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21348.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21349.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21349.json index b453ec2f899..95c7c923eae 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21349.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21349.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21350.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21350.json index 8b2e9646b36..b8a9acee969 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21350.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21350.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21351.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21351.json index 2c6d83bbc71..6e98b6a1e86 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21351.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21351.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21352.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21352.json index 45803c5b6a7..6a84f3f6a43 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21352.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21352.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21353.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21353.json index 7456b8bdc7e..efeb3fecb32 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21353.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21353.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21354.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21354.json index 7dd40864e76..4f04a94e8b1 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21354.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21354.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21355.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21355.json index abcf52fbeab..b2aeb501bff 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21355.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21355.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21356.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21356.json index 7e9ef0ad7c0..ca41f5a989e 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21356.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21356.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21357.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21357.json index d2075969971..905ccd0a815 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21357.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21357.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21358.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21358.json index 2468783d2dd..cd6dc197fe4 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21358.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21358.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21359.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21359.json index ea9fbb791d0..d9ffd4eae6d 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21359.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21359.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21360.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21360.json index 0fbbf718e0e..b81ebd4e99d 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21360.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21360.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21361.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21361.json index 3f4ae78e9a3..cccdc516a34 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21361.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21361.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21362.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21362.json index 4535ae23a2b..7c47695b03e 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21362.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21362.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21364.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21364.json index 3f4935b6f74..37c70ff7eb1 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21364.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21364.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21365.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21365.json index 44c355d27eb..4972b23524b 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21365.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21365.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21366.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21366.json index 8d618c72635..408b2aaee9a 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21366.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21366.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21367.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21367.json index a9259f285b9..f45c62d1261 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21367.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21367.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21368.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21368.json index 45cf4c5785c..1ab23598c65 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21368.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21368.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21369.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21369.json index 6f9c067c594..4e8da2175f6 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21369.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21369.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21370.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21370.json index bb937f3d327..c22bfd1c893 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21370.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21370.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21371.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21371.json index b1bf9ff5eb9..7bbbc09068a 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21371.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21371.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21372.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21372.json index 3975fca1a6f..8d3e93c3c0e 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21372.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21372.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21374.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21374.json index 17d9af58339..982d3ea3469 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21374.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21374.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21375.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21375.json index 53fc91a2827..97c98190812 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21375.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21375.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21376.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21376.json index d42b3701a7a..67bf69315f1 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21376.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21376.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21377.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21377.json index d4bf4550ff0..347a6e603af 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21377.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21377.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21378.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21378.json index 42c94515c6d..179bc7ac58f 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21378.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21378.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21379.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21379.json index f010d98f4b8..dd8cd867251 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21379.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21379.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21380.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21380.json index 5b1bfd634c1..54a28c18c7b 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21380.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21380.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21381.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21381.json index f0b8791c8a6..e36a47d3236 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21381.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21381.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21382.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21382.json index 30bba02de9e..bd00a0973ab 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21382.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21382.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21383.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21383.json index 20df19e5615..8a678acc429 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21383.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21383.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21384.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21384.json index 1c5b67532f3..d7ff32caf92 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21384.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21384.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21385.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21385.json index d9dae2a33f8..7ecd1da4b07 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21385.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21385.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21386.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21386.json index c47cbad7930..c2aaecd8e6f 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21386.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21386.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21387.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21387.json index f361df81b4d..833c3c6ba67 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21387.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21387.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21388.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21388.json index ab45abb4c6e..0ee1604b422 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21388.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21388.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21389.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21389.json index 9693ad6f6a9..d8aad75e63d 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21389.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21389.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21390.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21390.json index 1e17565f382..fde4386b107 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21390.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21390.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21391.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21391.json index 00cf1c4883b..3bbb16262af 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21391.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21391.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21392.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21392.json index 30a1a7b9dd9..b1c0f34e8f1 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21392.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21392.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21393.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21393.json index a70455c2e38..c691f16ff66 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21393.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21393.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21394.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21394.json index 03694eec83d..b3b88d4cb1b 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21394.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21394.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21395.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21395.json index c07fdf9ee0f..95647c864d7 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21395.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21395.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21396.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21396.json index d04aac4841e..1c8262158d7 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21396.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21396.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21397.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21397.json index 8ca7aa773f0..3de877b0356 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21397.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21397.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L", diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21399.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21399.json index e54efd3021d..61d966a1a06 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21399.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21399.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21400.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21400.json index 7fe7ca6697f..74b6871a186 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21400.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21400.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21401.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21401.json index 3717774f5c5..794a7b658e2 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21401.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21401.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21402.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21402.json index bc04432dc3e..b9693f7a38a 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21402.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21402.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21403.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21403.json index 0c10e9a15ff..84d7da18c1b 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21403.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21403.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21404.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21404.json index 3b0dafd0d98..eb91911620c 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21404.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21404.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21405.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21405.json index 924761e6596..f55e20266cf 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21405.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21405.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21406.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21406.json index d98657eaea1..6ff11e84092 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21406.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21406.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21407.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21407.json index efa7fd7db83..6c75bf91351 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21407.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21407.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21408.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21408.json index f64be275ebb..773c2d4419b 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21408.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21408.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21410.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21410.json index d5bd2904cb8..5a4000f27d3 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21410.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21410.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21411.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21411.json index 469a9b89b77..e6faf647aff 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21411.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21411.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21412.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21412.json index c1829367b0e..a7d49eff6ef 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21412.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21412.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21413.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21413.json index 620e62953a6..d3aabce8ff3 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21413.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21413.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21418.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21418.json index 3106e31ae2e..0eac934d486 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21418.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21418.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21420.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21420.json index 2c64f9e104d..52aa908dde2 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21420.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21420.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21421.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21421.json index 87ec0362dc4..40127c7ed31 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21421.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21421.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21423.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21423.json index a15decbf07b..879a3caf6cb 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21423.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21423.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21426.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21426.json index 06acce9609e..7d5d4fc714e 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21426.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21426.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21427.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21427.json index b538c64a7f5..021d08fc6dd 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21427.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21427.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21429.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21429.json index a407e16956e..19f971220bb 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21429.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21429.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21432.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21432.json index 5d5e1060dd4..54ff010c8dd 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21432.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21432.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21433.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21433.json index e624ef2bba4..6314bd6b05a 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21433.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21433.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21434.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21434.json index 3471d3088e8..72cc09b3e25 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21434.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21434.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21435.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21435.json index 3db00bb38c0..6d38ce5e548 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21435.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21435.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21436.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21436.json index 5707bc333b1..9e480ecabb7 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21436.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21436.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21437.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21437.json index 25f00d53ddb..71a22072d73 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21437.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21437.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21438.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21438.json index 54b6f1275de..097f3dd1fc0 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21438.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21438.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21439.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21439.json index ff44041066b..c956be8044e 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21439.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21439.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21440.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21440.json index c05e5100998..e82f3c9f7a8 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21440.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21440.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21441.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21441.json index 4e17c370ca5..6a6db28837f 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21441.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21441.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21443.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21443.json index 3c153c05d74..5076a52b4d7 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21443.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21443.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21444.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21444.json index ef52d23251d..342e385c2c9 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21444.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21444.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21445.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21445.json index 3dc926511bc..e108aa8d39a 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21445.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21445.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21446.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21446.json index ed063b42863..6783e183a5d 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21446.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21446.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21448.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21448.json index 5f6768987fd..3c27e88c0c1 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21448.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21448.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21450.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21450.json index d37422a0f78..51a9ce6295a 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21450.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21450.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21451.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21451.json index b7da2becb16..dc92f54c5ae 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21451.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21451.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21452.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21452.json index 51d929879a4..323f06732c0 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21452.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21452.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:48.220", "lastModified": "2024-11-21T08:54:23.940", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21453.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21453.json index eedea6681f8..d9fcf10a140 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21453.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21453.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:48.417", "lastModified": "2024-11-21T08:54:24.077", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21454.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21454.json index b5a498246b3..0a03623b36b 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21454.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21454.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:48.667", "lastModified": "2024-11-21T08:54:24.210", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21463.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21463.json index ffaedda0cd5..e9c0aa9007e 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21463.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21463.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:48.860", "lastModified": "2024-11-21T08:54:27.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21468.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21468.json index cd83c487b8e..6f823d2df75 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21468.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21468.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:49.060", "lastModified": "2024-11-21T08:54:28.523", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21470.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21470.json index 81d3e6256f6..d3c8489bed2 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21470.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21470.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:49.263", "lastModified": "2024-11-21T08:54:29.310", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21471.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21471.json index a88bfce8344..c60a4805fcc 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21471.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21471.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:21.580", "lastModified": "2024-11-21T08:54:29.457", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21472.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21472.json index 74eb8e33c9c..0ee44fae4ab 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21472.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21472.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:49.490", "lastModified": "2024-11-21T08:54:29.653", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21473.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21473.json index e56015b5fa0..2c9b66e021f 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21473.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21473.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:49.693", "lastModified": "2024-11-21T08:54:29.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21474.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21474.json index 3e58a740b4b..553d1f66c73 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21474.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21474.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:21.770", "lastModified": "2024-11-21T08:54:30.007", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21475.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21475.json index 273f199099b..f7e89766d39 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21475.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21475.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:21.953", "lastModified": "2024-11-21T08:54:30.147", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21476.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21476.json index ac091e591c2..18c18a63b7e 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21476.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21476.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:22.160", "lastModified": "2024-11-21T08:54:30.310", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21477.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21477.json index a7bf3272ded..4d4162c0c5e 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21477.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21477.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:22.353", "lastModified": "2024-11-21T08:54:30.467", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json index 2137e062d77..202487e3e78 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:11.907", "lastModified": "2024-11-21T08:54:30.713", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21480.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21480.json index 6bd344734a4..f9dcef321f6 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21480.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21480.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:22.543", "lastModified": "2024-11-21T08:54:31.030", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21755.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21755.json index cd3ed08673f..d727ab67012 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21755.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21755.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21756.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21756.json index 4a350644405..5300681b769 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21756.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21756.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21786.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21786.json index 13e8caa8c65..af91ca039b3 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21786.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21786.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21814.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21814.json index 79965bd7b58..401bf1b8105 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21814.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21814.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:03.407", "lastModified": "2024-11-21T08:55:03.127", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21855.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21855.json index 749bf467e79..334240e19a0 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21855.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21855.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2132.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2132.json index 3714aa79b3d..01dc345f678 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2132.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2132.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-06T09:15:07.593", "lastModified": "2024-11-21T09:09:05.843", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2146.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2146.json index 9f127877cb9..3cf60029e3a 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2146.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2146.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2147.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2147.json index f7a597486b3..067261018ae 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2147.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2147.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2148.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2148.json index a9f5e8795d5..7b81e8f280d 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2148.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2148.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2151.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2151.json index b4572d12f81..f2478e7165d 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2151.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2151.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2152.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2152.json index b7a271e1828..061ad1af203 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2152.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2152.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2153.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2153.json index c0c1be567a6..d0afbc7b1eb 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2153.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2153.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2154.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2154.json index 5cf5a4b7de5..305996eb48e 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2154.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2154.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2156.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2156.json index 76e89a2ca86..0b13a4be643 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2156.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2156.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22355.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22355.json index d6c1abfa9df..c6f324967e8 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22355.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22355.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22356.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22356.json index 2f5e14cfa5f..9167ba05dc3 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22356.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22356.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-26T15:15:48.920", "lastModified": "2024-11-21T08:56:06.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23351.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23351.json index 3ce82b2e836..6105da3ff92 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23351.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23351.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:22.740", "lastModified": "2024-11-21T08:57:34.173", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23354.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23354.json index 7bff78cd86f..4670e1d252b 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23354.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23354.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-05-06T15:15:22.943", "lastModified": "2024-11-21T08:57:34.897", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23671.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23671.json index f79157cf1ab..9edbd6ba35b 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23671.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23671.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2353.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2353.json index adf8c5a2b28..50f42215e6f 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2353.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2353.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24779.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24779.json index 3b1e5c7ce56..dd8b05af4d3 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24779.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24779.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24975.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24975.json index 962e9fc8ea8..b8b55cec179 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24975.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24975.json @@ -3,7 +3,7 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-03-15T09:15:06.843", "lastModified": "2024-11-21T09:00:04.333", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2485.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2485.json index 4a74f8855e0..a81f0253679 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2485.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2485.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T07:15:13.790", "lastModified": "2024-11-21T09:09:51.443", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2486.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2486.json index 7c6cf3ad2f7..d81ff8baea2 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2486.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2486.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T08:15:07.160", "lastModified": "2024-11-21T09:09:51.597", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2487.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2487.json index a29c6208d25..9c6874cd37d 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2487.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2487.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T09:15:07.627", "lastModified": "2024-11-21T09:09:51.740", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2488.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2488.json index 6efd0619762..99e291d402e 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2488.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2488.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T09:15:08.063", "lastModified": "2024-11-21T09:09:51.887", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2489.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2489.json index 69d90a81878..ccbf07afb21 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2489.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2489.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T09:15:08.433", "lastModified": "2024-11-21T09:09:52.023", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2490.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2490.json index 3cc797a2dbf..621afbb7b8a 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2490.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2490.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T10:15:08.727", "lastModified": "2024-11-21T09:09:52.163", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2491.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2491.json index 6f2c2a23bb4..2ba5259ef28 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2491.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2491.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-30T10:15:07.460", "lastModified": "2024-11-21T09:09:52.307", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25037.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25037.json index 10a5bed24c0..e9b54a30d9c 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25037.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25037.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T16:15:32.937", "lastModified": "2025-01-07T16:15:32.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Cognos Controller 11.0.0 through 11.0.1 and IBM Controller 11.1.0 could allow a remote attacker to obtain sensitive information when a stack trace is returned in the browser." + }, + { + "lang": "es", + "value": "IBM Cognos Controller 11.0.0 a 11.0.1 e IBM Controller 11.1.0 podr\u00edan permitir que un atacante remoto obtenga informaci\u00f3n confidencial cuando se devuelve un seguimiento de pila en el navegador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25133.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25133.json index 1761e1b908b..8d82b22d123 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25133.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25133.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in the Hive ClusterDeployments resource in OpenShift Dedicated. In certain conditions, this issue may allow a developer account on a Hive-enabled cluster to obtain cluster-admin privileges by executing arbitrary commands on the hive/hive-controllers pod." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en Hive ClusterDeployments resource en OpenShift Dedicated. En determinadas condiciones, este problema puede permitir que una cuenta de desarrollador en un cl\u00faster habilitado para Hive obtenga privilegios de administrador de cl\u00faster mediante la ejecuci\u00f3n de comandos arbitrarios en el pod hive/hive-controllers." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2550.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2550.json index 1de3d14837c..32b9fed5691 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2550.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2550.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:04.137", "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2551.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2551.json index 407b7a7f36f..c3b43555b8f 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2551.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2551.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:04.547", "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2552.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2552.json index 1d2c2fd4611..6a0eed70d0e 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2552.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2552.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:04.957", "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26016.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26016.json index c6fb05db714..03b7fffdfb2 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26016.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26016.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26050.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26050.json index 19a4aa79e0b..73a8c3d5082 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26050.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26050.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26051.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26051.json index 6e554e80c46..49698e19748 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26051.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26051.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26135.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26135.json index 5bb30c4b06f..06c495144b9 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26135.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26135.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-20T20:15:08.560", "lastModified": "2024-11-21T09:02:00.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26158.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26158.json index cbc2c768314..38a3b0ea021 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26158.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26158.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26159.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26159.json index 8e8df4057cf..df1271b3e46 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26159.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26159.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26160.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26160.json index 782e3b06fbf..52b958547d1 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26160.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26160.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26161.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26161.json index e6a680bc489..faf289fe33b 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26161.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26161.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26162.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26162.json index df949510dd1..bd25c1ec5e2 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26162.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26162.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26163.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26163.json index e0f086a4104..3d7ab390396 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26163.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26163.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26164.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26164.json index 2ff58946a48..05a709279d1 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26164.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26164.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26165.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26165.json index bdc29c5ceac..2943b082eb2 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26165.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26165.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26166.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26166.json index c7fc11ca13a..9c8af6d1215 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26166.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26166.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26167.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26167.json index 063c455c873..821db59db6c 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26167.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26167.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26169.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26169.json index f05a22004dc..1af5306a27b 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26169.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26169.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26170.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26170.json index ee332d7a7de..32f7b47901f 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26170.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26170.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26173.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26173.json index f0d5e5e916d..f48e412ca27 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26173.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26173.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26174.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26174.json index 30d3a66e6f6..08f546ffb32 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26174.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26174.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26176.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26176.json index 84b45b9a07e..dfb225dd27b 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26176.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26176.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26177.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26177.json index 6765a1b39a6..9eacfd380ec 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26177.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26177.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26178.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26178.json index f0b0d37b874..f9d55869c03 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26178.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26178.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26181.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26181.json index a76c109e23a..46c6acdcb83 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26181.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26181.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26182.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26182.json index a066ce427d6..4d38ad72fcb 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26182.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26182.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26184.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26184.json index e9224674111..94e597fd11e 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26184.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26184.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26185.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26185.json index 27f7c71580a..966c0f18a69 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26185.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26185.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26186.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26186.json index 2bcb096804d..06096bf7a87 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26186.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26186.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26188.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26188.json index c5384bf32da..b82ee59dca3 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26188.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26188.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26190.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26190.json index 5e2a62d5d6c..865542c10fc 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26190.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26190.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26191.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26191.json index 6b26164093a..658ecbdf9e3 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26191.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26191.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26192.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26192.json index 293df4e7536..26b4bbbab99 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26192.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26192.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26196.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26196.json index 3e65253c416..78866b2630b 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26196.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26196.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26197.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26197.json index ef9d540cafe..1b3551db3fa 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26197.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26197.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26198.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26198.json index a26ea7381ce..8991aece913 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26198.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26198.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26199.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26199.json index 2dd0731b607..0101a9cf483 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26199.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26199.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26201.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26201.json index dc9d0a14872..95f33c3e28f 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26201.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26201.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26208.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26208.json index 2deb7ff79b9..4ba23235bfb 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26208.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26208.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26209.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26209.json index 83c76b2c9f4..6c6375f20c6 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26209.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26209.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26210.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26210.json index 19965465da6..04eacd8d78d 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26210.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26210.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26213.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26213.json index 329a3ef9b80..468f06a065c 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26213.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26213.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26214.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26214.json index 885ebe33042..2ec73ce9e2f 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26214.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26214.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26232.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26232.json index 0d5c7442b46..d1b68978624 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26232.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26232.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26244.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26244.json index e72d259883d..e74115bc888 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26244.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26244.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26247.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26247.json index 5cb8423218b..d172aab2ead 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26247.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26247.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26254.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26254.json index f9b10ebb65a..f87133ce376 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26254.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26254.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26257.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26257.json index 35eab44d519..4e3c9952223 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26257.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26257.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26621.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26621.json index b36cd217297..c896aeb3e10 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26621.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26621.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:50.340", "lastModified": "2024-11-21T09:02:42.520", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26653.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26653.json index 9587ffd3ab2..169908f4e7a 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26653.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26653.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-01T09:15:51.010", "lastModified": "2024-11-21T09:02:46.333", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26689.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26689.json index d69783c8ff9..b252681e45e 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26689.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26689.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:52.427", "lastModified": "2024-11-21T09:02:51.073", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26704.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26704.json index 4838558d687..8a8c16776d0 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26704.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26704.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:53.193", "lastModified": "2024-11-21T09:02:52.960", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26734.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26734.json index c8eb5fa5af1..c70160a9c3c 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26734.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26734.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.100", "lastModified": "2024-11-21T09:02:56.750", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26748.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26748.json index e94b01701ff..71ec17dc046 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26748.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26748.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.727", "lastModified": "2024-11-21T09:02:58.950", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26749.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26749.json index 82c509f2f1f..452b16e2ae8 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26749.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26749.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.780", "lastModified": "2024-11-21T09:02:59.073", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26892.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26892.json index 70f697717c2..0478dc319d9 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26892.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26892.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.530", "lastModified": "2024-11-21T09:03:19.010", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26895.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26895.json index 405f836cd8a..db576a3d1da 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26895.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26895.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.677", "lastModified": "2024-11-21T09:03:19.490", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26941.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26941.json index c44289d4fab..bfe480223cd 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26941.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26941.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:09.487", "lastModified": "2024-11-21T09:03:26.373", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26944.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26944.json index f5bdca8ffd5..f14cc135e60 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26944.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26944.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:10.010", "lastModified": "2024-11-21T09:03:26.850", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27059.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27059.json index 495b32cabb4..c582b31ea9e 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27059.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27059.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.493", "lastModified": "2024-11-21T09:03:46.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27255.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27255.json index c852143decd..9dd87c718d6 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27255.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27255.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27315.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27315.json index 60ed13d716a..967a75ecc92 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27315.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27315.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27395.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27395.json index 8619a8ea12c..541333a9832 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27395.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27395.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:27.683", "lastModified": "2024-11-21T09:04:31.553", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27396.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27396.json index 2a4bb79f7d1..161cd6a09e0 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27396.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27396.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:27.983", "lastModified": "2024-11-21T09:04:31.693", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27980.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27980.json index 354b1dfd335..11db64909c2 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27980.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27980.json @@ -3,7 +3,7 @@ "sourceIdentifier": "support@hackerone.com", "published": "2025-01-09T01:15:08.367", "lastModified": "2025-01-09T22:15:27.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28778.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28778.json index 0b3ae5f8166..b8de9662150 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28778.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28778.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T16:15:33.113", "lastModified": "2025-01-07T16:15:33.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Cognos Controller 11.0.0 through 11.0.1 and IBM Controller 11.1.0 is vulnerable to exposure of Artifactory API keys. This vulnerability allows users to publish code to private packages or repositories under the name of the organization." + }, + { + "lang": "es", + "value": "IBM Cognos Controller 11.0.0 a 11.0.1 e IBM Controller 11.1.0 son vulnerables a la exposici\u00f3n de claves API de Artifactory. Esta vulnerabilidad permite a los usuarios publicar c\u00f3digo en paquetes o repositorios privados bajo el nombre de la organizaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28852.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28852.json index a4a57157811..fd4c24ce499 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28852.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28852.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-27T14:15:10.340", "lastModified": "2024-11-21T09:07:02.927", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28853.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28853.json index 18f047ca156..7368267c9c3 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28853.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28853.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-27T14:15:10.573", "lastModified": "2024-11-21T09:07:03.070", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28892.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28892.json index a0a8990aa23..95c4a089e0e 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28892.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28892.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28899.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28899.json index 1c01ebe415c..7486fb48758 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28899.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28899.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28904.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28904.json index dcc326cca2f..bc8e845f098 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28904.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28904.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28905.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28905.json index 95d98b566d8..83b7fa570af 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28905.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28905.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28907.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28907.json index 875bd5848ae..56b740d1410 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28907.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28907.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28976.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28976.json index 29474a1cb49..44bc4ea5491 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28976.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28976.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-04-24T08:15:37.633", "lastModified": "2024-11-21T09:07:18.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28977.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28977.json index 56206e962d7..b29d1b46a0b 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28977.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28977.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-04-24T08:15:37.897", "lastModified": "2024-11-21T09:07:18.537", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2819.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2819.json index 85fbb4f1580..e429735c84e 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2819.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2819.json @@ -3,7 +3,7 @@ "sourceIdentifier": "hirt@hitachi.co.jp", "published": "2024-07-02T02:15:02.127", "lastModified": "2024-11-21T09:10:36.070", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2820.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2820.json index 29f8a34060e..db9e242b705 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2820.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2820.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-22T16:15:10.193", "lastModified": "2024-11-21T09:10:36.203", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2823.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2823.json index 396b427ce52..0a2d0a5ad94 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2823.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2823.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-22T17:15:09.360", "lastModified": "2024-11-21T09:10:36.770", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29052.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29052.json index 7d03d1f4312..d0372f28830 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29052.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29052.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -39,7 +39,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29053.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29053.json index 3deac8449ca..9636d2309c4 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29053.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29053.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29054.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29054.json index d07aba0571e..07eae0a5f03 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29054.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29054.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29055.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29055.json index 61158113558..e50dba1fd5d 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29055.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29055.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29056.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29056.json index 693326a7fc9..7d52341d4ca 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29056.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29056.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29060.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29060.json index 9f62840be34..26709bdf5ca 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29060.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29060.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29061.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29061.json index 542d2843219..6d4ed0cf99a 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29061.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29061.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29062.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29062.json index c4016e752c7..b8cc86707f5 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29062.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29062.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29101.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29101.json index fe21da46560..82fbf8d13c5 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29101.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29101.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-19T16:15:12.330", "lastModified": "2024-11-21T09:07:33.363", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29106.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29106.json index b236389e967..9a7c4f9244a 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29106.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29106.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-19T16:15:14.853", "lastModified": "2024-11-21T09:07:34.030", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29224.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29224.json index 2388326b7fa..0e95cb08683 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29224.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29224.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29988.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29988.json index e75ac2b41a2..0d92577fc1d 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29988.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29988.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29995.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29995.json index 6f3dfef1d7c..682a5b8a23b 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29995.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29995.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29997.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29997.json index 5020a1a7941..9979d1cb5ea 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29997.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29997.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29998.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29998.json index 28ce7a8473b..f1de94ec0c1 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29998.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29998.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29999.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29999.json index b86d41e7d2f..eee5e71ed83 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29999.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29999.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30000.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30000.json index 0a1583e618c..d78340ae1a7 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30000.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30000.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30001.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30001.json index ca3edfb5b11..a72742bb6d9 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30001.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30001.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30002.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30002.json index 82fb3f8d284..7142af08bb2 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30002.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30002.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30003.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30003.json index dae90b6a4ad..f7c2a50ced2 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30003.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30003.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30004.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30004.json index fe28289d501..52139f5d919 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30004.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30004.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30005.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30005.json index 76047af2e98..f36f48c0daa 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30005.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30005.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30013.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30013.json index 19c5f2406be..5eff01302c7 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30013.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30013.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30040.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30040.json index 99ded5814a1..8288b632737 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30040.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30040.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30051.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30051.json index 0f170f002bd..25d0443de04 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30051.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30051.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30052.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30052.json index cae1b27af5e..76ec0c1ad2e 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30052.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30052.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30057.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30057.json index c6e973bfa19..1a81d484d38 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30057.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30057.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30062.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30062.json index b85bf4376ea..50785601e3b 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30062.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30062.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30063.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30063.json index d09247caa48..6f4b4f5aff0 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30063.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30063.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30064.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30064.json index 254eef4b7bd..ce894c55d2f 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30064.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30064.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30065.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30065.json index 258c9a20c07..7a5b3afd179 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30065.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30065.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30066.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30066.json index 13e0fdbefe2..2b3bc45e81a 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30066.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30066.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30067.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30067.json index fad19cb89fd..70253515eb1 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30067.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30067.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30068.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30068.json index eef2fb64b41..d1d7e89d32f 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30068.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30068.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30069.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30069.json index 1f188a445a6..414e2a3e433 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30069.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30069.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30070.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30070.json index c47d9ee0811..43e13f2f08f 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30070.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30070.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30071.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30071.json index 96cc2c0c2ca..2c0aa5287f6 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30071.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30071.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30072.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30072.json index 26e3bfb2f54..f2f92be6653 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30072.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30072.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30073.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30073.json index b03eeaa6e74..c94fa086fa1 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30073.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30073.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30074.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30074.json index ec2ab715e80..782bf630b06 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30074.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30074.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30075.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30075.json index fc9693099e0..86be2ae589c 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30075.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30075.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30076.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30076.json index 5cc051120a1..625c201a088 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30076.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30076.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30077.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30077.json index 790faeb3195..5be684ac79f 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30077.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30077.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30078.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30078.json index 40577a34a35..84784dc7ae8 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30078.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30078.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30079.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30079.json index 3df3e9e3ee6..eb4f8971159 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30079.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30079.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30080.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30080.json index 1844d75953d..160278dbae3 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30080.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30080.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30081.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30081.json index 72be8bfd801..37596e01afe 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30081.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30081.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30082.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30082.json index 78ffe1ec4ad..421f7775adc 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30082.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30082.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30083.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30083.json index 120a32c37ee..263e60432b5 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30083.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30083.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30084.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30084.json index 6e0c302d679..caad9215a3f 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30084.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30084.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30085.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30085.json index 923b4e842b1..851062dddff 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30085.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30085.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30086.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30086.json index a22e0d30a97..620b39745b0 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30086.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30086.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30087.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30087.json index 0b3e6e212d3..77bfbfcd039 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30087.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30087.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30088.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30088.json index d95645ed82e..17dd27b4ae2 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30088.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30088.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30089.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30089.json index 9e1ff9c4163..7e22866ce6c 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30089.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30089.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30090.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30090.json index 0d0bc83977f..5e55f3a2743 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30090.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30090.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30091.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30091.json index d13bdd9d9ee..46b1cf0a059 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30091.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30091.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30093.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30093.json index b3362ce8f71..af7c7dab5f1 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30093.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30093.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30094.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30094.json index 2f57ca68776..903e2abe636 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30094.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30094.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30095.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30095.json index c10227423a0..d616c0b3f0b 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30095.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30095.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30096.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30096.json index 97b0600447f..b44910f6f7d 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30096.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30096.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30097.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30097.json index 4dd03e5c53d..e9f59dab8c4 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30097.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30097.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30098.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30098.json index 86e6bb54d68..59717e01a12 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30098.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30098.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30099.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30099.json index 500e87e658a..ea8d6733d0f 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30099.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30099.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30100.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30100.json index 4bb816a81fc..fe6aef9a3c8 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30100.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30100.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30101.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30101.json index 9ed8075b4ef..da7184002b1 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30101.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30101.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30102.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30102.json index 474701d5f88..e555fa40f60 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30102.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30102.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30103.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30103.json index f9ff43e4c2b..628800e843c 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30103.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30103.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30104.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30104.json index 98e4a618c81..4a38382fda7 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30104.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30104.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30258.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30258.json index a4dd4e9e467..7af16a2f609 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30258.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30258.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-14T15:22:15.163", "lastModified": "2024-11-21T09:11:34.120", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30259.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30259.json index bf649745ac5..13e35f7f9d9 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30259.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30259.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-14T15:22:15.967", "lastModified": "2024-11-21T09:11:34.253", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30377.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30377.json index ad742a57616..569a7ad9c2c 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30377.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30377.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3049.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3049.json index 5c5cde10208..b2edb2262e1 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3049.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3049.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3056.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3056.json index 2622fc50e3b..3e9eb0cbf4c 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3056.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3056.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:H", @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31487.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31487.json index d245675ef5e..bd666385b57 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31487.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31487.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31495.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31495.json index e41884dcc89..cccfcbd18f2 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31495.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31495.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31913.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31913.json index 25588cad56d..c7f0a84648c 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31913.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31913.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-06T16:15:28.163", "lastModified": "2025-01-06T16:15:28.163", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 a 6.1.2.5 y 6.2.0.0 a 6.2.0.2 es vulnerable a cross site scripting almacenado. Esta vulnerabilidad permite a los usuarios incorporar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31914.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31914.json index 593c7eb4613..c20da6a1fcd 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31914.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31914.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-06T16:15:28.320", "lastModified": "2025-01-06T17:15:36.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 a 6.1.2.5 y 6.2.0.0 a 6.2.0.2 es vulnerable a cross site scripting almacenado. Esta vulnerabilidad permite a los usuarios incorporar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31981.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31981.json index c5b99852133..4b5045e987d 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31981.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31981.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T20:15:08.280", "lastModified": "2024-11-21T09:14:16.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31982.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31982.json index 89daae35489..18fafd93128 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31982.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31982.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T20:15:08.463", "lastModified": "2024-11-21T09:14:16.600", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31983.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31983.json index fbb017e712d..9bc12d7597d 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31983.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31983.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T20:15:08.650", "lastModified": "2024-11-21T09:14:16.737", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31984.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31984.json index b256792fa7f..c70fba6c9c4 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31984.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31984.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T20:15:08.830", "lastModified": "2024-11-21T09:14:16.870", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31985.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31985.json index a03c389c06c..199f6068f00 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31985.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31985.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T21:15:06.723", "lastModified": "2024-11-21T09:14:17.007", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31986.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31986.json index 764b84fea53..bda366d138c 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31986.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31986.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T21:15:06.917", "lastModified": "2024-11-21T09:14:17.133", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31987.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31987.json index c43c87f5b49..54a76eb746e 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31987.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31987.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T21:15:07.110", "lastModified": "2024-11-21T09:14:17.267", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3143.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3143.json index d4563760440..c74e5b30a72 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3143.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3143.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-02T01:15:52.730", "lastModified": "2024-11-21T09:28:59.510", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3144.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3144.json index 000aeea4132..625e1c23d9d 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3144.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3144.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-02T02:15:07.667", "lastModified": "2024-11-21T09:28:59.643", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3145.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3145.json index 5abd3058723..561892bba44 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3145.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3145.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-02T02:15:08.370", "lastModified": "2024-11-21T09:28:59.780", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3146.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3146.json index 0fe741d3de8..28426d3ef13 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3146.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3146.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-02T02:15:09.010", "lastModified": "2024-11-21T09:28:59.920", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3147.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3147.json index 05b0c704c77..ab8c213f945 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3147.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3147.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-02T02:15:09.640", "lastModified": "2024-11-21T09:29:00.070", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3148.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3148.json index 9d8c93da117..ef90f9bd9e0 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3148.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3148.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-02T02:15:10.537", "lastModified": "2024-11-21T09:29:00.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3161.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3161.json index 6dc991e974a..c43440984b8 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3161.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3161.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:22.840", "lastModified": "2024-11-21T09:29:02.347", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3162.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3162.json index d38d6b8171b..520e595b7fa 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3162.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3162.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-03T03:15:10.907", "lastModified": "2024-11-21T09:29:02.493", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json index 47e67fc4185..4f0111ab6f0 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json @@ -66,7 +66,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32721.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32721.json index 57eb0513dc7..c92bfeafb8f 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32721.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32721.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-24T10:15:06.527", "lastModified": "2024-11-21T09:15:33.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32791.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32791.json index 9dcfd3a51ca..1f638954d1d 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32791.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32791.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-24T09:15:06.910", "lastModified": "2024-11-21T09:15:43.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32793.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32793.json index 53a213906bb..1e4cd791ad5 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32793.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32793.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-24T15:15:47.157", "lastModified": "2024-11-21T09:15:44.033", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32794.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32794.json index 61dd218196c..cbc933ffd40 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32794.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32794.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-24T15:15:47.350", "lastModified": "2024-11-21T09:15:44.157", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3215.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3215.json index dae950d45b2..250c800711f 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3215.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3215.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:23.527", "lastModified": "2024-11-21T09:29:09.883", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3382.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3382.json index 04e1de54839..1aedb20cb7b 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3382.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3382.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-04-10T17:15:56.793", "lastModified": "2024-11-21T09:29:30.253", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3383.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3383.json index 572e5568c2e..e6d24beb0d4 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3383.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3383.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-04-10T17:15:57.000", "lastModified": "2024-11-21T09:29:30.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3384.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3384.json index edcf973c6c8..12d6a198a22 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3384.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3384.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-04-10T17:15:57.217", "lastModified": "2024-11-21T09:29:30.517", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3385.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3385.json index 899a15ce5b9..4a2f897fb12 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3385.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3385.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-04-10T17:15:57.410", "lastModified": "2024-11-21T09:29:30.643", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3386.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3386.json index 128ceb17397..fa9004726a8 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3386.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3386.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-04-10T17:15:57.593", "lastModified": "2024-11-21T09:29:30.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3388.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3388.json index edc02f17e5f..3f1c2565243 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3388.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3388.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-04-10T17:15:57.970", "lastModified": "2024-11-21T09:29:31.047", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3393.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3393.json index 94d4f127a4b..58d1260f45c 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3393.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3393.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-12-27T10:15:17.270", "lastModified": "2025-01-04T02:00:01.597", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35248.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35248.json index 1f2d0ff5b4b..6819cc9af59 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35248.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35248.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35249.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35249.json index 53f9a8cde2b..a35ac7b3b0d 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35249.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35249.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35250.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35250.json index d227fcb530d..8eccb905add 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35250.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35250.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35252.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35252.json index e964d9da443..76a3bac5f16 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35252.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35252.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35253.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35253.json index 211b8c47a63..72691c3fa58 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35253.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35253.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35254.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35254.json index 15bf7bf06f5..4a9fd2d8595 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35254.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35254.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35255.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35255.json index 82a27f14fa5..bafc5a47eca 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35255.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35255.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35263.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35263.json index a06d6457500..886e576f840 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35263.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35263.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35264.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35264.json index 63851136bc2..f46bb6b085b 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35264.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35264.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35265.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35265.json index e955932ac7c..16cccb0d713 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35265.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35265.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35270.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35270.json index db95f6794bb..2b76ce6abc3 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35270.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35270.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35365.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35365.json index 7e099d10729..91484555d01 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35365.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35365.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-03T18:15:15.177", "lastModified": "2025-01-03T21:15:12.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "FFmpeg version n6.1.1 has a double-free vulnerability in the fftools/ffmpeg_mux_init.c component of FFmpeg, specifically within the new_stream_audio function." + }, + { + "lang": "es", + "value": "La versi\u00f3n n6.1.1 de FFmpeg tiene una vulnerabilidad de doble liberaci\u00f3n en el componente fftools/ffmpeg_mux_init.c de FFmpeg, espec\u00edficamente dentro de la funci\u00f3n new_stream_audio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35532.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35532.json index 1248f6356ef..852dd2c58c7 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35532.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35532.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T20:15:29.627", "lastModified": "2025-01-08T15:15:17.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35811.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35811.json index c32aee87a17..2b7b244d4be 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35811.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35811.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:15.177", "lastModified": "2024-11-21T09:20:57.097", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35979.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35979.json index ad32568a1b6..1fe9381f6f8 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35979.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35979.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:12.480", "lastModified": "2024-11-21T09:21:20.893", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3553.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3553.json index a905ada8768..c0d68a92183 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3553.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3553.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:26.923", "lastModified": "2024-11-21T09:29:51.813", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36613.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36613.json index 49c2515898d..2641b03b329 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36613.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36613.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-03T18:15:15.343", "lastModified": "2025-01-03T21:15:13.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "FFmpeg n6.1.1 has a vulnerability in the DXA demuxer of the libavformat library allowing for an integer overflow, potentially resulting in a denial-of-service (DoS) condition or other undefined behavior." + }, + { + "lang": "es", + "value": "FFmpeg n6.1.1 tiene una vulnerabilidad en el demuxer DXA de la librer\u00eda libavformat que permite un desbordamiento de enteros, lo que potencialmente puede resultar en una condici\u00f3n de denegaci\u00f3n de servicio (DoS) u otro comportamiento indefinido." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36899.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36899.json index 537e85e8549..68a50ce7895 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36899.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36899.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:13.510", "lastModified": "2024-11-21T09:22:46.107", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37277.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37277.json index 3b4687c7e58..82007787478 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37277.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37277.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:23.293", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37325.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37325.json index 70d24e06cc8..a0607f3ed7c 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37325.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37325.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37335.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37335.json index cebed2a5852..7e6139e0cfc 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37335.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37335.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37338.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37338.json index 82abd63aa58..7b5fd1e3985 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37338.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37338.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37339.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37339.json index b16b7a574e6..c09475b560d 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37339.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37339.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37340.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37340.json index a91299a3824..c76e51f1345 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37340.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37340.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37372.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37372.json index e239f2588e5..1ef683abc53 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37372.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37372.json @@ -3,7 +3,7 @@ "sourceIdentifier": "support@hackerone.com", "published": "2025-01-09T01:15:08.500", "lastModified": "2025-01-09T22:15:28.247", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37899.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37899.json index a75138184b5..1432fe2028b 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37899.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37899.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-20T23:15:52.460", "lastModified": "2024-11-21T09:24:29.807", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37922.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37922.json index 7f691313d54..d1981280313 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37922.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37922.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-20T09:15:05.063", "lastModified": "2024-11-21T09:24:31.313", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37947.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37947.json index ced25dcfd67..c00816d9b42 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37947.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37947.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-20T09:15:06.693", "lastModified": "2024-11-21T09:24:33.947", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37968.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37968.json index 718609ad35d..7ceab135f0c 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37968.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37968.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37969.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37969.json index 1e1695bb470..4d9ad84267b 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37969.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37969.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37970.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37970.json index da7044fa14e..55a1d1c1ccb 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37970.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37970.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37971.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37971.json index 77579d8799c..5ea4f56f488 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37971.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37971.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37972.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37972.json index 8b7e9700da9..494f2659d2a 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37972.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37972.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37973.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37973.json index 2a68705a8a3..8757984fd37 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37973.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37973.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37974.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37974.json index 7fad70d520f..7b97b1b807b 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37974.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37974.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37975.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37975.json index 083da0ea6da..28d55633b9d 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37975.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37975.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json index f36bea93856..ae07b7dcf69 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37977.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37977.json index 8d5299adc74..233d9875b4a 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37977.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37977.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37978.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37978.json index 1233642a89e..67f4706c090 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37978.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37978.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37981.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37981.json index 4f23c3b1ee6..b461cc0882d 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37981.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37981.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37984.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37984.json index 44ea446a9f0..483d4140481 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37984.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37984.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37986.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37986.json index d4c4a597fe3..99a4a7b0abe 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37986.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37986.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37987.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37987.json index 80fc5187a5b..72c23b3cca8 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37987.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37987.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37988.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37988.json index a8af76cff76..30dc3ceab4f 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37988.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37988.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37989.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37989.json index e15600fb837..d8e8ec6bb21 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37989.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37989.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38010.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38010.json index d2a4decff14..8258c7d0706 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38010.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38010.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38011.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38011.json index d054d3daecd..a1603c9e3a8 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38011.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38011.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38013.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38013.json index 91bd8a08b4d..b503b1bb119 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38013.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38013.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38014.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38014.json index 280893f6d39..6f839c49330 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38014.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38014.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38015.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38015.json index 30753aab6e5..52403e9365d 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38015.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38015.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38016.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38016.json index a17d77368e1..597efbd34f3 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38016.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38016.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38017.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38017.json index 8fb417f216e..1dcc19e9ac6 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38017.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38017.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38018.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38018.json index 54c12a579fa..717c33ea10a 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38018.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38018.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38019.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38019.json index aed8125af32..890c01d7b2a 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38019.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38019.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38022.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38022.json index b294daf736c..37051cedb3a 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38022.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38022.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38025.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38025.json index bac38b655eb..60d8c85ceee 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38025.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38025.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38027.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38027.json index 6d382c39245..0029b6fd256 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38027.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38027.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38028.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38028.json index 9d368f62a13..11e4618c324 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38028.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38028.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38029.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38029.json index 29aa8f09dc8..6ba1019b228 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38029.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38029.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38030.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38030.json index 976925f8cfe..971dab2cda8 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38030.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38030.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38031.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38031.json index b893056b048..aa20d98cc39 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38031.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38031.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38032.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38032.json index 83dc02ac519..4d1b6a7c32f 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38032.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38032.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38033.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38033.json index 357191a2cf6..bd51e937aca 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38033.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38033.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38034.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38034.json index 52623830013..6a114a8a401 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38034.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38034.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38041.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38041.json index 6e3eeee1f51..3bb58287980 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38041.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38041.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38043.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38043.json index eed8b8e56c8..549bcd220cc 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38043.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38043.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38044.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38044.json index 81f1a592d9e..ee698fee6f3 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38044.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38044.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38045.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38045.json index 1bc440c96fa..921f4013831 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38045.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38045.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38046.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38046.json index 6a9a5cb9994..7ee83aa6d14 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38046.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38046.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38047.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38047.json index 8be3d15884b..84d424f7966 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38047.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38047.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38048.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38048.json index cde7cac0443..365e8e36cab 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38048.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38048.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38050.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38050.json index 66fc9fff06c..dcb58905941 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38050.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38050.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38051.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38051.json index 338935a1465..ea8ddc74661 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38051.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38051.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38052.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38052.json index 5c25ac99bc8..b9a11ed04d3 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38052.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38052.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38053.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38053.json index 640edd146fc..708839dc2f5 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38053.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38053.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38054.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38054.json index 09c4acf371f..063442751ee 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38054.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38054.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38055.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38055.json index 5bcae70340c..22cba3905b1 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38055.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38055.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38056.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38056.json index ed5c470f871..3982b4e6470 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38056.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38056.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38057.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38057.json index 0d453c6c8b8..b135d5dd31e 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38057.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38057.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38058.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38058.json index ec4d905570e..192e7673db2 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38058.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38058.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38059.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38059.json index 393a293b82f..2299aee545a 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38059.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38059.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38060.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38060.json index 8f3cdfddf02..3652de1c272 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38060.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38060.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38061.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38061.json index f81ac0eceaa..143492cd9a0 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38061.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38061.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38062.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38062.json index 5413f7add4c..19bd114cd5c 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38062.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38062.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38063.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38063.json index fb0d206f971..16ba91b8d8a 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38063.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38063.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38064.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38064.json index 68585cd763f..b60fc90ab63 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38064.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38064.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38065.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38065.json index cba81fc329b..6a931bdeb08 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38065.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38065.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38066.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38066.json index 94ffedbe431..cb9c4bc51cd 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38066.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38066.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38067.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38067.json index 490ff4144ac..26494098d74 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38067.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38067.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38068.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38068.json index 7c906670642..2778502d9a0 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38068.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38068.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38069.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38069.json index 9770ffaf8f1..f2a22bdb5b1 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38069.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38069.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38070.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38070.json index dedd9e4f5b5..29eb65dc3c1 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38070.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38070.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38071.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38071.json index ddd5f511b88..fc51ac26abb 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38071.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38071.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38072.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38072.json index d375b64c6bf..49528f395d1 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38072.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38072.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38073.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38073.json index fa7c354d0b1..ba31aaf6338 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38073.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38073.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38074.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38074.json index b329aff94ce..17be6d9927c 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38074.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38074.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38076.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38076.json index 8daa11c2c16..7322f7957a6 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38076.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38076.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38077.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38077.json index e80da6a9f47..270a5d241e6 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38077.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38077.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38079.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38079.json index f79237a4647..a8625dd8b61 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38079.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38079.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38080.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38080.json index e55b48d51ef..c26a5dba983 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38080.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38080.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38081.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38081.json index ef80e0f0cbe..716f7758eb0 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38081.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38081.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38082.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38082.json index 7a1943b3a22..35275d2ad3a 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38082.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38082.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38083.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38083.json index b9e1c5ce0ee..fdb426de4cd 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38083.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38083.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38084.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38084.json index f4cedfd34d8..1dcace7a23e 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38084.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38084.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38085.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38085.json index 283d72202f4..1a8e46bb23b 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38085.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38085.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38091.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38091.json index b5cce5b25e7..31b7c118313 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38091.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38091.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38093.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38093.json index f9f1088cfe0..bad12b81f06 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38093.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38093.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38098.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38098.json index cde0118a37f..33c8bea75a2 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38098.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38098.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38099.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38099.json index fbb153546ab..875b718025c 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38099.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38099.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38100.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38100.json index a6b606cddda..57205d4a0d6 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38100.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38100.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38101.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38101.json index 6582ecde500..de67c91f173 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38101.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38101.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38102.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38102.json index 2dd88169804..67a7aa5a940 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38102.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38102.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38104.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38104.json index 166ea91e69a..56085250f38 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38104.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38104.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38105.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38105.json index 9e0fdbb63ae..f1c4bd119cf 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38105.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38105.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38106.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38106.json index 6da9755c1e9..1c73454cbb5 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38106.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38106.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38107.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38107.json index 9e5685a9770..ae4e8952cda 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38107.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38107.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38108.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38108.json index a6602a18c09..f8376d5ceff 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38108.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38108.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38109.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38109.json index 566638fee4b..e3712d4f9ce 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38109.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38109.json @@ -69,7 +69,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38112.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38112.json index 820147586e4..d9e9ca909ad 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38112.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38112.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38114.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38114.json index 8533816fcc0..790f0c31f56 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38114.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38114.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38115.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38115.json index 0fea37387f9..48e2d305a1b 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38115.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38115.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38116.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38116.json index 8f6192e3d6f..ce146a064ea 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38116.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38116.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38117.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38117.json index 76b890786ee..d8ad8184cbf 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38117.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38117.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38118.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38118.json index ec849475271..0ae1c029924 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38118.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38118.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38119.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38119.json index 87869563d95..6017129e439 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38119.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38119.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38120.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38120.json index 9788d8cf713..1bd5886f029 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38120.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38120.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38121.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38121.json index 0b318a0d808..24f27790a1e 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38121.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38121.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38122.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38122.json index 644454a4d11..2cda70d4711 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38122.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38122.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38123.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38123.json index bb58486cf6a..0ec0b77a037 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38123.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38123.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json index 69df3145e0c..799edc03e27 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38125.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38125.json index 1866eb528ac..d7a5471da28 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38125.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38125.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38126.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38126.json index ad942e29ff5..d25412224c2 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38126.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38126.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38127.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38127.json index 093acf27d0b..d05d52b791d 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38127.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38127.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38128.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38128.json index d01ceb150f5..037e0bf0c9f 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38128.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38128.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38130.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38130.json index 2e0243b8fd0..cf008eaeae2 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38130.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38130.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38131.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38131.json index 60c0686c4d1..6532aceeb3b 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38131.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38131.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38132.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38132.json index 059b72fba1c..af5948a3afe 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38132.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38132.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38133.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38133.json index 279ca0a3796..e8c6c31b5af 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38133.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38133.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38134.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38134.json index 9b6b316f139..a7ec7a551e0 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38134.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38134.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38135.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38135.json index d861aa05d39..77c87f352ff 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38135.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38135.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38136.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38136.json index c0f950906b2..00c6da289db 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38136.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38136.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38137.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38137.json index 0cecb34da06..62df180d09d 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38137.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38137.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38138.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38138.json index d74da8e7af0..8fe70dd1022 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38138.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38138.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38140.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38140.json index 8881ae3dbd3..4eac07d5534 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38140.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38140.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38141.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38141.json index 6e05d17501b..4022c4678bd 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38141.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38141.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38142.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38142.json index 55f02dbb9ca..a2b92cd924e 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38142.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38142.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38143.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38143.json index 8e42d6de560..af61ddea2ee 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38143.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38143.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38144.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38144.json index a1547fdaf98..89b39a4361b 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38144.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38144.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38145.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38145.json index 374ef85519b..b6863b14a5e 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38145.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38145.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38146.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38146.json index f2bb4ea48c3..e85773f3300 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38146.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38146.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38147.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38147.json index cc1c0a6af07..bdbbe19d194 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38147.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38147.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38148.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38148.json index 4c256f11e6a..10b17332f39 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38148.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38148.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json index c736a812687..ca7c1a6acfe 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38150.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38150.json index 5d478d9e844..3743187710c 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38150.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38150.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38151.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38151.json index 0bda4a6a37b..1716d9ae01e 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38151.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38151.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38152.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38152.json index 99bd97ea358..4dc322a5d78 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38152.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38152.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38153.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38153.json index acd96d5c57a..3c1fd1c7a6b 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38153.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38153.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38154.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38154.json index 120eda9e724..bd07189f35b 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38154.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38154.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38155.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38155.json index aa855cae660..05e2aa6cdb6 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38155.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38155.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38157.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38157.json index 605b764cacd..c805b699a9c 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38157.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38157.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38158.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38158.json index be1c6826d26..1949f90d54d 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38158.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38158.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38159.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38159.json index 2a47b13f91b..d0f739933e0 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38159.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38159.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38160.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38160.json index abfb5f69624..49cde5e8960 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38160.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38160.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38161.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38161.json index 9f46e910fbb..6ab2492951e 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38161.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38161.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38162.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38162.json index 4ccbc7d084f..7cc5536b24c 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38162.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38162.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38165.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38165.json index ee23912d390..411068f137e 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38165.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38165.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38166.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38166.json index 4c9cf0d93bc..a6c8b13399b 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38166.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38166.json @@ -69,7 +69,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38167.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38167.json index cf91aa2ac19..abab2328a6b 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38167.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38167.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38168.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38168.json index 56025ab8f0f..e9f885649d2 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38168.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38168.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38169.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38169.json index c5368217d48..dea4aa57919 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38169.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38169.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38170.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38170.json index 41a7286e83e..215a01047cb 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38170.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38170.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38171.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38171.json index 816d6548db1..514824b55ad 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38171.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38171.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38172.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38172.json index 94b57c93e19..40f02f841a8 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38172.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38172.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38173.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38173.json index 2bed3a215c2..a33c9ef48b6 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38173.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38173.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38177.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38177.json index 452b078e029..57d27381a7e 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38177.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38177.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38178.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38178.json index caf436ecc05..4442e66ac1e 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38178.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38178.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38180.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38180.json index ce6c4b8ef82..118ddff39da 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38180.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38180.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38184.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38184.json index 84190a23c95..17b9bc7bbcb 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38184.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38184.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38185.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38185.json index 19080c47026..3121d00a5e8 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38185.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38185.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38186.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38186.json index 65e9dfb9fb5..3225510d3e9 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38186.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38186.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38187.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38187.json index c4a8543a4ff..416d130ebc6 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38187.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38187.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38188.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38188.json index 3ce3a306b00..c84e7ac3009 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38188.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38188.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38189.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38189.json index a1ed73373ff..1c96a84ba17 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38189.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38189.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38191.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38191.json index 5728d654d09..51c214e36a0 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38191.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38191.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38193.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38193.json index fac407b360f..a66f40faad9 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38193.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38193.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38195.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38195.json index 0757b17bd8f..e3a18b1aa75 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38195.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38195.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38196.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38196.json index 73faa73b6b9..c90ba94e9b3 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38196.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38196.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38197.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38197.json index 6d24b5e3f2e..37f687725c1 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38197.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38197.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38198.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38198.json index e8467b81436..fc90fb20899 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38198.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38198.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38199.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38199.json index 48be54281e9..640687b1ab1 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38199.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38199.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38200.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38200.json index 4c7d29b4a92..248ed62659d 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38200.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38200.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38201.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38201.json index c5a9744e488..b16bc53e9eb 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38201.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38201.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json index aa3cebc3d58..47766adbc5c 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38206.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38206.json index c002bab3a63..7efd98c9588 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38206.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38206.json @@ -69,7 +69,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38208.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38208.json index c7bb553ff65..50388030f97 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38208.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38208.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38209.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38209.json index ed67d20382e..22d35fba020 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38209.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38209.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38210.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38210.json index 314bab819d3..2896dfccb1d 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38210.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38210.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38211.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38211.json index 1af56b47acd..72ead5a92e6 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38211.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38211.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json index 1d282bb910e..01b94a30e9f 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38213.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38213.json index e9af23d7768..6b38a663dc5 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38213.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38213.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38214.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38214.json index f26ae542a2e..0a4928b4700 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38214.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38214.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38215.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38215.json index 71e33ebcc24..ed5ddaef7b7 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38215.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38215.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38217.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38217.json index 611d16c414d..f3ba3e87754 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38217.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38217.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38220.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38220.json index 509607f7c4c..197e0e4172c 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38220.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38220.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38221.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38221.json index 8ff4c13880b..6a6dae6fffe 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38221.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38221.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38223.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38223.json index 7c1893cc28c..7748edd9f6e 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38223.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38223.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38226.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38226.json index 1055f0988b7..caf7fc01a91 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38226.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38226.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38227.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38227.json index 0de05da21c7..a2f28797f90 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38227.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38227.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38228.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38228.json index 410a924ef08..cbf3097a97e 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38228.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38228.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38232.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38232.json index 70586c98502..5cac86fb2d4 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38232.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38232.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38233.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38233.json index 7b9cbd624e9..4427324e474 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38233.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38233.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38234.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38234.json index fb928f8948b..7540961e1aa 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38234.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38234.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38235.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38235.json index ec783dd1d02..94ae2d5229e 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38235.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38235.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38236.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38236.json index 1bf2763dfd7..b9b7f2d1f7c 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38236.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38236.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38237.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38237.json index 8aa90bbc1db..3f10255b032 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38237.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38237.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38238.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38238.json index a3e34724347..d594fe20368 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38238.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38238.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38239.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38239.json index d8e3b95b3d6..00a082e1c40 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38239.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38239.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38241.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38241.json index 583303599cd..f023d94671b 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38241.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38241.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38242.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38242.json index 2d6805f8cf5..6942e393426 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38242.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38242.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38243.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38243.json index 2ba025fe687..b716c9c49b1 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38243.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38243.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38244.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38244.json index c7d4542293d..060eb44fb3c 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38244.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38244.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38245.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38245.json index 452edfa4311..b572b40272c 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38245.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38245.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38246.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38246.json index da951f87104..82f3ad9f899 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38246.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38246.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38247.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38247.json index e42661df0f9..93f4b7b37cf 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38247.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38247.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38248.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38248.json index 665047d8788..425249ad939 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38248.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38248.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38249.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38249.json index 0e2d64516d9..5b471a46430 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38249.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38249.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38250.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38250.json index b185d1511a6..b3819ed795f 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38250.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38250.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38252.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38252.json index 6eb06529541..e1aa29d6195 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38252.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38252.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38253.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38253.json index b9a08619b9a..ef8577f8529 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38253.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38253.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38256.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38256.json index 790004cd766..51e4b46a0c8 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38256.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38256.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38257.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38257.json index 63a21703f5d..ce3e9ad1954 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38257.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38257.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38259.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38259.json index 36303cf7dc4..39d2202c2cd 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38259.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38259.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38260.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38260.json index 1a659c7da4f..232c2ddcea7 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38260.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38260.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json index 58438b68107..bf3dbcb774f 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json index 2c47f9c7f1a..c6dc55f154a 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38263.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38263.json index 8bbade2a932..42c8ef26305 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38263.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38263.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38264.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38264.json index cd902baf701..8e875977a10 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38264.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38264.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json index 89c68a00f7d..928111d4c29 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38856.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38856.json index d4d2bb9f209..c1839eeffed 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38856.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38856.json @@ -66,7 +66,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3819.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3819.json index 169df98cdf0..118afcdcc4e 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3819.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3819.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:31.390", "lastModified": "2024-11-21T09:30:27.963", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3872.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3872.json index f902a92bf9f..b07b2e6cc24 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3872.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3872.json @@ -3,7 +3,7 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-04-16T09:15:08.817", "lastModified": "2024-11-21T09:30:36.187", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3885.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3885.json index 655679f86fd..cbc4acc4ae1 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3885.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3885.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:31.920", "lastModified": "2024-11-21T09:30:37.807", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3887.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3887.json index 6d921cf814a..80c1daeb8a1 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3887.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3887.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T09:15:15.070", "lastModified": "2024-11-21T09:30:38.043", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3994.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3994.json index ac873256c74..8d07510e764 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3994.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3994.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-25T10:15:09.263", "lastModified": "2024-11-21T09:30:52.223", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40427.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40427.json index e5db96fedfa..1fc9f3ab4a6 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40427.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40427.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T19:15:32.260", "lastModified": "2025-01-08T19:15:31.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40679.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40679.json index 82ba9ad4f35..a411743f340 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40679.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40679.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-08T01:15:06.953", "lastModified": "2025-01-08T01:15:06.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to an information disclosure vulnerability as sensitive information may be included in a log file under specific conditions." + }, + { + "lang": "es", + "value": "IBM Db2 para Linux, UNIX y Windows (incluye Db2 Connect Server) 11.5 es vulnerable a una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n, ya que se puede incluir informaci\u00f3n confidencial en un archivo de registro en condiciones espec\u00edficas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40702.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40702.json index fd1d1f4eaaf..3a6ae743beb 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40702.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40702.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T16:15:33.463", "lastModified": "2025-01-07T16:15:33.463", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Cognos Controller 11.0.0 through 11.0.1 and IBM Controller 11.1.0 could allow an unauthorized user to obtain valid tokens to gain access to protected resources due to improper certificate validation." + }, + { + "lang": "es", + "value": "IBM Cognos Controller 11.0.0 a 11.0.1 e IBM Controller 11.1.0 podr\u00edan permitir que un usuario no autorizado obtenga tokens v\u00e1lidos para acceder a recursos protegidos debido a una validaci\u00f3n de certificado incorrecta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40747.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40747.json index 0f8122a8c90..9bd91f15c70 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40747.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40747.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@joomla.org", "published": "2025-01-07T17:15:23.430", "lastModified": "2025-01-07T17:15:23.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Various module chromes didn't properly process inputs, leading to XSS vectors." + }, + { + "lang": "es", + "value": "Varios m\u00f3dulos cromados no procesaron correctamente las entradas, lo que gener\u00f3 vectores XSS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40748.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40748.json index 529ea9c98d4..4eada6ab633 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40748.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40748.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@joomla.org", "published": "2025-01-07T17:15:23.587", "lastModified": "2025-01-08T15:15:18.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40749.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40749.json index 7b447bc884b..6722f28cc61 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40749.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40749.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@joomla.org", "published": "2025-01-07T17:15:23.683", "lastModified": "2025-01-08T15:15:18.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40762.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40762.json index 4f788f92fa5..70f74b80d48 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40762.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40762.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T07:15:26.730", "lastModified": "2025-01-09T15:15:15.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40765.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40765.json index 066dd048225..39d79d195cd 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40765.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40765.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T08:15:26.797", "lastModified": "2025-01-09T15:15:15.560", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4003.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4003.json index 3b2f7def849..44b42bdb691 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4003.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4003.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:33.577", "lastModified": "2024-11-21T09:42:00.840", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41163.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41163.json index 83e253186c3..a63dc3d04c9 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41163.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41163.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41665.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41665.json index 43cfa4c11fc..fca7304d0bb 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41665.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41665.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-23T18:15:06.790", "lastModified": "2024-11-21T09:32:56.073", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41763.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41763.json index 20ac2ca0db6..3c5b0a13472 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41763.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41763.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-04T15:15:06.017", "lastModified": "2025-01-04T15:15:06.017", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information." + }, + { + "lang": "es", + "value": "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 y 7.0.3 utiliza algoritmos criptogr\u00e1ficos m\u00e1s d\u00e9biles de lo esperado que podr\u00edan permitir a un atacante descifrar informaci\u00f3n altamente confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41765.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41765.json index ae84a2bbc59..4b2a46700ad 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41765.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41765.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-04T15:15:06.713", "lastModified": "2025-01-04T15:15:06.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system." + }, + { + "lang": "es", + "value": "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 y 7.0.3 podr\u00eda permitir que un atacante remoto recorra directorios en el sistema. Un atacante podr\u00eda enviar una solicitud de URL especialmente manipulada que contenga secuencias de \"punto punto\" (/../) para ver archivos arbitrarios en el sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41766.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41766.json index 2110f988f00..c5ce9c325c9 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41766.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41766.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-04T15:15:06.850", "lastModified": "2025-01-04T15:15:06.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 could allow a remote attacker to cause a denial of service using a complex regular expression." + }, + { + "lang": "es", + "value": "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 y 7.0.3 podr\u00eda permitir que un atacante remoto provoque una denegaci\u00f3n de servicio utilizando una expresi\u00f3n regular compleja." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41767.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41767.json index dabf5e95889..ab3adc1626f 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41767.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41767.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-04T15:15:06.987", "lastModified": "2025-01-04T15:15:06.987", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database." + }, + { + "lang": "es", + "value": "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 y 7.0.3 es vulnerable a la inyecci\u00f3n SQL. Un atacante remoto podr\u00eda enviar sentencias SQL especialmente manipuladas, que podr\u00edan permitirle ver, agregar, modificar o eliminar informaci\u00f3n en la base de datos back-end." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41768.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41768.json index dedb5536cce..fa578db435c 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41768.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41768.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-04T15:15:07.127", "lastModified": "2025-01-04T15:15:07.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 could allow a remote attacker to cause an unhandled SSL exception which could leave the connection in an unexpected or insecure state." + }, + { + "lang": "es", + "value": "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 y 7.0.3 podr\u00eda permitir que un atacante remoto provoque una excepci\u00f3n SSL no gestionada que podr\u00eda dejar la conexi\u00f3n en un estado inesperado o inseguro." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41780.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41780.json index 72e2f34f8d3..540c69b0a66 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41780.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41780.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Jazz Foundation 7.0.2, 7.0.3, and 7.1.0 could \n\ncould allow a physical user to obtain sensitive information due to not masking passwords during entry." + }, + { + "lang": "es", + "value": "IBM Jazz Foundation 7.0.2, 7.0.3 y 7.1.0 podr\u00edan permitir que un usuario f\u00edsico obtenga informaci\u00f3n confidencial debido a que no se ocultan las contrase\u00f1as durante el ingreso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41787.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41787.json index c7bf0605e6f..8887e9a48f1 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41787.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41787.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-10T14:15:28.947", "lastModified": "2025-01-10T14:15:28.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41922.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41922.json index 3edd0d9bb9e..d6f682d7728 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41922.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41922.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4156.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4156.json index b5d62c5eb84..4a52cd137a6 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4156.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4156.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:35.270", "lastModified": "2024-11-21T09:42:17.790", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4203.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4203.json index 0a4604fe9e4..b08cddf799c 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4203.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4203.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:35.443", "lastModified": "2024-11-21T09:42:23.053", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4205.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4205.json index f022d840a3b..e283bc76cc7 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4205.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4205.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-31T06:15:12.583", "lastModified": "2024-11-21T09:42:23.290", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json index 17a36968934..4313d022e48 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T10:15:08.687", "lastModified": "2024-11-21T09:42:25.043", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4223.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4223.json index cc931aae78b..5e5f0ce504d 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4223.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4223.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T09:15:15.810", "lastModified": "2024-11-21T09:42:25.150", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4275.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4275.json index 40f1264ea54..3a9d0fc9b47 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4275.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4275.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:43:12.280", "lastModified": "2024-11-21T09:42:31.753", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4277.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4277.json index de228ac00a3..ef305d94329 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4277.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4277.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:43:12.577", "lastModified": "2024-11-21T09:42:31.870", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json index d23d508254a..a13bbb407a9 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T06:15:10.667", "lastModified": "2024-11-21T09:42:32.043", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43064.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43064.json index 20096c0dd0a..20cb068697a 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43064.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43064.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-01-06T11:15:09.073", "lastModified": "2025-01-06T11:15:09.073", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU." + }, + { + "lang": "es", + "value": "Consumo descontrolado de recursos cuando un controlador, una aplicaci\u00f3n o un cliente SMMU intenta acceder a los registros globales a trav\u00e9s de SMMU." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43176.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43176.json index 5e72cd266e6..78a76c9f9ae 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43176.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43176.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-09T14:15:26.770", "lastModified": "2025-01-09T15:15:15.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM OpenPages 9.0 could allow an authenticated user to obtain sensitive information such as configurations that should only be available to privileged users." + }, + { + "lang": "es", + "value": "IBM OpenPages 9.0 podr\u00eda permitir que un usuario autenticado obtenga informaci\u00f3n confidencial, como configuraciones que solo deber\u00edan estar disponibles para usuarios privilegiados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43231.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43231.json index 59fb779ed00..36fb34fd042 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43231.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43231.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-12T21:15:32.890", "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43243.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43243.json index 5d48fa149d9..7862ad5099e 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43243.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43243.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:06.023", "lastModified": "2025-01-07T11:15:06.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in ThemeGlow JobBoard Job listing allows Upload a Web Shell to a Web Server.This issue affects JobBoard Job listing: from n/a through 1.2.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en ThemeGlow JobBoard Job listing permite cargar un shell web a un servidor web. Este problema afecta a JobBoard Job listing: desde n/a hasta 1.2.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43282.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43282.json index 5d793feae99..161276da6b5 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43282.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43282.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-18T22:15:10.250", "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43447.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43447.json index cd9d951a7f2..7a8916c36f5 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43447.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43447.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43449.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43449.json index 3c307b2536c..e30fea9c200 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43449.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43449.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43450.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43450.json index d1841699e31..2f2f670f38e 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43450.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43450.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43451.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43451.json index c590609ba0a..bd53a917d63 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43451.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43451.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43452.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43452.json index 3b9a619a4f5..9337448fbef 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43452.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43452.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json index 7a65b0a6cba..77ed79c6caa 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43454.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43454.json index 8c4dcd63b94..2555b05169e 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43454.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43454.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43457.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43457.json index 4f3f4f1eeb9..54af0ea8ba1 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43457.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43457.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43461.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43461.json index 83c64cd9167..a523a4a2ac7 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43461.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43461.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43464.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43464.json index 885bad531a6..ac26f2ed9b6 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43464.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43464.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43465.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43465.json index 92e9913cd82..85abbfbd427 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43465.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43465.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43467.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43467.json index 74473407dd5..d7f550ae6e4 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43467.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43467.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43469.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43469.json index 9cfa9715980..494ac24e34c 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43469.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43469.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43470.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43470.json index 1ddc9f1eef5..31c007fbd01 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43470.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43470.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43475.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43475.json index 611f357174b..696befaaf55 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43475.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43475.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43479.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43479.json index 263d6d0819b..9927f2be830 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43479.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43479.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43482.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43482.json index 46f9396b63d..c869eb6b9e4 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43482.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43482.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json index c6bf106413f..6062158af0a 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json index c7bc2a9c483..d25f208dff1 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43487.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43487.json index 74a49048b69..73d7ac884aa 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43487.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43487.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43491.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43491.json index dca1001fe9c..311614f3b41 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43491.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43491.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43492.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43492.json index 408ba845295..7e49d2b5f02 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43492.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43492.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43495.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43495.json index 4c779c14429..f3eb5ceb9ea 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43495.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43495.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43500.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43500.json index b5fa03f2463..995b4175533 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43500.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43500.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43501.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43501.json index ff7dd826d4a..d6924649ddd 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43501.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43501.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43502.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43502.json index a28915f5bfd..91d1752d30d 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43502.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43502.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43506.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43506.json index 26d925dbd08..dfda56c4330 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43506.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43506.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43508.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43508.json index 06d30655f3a..4021b083a2a 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43508.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43508.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43509.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43509.json index 0a8748f8b24..ca16ded3a74 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43509.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43509.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43511.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43511.json index 85411c38b56..594dad051c2 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43511.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43511.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43513.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43513.json index d3278983a40..e2b732266a5 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43513.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43513.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43514.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43514.json index 4558060ab45..4ee6217dce2 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43514.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43514.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43515.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43515.json index df1cf5aa042..5f6e5af5dda 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43515.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43515.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43516.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43516.json index 859d2cf7326..900f973213e 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43516.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43516.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43517.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43517.json index d83edc6c579..3ec5dc7daf9 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43517.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43517.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43518.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43518.json index c7283b4fd14..114aa535920 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43518.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43518.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43519.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43519.json index 9d6f983c4d3..67fd5c0ba63 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43519.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43519.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43520.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43520.json index c588108140e..366f88a5e69 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43520.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43520.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43521.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43521.json index da974dfe211..b73f0d08214 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43521.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43521.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43522.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43522.json index 2bb9abe007e..fa8b6c2ed1e 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43522.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43522.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43523.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43523.json index 42aa919e48b..c97ab97d06a 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43523.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43523.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43524.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43524.json index e567d48c93f..e5d3e279b86 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43524.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43524.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43525.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43525.json index 047d15826c3..95d7db89098 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43525.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43525.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43526.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43526.json index fe386aeae20..d8d89f02687 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43526.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43526.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43527.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43527.json index cbb3e2df7dc..37bf4954de1 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43527.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43527.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json index bdae4a2a548..c8dc4072148 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json index 518e7320ed3..cd2b39725f2 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43530.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43530.json index 8bcfefae981..17d2628ba7b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43530.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43530.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json index 067a990b0fb..04d1a346451 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json index 47a217a0257..69e0b8b2c6f 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json index 490b8e208d7..55f0d1a25c2 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json index 1fba5c1b001..410f5c2e366 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json index 2887600ef36..cefd9b60fbd 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json index e64e147e57f..6a4acad4ce9 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43538.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43538.json index 4ed1bc33a34..3303c092ca6 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43538.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43538.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43540.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43540.json index e0ee8d9819c..652be659cdb 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43540.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43540.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43541.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43541.json index 4b6c34e595d..67117221d0c 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43541.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43541.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43542.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43542.json index 367826cfe54..60eec4ebe3b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43542.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43542.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43543.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43543.json index 91230457e8e..1191571a536 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43543.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43543.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43544.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43544.json index 7989c941845..ef8246f22b8 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43544.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43544.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43545.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43545.json index ce0f53b2bee..bdc037df69b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43545.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43545.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43546.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43546.json index 332a2be0212..f939b1428e5 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43546.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43546.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43549.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43549.json index e20408ce221..c2a7ba4a3ae 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43549.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43549.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43550.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43550.json index a2dd97de71e..9bc1bbfbe40 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43550.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43550.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43551.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43551.json index ea2472bc640..2e244876928 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43551.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43551.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43552.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43552.json index 8a766976f15..8807aeb6354 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43552.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43552.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43554.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43554.json index 705434d3f93..70cfc750d6e 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43554.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43554.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43555.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43555.json index 051ce913d35..043c8c706bd 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43555.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43555.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43556.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43556.json index e682fed551a..4971a54a4f5 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43556.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43556.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43557.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43557.json index 7da409ecddd..4373118c851 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43557.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43557.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43558.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43558.json index 9444f623ede..6ba17031f41 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43558.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43558.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43559.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43559.json index 845be43d134..86dc5a6d199 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43559.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43559.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43560.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43560.json index 1972cb67fb7..663968979bd 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43560.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43560.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43561.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43561.json index 19dc24ad795..3219ea4a197 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43561.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43561.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43562.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43562.json index 0be2d1eb9da..69c7068f475 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43562.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43562.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json index 0a0fc053edf..0ef4b6fc88a 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43564.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43564.json index 6f9d448e8d8..828c3a80d1d 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43564.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43564.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43565.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43565.json index 2d59652ff9b..76847e1ce88 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43565.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43565.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43567.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43567.json index ede202fc21b..44152749065 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43567.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43567.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json index 1ca517bfda6..9d741c7b7ac 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json index 100b6d6a28e..0085455cf62 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json index d19290ae743..67359110a6f 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json index 4eb8e67b7dd..b7b90ce161b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json index 801b2062b53..49bd5af3507 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json index 3084adcf13b..77626a33dcb 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json index e06bd0de63b..27c8d161fba 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json index db15735dda3..5a5c8f13f9f 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json index 9135d1bb142..40ec65c0b03 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json index 038ba8e6c21..785be324c89 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json index 6e8f08e2351..1a2ae49c39e 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43601.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43601.json index 58a04b31ba2..6c5247c8eb3 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43601.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43601.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json index f93cf61c496..90502b8875e 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json index 256608f5473..707781f588d 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json index 87f0699ee3b..5fcd6cf982b 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json index d3a111cf6f7..4aa99e56380 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43620.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43620.json index 90085bf596a..09562093f5b 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43620.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43620.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43621.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43621.json index eb8332b5176..5af0ee76222 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43621.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43621.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43622.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43622.json index 63bb0e4e975..8f229a7225a 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43622.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43622.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43623.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43623.json index 514d94fe0a6..dda96518ea3 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43623.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43623.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43624.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43624.json index 7995c89d0d2..50815ebce7d 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43624.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43624.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43626.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43626.json index 242f21c0e03..ee35440ec52 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43626.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43626.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43627.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43627.json index 5a4b2ff973b..119ccb6e6c0 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43627.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43627.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43628.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43628.json index 33f3a6e19d1..be05bdf6e1f 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43628.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43628.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43629.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43629.json index 6bb86ecba8f..54bcd873b46 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43629.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43629.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43630.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43630.json index 194df7cbfef..4785abe8e3f 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43630.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43630.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43633.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43633.json index 9b5dfc4bd00..a3b95d2298a 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43633.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43633.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43634.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43634.json index fa2f26bb6b3..6b7b942619d 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43634.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43634.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43635.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43635.json index da7f14e7b5b..a6b07b7497f 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43635.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43635.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43636.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43636.json index d90c74315e4..98cc347c18b 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43636.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43636.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43637.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43637.json index 5c23c8239ea..96401756922 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43637.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43637.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43638.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43638.json index 035db0ee12d..47dc06ac1de 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43638.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43638.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43639.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43639.json index 9bf444f8741..704a9d78bbb 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43639.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43639.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43640.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43640.json index 1f8025d0dff..41a6f782119 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43640.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43640.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43641.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43641.json index 986c26164c4..c9ad01820c4 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43641.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43641.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43642.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43642.json index 63bbded2ba6..4a4268cb10d 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43642.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43642.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43643.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43643.json index 91c4af680b0..a20ca581c71 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43643.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43643.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43644.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43644.json index e58ceb84104..2992ba3b2d1 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43644.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43644.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43648.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43648.json index ff5ffab7443..c27f4f7bc96 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43648.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43648.json @@ -3,7 +3,7 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:26.980", "lastModified": "2025-01-09T15:15:15.977", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43649.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43649.json index 30d94f3e802..fde6fceafec 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43649.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43649.json @@ -3,7 +3,7 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:27.233", "lastModified": "2025-01-09T15:15:16.173", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43650.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43650.json index c822249bde7..fd0cc1cf662 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43650.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43650.json @@ -3,12 +3,16 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:27.417", "lastModified": "2025-01-09T08:15:27.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Iocharger firmware for AC models allows OS Command Injection as root\n\nThis issue affects\u00a0 firmware versions before 24120701.\n\nLikelihood: Moderate \u2013 The binary does not seem to be used by the web interface, so it might be more difficult to find. It seems to be largely the same binary as used by the Iocharger Pedestal charging station, however. The attacker will also need a (low privilege) account to gain access to the binary, or convince a user with such access to execute a crafted HTTP request.\n\nImpact: Critical \u2013 The attacker has full control over the charging station as the root user, and can arbitrarily add, modify and delete\nfiles and services.\n\nCVSS clarification: The attack can be executed over any network connection serving the web interface (AV:N). There are no additional measures that need to be circumvented (AC:L) or attack preconditions (AT:N). THe attack is privileged, but the level does not matter (PR:L) and does not require user interaction (UI:N). Attack leads to full system compromised (VC:H/VI:H/VA:H) and compromised devices can be used to \"pivot\" to other networks that should be unreachable (SC:L/SI:L/SA:H). Because this an EV charger using high power, there is a potential safety impact (S:P). The attack can be automated (AU:Y)." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando ('Inyecci\u00f3n de comando') en el firmware de Iocharger para modelos AC permite la inyecci\u00f3n de comandos del sistema operativo como superusuario este problema afecta a las versiones de firmware anteriores a 24120701. Probabilidad: moderada: el binario no parece ser utilizado por la interfaz web, por lo que puede ser m\u00e1s dif\u00edcil de encontrar. Sin embargo, parece ser en gran medida el mismo binario que utiliza la estaci\u00f3n de carga Pedestal de Iocharger. El atacante tambi\u00e9n necesitar\u00e1 una cuenta (con privilegios bajos) para obtener acceso al binario o convencer a un usuario con dicho acceso para que ejecute una solicitud HTTP manipulada. Impacto: cr\u00edtico: el atacante tiene control total sobre la estaci\u00f3n de carga como usuario superusuario y puede agregar, modificar y eliminar archivos y servicios de forma arbitraria. Aclaraci\u00f3n de CVSS: el ataque se puede ejecutar sobre cualquier conexi\u00f3n de red que sirva a la interfaz web (AV:N). No hay medidas adicionales que deban eludirse (AC:L) ni condiciones previas de ataque (AT:N). El ataque es privilegiado, pero el nivel no importa (PR:L) y no requiere la interacci\u00f3n del usuario (UI:N). El ataque provoca la vulneraci\u00f3n total del sistema (VC:H/VI:H/VA:H) y los dispositivos vulnerados pueden utilizarse para \"pivotar\" hacia otras redes que deber\u00edan ser inaccesibles (SC:L/SI:L/SA:H). Debido a que se trata de un cargador de veh\u00edculos el\u00e9ctricos que utiliza alta potencia, existe un posible impacto en la seguridad (S:P). El ataque puede automatizarse (AU:Y)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43651.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43651.json index 1fac07fc9b3..ca1220ae9a5 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43651.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43651.json @@ -3,12 +3,16 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:27.590", "lastModified": "2025-01-09T08:15:27.590", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability allows OS Command Injection as root\nThis issue affects Iocharger firmware for AC models before version 241207101\n\nLikelihood: Moderate \u2013 The binary does not seem to be used by the web interface, so it might be more difficult to find. It seems to be largely the same binary as used by the Iocharger Pedestal charging station, however. The attacker will also need a (low privilege) account to gain access to the binary, or convince a user with such access to execute a crafted HTTP request.\n\nImpact: Critical \u2013 The attacker has full control over the charging station as the root user, and can arbitrarily add, modify and delete files and services.\n\nCVSS clarification:\u00a0Any network connection serving the web interface is vulnerable (AV:N) and there are no additional measures to circumvent (AC:L) nor does the attack require special conditions to be present (AT:N). The attack requires authentication, but the level does not matter (PR:L), nor is user interaction required (UI:N). The attack leads to a full compromised (VC:H/VI:H/VA:H) and a compromised device can be used to potentially \"pivot\" into a network that should nopt be reachable (SC:L/SI:L/SA:H). Because this is an EV charger handing significant power, there is a potential safety impact (S:P). THe attack can be autometed (AU:Y)." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando ('Inyecci\u00f3n de comando') permite la inyecci\u00f3n de comandos del sistema operativo como superusuario este problema afecta al firmware de Iocharger para modelos AC anteriores a la versi\u00f3n 241207101 Probabilidad: Moderada: el binario no parece ser utilizado por la interfaz web, por lo que podr\u00eda ser m\u00e1s dif\u00edcil de encontrar. Sin embargo, parece ser en gran medida el mismo binario que utiliza la estaci\u00f3n de carga Pedestal de Iocharger. El atacante tambi\u00e9n necesitar\u00e1 una cuenta (con privilegios bajos) para obtener acceso al binario o convencer a un usuario con dicho acceso para que ejecute una solicitud HTTP manipulada. Impacto: Cr\u00edtico: el atacante tiene control total sobre la estaci\u00f3n de carga como usuario superusuario y puede agregar, modificar y eliminar archivos y servicios de forma arbitraria. Aclaraci\u00f3n de CVSS: cualquier conexi\u00f3n de red que sirva a la interfaz web es vulnerable (AV:N) y no hay medidas adicionales para eludirla (AC:L) ni el ataque requiere que se presenten condiciones especiales (AT:N). El ataque requiere autenticaci\u00f3n, pero el nivel no importa (PR:L), ni se requiere interacci\u00f3n del usuario (UI:N). El ataque lleva a un ataque completo (VC:H/VI:H/VA:H) y un dispositivo atacado puede usarse para \"pivotar\" potencialmente hacia una red que no deber\u00eda ser accesible (SC:L/SI:L/SA:H). Debido a que se trata de un cargador de veh\u00edculos el\u00e9ctricos que gestiona una cantidad significativa de energ\u00eda, existe un posible impacto en la seguridad (S:P). El ataque puede automatizarse (AU:Y)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43652.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43652.json index a912015d7b4..90958158996 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43652.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43652.json @@ -3,7 +3,7 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:27.757", "lastModified": "2025-01-09T15:15:16.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43653.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43653.json index 94259d0a6c0..73e8f19a0b9 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43653.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43653.json @@ -3,7 +3,7 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:27.950", "lastModified": "2025-01-09T15:15:16.627", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43654.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43654.json index cdbf14894c9..7df986ecf22 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43654.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43654.json @@ -3,7 +3,7 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:28.127", "lastModified": "2025-01-09T15:15:16.837", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43655.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43655.json index c701df8112c..e1cfda2b61c 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43655.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43655.json @@ -3,12 +3,16 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:28.300", "lastModified": "2025-01-09T08:15:28.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability allows OS Command Injection as root\n\nThis issue affects Iocharger firmware for AC model chargers before version 24120701.\n\nLikelihood: Moderate \u2013 The attacker will first need to find the name of the script, and needs a (low privilege) account to gain access to the script, or convince a user with such access to execute a request to it.\n\nImpact: Critical \u2013 The attacker has full control over the charging station as the root user, and can arbitrarily add, modify and deletefiles and services.\n\nCVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads to a full compromised (VC:H/VI:H/VA:H), and compromised devices can be used to pivot into networks that should potentially not be accessible (SC:L/SI:L/SA:H). Becuase this is an EV charger handing significant power, there is a potential safety impact (S:P). This attack can be automated (AU:Y)." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando ('Inyecci\u00f3n de comando') permite la inyecci\u00f3n de comandos del sistema operativo como superusuario este problema afecta al firmware de Iocharger para cargadores modelo AC anteriores a la versi\u00f3n 24120701. Probabilidad: moderada: el atacante primero deber\u00e1 encontrar el nombre del script y necesita una cuenta (con poco nivel de privilegios) para obtener acceso al script o convencer a un usuario con dicho acceso para que ejecute una solicitud. Impacto: cr\u00edtico: el atacante tiene control total sobre la estaci\u00f3n de carga como usuario superusuario y puede agregar, modificar y eliminar archivos y servicios de forma arbitraria. Aclaraci\u00f3n de CVSS: cualquier interfaz de red que sirva a la interfaz de usuario web es vulnerable (AV:N) y no hay medidas de seguridad adicionales para eludir (AC:L), ni el ataque requiere condiciones previas existentes (AT:N). El ataque est\u00e1 autenticado, pero el nivel de autenticaci\u00f3n no importa (PR:L), ni se requiere ninguna interacci\u00f3n del usuario (UI:N). El ataque provoca una vulnerabilidad total (VC:H/VI:H/VA:H), y los dispositivos afectados pueden utilizarse para acceder a redes que potencialmente no deber\u00edan ser accesibles (SC:L/SI:L/SA:H). Como se trata de un cargador de veh\u00edculos el\u00e9ctricos que gestiona una cantidad importante de energ\u00eda, existe un posible impacto en la seguridad (S:P). Este ataque puede automatizarse (AU:Y)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43656.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43656.json index d5eebc3fc02..08aa252afd0 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43656.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43656.json @@ -3,7 +3,7 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:28.487", "lastModified": "2025-01-09T15:15:17.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43657.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43657.json index 89c382809cd..2ca8e6bef6d 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43657.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43657.json @@ -3,7 +3,7 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:28.680", "lastModified": "2025-01-09T15:15:17.303", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43658.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43658.json index 805656bd717..41bfc84cad9 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43658.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43658.json @@ -3,12 +3,16 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:28.867", "lastModified": "2025-01-09T08:15:28.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Patch traversal, External Control of File Name or Path vulnerability in Iocharger Home allows deletion of arbitrary files\nThis issue affects Iocharger firmware for AC model before firmware version 25010801.\n\nLikelihood: High, but requires authentication\n\nImpact: Critical \u2013 The vulnerability can be used to delete any file on the charging station, severely impacting the integrity of the charging station. Furthermore, the vulnerability could be used to delete binaries required for the functioning of the charging station, severely impacting the availability of the charging station.\n\nCVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads compromised of the integrity and availability of the device (VVC:N/VI:H/VA:H), with no effect on subsequent systems (SC:N/SI:N/SA:N). We do not forsee a safety impact (S:N). This attack can be automated (AU:Y)." + }, + { + "lang": "es", + "value": "Patch traversal, vulnerabilidad de control externo de nombre de archivo o ruta en Iocharger Home permite la eliminaci\u00f3n de archivos arbitrarios Este problema afecta al firmware de Iocharger para el modelo AC anterior a la versi\u00f3n de firmware 25010801. Probabilidad: Alta, pero requiere autenticaci\u00f3n Impacto: Cr\u00edtico: la vulnerabilidad se puede utilizar para eliminar cualquier archivo en la estaci\u00f3n de carga, lo que afecta gravemente la integridad de la estaci\u00f3n de carga. Adem\u00e1s, la vulnerabilidad se podr\u00eda utilizar para eliminar binarios necesarios para el funcionamiento de la estaci\u00f3n de carga, lo que afecta gravemente la disponibilidad de la estaci\u00f3n de carga. Aclaraci\u00f3n de CVSS: cualquier interfaz de red que sirva a la interfaz de usuario web es vulnerable (AV:N) y no hay medidas de seguridad adicionales para eludir (AC:L), ni el ataque requiere condiciones previas existentes (AT:N). El ataque est\u00e1 autenticado, pero el nivel de autenticaci\u00f3n no importa (PR:L), ni se requiere ninguna interacci\u00f3n del usuario (UI:N). El ataque compromete la integridad y disponibilidad del dispositivo (VVC:N/VI:H/VA:H), sin efectos en los sistemas posteriores (SC:N/SI:N/SA:N). No se prev\u00e9n efectos de seguridad (S:N). Este ataque puede automatizarse (AU:Y)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43659.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43659.json index 33ed8bd12b9..064df5f52b4 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43659.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43659.json @@ -3,7 +3,7 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:29.060", "lastModified": "2025-01-09T15:15:17.523", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43660.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43660.json index e84cbe5699d..7ac9bb4f1ae 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43660.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43660.json @@ -3,12 +3,16 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:29.267", "lastModified": "2025-01-09T15:15:17.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CGI script .sh can be used to download any file on the filesystem.\n\nThis issue affects Iocharger firmware for AC model chargers beforeversion 24120701.\n\nLikelihood: High, but credentials required.\n\nImpact: Critical \u2013 The script can be used to download any file on the filesystem, including sensitive files such as /etc/shadow, the CGI script source code or binaries and configuration files.\n\nCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/S:P/AU:Y\nCVSS clarification. The attack can be executed over any network connection the station is listening to and serves the web interface (AV:N), and there are no additional security measure sin place that need to be circumvented (AC:L), the attack does not rely on preconditions (AT:N). The attack does require authentication, but the level of authentication is irrelevant (PR:L), it does not require user interaction (UI:N). The confidentiality of all files of the devicd can be compromised (VC:H/VI:N/VA:N). There is no impact on subsequent systems. (SC:N/SI:N/SA:N). While this device is an EV charger handing significant amounts of power, this attack in isolation does not have a safety impact. The attack can be automated (AU:Y)." + }, + { + "lang": "es", + "value": "El script CGI .sh se puede utilizar para descargar cualquier archivo en el sistema de archivos. Este problema afecta a Iocharger firmware para AC model chargers anteriores a la versi\u00f3n 24120701. Probabilidad: Alta, pero se requieren credenciales. Impacto: Cr\u00edtico: el script se puede utilizar para descargar cualquier archivo en el sistema de archivos, incluidos archivos confidenciales como /etc/shadow, el c\u00f3digo fuente del script CGI o los archivos binarios y de configuraci\u00f3n. CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/S:P/AU:Y Aclaraci\u00f3n de CVSS. El ataque se puede ejecutar a trav\u00e9s de cualquier conexi\u00f3n de red que la estaci\u00f3n est\u00e9 escuchando y sirva a la interfaz web (AV:N), y no hay ninguna medida de seguridad adicional en el lugar que deba eludirse (AC:L), el ataque no depende de condiciones previas (AT:N). El ataque requiere autenticaci\u00f3n, pero el nivel de autenticaci\u00f3n es irrelevante (PR:L), no requiere interacci\u00f3n del usuario (UI:N). La confidencialidad de todos los archivos del dispositivo puede verse comprometida (VC:H/VI:N/VA:N). No hay impacto en los sistemas posteriores (SC:N/SI:N/SA:N). Si bien este dispositivo es un cargador de veh\u00edculos el\u00e9ctricos que gestiona cantidades significativas de energ\u00eda, este ataque en forma aislada no tiene un impacto en la seguridad. El ataque puede automatizarse (AU:Y)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43661.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43661.json index ead82806d7e..ea50080a6f4 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43661.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43661.json @@ -3,7 +3,7 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:29.450", "lastModified": "2025-01-09T15:15:17.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43662.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43662.json index 3f0ae4191b3..e7303f2e4de 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43662.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43662.json @@ -3,12 +3,16 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:29.637", "lastModified": "2025-01-09T08:15:29.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The .exe or .exe CGI binary can be used to upload arbitrary files to /tmp/upload/ or /tmp/ respectively as any user, although the user interface for uploading files is only shown to the iocadmin user.\n\nThis issue affects Iocharger firmware for AC models before version 24120701.\n\nLikelihood: Moderate \u2013 An attacker will need to have knowledge of this CGI binary, e.g. by finding it in firmware. Furthermore, the attacker will need a (low privilege) account to gain access to the .exe or .exe CGI binary and upload the file, or convince a user with such access to upload it.\n\nImpact: Low \u2013 The attacker can upload arbitrary files to /tmp/upload/ or /tmp/. However, the attacker is unable to access or use these files without other vulnerabilities.\n\nCVSS clarification. The attack can be executed over any network connection the station is listening to and serves the web interface (AV:N), and there are no additional security measure sin place that need to be circumvented (AC:L), the attack does not rely on preconditions (AT:N). The attack does require authentication, but the level of authentication is irrelevant (PR:L), it does not require user interaction (UI:N). Artitrary files can be uploaded, be these files will not be in a location where they can influence confidentiality or availability and have a minimal impact on device integrity (VC:N/VI:L/VA:N). There is no impact on subsequent systems. (SC:N/SI:N/SA:N). While this device is an EV charger handing significant amounts of power, we do not expect this vulnerability to have a safety impact. The attack can be automated (AU:Y)." + }, + { + "lang": "es", + "value": "El binario CGI .exe o .exe se puede utilizar para cargar archivos arbitrarios en /tmp/upload/ o /tmp/ respectivamente como cualquier usuario, aunque la interfaz de usuario para cargar archivos solo se muestra al usuario iocadmin. Este problema afecta al firmware de Iocharger para modelos AC anteriores a la versi\u00f3n 24120701. Probabilidad: moderada: un atacante deber\u00e1 tener conocimiento de este binario CGI, por ejemplo, busc\u00e1ndolo en el firmware. Adem\u00e1s, el atacante necesitar\u00e1 una cuenta (con privilegios bajos) para obtener acceso al binario CGI .exe o .exe y cargar el archivo, o convencer a un usuario con dicho acceso para que lo cargue. Impacto: bajo: el atacante puede cargar archivos arbitrarios en /tmp/upload/ o /tmp/. Sin embargo, el atacante no puede acceder ni usar estos archivos sin otras vulnerabilidades. Aclaraci\u00f3n de CVSS. El ataque se puede ejecutar en cualquier conexi\u00f3n de red que la estaci\u00f3n est\u00e9 escuchando y que sirva a la interfaz web (AV:N), y no hay ninguna medida de seguridad adicional que se deba eludir (AC:L), el ataque no depende de condiciones previas (AT:N). El ataque requiere autenticaci\u00f3n, pero el nivel de autenticaci\u00f3n es irrelevante (PR:L), no requiere interacci\u00f3n del usuario (UI:N). Se pueden cargar archivos adjuntos, pero estos archivos no estar\u00e1n en una ubicaci\u00f3n donde puedan influir en la confidencialidad o disponibilidad y tendr\u00e1n un impacto m\u00ednimo en la integridad del dispositivo (VC:N/VI:L/VA:N). No hay impacto en los sistemas posteriores. (SC:N/SI:N/SA:N). Si bien este dispositivo es un cargador de veh\u00edculos el\u00e9ctricos que gestiona cantidades significativas de energ\u00eda, no esperamos que esta vulnerabilidad tenga un impacto en la seguridad. El ataque se puede automatizar (AU:Y)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43663.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43663.json index c65f99153d2..e355957c2fc 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43663.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43663.json @@ -3,7 +3,7 @@ "sourceIdentifier": "csirt@divd.nl", "published": "2025-01-09T08:15:29.810", "lastModified": "2025-01-09T15:15:18.173", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json index 2a28fe0db16..e62e0fc0b73 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T06:15:11.480", "lastModified": "2024-11-21T09:42:36.927", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json index 55db584cb22..278f14db202 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T10:15:09.890", "lastModified": "2024-11-21T09:42:40.787", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json index 27ea9ad7a16..db9078b5c3a 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T10:15:10.470", "lastModified": "2024-11-21T09:42:40.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4376.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4376.json index a196d34be8a..b84468daffa 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4376.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4376.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-31T06:15:13.160", "lastModified": "2024-11-21T09:42:43.643", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4379.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4379.json index 26d9b5c5cc2..85687efa22b 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4379.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4379.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-31T06:15:13.590", "lastModified": "2024-11-21T09:42:44.073", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4397.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4397.json index 21bbdc96a3b..431ad6eabe0 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4397.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4397.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:43:31.793", "lastModified": "2024-11-21T09:42:45.863", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-444xx/CVE-2024-44450.json b/CVE-2024/CVE-2024-444xx/CVE-2024-44450.json index 4f9a43a1ba0..f653e2b5b50 100644 --- a/CVE-2024/CVE-2024-444xx/CVE-2024-44450.json +++ b/CVE-2024/CVE-2024-444xx/CVE-2024-44450.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T18:15:18.693", "lastModified": "2025-01-07T19:15:32.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple functions are vulnerable to Authorization Bypass in AIMS eCrew. The issue was fixed in version JUN23 #190." + }, + { + "lang": "es", + "value": "Existen varias funciones vulnerables a la omisi\u00f3n de autorizaci\u00f3n en AIMS eCrew. El problema se solucion\u00f3 en la versi\u00f3n n.\u00b0 190 del 23 de junio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4434.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4434.json index 50f8739aa71..ed45d4d8a7a 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4434.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4434.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:43:44.537", "lastModified": "2024-11-21T09:42:49.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4444.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4444.json index 01ad69c7d3b..8444f54cd06 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4444.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4444.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:43:46.507", "lastModified": "2024-11-21T09:42:50.610", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4448.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4448.json index 5d1d00c4e9c..6599d8de1c2 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4448.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4448.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:43:50.020", "lastModified": "2024-11-21T09:42:51.083", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4449.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4449.json index acf086fe19a..ccfbf3448b4 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4449.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4449.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:43:51.340", "lastModified": "2024-11-21T09:42:51.207", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45033.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45033.json index 69281809fdf..c802b9ea288 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45033.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45033.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-01-08T09:15:07.290", "lastModified": "2025-01-08T14:15:26.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45070.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45070.json index a37ab7ec3ad..9a94e8c5fc1 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45070.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45070.json @@ -3,12 +3,16 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2025-01-07T08:15:25.457", "lastModified": "2025-01-07T08:15:25.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause information leak through out-of-bounds Read." + }, + { + "lang": "es", + "value": "en OpenHarmony v4.1.2 y versiones anteriores, se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45100.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45100.json index 62b07c17dc3..adaab80e7a9 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45100.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45100.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T13:15:07.530", "lastModified": "2025-01-07T13:15:07.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Security ReaQta 3.12\u00a0could allow a privileged user to cause a denial of service by sending multiple administration requests due to improper allocation of resources." + }, + { + "lang": "es", + "value": "IBM Security ReaQta 3.12 podr\u00eda permitir que un usuario privilegiado provoque una denegaci\u00f3n de servicio al enviar m\u00faltiples solicitudes de administraci\u00f3n debido a una asignaci\u00f3n incorrecta de recursos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45541.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45541.json index b8231fd138f..85d750d1698 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45541.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45541.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-01-06T11:15:09.230", "lastModified": "2025-01-06T11:15:09.230", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption when IOCTL call is invoked from user-space to read board data." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria cuando se invoca la llamada IOCTL desde el espacio del usuario para leer datos de la placa." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45542.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45542.json index c75f8c44703..be1c31448c4 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45542.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45542.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-01-06T11:15:09.390", "lastModified": "2025-01-06T11:15:09.390", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria cuando se invoca la llamada IOCTL desde el espacio del usuario para escribir datos de la placa en el controlador WLAN." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45546.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45546.json index e2ca958a219..2c476a36287 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45546.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45546.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-01-06T11:15:09.540", "lastModified": "2025-01-06T11:15:09.540", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while processing FIPS encryption or decryption IOCTL call invoked from user-space." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante el procesamiento de la llamada IOCTL de cifrado o descifrado FIPS invocada desde el espacio del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45547.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45547.json index b6a75db24d9..64ceb770e9b 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45547.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45547.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-01-06T11:15:09.707", "lastModified": "2025-01-06T11:15:09.707", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while processing IOCTL call invoked from user-space to verify non extension FIPS encryption and decryption functionality." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante el procesamiento de la llamada IOCTL invocada desde el espacio del usuario para verificar la funcionalidad de cifrado y descifrado FIPS sin extensi\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45548.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45548.json index e13184677cd..4a98d70b056 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45548.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45548.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-01-06T11:15:09.887", "lastModified": "2025-01-06T11:15:09.887", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while processing FIPS encryption or decryption validation functionality IOCTL call." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante el procesamiento de la llamada IOCTL de la funcionalidad de validaci\u00f3n de cifrado o descifrado FIPS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45550.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45550.json index 727a4b62c0d..b2b51a96075 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45550.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45550.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-01-06T11:15:10.050", "lastModified": "2025-01-06T11:15:10.050", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption occurs when invoking any IOCTL-calling application that executes all MCDM driver IOCTL calls." + }, + { + "lang": "es", + "value": "Se produce corrupci\u00f3n de memoria cuando se invoca cualquier aplicaci\u00f3n que llame a IOCTL y que ejecute todas las llamadas IOCTL del controlador MCDM." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45553.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45553.json index 7934b2ceded..9bbc1d1e37d 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45553.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45553.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-01-06T11:15:10.207", "lastModified": "2025-01-06T11:15:10.207", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption can occur when process-specific maps are added to the global list. If a map is removed from the global list while another thread is using it for a process-specific task, issues may arise." + }, + { + "lang": "es", + "value": "La corrupci\u00f3n de la memoria puede ocurrir cuando se agregan mapas espec\u00edficos de un proceso a la lista global. Si se elimina un mapa de la lista global mientras otro subproceso lo est\u00e1 usando para una tarea espec\u00edfica del proceso, pueden surgir problemas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45555.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45555.json index 2aa744398eb..8d8892d7798 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45555.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45555.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-01-06T11:15:10.383", "lastModified": "2025-01-06T11:15:10.383", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image." + }, + { + "lang": "es", + "value": "Se puede producir una corrupci\u00f3n de la memoria si se sobrescribe una imagen IFS2 ya verificada, lo que evita la verificaci\u00f3n de arranque. Esto permite que se inyecten programas no autorizados en im\u00e1genes sensibles a la seguridad, lo que permite el arranque de una imagen del sistema IFS2 alterada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45558.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45558.json index 3815e655b25..b1d2609656f 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45558.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45558.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-01-06T11:15:10.550", "lastModified": "2025-01-06T11:15:10.550", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transient DOS can occur when the driver parses the per STA profile IE and tries to access the EXTN element ID without checking the IE length." + }, + { + "lang": "es", + "value": "Puede producirse un DOS transitorio cuando el controlador analiza el IE por perfil STA e intenta acceder al ID del elemento EXTN sin verificar la longitud del IE." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45559.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45559.json index f3de4ef3da8..e4d1d38d88d 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45559.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45559.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-01-06T11:15:10.720", "lastModified": "2025-01-06T11:15:10.720", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transient DOS can occur when GVM sends a specific message type to the Vdev-FastRPC backend." + }, + { + "lang": "es", + "value": "Puede ocurrir un DOS transitorio cuando GVM env\u00eda un tipo de mensaje espec\u00edfico al backend Vdev-FastRPC." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45619.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45619.json index 413a874e70c..1665904afde 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45619.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45619.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45620.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45620.json index e16b3718de8..6408df2d857 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45620.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45620.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45640.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45640.json index a27ac81914f..f2fdda26d7e 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45640.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45640.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T13:15:07.690", "lastModified": "2025-01-07T13:15:07.690", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Security ReaQta 3.12 returns sensitive information in an HTTP response that could be used in further attacks against the system." + }, + { + "lang": "es", + "value": "IBM Security ReaQta 3.12 devuelve informaci\u00f3n confidencial en una respuesta HTTP que podr\u00eda utilizarse en futuros ataques contra el sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45760.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45760.json index 57ab1a6cbc7..0786954e010 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45760.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45760.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-09T17:15:08.830", "lastModified": "2024-12-09T17:15:08.830", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45761.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45761.json index 57247743e86..ffeb61c55cb 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45761.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45761.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-09T17:15:08.973", "lastModified": "2024-12-09T17:15:08.973", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4585.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4585.json index a5d76acd74f..56e71aed732 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4585.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4585.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T12:15:10.457", "lastModified": "2024-11-21T09:43:09.590", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4586.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4586.json index ec83c3a0c38..97f232e9a4e 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4586.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4586.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T13:15:48.770", "lastModified": "2024-11-21T09:43:09.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4587.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4587.json index 514882a73b8..5c2ae5ddea5 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4587.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4587.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T13:15:49.043", "lastModified": "2024-11-21T09:43:09.840", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4588.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4588.json index 9f03eb7c4eb..1cdfe561b1a 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4588.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4588.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T13:15:49.323", "lastModified": "2024-11-21T09:43:09.973", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4589.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4589.json index 785857630b0..4415f7135f8 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4589.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4589.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T13:15:49.603", "lastModified": "2024-11-21T09:43:10.100", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4590.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4590.json index e5008ae0781..3f98867a993 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4590.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4590.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T14:15:11.050", "lastModified": "2024-11-21T09:43:10.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4591.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4591.json index e83aed92244..b1e087c56e9 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4591.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4591.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T14:15:11.277", "lastModified": "2024-11-21T09:43:10.360", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4592.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4592.json index c2bdd99ba01..ac4c53caec7 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4592.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4592.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T14:15:11.510", "lastModified": "2024-11-21T09:43:10.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4593.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4593.json index feb1d6626f9..42f6708b27b 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4593.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4593.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T14:15:11.747", "lastModified": "2024-11-21T09:43:10.620", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4594.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4594.json index 91380496157..517da13e03d 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4594.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4594.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T15:15:10.040", "lastModified": "2024-11-21T09:43:10.750", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46073.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46073.json index b94b6e53d74..e207730b9f2 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46073.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46073.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T18:15:19.493", "lastModified": "2025-01-06T20:15:34.307", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reflected Cross-Site Scripting (XSS) vulnerability exists in the login page of IceHRM v32.4.0.OS. The vulnerability is due to improper sanitization of the \"next\" parameter, which is included in the application's response without adequate escaping. An attacker can exploit this flaw by tricking a user into visiting a specially crafted URL, causing the execution of arbitrary JavaScript code in the context of the victim's browser. The issue occurs even though the application has sanitization mechanisms in place." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de tipo Cross-Site Scripting (XSS) reflejado en la p\u00e1gina de inicio de sesi\u00f3n de IceHRM v32.4.0.OS. La vulnerabilidad se debe a una desinfecci\u00f3n incorrecta del par\u00e1metro \"next\", que se incluye en la respuesta de la aplicaci\u00f3n sin el escape adecuado. Un atacante puede aprovechar esta falla enga\u00f1ando a un usuario para que visite una URL especialmente manipulada, lo que provoca la ejecuci\u00f3n de c\u00f3digo JavaScript arbitrario en el contexto del navegador de la v\u00edctima. El problema ocurre a pesar de que la aplicaci\u00f3n tiene mecanismos de desinfecci\u00f3n implementados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46242.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46242.json index 3427b8e8644..a7cdeda480f 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46242.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46242.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T16:15:33.950", "lastModified": "2025-01-07T21:15:11.783", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the validate_email function in CTFd/utils/validators/__init__.py of CTFd 3.7.3 allows attackers to cause a Regular expression Denial of Service (ReDoS) via supplying a crafted string as e-mail address during registration." + }, + { + "lang": "es", + "value": "Un problema en la funci\u00f3n validation_email en CTFd/utils/validators/__init__.py de CTFd 3.7.3 permite a los atacantes provocar una denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS) al proporcionar una cadena manipulada como direcci\u00f3n de correo electr\u00f3nico durante el registro." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46505.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46505.json index cb0bc9173c1..95baa9a93c1 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46505.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46505.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-09T20:15:38.377", "lastModified": "2025-01-09T20:15:38.377", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Infoblox BloxOne v2.4 was discovered to contain a business logic flaw due to thick client vulnerabilities." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Infoblox BloxOne v2.4 conten\u00eda una falla en la l\u00f3gica empresarial debido a vulnerabilidades de cliente \u00edntimo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46978.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46978.json index c2449836215..87e8e70c6e1 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46978.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46978.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-18T18:15:06.800", "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46979.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46979.json index 999a46984d4..843d20b3f37 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46979.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46979.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-18T18:15:07.020", "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46981.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46981.json index 2f52dcb3fcc..39e2230d089 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46981.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46981.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T22:15:09.360", "lastModified": "2025-01-06T22:15:09.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands." + }, + { + "lang": "es", + "value": "Redis es una base de datos en memoria de c\u00f3digo abierto que persiste en el disco. Un usuario autenticado puede usar un script Lua especialmente manipulado para manipular el recolector de elementos no utilizados y potencialmente provocar la ejecuci\u00f3n remota de c\u00f3digo. El problema se solucion\u00f3 en 7.4.2, 7.2.7 y 6.2.17. Un workaround adicional para mitigar el problema sin aplicar un parche al ejecutable redis-server es evitar que los usuarios ejecuten scripts Lua. Esto se puede hacer usando ACL para restringir los comandos EVAL y EVALSHA." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4624.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4624.json index 3fd5385e5f7..e8138f5f4fd 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4624.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4624.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T16:17:35.480", "lastModified": "2024-11-21T09:43:14.500", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4629.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4629.json index e93b7909d41..42dac5e24bc 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4629.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4629.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47239.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47239.json index e2f3125cde3..f639beab1b9 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47239.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47239.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-08T03:15:08.413", "lastModified": "2025-01-08T03:15:08.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell PowerScale OneFS versions 8.2.2.x through 9.9.0.0 contain an uncontrolled resource consumption vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to denial of service." + }, + { + "lang": "es", + "value": "Las versiones 8.2.2.x a 9.9.0.0 de Dell PowerScale OneFS contienen una vulnerabilidad de consumo de recursos no controlado. Un atacante remoto con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47390.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47390.json index 69b147efcb9..12fc894f052 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47390.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47390.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-05T15:15:16.037", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47398.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47398.json index b7deed9d002..f12b2023d78 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47398.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47398.json @@ -3,12 +3,16 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2025-01-07T08:15:25.617", "lastModified": "2025-01-07T08:15:25.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write." + }, + { + "lang": "es", + "value": "en OpenHarmony v4.1.2 y versiones anteriores, permitir que un atacante local provoque que el dispositivo no pueda iniciarse mediante escritura fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47526.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47526.json index 418ec30c490..9a66294a874 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47526.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47526.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47528.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47528.json index 5378dbacf06..984a64cc3a5 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47528.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47528.json @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47822.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47822.json index c2de4a56ab7..64739db5104 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47822.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47822.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47934.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47934.json index dca6519086c..978d6b668be 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47934.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47934.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3ad20294-822c-4ebc-9301-f9a7cf62d46e", "published": "2025-01-08T03:15:08.550", "lastModified": "2025-01-08T03:15:08.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input Validation vulnerability in Management Program in TXOne Networks Portable Inspector and Portable Inspector Pro Edition allows remote attacker to crash management service. The Denial of Service situation can be resolved by restarting the management service.\nThis issue affects Portable Inspector: through 1.0.0; Portable Inspector Pro Edition: through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de validaci\u00f3n de entrada incorrecta en Management Program en TXOne Networks Portable Inspector y Portable Inspector Pro Edition permite que un atacante remoto bloquee el servicio de administraci\u00f3n. La situaci\u00f3n de denegaci\u00f3n de servicio se puede resolver reiniciando el servicio de administraci\u00f3n. Este problema afecta a Portable Inspector: hasta la versi\u00f3n 1.0.0; Portable Inspector Pro Edition: hasta la versi\u00f3n 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48245.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48245.json index 3cf70af8475..c8dbb86e7e0 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48245.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48245.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T16:15:34.730", "lastModified": "2025-01-07T20:15:29.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vehicle Management System 1.0 is vulnerable to SQL Injection. A guest user can exploit vulnerable POST parameters in various administrative actions, such as booking a vehicle or confirming a booking. The affected parameters include \"Booking ID\", \"Action Name\", and \"Payment Confirmation ID\", which are present in /newvehicle.php and /newdriver.php." + }, + { + "lang": "es", + "value": "Vehicle Management System 1.0 es vulnerable a la inyecci\u00f3n SQL. Un usuario invitado puede explotar los par\u00e1metros POST vulnerables en varias acciones administrativas, como reservar un veh\u00edculo o confirmar una reserva. Los par\u00e1metros afectados incluyen \"Booking ID\", \"Action Name\", y \"Payment Confirmation ID\", que est\u00e1n presentes en /newvehicle.php y /newdriver.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48455.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48455.json index 2f816c0657b..88371460009 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48455.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48455.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:09.510", "lastModified": "2025-01-07T22:15:30.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48456.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48456.json index 0584e336568..18a0f4606bf 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48456.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48456.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:09.620", "lastModified": "2025-01-07T16:15:34.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48457.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48457.json index 621aa18daaf..5ce393a2b4b 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48457.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48457.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:09.727", "lastModified": "2025-01-07T16:15:35.057", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48806.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48806.json index c0c92c81506..e60b2d434cd 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48806.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48806.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-09T21:15:29.190", "lastModified": "2025-01-09T21:15:29.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in Neat Board NFC v.1.20240620.0015 allows a physically proximate attackers to escalate privileges via a crafted payload to the password field" + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de b\u00fafer en Neat Board NFC v.1.20240620.0015 permite a atacantes f\u00edsicamente pr\u00f3ximos escalar privilegios a trav\u00e9s de un payload manipulado para el campo de contrase\u00f1a" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48814.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48814.json index 2c4dfbb8818..8240937601a 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48814.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48814.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SQL Injection vulnerability in Silverpeas 6.4.1 allows a remote attacker to obtain sensitive information via the ViewType parameter of the findbywhereclause function" + }, + { + "lang": "es", + "value": "La vulnerabilidad de inyecci\u00f3n SQL en Silverpeas 6.4.1 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro ViewType de la funci\u00f3n findbywhereclause" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4812.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4812.json index 672440103e5..8ceadd078fb 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4812.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4812.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49019.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49019.json index e10a0a5436d..2eb507de96c 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49019.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49019.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49039.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49039.json index 810e7f8c6d5..bddb1fd31d4 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49039.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49039.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49046.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49046.json index 54816185ec6..96c9de997dd 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49046.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49046.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49051.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49051.json index b93ffbad029..84d32a40c0d 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49051.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49051.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-491xx/CVE-2024-49138.json b/CVE-2024/CVE-2024-491xx/CVE-2024-49138.json index 56d0a9af46a..d8013adf5aa 100644 --- a/CVE-2024/CVE-2024-491xx/CVE-2024-49138.json +++ b/CVE-2024/CVE-2024-491xx/CVE-2024-49138.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49222.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49222.json index 0cc5ae2cfb3..a78ba158180 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49222.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49222.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:07.080", "lastModified": "2025-01-07T11:15:07.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Amento Tech Pvt ltd WPGuppy allows Object Injection.This issue affects WPGuppy: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Amento Tech Pvt ltd WPGuppy permite la inyecci\u00f3n de objetos. Este problema afecta a WPGuppy: desde n/a hasta 1.1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49249.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49249.json index f8871dbc1e8..25be35f411b 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49249.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49249.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:07.243", "lastModified": "2025-01-07T11:15:07.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path Traversal vulnerability in SMSA Express SMSA Shipping allows Path Traversal.This issue affects SMSA Shipping: from n/a through 2.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Path Traversal en SMSA Express SMSA Shipping permite el Path Traversal. Este problema afecta a SMSA Shipping: desde n/a hasta 2.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49294.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49294.json index 29013c7aad2..a0bff080e35 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49294.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49294.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:07.400", "lastModified": "2025-01-07T11:15:07.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in MagePeople Team Bus Ticket Booking with Seat Reservation allows Cross Site Request Forgery.This issue affects Bus Ticket Booking with Seat Reservation: from n/a through 5.4.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en MagePeople Team Bus Ticket Booking con Seat Reservation permite Cross Site Request Forgery. Este problema afecta a la reserva de boletos de autob\u00fas con reserva de asiento: desde n/a hasta 5.4.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49513.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49513.json index 22a871b8a35..dd505a7e8e3 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49513.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49513.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49595.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49595.json index b276916943f..cdeaa1cd744 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49595.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49595.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-11-26T03:15:06.093", "lastModified": "2024-11-26T03:15:06.093", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49596.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49596.json index f619d42cd8e..2cd72dc54ff 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49596.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49596.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-11-26T03:15:06.570", "lastModified": "2024-11-26T03:15:06.570", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49597.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49597.json index 5388689a160..5b3b9ae7d4a 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49597.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49597.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-11-26T03:15:06.940", "lastModified": "2024-11-26T03:15:06.940", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49633.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49633.json index 026e1aaf8e4..ee9dd9d00e6 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49633.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49633.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:07.570", "lastModified": "2025-01-07T11:15:07.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Designinvento DirectoryPress allows Reflected XSS.This issue affects DirectoryPress: from n/a through 3.6.19." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Designinvento DirectoryPress permite XSS reflejado. Este problema afecta a DirectoryPress: desde n/a hasta 3.6.19." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49644.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49644.json index f9d3a3baedc..cfd4361d9be 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49644.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49644.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:07.740", "lastModified": "2025-01-07T11:15:07.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in AllAccessible Team Accessibility by AllAccessible allows Privilege Escalation.This issue affects Accessibility by AllAccessible: from n/a through 1.3.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en AllAccessible Team Accessibility de AllAccessible permite la escalada de privilegios. Este problema afecta a Accessibility by AllAccessible: desde n/a hasta 1.3.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49649.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49649.json index 7134cbfb54c..64c39f78c38 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49649.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49649.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:07.897", "lastModified": "2025-01-07T11:15:07.897", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Abdul Hakeem Build App Online allows PHP Local File Inclusion.This issue affects Build App Online: from n/a through 1.0.23." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Abdul Hakeem Build App Online permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Build App Online: desde n/a hasta 1.0.23." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49686.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49686.json index 316b5fbcff7..56fa5343b32 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49686.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49686.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Fatcat Apps Landing Page Cat.This issue affects Landing Page Cat: from n/a through 1.7.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Fatcat Apps Landing Page Cat. Este problema afecta a Landing Page Cat: desde n/a hasta 1.7.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49687.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49687.json index 326c2512414..9a097e15250 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49687.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49687.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in StoreApps Smart Manager.This issue affects Smart Manager: from n/a through 8.45.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en StoreApps Smart Manager. Este problema afecta a Smart Manager: desde n/a hasta 8.45.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49694.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49694.json index 1d80aea9f83..d7613f76a74 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49694.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49694.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in imw3 My Wp Brand \u2013 Hide menu & Hide Plugin.This issue affects My Wp Brand \u2013 Hide menu & Hide Plugin: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en imw3 My Wp Brand \u2013 Hide menu y Hide Plugin. Este problema afecta a My Wp Brand \u2013 Hide menu y Hide Plugin: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49698.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49698.json index 58225f69314..60d70de9d3d 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49698.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49698.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in PriceListo Best Restaurant Menu by PriceListo.This issue affects Best Restaurant Menu by PriceListo: from n/a through 1.4.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en PriceListo Best Restaurant Menu de PriceListo. Este problema afecta a Best Restaurant Menu de PriceListo: desde n/a hasta 1.4.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49761.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49761.json index 4729e199c57..b6b6873e22a 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49761.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49761.json @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49767.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49767.json index 5409e39b873..9c9d1f53eea 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49767.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49767.json @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49785.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49785.json new file mode 100644 index 00000000000..92a703b7234 --- /dev/null +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49785.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49785", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-12T02:15:18.973", + "lastModified": "2025-01-12T02:15:18.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM watsonx.ai 1.1 through 2.0.3 and IBM watsonx.ai on Cloud Pak for Data 4.8 through 5.0.3 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7180723", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50603.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50603.json index 275e3fde6b4..e696c6f3284 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50603.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50603.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-08T01:15:07.127", "lastModified": "2025-01-08T01:15:07.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Aviatrix Controller anterior a la versi\u00f3n 7.1.4191 y en la versi\u00f3n 7.2.x anterior a la 7.2.4996. Debido a la neutralizaci\u00f3n incorrecta de los elementos especiales utilizados en un comando del sistema operativo, un atacante no autenticado puede ejecutar c\u00f3digo arbitrario. Los metacaracteres de shell se pueden enviar a /v1/api en cloud_type para list_flightpath_destination_instances o src_cloud_type para flightpath_connection_test." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50658.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50658.json index 2ffbb1d69af..f2735bfdd02 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50658.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50658.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T18:15:18.990", "lastModified": "2025-01-08T16:15:34.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50659.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50659.json index ae10e033ab1..01fb9d27bae 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50659.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50659.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T18:15:19.153", "lastModified": "2025-01-08T16:15:34.597", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50660.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50660.json index d8a74a6e864..9da0c09e813 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50660.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50660.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T18:15:19.310", "lastModified": "2025-01-08T16:15:34.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5073.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5073.json index a63ae015bdd..824b92121c3 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5073.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5073.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-30T07:15:39.997", "lastModified": "2024-11-21T09:46:54.480", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51111.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51111.json index 2267030f671..eac27c54007 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51111.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51111.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T16:15:28.807", "lastModified": "2025-01-06T18:15:20.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Scripting (XSS) vulnerability in Pnetlab 5.3.11 allows an attacker to inject malicious scripts into a web page, which are executed in the context of the victim's browser." + }, + { + "lang": "es", + "value": "La vulnerabilidad de cross site scripting (XSS) en Pnetlab 5.3.11 permite a un atacante inyectar scripts maliciosos en una p\u00e1gina web, que se ejecutan en el contexto del navegador de la v\u00edctima." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51442.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51442.json index 50ea879c233..6816647e3fd 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51442.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51442.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Command Injection in Minidlna version v1.3.3 and before allows an attacker to execute arbitrary OS commands via a specially crafted minidlna.conf configuration file." + }, + { + "lang": "es", + "value": "La inyecci\u00f3n de comandos en Minidlna versi\u00f3n v1.3.3 y anteriores permite a un atacante ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de un archivo de configuraci\u00f3n minidlna.conf especialmente manipulado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51472.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51472.json index 6b8a5adfb3c..37c6e6267f7 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51472.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51472.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-06T17:15:38.517", "lastModified": "2025-01-06T17:15:38.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM UrbanCode Deploy (UCD) 7.2 through 7.2.3.13, 7.3 through 7.3.2.8, and IBM DevOps Deploy 8.0 through 8.0.1.3 are vulnerable to HTML injection. This vulnerability may allow a user to embed arbitrary HTML tags in the Web UI potentially leading to sensitive information disclosure." + }, + { + "lang": "es", + "value": "IBM UrbanCode Deploy (UCD) 7.2 a 7.2.3.13, 7.3 a 7.3.2.8 e IBM DevOps Deploy 8.0 a 8.0.1.3 son vulnerables a la inyecci\u00f3n de HTML. Esta vulnerabilidad puede permitir que un usuario incorpore etiquetas HTML arbitrarias en la interfaz de usuario web, lo que podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51480.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51480.json index 97ae73d0811..86760ba30e7 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51480.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51480.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-08T16:15:34.993", "lastModified": "2025-01-08T16:15:34.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "RedisTimeSeries is a time-series database (TSDB) module for Redis, by Redis. Executing one of these commands TS.QUERYINDEX, TS.MGET, TS.MRAGE, TS.MREVRANGE by an authenticated user, using specially crafted command arguments may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This vulnerability is fixed in 1.6.20, 1.8.15, 1.10.15, and 1.12.3." + }, + { + "lang": "es", + "value": "RedisTimeSeries es un m\u00f3dulo de base de datos de series temporales (TSDB) para Redis, creado por Redis. La ejecuci\u00f3n de uno de estos comandos TS.QUERYINDEX, TS.MGET, TS.MRAGE, TS.MREVRANGE por parte de un usuario autenticado, utilizando argumentos de comando especialmente manipulados, puede provocar un desbordamiento de enteros, un desbordamiento de mont\u00f3n posterior y, potencialmente, provocar la ejecuci\u00f3n remota de c\u00f3digo. Esta vulnerabilidad se ha corregido en las versiones 1.6.20, 1.8.15, 1.10.15 y 1.12.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51651.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51651.json index e9815ac8042..bfdafaa4618 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51651.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51651.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:08.113", "lastModified": "2025-01-07T11:15:08.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in CubeWP CubeWP Forms \u2013 All-in-One Form Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CubeWP Forms \u2013 All-in-One Form Builder: from n/a through 1.1.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en CubeWP CubeWP Forms \u2013 All-in-One Form Builder permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a CubeWP Forms \u2013 All-in-One Form Builder: desde n/a hasta 1.1.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51667.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51667.json index 8d29e5c8cc3..58d8245a39e 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51667.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51667.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in David de Boer Paytium.This issue affects Paytium: from n/a through 4.4.10." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en David de Boer Paytium. Este problema afecta a Paytium: desde n/a hasta 4.4.10." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51700.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51700.json index 69c2782c2d1..aa263ca92b4 100644 --- a/CVE-2024/CVE-2024-517xx/CVE-2024-51700.json +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51700.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:08.283", "lastModified": "2025-01-07T11:15:08.283", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in \uae40 \ubbfc\uc900 (Minjun Kim) NAVER Analytics allows Stored XSS.This issue affects NAVER Analytics: from n/a through 0.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ? ?? (Minjun Kim) NAVER Analytics permite XSS almacenado. Este problema afecta a NAVER Analytics: desde n/a hasta 0.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51715.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51715.json index 218acafc45d..23007f96ade 100644 --- a/CVE-2024/CVE-2024-517xx/CVE-2024-51715.json +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51715.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:08.460", "lastModified": "2025-01-07T11:15:08.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ClickWhale ClickWhale \u2013 Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages allows Blind SQL Injection.This issue affects ClickWhale \u2013 Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages: from n/a through 2.4.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en ClickWhale ClickWhale \u2013 Link Manager, Link Shortener y Click Tracker para Affiliate Links y Link Pages permite la inyecci\u00f3n SQL ciega. Este problema afecta a ClickWhale \u2013 Link Manager, Link Shortener y Click Tracker para Affiliate Links y Link Pages: desde n/a hasta 2.4.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51737.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51737.json index 5fc52bd2f8e..a1b21c97a1b 100644 --- a/CVE-2024/CVE-2024-517xx/CVE-2024-51737.json +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51737.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-08T16:15:35.170", "lastModified": "2025-01-08T16:15:35.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "RediSearch is a Redis module that provides querying, secondary indexing, and full-text search for Redis. An authenticated redis user executing FT.SEARCH or FT.AGGREGATE with a specially crafted LIMIT command argument, or FT.SEARCH with a specially crafted KNN command argument, can trigger an integer overflow, leading to heap overflow and potential remote code execution. This vulnerability is fixed in 2.6.24, 2.8.21, and 2.10.10. Avoid setting value of -1 or large values for configuration parameters MAXSEARCHRESULTS and MAXAGGREGATERESULTS, to avoid exploiting large LIMIT arguments." + }, + { + "lang": "es", + "value": "RediSearch es un m\u00f3dulo de Redis que proporciona consultas, indexaci\u00f3n secundaria y b\u00fasqueda de texto completo para Redis. Un usuario de Redis autenticado que ejecuta FT.SEARCH o FT.AGGREGATE con un argumento de comando LIMIT especialmente manipulado, o FT.SEARCH con un argumento de comando KNN especialmente manipulado, puede provocar un desbordamiento de enteros, lo que lleva a un desbordamiento de mont\u00f3n y una posible ejecuci\u00f3n remota de c\u00f3digo. Esta vulnerabilidad se solucion\u00f3 en 2.6.24, 2.8.21 y 2.10.10. Evite establecer un valor de -1 o valores grandes para los par\u00e1metros de configuraci\u00f3n MAXSEARCHRESULTS y MAXAGGREGATERESULTS, para evitar explotar argumentos LIMIT grandes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51741.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51741.json index 201b528eb82..6b449441ad8 100644 --- a/CVE-2024/CVE-2024-517xx/CVE-2024-51741.json +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51741.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T22:15:09.827", "lastModified": "2025-01-06T22:15:09.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2." + }, + { + "lang": "es", + "value": "Redis es una base de datos en memoria de c\u00f3digo abierto que persiste en el disco. Un usuario autenticado con privilegios suficientes puede crear un selector de ACL mal formado que, cuando se accede a \u00e9l, desencadena un p\u00e1nico del servidor y la consiguiente denegaci\u00f3n de servicio. El problema se solucion\u00f3 en Redis 7.2.7 y 7.4.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5189.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5189.json index 93b32b9c676..7ba6c044f83 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5189.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5189.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-06-11T14:15:12.847", "lastModified": "2024-11-21T09:47:09.427", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52048.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52048.json index cd8154c3d60..8469fc52781 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52048.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52048.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2024-52049.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + }, + { + "lang": "es", + "value": "Un v\u00ednculo a LogServer que sigue una vulnerabilidad en Trend Micro Apex One podr\u00eda permitir que un atacante local aumente los privilegios en las instalaciones afectadas. Esta vulnerabilidad es similar a CVE-2024-52049, pero no id\u00e9ntica. Tenga en cuenta que un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52049.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52049.json index 2a6feef0f26..8372364bfbb 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52049.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52049.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2024-52048.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + }, + { + "lang": "es", + "value": "Un v\u00ednculo a LogServer que sigue una vulnerabilidad en Trend Micro Apex One podr\u00eda permitir que un atacante local aumente los privilegios en las instalaciones afectadas. Esta vulnerabilidad es similar a CVE-2024-52048, pero no id\u00e9ntica. Tenga en cuenta que un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52050.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52050.json index bc1195b0cc1..dabeed8e244 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52050.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52050.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A LogServer arbitrary file creation vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de creaci\u00f3n de archivos arbitrarios en LogServer en Trend Micro Apex One podr\u00eda permitir que un atacante local aumente los privilegios en las instalaciones afectadas. Tenga en cuenta que un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52366.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52366.json index 741a55375ea..fd7dc53a34f 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52366.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52366.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T12:15:24.680", "lastModified": "2025-01-07T12:15:24.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3\u00a0could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques." + }, + { + "lang": "es", + "value": "IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1 y 1.0.3 podr\u00eda permitir que un atacante remoto obtenga informaci\u00f3n confidencial, debido a que no se ha habilitado correctamente la seguridad de transporte estricta HTTP. Un atacante podr\u00eda aprovechar esta vulnerabilidad para obtener informaci\u00f3n confidencial mediante t\u00e9cnicas de intermediario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52367.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52367.json index 9368d74df5d..5f1ad89c744 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52367.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52367.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T12:15:24.847", "lastModified": "2025-01-07T12:15:24.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3 could disclose sensitive system information to an unauthorized actor that could be used in further attacks against the system." + }, + { + "lang": "es", + "value": "IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1 y 1.0.3 podr\u00eda revelar informaci\u00f3n confidencial del sistema a un actor no autorizado que podr\u00eda utilizarse en futuros ataques contra el sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52813.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52813.json index bab11fe7bfb..bf42f776a60 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52813.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52813.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-07T16:15:35.610", "lastModified": "2025-01-07T16:15:35.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "matrix-rust-sdk is an implementation of a Matrix client-server library in Rust. Versions of the matrix-sdk-crypto Rust crate before 0.8.0 lack a dedicated mechanism to notify that a user's cryptographic identity has changed from a verified to an unverified one, which could cause client applications relying on the SDK to overlook such changes. matrix-sdk-crypto 0.8.0 adds a new VerificationLevel::VerificationViolation enum variant which indicates that a previously verified identity has been changed." + }, + { + "lang": "es", + "value": "matrix-rust-sdk es una implementaci\u00f3n de una librer\u00eda cliente-servidor Matrix en Rust. Las versiones del paquete de Rust matrix-sdk-crypto anteriores a la 0.8.0 carecen de un mecanismo dedicado para notificar que la identidad criptogr\u00e1fica de un usuario ha cambiado de verificada a no verificada, lo que podr\u00eda provocar que las aplicaciones cliente que dependen del SDK pasen por alto dichos cambios. matrix-sdk-crypto 0.8.0 agrega una nueva variante de enumeraci\u00f3n VerificationLevel::VerificationViolation que indica que se ha cambiado una identidad verificada previamente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52869.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52869.json index 63620e0b93d..ba6c7e7fc3c 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52869.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52869.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-08T21:15:12.523", "lastModified": "2025-01-08T21:15:12.523", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain Teradata account-handling code through 2024-11-04, used with SUSE Enterprise Linux Server, mismanages groups. Specifically, when there is an operating system move from SUSE Enterprise Linux Server (SLES) 12 Service Pack (SP) 2 or 3 to SLES 15 SP2 on Teradata Database systems, some service/system user accounts, and possibly systems administrator created user accounts, are incorrectly assigned to groups that allow higher system-level privileges than intended for those user accounts. Depending on the usage of these accounts, this may lead to full system compromise." + }, + { + "lang": "es", + "value": "Ciertos c\u00f3digos de gesti\u00f3n de cuentas de Teradata hasta el 4 de noviembre de 2024, utilizados con SUSE Enterprise Linux Server, administran grupos de forma incorrecta. En concreto, cuando se produce un cambio de sistema operativo de SUSE Enterprise Linux Server (SLES) 12 Service Pack (SP) 2 o 3 a SLES 15 SP2 en sistemas de bases de datos Teradata, algunas cuentas de usuario de servicio o sistema, y posiblemente cuentas de usuario creadas por el administrador de sistemas, se asignan de forma incorrecta a grupos que permiten privilegios de nivel de sistema superiores a los previstos para esas cuentas de usuario. Seg\u00fan el uso de estas cuentas, esto puede provocar un compromiso total del sistema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52891.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52891.json index 6ab38cca2ef..991f819a7c8 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52891.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52891.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T12:15:25.010", "lastModified": "2025-01-07T12:15:25.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3 \n\ncould allow an authenticated user to inject malicious information or obtain information from log files due to improper log neutralization." + }, + { + "lang": "es", + "value": "IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1 y 1.0.3 podr\u00eda permitir que un usuario autenticado inyecte informaci\u00f3n maliciosa u obtenga informaci\u00f3n de archivos de registro debido a una neutralizaci\u00f3n incorrecta de los registros." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52893.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52893.json index eb8fd4e5702..229d95bdac6 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52893.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52893.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T12:15:25.153", "lastModified": "2025-01-07T12:15:25.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53165.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53165.json index f371f2bdee9..a7ff1341c74 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53165.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53165.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:23.583", "lastModified": "2024-12-27T14:15:23.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53171.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53171.json index caeae1a1662..df804e5086f 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53171.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53171.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:24.300", "lastModified": "2024-12-27T14:15:24.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53173.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53173.json index b7960a26320..114d32d6a5a 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53173.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53173.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:24.577", "lastModified": "2024-12-27T14:15:24.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53179.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53179.json index 57980d20a61..50631597098 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53179.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53179.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:25.307", "lastModified": "2025-01-09T16:16:21.440", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53186.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53186.json index b808d9c2549..cca03eeb9e6 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53186.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53186.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:26.083", "lastModified": "2024-12-27T14:15:26.083", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53206.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53206.json index 2424bd3b4df..127a9882374 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53206.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53206.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:28.453", "lastModified": "2024-12-27T14:15:28.453", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53237.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53237.json index 2c36c38ebba..76cc90a4fb2 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53237.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53237.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:32.130", "lastModified": "2024-12-27T14:15:32.130", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53345.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53345.json index 339fb21f16c..0b569a642eb 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53345.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53345.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T16:15:35.777", "lastModified": "2025-01-07T20:15:29.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated arbitrary file upload vulnerability in Car Rental Management System v1.0 to v1.3 allows attackers to execute arbitrary code via uploading a crafted file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitrarios autenticados en Car Rental Management System v1.0 a v1.3 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado espec\u00edficamente para ello." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53526.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53526.json index 5c7b73c426e..7ff411e04e5 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53526.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53526.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-08T19:15:37.753", "lastModified": "2025-01-08T19:15:37.753", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "composio >=0.5.40 is vulnerable to Command Execution in composio_openai, composio_claude, and composio_julep via the handle_tool_calls function." + }, + { + "lang": "es", + "value": "composio >=0.5.40 es vulnerable a la ejecuci\u00f3n de comandos en composio_openai, composio_claude y composio_julep a trav\u00e9s de la funci\u00f3n handle_tool_calls." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53647.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53647.json index bd9c3d8eef2..b25fd7ff38b 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53647.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53647.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Trend Micro ID Security, version 3.0 and below contains a vulnerability that could allow an attacker to send an unlimited number of email verification requests without any restriction, potentially leading to abuse or denial of service." + }, + { + "lang": "es", + "value": "Trend Micro ID Security, versi\u00f3n 3.0 y anteriores contiene una vulnerabilidad que podr\u00eda permitir a un atacante enviar una cantidad ilimitada de solicitudes de verificaci\u00f3n de correo electr\u00f3nico sin ninguna restricci\u00f3n, lo que podr\u00eda conducir a un abuso o denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json b/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json index d3e602bf9fa..d805582f18f 100644 --- a/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json +++ b/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T07:15:27.203", "lastModified": "2025-01-09T15:15:18.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-537xx/CVE-2024-53705.json b/CVE-2024/CVE-2024-537xx/CVE-2024-53705.json index 0272b82f829..4b9186c596a 100644 --- a/CVE-2024/CVE-2024-537xx/CVE-2024-53705.json +++ b/CVE-2024/CVE-2024-537xx/CVE-2024-53705.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T07:15:27.363", "lastModified": "2025-01-09T15:15:18.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-537xx/CVE-2024-53706.json b/CVE-2024/CVE-2024-537xx/CVE-2024-53706.json index 9e73a3516e6..f500b6fdd38 100644 --- a/CVE-2024/CVE-2024-537xx/CVE-2024-53706.json +++ b/CVE-2024/CVE-2024-537xx/CVE-2024-53706.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T07:15:27.520", "lastModified": "2025-01-09T16:16:21.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53800.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53800.json index f41c401a0c8..cf351ef9464 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53800.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53800.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:35.883", "lastModified": "2025-01-07T16:15:35.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Rezgo Rezgo allows PHP Local File Inclusion.This issue affects Rezgo: from n/a through 4.15." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Rezgo Rezgo permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Rezgo: desde n/a hasta 4.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53931.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53931.json index ec0c394cefa..11f009316df 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53931.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53931.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:10.070", "lastModified": "2025-01-06T22:15:10.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The com.glitter.caller.screen (aka iCaller, Caller Theme & Dialer) application through 1.1 for Android enables any application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.glitter.caller.screen.DialerActivity component." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n com.glitter.caller.screen (tambi\u00e9n conocida como iCaller, Caller Theme & Dialer) hasta la versi\u00f3n 1.1 para Android permite que cualquier aplicaci\u00f3n (sin permisos) realice llamadas telef\u00f3nicas sin interacci\u00f3n del usuario enviando una intenci\u00f3n manipulada a trav\u00e9s del componente com.glitter.caller.screen.DialerActivity." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53932.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53932.json index e1c54515759..340c5ec3b89 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53932.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53932.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:10.187", "lastModified": "2025-01-06T22:15:10.187", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The com.remi.colorphone.callscreen.calltheme.callerscreen (aka Color Phone: Call Screen Theme) application through 21.1.9 for Android enables any application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.remi.colorphone.callscreen.calltheme.callerscreen.dialer.DialerActivity component." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n com.remi.colorphone.callscreen.calltheme.callerscreen (tambi\u00e9n conocida como Color Phone: Call Screen Theme) hasta la versi\u00f3n 21.1.9 para Android permite que cualquier aplicaci\u00f3n (sin permisos) realice llamadas telef\u00f3nicas sin interacci\u00f3n del usuario enviando una intenci\u00f3n manipulada a trav\u00e9s del componente com.remi.colorphone.callscreen.calltheme.callerscreen.dialer.DialerActivity." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53933.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53933.json index 85a57b1f7d6..2162a1f8b97 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53933.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53933.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:10.293", "lastModified": "2025-01-08T18:15:16.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53934.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53934.json index 064dcf4fc8a..036a8fe419f 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53934.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53934.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:10.410", "lastModified": "2025-01-08T17:15:15.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53935.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53935.json index b7a9658e43c..7e2b598946c 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53935.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53935.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:10.520", "lastModified": "2025-01-07T22:15:30.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53936.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53936.json index c0672bf16f5..9527fbeae56 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53936.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53936.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:10.630", "lastModified": "2025-01-08T18:15:17.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53995.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53995.json index ef7104bc62c..6c6a44a4432 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53995.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53995.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-08T21:15:12.703", "lastModified": "2025-01-08T21:15:12.703", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SickChill is an automatic video library manager for TV shows. A user-controlled `login` endpoint's `next_` parameter takes arbitrary content. Prior to commit c7128a8946c3701df95c285810eb75b2de18bf82, an authenticated attacker may use this to redirect the user to arbitrary destinations, leading to open redirect. Commit c7128a8946c3701df95c285810eb75b2de18bf82 changes the login page to redirect to `settings.DEFAULT_PAGE` instead of to the `next` parameter." + }, + { + "lang": "es", + "value": "SickChill es un administrador autom\u00e1tico de librer\u00edas de videos para programas de TV. El par\u00e1metro `next_` de un endpoints de `login` controlado por el usuario toma contenido arbitrario. Antes de el commit c7128a8946c3701df95c285810eb75b2de18bf82, un atacante autenticado puede usar esto para redirigir al usuario a destinos arbitrarios, lo que lleva a una redirecci\u00f3n abierta. El commit c7128a8946c3701df95c285810eb75b2de18bf82 cambia la p\u00e1gina de inicio de sesi\u00f3n para redirigir a `settings.DEFAULT_PAGE` en lugar del par\u00e1metro `next`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5327.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5327.json index eceb2b71288..90d506baa2f 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5327.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5327.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-30T07:15:40.407", "lastModified": "2024-11-21T09:47:25.873", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54006.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54006.json index bc96d396ed3..abe49ec4769 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54006.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54006.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-alert@hpe.com", "published": "2025-01-07T18:15:20.080", "lastModified": "2025-01-07T19:15:32.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple command injection vulnerabilities exist in the web interface of the 501 Wireless Client Bridge which could lead to authenticated remote command execution. Successful exploitation of these vulnerabilities result in the ability of an attacker to execute arbitrary commands as a privileged user on the underlying operating system. Exploitation requires administrative authentication credentials on the host system." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos en la interfaz web de 501 Wireless Client Bridge que podr\u00edan provocar la ejecuci\u00f3n remota de comandos autenticados. La explotaci\u00f3n exitosa de estas vulnerabilidades da como resultado la capacidad de un atacante para ejecutar comandos arbitrarios como un usuario privilegiado en el sistema operativo subyacente. La explotaci\u00f3n requiere credenciales de autenticaci\u00f3n administrativa en el sistema host." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54007.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54007.json index c80a612ad1a..797fea1c608 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54007.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54007.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-alert@hpe.com", "published": "2025-01-07T18:15:20.240", "lastModified": "2025-01-07T19:15:32.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple command injection vulnerabilities exist in the web interface of the 501 Wireless Client Bridge which could lead to authenticated remote command execution. Successful exploitation of these vulnerabilities result in the ability of an attacker to execute arbitrary commands as a privileged user on the underlying operating system. Exploitation requires administrative authentication credentials on the host system." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos en la interfaz web de 501 Wireless Client Bridge que podr\u00edan provocar la ejecuci\u00f3n remota de comandos autenticados. La explotaci\u00f3n exitosa de estas vulnerabilidades da como resultado la capacidad de un atacante para ejecutar comandos arbitrarios como un usuario privilegiado en el sistema operativo subyacente. La explotaci\u00f3n requiere credenciales de autenticaci\u00f3n administrativa en el sistema host." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54010.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54010.json index 756b62b1114..15272a6ad54 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54010.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54010.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-alert@hpe.com", "published": "2025-01-08T21:15:12.900", "lastModified": "2025-01-08T21:15:12.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the firewall component of HPE Aruba Networking CX 10000 Series Switches exists. It could allow an unauthenticated adjacent attacker to conduct a packet forwarding attack against the ICMP and UDP protocol. For this attack to be successful an attacker requires a switch configuration that allows packets routing (at layer 3). Configurations that do not allow network traffic routing are not impacted. Successful exploitation could allow an attacker to bypass security policies, potentially leading to unauthorized data exposure." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en el componente de firewall de los conmutadores HPE Aruba Networking CX serie 10000. Esta vulnerabilidad podr\u00eda permitir que un atacante adyacente no autenticado realice un ataque de reenv\u00edo de paquetes contra el protocolo ICMP y UDP. Para que este ataque tenga \u00e9xito, un atacante necesita una configuraci\u00f3n de conmutador que permita el enrutamiento de paquetes (en la capa 3). Las configuraciones que no permiten el enrutamiento del tr\u00e1fico de red no se ven afectadas. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante eluda las pol\u00edticas de seguridad, lo que podr\u00eda provocar una exposici\u00f3n no autorizada de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54030.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54030.json index 842e5996a4b..50a73116545 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54030.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54030.json @@ -3,12 +3,16 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2025-01-07T08:15:25.760", "lastModified": "2025-01-07T08:15:25.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS\u00a0through use after free." + }, + { + "lang": "es", + "value": "en OpenHarmony v4.1.2 y versiones anteriores se permite que un atacante local cause DOS a trav\u00e9s del use-after-free." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54100.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54100.json index 066ad4d98d2..79fa7ddf9e3 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54100.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54100.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-12T12:15:23.593", "lastModified": "2024-12-12T12:15:23.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54101.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54101.json index 5fc63ad6beb..9d82b258f39 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54101.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54101.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-12T12:15:23.763", "lastModified": "2024-12-12T12:15:23.763", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54102.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54102.json index 869e8b8fbcf..9b0978055a3 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54102.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54102.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-12T12:15:23.930", "lastModified": "2024-12-12T12:15:23.930", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54119.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54119.json index 538107be24c..d075ecbda03 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54119.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54119.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-12T13:15:11.350", "lastModified": "2024-12-12T13:15:11.350", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54120.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54120.json index a26188f5e24..4726f7818ba 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54120.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54120.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:08.707", "lastModified": "2025-01-08T03:15:08.707", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition vulnerability in the distributed notification module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." + }, + { + "lang": "es", + "value": "Vulnerabilidad de condici\u00f3n de ejecuci\u00f3n en el m\u00f3dulo de notificaci\u00f3n distribuida Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54121.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54121.json index 97a50269c2b..424e43fb507 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54121.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54121.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T04:15:07.120", "lastModified": "2025-01-08T04:15:07.120", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Startup control vulnerability in the ability module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control de inicio en el m\u00f3dulo de capacidad Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54122.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54122.json index 7a83522e927..a3aad9d3fc7 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54122.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54122.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-12T13:15:11.527", "lastModified": "2024-12-12T13:15:11.527", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-546xx/CVE-2024-54676.json b/CVE-2024/CVE-2024-546xx/CVE-2024-54676.json index dab7000cf68..3726ace6a61 100644 --- a/CVE-2024/CVE-2024-546xx/CVE-2024-54676.json +++ b/CVE-2024/CVE-2024-546xx/CVE-2024-54676.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-01-08T09:15:07.440", "lastModified": "2025-01-08T14:15:26.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54724.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54724.json index 323b3d8f344..31f7b7cb9c6 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54724.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54724.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-09T20:15:38.863", "lastModified": "2025-01-09T20:15:38.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPYun before 7.0.2 is vulnerable to code execution through backdoor-restricted arbitrary file writing and file inclusion." + }, + { + "lang": "es", + "value": "PHPYun anterior a 7.0.2 es vulnerable a la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de la escritura arbitraria de archivos y la inclusi\u00f3n de archivos restringidas por puerta trasera." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54731.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54731.json index 0029994db16..f092ab024c5 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54731.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54731.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-08T05:15:11.810", "lastModified": "2025-01-08T05:15:11.810", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "cpdf through 2.8 allows stack consumption via a crafted PDF document." + }, + { + "lang": "es", + "value": "cpdf hasta 2.8 permite el consumo de pila a trav\u00e9s de un documento PDF manipulado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54763.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54763.json index 6ea09035899..dd0ccb9f4d5 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54763.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54763.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:10.737", "lastModified": "2025-01-07T22:15:30.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54764.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54764.json index cf3c4452f5c..ccffc66d2db 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54764.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54764.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T23:15:06.510", "lastModified": "2025-01-07T22:15:31.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54767.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54767.json index 7ae1dd8aacd..c4220983ab4 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54767.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54767.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T23:15:07.513", "lastModified": "2025-01-07T16:15:36.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54818.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54818.json index e2bf56df263..0fe30aa74e0 100644 --- a/CVE-2024/CVE-2024-548xx/CVE-2024-54818.json +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54818.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SourceCodester Computer Laboratory Management System 1.0 is vulnerable to Incorrect Access Control. via /php-lms/admin/?page=user/list." + }, + { + "lang": "es", + "value": "SourceCodester Computer Laboratory Management System 1.0 es vulnerable a un control de acceso incorrecto. a trav\u00e9s de /php-lms/admin/?page=user/list." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54819.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54819.json index c0f49e941d6..3c1a1b5b653 100644 --- a/CVE-2024/CVE-2024-548xx/CVE-2024-54819.json +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54819.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T20:15:30.197", "lastModified": "2025-01-08T15:15:19.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54887.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54887.json index 01449d4e3e6..61a112769fb 100644 --- a/CVE-2024/CVE-2024-548xx/CVE-2024-54887.json +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54887.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-09T20:15:39.277", "lastModified": "2025-01-09T20:15:39.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TP-Link TL-WR940N V3 and V4 with firmware 3.16.9 and earlier contain a buffer overflow via the dnsserver1 and dnsserver2 parameters at /userRpm/Wan6to4TunnelCfgRpm.htm. This vulnerability allows an authenticated attacker to execute arbitrary code on the remote device in the context of the root user." + }, + { + "lang": "es", + "value": "Los dispositivos TP-Link TL-WR940N V3 y V4 con firmware 3.16.9 y versiones anteriores presentan un desbordamiento de b\u00fafer a trav\u00e9s de los par\u00e1metros dnsserver1 y dnsserver2 en /userRpm/Wan6to4TunnelCfgRpm.htm. Esta vulnerabilidad permite que un atacante autenticado ejecute c\u00f3digo arbitrario en el dispositivo remoto en el contexto del usuario ra\u00edz." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55074.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55074.json index bf01810783b..3251af5d8b0 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55074.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55074.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The edit profile function of Grocy through 4.3.0 allows stored XSS and resultant privilege escalation by uploading a crafted HTML or SVG file, a different issue than CVE-2024-8370." + }, + { + "lang": "es", + "value": "La funci\u00f3n de edici\u00f3n de perfil de Grocy hasta la versi\u00f3n 4.3.0 permite el XSS almacenado y la escalada de privilegios resultante mediante la carga de un archivo HTML o SVG manipulado espec\u00edficamente, un problema diferente a CVE-2024-8370." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55075.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55075.json index 161e5bbadf2..cb7613b76ed 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55075.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55075.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T21:15:14.970", "lastModified": "2025-01-06T21:15:14.970", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Grocy through 4.3.0 allows remote attackers to obtain sensitive information via direct requests to pages that are not shown in the UI, such as calendar and recipes." + }, + { + "lang": "es", + "value": "Grocy versi\u00f3n 4.3.0 permite a atacantes remotos obtener informaci\u00f3n confidencial a trav\u00e9s de solicitudes directas a p\u00e1ginas que no se muestran en la interfaz de usuario, como calendario y recetas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55076.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55076.json index ad2e8610093..5aaa63f4a42 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55076.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55076.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T21:15:15.133", "lastModified": "2025-01-06T21:15:15.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Grocy through 4.3.0 has no CSRF protection, as demonstrated by changing the Administrator's password." + }, + { + "lang": "es", + "value": "Grocy hasta la versi\u00f3n 4.3.0 no tiene protecci\u00f3n CSRF, como se demuestra al cambiar la contrase\u00f1a del administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55078.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55078.json index 593b9a6b597..d65079cc39c 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55078.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55078.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An arbitrary file upload vulnerability in the component /adminUser/updateImg of WukongCRM-11.0-JAVA v11.3.3 allows attackers to execute arbitrary code via uploading a crafted file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente /adminUser/updateImg de WukongCRM-11.0-JAVA v11.3.3 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo creado espec\u00edficamente para ello." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55218.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55218.json index 8fe69c7f8d8..a8e27146991 100644 --- a/CVE-2024/CVE-2024-552xx/CVE-2024-55218.json +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55218.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T20:15:30.310", "lastModified": "2025-01-08T14:15:26.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json index 13404efef15..d2382cde63d 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T18:15:20.387", "lastModified": "2025-01-07T22:15:31.423", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the 690b33e1-0462-4e84-9bea-c7552b45432a.sys component of Asus GPU Tweak II Program Driver v1.0.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests." + }, + { + "lang": "es", + "value": "Un problema en el componente 690b33e1-0462-4e84-9bea-c7552b45432a.sys del Asus GPU Tweak II Program Driver v1.0.0.0 permite a los atacantes realizar acciones de lectura y escritura arbitrarias mediante el suministro de solicitudes IOCTL manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55412.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55412.json index b8c0b9003e3..aee3a032895 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55412.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55412.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T18:15:20.700", "lastModified": "2025-01-08T16:15:35.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55413.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55413.json index 31e970599b8..453ebd744fb 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55413.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55413.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T18:15:20.843", "lastModified": "2025-01-08T16:15:35.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55414.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55414.json index 658e4ad35dc..09bc8831092 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55414.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55414.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T18:15:20.987", "lastModified": "2025-01-08T16:15:35.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55494.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55494.json index 63afae55d09..579dd966f24 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55494.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55494.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-09T20:15:39.400", "lastModified": "2025-01-09T20:15:39.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in Opencode Mobile Collect Call v5.4.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the op_func parameter at /occontrolpanel/index.php." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en Opencode Mobile Collect Call v5.4.7 permite a los atacantes ejecutar web scripts o HTML arbitrarios a trav\u00e9s de un payload manipulado e inyectado en el par\u00e1metro op_func en /occontrolpanel/index.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55507.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55507.json index 02082d1d67d..e87f16213bd 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55507.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55507.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue in CodeAstro Complaint Management System v.1.0 allows a remote attacker to escalate privileges via the delete_e.php component." + }, + { + "lang": "es", + "value": "Un problema en el sistema de gesti\u00f3n de quejas de CodeAstro v.1.0 permite que un atacante remoto escale privilegios a trav\u00e9s del componente delete_e.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55517.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55517.json index b545e49c5c5..610e0bd659a 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55517.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55517.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in the Interllect Core Search in Polaris FT Intellect Core Banking 9.5. Input passed through the groupType parameter in /SCGController is mishandled before being used in SQL queries, allowing SQL injection in an authenticated session." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Interllect Core Search en Polaris FT Intellect Core Banking 9.5. La entrada que se pasa a trav\u00e9s del par\u00e1metro groupType en /SCGController se gestiona incorrectamente antes de usarse en consultas SQL, lo que permite la inyecci\u00f3n de SQL en una sesi\u00f3n autenticada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55529.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55529.json index b2fa277b83f..4d31719611a 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55529.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55529.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T18:15:22.183", "lastModified": "2025-01-06T20:15:39.163", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Z-BlogPHP 1.7.3 is vulnerable to arbitrary code execution via \\zb_users\\theme\\shell\\template." + }, + { + "lang": "es", + "value": "Z-BlogPHP 1.7.3 es vulnerable a la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de \\zb_users\\theme\\shell\\template." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55553.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55553.json index e914d451e72..4c11c7de914 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55553.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55553.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T23:15:07.637", "lastModified": "2025-01-09T22:15:29.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55555.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55555.json index 0989c2a5282..7391ced7bdf 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55555.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55555.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T17:15:30.503", "lastModified": "2025-01-07T20:15:30.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Invoice Ninja before 5.10.43 allows remote code execution from a pre-authenticated route when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values. The route/{hash} route defined in the invoiceninja/routes/client.php file can be accessed without authentication. The parameter {hash} is passed to the function decrypt that expects a Laravel ciphered value containing a serialized object. (Furthermore, Laravel contains several gadget chains usable to trigger remote command execution from arbitrary deserialization.) Therefore, an attacker in possession of the APP_KEY is able to fully control a string passed to an unserialize function." + }, + { + "lang": "es", + "value": "Invoice Ninja anterior a la versi\u00f3n 5.10.43 permite la ejecuci\u00f3n remota de c\u00f3digo desde una ruta autenticada previamente cuando un atacante conoce la APP_KEY. Esto se ve agravado por los archivos .env, disponibles en el repositorio del producto, que tienen valores APP_KEY predeterminados. Se puede acceder a la ruta route/{hash} definida en el archivo invoiceninja/routes/client.php sin autenticaci\u00f3n. El par\u00e1metro {hash} se pasa a la funci\u00f3n decrypt que espera un valor cifrado de Laravel que contiene un objeto serializado. (Adem\u00e1s, Laravel contiene varias cadenas de gadgets que se pueden utilizar para activar la ejecuci\u00f3n remota de comandos a partir de una deserializaci\u00f3n arbitraria). Por lo tanto, un atacante en posesi\u00f3n de la APP_KEY puede controlar por completo una cadena que se pasa a una funci\u00f3n unserialize." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55605.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55605.json index e3bbea5cbce..d7e3b016157 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55605.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55605.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T17:15:39.600", "lastModified": "2025-01-06T17:15:39.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large input buffer to the to_lowercase, to_uppercase, strip_whitespace, compress_whitespace, dotprefix, header_lowercase, strip_pseudo_headers, url_decode, or xor transform can lead to a stack overflow causing Suricata to crash. The issue has been addressed in Suricata 7.0.8." + }, + { + "lang": "es", + "value": "Suricata es un sistema de detecci\u00f3n de intrusiones, un sistema de prevenci\u00f3n de intrusiones y un motor de monitoreo de seguridad de red. Antes de la versi\u00f3n 7.0.8, un b\u00fafer de entrada grande en to_lowercase, to_uppercase, strip_whitespace, compress_whitespace, dotprefix, header_lowercase, strip_pseudo_headers, url_decode o la transformaci\u00f3n xor puede generar un desbordamiento de pila que haga que Suricata se bloquee. El problema se ha solucionado en Suricata 7.0.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55626.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55626.json index fbbae28d0d6..d837bea0fb1 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55626.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55626.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T18:15:22.570", "lastModified": "2025-01-06T18:15:22.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large BPF filter file provided to Suricata at startup can lead to a buffer overflow at Suricata startup. The issue has been addressed in Suricata 7.0.8." + }, + { + "lang": "es", + "value": "Suricata es un sistema de detecci\u00f3n de intrusiones, un sistema de prevenci\u00f3n de intrusiones y un motor de monitoreo de seguridad de red. Antes de la versi\u00f3n 7.0.8, un archivo de filtro BPF grande proporcionado a Suricata al inicio puede provocar un desbordamiento de b\u00fafer al iniciar Suricata. El problema se ha solucionado en Suricata 7.0.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55627.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55627.json index 9be541e36cc..af807f76782 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55627.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55627.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T18:15:22.757", "lastModified": "2025-01-06T18:15:22.757", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a specially crafted TCP stream can lead to a very large buffer overflow while being zero-filled during initialization with memset due to an unsigned integer underflow. The issue has been addressed in Suricata 7.0.8." + }, + { + "lang": "es", + "value": "Suricata es un sistema de detecci\u00f3n de intrusiones, un sistema de prevenci\u00f3n de intrusiones y un motor de monitoreo de seguridad de red. Antes de la versi\u00f3n 7.0.8, un flujo TCP especialmente manipulado puede provocar un desbordamiento de b\u00fafer muy grande mientras se llena con ceros durante la inicializaci\u00f3n con memset debido a un desbordamiento de enteros sin signo. El problema se ha solucionado en Suricata 7.0.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55628.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55628.json index 89ba6c205d7..b02e11f612f 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55628.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55628.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T18:15:22.947", "lastModified": "2025-01-06T18:15:22.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.8, DNS resource name compression can lead to small DNS messages containing very large hostnames which can be costly to decode, and lead to very large DNS log records. While there are limits in place, they were too generous. The issue has been addressed in Suricata 7.0.8." + }, + { + "lang": "es", + "value": "Suricata es un sistema de detecci\u00f3n de intrusiones, un sistema de prevenci\u00f3n de intrusiones y un motor de monitoreo de seguridad de red. Antes de la versi\u00f3n 7.0.8, la compresi\u00f3n de nombres de recursos DNS pod\u00eda generar mensajes DNS peque\u00f1os que conten\u00edan nombres de host muy grandes, cuya decodificaci\u00f3n pod\u00eda resultar costosa, y generar registros DNS muy grandes. Si bien existen l\u00edmites, estos eran demasiado generosos. El problema se solucion\u00f3 en Suricata 7.0.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55629.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55629.json index 75e312dfa75..7eb9ad4346f 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55629.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55629.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T18:15:23.130", "lastModified": "2025-01-06T18:15:23.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, TCP streams with TCP urgent data (out of band data) can lead to Suricata analyzing data differently than the applications at the TCP endpoints, leading to possible evasions. Suricata 7.0.8 includes options to allow users to configure how to handle TCP urgent data. In IPS mode, you can use a rule such as drop tcp any any -> any any (sid:1; tcp.flags:U*;) to drop all the packets with urgent flag set." + }, + { + "lang": "es", + "value": "Suricata es un sistema de detecci\u00f3n de intrusiones de red, un sistema de prevenci\u00f3n de intrusiones y un motor de monitoreo de seguridad de red. Antes de la versi\u00f3n 7.0.8, los flujos TCP con datos urgentes TCP (datos fuera de banda) pueden provocar que Suricata analice los datos de manera diferente a las aplicaciones en los endpoints TCP, lo que puede generar posibles evasiones. Suricata 7.0.8 incluye opciones para permitir que los usuarios configuren c\u00f3mo gestionar los datos urgentes TCP. En el modo IPS, puede usar una regla como drop tcp any any -> any any (sid:1; tcp.flags:U*;) para descartar todos los paquetes con el indicador de urgencia establecido." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55631.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55631.json index 7c2e30fee42..ddd140adecf 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55631.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55631.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An engine link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en Trend Micro Apex One que sigue el v\u00ednculo de un motor podr\u00eda permitir que un atacante local aumente los privilegios en las instalaciones afectadas. Tenga en cuenta que un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder aprovechar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55632.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55632.json index 841ee3cd9d3..11c0944a9e6 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55632.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55632.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + }, + { + "lang": "es", + "value": "Un v\u00ednculo de agente de seguridad que sigue una vulnerabilidad en Trend Micro Apex One podr\u00eda permitir que un atacante local aumente los privilegios en las instalaciones afectadas. Tenga en cuenta que un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55656.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55656.json index 812b8d41ded..ede6a9c1c2d 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55656.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55656.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-08T16:15:36.213", "lastModified": "2025-01-08T16:15:36.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "RedisBloom adds a set of probabilistic data structures to Redis. There is an integer overflow vulnerability in RedisBloom, which is a module used in Redis. The integer overflow vulnerability allows an attacker (a redis client which knows the password) to allocate memory in the heap lesser than the required memory due to wraparound. Then read and write can be performed beyond this allocated memory, leading to info leak and OOB write. The integer overflow is in CMS.INITBYDIM command, which initialize a Count-Min Sketch to dimensions specified by user. It accepts two values (width and depth) and uses them to allocate memory in NewCMSketch(). This vulnerability is fixed in 2.2.19, 2.4.12, 2.6.14, and 2.8.2." + }, + { + "lang": "es", + "value": "RedisBloom agrega un conjunto de estructuras de datos probabil\u00edsticas a Redis. Existe una vulnerabilidad de desbordamiento de enteros en RedisBloom, que es un m\u00f3dulo utilizado en Redis. La vulnerabilidad de desbordamiento de enteros permite a un atacante (un cliente de Redis que conoce la contrase\u00f1a) asignar memoria en el mont\u00f3n menor que la memoria requerida debido al envoltorio. Luego, se pueden realizar operaciones de lectura y escritura m\u00e1s all\u00e1 de esta memoria asignada, lo que genera una fuga de informaci\u00f3n y una escritura OOB. El desbordamiento de enteros se encuentra en el comando CMS.INITBYDIM, que inicializa un Count-Min Sketch con las dimensiones especificadas por el usuario. Acepta dos valores (ancho y profundidad) y los utiliza para asignar memoria en NewCMSketch(). Esta vulnerabilidad se corrigi\u00f3 en 2.2.19, 2.4.12, 2.6.14 y 2.8.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-558xx/CVE-2024-55896.json b/CVE-2024/CVE-2024-558xx/CVE-2024-55896.json index 6ce95fed461..a8f95365b9b 100644 --- a/CVE-2024/CVE-2024-558xx/CVE-2024-55896.json +++ b/CVE-2024/CVE-2024-558xx/CVE-2024-55896.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-03T23:15:08.437", "lastModified": "2025-01-03T23:15:08.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM PowerHA SystemMirror for i 7.4 and 7.5 contains improper restrictions when rendering content via iFrames. \u00a0This vulnerability could allow an attacker to gain improper access and perform unauthorized actions on the system." + }, + { + "lang": "es", + "value": "IBM PowerHA SystemMirror para i 7.4 y 7.5 contiene restricciones indebidas al representar contenido mediante iFrames. Esta vulnerabilidad podr\u00eda permitir que un atacante obtenga acceso indebido y realice acciones no autorizadas en el sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-558xx/CVE-2024-55897.json b/CVE-2024/CVE-2024-558xx/CVE-2024-55897.json index 01905b44219..c3a4851ec55 100644 --- a/CVE-2024/CVE-2024-558xx/CVE-2024-55897.json +++ b/CVE-2024/CVE-2024-558xx/CVE-2024-55897.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-03T23:15:08.573", "lastModified": "2025-01-03T23:15:08.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM PowerHA SystemMirror for i 7.4 and 7.5 \n\ndoes not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic." + }, + { + "lang": "es", + "value": "IBM PowerHA SystemMirror para i 7.4 y 7.5 no establece el atributo seguro en tokens de autorizaci\u00f3n o cookies de sesi\u00f3n. Los atacantes pueden obtener los valores de las cookies enviando un enlace http:// a un usuario o colocando este enlace en un sitio al que accede el usuario. La cookie se enviar\u00e1 al enlace inseguro y el atacante puede obtener el valor de la cookie espiando el tr\u00e1fico." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55917.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55917.json index ed217aa034f..4221d1bc796 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55917.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55917.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An origin validation error vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de error de validaci\u00f3n de origen en Trend Micro Apex One podr\u00eda permitir que un atacante local aumente los privilegios en las instalaciones afectadas. Tenga en cuenta que un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder aprovechar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55955.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55955.json index c9009bdb3fd..dbdfd25aca5 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55955.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55955.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An incorrect permissions assignment vulnerability in Trend Micro Deep Security 20.0 agents between versions 20.0.1-9400 and 20.0.1-23340 could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de asignaci\u00f3n incorrecta de permisos en los agentes de Trend Micro Deep Security 20.0 entre las versiones 20.0.1-9400 y 20.0.1-23340 podr\u00eda permitir que un atacante local aumente los privilegios en las instalaciones afectadas. Tenga en cuenta que, para explotar esta vulnerabilidad, un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino.\n" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55991.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55991.json index 959627c2102..aad89553127 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55991.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55991.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WP-CRM WP-CRM System allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP-CRM System: from n/a through 3.2.9.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en WP-CRM WP-CRM System permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP-CRM System: desde n/a hasta 3.2.9.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55995.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55995.json index b262026d4ee..acf5d8388ac 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55995.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55995.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Torod Holding LTD Torod allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Torod: from n/a through 1.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Torod Holding LTD Torod permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Torod: desde n/a hasta 1.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5553.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5553.json index 459fc1c73e8..b57c1ef999d 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5553.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5553.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-06-12T04:15:13.127", "lastModified": "2024-11-21T09:47:55.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5591.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5591.json index d829fa80c99..8e9edacfde8 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5591.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5591.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Jazz Foundation 7.0.2, 7.0.3, and 7.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system." + }, + { + "lang": "es", + "value": "IBM Jazz Foundation 7.0.2, 7.0.3 y 7.1.0 podr\u00eda permitir que un atacante remoto obtenga informaci\u00f3n confidencial cuando se devuelve un mensaje de error t\u00e9cnico detallado en el navegador. Esta informaci\u00f3n podr\u00eda utilizarse en futuros ataques contra el sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json index 118cb63ed48..06e5b3ad2ae 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins." + }, + { + "lang": "es", + "value": "OpenVPN anterior a 2.6.11 no desinfecta adecuadamente los mensajes PUSH_REPLY, lo cual los atacantes pueden usar para inyectar datos arbitrarios inesperados en ejecutables o complementos de terceros." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56002.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56002.json index 1bb37212a68..23e9635a19a 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56002.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56002.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Porthas Inc. Contact Form, Survey & Form Builder \u2013 MightyForms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form, Survey & Form Builder \u2013 MightyForms: from n/a through 1.3.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Porthas Inc. Contact Form, Survey y Form Builder \u2013 MightyForms permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Contact Form, Survey & Form Builder \u2013 MightyForms: desde n/a hasta 1.3.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56020.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56020.json index 7ceed7055de..6db6b9e3d9b 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56020.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56020.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mario Di Pasquale SvegliaT Buttons allows Stored XSS.This issue affects SvegliaT Buttons: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Mario Di Pasquale SvegliaT Buttons permite XSS almacenado. Este problema afecta a los botones SvegliaT: desde n/a hasta 1.3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56021.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56021.json index f06419febb4..4f7f4fc8081 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56021.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56021.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ibnuyahya Category Post Shortcode allows Stored XSS.This issue affects Category Post Shortcode: from n/a through 2.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ibnuyahya Category Post Shortcode permite XSS almacenado. Este problema afecta a Category Post Shortcode: desde n/a hasta 2.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56031.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56031.json index fa2754efffb..d4dc61762ed 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56031.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56031.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Yulio Aleman Jimenez Smart Shopify Product allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smart Shopify Product: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Yulio Aleman Jimenez Smart Shopify Product permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Smart Shopify Product: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56039.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56039.json index d6cff8e4b2a..1a8e1227318 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56039.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56039.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in VibeThemes VibeBP allows SQL Injection.This issue affects VibeBP: from n/a before 1.9.9.7.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en VibeThemes VibeBP permite la inyecci\u00f3n SQL. Este problema afecta a VibeBP: desde n/a antes de 1.9.9.7.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56040.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56040.json index 00c2efb3688..9ac420ae048 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56040.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56040.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in VibeThemes VibeBP allows Privilege Escalation.This issue affects VibeBP: from n/a through 1.9.9.4.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en VibeThemes VibeBP permite la escalada de privilegios. Este problema afecta a VibeBP: desde n/a hasta 1.9.9.4.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56041.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56041.json index 1bd776bc489..2844a01b715 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56041.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56041.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in VibeThemes VibeBP allows SQL Injection.This issue affects VibeBP: from n/a before 1.9.9.5.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en VibeThemes VibeBP permite la inyecci\u00f3n SQL. Este problema afecta a VibeBP: desde n/a antes de 1.9.9.5.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56042.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56042.json index eba4c540c51..372378ac2cd 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56042.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56042.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in VibeThemes WPLMS allows SQL Injection.This issue affects WPLMS: from n/a before 1.9.9.5.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en VibeThemes WPLMS permite la inyecci\u00f3n SQL. Este problema afecta a WPLMS: desde n/a antes de 1.9.9.5.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56043.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56043.json index 2c84e4e140d..d0e1c74b09d 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56043.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56043.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in VibeThemes WPLMS allows Privilege Escalation.This issue affects WPLMS: from n/a through 1.9.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en VibeThemes WPLMS permite la escalada de privilegios. Este problema afecta a WPLMS: desde n/a hasta 1.9.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56044.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56044.json index cdcc2101e40..dba24c3d641 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56044.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56044.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in VibeThemes WPLMS allows Authentication Bypass.This issue affects WPLMS: from n/a through 1.9.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en VibeThemes WPLMS permite la omisi\u00f3n de autenticaci\u00f3n. Este problema afecta a WPLMS: desde n/a hasta 1.9.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56045.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56045.json index 7cb8af2f32f..b3e7c7b82d0 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56045.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56045.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Path Traversal: '.../...//' vulnerability in VibeThemes WPLMS allows Path Traversal.This issue affects WPLMS: from n/a before 1.9.9.5." + }, + { + "lang": "es", + "value": "Path Traversal: la vulnerabilidad '.../...//' en VibeThemes WPLMS permite el Path Traversal. Este problema afecta a WPLMS: desde n/a antes de 1.9.9.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56046.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56046.json index dcb967d7441..f1a26168702 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56046.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56046.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in VibeThemes WPLMS allows Upload a Web Shell to a Web Server.This issue affects WPLMS: from n/a through 1.9.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en VibeThemes WPLMS permite cargar un shell web a un servidor web. Este problema afecta a WPLMS: desde n/a hasta 1.9.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56056.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56056.json index 0da292d4644..8e6f682cb17 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56056.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56056.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:37.140", "lastModified": "2025-01-07T16:15:37.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kmfoysal06 SimpleCharm allows Reflected XSS.This issue affects SimpleCharm: from n/a through 1.4.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en kmfoysal06 SimpleCharm permite XSS reflejado. Este problema afecta a SimpleCharm: desde n/a hasta 1.4.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56061.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56061.json index c11bc770124..26edb04f356 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56061.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56061.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Webful Creations Computer Repair Shop allows Privilege Escalation.This issue affects Computer Repair Shop: from n/a through 3.8119." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Webful Creations Computer Repair Shop permite la escalada de privilegios. Este problema afecta a Computer Repair Shop: desde n/a hasta 3.8119." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56062.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56062.json index 93ae5224ff3..e521094e35f 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56062.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56062.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Royal Royal Elementor Addons allows Stored XSS.This issue affects Royal Elementor Addons: from n/a through 1.3.987." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Royal Royal Elementor Addons permite XSS almacenado. Este problema afecta a Royal Elementor Addons: desde n/a hasta 1.3.987." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56063.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56063.json index 9e2ca9bf7c3..28dbe50eb55 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56063.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56063.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDeveloper Essential Addons for Elementor allows Stored XSS.This issue affects Essential Addons for Elementor: from n/a through 6.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPDeveloper Essential Addons para Elementor permite XSS almacenado. Este problema afecta a Essential Addons para Elementor: desde n/a hasta 6.0.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56064.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56064.json index e73fb63fdae..959b6a3f9a2 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56064.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56064.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Azzaroco WP SuperBackup allows Upload a Web Shell to a Web Server.This issue affects WP SuperBackup: from n/a through 2.3.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en Azzaroco WP SuperBackup permite cargar un shell web a un servidor web. Este problema afecta a WP SuperBackup: desde n/a hasta 2.3.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56066.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56066.json index c8a759dad32..c257e724da6 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56066.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56066.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Inspry Agency Toolkit allows Privilege Escalation.This issue affects Agency Toolkit: from n/a through 1.0.23." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Inspry Agency Toolkit permite la escalada de privilegios. Este problema afecta a Agency Toolkit: desde n/a hasta 1.0.23." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56067.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56067.json index 6cebcc28b48..a0b662e20d5 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56067.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56067.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Azzaroco WP SuperBackup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP SuperBackup: from n/a through 2.3.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Azzaroco WP SuperBackup permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP SuperBackup: desde n/a hasta 2.3.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56068.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56068.json index 9d47fbd8a14..371ea093dcf 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56068.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56068.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Azzaroco WP SuperBackup.This issue affects WP SuperBackup: from n/a through 2.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Azzaroco WP SuperBackup. Este problema afecta a WP SuperBackup: desde n/a hasta 2.3.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56070.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56070.json index 6f957b68fd2..4f4e55b9931 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56070.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56070.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Azzaroco WP SuperBackup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP SuperBackup: from n/a through 2.3.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Azzaroco WP SuperBackup permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP SuperBackup: desde n/a hasta 2.3.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56071.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56071.json index 4cb399e19c1..38524e651b1 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56071.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56071.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in Mike Leembruggen Simple Dashboard allows Privilege Escalation.This issue affects Simple Dashboard: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en Simple Dashboard de Mike Leembruggen permite la escalada de privilegios. Este problema afecta a Simple Dashboard: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json index b92239785a0..19380da29fe 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-09T20:15:39.730", "lastModified": "2025-01-09T20:15:39.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Canlineapp Online 1.1 is vulnerable to Broken Access Control and allows users with the Auditor role to create an audit template as a result of improper authorization checks. This feature is designated for supervisor role, but auditors have been able to successfully create audit templates from their account." + }, + { + "lang": "es", + "value": "Canlineapp Online 1.1 es vulnerable a controles de acceso err\u00f3neos y permite que los usuarios con el rol de auditor creen una plantilla de auditor\u00eda como resultado de verificaciones de autorizaci\u00f3n incorrectas. Esta funci\u00f3n est\u00e1 dise\u00f1ada para el rol de supervisor, pero los auditores han podido crear plantillas de auditor\u00eda con \u00e9xito desde su cuenta." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56198.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56198.json index 525f4eaa85d..b28c61431f0 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56198.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56198.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "path-sanitizer is a simple lightweight npm package for sanitizing paths to prevent Path Traversal. Prior to 3.1.0, the filters can be bypassed using .=%5c which results in a path traversal. This vulnerability is fixed in 3.1.0." + }, + { + "lang": "es", + "value": "path-sanitizer es un paquete npm simple y liviano para desinfectar rutas y evitar Path Traversal. Antes de la versi\u00f3n 3.1.0, los filtros se pueden omitir usando .=%5c, lo que da como resultado Path Traversal. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 3.1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56203.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56203.json index bc6a77444ee..fd15c4ab21b 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56203.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56203.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in George Holmes II Wayne Audio Player allows Privilege Escalation.This issue affects Wayne Audio Player: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en George Holmes II Wayne Audio Player permite la escalada de privilegios. Este problema afecta a Wayne Audio Player: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56204.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56204.json index 08e34de6e5f..8b41751a98b 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56204.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56204.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Yonatan Reinberg of Social Ink Sinking Dropdowns allows Privilege Escalation.This issue affects Sinking Dropdowns: from n/a through 1.25." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Yonatan Reinberg de Social Ink Sinking Dropdowns permite la escalada de privilegios. Este problema afecta a Sinking Dropdowns: desde n/a hasta 1.25." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56205.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56205.json index 2b9bb235013..f657d626f0b 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56205.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56205.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in AI Magic allows Privilege Escalation.This issue affects AI Magic: from n/a through 1.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en AI Magic permite la escalada de privilegios. Este problema afecta a AI Magic: desde n/a hasta 1.0.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56206.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56206.json index da0205904fa..3ebe72ea4e8 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56206.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56206.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Amarjeet Amar allows Authentication Bypass.This issue affects gap-hub-user-role: from n/a through 3.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Amarjeet Amar permite la omisi\u00f3n de la autenticaci\u00f3n. Este problema afecta a gap-hub-user-role: desde n/a hasta 3.4.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56207.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56207.json index f9e78b6fcc7..25557f72f1d 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56207.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56207.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in EditionGuard Dev Team EditionGuard for WooCommerce \u2013 eBook Sales with DRM allows Privilege Escalation.This issue affects EditionGuard for WooCommerce \u2013 eBook Sales with DRM: from n/a through 3.4.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en EditionGuard Dev Team EditionGuard para WooCommerce \u2013 eBook Sales con DRM permite la escalada de privilegios. Este problema afecta a EditionGuard para WooCommerce \u2013 eBook Sales con DRM: desde n/a hasta 3.4.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56270.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56270.json index 6237131b9c0..34516aa612f 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56270.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56270.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T17:15:31.140", "lastModified": "2025-01-07T17:15:31.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in SecureSubmit WP SecureSubmit.This issue affects WP SecureSubmit: from n/a through 1.5.16." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en SecureSubmit WP SecureSubmit. Este problema afecta a WP SecureSubmit: desde n/a hasta 1.5.16." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56271.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56271.json index f7b8e04fcd1..d87b0a20ca3 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56271.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56271.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:08.633", "lastModified": "2025-01-07T11:15:08.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in SecureSubmit WP SecureSubmit allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP SecureSubmit: from n/a through 1.5.16." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en SecureSubmit WP SecureSubmit permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP SecureSubmit: desde n/a hasta 1.5.16." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56272.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56272.json index a1b2b283610..d4002a53cee 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56272.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56272.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T17:15:31.287", "lastModified": "2025-01-07T17:15:31.287", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in ThemeSupport Hide Category by User Role for WooCommerce.This issue affects Hide Category by User Role for WooCommerce: from n/a through 2.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en ThemeSupport Hide Category de User Role para WooCommerce. Este problema afecta a Hide Category de User Role para WooCommerce: desde n/a hasta 2.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56273.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56273.json index e4e20e6896c..fcaddbae0ec 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56273.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56273.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:08.800", "lastModified": "2025-01-07T11:15:08.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in WPvivid Backup & Migration WPvivid Backup and Migration allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WPvivid Backup and Migration: from n/a through 0.9.106." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en WPvivid Backup & Migration WPvivid Backup and Migration permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a WPvivid Backup y Migration: desde n/a hasta 0.9.106." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56274.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56274.json index 75018e0cd82..697eaeaf318 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56274.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56274.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:08.960", "lastModified": "2025-01-07T11:15:08.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force Astra Widgets allows Stored XSS.This issue affects Astra Widgets: from n/a through 1.2.15." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Brainstorm Force Astra Widgets permite XSS almacenado. Este problema afecta a Astra Widgets: desde n/a hasta 1.2.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56275.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56275.json index f2e5e1e3aef..fbd53d74e37 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56275.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56275.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:09.130", "lastModified": "2025-01-07T11:15:09.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Envato Envato Elements allows Server Side Request Forgery.This issue affects Envato Elements: from n/a through 2.0.14." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Server-Side Request Forgery (SSRF) en Envato Envato Elements permite Server Side Request Forgery. Este problema afecta a Envato Elements: desde n/a hasta 2.0.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56276.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56276.json index 395b8725920..b530e60e5e7 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56276.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56276.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:09.293", "lastModified": "2025-01-07T11:15:09.293", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in WPForms Contact Form by WPForms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form by WPForms: from n/a through 1.9.2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en WPForms Contact Form de WPForms permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al formulario de contacto de WPForms: desde n/a hasta 1.9.2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56278.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56278.json index bb5281b5c3d..b0822c8ccc3 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56278.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56278.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:09.460", "lastModified": "2025-01-07T11:15:09.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Smackcoders WP Ultimate Exporter allows PHP Remote File Inclusion.This issue affects WP Ultimate Exporter: from n/a through 2.9.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control inadecuado de generaci\u00f3n de c\u00f3digo ('inyecci\u00f3n de c\u00f3digo') en WP Ultimate Exporter de Smackcoders permite la inclusi\u00f3n remota de archivos PHP. Este problema afecta a WP Ultimate Exporter: desde n/a hasta 2.9.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56279.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56279.json index fcbb0c6023d..05d5e6f04cb 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56279.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56279.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:09.633", "lastModified": "2025-01-07T11:15:09.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Tips and Tricks HQ Compact WP Audio Player allows Server Side Request Forgery.This issue affects Compact WP Audio Player: from n/a through 1.9.14." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Server-Side Request Forgery (SSRF) en Tips and Tricks HQ Compact WP Audio Player permite Server Side Request Forgery. Este problema afecta a Compact WP Audio Player: desde n/a hasta 1.9.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56280.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56280.json index 17fdab99ddc..26f0cba61cd 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56280.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56280.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:09.820", "lastModified": "2025-01-07T11:15:09.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in Amento Tech Pvt ltd WPGuppy allows Privilege Escalation.This issue affects WPGuppy: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en WPGuppy de Amento Tech Pvt ltd permite la escalada de privilegios. Este problema afecta a WPGuppy: desde n/a hasta 1.1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56281.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56281.json index 9123bc95609..6088e97c884 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56281.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56281.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:10.003", "lastModified": "2025-01-07T11:15:10.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CodeMShop \uc6cc\ub4dc\ud504\ub808\uc2a4 \uacb0\uc81c \uc2ec\ud50c\ud398\uc774 allows PHP Local File Inclusion.This issue affects \uc6cc\ub4dc\ud504\ub808\uc2a4 \uacb0\uc81c \uc2ec\ud50c\ud398\uc774: from n/a through 5.2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en un programa PHP ('Inclusi\u00f3n remota de archivos PHP') en CodeMShop ????? ?? ???? permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta ????? ?? ???? : desde n/a hasta 5.2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56282.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56282.json index 8cb78694171..5e206b8a3a0 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56282.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56282.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:10.177", "lastModified": "2025-01-07T11:15:10.177", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elicus WPMozo Addons Lite for Elementor allows PHP Local File Inclusion.This issue affects WPMozo Addons Lite for Elementor: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivos remotos PHP') en Elicus WPMozo Addons Lite para Elementor permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a WPMozo Addons Lite para Elementor: desde n/a hasta 1.1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56283.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56283.json index 1cc6a342624..eb74b77fa5f 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56283.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56283.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:10.357", "lastModified": "2025-01-07T11:15:10.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in plainware.com Locatoraid Store Locator allows Object Injection.This issue affects Locatoraid Store Locator: from n/a through 3.9.50." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en plainware.com Locatoraid Store Locator permite la inyecci\u00f3n de objetos. Este problema afecta a Locatoraid Store Locator: desde n/a hasta 3.9.50." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56284.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56284.json index 9b70e7fe020..f90ba5ebfd9 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56284.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56284.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:10.537", "lastModified": "2025-01-07T11:15:10.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SSL Wireless SSL Wireless SMS Notification allows SQL Injection.This issue affects SSL Wireless SMS Notification: from n/a through 3.5.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en SSL Wireless SSL Wireless SMS Notification permite la inyecci\u00f3n SQL. Este problema afecta a SSL Wireless SMS Notification: desde n/a hasta 3.5.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56285.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56285.json index 8eae3994513..d91d53ba0c5 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56285.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56285.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:10.707", "lastModified": "2025-01-07T11:15:10.707", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPBits WPBITS Addons For Elementor Page Builder allows Stored XSS.This issue affects WPBITS Addons For Elementor Page Builder: from n/a through 1.5.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPBits WPBITS Addons For Elementor Page Builder permite XSS almacenado. Este problema afecta a WPBITS Addons For Elementor Page Builder: desde n/a hasta 1.5.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56286.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56286.json index 805b387b1b1..eec15db7368 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56286.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56286.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:10.883", "lastModified": "2025-01-07T11:15:10.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Classic Addons Classic Addons \u2013 WPBakery Page Builder allows PHP Local File Inclusion.This issue affects Classic Addons \u2013 WPBakery Page Builder: from n/a through 3.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Classic Addons Classic Addons \u2013 WPBakery Page Builder permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Classic Addons \u2013 WPBakery Page Builder: desde n/a hasta 3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56287.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56287.json index e000029432b..8ffa88090a9 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56287.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56287.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:11.060", "lastModified": "2025-01-07T11:15:11.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in biztechc WP jQuery DataTable allows Stored XSS.This issue affects WP jQuery DataTable: from n/a through 4.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP jQuery DataTable de biztechc permite XSS almacenado. Este problema afecta a WP jQuery DataTable: desde n/a hasta 4.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56288.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56288.json index 0f2ae688355..bf7cb36247e 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56288.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56288.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:11.247", "lastModified": "2025-01-07T11:15:11.247", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fahad Mahmood WP Docs allows Stored XSS.This issue affects WP Docs: from n/a through 2.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Docs de Fahad Mahmood permite XSS almacenado. Este problema afecta a WP Docs: desde n/a hasta 2.2.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56289.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56289.json index d94555d3cf0..27b5916ee26 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56289.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56289.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:11.417", "lastModified": "2025-01-07T11:15:11.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Groundhogg Inc. Groundhogg allows Reflected XSS.This issue affects Groundhogg: from n/a through 3.7.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Groundhogg Inc. Groundhogg permite XSS reflejado. Este problema afecta a Groundhogg: desde n/a hasta 3.7.3.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56290.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56290.json index 92227df3ff5..3a167a99a00 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56290.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56290.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:11.587", "lastModified": "2025-01-07T11:15:11.587", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in silverplugins217 Multiple Shipping And Billing Address For Woocommerce allows SQL Injection.This issue affects Multiple Shipping And Billing Address For Woocommerce: from n/a through 1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en silverplugins217 Multiple Shipping And Billing Address For Woocommerce permite la inyecci\u00f3n SQL. Este problema afecta a Multiple Shipping And Billing Address For Woocommerce: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56291.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56291.json index e834f37ba96..a75fba1873d 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56291.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56291.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:11.760", "lastModified": "2025-01-07T11:15:11.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in plainware.com PlainInventory allows Object Injection.This issue affects PlainInventory: from n/a through 3.1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en plainware.com PlainInventory permite la inyecci\u00f3n de objetos. Este problema afecta a PlainInventory: desde n/a hasta 3.1.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56292.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56292.json index 36e71e53639..0a943bd0208 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56292.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56292.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:11.943", "lastModified": "2025-01-07T11:15:11.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpdevelop, oplugins Email Reminders allows Stored XSS.This issue affects Email Reminders: from n/a through 2.0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en wpdevelop, oplugins Email Reminders permite XSS almacenado. Este problema afecta a Email Reminders: desde n/a hasta 2.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56293.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56293.json index 0d1ef18ba89..d2aa47f7d18 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56293.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56293.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:12.100", "lastModified": "2025-01-07T11:15:12.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nasirahmed Advanced Form Integration allows Stored XSS.This issue affects Advanced Form Integration: from n/a through 1.95.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en nasirahmed Advanced Form Integration permite XSS almacenado. Este problema afecta a Advanced Form Integration: desde n/a hasta 1.95.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56294.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56294.json index 5bdb4216fa2..21dc3080fa3 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56294.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56294.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:12.270", "lastModified": "2025-01-07T11:15:12.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in POSIMYTH Nexter Blocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Nexter Blocks: from n/a through 4.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en POSIMYTH Nexter Blocks permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Nexter Blocks: desde n/a hasta 4.0.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56296.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56296.json index 041b0b3da90..76753d33e93 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56296.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56296.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:12.467", "lastModified": "2025-01-07T11:15:12.467", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hometory Mang Board WP allows Reflected XSS.This issue affects Mang Board WP: from n/a through 1.8.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Hometory Mang Board WP permite XSS reflejado. Este problema afecta a Mang Board WP: desde n/a hasta 1.8.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56297.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56297.json index e7172265c3b..da8fd72935d 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56297.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56297.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:12.643", "lastModified": "2025-01-07T11:15:12.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dn88 Highlight allows Stored XSS.This issue affects Highlight: from n/a through 2.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en dn88 Highlight permite XSS almacenado. Este problema afecta a Highlight: desde n/a hasta 2.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56298.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56298.json index cd757ab91a5..d0635f29cc5 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56298.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56298.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:12.807", "lastModified": "2025-01-07T11:15:12.807", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 5 Star Plugins Pretty Simple Popup Builder allows Stored XSS.This issue affects Pretty Simple Popup Builder: from n/a through 1.0.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en 5 Star Plugins Pretty Simple Popup Builder permite XSS almacenado. Este problema afecta a Pretty Simple Popup Builder: desde n/a hasta 1.0.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56299.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56299.json index 1562c19329a..bb5c5efb032 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56299.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56299.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:12.960", "lastModified": "2025-01-07T11:15:12.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pektsekye Notify Odoo allows Stored XSS.This issue affects Notify Odoo: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Pektsekye Notify Odoo permite XSS almacenado. Este problema afecta a Notify Odoo: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56300.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56300.json index 4836b8aa34d..f3cb3a07d96 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56300.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56300.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:13.117", "lastModified": "2025-01-07T11:15:13.117", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insertion of Sensitive Information Into Sent Data vulnerability in WPSpins Post/Page Copying Tool allows Retrieve Embedded Sensitive Data.This issue affects Post/Page Copying Tool: from n/a through 2.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en los datos enviados en WPSpins Post/Page Copying Tool permite recuperar datos confidenciales incrustados. Este problema afecta a Post/Page Copying Tool: desde n/a hasta 2.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56320.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56320.json index 26529f44e81..240af237366 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56320.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56320.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "GoCD is a continuous deliver server. GoCD versions prior to 24.5.0 are vulnerable to admin privilege escalation due to improper authorization of access to the admin \"Configuration XML\" UI feature, and its associated API. A malicious insider/existing authenticated GoCD user with an existing GoCD user account could abuse this vulnerability to access information intended only for GoCD admins, or to escalate their privileges to that of a GoCD admin in a persistent manner. it is not possible for this vulnerability to be abused prior to authentication/login. The issue is fixed in GoCD 24.5.0. GoCD users who are not able to immediate upgrade can mitigate this issue by using a reverse proxy, WAF or similar to externally block access paths with a `/go/rails/` prefix. Blocking this route causes no loss of functionality. If it is not possible to upgrade or block the above route, consider reducing the GoCD user base to more trusted set of users, including temporarily disabling use of plugins such as the guest-login-plugin, which allow limited anonymous access as a regular user account." + }, + { + "lang": "es", + "value": "GoCD es un servidor de entrega continua. Las versiones de GoCD anteriores a la 24.5.0 son vulnerables a la escalada de privilegios de administrador debido a la autorizaci\u00f3n incorrecta del acceso a la funci\u00f3n de interfaz de usuario \"XML de configuraci\u00f3n\" del administrador y su API asociada. Un usuario interno malintencionado o un usuario autenticado existente de GoCD con una cuenta de usuario de GoCD existente podr\u00eda aprovechar esta vulnerabilidad para acceder a informaci\u00f3n destinada \u00fanicamente a los administradores de GoCD o para escalar sus privilegios a los de un administrador de GoCD de manera persistente. No es posible que se abuse de esta vulnerabilidad antes de la autenticaci\u00f3n o el inicio de sesi\u00f3n. El problema se solucion\u00f3 en GoCD 24.5.0. Los usuarios de GoCD que no pueden realizar una actualizaci\u00f3n inmediata pueden mitigar este problema utilizando un proxy inverso, WAF o similar para bloquear externamente las rutas de acceso con un prefijo `/go/rails/`. El bloqueo de esta ruta no provoca ninguna p\u00e9rdida de funcionalidad. Si no es posible actualizar o bloquear la ruta anterior, considere reducir la base de usuarios de GoCD a un conjunto de usuarios m\u00e1s confiable, incluida la desactivaci\u00f3n temporal del uso de complementos como el complemento de inicio de sesi\u00f3n de invitado, que permite un acceso an\u00f3nimo limitado como una cuenta de usuario normal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56321.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56321.json index b623b396e3c..428e9969e4c 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56321.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56321.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "GoCD is a continuous deliver server. GoCD versions 18.9.0 through 24.4.0 (inclusive) can allow GoCD admins to abuse the backup configuration \"post-backup script\" feature to potentially execute arbitrary scripts on the hosting server or container as GoCD's user, rather than pre-configured scripts. In practice the impact of this vulnerability is limited, as in most configurations a user who can log into the GoCD UI as an admin also has host administration permissions for the host/container that GoCD runs on, in order to manage artifact storage and other service-level configuration options. Additionally, since a GoCD admin has ability to configure and schedule pipelines tasks on all GoCD agents available to the server, the fundamental functionality of GoCD allows co-ordinated task execution similar to that of post-backup-scripts. However in restricted environments where the host administration is separated from the role of a GoCD admin, this may be unexpected. The issue is fixed in GoCD 24.5.0. Post-backup scripts can no longer be executed from within certain sensitive locations on the GoCD server. No known workarounds are available." + }, + { + "lang": "es", + "value": "GoCD es un servidor de entrega continua. Las versiones de GoCD 18.9.0 a 24.4.0 (incluida) pueden permitir que los administradores de GoCD abusen de la funci\u00f3n de \"script posterior a la copia de seguridad\" de la configuraci\u00f3n de copia de seguridad para ejecutar potencialmente scripts arbitrarios en el servidor o contenedor de alojamiento como usuario de GoCD, en lugar de scripts preconfigurados. En la pr\u00e1ctica, el impacto de esta vulnerabilidad es limitado, ya que en la mayor\u00eda de las configuraciones, un usuario que puede iniciar sesi\u00f3n en la interfaz de usuario de GoCD como administrador tambi\u00e9n tiene permisos de administraci\u00f3n de host para el host/contenedor en el que se ejecuta GoCD, con el fin de administrar el almacenamiento de artefactos y otras opciones de configuraci\u00f3n a nivel de servicio. Adem\u00e1s, dado que un administrador de GoCD tiene la capacidad de configurar y programar tareas de canalizaci\u00f3n en todos los agentes de GoCD disponibles para el servidor, la funcionalidad fundamental de GoCD permite la ejecuci\u00f3n coordinada de tareas similar a la de los scripts posteriores a la copia de seguridad. Sin embargo, en entornos restringidos donde la administraci\u00f3n del host est\u00e1 separada del rol de un administrador de GoCD, esto puede ser inesperado. El problema se solucion\u00f3 en GoCD 24.5.0. Los scripts posteriores a la copia de seguridad ya no se pueden ejecutar desde ciertas ubicaciones confidenciales del servidor GoCD. No se conocen workarounds." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56322.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56322.json index bf0bb6b8da4..33003f82d0c 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56322.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56322.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "GoCD is a continuous deliver server. GoCD versions 16.7.0 through 24.4.0 (inclusive) can allow GoCD admins to abuse a hidden/unused configuration repository (pipelines as code) feature to allow XML External Entity (XXE) injection on the GoCD Server which will be executed when GoCD periodically scans configuration repositories for pipeline updates, or is triggered by an administrator or config repo admin. In practice the impact of this vulnerability is limited, in most cases without combining with another vulnerability, as only GoCD (super) admins have the ability to abuse this vulnerability. Typically a malicious GoCD admin can cause much larger damage than that they can do with XXE injection. The issue is fixed in GoCD 24.5.0. As a workaround, prevent external access from the GoCD server to arbitrary locations using some kind of environment egress control." + }, + { + "lang": "es", + "value": "GoCD es un servidor de entrega continua. Las versiones de GoCD 16.7.0 a 24.4.0 (incluida) pueden permitir que los administradores de GoCD abusen de una caracter\u00edstica oculta/no utilizada del repositorio de configuraci\u00f3n (canalizaciones como c\u00f3digo) para permitir la inyecci\u00f3n de XML External Entity (XXE) en el servidor de GoCD, que se ejecutar\u00e1 cuando GoCD escanee peri\u00f3dicamente los repositorios de configuraci\u00f3n en busca de actualizaciones de canalizaciones, o sea activada por un administrador o administrador del repositorio de configuraci\u00f3n. En la pr\u00e1ctica, el impacto de esta vulnerabilidad es limitado, en la mayor\u00eda de los casos sin combinarse con otra vulnerabilidad, ya que solo los administradores (super) de GoCD tienen la capacidad de aprovechar esta vulnerabilidad. Por lo general, un administrador malintencionado de GoCD puede causar un da\u00f1o mucho mayor que el que puede causar con la inyecci\u00f3n de XXE. El problema se solucion\u00f3 en GoCD 24.5.0. Como workaround, evite el acceso externo desde el servidor de GoCD a ubicaciones arbitrarias utilizando alg\u00fan tipo de control de salida del entorno." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56324.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56324.json index b26f935738e..f7bde9c03ea 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56324.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56324.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "GoCD is a continuous deliver server. GoCD versions prior to 24.4.0 can allow GoCD \"group admins\" to abuse ability to edit the raw XML configuration for groups they administer to trigger XML External Entity (XXE) injection on the GoCD server. Theoretically, the XXE vulnerability can result in additional attacks such as SSRF, information disclosure from the GoCD server, and directory traversal, although these additional attacks have not been explicitly demonstrated as exploitable. This issue is fixed in GoCD 24.5.0. Some workarounds are available. One may temporarily block access to `/go/*/pipelines/snippet` routes from an external reverse proxy or WAF if one's \"group admin\" users do not need the functionality to edit the XML of pipelines directly (rather than using the UI, or using a configuration repository). One may also prevent external access from one's GoCD server to arbitrary locations using some kind of environment egress control." + }, + { + "lang": "es", + "value": "GoCD es un servidor de entrega continua. Las versiones de GoCD anteriores a la 24.4.0 pueden permitir que los \"administradores de grupo\" de GoCD abusen de la capacidad de editar la configuraci\u00f3n XML sin procesar de los grupos que administran para activar la inyecci\u00f3n de entidad externa XML (XXE) en el servidor de GoCD. En teor\u00eda, la vulnerabilidad XXE puede dar lugar a ataques adicionales, como SSRF, divulgaci\u00f3n de informaci\u00f3n desde el servidor de GoCD y navegaci\u00f3n de directorios, aunque no se ha demostrado expl\u00edcitamente que estos ataques adicionales sean explotables. Este problema se solucion\u00f3 en GoCD 24.5.0. Hay algunas workarounds disponibles. Se puede bloquear temporalmente el acceso a las rutas `/go/*/pipelines/snippet` desde un proxy inverso externo o WAF si los usuarios \"administradores de grupo\" no necesitan la funcionalidad para editar el XML de las canalizaciones directamente (en lugar de usar la interfaz de usuario o un repositorio de configuraci\u00f3n). Tambi\u00e9n se puede impedir el acceso externo desde el servidor de GoCD a ubicaciones arbitrarias utilizando alg\u00fan tipo de control de salida del entorno." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56332.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56332.json index 70de61f8e68..45fa4e40333 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56332.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56332.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T21:15:13.550", "lastModified": "2025-01-03T21:15:13.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework for building full-stack web applications. Starting in version 13.0.0 and prior to versions 13.5.8, 14.2.21, and 15.1.2, Next.js is vulnerable to a Denial of Service (DoS) attack that allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution. This vulnerability can also be used as a Denial of Wallet (DoW) attack when deployed in providers billing by response times. (Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time.). Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing. This is the same issue as if the incoming HTTP request has an invalid `Content-Length` header or never closes. If the host has no other mitigations to those then this vulnerability is novel. This vulnerability affects only Next.js deployments using Server Actions. The issue was resolved in Next.js 13.5.8, 14.2.21, and 15.1.2. We recommend that users upgrade to a safe version. There are no official workarounds." + }, + { + "lang": "es", + "value": "Next.js es un framework React para crear aplicaciones web full-stack. A partir de la versi\u00f3n 13.0.0 y antes de las versiones 13.5.8, 14.2.21 y 15.1.2, Next.js es vulnerable a un ataque de denegaci\u00f3n de servicio (DoS) que permite a los atacantes construir solicitudes que dejan las solicitudes a las acciones del servidor colgadas hasta que el proveedor de alojamiento cancele la ejecuci\u00f3n de la funci\u00f3n. Esta vulnerabilidad tambi\u00e9n se puede utilizar como un ataque de denegaci\u00f3n de cartera (DoW) cuando se implementa en proveedores que facturan por tiempos de respuesta. (Nota: el servidor Next.js est\u00e1 inactivo durante ese tiempo y solo mantiene la conexi\u00f3n abierta. El uso de CPU y memoria es bajo durante ese tiempo). Las implementaciones sin ninguna protecci\u00f3n contra invocaciones de acciones del servidor de larga duraci\u00f3n son especialmente vulnerables. Los proveedores de alojamiento como Vercel o Netlify establecen una duraci\u00f3n m\u00e1xima predeterminada en la ejecuci\u00f3n de la funci\u00f3n para reducir el riesgo de facturaci\u00f3n excesiva. Este es el mismo problema que si la solicitud HTTP entrante tiene un encabezado `Content-Length` no v\u00e1lido o nunca se cierra. Si el host no tiene otras mitigaciones para estas, entonces esta vulnerabilidad es nueva. Esta vulnerabilidad afecta solo a las implementaciones de Next.js que utilizan Acciones del servidor. El problema se resolvi\u00f3 en Next.js 13.5.8, 14.2.21 y 15.1.2. Recomendamos que los usuarios actualicen a una versi\u00f3n segura. No existen workarounds oficiales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56365.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56365.json index a5298598098..50a9ca08d1a 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56365.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56365.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 are vulnerable to unauthorized reflected cross-site scripting in the constructor of the `Downloader` class. Using the `/vendor/phpoffice/phpspreadsheet/samples/download.php` script, an attacker can perform a cross-site scripting attack. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue." + }, + { + "lang": "es", + "value": "PhpSpreadsheet es una librer\u00eda PHP para leer y escribir archivos de hojas de c\u00e1lculo. Las versiones anteriores a 3.7.0, 2.3.5, 2.1.6 y 1.29.7 son vulnerables a ataques de cross site scripting no autorizado reflejado en el constructor de la clase `Downloader`. Mediante el script `/vendor/phpoffice/phpspreadsheet/samples/download.php`, un atacante puede realizar un ataque de cross site scripting. Las versiones 3.7.0, 2.3.5, 2.1.6 y 1.29.7 contienen un parche para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56366.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56366.json index 770cf1d12c0..19ae238473e 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56366.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56366.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 are vulnerable to unauthorized reflected cross-site scripting in the `Accounting.php` file. Using the `/vendor/phpoffice/phpspreadsheet/samples/Wizards/NumberFormat/Accounting.php` script, an attacker can perform a cross-site scripting attack. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue." + }, + { + "lang": "es", + "value": "PhpSpreadsheet es una librer\u00eda PHP para leer y escribir archivos de hojas de c\u00e1lculo. Las versiones anteriores a 3.7.0, 2.3.5, 2.1.6 y 1.29.7 son vulnerables a ataques de cross site scripting no autorizado reflejado en el archivo `Accounting.php`. Mediante el script `/vendor/phpoffice/phpspreadsheet/samples/Wizards/NumberFormat/Accounting.php`, un atacante puede realizar un ataque de cross site scripting. Las versiones 3.7.0, 2.3.5, 2.1.6 y 1.29.7 contienen un parche para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56376.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56376.json index 22be125ceba..ca1144dc9ee 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56376.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56376.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-09T23:15:07.827", "lastModified": "2025-01-09T23:15:07.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the built-in messenger of REDCap 14.9.6 allows authenticated users to inject malicious scripts into the message field. When a user click on the received message, the crafted payload is executed, potentially enabling the execution of arbitrary web scripts." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross Site Scripting (XSS) almacenado en el mensajero integrado de REDCap 14.9.6 permite a los usuarios autenticados inyectar secuencias de comandos maliciosas en el campo de mensajes. Cuando un usuario hace clic en el mensaje recibido, se ejecuta el payload manipulado, lo que potencialmente permite la ejecuci\u00f3n de web scripts arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56377.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56377.json index 785f0cd1c26..b0749b071de 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56377.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56377.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-09T23:15:08.173", "lastModified": "2025-01-09T23:15:08.173", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in survey titles of REDCap 14.9.6 allows authenticated users to inject malicious scripts into the Survey Title field or Survey Instructions. When a user receives a survey and clicks anywhere on the survey page to enter data, the crafted payload (which has been injected into all survey fields) is executed, potentially enabling the execution of arbitrary web scripts." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross Site Scripting (XSS) almacenado en los t\u00edtulos de las encuestas de REDCap 14.9.6 permite a los usuarios autenticados inyectar secuencias de comandos maliciosas en el campo T\u00edtulo de la encuesta o en las Instrucciones de la encuesta. Cuando un usuario recibe una encuesta y hace clic en cualquier parte de la p\u00e1gina de la encuesta para ingresar datos, se ejecuta el payload manipulado (que se ha inyectado en todos los campos de la encuesta), lo que potencialmente permite la ejecuci\u00f3n de web scripts arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json index 55983739939..007553c72c1 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 have no sanitization in the `/vendor/phpoffice/phpspreadsheet/samples/Engineering/Convert-Online.php` file, which leads to the possibility of a cross-site scripting attack. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue." + }, + { + "lang": "es", + "value": "PhpSpreadsheet es una librer\u00eda PHP para leer y escribir archivos de hojas de c\u00e1lculo. Las versiones anteriores a 3.7.0, 2.3.5, 2.1.6 y 1.29.7 no tienen ning\u00fan tipo de desinfecci\u00f3n en el archivo `/vendor/phpoffice/phpspreadsheet/samples/Engineering/Convert-Online.php`, lo que genera la posibilidad de un ataque de cross site scripting. Las versiones 3.7.0, 2.3.5, 2.1.6 y 1.29.7 contienen un parche para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56409.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56409.json index 37226079026..db79233aa30 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56409.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56409.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 are vulnerable to unauthorized reflected cross-site scripting in the `Currency.php` file. Using the `/vendor/phpoffice/phpspreadsheet/samples/Wizards/NumberFormat/Currency.php` script, an attacker can perform a cross-site scripting attack. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue." + }, + { + "lang": "es", + "value": "PhpSpreadsheet es una librer\u00eda PHP para leer y escribir archivos de hojas de c\u00e1lculo. Las versiones anteriores a 3.7.0, 2.3.5, 2.1.6 y 1.29.7 son vulnerables a ataques de cross site scripting no autorizado reflejado en el archivo `Currency.php`. Mediante el script `/vendor/phpoffice/phpspreadsheet/samples/Wizards/NumberFormat/Currency.php`, un atacante puede realizar un ataque de cross site scripting. Las versiones 3.7.0, 2.3.5, 2.1.6 y 1.29.7 contienen un parche para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56410.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56410.json index 6d03adb600f..5d89488af20 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56410.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56410.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T18:15:15.987", "lastModified": "2025-01-03T21:15:13.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 have a cross-site scripting (XSS) vulnerability in custom properties. The HTML page is generated without clearing custom properties. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue." + }, + { + "lang": "es", + "value": "PhpSpreadsheet es una librer\u00eda PHP para leer y escribir archivos de hojas de c\u00e1lculo. Las versiones anteriores a 3.7.0, 2.3.5, 2.1.6 y 1.29.7 tienen una vulnerabilidad de cross site scripting (XSS) en las propiedades personalizadas. La p\u00e1gina HTML se genera sin borrar las propiedades personalizadas. Las versiones 3.7.0, 2.3.5, 2.1.6 y 1.29.7 contienen un parche para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56411.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56411.json index 034668749cf..80812fa84b1 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56411.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56411.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T18:15:16.203", "lastModified": "2025-01-03T18:15:16.203", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 have a cross-site scripting (XSS) vulnerability of the hyperlink base in the HTML page header. The HTML page is formed without sanitizing the hyperlink base. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue." + }, + { + "lang": "es", + "value": "PhpSpreadsheet es una librer\u00eda PHP para leer y escribir archivos de hojas de c\u00e1lculo. Las versiones anteriores a 3.7.0, 2.3.5, 2.1.6 y 1.29.7 tienen una vulnerabilidad de cross site scripting (XSS) en la base de hiperv\u00ednculos en el encabezado de la p\u00e1gina HTML. La p\u00e1gina HTML se forma sin desinfectar la base de hiperv\u00ednculos. Las versiones 3.7.0, 2.3.5, 2.1.6 y 1.29.7 contienen un parche para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56412.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56412.json index 4f01562dced..530b4a189b3 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56412.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56412.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T18:15:16.380", "lastModified": "2025-01-03T18:15:16.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 are vulnerable to bypass of the cross-site scripting sanitizer using the javascript protocol and special characters. An attacker can use special characters, so that the library processes the javascript protocol with special characters and generates an HTML link. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue." + }, + { + "lang": "es", + "value": "PhpSpreadsheet es una librer\u00eda PHP para leer y escribir archivos de hojas de c\u00e1lculo. Las versiones anteriores a 3.7.0, 2.3.5, 2.1.6 y 1.29.7 son vulnerables a la omisi\u00f3n del desinfectado de cross site scripting mediante el protocolo JavaScript y caracteres especiales. Un atacante puede utilizar caracteres especiales, de modo que la librer\u00eda procese el protocolo JavaScript con caracteres especiales y genere un enlace HTML. Las versiones 3.7.0, 2.3.5, 2.1.6 y 1.29.7 contienen un parche para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56434.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56434.json index 0f9a50644d4..099c7ee5927 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56434.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56434.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T02:15:25.330", "lastModified": "2025-01-08T02:15:25.330", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "UAF vulnerability in the device node access module\nImpact: Successful exploitation of this vulnerability may cause service exceptions of the device." + }, + { + "lang": "es", + "value": "Vulnerabilidad UAF en el m\u00f3dulo de acceso al nodo del dispositivo Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar excepciones de servicio del dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56435.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56435.json index d2f27bddea9..16d9302e2e2 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56435.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56435.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T02:15:25.487", "lastModified": "2025-01-08T02:15:25.487", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de pila de pantalla entre procesos en el m\u00f3dulo UIExtension Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56436.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56436.json index b280b5cbab1..0b6f2542ac7 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56436.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56436.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T02:15:25.603", "lastModified": "2025-01-08T02:15:25.603", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de pila de pantalla entre procesos en el m\u00f3dulo UIExtension Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56437.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56437.json index 35ccb8c12f9..b39461347d2 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56437.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56437.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:08.840", "lastModified": "2025-01-08T03:15:08.840", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of input parameters not being verified in the widget framework module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de par\u00e1metros de entrada que no se verifican en el m\u00f3dulo del framework del widget Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56438.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56438.json index fa616d0dfb5..a3995459a43 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56438.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56438.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:08.970", "lastModified": "2025-01-08T03:15:08.970", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of improper memory address protection in the HUKS module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de protecci\u00f3n de direcci\u00f3n de memoria incorrecta en el m\u00f3dulo HUKS Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56439.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56439.json index b665afe54c5..8a43a29cf19 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56439.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56439.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:09.113", "lastModified": "2025-01-08T03:15:09.113", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Access control vulnerability in the identity authentication module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control de acceso en el m\u00f3dulo de autenticaci\u00f3n de identidad Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56440.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56440.json index 9350cf35691..1de848f5bb6 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56440.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56440.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:09.240", "lastModified": "2025-01-08T03:15:09.240", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Permission control vulnerability in the Connectivity module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control de permisos en el m\u00f3dulo Conectividad Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56441.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56441.json index c145af50cb9..e8d687f5854 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56441.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56441.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:09.373", "lastModified": "2025-01-08T03:15:09.373", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition vulnerability in the Bastet module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de condici\u00f3n de ejecuci\u00f3n en el m\u00f3dulo Bastet Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56442.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56442.json index fd558670f8e..3c61abf4eff 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56442.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56442.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:09.510", "lastModified": "2025-01-08T03:15:09.510", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of native APIs not being implemented in the NFC service module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." + }, + { + "lang": "es", + "value": "Vulnerabilidad de las API nativas que no se implementan en el m\u00f3dulo de servicio NFC Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56443.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56443.json index e18eb2fea5c..35c76db67ae 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56443.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56443.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:09.640", "lastModified": "2025-01-08T03:15:09.640", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de pila de pantalla entre procesos en el m\u00f3dulo UIExtension Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56444.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56444.json index 02669a71e2c..f591cd00c46 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56444.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56444.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:09.790", "lastModified": "2025-01-08T03:15:09.790", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de pila de pantalla entre procesos en el m\u00f3dulo UIExtension Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56445.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56445.json index ce9c9e3626e..d5d8be05c9f 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56445.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56445.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:09.920", "lastModified": "2025-01-08T03:15:09.920", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Instruction authentication bypass vulnerability in the Findnetwork module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n de instrucciones en el m\u00f3dulo Findnetwork Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56446.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56446.json index e0be9949313..6cdf50f9ee8 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56446.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56446.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:10.063", "lastModified": "2025-01-08T03:15:10.063", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of variables not being initialized in the notification module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de variables que no se inicializan en el m\u00f3dulo de notificaci\u00f3n Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56447.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56447.json index e2bb036057a..d0fdf7f3d23 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56447.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56447.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:10.190", "lastModified": "2025-01-08T03:15:10.190", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of improper permission control in the window management module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control de permisos indebido en el m\u00f3dulo de gesti\u00f3n de ventanas Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56448.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56448.json index b2559b7ade4..a101a900456 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56448.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56448.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T04:15:07.257", "lastModified": "2025-01-08T04:15:07.257", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of improper access control in the home screen widget module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control de acceso indebido en el m\u00f3dulo del widget de la pantalla de inicio Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56449.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56449.json index 5607801ea4e..7cbbd7d9759 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56449.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56449.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T04:15:07.390", "lastModified": "2025-01-08T04:15:07.390", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in the Account module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de escalada de privilegios en el m\u00f3dulo Cuenta Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56450.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56450.json index e4d4ede9ff7..3982c77a6f9 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56450.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56450.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T04:15:07.520", "lastModified": "2025-01-08T04:15:07.520", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow vulnerability in the component driver module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el m\u00f3dulo del controlador del componente Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56451.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56451.json index b026693b7aa..691b9e373b0 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56451.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56451.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T04:15:07.653", "lastModified": "2025-01-08T04:15:07.653", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow vulnerability during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de desbordamiento de enteros durante la carga del modelo glTF en 3D engine module Impact: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56452.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56452.json index e4e7f35480d..c7725504fb2 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56452.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56452.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T04:15:07.780", "lastModified": "2025-01-08T04:15:07.780", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de los par\u00e1metros de entrada que no se verifican durante la carga del modelo glTF en 3D engine module Impact: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56453.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56453.json index 707124ccd12..3ec76b98465 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56453.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56453.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T04:15:07.907", "lastModified": "2025-01-08T04:15:07.907", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de los par\u00e1metros de entrada que no se verifican durante la carga del modelo glTF en 3D engine module Impact: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56454.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56454.json index fb2aa322780..319196a78be 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56454.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56454.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T04:15:08.040", "lastModified": "2025-01-08T04:15:08.040", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de los par\u00e1metros de entrada que no se verifican durante la carga del modelo glTF en 3D engine module Impact: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56455.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56455.json index ff15447cc52..bb4aa81a00c 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56455.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56455.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T04:15:08.160", "lastModified": "2025-01-08T04:15:08.160", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de los par\u00e1metros de entrada que no se verifican durante la carga del modelo glTF en 3D engine module Impact: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56456.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56456.json index 812fa645552..4fc100f97e8 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56456.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56456.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T04:15:08.280", "lastModified": "2025-01-08T04:15:08.280", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de los par\u00e1metros de entrada que no se verifican durante la carga del modelo glTF en 3D engine module Impact: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56513.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56513.json index 80e838e22e7..5eddff0cc3a 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56513.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56513.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Karmada is a Kubernetes management system that allows users to run cloud-native applications across multiple Kubernetes clusters and clouds. Prior to version 1.12.0, the PULL mode clusters registered with the `karmadactl register` command have excessive privileges to access control plane resources. By abusing these permissions, an attacker able to authenticate as the karmada-agent to a karmada cluster would be able to obtain administrative privileges over the entire federation system including all registered member clusters. Since Karmada v1.12.0, command `karmadactl register` restricts the access permissions of pull mode member clusters to control plane resources. This way, an attacker able to authenticate as the karmada-agent cannot control other member clusters in Karmada. As a workaround, one may restrict the access permissions of pull mode member clusters to control plane resources according to Karmada Component Permissions Docs." + }, + { + "lang": "es", + "value": "Karmada es un sistema de administraci\u00f3n de Kubernetes que permite a los usuarios ejecutar aplicaciones nativas de la nube en varios cl\u00fasteres y nubes de Kubernetes. Antes de la versi\u00f3n 1.12.0, los cl\u00fasteres en modo PULL registrados con el comando `karmadactl register` tienen privilegios excesivos para acceder a los recursos del plano de control. Al abusar de estos permisos, un atacante capaz de autenticarse como agente de karmada en un cl\u00faster de karmada podr\u00eda obtener privilegios administrativos sobre todo el sistema de federaci\u00f3n, incluidos todos los cl\u00fasteres miembros registrados. Desde Karmada v1.12.0, el comando `karmadactl register` restringe los permisos de acceso de los cl\u00fasteres miembros del modo pull a los recursos del plano de control. De esta manera, un atacante capaz de autenticarse como agente de karmada no puede controlar otros cl\u00fasteres miembros en Karmada. Como workaround, se pueden restringir los permisos de acceso de los cl\u00fasteres miembros del modo pull a los recursos del plano de control de acuerdo con los documentos de permisos de componentes de Karmada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56514.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56514.json index 415246deae0..bf6cf789983 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56514.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56514.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Karmada is a Kubernetes management system that allows users to run cloud-native applications across multiple Kubernetes clusters and clouds. Prior to version 1.12.0, both in karmadactl and karmada-operator, it is possible to supply a filesystem path, or an HTTP(s) URL to retrieve the custom resource definitions(CRDs) needed by Karmada. The CRDs are downloaded as a gzipped tarfile and are vulnerable to a TarSlip vulnerability. An attacker able to supply a malicious CRD file into a Karmada initialization could write arbitrary files in arbitrary paths of the filesystem. From Karmada version 1.12.0, when processing custom CRDs files, CRDs archive verification is utilized to enhance file system robustness. A workaround is available. Someone who needs to set flag `--crd` to customize the CRD files required for Karmada initialization when using `karmadactl init` to set up Karmada can manually inspect the CRD files to check whether they contain sequences such as `../` that would alter file paths, to determine if they potentially include malicious files. When using karmada-operator to set up Karmada, one must upgrade one's karmada-operator to one of the fixed versions." + }, + { + "lang": "es", + "value": "Karmada es un sistema de administraci\u00f3n de Kubernetes que permite a los usuarios ejecutar aplicaciones nativas de la nube en m\u00faltiples cl\u00fasteres y nubes de Kubernetes. Antes de la versi\u00f3n 1.12.0, tanto en karmadactl como en karmada-operator, es posible proporcionar una ruta del sistema de archivos o una URL HTTP(s) para recuperar las definiciones de recursos personalizadas (CRD) que necesita Karmada. Las CRD se descargan como un archivo tar comprimido y son vulnerables a una vulnerabilidad TarSlip. Un atacante capaz de proporcionar un archivo CRD malicioso en una inicializaci\u00f3n de Karmada podr\u00eda escribir archivos arbitrarios en rutas arbitrarias del sistema de archivos. A partir de la versi\u00f3n 1.12.0 de Karmada, al procesar archivos CRD personalizados, se utiliza la verificaci\u00f3n del archivo CRD para mejorar la solidez del sistema de archivos. Hay una workaround disponible. Alguien que necesite configurar el indicador `--crd` para personalizar los archivos CRD necesarios para la inicializaci\u00f3n de Karmada al usar `karmadactl init` para configurar Karmada puede inspeccionar manualmente los archivos CRD para verificar si contienen secuencias como `../` que alterar\u00edan las rutas de los archivos, para determinar si incluyen potencialmente archivos maliciosos. Al usar karmada-operator para configurar Karmada, uno debe actualizar su karmada-operator a una de las versiones fijas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56538.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56538.json index fc42f2c3697..133d8100040 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56538.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56538.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:33.400", "lastModified": "2024-12-27T14:15:33.400", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56554.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56554.json index 9ff47002203..61e01b31e83 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56554.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56554.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:14.183", "lastModified": "2024-12-27T15:15:14.183", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56556.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56556.json index 91c9002e564..f18e4e03d1a 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56556.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56556.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:14.410", "lastModified": "2024-12-27T15:15:14.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56561.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56561.json index d937c0388b7..57c7a4e0139 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56561.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56561.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:14.983", "lastModified": "2024-12-27T15:15:14.983", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56581.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56581.json index f30e4d54e0b..99ce5ade102 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56581.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56581.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:17.207", "lastModified": "2024-12-27T15:15:17.207", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56582.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56582.json index 7c3eeda69ba..72d157ec2af 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56582.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56582.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:17.333", "lastModified": "2025-01-09T16:16:21.920", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56600.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56600.json index 9be405870c6..ed321aeeffb 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56600.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56600.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:19.410", "lastModified": "2024-12-27T15:15:19.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56601.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56601.json index 0e55d3ac121..3aa2af67f16 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56601.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56601.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:19.527", "lastModified": "2024-12-27T15:15:19.527", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56602.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56602.json index 1ab7684d62e..6d0a8398d09 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56602.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56602.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:19.650", "lastModified": "2024-12-27T15:15:19.650", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56603.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56603.json index b31e86407a5..8ee9eb1fa88 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56603.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56603.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:19.770", "lastModified": "2024-12-27T15:15:19.770", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56604.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56604.json index dea26b7e375..6e70f676e89 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56604.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56604.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:19.887", "lastModified": "2024-12-27T15:15:19.887", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56605.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56605.json index b6315e62645..71aa408c915 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56605.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56605.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:19.980", "lastModified": "2024-12-27T15:15:19.980", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56640.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56640.json index 9f9a0935bca..5169482c232 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56640.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56640.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:23.730", "lastModified": "2024-12-27T15:15:23.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56802.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56802.json index 76f7122baa3..c8c6793a2a1 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56802.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56802.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tapir is a private Terraform registry. Tapir versions 0.9.0 and 0.9.1 are facing a critical issue with scope-able Deploykeys where attackers can guess the key to get write access to the registry. User must upgrade to 0.9.2." + }, + { + "lang": "es", + "value": "Tapir es un registro privado de Terraform. Las versiones 0.9.0 y 0.9.1 de Tapir enfrentan un problema cr\u00edtico con las claves de implementaci\u00f3n con alcance limitado, donde los atacantes pueden adivinar la clave para obtener acceso de escritura al registro. El usuario debe actualizar a la versi\u00f3n 0.9.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56803.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56803.json index cbd8e181db5..1bcb7333e01 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56803.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56803.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Ghostty is a cross-platform terminal emulator. Ghostty, as allowed by default in 1.0.0, allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. This attack requires an attacker to send malicious escape sequences followed by convincing the user to physically press the \"enter\" key. Fixed in Ghostty v1.0.1." + }, + { + "lang": "es", + "value": "Ghostty es un emulador de terminal multiplataforma. Ghostty, como est\u00e1 permitido por defecto en la versi\u00f3n 1.0.0, permite a los atacantes modificar el t\u00edtulo de la ventana mediante una determinada secuencia de escape de caracteres y luego insertarla de nuevo en la l\u00ednea de comandos de la terminal del usuario, por ejemplo, cuando el usuario visualiza un archivo que contiene la secuencia maliciosa, lo que podr\u00eda permitir al atacante ejecutar comandos arbitrarios. Este ataque requiere que un atacante env\u00ede secuencias de escape maliciosas seguidas de convencer al usuario de que presione f\u00edsicamente la tecla \"Enter\". Corregido en Ghostty v1.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56826.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56826.json index 5f95d82a1f8..46d87f942b3 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56826.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56826.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-09T04:15:12.660", "lastModified": "2025-01-09T04:15:12.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility. This can lead to an application crash or other undefined behavior." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en OpenJPEG project. Se puede generar una condici\u00f3n de desbordamiento del b\u00fafer de pila cuando se especifican ciertas opciones al usar la utilidad opj_decompress. Esto puede provocar un bloqueo de la aplicaci\u00f3n u otro comportamiento indefinido." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56827.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56827.json index 63c90603325..ebbece1f671 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56827.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56827.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-09T04:15:12.840", "lastModified": "2025-01-09T04:15:12.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility. This can lead to an application crash or other undefined behavior." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en OpenJPEG project. Se puede generar una condici\u00f3n de desbordamiento del b\u00fafer de pila cuando se especifican ciertas opciones al usar la utilidad opj_decompress. Esto puede provocar un bloqueo de la aplicaci\u00f3n u otro comportamiento indefinido." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56828.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56828.json index d4ac368de28..63f324495b2 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56828.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56828.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T18:15:23.467", "lastModified": "2025-01-06T18:15:23.467", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "File Upload vulnerability in ChestnutCMS through 1.5.0. Based on the code analysis, it was determined that the /api/member/avatar API endpoint receives a base64 string as input. This string is then passed to the memberService.uploadAvatarByBase64 method for processing. Within the service, the base64-encoded image is parsed. For example, given a string like: data:image/html;base64,PGh0bWw+PGltZyBzcmM9eCBvbmVycm9yPWFsZXJ0KDEpPjwvaHRtbD4= the content after the comma is extracted and decoded using Base64.getDecoder().decode(). The substring from the 11th character up to the first occurrence of a semicolon (;) is assigned to the suffix variable (representing the file extension). The decoded content is then written to a file. However, the file extension is not validated, and since this functionality is exposed to the frontend, it poses significant security risks." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga de archivos en ChestnutCMS hasta la versi\u00f3n 1.5.0. Seg\u00fan el an\u00e1lisis del c\u00f3digo, se determin\u00f3 que el endpoint de la API /api/member/avatar recibe una cadena base64 como entrada. Esta cadena se pasa luego al m\u00e9todo memberService.uploadAvatarByBase64 para su procesamiento. Dentro del servicio, se analiza la imagen codificada en base64. Por ejemplo, dada una cadena como: data:image/html;base64,PGh0bWw+PGltZyBzcmM9eCBvbmVycm9yPWFsZXJ0KDEpPjwvaHRtbD4= el contenido despu\u00e9s de la coma se extrae y se decodifica utilizando Base64.getDecoder().decode(). La subcadena desde el und\u00e9cimo car\u00e1cter hasta la primera aparici\u00f3n de un punto y coma (;) se asigna a la variable de sufijo (que representa la extensi\u00f3n del archivo). Luego, el contenido decodificado se escribe en un archivo. Sin embargo, la extensi\u00f3n del archivo no est\u00e1 validada y, dado que esta funcionalidad est\u00e1 expuesta al frontend, plantea riesgos de seguridad importantes." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57686.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57686.json index 512837e6f14..b14e544e313 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57686.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57686.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T14:15:29.140", "lastModified": "2025-01-10T15:15:16.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57822.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57822.json index 076c5c60cfe..0cf615058a2 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57822.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57822.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T13:15:09.917", "lastModified": "2025-01-10T15:15:16.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57823.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57823.json index 9b9e6833baf..da2a79a6fd8 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57823.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57823.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T13:15:10.113", "lastModified": "2025-01-10T14:15:29.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5769.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5769.json index 0b04be32de5..8184027d35e 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5769.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5769.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:16.127", "lastModified": "2025-01-09T11:15:16.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MIMO Woocommerce Order Tracking plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 1.0.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to add, update, and delete shipper tracking settings." + }, + { + "lang": "es", + "value": "El complemento MIMO Woocommerce Order Tracking para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de verificaci\u00f3n de capacidad en varias funciones en todas las versiones hasta la 1.0.2 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen, actualicen y eliminen configuraciones de seguimiento de transportistas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5913.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5913.json index 42c4a238440..990eeae563e 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5913.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5913.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-10T19:15:11.837", "lastModified": "2024-11-21T09:48:34.290", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5917.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5917.json index 6296e2f671b..ce185a88293 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5917.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5917.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:08.607", "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5919.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5919.json index d58a685edda..3136ff2adcd 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5919.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5919.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:09.027", "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5920.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5920.json index e42066e845a..fb43c33eaf1 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5920.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5920.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:09.223", "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6155.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6155.json index 450803cb860..1d3525549ad 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6155.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6155.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-09T11:15:16.330", "lastModified": "2025-01-09T11:15:16.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Greenshift \u2013 animation and page builder blocks plugin for WordPress is vulnerable to Authenticated (Subscriber+) Server-Side Request Forgery and Stored Cross Site Scripting in all versions up to, and including, 9.0.0 due to a missing capability check in the greenshift_download_file_localy function, along with no SSRF protection and sanitization on uploaded SVG files. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application that can also be leveraged to download malicious SVG files containing Cross-Site Scripting payloads to the server. On Cloud-based servers, attackers could retrieve the instance metadata. The issue was partially patched in version 8.9.9 and fully patched in version 9.0.1." + }, + { + "lang": "es", + "value": "El complemento Greenshift \u2013 animation y page builder blocks para WordPress es vulnerable a Server-Side Request Forgery (SSRF) autenticada (Subscriber+) y a Cross Site Scripting almacenado en todas las versiones hasta la 9.0.0 incluida debido a una comprobaci\u00f3n de capacidad faltante en la funci\u00f3n greenshift_download_file_localy, junto con la falta de protecci\u00f3n SSRF y desinfecci\u00f3n de los archivos SVG cargados. Esto permite que los atacantes autenticados, con acceso de nivel de suscriptor y superior, realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y que tambi\u00e9n se pueden aprovechar para descargar archivos SVG maliciosos que contienen payloads de Cross Site Scripting al servidor. En servidores basados en la nube, los atacantes podr\u00edan recuperar los metadatos de la instancia. El problema se solucion\u00f3 parcialmente en la versi\u00f3n 8.9.9 y por completo en la versi\u00f3n 9.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6324.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6324.json index 2fb46068692..ab052321a38 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6324.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6324.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-01-09T06:15:15.390", "lastModified": "2025-01-09T06:15:15.390", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 15.7 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. It was possible to trigger a DoS by creating cyclic references between epics." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afectaba a todas las versiones desde la 15.7 hasta la 17.5.5, desde la 17.6 hasta la 17.6.3 y desde la 17.7 hasta la 17.7.1. Era posible desencadenar un ataque de denegaci\u00f3n de servicio mediante la creaci\u00f3n de referencias c\u00edclicas entre epopeyas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6350.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6350.json index f34f7c44dba..f2935c7b344 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6350.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6350.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@silabs.com", "published": "2025-01-08T18:15:19.880", "lastModified": "2025-01-08T18:15:19.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malformed 802.15.4 packet causes a buffer overflow to occur leading to an assert and a denial of service. A watchdog reset clears the error condition automatically." + }, + { + "lang": "es", + "value": "Un paquete 802.15.4 mal formado provoca un desbordamiento del b\u00fafer que da lugar a una confirmaci\u00f3n y una denegaci\u00f3n de servicio. Un restablecimiento del sistema de vigilancia elimina la condici\u00f3n de error autom\u00e1ticamente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6495.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6495.json index 91273fb5da0..b2773cad902 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6495.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6495.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-07-12T13:15:21.770", "lastModified": "2024-11-21T09:49:45.150", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6815.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6815.json index 11229a07885..ac43d4eb2b4 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6815.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6815.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6817.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6817.json index f5f5a588690..8b8e2da403e 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6817.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6817.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7012.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7012.json index 82d90f10873..9acab772e72 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7012.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7012.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7125.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7125.json index c0e93bd6f40..10573543656 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7125.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7125.json @@ -3,7 +3,7 @@ "sourceIdentifier": "hirt@hitachi.co.jp", "published": "2024-08-27T05:15:13.307", "lastModified": "2024-08-27T13:01:37.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7143.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7143.json index 56f71d54848..bb31f4f090c 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7143.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7143.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7234.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7234.json index a3f1575d8b0..91747604ae8 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7234.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7234.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7237.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7237.json index 2232398f34f..4a39df3954e 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7237.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7237.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7260.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7260.json index 1f55d24e8ec..a66f3b7e9ec 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7260.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7260.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7318.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7318.json index e6a84997c80..7c5d12b4fec 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7318.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7318.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7319.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7319.json index ae6af7a5c37..34e9f37bb7e 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7319.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7319.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7341.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7341.json index 44d5ec4c65c..8ff1a524ca2 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7341.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7341.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7565.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7565.json index 715a1dfcb01..92321b7d598 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7565.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7565.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7571.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7571.json index d4811173272..daa6bc679c7 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7571.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7571.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-11-12T17:15:10.973", "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7696.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7696.json index cd30785fc58..b69b92efd1f 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7696.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7696.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@axis.com", "published": "2025-01-07T06:15:17.827", "lastModified": "2025-01-07T06:15:17.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Seth Fogie, member of AXIS Camera Station Pro Bug Bounty Program, has found that it is possible for an authenticated malicious client to tamper with audit log creation in AXIS Camera Station, or perform a Denial-of-Service attack on the AXIS Camera Station server using maliciously crafted audit log entries. \nAxis has released a patched version for the highlighted flaw. Please \nrefer to the Axis security advisory for more information and solution." + }, + { + "lang": "es", + "value": "Seth Fogie, miembro del programa Bug Bounty de AXIS Camera Station Pro, ha descubierto que es posible que un cliente malintencionado autenticado altere la creaci\u00f3n de registros de auditor\u00eda en AXIS Camera Station o realice un ataque de denegaci\u00f3n de servicio en el servidor de AXIS Camera Station utilizando entradas de registros de auditor\u00eda creadas con fines malintencionados. Axis ha publicado una versi\u00f3n parcheada para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener m\u00e1s informaci\u00f3n y soluciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7700.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7700.json index 9e78b1a97cc..80043aee572 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7700.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7700.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8002.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8002.json index a08332542ec..78198828423 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8002.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8002.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T07:15:27.773", "lastModified": "2025-01-08T07:15:27.773", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in VIWIS LMS 9.11 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component File Upload. The manipulation of the argument filename leads to cross site scripting. The attack can be launched remotely. Upgrading to version 9.12 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en VIWIS LMS 9.11 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente File Upload. La manipulaci\u00f3n del argumento filename provoca ataques de Cross-Site Scripting. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 9.12 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8285.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8285.json index ad1b96cf416..e64ebd02f5b 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8285.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8285.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8355.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8355.json index 05ae137eb6b..9208dd4f16c 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8355.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8355.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8361.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8361.json index 7d4bfd84b7b..ded9f9cdf3e 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8361.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8361.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@silabs.com", "published": "2025-01-07T17:15:31.420", "lastModified": "2025-01-07T17:15:31.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In SiWx91x devices, the SHA2/224 algorithm returns a hash of 256 bits instead of 224 bits. This incorrect hash length triggers a software assertion, which subsequently causes a Denial of Service (DoS).\nIf a watchdog is implemented, device will restart after watch dog expires. If watchdog is not implemented, device can be recovered only after a hard reset" + }, + { + "lang": "es", + "value": "En los dispositivos SiWx91x, el algoritmo SHA2/224 devuelve un hash de 256 bits en lugar de 224 bits. Esta longitud de hash incorrecta activa una aserci\u00f3n de software, que posteriormente provoca una denegaci\u00f3n de servicio (DoS). Si se implementa un watchdog, el dispositivo se reiniciar\u00e1 despu\u00e9s de que expire el watchdog. Si no se implementa un watchdog, el dispositivo solo se puede recuperar despu\u00e9s de un reinicio completo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8443.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8443.json index 7ff2d980d1b..d9e5e012bca 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8443.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8443.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8474.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8474.json index 5cdd7d860bd..854915768cc 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8474.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8474.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@openvpn.net", "published": "2025-01-06T15:15:14.983", "lastModified": "2025-01-06T17:15:44.747", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenVPN Connect before version 3.5.0 can contain the configuration profile's clear-text private key which is logged in the application log, which an unauthorized actor can use to decrypt the VPN traffic" + }, + { + "lang": "es", + "value": "OpenVPN Connect anterior a la versi\u00f3n 3.5.0 puede contener la clave privada en texto plano del perfil de configuraci\u00f3n que se registra en el registro de la aplicaci\u00f3n, que un actor no autorizado puede usar para descifrar el tr\u00e1fico VPN." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8482.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8482.json index ca1583686c0..79d7212c434 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8482.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8482.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T12:15:03.043", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8495.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8495.json index c0e62b48841..319cffe2191 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8495.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8495.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-11-12T16:15:26.560", "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8539.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8539.json index 84827eaa3da..f9d1431b0a3 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8539.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8539.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-11-12T17:15:11.357", "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8806.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8806.json index fd2d2d5e09c..a4212c1b31b 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8806.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8806.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8807.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8807.json index c96a49fc33c..2899dd5e529 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8807.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8807.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8808.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8808.json index 4defe573577..45ccda1f562 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8808.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8808.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8855.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8855.json index f09023689d4..1adb28e38ee 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8855.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8855.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-07T06:15:17.977", "lastModified": "2025-01-07T16:15:37.873", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8857.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8857.json index 0b32ee954e9..ea4262caf0d 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8857.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8857.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-07T06:15:18.100", "lastModified": "2025-01-07T16:15:38.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8883.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8883.json index b7b53650695..6be714ee453 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8883.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8883.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9112.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9112.json index c3eebbaf2b0..9d6f097465e 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9112.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9112.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9113.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9113.json index baf57f36374..3678ebfb644 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9113.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9113.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9208.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9208.json index c2404d3ab42..39964c52888 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9208.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9208.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:20.790", "lastModified": "2025-01-07T05:15:20.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Enable Accessibility plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.4.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Enable Accessibility para WordPress es vulnerable a ataques Cross-Site Scripting reflejado debido al uso de add_query_arg y remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 1.4.1 incluida. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9354.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9354.json index 5a4dd241571..3b22374d37b 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9354.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9354.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T07:15:28.140", "lastModified": "2025-01-07T07:15:28.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Estatik Mortgage Calculator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'color' parameter in all versions up to, and including, 2.0.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Estatik Mortgage Calculator para WordPress es vulnerable a cross site scripting reflejado a trav\u00e9s del par\u00e1metro \"color\" en todas las versiones hasta la 2.0.11 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9420.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9420.json index a61d56ab6a6..0a7d54f53be 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9420.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9420.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-11-12T16:15:26.760", "lastModified": "2024-11-27T21:15:08.357", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9502.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9502.json index 95c4cb85c38..4a3234192ab 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9502.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9502.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T07:15:28.360", "lastModified": "2025-01-07T07:15:28.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Master Addons \u2013 Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Tooltip module in all versions up to, and including, 2.0.6.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Master Addons \u2013 Elementor Addons con etiqueta blanca, widgets gratuitos, efectos flotantes, condiciones y animaciones para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del m\u00f3dulo Tooltip del complemento en todas las versiones hasta la 2.0.6.7 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9638.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9638.json index 66fa92bbdfc..e974402e69c 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9638.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9638.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-07T06:15:18.217", "lastModified": "2025-01-07T16:15:38.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9671.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9671.json index 325ab44dd94..9915641e115 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9671.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9671.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9673.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9673.json index fa65440aa52..c40ff741cd5 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9673.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9673.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T07:15:27.980", "lastModified": "2025-01-08T07:15:27.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Heading widget in all versions up to, and including, 2.4.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Piotnet Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del widget de encabezado del complemento en todas las versiones hasta la 2.4.31 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9697.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9697.json index 167d8043579..ee3eaa20fbf 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9697.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9697.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:18.330", "lastModified": "2025-01-07T06:15:18.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social Rocket \u2013 Social Sharing Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the tweet_settings_save() and tweet_settings_update() functions in all versions up to, and including, 1.3.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings." + }, + { + "lang": "es", + "value": "El complemento Social Rocket \u2013 Social Sharing Plugin para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de comprobaci\u00f3n de capacidad en las funciones tweet_settings_save() y tweet_settings_update() en todas las versiones hasta la 1.3.4 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen la configuraci\u00f3n del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9702.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9702.json index b167f453954..bbdf6cb0776 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9702.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9702.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T06:15:18.597", "lastModified": "2025-01-07T06:15:18.597", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social Rocket \u2013 Social Sharing Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'socialrocket-floating' shortcode in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Social Rocket \u2013 Social Sharing Plugin para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'socialrocket-floating' del complemento en todas las versiones hasta la 1.3.4 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9712.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9712.json index 93e17c3e43c..89344649675 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9712.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9712.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9713.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9713.json index 19163984d9b..f90316c677c 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9713.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9713.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9714.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9714.json index e267b698cb9..76ddc9a79e7 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9714.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9714.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9715.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9715.json index b0ee29c5800..369396a7aa5 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9715.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9715.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9716.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9716.json index a1950a9e208..76cfce86d06 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9716.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9716.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9718.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9718.json index 646985403c9..b30dc358ef7 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9718.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9718.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9719.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9719.json index 9b7de780bcb..f8d12c4d048 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9719.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9719.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9720.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9720.json index 83e89164cbd..6905b84ef61 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9720.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9720.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9721.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9721.json index db57e68ba1e..0e815a25311 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9721.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9721.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9722.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9722.json index 69b983e3b5c..8caf67b76b9 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9722.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9722.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9723.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9723.json index a988b87e9d7..7f21dfbb578 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9723.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9723.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9724.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9724.json index f726a9e1848..bdffc8f325f 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9724.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9724.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9725.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9725.json index b8a914c4cbf..f3520c2b9fb 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9725.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9725.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9727.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9727.json index 1c2fe97de1b..af7e7b79d56 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9727.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9727.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9728.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9728.json index 0b92ba35319..c2099fd7176 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9728.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9728.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9729.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9729.json index 36b797de03d..3c7d22d808b 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9729.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9729.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9842.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9842.json index 06bf70ba90a..b7a7781ce2d 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9842.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9842.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-11-12T17:15:11.580", "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9843.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9843.json index 8f843aa72f2..ecdb37f37a0 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9843.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9843.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-11-12T17:15:11.793", "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9844.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9844.json index 04c5dfb7187..a95560394f1 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9844.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9844.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-12-10T19:15:31.607", "lastModified": "2024-12-10T19:15:31.607", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9864.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9864.json index 5da0c70df87..947fa91535c 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9864.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9864.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-24T07:15:02.310", "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9865.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9865.json index 1fa835cd921..a5d95d69e59 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9865.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9865.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-24T07:15:02.987", "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9939.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9939.json index 31f45a3f2a0..1514b9ffe34 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9939.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9939.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T09:15:07.577", "lastModified": "2025-01-08T09:15:07.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.13 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read files outside of the originally intended directory." + }, + { + "lang": "es", + "value": "El complemento WordPress File Upload para WordPress es vulnerable a Path Traversal en todas las versiones hasta la 4.24.13 incluida a trav\u00e9s de wfu_file_downloader.php. Esto permite que atacantes no autenticados lean archivos fuera del directorio previsto originalmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0194.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0194.json index 70d3bd822ab..f16b99f68ac 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0194.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0194.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-01-08T20:15:29.193", "lastModified": "2025-01-09T07:15:27.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 17.4 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. Under certain conditions, access tokens may have been logged when API requests were made in a specific manner." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afectaba a todas las versiones a partir de la 17.4 anterior a la 17.5.5, a partir de la 17.6 anterior a la 17.6.3 y a partir de la 17.7 anterior a la 17.7.1. En determinadas circunstancias, es posible que se hayan registrado tokens de acceso cuando se realizaron solicitudes de API de una manera espec\u00edfica." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0195.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0195.json index 94077e1d84d..f668ef53043 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0195.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0195.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T18:15:17.317", "lastModified": "2025-01-03T18:15:17.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /user/del_product.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Point de Sales y Inventory Management System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /user/del_product.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0196.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0196.json index 8287b43b85d..8a23370f023 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0196.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0196.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T19:15:12.793", "lastModified": "2025-01-03T19:15:12.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Point of Sales and Inventory Management System 1.0. This affects an unknown part of the file /user/plist.php. The manipulation of the argument cat leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Point de Sales y Inventory Management System 1.0. Afecta a una parte desconocida del archivo /user/plist.php. La manipulaci\u00f3n del argumento cat provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0197.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0197.json index 92ba83590cf..bf2e76c18a1 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0197.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0197.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T20:15:28.873", "lastModified": "2025-01-03T20:15:28.873", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Point of Sales and Inventory Management System 1.0. This vulnerability affects unknown code of the file /user/search.php. The manipulation of the argument name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Point de Sales y Inventory Management System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /user/search.php. La manipulaci\u00f3n del nombre del argumento conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0198.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0198.json index 7e0608303a5..8e6acb719eb 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0198.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0198.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T21:15:14.053", "lastModified": "2025-01-03T21:15:14.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in code-projects Point of Sales and Inventory Management System 1.0. This issue affects some unknown processing of the file /user/search_result.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Point de Sales y Inventory Management System 1.0. Este problema afecta a algunos procesos desconocidos del archivo /user/search_result.php. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0199.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0199.json index 18a94165972..a418c9fad88 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0199.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0199.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T23:15:08.707", "lastModified": "2025-01-03T23:15:08.707", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Point of Sales and Inventory Management System 1.0. Affected is an unknown function of the file /user/minus_cart.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Point de Sales y Inventory Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /user/minus_cart.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0200.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0200.json index 6aea8ab6fae..4d811f531a2 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0200.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0200.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-04T03:15:07.020", "lastModified": "2025-01-04T03:15:07.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Point of Sales and Inventory Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /user/search_num.php. The manipulation of the argument search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad en code-projects Point de Sales y Inventory Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /user/search_num.php. La manipulaci\u00f3n del argumento search conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0201.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0201.json index 8b26501c9a5..75a0e862146 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0201.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0201.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-04T04:15:05.620", "lastModified": "2025-01-04T04:15:05.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /user/update_account.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Point de Sales y Inventory Management System 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /user/update_account.php. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0202.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0202.json index db272bfd19e..7ca9554b751 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0202.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0202.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-04T05:15:07.660", "lastModified": "2025-01-04T05:15:07.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TCS BaNCS 10. It has been classified as problematic. This affects an unknown part of the file /REPORTS/REPORTS_SHOW_FILE.jsp. The manipulation of the argument FilePath leads to file inclusion." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en TCS BaNCS 10. Se ha clasificado como problem\u00e1tica. Afecta a una parte desconocida del archivo /REPORTS/REPORTS_SHOW_FILE.jsp. La manipulaci\u00f3n del argumento FilePath provoca la inclusi\u00f3n del archivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0203.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0203.json index 0bd050fc965..9bfad83b395 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0203.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0203.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-04T07:15:18.153", "lastModified": "2025-01-04T07:15:18.153", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Student Management System 1.0. It has been declared as critical. This vulnerability affects the function showSubject1 of the file /config/DbFunction.php. The manipulation of the argument sid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Student Management System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n showSubject1 del archivo /config/DbFunction.php. La manipulaci\u00f3n del argumento sid provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0204.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0204.json index e9416738ea9..de08a346f52 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0204.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0204.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-04T08:15:06.923", "lastModified": "2025-01-04T08:15:06.923", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Online Shoe Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file /details.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Online Shoe Store 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /details.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0205.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0205.json index 526ca2c6a75..e5fe4c132fd 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0205.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0205.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-04T09:15:06.280", "lastModified": "2025-01-04T09:15:06.280", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Online Shoe Store 1.0. Affected is an unknown function of the file /details2.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Shoe Store 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /details2.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0206.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0206.json index 4cb815bf25e..c032d39c646 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0206.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0206.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-04T12:15:24.830", "lastModified": "2025-01-04T12:15:24.830", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Online Shoe Store 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/index.php. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Shoe Store 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/index.php. La manipulaci\u00f3n conduce a controles de acceso inadecuados. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0214.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0214.json index c3a70aee0f3..300bbf1017b 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0214.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0214.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-04T17:15:07.507", "lastModified": "2025-01-04T17:15:07.507", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TMD Custom Header Menu 4.0.0.1 on OpenCart. It has been rated as problematic. This issue affects some unknown processing of the file /admin/index.php. The manipulation of the argument headermenu_id leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en TMD Custom Header Menu 4.0.0.1 en OpenCart. Se ha calificado como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo /admin/index.php. La manipulaci\u00f3n del argumento headermenu_id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. La explotaci\u00f3n se ha divulgado al p\u00fablico y puede utilizarse. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0218.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0218.json index 000f27c7448..60abcf84e62 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0218.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0218.json @@ -3,12 +3,16 @@ "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2025-01-07T20:15:30.710", "lastModified": "2025-01-07T20:15:30.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks." + }, + { + "lang": "es", + "value": "Cuando pgAgent ejecuta trabajos por lotes, se crea un script en un directorio temporal y luego se ejecuta. En versiones de pgAgent anteriores a la 4.2.3, se utiliza un generador de n\u00fameros aleatorios con una informaci\u00f3n insuficiente al generar el nombre del directorio, lo que genera la posibilidad de que un atacante local cree previamente el directorio y, de esta manera, impida que pgAgent ejecute trabajos, lo que interrumpir\u00eda las tareas programadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0219.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0219.json index 659052a0937..e0eaee2c7ee 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0219.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0219.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T06:15:05.183", "lastModified": "2025-01-05T06:15:05.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in Trimble SPS851 488.01. Affected by this issue is some unknown functionality of the component Receiver Status Identity Tab. The manipulation of the argument System Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como problem\u00e1tica, en Trimble SPS851 488.01. Este problema afecta a algunas funciones desconocidas del componente Pesta\u00f1a de identidad del estado del receptor. La manipulaci\u00f3n del argumento System Name conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0220.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0220.json index 2e4a2fa0660..64c9be303c6 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0220.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0220.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T13:15:05.850", "lastModified": "2025-01-05T13:15:05.850", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in Trimble SPS851 488.01. This affects an unknown part of the component Ethernet Configuration Menu. The manipulation of the argument Hostname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Trimble SPS851 488.01. Afecta a una parte desconocida del componente Men\u00fa de configuraci\u00f3n de Ethernet. La manipulaci\u00f3n del argumento Hostname provoca cross site scripting. Es posible iniciar el ataque de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle de esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0221.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0221.json index 260f117e4ee..d032de2a370 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0221.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0221.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T15:15:17.473", "lastModified": "2025-01-05T15:15:17.473", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in IOBit Protected Folder up to 1.3.0 and classified as problematic. This vulnerability affects the function 0x22200c in the library pffilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en IOBit Protected Folder hasta la versi\u00f3n 1.3.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n 0x22200c en la librer\u00eda pffilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. El ataque debe abordarse localmente. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0222.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0222.json index 3346e577469..6d6b9158c99 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0222.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0222.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T16:15:05.217", "lastModified": "2025-01-05T16:15:05.217", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in IObit Protected Folder up to 13.6.0.5 and classified as problematic. This issue affects the function 0x8001E000/0x8001E004 in the library IUProcessFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en IObit Protected Folder hasta la versi\u00f3n 13.6.0.5 y se ha clasificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n 0x8001E000/0x8001E004 en la librer\u00eda IUProcessFilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. El ataque debe realizarse de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0223.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0223.json index b217e66bfe8..f39249e18fe 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0223.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0223.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T16:15:05.497", "lastModified": "2025-01-05T16:15:05.497", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in IObit Protected Folder up to 13.6.0.5. It has been classified as problematic. Affected is the function 0x8001E000/0x8001E00C/0x8001E004/0x8001E010 in the library IURegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en IObit Protected Folder hasta la versi\u00f3n 13.6.0.5. Se ha clasificado como problem\u00e1tica. La funci\u00f3n afectada es 0x8001E000/0x8001E00C/0x8001E004/0x8001E010 en la librer\u00eda IURegistryFilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. Se requiere acceso local para abordar este ataque. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0224.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0224.json index 390c7cd416b..3186d0cac6d 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0224.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0224.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T17:15:06.027", "lastModified": "2025-01-05T17:15:06.027", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Provision-ISR SH-4050A-2, SH-4100A-2L(MM), SH-8100A-2L(MM), SH-16200A-2(1U), SH-16200A-5(1U) and NVR5-8200PX up to 20241220. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /server.js. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Provision-ISR SH-4050A-2, SH-4100A-2L(MM), SH-8100A-2L(MM), SH-16200A-2(1U), SH-16200A-5(1U) y NVR5-8200PX hasta 20241220. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /server.js. La manipulaci\u00f3n conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque se puede ejecutar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0225.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0225.json index 8ca9f9aff5f..e493418d0be 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0225.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0225.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T17:15:06.620", "lastModified": "2025-01-05T17:15:06.620", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Affected by this vulnerability is an unknown functionality of the file /setting/ClassFy/exampleDownload.html. The manipulation of the argument name leads to path traversal: '/../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /setting/ClassFy/exampleDownload.html. La manipulaci\u00f3n del argumento name provoca un path traversal: '/../filedir'. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0226.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0226.json index 2569268f80b..6013a27ad80 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0226.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0226.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T18:15:05.573", "lastModified": "2025-01-05T18:15:05.573", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Affected by this issue is the function download of the file /collect/PortV4/downLoad.html. The manipulation of the argument path leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Este problema afecta a la funci\u00f3n de descarga del archivo /collect/PortV4/downLoad.html. La manipulaci\u00f3n del argumento path conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0227.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0227.json index ac7d588abdb..c22f0e70e8c 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0227.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0227.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T18:15:06.570", "lastModified": "2025-01-05T18:15:06.570", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). This affects an unknown part of the file /Logs/Annals/downLoad.html. The manipulation of the argument path leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Afecta a una parte desconocida del archivo /Logs/Annals/downLoad.html. La manipulaci\u00f3n del argumento path conduce a la divulgaci\u00f3n de informaci\u00f3n. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0244.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0244.json index 4b4a78454b7..f5bb313766d 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0244.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0244.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:39.073", "lastModified": "2025-01-08T16:15:37.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0245.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0245.json index e64e1e7bd18..f25be78ea09 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0245.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0245.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:39.167", "lastModified": "2025-01-08T16:15:37.693", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0246.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0246.json index eb06ea51b68..1b3d2624528 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0246.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0246.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:39.260", "lastModified": "2025-01-08T16:15:37.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0282.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0282.json index 724d4621cd8..f0a33d19d88 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0282.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0282.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-08T23:15:09.763", "lastModified": "2025-01-09T22:15:29.870", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0283.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0283.json index 5b133951f5c..d65811f23cb 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0283.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0283.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-08T23:15:09.920", "lastModified": "2025-01-08T23:15:09.920", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a local authenticated attacker to escalate their privileges." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer basado en pila en Ivanti Connect Secure anterior a la versi\u00f3n 22.7R2.5, Ivanti Policy Secure anterior a la versi\u00f3n 22.7R1.2 e Ivanti Neurons para puertas de enlace ZTA anteriores a la versi\u00f3n 22.7R2.3 permite que un atacante autenticado local escale sus privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0291.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0291.json index 2edb1bf2977..354a9295d13 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0291.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0291.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Type Confusion in V8 in Google Chrome prior to 131.0.6778.264 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "La confusi\u00f3n de tipos en la versi\u00f3n 8 de Google Chrome anterior a la 131.0.6778.264 permit\u00eda a un atacante remoto ejecutar c\u00f3digo arbitrario dentro de un entorno protegido a trav\u00e9s de una p\u00e1gina HTML manipulada a medida. (Gravedad de seguridad de Chromium: alta)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0294.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0294.json index 671bb2d0fe0..2c4bd402042 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0294.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0294.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T14:15:24.277", "lastModified": "2025-01-07T15:15:12.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Home Clean Services Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /public_html/admin/process.php. The manipulation of the argument type/length/business leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Home Clean Services Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /public_html/admin/process.php. La manipulaci\u00f3n del argumento type/length/business conduce a una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0295.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0295.json index c385a50d4c4..5692818b452 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0295.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0295.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T15:15:12.320", "lastModified": "2025-01-07T16:15:39.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Online Book Shop 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /booklist.php?subcatid=1. The manipulation of the argument subcatnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Online Book Shop 1.0 y se ha clasificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo /booklist.php?subcatid=1. La manipulaci\u00f3n del argumento subcatnm provoca cross site scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0296.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0296.json index dc7361f447f..c27ee01b8d3 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0296.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0296.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T15:15:12.530", "lastModified": "2025-01-07T16:15:39.673", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Online Book Shop 1.0. It has been classified as critical. This affects an unknown part of the file /booklist.php. The manipulation of the argument subcatid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Online Book Shop 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /booklist.php. La manipulaci\u00f3n del argumento subcatid provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0297.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0297.json index bb00b838e9e..c281ea9ee25 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0297.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0297.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T16:15:39.887", "lastModified": "2025-01-07T16:15:39.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Online Book Shop 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /detail.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Online Book Shop 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /detail.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0298.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0298.json index 5a69cfe9557..df0338a87c8 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0298.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0298.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T16:15:40.167", "lastModified": "2025-01-07T17:15:31.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Online Book Shop 1.0. It has been rated as critical. This issue affects some unknown processing of the file /process_login.php. The manipulation of the argument usernm leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Online Book Shop 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /process_login.php. La manipulaci\u00f3n del argumento usernm conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0299.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0299.json index c4e3e8bb98f..637c5f22d31 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0299.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0299.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T17:15:31.903", "lastModified": "2025-01-07T19:15:34.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Online Book Shop 1.0. Affected is an unknown function of the file /search_result.php. The manipulation of the argument s leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Book Shop 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /search_result.php. La manipulaci\u00f3n del argumento s provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0300.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0300.json index f06b48641e1..9f023845707 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0300.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0300.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T17:15:32.090", "lastModified": "2025-01-07T17:15:32.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Online Book Shop 1.0. Affected by this vulnerability is an unknown functionality of the file /subcat.php. The manipulation of the argument cat leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Book Shop 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /subcat.php. La manipulaci\u00f3n del argumento cat provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0301.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0301.json index 5a0b86e79fb..34d96ffb936 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0301.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0301.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T18:15:21.460", "lastModified": "2025-01-07T18:15:21.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in code-projects Online Book Shop 1.0. Affected by this issue is some unknown functionality of the file /subcat.php. The manipulation of the argument catnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Online Book Shop 1.0. Este problema afecta a algunas funciones desconocidas del archivo /subcat.php. La manipulaci\u00f3n del argumento catnm provoca cross site scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0306.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0306.json index a679254a61f..bb2db6a0c85 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0306.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0306.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-09T04:15:13.000", "lastModified": "2025-01-09T04:15:13.000", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Ruby. The Ruby interpreter is vulnerable to the Marvin Attack. This attack allows the attacker to decrypt previously encrypted messages or forge signatures by exchanging a large number of messages with the vulnerable service." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad en Ruby. El int\u00e9rprete de Ruby es vulnerable al ataque Marvin. Este ataque permite al atacante descifrar mensajes previamente cifrados o falsificar firmas mediante el intercambio de una gran cantidad de mensajes con el servicio vulnerable." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0311.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0311.json index 21dc679da61..63556828106 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0311.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0311.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-10T07:15:08.507", "lastModified": "2025-01-10T07:15:08.507", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0328.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0328.json index abade9b7db5..1ca16d9a30a 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0328.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0328.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T05:15:07.997", "lastModified": "2025-01-09T17:15:17.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0331.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0331.json index 7c8f2e48044..6ce0645bafc 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0331.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0331.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T05:15:08.237", "lastModified": "2025-01-09T17:15:17.933", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0333.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0333.json index e46a7b5d29b..f0235f5304a 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0333.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0333.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T05:15:08.453", "lastModified": "2025-01-09T17:15:18.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0334.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0334.json index 98d1de34182..23652c4ee73 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0334.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0334.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T06:15:15.610", "lastModified": "2025-01-09T06:15:15.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this vulnerability is the function listData of the file /sys/user/listData. The manipulation of the argument order leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en leiyuxi cy-fast 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n listData del archivo /sys/user/listData. La manipulaci\u00f3n del orden de los argumentos provoca una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0335.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0335.json index 5dfa54be740..d6802147ef0 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0335.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0335.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T06:15:15.850", "lastModified": "2025-01-09T06:15:15.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Online Bike Rental System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the component Change Image Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other endpoints might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Online Bike Rental System 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del componente Change Image Handler. La manipulaci\u00f3n permite la carga sin restricciones. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros endpoints." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0336.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0336.json index f727e0a22df..9b7a873745a 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0336.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0336.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T07:15:27.860", "lastModified": "2025-01-09T07:15:27.860", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Codezips Project Management System 1.0. It has been classified as critical. This affects an unknown part of the file /pages/forms/teacher.php. The manipulation of the argument name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Codezips Project Management System 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /pages/forms/teacher.php. La manipulaci\u00f3n del nombre del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0339.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0339.json index a8f68633a3a..8abef8771db 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0339.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0339.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T07:15:28.080", "lastModified": "2025-01-09T07:15:28.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in code-projects Online Bike Rental 1.0. Affected is an unknown function of the file /vehical-details.php of the component HTTP GET Request Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Online Bike Rental 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /vehical-details.php del componente HTTP GET Request Handler. La manipulaci\u00f3n conduce a cross site scripting. Es posible lanzar el ataque de forma remota." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0340.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0340.json index 3b506f3f845..a90a19148ed 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0340.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0340.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T07:15:28.260", "lastModified": "2025-01-09T07:15:28.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Cinema Seat Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/deleteBooking.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Cinema Seat Reservation System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/deleteBooking.php. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0341.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0341.json index 29da0c3b28b..d434145d916 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0341.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0341.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T08:15:30.060", "lastModified": "2025-01-09T08:15:30.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in CampCodes Computer Laboratory Management System 1.0. Affected by this issue is some unknown functionality of the file /class/edit/edit. The manipulation of the argument e_photo leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en CampCodes Computer Laboratory Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /class/edit/edit. La manipulaci\u00f3n del argumento e_photo permite la carga sin restricciones. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0342.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0342.json index 9ba134c14b3..bc43f5a75de 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0342.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0342.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T08:15:30.310", "lastModified": "2025-01-09T08:15:30.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in CampCodes Computer Laboratory Management System 1.0. This affects an unknown part of the file /class/edit/edit. The manipulation of the argument s_lname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en CampCodes Computer Laboratory Management System 1.0. Afecta a una parte desconocida del archivo /class/edit/edit. La manipulaci\u00f3n del argumento s_lname provoca ataques de cross site scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0344.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0344.json index 7f68babc358..a9722af66aa 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0344.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0344.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T08:15:30.517", "lastModified": "2025-01-09T08:15:30.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this vulnerability is the function listData of the file /commpara/listData. The manipulation of the argument order leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en leiyuxi cy-fast 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n listData del archivo /commpara/listData. La manipulaci\u00f3n del orden de los argumentos provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0345.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0345.json index 9dadbc08523..53057323139 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0345.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0345.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T09:15:09.220", "lastModified": "2025-01-09T09:15:09.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this issue is the function listData of the file /sys/menu/listData. The manipulation of the argument order leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en leiyuxi cy-fast 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n listData del archivo /sys/menu/listData. La manipulaci\u00f3n del orden de los argumentos provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0346.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0346.json index d269e9562ad..712bb717991 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0346.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0346.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T09:15:09.393", "lastModified": "2025-01-09T09:15:09.393", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Content Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/publishnews.php of the component Publish News Page. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Content Management System 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /admin/publishnews.php del componente Publish News Page. La manipulaci\u00f3n del argumento image permite la subida sin restricciones. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0347.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0347.json index 1b5d2c6a86b..f88ef3fec97 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0347.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0347.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T10:15:07.170", "lastModified": "2025-01-09T10:15:07.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Admission Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php of the component Login. The manipulation of the argument u_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Admission Management System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo index.php del componente Login. La manipulaci\u00f3n del argumento u_id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0348.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0348.json index c303c8c8800..4c27d507f0c 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0348.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0348.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T10:15:07.700", "lastModified": "2025-01-09T10:15:07.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in CampCodes DepEd Equipment Inventory System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /data/add_employee.php. The manipulation of the argument data leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en CampCodes DepEd Equipment Inventory System 1.0. Se la ha calificado como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo /data/add_employee.php. La manipulaci\u00f3n del argumento data conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha revelado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0349.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0349.json index 4eb5fe7707e..cff5b7b24cf 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0349.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0349.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T11:15:16.547", "lastModified": "2025-01-09T11:15:16.547", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC6 15.03.05.16. La funci\u00f3n GetParentControlInfo del archivo /goform/GetParentControlInfo est\u00e1 afectada. La manipulaci\u00f3n del argumento src provoca un desbordamiento del b\u00fafer basado en la pila. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20033.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20033.json index 8aaea570fca..c13ac56bce5 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20033.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20033.json @@ -3,12 +3,16 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-01-09T07:15:28.450", "lastModified": "2025-01-09T07:15:28.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate post types, which allows attackers to deny service to users with the sysconsole_read_plugins permission via creating a post with the custom_pl_notification type and specific props." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 no logran validar correctamente los tipos de publicaciones, lo que permite a los atacantes denegar el servicio a los usuarios con el permiso sysconsole_read_plugins mediante la creaci\u00f3n de una publicaci\u00f3n con el tipo custom_pl_notification y propiedades espec\u00edficas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20123.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20123.json index 0ac595f67d7..ec90496d549 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20123.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20123.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2025-01-08T16:15:38.150", "lastModified": "2025-01-08T16:15:38.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Crosswork Network Controller could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against users of the interface of an affected system.\r\n\r\nThese vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by inserting malicious data into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid administrative credentials.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." + }, + { + "lang": "es", + "value": "Varias vulnerabilidades en web-based management interface de Cisco Crosswork Network Controller podr\u00edan permitir que un atacante remoto autenticado realice ataques de cross-site scripting (XSS) contra los usuarios de la interfaz de un sistema afectado. Estas vulnerabilidades existen porque la interfaz de administraci\u00f3n basada en web no valida correctamente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar estas vulnerabilidades insertando datos maliciosos en campos de datos espec\u00edficos de la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar script code arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Para aprovechar estas vulnerabilidades, el atacante debe tener credenciales administrativas v\u00e1lidas. Cisco ha publicado actualizaciones de software que solucionan estas vulnerabilidades. No existen workarounds que solucionen estas vulnerabilidades." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20126.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20126.json index 5fa8bb69327..c53bd1f82fc 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20126.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20126.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2025-01-08T16:15:38.357", "lastModified": "2025-01-08T19:15:38.553", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in certification validation routines of Cisco ThousandEyes Endpoint Agent for macOS and RoomOS could allow an unauthenticated, remote attacker to intercept or manipulate metrics information.\r\n\r\nThis vulnerability exists because the affected software does not properly validate certificates for hosted metrics services. An on-path attacker could exploit this vulnerability by intercepting network traffic using a crafted certificate. A successful exploit could allow the attacker to masquerade as a trusted host and monitor or change communications between the remote metrics service and the vulnerable client." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en certification validation routines de Cisco ThousandEyes Endpoint Agent para macOS y RoomOS podr\u00eda permitir que un atacante remoto no autenticado intercepte o manipule la informaci\u00f3n de m\u00e9tricas. Esta vulnerabilidad existe porque el software afectado no valida correctamente los certificados para los servicios de m\u00e9tricas alojados. Un atacante en ruta podr\u00eda aprovechar esta vulnerabilidad interceptando el tr\u00e1fico de red mediante un certificado manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante hacerse pasar por un host confiable y monitorear o cambiar las comunicaciones entre el servicio de m\u00e9tricas remoto y el cliente vulnerable." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20166.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20166.json index 1367be55cdc..dcd94959c37 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20166.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20166.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2025-01-08T17:15:16.990", "lastModified": "2025-01-08T17:15:16.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\r\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en web-based management interface de Cisco Common Services Platform Collector (CSPC) podr\u00eda permitir que un atacante remoto autenticado realice ataques de cross-site scripting (XSS) contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administraci\u00f3n basada en web de un sistema afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad inyectando c\u00f3digo malicioso en p\u00e1ginas espec\u00edficas de la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar script code arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Para aprovechar esta vulnerabilidad, el atacante debe tener al menos una cuenta con privilegios bajos en un dispositivo afectado. Cisco no ha publicado actualizaciones de software que solucionen esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20167.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20167.json index 2cce23c44da..0d4ec494837 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20167.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20167.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2025-01-08T17:15:17.163", "lastModified": "2025-01-08T17:15:17.163", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\r\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en web-based management interface de Cisco Common Services Platform Collector (CSPC) podr\u00eda permitir que un atacante remoto autenticado realice ataques de cross-site scripting (XSS) contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administraci\u00f3n basada en web de un sistema afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad inyectando c\u00f3digo malicioso en p\u00e1ginas espec\u00edficas de la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar script code arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Para aprovechar esta vulnerabilidad, el atacante debe tener al menos una cuenta con privilegios bajos en un dispositivo afectado. Cisco no ha publicado actualizaciones de software que solucionen esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20168.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20168.json index cd1c3a8644b..c7f6936a084 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20168.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20168.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2025-01-08T17:15:17.323", "lastModified": "2025-01-08T17:15:17.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\r\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en web-based management interface de Cisco Common Services Platform Collector (CSPC) podr\u00eda permitir que un atacante remoto autenticado realice ataques de cross-site scripting (XSS) contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administraci\u00f3n basada en web de un sistema afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad inyectando c\u00f3digo malicioso en p\u00e1ginas espec\u00edficas de la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar script code arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Para aprovechar esta vulnerabilidad, el atacante debe tener al menos una cuenta con privilegios bajos en un dispositivo afectado. Cisco no ha publicado actualizaciones de software que solucionen esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21102.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21102.json index 891a6c0e176..2f59b9210b7 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21102.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21102.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-08T12:15:22.850", "lastModified": "2025-01-08T12:15:22.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell VxRail, versions 7.0.000 through 7.0.532, contain(s) a Plaintext Storage of a Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure." + }, + { + "lang": "es", + "value": "Dell VxRail, versiones 7.0.000 a 7.0.532, contiene una vulnerabilidad de almacenamiento de contrase\u00f1as en texto plano. Un atacante con privilegios elevados y acceso local podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la exposici\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21111.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21111.json index 2b495affa10..0570f07647f 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21111.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21111.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-08T18:15:20.157", "lastModified": "2025-01-08T18:15:20.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell VxRail, versions 8.0.000 through 8.0.311, contain(s) a Plaintext Storage of a Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure." + }, + { + "lang": "es", + "value": "Dell VxRail, versiones 8.0.000 a 8.0.311, contiene una vulnerabilidad de almacenamiento de contrase\u00f1as en texto plano. Un atacante con privilegios elevados y acceso local podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la exposici\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21380.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21380.json index 08d35f3dc66..1fd236f69f5 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21380.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21380.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-09T23:15:08.340", "lastModified": "2025-01-09T23:15:08.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "Improper access control in Azure SaaS Resources allows an authorized attacker to disclose information over a network." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado a Azure SaaS Resources permite que un atacante autorizado divulgue informaci\u00f3n a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21385.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21385.json index 7a40c7e2d2c..4e82cc77da3 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21385.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21385.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-09T22:15:29.980", "lastModified": "2025-01-09T22:15:29.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Server-Side Request Forgery (SSRF) en Microsoft Purview permite a un atacante autorizado divulgar informaci\u00f3n a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21592.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21592.json index 32ba480e373..96aa4b5f2f1 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21592.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21592.json @@ -3,12 +3,16 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:18.203", "lastModified": "2025-01-09T17:15:18.203", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Exposure of Sensitive Information to an Unauthorized Actor\u00a0vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of sensitive files on the file system.\n\nThrough the execution of either 'show services advanced-anti-malware' or 'show services security-intelligence' command, a user with limited permissions (e.g., a low privilege login class user) can access protected files that should not be accessible to the user. These files may contain sensitive information that can be used to cause further impact to the system.\n\n\nThis issue affects Junos OS SRX Series:\n\n\n\n * All versions before 21.4R3-S8,\n\n * from 22.2 before 22.2R3-S5,\n\n * from 22.3 before 22.3R3-S3,\n * from 22.4 before 22.4R3-S2,\n\n * from 23.2 before 23.2R2-S1,\n\n * from 23.4 before 23.4R2." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un agente no autorizado en command-line interface (CLI) de Juniper Networks Junos OS en SRX Series devices permite que un usuario local con poco nivel de privilegios y acceso a la CLI de Junos vea el contenido de archivos confidenciales en el sistema de archivos. Mediante la ejecuci\u00f3n del comando 'show services advanced-anti-malware' o 'show services security-intelligence', un usuario con permisos limitados (por ejemplo, un usuario de clase de inicio de sesi\u00f3n con poco nivel de privilegios) puede acceder a archivos protegidos a los que no deber\u00eda tener acceso. Estos archivos pueden contener informaci\u00f3n confidencial que se puede utilizar para causar un mayor impacto en el sistema. Este problema afecta a Junos OS SRX Series: * Todas las versiones anteriores a 21.4R3-S8, * desde 22.2 hasta 22.2R3-S5, * desde 22.3 hasta 22.3R3-S3, * desde 22.4 hasta 22.4R3-S2, * desde 23.2 hasta 23.2R2-S1, * desde 23.4 hasta 23.4R2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21593.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21593.json index 2d336ef9511..64316863406 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21593.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21593.json @@ -3,12 +3,16 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:18.380", "lastModified": "2025-01-09T17:15:18.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Control of a Resource Through its Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial-of-Service (DoS).\n\nOn devices with SRv6 (Segment Routing over IPv6) enabled, an attacker can send a malformed BGP UPDATE packet which will cause the rpd to crash and restart. Continued receipt of these UPDATE packets will cause a sustained DoS condition.\u00a0\n\nThis issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.This issue affects Junos OS:\u00a0\n\n\n\n * All versions before 21.2R3-S9,\u00a0\n * from 21.4 before 21.4R3-S10,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\u00a0\n * from 22.4 before 22.4R3-S3,\u00a0\n * from 23.2 before 23.2R2-S2,\u00a0\n * from 23.4 before 23.4R2;\n\n\n\nand Junos OS Evolved:\u00a0\n\n\n\n * All versions before 21.2R3-S9-EVO,\u00a0\n * from 21.4-EVO before 21.4R3-S10-EVO,\u00a0\n * from 22.2-EVO before 22.2R3-S5-EVO,\u00a0\n * from 22.3-EVO before 22.3R3-S4-EVO,\u00a0\n * from 22.4-EVO before 22.4R3-S3-EVO,\n * from 23.2-EVO before 23.2R2-S2-EVO,\u00a0\n * from 23.4-EVO before 23.4R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control inadecuado de un recurso a trav\u00e9s de su duraci\u00f3n en el daemon de routing protocol daemon (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red provoque una denegaci\u00f3n de servicio (DoS). En dispositivos con SRv6 (enrutamiento de segmentos sobre IPv6) habilitado, un atacante puede enviar un paquete de actualizaci\u00f3n BGP mal formado que provocar\u00e1 que el rpd se bloquee y se reinicie. La recepci\u00f3n continua de estos paquetes de actualizaci\u00f3n provocar\u00e1 una condici\u00f3n de denegaci\u00f3n de servicio sostenida. Este problema afecta a iBGP y eBGP, y tanto IPv4 como IPv6 se ven afectados por esta vulnerabilidad. Este problema afecta a Junos OS: * Todas las versiones anteriores a 21.2R3-S9, * desde 21.4 hasta 21.4R3-S10, * desde 22.2 hasta 22.2R3-S5, * desde 22.3 hasta 22.3R3-S4, * desde 22.4 hasta 22.4R3-S3, * desde 23.2 hasta 23.2R2-S2, * desde 23.4 hasta 23.4R2; y Junos OS Evolved: * Todas las versiones anteriores a 21.2R3-S9-EVO, * desde 21.4-EVO hasta 21.4R3-S10-EVO, * desde 22.2-EVO hasta 22.2R3-S5-EVO, * desde 22.3-EVO hasta 22.3R3-S4-EVO, * desde 22.4-EVO hasta 22.4R3-S3-EVO, * desde 23.2-EVO hasta 23.2R2-S2-EVO, * desde 23.4-EVO hasta 23.4R2-EVO." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21596.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21596.json index a23f09dafaf..169336914c7 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21596.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21596.json @@ -3,12 +3,16 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:18.593", "lastModified": "2025-01-09T17:15:18.593", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Handling of Exceptional Conditions vulnerability in the command-line processing of Juniper Networks Junos OS on SRX1500, SRX4100, and SRX4200 devices allows a local, low-privileged authenticated attacker executing the 'show chassis environment pem' command to cause the chassis daemon (chassisd) to crash and restart, resulting in a temporary Denial of Service (DoS). However, repeated execution of this command will eventually cause the chassisd process to fail to restart, impacting packet processing on the system.\n\nThis issue affects Junos OS on SRX1500, SRX4100, SRX4200:\u00a0\n\n\n\n * All versions before 21.4R3-S9,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\u00a0\n * from 22.4 before 22.4R3-S4,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S1." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de gesti\u00f3n inadecuada de condiciones excepcionales en command-line processing de Juniper Networks Junos OS en dispositivos SRX1500, SRX4100 y SRX4200 permite que un atacante local autenticado con poco nivel de privilegios ejecute el comando 'show housing environment pem' para provocar que el daemon del chasis (chassisd) se bloquee y se reinicie, lo que da como resultado una denegaci\u00f3n de servicio (DoS) temporal. Sin embargo, la ejecuci\u00f3n repetida de este comando provocar\u00e1 que el proceso de chasisd no se reinicie, lo que afectar\u00e1 el procesamiento de paquetes en el sistema. Este problema afecta a Junos OS en SRX1500, SRX4100, SRX4200: * Todas las versiones anteriores a 21.4R3-S9, * desde 22.2 hasta 22.2R3-S5, * desde 22.3 hasta 22.3R3-S4, * desde 22.4 hasta 22.4R3-S4, * desde 23.2 hasta 23.2R2-S3, * desde 23.4 hasta 23.4R2-S1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21598.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21598.json index ade655edb57..a3dfd704820 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21598.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21598.json @@ -3,12 +3,16 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T19:15:20.123", "lastModified": "2025-01-09T19:15:20.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An\u00a0Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send\u00a0malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd.\nThis issue affects:\n\nJunos OS:\u00a0\n\n\n\n * from 21.2R3-S8 before 21.2R3-S9,\u00a0\n * from 21.4R3-S7 before 21.4R3-S9,\u00a0\n * from 22.2R3-S4 before 22.2R3-S5,\u00a0\n * from 22.3R3-S2 before 22.3R3-S4,\u00a0\n * from 22.4R3 before 22.4R3-S5,\u00a0\n * from 23.2R2 before 23.2R2-S2,\u00a0\n * from 23.4R1 before 23.4R2-S1,\u00a0\n * from 24.2R1 before 24.2R1-S1, 24.2R2.\n\n\nJunos OS Evolved:\n * from 21.4R3-S7-EVO before 21.4R3-S9-EVO,\u00a0\n * from 22.2R3-S4-EVO before 22.2R3-S5-EVO,\u00a0\n * from 22.3R3-S2-EVO before 22.3R3-S4-EVO,\u00a0\n * from 22.4R3-EVO before 22.4R3-S5-EVO,\u00a0\n * from 23.2R2-EVO before 23.2R2-S2-EVO,\u00a0\n * from 23.4R1-EVO before 23.4R2-S1-EVO,\u00a0\n * from 24.2R1-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\nThis issue requires a BGP session to be established.\n\nThis issue can propagate and multiply through multiple ASes until reaching vulnerable devices.\n\nThis issue affects iBGP and eBGP.\n\nThis issue affects IPv4 and IPv6.\n\nAn indicator of compromise may be the presence of malformed update messages in a neighboring AS which is unaffected by this issue:\n\nFor example, by issuing the command on the neighboring device:\n\u00a0show log messages\n\nReviewing for similar messages from devices within proximity to each other may indicate this malformed packet is propagating:\n\u00a0 rpd[]: Received malformed update from (External AS )\nand\n\u00a0 rpd[]: Malformed Attribute" + }, + { + "lang": "es", + "value": "Una vulnerabilidad de lectura fuera de los l\u00edmites en el daemon de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red env\u00ede paquetes BGP malformados a un dispositivo configurado con opciones de seguimiento de recepci\u00f3n de paquetes habilitadas para bloquear rpd. Este problema afecta a: Junos OS: * desde 21.2R3-S8 antes de 21.2R3-S9, * desde 21.4R3-S7 antes de 21.4R3-S9, * desde 22.2R3-S4 antes de 22.2R3-S5, * desde 22.3R3-S2 antes de 22.3R3-S4, * desde 22.4R3 antes de 22.4R3-S5, * desde 23.2R2 antes de 23.2R2-S2, * desde 23.4R1 antes de 23.4R2-S1, * desde 24.2R1 antes de 24.2R1-S1, 24.2R2. Junos OS Evolved: * desde 21.4R3-S7-EVO hasta 21.4R3-S9-EVO, * desde 22.2R3-S4-EVO hasta 22.2R3-S5-EVO, * desde 22.3R3-S2-EVO hasta 22.3R3-S4-EVO, * desde 22.4R3-EVO hasta 22.4R3-S5-EVO, * desde 23.2R2-EVO hasta 23.2R2-S2-EVO, * desde 23.4R1-EVO hasta 23.4R2-S1-EVO, * desde 24.2R1-EVO hasta 24.2R1-S2-EVO, 24.2R2-EVO. Este problema requiere que se establezca una sesi\u00f3n BGP. Este problema puede propagarse y multiplicarse a trav\u00e9s de varios AS hasta llegar a dispositivos vulnerables. Este problema afecta a iBGP y eBGP. Este problema afecta a IPv4 e IPv6. Un indicador de compromiso puede ser la presencia de mensajes de actualizaci\u00f3n malformados en un AS vecino que no se ve afectado por este problema: por ejemplo, al emitir el comando en el dispositivo vecino: show log messages La revisi\u00f3n de mensajes similares de dispositivos cercanos entre s\u00ed puede indicar que este paquete malformado se est\u00e1 propagando: rpd[]: Se recibi\u00f3 una actualizaci\u00f3n malformada de (AS externo ) y rpd[]: Atributo malformado" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21599.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21599.json index 25b86089df8..3459e1bf75b 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21599.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21599.json @@ -3,12 +3,16 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:18.770", "lastModified": "2025-01-09T17:15:18.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A\u00a0Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service.\u00a0\n\nReceipt of specifically malformed IPv6 packets, destined to the device, causes kernel memory to not be freed, resulting in memory exhaustion leading to a system crash and Denial of Service (DoS).\u00a0Continuous receipt and processing of these packets will continue to exhaust kernel memory, creating a sustained Denial of Service (DoS) condition.\nThis issue only affects systems configured with IPv6.\n\nThis issue affects Junos OS Evolved:\u00a0\n\n\n\n * from 22.4-EVO before 22.4R3-S5-EVO,\u00a0\n * from 23.2-EVO before 23.2R2-S2-EVO,\u00a0\n * from 23.4-EVO before 23.4R2-S2-EVO,\u00a0\n * from 24.2-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\n\n\nThis issue does not affect Juniper Networks Junos OS Evolved versions prior to 22.4R1-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de falta de liberaci\u00f3n de memoria despu\u00e9s de la vida \u00fatil efectiva en Juniper Tunnel Driver (jtd) de Juniper Networks Junos OS permite que un atacante no autenticado basado en la red provoque una denegaci\u00f3n de servicio. La recepci\u00f3n de paquetes IPv6 espec\u00edficamente malformados, destinados al dispositivo, hace que no se libere la memoria del n\u00facleo, lo que da como resultado un agotamiento de la memoria que conduce a un bloqueo del sistema y una denegaci\u00f3n de servicio (DoS). La recepci\u00f3n y el procesamiento continuos de estos paquetes seguir\u00e1n agotando la memoria del n\u00facleo, lo que crear\u00e1 una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sostenida. Este problema solo afecta a los sistemas configurados con IPv6. Este problema afecta a Junos OS Evolved: * desde 22.4-EVO hasta 22.4R3-S5-EVO, * desde 23.2-EVO hasta 23.2R2-S2-EVO, * desde 23.4-EVO hasta 23.4R2-S2-EVO, * desde 24.2-EVO hasta 24.2R1-S2-EVO, 24.2R2-EVO. Este problema no afecta a las versiones de Juniper Networks Junos OS Evolved anteriores a 22.4R1-EVO." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21600.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21600.json index 58b82a35ec1..cdadc841df6 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21600.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21600.json @@ -3,12 +3,16 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:18.960", "lastModified": "2025-01-09T17:15:18.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Out-of-Bounds Read vulnerability in\n\nthe routing protocol daemon (rpd) of \n\n Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\n\n\nThis issue only affects systems configured in\n either of two ways:\n\n \n \n * systems with BGP traceoptions enabled\n\n * systems with BGP family traffic-engineering (BGP-LS)\n configured\n\n\n and can be exploited from a directly connected and configured BGP peer.\u00a0\n\nThis issue affects iBGP and eBGP \n\nwith \n\nany address family\n\n configured, and both IPv4 and IPv6 are affected by this vulnerability.\n\nThis issue affects:\n\nJunos OS:\u00a0\n\n\n\n * All versions before 21.4R3-S9,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\u00a0\n * from 22.4 before 22.4R3-S5,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S3,\u00a0\n * from 24.2 before 24.2R1-S2, 24.2R2;\u00a0\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * All versions before 21.4R3-S9-EVO,\u00a0\n * from 22.2 before 22.2R3-S5-EVO,\u00a0\n * from 22.3 before 22.3R3-S4-EVO,\u00a0\n * from 22.4 before 22.4R3-S5-EVO,\u00a0\n * from 23.2 before 23.2R2-S3-EVO,\u00a0\n * from 23.4 before 23.4R2-S2-EVO,\u00a0\n * from 24.2 before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\n\nThis is a similar, but different vulnerability than the issue reported as CVE-2024-39516." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de lectura fuera de los l\u00edmites en el daemon de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un par BGP no autenticado y l\u00f3gicamente adyacente env\u00ede un paquete BGP espec\u00edficamente malformado para provocar que rpd se bloquee y se reinicie, lo que da como resultado una denegaci\u00f3n de servicio (DoS). La recepci\u00f3n y el procesamiento continuos de este paquete crear\u00e1n una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sostenida. Este problema solo afecta a los sistemas configurados de una de estas dos maneras: * sistemas con opciones de rastreo de BGP habilitadas * sistemas con ingenier\u00eda de tr\u00e1fico de la familia BGP (BGP-LS) configurada y que se puede explotar desde un par BGP conectado y configurado directamente. Este problema afecta a iBGP y eBGP con cualquier familia de direcciones configurada, y tanto IPv4 como IPv6 se ven afectados por esta vulnerabilidad. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.4R3-S9, * desde 22.2 hasta 22.2R3-S5, * desde 22.3 hasta 22.3R3-S4, * desde 22.4 hasta 22.4R3-S5, * desde 23.2 hasta 23.2R2-S3, * desde 23.4 hasta 23.4R2-S3, * desde 24.2 hasta 24.2R1-S2, 24.2R2; Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S9-EVO, * desde 22.2 hasta 22.2R3-S5-EVO, * desde 22.3 hasta 22.3R3-S4-EVO, * desde 22.4 hasta 22.4R3-S5-EVO, * desde 23.2 hasta 23.2R2-S3-EVO, * desde 23.4 hasta 23.4R2-S2-EVO, * desde 24.2 hasta 24.2R1-S2-EVO, 24.2R2-EVO. Esta es una vulnerabilidad similar, pero diferente, al problema informado como CVE-2024-39516." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21602.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21602.json index 8db92a079d1..c8e279d5cef 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21602.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21602.json @@ -3,12 +3,16 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:19.150", "lastModified": "2025-01-09T17:15:19.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a specific BGP update packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). \n\nContinuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\nThis issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.\n\nThis issue affects Junos OS:\u00a0\n\n\n\n * from 21.4 before 21.4R3-S9,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\n * from 22.4 before 22.4R3-S5,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S3,\u00a0\n * from 24.2 before 24.2R1-S2, 24.2R2;\u00a0\n\n\nThis issue does not affect versions prior to\u00a021.1R1.\n\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * from 21.4 before 21.4R3-S9-EVO,\u00a0\n * from 22.2 before 22.2R3-S5-EVO,\u00a0\n * from 22.3 before 22.3R3-S4-EVO,\n * from 22.4 before 22.4R3-S5-EVO,\u00a0\n * from 23.2 before 23.2R2-S3-EVO,\u00a0\n * from 23.4 before 23.4R2-S3-EVO,\u00a0\n * from 24.2 before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\nThis issue does not affect versions prior to 21.1R1-EVO" + }, + { + "lang": "es", + "value": "Una vulnerabilidad de gesti\u00f3n inadecuado de condiciones excepcionales en el daemon de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante adyacente no autenticado env\u00ede un paquete de actualizaci\u00f3n BGP espec\u00edfico para provocar que rpd se bloquee y se reinicie, lo que da como resultado una denegaci\u00f3n de servicio (DoS). La recepci\u00f3n y el procesamiento continuos de este paquete crear\u00e1n una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sostenida. Este problema afecta a iBGP y eBGP, y tanto IPv4 como IPv6 se ven afectados por esta vulnerabilidad. Este problema afecta a Junos OS: * desde 21.4 antes de 21.4R3-S9, * desde 22.2 antes de 22.2R3-S5, * desde 22.3 antes de 22.3R3-S4, * desde 22.4 antes de 22.4R3-S5, * desde 23.2 antes de 23.2R2-S3, * desde 23.4 antes de 23.4R2-S3, * desde 24.2 antes de 24.2R1-S2, 24.2R2; Este problema no afecta a las versiones anteriores a 21.1R1. Junos OS Evolved: * desde la versi\u00f3n 21.4 anterior a la 21.4R3-S9-EVO, * desde la versi\u00f3n 22.2 anterior a la 22.2R3-S5-EVO, * desde la versi\u00f3n 22.3 anterior a la 22.3R3-S4-EVO, * desde la versi\u00f3n 22.4 anterior a la 22.4R3-S5-EVO, * desde la versi\u00f3n 23.2 anterior a la 23.2R2-S3-EVO, * desde la versi\u00f3n 23.4 anterior a la 23.4R2-S3-EVO, * desde la versi\u00f3n 24.2 anterior a la 24.2R1-S2-EVO, 24.2R2-EVO. Este problema no afecta a las versiones anteriores a la 21.1R1-EVO" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21603.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21603.json index 5e732b92f74..dbb6b904e1b 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21603.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21603.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-01-08T04:15:08.407", "lastModified": "2025-01-08T15:15:21.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21604.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21604.json index ac8359729ee..6f684cc547e 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21604.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21604.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T16:15:30.927", "lastModified": "2025-01-06T16:15:30.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "LangChain4j-AIDeepin is a Retrieval enhancement generation (RAG) project. Prior to 3.5.0, LangChain4j-AIDeepin uses MD5 to hash files, which may cause file upload conflicts. This issue is fixed in 3.5.0." + }, + { + "lang": "es", + "value": "LangChain4j-AIDeepin es un proyecto de generaci\u00f3n de mejoras de recuperaci\u00f3n (RAG). Antes de la versi\u00f3n 3.5.0, LangChain4j-AIDeepin usaba MD5 para codificar archivos, lo que pod\u00eda causar conflictos en la carga de archivos. Este problema se solucion\u00f3 en la versi\u00f3n 3.5.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21609.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21609.json index 1d6b4c349c4..bcc8d52a66e 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21609.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21609.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SiYuan is self-hosted, open source personal knowledge management software. SiYuan Note version 3.1.18 has an arbitrary file deletion vulnerability. The vulnerability exists in the `POST /api/history/getDocHistoryContent` endpoint. An attacker can craft a payload to exploit this vulnerability, resulting in the deletion of arbitrary files on the server. Commit d9887aeec1b27073bec66299a9a4181dc42969f3 fixes this vulnerability and is expected to be available in version 3.1.19." + }, + { + "lang": "es", + "value": "SiYuan es un software de gesti\u00f3n de conocimiento personal de c\u00f3digo abierto y alojado por el usuario. La versi\u00f3n 3.1.18 de SiYuan Note tiene una vulnerabilidad de eliminaci\u00f3n de archivos arbitrarios. La vulnerabilidad existe en el endpoint `POST /api/history/getDocHistoryContent`. Un atacante puede crear un payload para explotar esta vulnerabilidad, lo que da como resultado la eliminaci\u00f3n de archivos arbitrarios en el servidor. El commit d9887aeec1b27073bec66299a9a4181dc42969f3 corrige esta vulnerabilidad y se espera que est\u00e9 disponible en la versi\u00f3n 3.1.19." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21610.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21610.json index d11ca0808aa..8db35a89c28 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21610.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21610.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Trix is a what-you-see-is-what-you-get rich text editor for everyday writing. Versions prior to 2.1.12 are vulnerable to cross-site scripting when pasting malicious code in the link field. An attacker could trick the user to copy&paste a malicious `javascript:` URL as a link that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. Users should upgrade to Trix editor version 2.1.12 or later to receive a patch. In addition to upgrading, affected users can disallow browsers that don't support a Content Security Policy (CSP) as a workaround for this and other cross-site scripting vulnerabilities. Set CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin are executed, and explicitly prohibit inline scripts using script-src-elem." + }, + { + "lang": "es", + "value": "Trix es un editor de texto enriquecido que permite ver lo que se obtiene para la escritura diaria. Las versiones anteriores a la 2.1.12 son vulnerables a cross site scripting al pegar c\u00f3digo malicioso en el campo de enlace. Un atacante podr\u00eda enga\u00f1ar al usuario para que copie y pegue una URL maliciosa `javascript:` como un enlace que ejecutar\u00eda c\u00f3digo JavaScript arbitrario dentro del contexto de la sesi\u00f3n del usuario, lo que podr\u00eda provocar que se realicen acciones no autorizadas o que se revele informaci\u00f3n confidencial. Los usuarios deben actualizar a la versi\u00f3n 2.1.12 o posterior del editor Trix para recibir un parche. Adem\u00e1s de actualizar, los usuarios afectados pueden deshabilitar los navegadores que no admitan una Pol\u00edtica de seguridad de contenido (CSP) como workaround para esta y otras vulnerabilidades de cross site scripting. Establezca pol\u00edticas de CSP como script-src 'self' para garantizar que solo se ejecuten scripts alojadas en el mismo origen y proh\u00edba expl\u00edcitamente las scripts en l\u00ednea mediante script-src-elem." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21611.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21611.json index 2671cc9fb64..0c350188765 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21611.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21611.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T16:15:31.413", "lastModified": "2025-01-06T16:15:31.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "tgstation-server is a production scale tool for BYOND server management. Prior to 6.12.3, roles used to authorize API methods were incorrectly OR'd instead of AND'ed with the role used to determine if a user was enabled. This allows enabled users access to most, but not all, authorized actions regardless of their permissions. Notably, the WriteUsers right is unaffected so users may not use this bug to permanently elevate their account permissions. The fix is release in tgstation-server-v6.12.3." + }, + { + "lang": "es", + "value": "tgstation-server es una herramienta de escala de producci\u00f3n para la administraci\u00f3n de servidores BYOND. Antes de la versi\u00f3n 6.12.3, los roles utilizados para autorizar m\u00e9todos de API se combinaban incorrectamente con OR en lugar de AND con el rol utilizado para determinar si un usuario estaba habilitado. Esto permite a los usuarios habilitados acceder a la mayor\u00eda de las acciones autorizadas, pero no a todas, independientemente de sus permisos. En particular, el derecho WriteUsers no se ve afectado, por lo que los usuarios no pueden usar este error para elevar permanentemente los permisos de su cuenta. La soluci\u00f3n se publica en tgstation-server-v6.12.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21612.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21612.json index e1fc4e562c0..ea4732fd44d 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21612.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21612.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T16:15:31.633", "lastModified": "2025-01-06T17:15:46.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TabberNeue is a MediaWiki extension that allows the wiki to create tabs. Prior to 2.7.2, TabberTransclude.php doesn't escape the user-supplied page name when outputting, so an XSS payload as the page name can be used here. This vulnerability is fixed in 2.7.2." + }, + { + "lang": "es", + "value": "TabberNeue es una extensi\u00f3n de MediaWiki que permite que la wiki cree pesta\u00f1as. Antes de la versi\u00f3n 2.7.2, TabberTransclude.php no omite el nombre de la p\u00e1gina proporcionado por el usuario al generar la salida, por lo que se puede utilizar un payload XSS como nombre de la p\u00e1gina. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 2.7.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21613.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21613.json index 4c29fc60488..d1ca5cd59a6 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21613.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21613.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T17:15:47.043", "lastModified": "2025-01-06T17:15:47.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "go-git is a highly extensible git implementation library written in pure Go. An argument injection vulnerability was discovered in go-git versions prior to v5.13. Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries. This vulnerability is fixed in 5.13.0." + }, + { + "lang": "es", + "value": "Go-git es una librer\u00eda de implementaci\u00f3n de Git altamente extensible escrita en Go puro. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de argumentos en versiones de Go-git anteriores a la v5.13. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir a un atacante establecer valores arbitrarios para los indicadores git-upload-pack. Esto solo sucede cuando se utiliza el protocolo de transporte de archivos, ya que es el \u00fanico protocolo que realiza transferencias a binarios de Git. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 5.13.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21614.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21614.json index 45260504f16..242688d9e9b 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21614.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21614.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T17:15:47.310", "lastModified": "2025-01-06T17:15:47.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "go-git is a highly extensible git implementation library written in pure Go. A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.13. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git clients. Users running versions of go-git from v4 and above are recommended to upgrade to v5.13 in order to mitigate this vulnerability." + }, + { + "lang": "es", + "value": "Go-git es una librer\u00eda de implementaci\u00f3n de Git altamente extensible escrita en Go puro. Se descubri\u00f3 una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en versiones de Go-git anteriores a la v5.13. Esta vulnerabilidad permite a un atacante realizar ataques de denegaci\u00f3n de servicio al proporcionar respuestas especialmente manipuladas desde un servidor Git que desencadenan el agotamiento de recursos en los clientes de Go-git. Se recomienda a los usuarios que ejecutan versiones de Go-git de la v4 y posteriores que actualicen a la v5.13 para mitigar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21615.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21615.json index 78372120dc8..de5504d6806 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21615.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21615.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T17:15:47.510", "lastModified": "2025-01-06T17:15:47.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "AAT (Another Activity Tracker) is a GPS-tracking application for tracking sportive activities, with emphasis on cycling. Versions lower than v1.26 of AAT are vulnerable to data exfiltration from malicious apps installed on the same device." + }, + { + "lang": "es", + "value": "AAT (Another Activity Tracker) es una aplicaci\u00f3n de seguimiento GPS para el seguimiento de actividades deportivas, con \u00e9nfasis en el ciclismo. Las versiones anteriores a la v1.26 de AAT son vulnerables a la exfiltraci\u00f3n de datos desde aplicaciones maliciosas instaladas en el mismo dispositivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21616.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21616.json index 836c6b284bd..484c379bff5 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21616.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21616.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T22:15:11.023", "lastModified": "2025-01-07T16:15:40.390", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21617.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21617.json index 4b349348170..05672c53b47 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21617.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21617.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T20:15:39.453", "lastModified": "2025-01-06T20:15:39.453", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1." + }, + { + "lang": "es", + "value": "El suscriptor de Guzzle OAuth firma las solicitudes de Guzzle mediante OAuth 1.0. Antes de la versi\u00f3n 0.8.1, la generaci\u00f3n de Nonce no utiliza suficiente entrop\u00eda ni una fuente pseudoaleatoria criptogr\u00e1ficamente segura. Esto puede dejar a los servidores vulnerables a ataques de repetici\u00f3n cuando no se utiliza TLS. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 0.8.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21618.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21618.json index bc92e6492f6..a6bebea0ce5 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21618.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21618.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T17:15:47.660", "lastModified": "2025-01-06T17:15:47.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NiceGUI is an easy-to-use, Python-based UI framework. Prior to 2.9.1, authenticating with NiceGUI logged in the user for all browsers, including browsers in incognito mode. This vulnerability is fixed in 2.9.1." + }, + { + "lang": "es", + "value": "NiceGUI es un framework de interfaz de usuario f\u00e1cil de usar basado en Python. Antes de la versi\u00f3n 2.9.1, la autenticaci\u00f3n con NiceGUI permit\u00eda iniciar sesi\u00f3n al usuario en todos los navegadores, incluidos los navegadores en modo inc\u00f3gnito. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 2.9.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21620.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21620.json index 86da83f20f8..213d453b2cc 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21620.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21620.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T23:15:07.770", "lastModified": "2025-01-06T23:15:07.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that second domain. This vulnerability is fixed in 2.1.2." + }, + { + "lang": "es", + "value": "Deno es un entorno de ejecuci\u00f3n de JavaScript, TypeScript y WebAssembly con valores predeterminados seguros. Cuando env\u00eda una solicitud con el encabezado Authorization a un dominio y la respuesta solicita redirigir a un dominio diferente, la gesti\u00f3n de redireccionamiento fetch() de Deno gestiona una solicitud de redireccionamiento de seguimiento que conserva el encabezado Authorization original y filtra su contenido a ese segundo dominio. Esta vulnerabilidad se corrigi\u00f3 en 2.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21622.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21622.json index 0043652de58..0533c009a9b 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21622.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21622.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-07T16:15:40.510", "lastModified": "2025-01-07T18:15:21.703", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ClipBucket V5 provides open source video hosting with PHP. During the user avatar upload workflow, a user can choose to upload and change their avatar at any time. During deletion, ClipBucket checks for the avatar_url as a filepath within the avatars subdirectory. If the URL path exists within the avatars directory, ClipBucket will delete it. There is no check for path traversal sequences in the provided user input (stored in the DB as avatar_url) therefore the final $file variable could be tainted with path traversal sequences. This leads to file deletion outside of the intended scope of the avatars folder. This vulnerability is fixed in 5.5.1 - 237." + }, + { + "lang": "es", + "value": "ClipBucket V5 ofrece alojamiento de v\u00eddeo de c\u00f3digo abierto con PHP. Durante el flujo de trabajo de carga del avatar del usuario, el usuario puede elegir cargar y cambiar su avatar en cualquier momento. Durante la eliminaci\u00f3n, ClipBucket comprueba si la URL de avatar_url es una ruta de archivo dentro del subdirectorio avatars. Si la ruta de la URL existe dentro del directorio avatars, ClipBucket la eliminar\u00e1. No se comprueban las secuencias de path traversal en la entrada del usuario proporcionada (almacenada en la base de datos como avatar_url), por lo que la variable $file final podr\u00eda estar contaminada con secuencias de path traversal. Esto provoca la eliminaci\u00f3n de archivos fuera del alcance previsto de la carpeta avatars. Esta vulnerabilidad se ha corregido en 5.5.1 - 237." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21623.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21623.json index ab4cfc30058..6427d07c0fa 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21623.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21623.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-07T16:15:40.690", "lastModified": "2025-01-07T17:15:32.313", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ClipBucket V5 provides open source video hosting with PHP. Prior to 5.5.1 - 238, ClipBucket V5 allows unauthenticated attackers to change the template directory via a directory traversal, which results in a denial of service." + }, + { + "lang": "es", + "value": "ClipBucket V5 ofrece alojamiento de videos de c\u00f3digo abierto con PHP. Antes de la versi\u00f3n 5.5.1 - 238, ClipBucket V5 permite a atacantes no autenticados cambiar el directorio de plantillas a trav\u00e9s de un directory traversal, lo que da como resultado una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21624.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21624.json index 7a2f0817863..8c370b2b9d5 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21624.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21624.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-07T16:15:40.853", "lastModified": "2025-01-07T17:15:32.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ClipBucket V5 provides open source video hosting with PHP. Prior to 5.5.1 - 239, a file upload vulnerability exists in the Manage Playlist functionality of the application, specifically surrounding the uploading of playlist cover images. Without proper checks, an attacker can upload a PHP script file instead of an image file, thus allowing a webshell or other malicious files to be stored and executed on the server. This attack vector exists in both the admin area and low-level user area. This vulnerability is fixed in 5.5.1 - 239." + }, + { + "lang": "es", + "value": "ClipBucket V5 ofrece alojamiento de v\u00eddeo de c\u00f3digo abierto con PHP. Antes de la versi\u00f3n 5.5.1 - 239, exist\u00eda una vulnerabilidad de carga de archivos en la funci\u00f3n de gesti\u00f3n de listas de reproducci\u00f3n de la aplicaci\u00f3n, espec\u00edficamente relacionada con la carga de im\u00e1genes de portada de listas de reproducci\u00f3n. Sin las comprobaciones adecuadas, un atacante puede cargar un archivo de script PHP en lugar de un archivo de imagen, lo que permite almacenar y ejecutar un webshell u otros archivos maliciosos en el servidor. Este vector de ataque existe tanto en el \u00e1rea de administraci\u00f3n como en el \u00e1rea de usuario de bajo nivel. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 5.5.1 - 239." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21628.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21628.json index bd6a41484ae..64ec15e68d2 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21628.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21628.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-09T18:15:30.070", "lastModified": "2025-01-09T18:15:30.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0." + }, + { + "lang": "es", + "value": "Chatwoot es una suite de interacci\u00f3n con el cliente. Antes de la versi\u00f3n 3.16.0, los endpoints de los filtros de conversaci\u00f3n y contacto no depuraban la entrada de query_operator que se pasaba desde el frontend o la API. Esto proporcionaba a cualquier actor autenticado un vector de ataque para ejecutar SQL arbitrario dentro de la consulta de filtro agregando una cl\u00e1usula WHERE tautol\u00f3gica. Este problema se solucion\u00f3 con la versi\u00f3n 3.16.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22130.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22130.json index 26d6ac44ed6..2e74a8c4098 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22130.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22130.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-08T16:15:38.543", "lastModified": "2025-01-08T16:15:38.543", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Soft Serve is a self-hostable Git server for the command line. Prior to 0.8.2 , a path traversal attack allows existing non-admin users to access and take over other user's repositories. A malicious user then can modify, delete, and arbitrarily repositories as if they were an admin user without explicitly giving them permissions. This is patched in v0.8.2." + }, + { + "lang": "es", + "value": "Soft Serve es un servidor Git autoalojado para la l\u00ednea de comandos. Antes de la versi\u00f3n 0.8.2, un ataque de path traversal permite a los usuarios no administradores existentes acceder y tomar el control de los repositorios de otros usuarios. Un usuario malintencionado puede modificar, eliminar y acceder a repositorios de forma arbitraria como si fuera un usuario administrador sin darles permisos expl\u00edcitos. Esto se solucion\u00f3 en la versi\u00f3n 0.8.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22132.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22132.json index 9d0b43a54dc..6f6e7f8a4bb 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22132.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22132.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-07T22:15:31.590", "lastModified": "2025-01-07T22:15:31.590", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is a web manager for charitable institutions. A Cross-Site Scripting (XSS) vulnerability was identified in the file upload functionality of the WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. By uploading a file containing malicious JavaScript code, an attacker can execute arbitrary scripts in the context of a victim's browser. This can lead to information theft, session hijacking, and other forms of client-side exploitation. This vulnerability is fixed in 3.2.7." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se ha identificado una vulnerabilidad de tipo Cross-Site Scripting (XSS) en la funcionalidad de carga de archivos del endpoint WeGIA/html/socio/sistema/controller/controla_xlsx.php. Al cargar un archivo que contiene c\u00f3digo JavaScript malicioso, un atacante puede ejecutar secuencias de comandos arbitrarias en el contexto del navegador de la v\u00edctima. Esto puede provocar robo de informaci\u00f3n, secuestro de sesiones y otras formas de explotaci\u00f3n del lado del cliente. Esta vulnerabilidad se ha corregido en la versi\u00f3n 3.2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22133.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22133.json index b1a27fc8afc..7c17fe335d3 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22133.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22133.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-07T22:15:31.740", "lastModified": "2025-01-08T15:15:21.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22136.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22136.json index 22e02d0a357..640b647e662 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22136.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22136.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-08T16:15:38.770", "lastModified": "2025-01-08T16:15:38.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.217 , Tabby enables several high-risk Electron Fuses, including RunAsNode, EnableNodeCliInspectArguments, and EnableNodeOptionsEnvironmentVariable. These fuses create potential code injection vectors even though the application is signed with hardened runtime and lacks dangerous entitlements such as com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables. This vulnerability is fixed in 1.0.217." + }, + { + "lang": "es", + "value": "Tabby (anteriormente Terminus) es un emulador de terminal altamente configurable. Antes de la versi\u00f3n 1.0.217, Tabby habilita varios fusibles Electron de alto riesgo, incluidos RunAsNode, EnableNodeCliInspectArguments y EnableNodeOptionsEnvironmentVariable. Estos fusibles crean posibles vectores de inyecci\u00f3n de c\u00f3digo a pesar de que la aplicaci\u00f3n est\u00e1 firmada con un entorno de ejecuci\u00f3n reforzado y carece de derechos peligrosos como com.apple.security.cs.disable-library-validation y com.apple.security.cs.allow-dyld-environment-variables. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 1.0.217." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22137.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22137.json index 2e86406c0a1..de80ceeaa36 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22137.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22137.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-08T16:15:38.920", "lastModified": "2025-01-08T16:15:38.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pingvin Share is a self-hosted file sharing platform and an alternative for WeTransfer. This vulnerability allows an authenticated or unauthenticated (if anonymous shares are allowed) user to overwrite arbitrary files on the server, including sensitive system files, via HTTP POST requests. The issue has been patched in version 1.4.0." + }, + { + "lang": "es", + "value": "Pingvin Share es una plataforma de intercambio de archivos alojada en servidores propios y una alternativa a WeTransfer. Esta vulnerabilidad permite que un usuario autenticado o no autenticado (si se permiten los intercambios an\u00f3nimos) sobrescriba archivos arbitrarios en el servidor, incluidos archivos de sistema confidenciales, mediante solicitudes HTTP POST. El problema se ha corregido en la versi\u00f3n 1.4.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22139.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22139.json index dec3ed3c5f3..3ee231082b5 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22139.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22139.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the configuracao_geral.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_c parameter. This vulnerability is fixed in 3.2.8." + }, + { + "lang": "es", + "value": "WeGIA es un administrador web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo XSS (Cross-Site Scripting Reflejado) en el endpoint configuracao_geral.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar secuencias de comandos maliciosas en el par\u00e1metro msg_c. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22140.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22140.json index 31246c378a0..9fc6432019c 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22140.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22140.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is a web manager for charitable institutions. A SQL Injection vulnerability was identified in the /html/funcionario/dependente_listar_um.php endpoint, specifically in the id_dependente parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This vulnerability is fixed in 3.2.8." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en el endpoint /html/funcionario/dependente_listar_um.php, concretamente en el par\u00e1metro id_dependente. Esta vulnerabilidad permite a los atacantes ejecutar comandos SQL arbitrarios, comprometiendo la confidencialidad, integridad y disponibilidad de la base de datos. Esta vulnerabilidad se ha corregido en la versi\u00f3n 3.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22141.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22141.json index b0693337f2b..77a248f4053 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22141.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22141.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is a web manager for charitable institutions. A SQL Injection vulnerability was identified in the /dao/verificar_recursos_cargo.php endpoint, specifically in the cargo parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This vulnerability is fixed in 3.2.8." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en el endpoint /dao/verificar_recursos_cargo.php, espec\u00edficamente en el par\u00e1metro cargo. Esta vulnerabilidad permite a los atacantes ejecutar comandos SQL arbitrarios, comprometiendo la confidencialidad, integridad y disponibilidad de la base de datos. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22143.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22143.json index ce670188281..7564e6a7b67 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22143.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22143.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-08T20:15:30.003", "lastModified": "2025-01-08T20:15:30.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the listar_permissoes.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_e parameter. This vulnerability is fixed in 3.2.8." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo XSS (Cross-Site Scripting Reflejado) en el endpoint listar_permissoes.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar secuencias de comandos maliciosas en el par\u00e1metro msg_e. Esta vulnerabilidad se ha corregido en la versi\u00f3n 3.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22145.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22145.json index 384fa6b37ff..9edd9aa7911 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22145.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22145.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-08T21:15:13.480", "lastModified": "2025-01-08T21:15:13.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Carbon is an international PHP extension for DateTime. Application passing unsanitized user input to Carbon::setLocale are at risk of arbitrary file include, if the application allows users to upload files with .php extension in an folder that allows include or require to read it, then they are at risk of arbitrary code ran on their servers. This vulnerability is fixed in 3.8.4 and 2.72.6." + }, + { + "lang": "es", + "value": "Carbon es una extensi\u00f3n internacional de PHP para DateTime. Las aplicaciones que pasan datos de usuario no saneados a Carbon::setLocale corren el riesgo de incluir archivos arbitrarios. Si la aplicaci\u00f3n permite a los usuarios cargar archivos con la extensi\u00f3n .php en una carpeta que permite incluirlos o requiere leerlos, corren el riesgo de que se ejecute c\u00f3digo arbitrario en sus servidores. Esta vulnerabilidad se corrigi\u00f3 en 3.8.4 y 2.72.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22149.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22149.json index 35737f9b142..c3e38f6ba6d 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22149.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22149.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-09T18:15:30.233", "lastModified": "2025-01-09T18:15:30.233", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "JWK Set (JSON Web Key Set) is a JWK and JWK Set Go implementation. Prior to 0.6.0, the project's provided HTTP client's local JWK Set cache should do a full replacement when the goroutine refreshes the remote JWK Set. The current behavior is to overwrite or append. This is a security issue for use cases that utilize the provided auto-caching HTTP client and where key removal from a JWK Set is equivalent to revocation. The affected auto-caching HTTP client was added in version v0.5.0 and fixed in v0.6.0. The only workaround would be to remove the provided auto-caching HTTP client and replace it with a custom implementation. This involves setting the HTTPClientStorageOptions.RefreshInterval to zero (or not specifying the value)." + }, + { + "lang": "es", + "value": "JWK Set (JSON Web Key Set) es una implementaci\u00f3n de JWK y JWK Set Go. Antes de la versi\u00f3n 0.6.0, la cach\u00e9 local de JWK Set del cliente HTTP proporcionado por el proyecto deber\u00eda realizar un reemplazo completo cuando la goroutine actualiza el JWK Set remoto. El comportamiento actual es sobrescribir o agregar. Este es un problema de seguridad para los casos de uso que utilizan el cliente HTTP de almacenamiento en cach\u00e9 autom\u00e1tico proporcionado y donde la eliminaci\u00f3n de claves de un JWK Set es equivalente a la revocaci\u00f3n. El cliente HTTP de almacenamiento en cach\u00e9 autom\u00e1tico afectado se agreg\u00f3 en la versi\u00f3n v0.5.0 y se solucion\u00f3 en la v0.6.0. El \u00fanico workaround ser\u00eda eliminar el cliente HTTP de almacenamiento en cach\u00e9 autom\u00e1tico proporcionado y reemplazarlo con una implementaci\u00f3n personalizada. Esto implica configurar HTTPClientStorageOptions.RefreshInterval en cero (o no especificar el valor)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22151.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22151.json index 74108506856..db737155e80 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22151.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22151.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-09T19:15:20.410", "lastModified": "2025-01-09T19:15:20.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strawberry GraphQL is a library for creating GraphQL APIs. Starting in 0.182.0 and prior to version 0.257.0, a type confusion vulnerability exists in Strawberry GraphQL's relay integration that affects multiple ORM integrations (Django, SQLAlchemy, Pydantic). The vulnerability occurs when multiple GraphQL types are mapped to the same underlying model while using the relay node interface. When querying for a specific type using the global node field (e.g., FruitType:some-id), the resolver may incorrectly return an instance of a different type mapped to the same model (e.g., SpecialFruitType). This can lead to information disclosure if the alternate type exposes sensitive fields and potential privilege escalation if the alternate type contains data intended for restricted access. This vulnerability is fixed in 0.257.0." + }, + { + "lang": "es", + "value": "Strawberry GraphQL es una librer\u00eda para crear API de GraphQL. A partir de la versi\u00f3n 0.182.0 y antes de la versi\u00f3n 0.257.0, existe una vulnerabilidad de confusi\u00f3n de tipos en la integraci\u00f3n de retransmisi\u00f3n de Strawberry GraphQL que afecta a varias integraciones ORM (Django, SQLAlchemy, Pydantic). La vulnerabilidad se produce cuando se asignan varios tipos de GraphQL al mismo modelo subyacente mientras se utiliza la interfaz del nodo de retransmisi\u00f3n. Al consultar un tipo espec\u00edfico mediante el campo de nodo global (por ejemplo, FruitType:some-id), el solucionador puede devolver incorrectamente una instancia de un tipo diferente asignado al mismo modelo (por ejemplo, SpecialFruitType). Esto puede provocar la divulgaci\u00f3n de informaci\u00f3n si el tipo alternativo expone campos confidenciales y una posible escalada de privilegios si el tipo alternativo contiene datos destinados a un acceso restringido. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 0.257.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22215.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22215.json index 55aa4603aca..68e9426e330 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22215.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22215.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2025-01-08T07:15:28.180", "lastModified": "2025-01-08T15:15:21.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22261.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22261.json index 8e8768f5924..4c74c01abf9 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22261.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22261.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:13.290", "lastModified": "2025-01-07T11:15:13.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pixelite WP FullCalendar allows Stored XSS.This issue affects WP FullCalendar: from n/a through 1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Pixelite WP FullCalendar permite XSS almacenado. Este problema afecta a WP FullCalendar: desde n/a hasta 1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22293.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22293.json index 475d13efcd6..f3762c5291d 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22293.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22293.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:13.473", "lastModified": "2025-01-07T11:15:13.473", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gutentor Gutentor allows DOM-Based XSS.This issue affects Gutentor: from n/a through 3.4.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Gutentor Gutentor permite XSS basado en DOM. Este problema afecta a Gutentor: desde n/a hasta 3.4.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22294.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22294.json index 8921cd84172..2a13eee0a5b 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22294.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22294.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:41.137", "lastModified": "2025-01-07T16:15:41.137", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gravity Master Custom Field For WP Job Manager allows Reflected XSS.This issue affects Custom Field For WP Job Manager: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Gravity Master Custom Field For WP Job Manager permite XSS reflejado. Este problema afecta a Custom Field For WP Job Manager: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22295.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22295.json index a00b1e473f2..8c327a288fd 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22295.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22295.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:25.140", "lastModified": "2025-01-09T16:16:25.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tripetto WordPress form builder plugin for contact forms, surveys and quizzes \u2013 Tripetto allows Stored XSS.This issue affects WordPress form builder plugin for contact forms, surveys and quizzes \u2013 Tripetto: from n/a through 8.0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tripetto WordPress form builder plugin para contact forms, surveys y quizzes \u2013 Tripetto permite XSS almacenado. Este problema afecta a WordPress form builder plugin para contact forms, surveys y quizzes \u2013 Tripetto: Tripetto: desde n/a hasta 8.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22296.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22296.json index 04fd1057cff..2c8eb65aace 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22296.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22296.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T17:15:32.520", "lastModified": "2025-01-07T17:15:32.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HashThemes Hash Elements.This issue affects Hash Elements: from n/a through 1.4.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en HashThemes Hash Elements. Este problema afecta a los elementos hash: desde n/a hasta 1.4.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22297.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22297.json index f0f5bdc25c0..a035479e269 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22297.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22297.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:13.630", "lastModified": "2025-01-07T11:15:13.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in AIpost AI WP Writer allows Cross Site Request Forgery.This issue affects AI WP Writer: from n/a through 3.8.4.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en AIpost AI WP Writer permite Cross Site Request Forgery. Este problema afecta a AI WP Writer: desde n/a hasta 3.8.4.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22298.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22298.json index 7ea6debf1da..93fc6f901c1 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22298.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22298.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:13.783", "lastModified": "2025-01-07T11:15:13.783", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Hive Support Hive Support \u2013 WordPress Help Desk allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Hive Support \u2013 WordPress Help Desk: from n/a through 1.1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Hive Support Hive Support \u2013 WordPress Help Desk permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Hive Support \u2013 WordPress Help Desk: desde n/a hasta 1.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22299.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22299.json index ae266ac9e66..734caf6c020 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22299.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22299.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:13.943", "lastModified": "2025-01-07T11:15:13.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in spacecodes AI for SEO allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects AI for SEO: from n/a through 1.2.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en spacecodes AI para SEO permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a AI para SEO: desde n/a hasta 1.2.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22300.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22300.json index d26a0d6743f..41a5b87690d 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22300.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22300.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:14.100", "lastModified": "2025-01-07T11:15:14.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in PixelYourSite PixelYourSite \u2013 Your smart PIXEL (TAG) Manager allows Cross Site Request Forgery.This issue affects PixelYourSite \u2013 Your smart PIXEL (TAG) Manager: from n/a through 10.0.1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en PixelYourSite PixelYourSite \u2013 Your smart PIXEL (TAG) Manager permite Cross Site Request Forgery. Este problema afecta a PixelYourSite \u2013 Your smart PIXEL (TAG) Manager: desde n/a hasta 10.0.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22301.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22301.json index 68068cb3c26..16b4a39634d 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22301.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22301.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:14.240", "lastModified": "2025-01-07T11:15:14.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Stormhill Media MyBookTable Bookstore allows Cross Site Request Forgery.This issue affects MyBookTable Bookstore: from n/a through 3.5.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en MyBookTable Bookstore de Stormhill Media permite Cross Site Request Forgery. Este problema afecta a MyBookTable Bookstore: desde n/a hasta 3.5.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22302.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22302.json index 17956c9d2d3..cac3a4260ff 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22302.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22302.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:14.387", "lastModified": "2025-01-07T11:15:14.387", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in WP Wand WP Wand allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Wand: from n/a through 1.2.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en WP Wand WP Wand permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP Wand: desde n/a hasta 1.2.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22303.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22303.json index 8085d31dc00..a9b62510f46 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22303.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22303.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:14.563", "lastModified": "2025-01-07T11:15:14.563", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insertion of Sensitive Information Into Sent Data vulnerability in brandtoss WP Mailster allows Retrieve Embedded Sensitive Data.This issue affects WP Mailster: from n/a through 1.8.17.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en brandtoss WP Mailster permite recuperar datos confidenciales integrados. Este problema afecta a WP Mailster: desde n/a hasta 1.8.17.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22304.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22304.json index df4342289ca..3228a144b6e 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22304.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22304.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:14.740", "lastModified": "2025-01-07T11:15:14.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in osamaesh WP Visitor Statistics (Real Time Traffic) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Visitor Statistics (Real Time Traffic): from n/a through 7.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en osamaesh WP Visitor Statistics (Real Time Traffic) permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP Visitor Statistics (Real Time Traffic): desde n/a hasta 7.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22305.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22305.json index a09ae704c48..05d591e96f2 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22305.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22305.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:14.907", "lastModified": "2025-01-07T11:15:14.907", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP OnlineSupport, Essential Plugin Hero Banner Ultimate allows PHP Local File Inclusion.This issue affects Hero Banner Ultimate: from n/a through 1.4.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en PHP Program ('PHP Remote File Inclusion') en WP OnlineSupport, Essential Plugin Hero Banner Ultimate permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Hero Banner Ultimate: desde n/a hasta 1.4.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22306.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22306.json index 57bda802f9c..618c4a7b522 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22306.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22306.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T17:15:32.663", "lastModified": "2025-01-07T17:15:32.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Link Whisper Link Whisper Free.This issue affects Link Whisper Free: from n/a through 0.7.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en archivos o directorios de acceso externo en Link Whisper Link Whisper Free. Este problema afecta a Link Whisper Free: desde n/a hasta 0.7.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22307.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22307.json index ce0b710ab45..1a8be87e4e9 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22307.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22307.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:25.347", "lastModified": "2025-01-09T16:16:25.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeAstrology Team Product Table for WooCommerce allows Reflected XSS.This issue affects Product Table for WooCommerce: from n/a through 3.5.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en CodeAstrology Team Product Table para WooCommerce permite XSS reflejado. Este problema afecta a Product Table para WooCommerce: desde n/a hasta 3.5.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22308.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22308.json index f48fbc9c416..240a66f0714 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22308.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22308.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:15.043", "lastModified": "2025-01-07T11:15:15.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in inc2734 Smart Custom Fields allows Stored XSS.This issue affects Smart Custom Fields: from n/a through 5.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en inc2734 Smart Custom Fields permite XSS almacenado. Este problema afecta a Smart Custom Fields: desde n/a hasta 5.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22309.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22309.json index 03745423f86..d4525227cdf 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22309.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22309.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:15.190", "lastModified": "2025-01-07T11:15:15.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Steve D SpeakOut! Email Petitions allows DOM-Based XSS.This issue affects SpeakOut! Email Petitions: from n/a through 4.4.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Steve D SpeakOut! Email Petitions que permite XSS basado en DOM. Este problema afecta a SpeakOut! Email Petitions desde n/a hasta 4.4.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22310.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22310.json index 2bf5f31f19f..89811b6c92c 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22310.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22310.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:15.320", "lastModified": "2025-01-07T11:15:15.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TemplatesNext TemplatesNext ToolKit allows Stored XSS.This issue affects TemplatesNext ToolKit: from n/a through 3.2.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en TemplatesNext TemplatesNext ToolKit permite XSS almacenado. Este problema afecta a TemplatesNext ToolKit: desde n/a hasta 3.2.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22312.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22312.json index 2a55bc15ba0..4959eb47f7e 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22312.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22312.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:15.480", "lastModified": "2025-01-07T11:15:15.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThimPress Thim Elementor Kit allows DOM-Based XSS.This issue affects Thim Elementor Kit: from n/a through 1.2.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ThimPress Thim Elementor Kit permite XSS basado en DOM. Este problema afecta a Thim Elementor Kit: desde n/a hasta 1.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22313.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22313.json index 1578fe909c8..54f7a5b4400 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22313.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22313.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:25.653", "lastModified": "2025-01-09T16:16:25.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Widgetize Pages Light allows Reflected XSS.This issue affects Widgetize Pages Light: from n/a through 3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en OTWthemes Widgetize Pages Light permite XSS reflejado. Este problema afecta a Widgetize Pages Light: desde n/a hasta 3.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22315.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22315.json index 062416332bf..65874fbad56 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22315.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22315.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:15.627", "lastModified": "2025-01-07T11:15:15.627", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDeveloper Typing Text allows Stored XSS.This issue affects Typing Text: from n/a through 1.2.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPDeveloper Typing Text permite XSS almacenado. Este problema afecta a Typing Text: desde n/a hasta 1.2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22316.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22316.json index 4ec4c661484..e1694e1940b 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22316.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22316.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:15.763", "lastModified": "2025-01-07T11:15:15.763", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPBits WPBITS Addons For Elementor Page Builder allows Stored XSS.This issue affects WPBITS Addons For Elementor Page Builder: from n/a through 1.5.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPBits WPBITS Addons For Elementor Page Builder permite XSS almacenado. Este problema afecta a WPBITS Addons For Elementor Page Builder: desde n/a hasta 1.5.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22319.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22319.json index 4e2db9aecc0..3d7fa0500d7 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22319.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22319.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T17:15:32.810", "lastModified": "2025-01-07T17:15:32.810", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in DearHive Social Media Share Buttons | MashShare.This issue affects Social Media Share Buttons | MashShare: from n/a through 4.0.47." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en DearHive Social Media Share Buttons | MashShare. Este problema afecta a Social Media Share Buttons | MashShare: desde n/a hasta 4.0.47." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22320.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22320.json index defbff19276..5b2b8a39635 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22320.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22320.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:15.910", "lastModified": "2025-01-07T11:15:15.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ProductDyno ProductDyno allows Reflected XSS.This issue affects ProductDyno: from n/a through 1.0.24." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ProductDyno ProductDyno permite XSS reflejado. Este problema afecta a ProductDyno: desde n/a hasta 1.0.24." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22321.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22321.json index d03a871ccb8..a5675949aef 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22321.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22321.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:16.073", "lastModified": "2025-01-07T11:15:16.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TheInnovs ElementsCSS Addons for Elementor allows Stored XSS.This issue affects ElementsCSS Addons for Elementor: from n/a through 1.0.8.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en TheInnovs ElementsCSS Addons para Elementor permite XSS almacenado. Este problema afecta a ElementsCSS Addons para Elementor: desde n/a hasta 1.0.8.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22323.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22323.json index a777f27a64d..7696435fecc 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22323.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22323.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:16.297", "lastModified": "2025-01-07T11:15:16.297", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jewel Theme Image Hover Effects for Elementor allows Stored XSS.This issue affects Image Hover Effects for Elementor: from n/a through 1.0.2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Jewel Theme Image Hover Effects para Elementor permite XSS almacenado. Este problema afecta a los efectos de desplazamiento de im\u00e1genes para Elementor: desde n/a hasta 1.0.2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22324.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22324.json index 888a1427c3e..d7488f48b46 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22324.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22324.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:16.437", "lastModified": "2025-01-07T11:15:16.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Andon Ivanov OZ Canonical allows Reflected XSS.This issue affects OZ Canonical: from n/a through 0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Andon Ivanov OZ Canonical permite XSS reflejado. Este problema afecta a OZ Canonical: desde n/a hasta 0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22325.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22325.json index 9fe63adae2f..93768e688f9 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22325.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22325.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:16.577", "lastModified": "2025-01-07T11:15:16.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Nik Chankov Autocompleter allows Stored XSS.This issue affects Autocompleter: from n/a through 1.3.5.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Nik Chankov Autocompleter permite XSS almacenado. Este problema afecta a Autocompleter: desde n/a hasta 1.3.5.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22326.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22326.json index 13eebc45019..7f2a50f8d2d 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22326.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22326.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:16.730", "lastModified": "2025-01-07T11:15:16.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 5centsCDN 5centsCDN allows Reflected XSS.This issue affects 5centsCDN: from n/a through 24.8.16." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en 5centsCDN 5centsCDN permite XSS reflejado. Este problema afecta a 5centsCDN: desde n/a hasta el 24.8.16." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22327.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22327.json index cde6fb6905c..184b96eb4c3 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22327.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22327.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:16.870", "lastModified": "2025-01-07T11:15:16.870", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer EO4WP allows Stored XSS.This issue affects EO4WP: from n/a through 1.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Olaf Lederer EO4WP permite XSS almacenado. Este problema afecta a EO4WP: desde n/a hasta 1.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22328.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22328.json index cdc49be480c..c9ee54086e6 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22328.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22328.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:17.020", "lastModified": "2025-01-07T11:15:17.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Elevio Elevio allows Stored XSS.This issue affects Elevio: from n/a through 4.4.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Elevio Elevio permite XSS almacenado. Este problema afecta a Elevio: desde n/a hasta 4.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22330.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22330.json index 0e9cf6a00c7..79fe70841ec 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22330.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22330.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:25.840", "lastModified": "2025-01-09T16:16:25.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mahesh Waghmare MG Parallax Slider allows Reflected XSS.This issue affects MG Parallax Slider: from n/a through 1.0.." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Mahesh Waghmare MG Parallax Slider permite XSS reflejado. Este problema afecta a MG Parallax Slider: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22331.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22331.json index df8bfe2db8c..65cfacf13e3 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22331.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22331.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:26.180", "lastModified": "2025-01-09T16:16:26.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in P3JX Cf7Save Extension allows Reflected XSS.This issue affects Cf7Save Extension: from n/a through 1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en P3JX Cf7Save Extension permite XSS reflejado. Este problema afecta a la extensi\u00f3n Cf7Save: desde n/a hasta 1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22333.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22333.json index f66e2fd685b..d9f705ec0d7 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22333.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22333.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:17.160", "lastModified": "2025-01-07T11:15:17.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Piotnet Piotnet Addons For Elementor allows Stored XSS.This issue affects Piotnet Addons For Elementor: from n/a through 2.4.31." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Piotnet Piotnet Addons For Elementor permite XSS almacenado. Este problema afecta a Piotnet Addons For Elementor: desde n/a hasta 2.4.31." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22334.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22334.json index c1ff21cdce0..975f56f79b7 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22334.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22334.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T17:15:32.953", "lastModified": "2025-01-07T17:15:32.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FilaThemes Education LMS allows Stored XSS.This issue affects Education LMS: from n/a through 0.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en FilaThemes Education LMS permite XSS almacenado. Este problema afecta a Education LMS: desde n/a hasta 0.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22335.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22335.json index f6898d78ed6..d9ce4ec8404 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22335.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22335.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:42.703", "lastModified": "2025-01-07T16:15:42.703", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Md. Rajib Dewan Opencart Product in WP allows Reflected XSS.This issue affects Opencart Product in WP: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Md. Rajib Dewan Opencart Product en WP permite XSS reflejado. Este problema afecta a Opencart Product en WP: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22336.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22336.json index 82931096183..6c0db2994d8 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22336.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22336.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:17.313", "lastModified": "2025-01-07T11:15:17.313", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WordPress \u667a\u5e93 Wizhi Multi Filters by Wenprise allows Stored XSS.This issue affects Wizhi Multi Filters by Wenprise: from n/a through 1.8.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WordPress??Wizhi Multi Filters de Wenprise permite XSS almacenado. Este problema afecta a Wizhi Multi Filters de Wenprise: desde n/a hasta 1.8.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22338.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22338.json index 50cd3013a1e..632dcaf8c8a 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22338.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22338.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:44.117", "lastModified": "2025-01-07T16:15:44.117", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in lich_wang WP-tagMaker allows Reflected XSS.This issue affects WP-tagMaker: from n/a through 0.2.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en lich_wang WP-tagMaker permite XSS reflejado. Este problema afecta a WP-tagMaker: desde n/a hasta 0.2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22339.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22339.json index 14dd978af30..5c2adf3b2c8 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22339.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22339.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:17.463", "lastModified": "2025-01-07T11:15:17.463", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aThemeArt Store Commerce allows DOM-Based XSS.This issue affects Store Commerce: from n/a through 1.2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en aThemeArt Store Commerce permite XSS basado en DOM. Este problema afecta a Store Commerce: desde n/a hasta 1.2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22342.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22342.json index 688b6e42a9f..395723ca633 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22342.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22342.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:17.610", "lastModified": "2025-01-07T11:15:17.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Jens T\u00f6rnell WP Simple Sitemap allows Stored XSS.This issue affects WP Simple Sitemap: from n/a through 0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP Simple Sitemap de Jens T\u00f6rnell permite XSS almacenado. Este problema afecta a WP Simple Sitemap: desde n/a hasta 0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22343.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22343.json index ec282b0345a..ecef9ccba8c 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22343.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22343.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:17.743", "lastModified": "2025-01-07T11:15:17.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22345.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22345.json index a6914d9687e..030ddc70ad7 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22345.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22345.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:26.620", "lastModified": "2025-01-09T16:16:26.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tobias Spiess TS Comfort DB allows Reflected XSS.This issue affects TS Comfort DB: from n/a through 2.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tobias Spiess TS Comfort DB permite XSS reflejado. Este problema afecta a TS Comfort DB: desde n/a hasta 2.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22347.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22347.json index 7593856d12d..d7f4d305c90 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22347.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22347.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:17.897", "lastModified": "2025-01-07T11:15:17.897", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22348.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22348.json index fe5ecc36627..034d2c9a01f 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22348.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22348.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:18.037", "lastModified": "2025-01-07T11:15:18.037", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22349.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22349.json index ca372dbda18..fa6b0f78b12 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22349.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22349.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:18.183", "lastModified": "2025-01-07T11:15:18.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22350.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22350.json index d6482af5193..03ac5f4a38c 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22350.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22350.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T17:15:33.093", "lastModified": "2025-01-07T17:15:33.093", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WpIndeed Ultimate Learning Pro allows SQL Injection.This issue affects Ultimate Learning Pro: from n/a through 3.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en WpIndeed Ultimate Learning Pro permite la inyecci\u00f3n SQL. Este problema afecta a Ultimate Learning Pro: desde n/a hasta 3.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22351.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22351.json index 07b0ab014e4..821c3cf165c 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22351.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22351.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:18.330", "lastModified": "2025-01-07T11:15:18.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22352.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22352.json index 236248372c0..111d4babd10 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22352.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22352.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:18.527", "lastModified": "2025-01-07T11:15:18.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22353.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22353.json index ff51b3a6adb..8a6cc52e013 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22353.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22353.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:18.693", "lastModified": "2025-01-07T11:15:18.693", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22354.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22354.json index 05b1f55f1ba..453c657fd36 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22354.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22354.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T17:15:33.230", "lastModified": "2025-01-07T17:15:33.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Code Themes Digi Store allows DOM-Based XSS.This issue affects Digi Store: from n/a through 1.1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Code Themes Digi Store permite XSS basado en DOM. Este problema afecta a Digi Store: desde n/a hasta 1.1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22355.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22355.json index 260c68367c5..5026702713b 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22355.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22355.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:18.857", "lastModified": "2025-01-07T11:15:18.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22357.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22357.json index 7cc805fe8ad..d245e215a89 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22357.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22357.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:19.013", "lastModified": "2025-01-07T11:15:19.013", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22358.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22358.json index 433bb2db495..6f6bcf5437b 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22358.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22358.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:19.167", "lastModified": "2025-01-07T11:15:19.167", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22359.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22359.json index 4bfbbc95ad0..d2f8a437254 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22359.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22359.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:19.310", "lastModified": "2025-01-07T11:15:19.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22361.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22361.json index 0df60b4741f..6edc2238472 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22361.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22361.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:26.830", "lastModified": "2025-01-09T16:16:26.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Opentracker Opentracker Analytics allows Reflected XSS.This issue affects Opentracker Analytics: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Opentracker Opentracker Analytics permite XSS reflejado. Este problema afecta a Opentracker Analytics: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22362.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22362.json index 77566f697b6..9b6c7067d09 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22362.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22362.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:19.453", "lastModified": "2025-01-07T11:15:19.453", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22363.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22363.json index 12a4581d47a..32718e3b4e8 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22363.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22363.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T17:15:33.377", "lastModified": "2025-01-07T17:15:33.377", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in ORION Allada T-shirt Designer for Woocommerce.This issue affects Allada T-shirt Designer for Woocommerce: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en ORION Allada T-shirt Designer para Woocommerce. Este problema afecta a Allada T-shirt Designer para Woocommerce: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22364.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22364.json index fde472bf45f..92ada6e3833 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22364.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22364.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:19.600", "lastModified": "2025-01-07T11:15:19.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22365.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22365.json index d5efecbaff7..508f86360e4 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22365.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22365.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T17:15:33.510", "lastModified": "2025-01-07T17:15:33.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric McNiece EMC2 Alert Boxes allows Stored XSS.This issue affects EMC2 Alert Boxes: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Eric McNiece EMC2 Alert Boxes permite XSS almacenado. Este problema afecta a EMC2 Alert Boxes: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22383.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22383.json index 4ede17e79fe..403783f585a 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22383.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22383.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity input validation issue exists in the Commerce B2B application, affecting the Contact Us functionality. This allows visitors to send e-mail messages that could contain unfiltered HTML markup in specific scenarios." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Optimizely Configured Commerce antes de la versi\u00f3n 5.2.2408. Existe un problema de validaci\u00f3n de entrada de gravedad media en la aplicaci\u00f3n Commerce B2B, que afecta la funci\u00f3n Contact Us. Esto permite que los visitantes env\u00eden mensajes de correo electr\u00f3nico que podr\u00edan contener marcado HTML sin filtrar en situaciones espec\u00edficas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22384.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22384.json index ce06a90e8ef..7257eaa41ec 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22384.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22384.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue concerning business logic exists in the Commerce B2B application, which allows storefront visitors to purchase discontinued products in specific scenarios where requests are altered before reaching the server." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Optimizely Configured Commerce antes de la versi\u00f3n 5.2.2408. Existe un problema de gravedad media relacionado con la l\u00f3gica empresarial en la aplicaci\u00f3n Commerce B2B, que permite que los visitantes de la tienda compren productos discontinuados en situaciones espec\u00edficas en las que las solicitudes se modifican antes de llegar al servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22385.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22385.json index 7ca96543d7b..c1ba1fd76a2 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22385.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22385.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. For newly created accounts, the Commerce B2B application does not require email confirmation. This medium-severity issue allows the mass creation of accounts. This could affect database storage; also, non-requested storefront accounts can be created on behalf of visitors." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Optimizely Configured Commerce antes de la versi\u00f3n 5.2.2408. En el caso de las cuentas reci\u00e9n creadas, la aplicaci\u00f3n Commerce B2B no requiere confirmaci\u00f3n por correo electr\u00f3nico. Este problema de gravedad media permite la creaci\u00f3n masiva de cuentas. Esto podr\u00eda afectar el almacenamiento de la base de datos; adem\u00e1s, se pueden crear cuentas de tienda no solicitadas en nombre de los visitantes." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22386.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22386.json index 6fbd98ebb42..0e0854d9083 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22386.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22386.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity session issue exists in the Commerce B2B application, affecting the longevity of active sessions in the storefront. This allows session tokens tied to logged-out sessions to still be active and usable." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Optimizely Configured Commerce antes de la versi\u00f3n 5.2.2408. Existe un problema de sesi\u00f3n de gravedad media en la aplicaci\u00f3n Commerce B2B, que afecta la longevidad de las sesiones activas en la tienda. Esto permite que los tokens de sesi\u00f3n vinculados a sesiones cerradas sigan activos y se puedan usar." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22387.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22387.json index ee00ac5ed08..e6718b0cd9e 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22387.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22387.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Optimizely Configured Commerce antes de la versi\u00f3n 5.2.2408. Existe un problema de gravedad media en las solicitudes de recursos en las que el token de sesi\u00f3n se env\u00eda como un par\u00e1metro de URL. Esto expone informaci\u00f3n sobre la sesi\u00f3n autenticada, que se puede aprovechar para el secuestro de sesiones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22388.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22388.json index 3c6fbf197d1..2c3715ead6d 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22388.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22388.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.22.0. A high-severity Stored Cross-Site Scripting (XSS) vulnerability exists in the CMS, allowing malicious actors to inject and execute arbitrary JavaScript code, potentially compromising user data, escalating privileges, or executing unauthorized actions. The issue exists in multiple areas, including content editing, link management, and file uploads." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Optimizely EPiServer.CMS.Core antes de la versi\u00f3n 12.22.0. Existe una vulnerabilidad de cross site scripting almacenado (XSS) de alta gravedad en el CMS, que permite a los actores maliciosos inyectar y ejecutar c\u00f3digo JavaScript arbitrario, lo que podr\u00eda comprometer los datos del usuario, aumentar los privilegios o ejecutar acciones no autorizadas. El problema existe en varias \u00e1reas, incluida la edici\u00f3n de contenido, la administraci\u00f3n de enlaces y la carga de archivos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22389.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22389.json index 5c39afec600..b8fb0eb7b4d 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22389.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22389.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-04T02:15:07.600", "lastModified": "2025-01-04T03:15:07.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS, where the application does not properly validate uploaded files. This allows the upload of potentially malicious file types, including .docm .html. When accessed by application users, these files can be used to execute malicious actions or compromise users' systems." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Optimizely EPiServer.CMS.Core antes de la versi\u00f3n 12.32.0. Existe una vulnerabilidad de gravedad media en el CMS, donde la aplicaci\u00f3n no valida correctamente los archivos cargados. Esto permite la carga de tipos de archivos potencialmente maliciosos, incluidos .docm y .html. Cuando los usuarios de la aplicaci\u00f3n acceden a estos archivos, estos pueden usarse para ejecutar acciones maliciosas o comprometer los sistemas de los usuarios." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22390.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22390.json index 350ec824e01..9a3b6b11ecd 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22390.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22390.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS due to insufficient enforcement of password complexity requirements. The application permits users to set passwords with a minimum length of 6 characters, lacking adequate complexity to resist modern attack techniques such as password spraying or offline password cracking." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Optimizely EPiServer.CMS.Core antes de la versi\u00f3n 12.32.0. Existe una vulnerabilidad de gravedad media en el CMS debido a la aplicaci\u00f3n insuficiente de los requisitos de complejidad de las contrase\u00f1as. La aplicaci\u00f3n permite a los usuarios establecer contrase\u00f1as con una longitud m\u00ednima de 6 caracteres, lo que no es lo suficientemente complejo como para resistir las t\u00e9cnicas de ataque modernas, como la pulverizaci\u00f3n de contrase\u00f1as o el descifrado de contrase\u00f1as sin conexi\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22395.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22395.json index 7b4b370e841..bac83658be6 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22395.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22395.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-07T03:15:06.047", "lastModified": "2025-01-07T03:15:06.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Update Package Framework, versions prior to 22.01.02, contain(s) a Local Privilege Escalation Vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary remote scripts on the server. Exploitation may lead to a denial of service by an attacker." + }, + { + "lang": "es", + "value": "Dell Update Package Framework, versiones anteriores a la 22.01.02, contiene una vulnerabilidad de escalada de privilegios locales. Un atacante local con poco nivel de privilegios podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de scripts remotos arbitrarios en el servidor. La explotaci\u00f3n puede provocar una denegaci\u00f3n de servicio por parte de un atacante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22445.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22445.json index 11006033af8..132fd9d55d7 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22445.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22445.json @@ -3,12 +3,16 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-01-09T07:15:28.617", "lastModified": "2025-01-09T07:15:28.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 10.x <= 10.2 fail to accurately reflect missing settings, which allows confusion for admins regarding a Calls security-sensitive configuration via incorrect UI reporting." + }, + { + "lang": "es", + "value": "Las versiones 10.x <= 10.2 de Mattermost no reflejan con precisi\u00f3n las configuraciones faltantes, lo que genera confusi\u00f3n entre los administradores con respecto a una configuraci\u00f3n de seguridad de llamadas sensible a trav\u00e9s de informes de IU incorrectos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22449.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22449.json index 73d1489f44d..36854797134 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22449.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22449.json @@ -3,12 +3,16 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-01-09T07:15:28.777", "lastModified": "2025-01-09T07:15:28.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 9.11.x <= 9.11.5 fail to enforce invite permissions, which allows team admins, with no permission to invite users to their team, to invite users by updating the \"allow_open_invite\" field via making their team public." + }, + { + "lang": "es", + "value": "Las versiones 9.11.x <= 9.11.5 de Mattermost no aplican los permisos de invitaci\u00f3n, lo que permite a los administradores de equipo, sin permiso para invitar usuarios a su equipo, invitar a los usuarios actualizando el campo \"allow_open_invite\" haciendo p\u00fablico su equipo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22500.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22500.json index 9af2c0a0d5f..52f1f7a9bf7 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22500.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22500.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T17:15:33.657", "lastModified": "2025-01-07T17:15:33.657", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ali Ali Alpha Price Table For Elementor allows DOM-Based XSS.This issue affects Alpha Price Table For Elementor: from n/a through 1.0.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Ali Ali Alpha Price Table For Elementor permite XSS basado en DOM. Este problema afecta a Alpha Price Table For Elementor: desde n/a hasta 1.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22502.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22502.json index 689b4d98383..bbb45cfa273 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22502.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22502.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:45.717", "lastModified": "2025-01-07T16:15:45.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mindvalley MindValley Super PageMash allows SQL Injection.This issue affects MindValley Super PageMash: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Mindvalley MindValley Super PageMash permite la inyecci\u00f3n SQL. Este problema afecta a MindValley Super PageMash: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22503.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22503.json index 1a716db5331..555e5c61b4c 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22503.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22503.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:45.877", "lastModified": "2025-01-07T16:15:45.877", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Digital Zoom Studio Admin debug wordpress \u2013 enable debug allows Cross Site Request Forgery.This issue affects Admin debug wordpress \u2013 enable debug: from n/a through 1.0.13." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Digital Zoom Studio Admin debug wordpress \u2013 enable debug permite Cross Site Request Forgery. Este problema afecta a Admin debug wordpress \u2013 enable debug: desde n/a hasta 1.0.13." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22504.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22504.json index 781996c101b..abf6aa63b57 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22504.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22504.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:27.110", "lastModified": "2025-01-09T16:16:27.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in jumpdemand 4ECPS Web Forms allows Upload a Web Shell to a Web Server.This issue affects 4ECPS Web Forms: from n/a through 0.2.18." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en jumpdemand 4ECPS Web Forms permite cargar un shell web a un servidor web. Este problema afecta a 4ECPS Web Forms: desde n/a hasta 0.2.18." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22505.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22505.json index e3d33b6db64..58918961c7f 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22505.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22505.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:27.280", "lastModified": "2025-01-09T16:16:27.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nabaraj Chapagain NC Wishlist for Woocommerce allows SQL Injection.This issue affects NC Wishlist for Woocommerce: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Nabaraj Chapagain NC Wishlist para Woocommerce permite la inyecci\u00f3n SQL. Este problema afecta a NC Wishlist para Woocommerce: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22507.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22507.json index 4b98efe749a..e65ec3d7ed6 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22507.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22507.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:46.040", "lastModified": "2025-01-07T16:15:46.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Benjamin Santalucia (ben@woow-fr.com) WPMU Prefill Post allows SQL Injection.This issue affects WPMU Prefill Post: from n/a through 1.02." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Benjamin Santalucia (ben@woow-fr.com) WPMU Prefill Post permite la inyecci\u00f3n SQL. Este problema afecta a WPMU Prefill Post: desde n/a hasta 1.02." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22508.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22508.json index ac747a619f7..11c6c52c244 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22508.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22508.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:27.433", "lastModified": "2025-01-09T16:16:27.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Roninwp FAT Event Lite allows PHP Local File Inclusion.This issue affects FAT Event Lite: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Roninwp FAT Event Lite permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a FAT Event Lite: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22510.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22510.json index 586a129f2c4..82c6fa7693e 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22510.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22510.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:27.590", "lastModified": "2025-01-09T16:16:27.590", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Konrad Karpieszuk WC Price History for Omnibus allows Object Injection.This issue affects WC Price History for Omnibus: from n/a through 2.1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Konrad Karpieszuk WC Price History para Omnibus permite la inyecci\u00f3n de objetos. Este problema afecta a WC Price History para Omnibus: desde n/a hasta 2.1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22511.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22511.json index 378bd7fbdc3..a8de8efef65 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22511.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22511.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:46.180", "lastModified": "2025-01-07T16:15:46.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ella van Durpe Slides & Presentations allows Stored XSS.This issue affects Slides & Presentations: from n/a through 0.0.39." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Ella van Durpe Slides & Presentations permite XSS almacenado. Este problema afecta a Slides y Presentations: desde n/a hasta 0.0.39." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22512.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22512.json index ccfcc2af17b..2f9a5276597 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22512.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22512.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:46.320", "lastModified": "2025-01-07T16:15:46.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Sprout Apps Help Scout allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Help Scout: from n/a through 6.5.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Sprout Apps Help Scout permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Help Scout: desde n/a hasta 6.5.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22515.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22515.json index 0356ada6ce2..09217ffe4ba 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22515.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22515.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:46.497", "lastModified": "2025-01-07T16:15:46.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Simon Chuang Show Google Analytics widget allows Stored XSS.This issue affects Show Google Analytics widget: from n/a through 1.5.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Simon Chuang Show Google Analytics widget permite XSS almacenado. Este problema afecta a Show Google Analytics widget: desde n/a hasta 1.5.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22516.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22516.json index 0def5882c3b..1edb877dce9 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22516.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22516.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:46.653", "lastModified": "2025-01-07T16:15:46.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hitesh Patel Metadata SEO allows Stored XSS.This issue affects Metadata SEO: from n/a through 2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Hitesh Patel Metadata SEO permite XSS almacenado. Este problema afecta a Metadata SEO: desde n/a hasta 2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22517.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22517.json index 024a04e0472..763ebf02f17 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22517.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22517.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:46.820", "lastModified": "2025-01-07T16:15:46.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ben Huson List Pages at Depth allows Stored XSS.This issue affects List Pages at Depth: from n/a through 1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Ben Huson List Pages en Depth permite XSS almacenado. Este problema afecta a List Pages en Depth: desde n/a hasta 1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22518.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22518.json index cc5b5a0aadd..40c14e92470 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22518.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22518.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:46.990", "lastModified": "2025-01-07T16:15:46.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in KentoThemes Justified Image Gallery allows Stored XSS.This issue affects Justified Image Gallery: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en KentoThemes Justified Image Gallery permite XSS almacenado. Este problema afecta a Justified Image Gallery: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22519.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22519.json index a7c0b3cd785..427900c3c5d 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22519.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22519.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:47.140", "lastModified": "2025-01-07T16:15:47.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in eDoc Intelligence LLC eDoc Easy Tables allows SQL Injection.This issue affects eDoc Easy Tables: from n/a through 1.29." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en eDoc Intelligence LLC eDoc Easy Tables permite la inyecci\u00f3n SQL. Este problema afecta a eDoc Easy Tables: desde n/a hasta 1.29." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22520.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22520.json index cf2c3f73e39..79acc4c27ee 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22520.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22520.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:47.310", "lastModified": "2025-01-07T16:15:47.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Tock Tock Widget allows Cross Site Request Forgery.This issue affects Tock Widget: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Tock Tock Widget permite Cross Site Request Forgery. Este problema afecta a Tock Widget: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22521.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22521.json index 8a723ff496b..00cad2e4f0f 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22521.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22521.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:27.743", "lastModified": "2025-01-09T16:16:27.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Farrell wp Hosting Performance Check allows Reflected XSS.This issue affects wp Hosting Performance Check: from n/a through 2.18.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Scott Farrell wp Hosting Performance Check permite XSS reflejado. Este problema afecta a wp Hosting Performance Check: desde n/a hasta 2.18.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22522.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22522.json index 0a58141ae74..4d33cc912a0 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22522.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22522.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:47.513", "lastModified": "2025-01-07T16:15:47.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Roya Khosravi SingSong allows Stored XSS.This issue affects SingSong: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Roya Khosravi SingSong permite XSS almacenado. Este problema afecta a SingSong: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22524.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22524.json index f41aa525fed..ab4c1fddf0a 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22524.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22524.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:47.680", "lastModified": "2025-01-07T16:15:47.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in instaform.ir \u0641\u0631\u0645 \u0633\u0627\u0632 \u0641\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 allows Stored XSS.This issue affects \u0641\u0631\u0645 \u0633\u0627\u0632 \u0641\u0631\u0645 \u0627\u0641\u0632\u0627\u0631: from n/a through 2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en instaform.ir ??? ??? ??? ????? permite XSS Almacenado. Este problema afecta a ??? ??? ??? ?????: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22525.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22525.json index 106cf914fe7..80a6d1446a7 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22525.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22525.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:47.830", "lastModified": "2025-01-07T16:15:47.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bharatkambariya Donation Block For PayPal allows Stored XSS.This issue affects Donation Block For PayPal: from n/a through 2.2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en bharatkambariya Donation Block For PayPal permite XSS almacenado. Este problema afecta a Donation Block For PayPal: desde n/a hasta 2.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22527.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22527.json index 51df2b640c8..eda1a03455e 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22527.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22527.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:27.890", "lastModified": "2025-01-09T16:16:27.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yamna Khawaja Mailing Group Listserv allows SQL Injection.This issue affects Mailing Group Listserv: from n/a through 2.0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Yamna Khawaja Mailing Group Listserv permite la inyecci\u00f3n SQL. Este problema afecta a Mailing Group Listserv: desde n/a hasta 2.0.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22528.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22528.json index d5a52319a0c..f0e24ba6bda 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22528.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22528.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:47.987", "lastModified": "2025-01-07T16:15:47.987", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Huurkalender Huurkalender WP allows Stored XSS.This issue affects Huurkalender WP: from n/a through 1.5.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Huurkalender Huurkalender WP permite XSS almacenado. Este problema afecta a Huurkalender WP: desde n/a hasta 1.5.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22529.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22529.json index 9ba558fcda9..947a034ced8 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22529.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22529.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:48.180", "lastModified": "2025-01-07T16:15:48.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WORDPRESTEEM WE Blocks allows Stored XSS.This issue affects WE Blocks: from n/a through 1.3.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WORDPRESTEEM WE Blocks permite XSS almacenado. Este problema afecta a WE Blocks: desde n/a hasta 1.3.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22530.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22530.json index 55da6ac392e..6030d7fc3f7 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22530.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22530.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:48.350", "lastModified": "2025-01-07T16:15:48.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SIOT \uc544\uc784\ud3ec\ud2b8 \uacb0\uc81c\ubc84\ud2bc \uc0dd\uc131 \ud50c\ub7ec\uadf8\uc778 allows Stored XSS.This issue affects \uc544\uc784\ud3ec\ud2b8 \uacb0\uc81c\ubc84\ud2bc \uc0dd\uc131 \ud50c\ub7ec\uadf8\uc778: from n/a through 1.1.19." + }, + { + "lang": "es", + "value": "Neutralizaci\u00f3n inadecuada de la entrada durante la vulnerabilidad de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en SIOT ???? ???? ?? ???? permite XSS almacenado. Este problema afecta a ???? ???? ?? ????: desde n/a hasta el 1.1.19." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22531.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22531.json index e27d1d1c286..38aa6685189 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22531.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22531.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:48.520", "lastModified": "2025-01-07T16:15:48.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in M Bilal M Urdu Formatter \u2013 Shamil allows Stored XSS.This issue affects Urdu Formatter \u2013 Shamil: from n/a through 0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en M Bilal M Urdu Formatter \u2013 Shamil permite XSS almacenado. Este problema afecta a Urdu Formatter \u2013 Shamil: desde n/a hasta 0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22532.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22532.json index d451007aa03..af8523572a0 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22532.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22532.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:48.747", "lastModified": "2025-01-07T16:15:48.747", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nagy Sandor Simple Photo Sphere allows Stored XSS.This issue affects Simple Photo Sphere: from n/a through 0.0.10." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Nagy Sandor Simple Photo Sphere permite XSS almacenado. Este problema afecta a Simple Photo Sphere: desde n/a hasta 0.0.10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22533.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22533.json index ea609d26f62..2b32b8c526e 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22533.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22533.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:48.980", "lastModified": "2025-01-07T16:15:48.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WOOEXIM.COM WOOEXIM allows SQL Injection.This issue affects WOOEXIM: from n/a through 5.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en WOOEXIM.COM WOOEXIM permite la inyecci\u00f3n SQL. Este problema afecta a WOOEXIM: desde n/a hasta 5.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22534.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22534.json index 7df17cddf86..c1857e52dfb 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22534.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22534.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:49.130", "lastModified": "2025-01-07T16:15:49.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Ella van Durpe Slides & Presentations allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Slides & Presentations: from n/a through 0.0.39." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Ella van Durpe Slides & Presentations permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Slides y Presentations: desde n/a hasta 0.0.39." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22535.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22535.json index 4aed2d80f5d..363d20cc640 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22535.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22535.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.047", "lastModified": "2025-01-09T16:16:28.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Jonathan Kern WPListCal allows SQL Injection.This issue affects WPListCal: from n/a through 1.3.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Jonathan Kern WPListCal permite la inyecci\u00f3n SQL. Este problema afecta a WPListCal: desde n/a hasta 1.3.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22536.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22536.json index 29104ac9ad7..14f5ce5211d 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22536.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22536.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:49.293", "lastModified": "2025-01-07T16:15:49.293", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hiren Patel WP Music Player allows SQL Injection.This issue affects WP Music Player: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Hiren Patel WP Music Player permite la inyecci\u00f3n SQL. Este problema afecta a WP Music Player: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22537.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22537.json index b0a0b47a42b..c684cda41b6 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22537.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22537.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.210", "lastModified": "2025-01-09T16:16:28.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in traveller11 Google Maps Travel Route allows SQL Injection.This issue affects Google Maps Travel Route: from n/a through 1.3.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en traveller11 Google Maps Travel Route permite la inyecci\u00f3n SQL. Este problema afecta a Google Maps Travel Route: desde n/a hasta 1.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22538.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22538.json index dd9964a7f72..6145feec16f 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22538.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22538.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:49.460", "lastModified": "2025-01-07T16:15:49.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ofek Nakar Virtual Bot allows Stored XSS.This issue affects Virtual Bot: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Ofek Nakar Virtual Bot permite XSS almacenado. Este problema afecta a Virtual Bot: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22539.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22539.json index b8c0acb7b80..7d3cb27861b 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22539.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22539.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.350", "lastModified": "2025-01-09T16:16:28.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ka2 Custom DataBase Tables allows Reflected XSS.This issue affects Custom DataBase Tables: from n/a through 2.1.34." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ka2 Custom DataBase Tables permite XSS reflejado. Este problema afecta a Custom DataBase Tables: desde n/a hasta 2.1.34." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22540.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22540.json index 4ec08741573..bbdc956e86c 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22540.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22540.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.503", "lastModified": "2025-01-09T16:16:28.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sebastian Orellana Emailing Subscription allows Blind SQL Injection.This issue affects Emailing Subscription: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Sebastian Orellana Emailing Subscription permite una inyecci\u00f3n SQL ciega. Este problema afecta a Emailing Subscription: desde n/a hasta 1.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22541.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22541.json index 976da6a0c04..8be48ef4234 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22541.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22541.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:49.670", "lastModified": "2025-01-07T16:15:49.670", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Etruel Developments LLC WP Delete Post Copies allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Delete Post Copies: from n/a through 5.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en WP Delete Post Copies de Etruel Developments LLC permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP Delete Post Copies: desde n/a hasta 5.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22542.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22542.json index 1a2f8c5deda..1c43b9be5da 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22542.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22542.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.670", "lastModified": "2025-01-09T16:16:28.670", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ofek Nakar Virtual Bot allows Blind SQL Injection.This issue affects Virtual Bot: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Ofek Nakar Virtual Bot permite una inyecci\u00f3n SQL ciega. Este problema afecta a Virtual Bot: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22543.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22543.json index eaba55712c1..96b99094aed 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22543.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22543.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:49.830", "lastModified": "2025-01-07T16:15:49.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Beautiful Templates ST Gallery WP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ST Gallery WP: from n/a through 1.0.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Beautiful Templates ST Gallery WP permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a ST Gallery WP: desde n/a hasta 1.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22544.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22544.json index 2a87a51ac09..b7e80cff8ed 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22544.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22544.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:50.003", "lastModified": "2025-01-07T16:15:50.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mind Doodle Mind Doodle Visual Sitemaps & Tasks allows Stored XSS.This issue affects Mind Doodle Visual Sitemaps & Tasks: from n/a through 1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Mind Doodle Mind Doodle Visual Sitemaps y Tasks permite XSS almacenado. Este problema afecta a Mind Doodle Visual Sitemaps y Tasks: desde n/a hasta 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22545.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22545.json index e4ea85594f5..1df5ab3c239 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22545.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22545.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:50.140", "lastModified": "2025-01-07T16:15:50.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sw-galati.ro iframe to embed allows Stored XSS.This issue affects iframe to embed: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en sw-galati.ro iframe para embed permite XSS almacenado. Este problema afecta a iframe para embed: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22546.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22546.json index 060ef1dac06..80caaedf269 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22546.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22546.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:50.300", "lastModified": "2025-01-07T16:15:50.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in One Plus Solution jQuery TwentyTwenty allows Stored XSS.This issue affects jQuery TwentyTwenty: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en One Plus Solution jQuery TwentyTwenty permite XSS almacenado. Este problema afecta a jQuery TwentyTwenty: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22547.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22547.json index 04a84d0060c..05ce8a483de 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22547.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22547.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:50.463", "lastModified": "2025-01-07T16:15:50.463", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jay Krishnan G JK Html To Pdf allows Stored XSS.This issue affects JK Html To Pdf: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Jay Krishnan G JK Html To Pdf permite XSS almacenado. Este problema afecta a JK Html To Pdf: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22548.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22548.json index ec130090076..2174f2d2b03 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22548.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22548.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:50.623", "lastModified": "2025-01-07T16:15:50.623", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Frank Koenen ldap_login_password_and_role_manager allows Stored XSS.This issue affects ldap_login_password_and_role_manager: from n/a through 1.0.12." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ldap_login_password_and_role_manager de Frank Koenen permite XSS almacenado. Este problema afecta a ldap_login_password_and_role_manager: desde n/a hasta 1.0.12." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22549.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22549.json index e625be82378..0c6e50e518a 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22549.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22549.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:50.790", "lastModified": "2025-01-07T16:15:50.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pablo Cornehl WP Github allows Stored XSS.This issue affects WP Github: from n/a through 1.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Pablo Cornehl WP Github permite XSS almacenado. Este problema afecta a WP Github: desde n/a hasta 1.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22550.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22550.json index 5008029f3d3..24d9596ed77 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22550.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22550.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:50.960", "lastModified": "2025-01-07T16:15:50.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AddFunc AddFunc Mobile Detect allows Stored XSS.This issue affects AddFunc Mobile Detect: from n/a through 3.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en AddFunc AddFunc Mobile Detect permite XSS almacenado. Este problema afecta a AddFunc Mobile Detect: desde n/a hasta 3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22551.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22551.json index 131c993badd..c4e391c94e2 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22551.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22551.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:51.127", "lastModified": "2025-01-07T16:15:51.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Julien Crego Boot-Modal allows Stored XSS.This issue affects Boot-Modal: from n/a through 1.9.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Julien Crego Boot-Modal permite XSS almacenado. Este problema afecta a Boot-Modal: desde n/a hasta 1.9.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22552.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22552.json index da98e4ddfbf..32907072541 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22552.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22552.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:51.277", "lastModified": "2025-01-07T16:15:51.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Jason Keeley, Bryan Nielsen Affiliate Disclosure Statement allows Cross Site Request Forgery.This issue affects Affiliate Disclosure Statement: from n/a through 0.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Jason Keeley, Bryan Nielsen Affiliate Disclosure Statement permite Cross Site Request Forgery. Este problema afecta a Affiliate Disclosure Statement: desde n/a hasta la versi\u00f3n 0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22554.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22554.json index 14bd57be0d8..ee8778c982d 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22554.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22554.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:51.443", "lastModified": "2025-01-07T16:15:51.443", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric Franklin Video Embed Optimizer allows Stored XSS.This issue affects Video Embed Optimizer: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Eric Franklin Video Embed Optimizer permite XSS almacenado. Este problema afecta a Video Embed Optimizer: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22555.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22555.json index f4c409de290..bef33998b0d 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22555.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22555.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:51.627", "lastModified": "2025-01-07T16:15:51.627", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Noel Jarencio. Smoothness Slider Shortcode allows Cross Site Request Forgery.This issue affects Smoothness Slider Shortcode: from n/a through v1.2.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Noel Jarencio. Smoothness Slider Shortcode permite Cross Site Request Forgery. Este problema afecta a Smoothness Slider Shortcode: desde n/a hasta v1.2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22556.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22556.json index f22c09ea039..ea084a66462 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22556.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22556.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:51.780", "lastModified": "2025-01-07T16:15:51.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Greg Whitehead Norse Rune Oracle Plugin allows Cross Site Request Forgery.This issue affects Norse Rune Oracle Plugin: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Greg Whitehead Norse Rune Oracle Plugin permite Cross Site Request Forgery. Este problema afecta a Norse Rune Oracle Plugin: desde n/a hasta 1.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22557.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22557.json index 66ea9663ac4..01081723a65 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22557.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22557.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:51.920", "lastModified": "2025-01-07T16:15:51.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPMagic News Publisher Autopilot allows Cross Site Request Forgery.This issue affects News Publisher Autopilot: from n/a through 2.1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WPMagic News Publisher Autopilot permite Cross Site Request Forgery. Este problema afecta a News Publisher Autopilot: desde n/a hasta 2.1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22558.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22558.json index b6eba3f2d92..5016fbb8c04 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22558.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22558.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:52.080", "lastModified": "2025-01-07T16:15:52.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Marcus C. J. Hartmann mcjh button shortcode allows Stored XSS.This issue affects mcjh button shortcode: from n/a through 1.6.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Marcus C. J. Hartmann mcjh button shortcode permite XSS almacenado. Este problema afecta a mcjh button shortcode: desde n/a hasta 1.6.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22559.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22559.json index 064e12068f4..d53db6b2cda 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22559.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22559.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:52.243", "lastModified": "2025-01-07T16:15:52.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mario Mansour and Geoff Peters TubePress.NET allows Cross Site Request Forgery.This issue affects TubePress.NET: from n/a through 4.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Mario Mansour y Geoff Peters TubePress.NET permite Cross Site Request Forgery. Este problema afecta a TubePress.NET: desde n/a hasta 4.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22560.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22560.json index 418dfb33b29..7bb1308b4d6 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22560.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22560.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:52.380", "lastModified": "2025-01-07T16:15:52.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Saoshyant.1994 Saoshyant Page Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Saoshyant Page Builder: from n/a through 3.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Saoshyant.1994 Saoshyant Page Builder permite explotar niveles de seguridad de control de acceso configurados incorrectamente.Este problema afecta a Saoshyant Page Builder: desde n/a hasta 3.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22561.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22561.json index 9bf3f71fdb9..896a0f7e651 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22561.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22561.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.827", "lastModified": "2025-01-09T16:16:28.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Jason Funk Title Experiments Free allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Title Experiments Free: from n/a through 9.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Jason Funk Title Experiments Free permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Title Experiments Free: desde n/a hasta 9.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22562.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22562.json index 76cb72c1f6d..9171ebd6428 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22562.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22562.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:52.540", "lastModified": "2025-01-07T16:15:52.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Jason Funk Title Experiments Free allows Cross Site Request Forgery.This issue affects Title Experiments Free: from n/a through 9.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Jason Funk Title Experiments Free permite Cross Site Request Forgery. Este problema afecta a Title Experiments Free: desde n/a hasta 9.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22563.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22563.json index a339b2ef7b4..7ef3b42f967 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22563.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22563.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:52.940", "lastModified": "2025-01-07T16:15:52.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Faaiq Pretty Url allows Cross Site Request Forgery.This issue affects Pretty Url: from n/a through 1.5.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Faaiq Pretty Url permite Cross Site Request Forgery. Este problema afecta a Pretty Url: desde n/a hasta 1.5.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22571.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22571.json index 2ef0246a308..101637bad33 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22571.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22571.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:53.187", "lastModified": "2025-01-07T16:15:53.187", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Instabot Instabot allows Cross Site Request Forgery.This issue affects Instabot: from n/a through 1.10." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Instabot Instabot permite Cross Site Request Forgery. Este problema afecta a Instabot: desde n/a hasta 1.10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22572.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22572.json index 17435a45c9d..e660c9b3c31 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22572.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22572.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:53.357", "lastModified": "2025-01-07T16:15:53.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in brianmiyaji Legacy ePlayer allows Stored XSS.This issue affects Legacy ePlayer: from n/a through 0.9.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en brianmiyaji Legacy ePlayer permite XSS almacenado. Este problema afecta a Legacy ePlayer: desde n/a hasta 0.9.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22573.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22573.json index 9041c17296b..b41ffee211a 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22573.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22573.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:53.520", "lastModified": "2025-01-07T16:15:53.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in copist Icons Enricher allows Stored XSS.This issue affects Icons Enricher: from n/a through 1.0.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en copist Icons Enricher permite XSS almacenado. Este problema afecta a Icons Enricher: desde n/a hasta 1.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22574.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22574.json index de916961ba6..ca0d8aa1068 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22574.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22574.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:53.667", "lastModified": "2025-01-07T16:15:53.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joe Motacek ICS Button allows Stored XSS.This issue affects ICS Button: from n/a through 0.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Joe Motacek ICS Button permite XSS almacenado. Este problema afecta a ICS Button: desde n/a hasta 0.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22577.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22577.json index 2ca5416f02c..e838d8b0619 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22577.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22577.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:53.823", "lastModified": "2025-01-07T16:15:53.823", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Damion Armentrout Able Player allows DOM-Based XSS.This issue affects Able Player: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Damion Armentrout Able Player permite XSS basado en DOM. Este problema afecta a Able Player: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22578.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22578.json index 66bd0270a5e..860b95df695 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22578.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22578.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:53.970", "lastModified": "2025-01-07T16:15:53.970", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AazzTech WP Cookie allows Stored XSS.This issue affects WP Cookie: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en AazzTech WP Cookie permite XSS almacenado. Este problema afecta a WP Cookie: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22579.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22579.json index 9fdc567a2dc..e4549d047d2 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22579.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22579.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:54.130", "lastModified": "2025-01-07T16:15:54.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arefly WP Header Notification allows Stored XSS.This issue affects WP Header Notification: from n/a through 1.2.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Arefly WP Header Notification permite XSS almacenado. Este problema afecta a WP Header Notification: desde n/a hasta 1.2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22580.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22580.json index 6854cabbc3e..c2a65814189 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22580.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22580.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:54.303", "lastModified": "2025-01-07T16:15:54.303", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Biltorvet A/S Biltorvet Dealer Tools allows Stored XSS.This issue affects Biltorvet Dealer Tools: from n/a through 1.0.22." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Biltorvet A/S Biltorvet Dealer Tools permite XSS almacenado. Este problema afecta a Biltorvet Dealer Tools: desde n/a hasta 1.0.22." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22581.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22581.json index b24102149bd..cf034c3117b 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22581.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22581.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:54.467", "lastModified": "2025-01-07T16:15:54.467", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bytephp Arcade Ready allows Stored XSS.This issue affects Arcade Ready: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Bytephp Arcade Ready permite XSS almacenado. Este problema afecta a Arcade Ready: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22582.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22582.json index d4c45b680c3..befb52455c4 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22582.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22582.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:54.640", "lastModified": "2025-01-07T16:15:54.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Scott Nell\u00e9 Uptime Robot allows Stored XSS.This issue affects Uptime Robot: from n/a through 0.1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Scott Nell\u00e9 Uptime Robot permite XSS almacenado. Este problema afecta a Uptime Robot: desde n/a hasta 0.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22584.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22584.json index c25184957d4..f9b84de3bd0 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22584.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22584.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:54.780", "lastModified": "2025-01-07T16:15:54.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pluginspoint Timeline Pro allows DOM-Based XSS.This issue affects Timeline Pro: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en pluginspoint Timeline Pro permite XSS basado en DOM. Este problema afecta a Timeline Pro: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22585.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22585.json index 2265c49dc49..55b89241848 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22585.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22585.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:54.923", "lastModified": "2025-01-07T16:15:54.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themebon Ultimate Image Hover Effects allows DOM-Based XSS.This issue affects Ultimate Image Hover Effects: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en themebon Ultimate Image Hover Effects permite XSS basado en DOM. Este problema afecta a Ultimate Image Hover Effects: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22589.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22589.json index c5ff36d98b8..1aa941a9560 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22589.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22589.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:55.053", "lastModified": "2025-01-07T16:15:55.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in bozdoz Quote Tweet allows Stored XSS.This issue affects Quote Tweet: from n/a through 0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en bozdoz Quote Tweet permite XSS almacenado. Este problema afecta a Quote Tweet: desde n/a hasta 0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22590.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22590.json index 5a830c70829..d88db16cc6d 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22590.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22590.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:55.200", "lastModified": "2025-01-07T16:15:55.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in mmrs151 Prayer Times Anywhere allows Stored XSS.This issue affects Prayer Times Anywhere: from n/a through 2.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en mmrs151 Prayer Times Anywhere permite XSS almacenado. Este problema afecta a Prayer Times Anywhere: desde n/a hasta 2.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22591.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22591.json index 5437cc53c7b..52daa348b50 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22591.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22591.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:55.337", "lastModified": "2025-01-07T16:15:55.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Lenderd 1003 Mortgage Application allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects 1003 Mortgage Application: from n/a through 1.87." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Lenderd 1003 Mortgage Application permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a 1003 Mortgage Application: desde n/a hasta 1.87." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22592.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22592.json index fc1c9606801..b2e8b17b422 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22592.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22592.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:55.470", "lastModified": "2025-01-07T16:15:55.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Lenderd 1003 Mortgage Application allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects 1003 Mortgage Application: from n/a through 1.87." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Lenderd 1003 Mortgage Application permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a 1003 Mortgage Application: desde n/a hasta 1.87." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22593.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22593.json index b809a8ed811..c5580d16a58 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22593.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22593.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T16:15:55.627", "lastModified": "2025-01-07T16:15:55.627", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Burria Laika Pedigree Tree allows Stored XSS.This issue affects Laika Pedigree Tree: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Burria Laika Pedigree Tree permite XSS almacenado. Este problema afecta a Laika Pedigree Tree: desde n/a hasta 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22594.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22594.json index e55820f37bf..ea9b5c07f7a 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22594.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22594.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.983", "lastModified": "2025-01-09T16:16:28.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hccoder \u2013 S\u00e1ndor Fodor Better User Shortcodes allows Reflected XSS.This issue affects Better User Shortcodes: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en hccoder \u2013 S\u00e1ndor Fodor Better User Shortcodes permite XSS reflejado. Este problema afecta a Better User Shortcodes: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22595.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22595.json index 3f23cd7c1a3..ade11622df3 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22595.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22595.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:29.160", "lastModified": "2025-01-09T16:16:29.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yamna Khawaja Mailing Group Listserv allows Reflected XSS.This issue affects Mailing Group Listserv: from n/a through 2.0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Yamna Khawaja Mailing Group Listserv permite XSS reflejado. Este problema afecta a Mailing Group Listserv: desde n/a hasta 2.0.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22621.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22621.json index b574207c702..793db846382 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22621.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22621.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@splunk.com", "published": "2025-01-07T17:15:35.710", "lastModified": "2025-01-07T17:15:35.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In versions 1.0.67 and lower of the Splunk App for SOAR, the Splunk documentation for that app recommended adding the `admin_all_objects` capability to the `splunk_app_soar` role. This addition could lead to improper access control for a low-privileged user that does not hold the \u201cadmin\u201c Splunk roles." + }, + { + "lang": "es", + "value": "En las versiones 1.0.67 y anteriores de Splunk App para SOAR, la documentaci\u00f3n de Splunk para esa aplicaci\u00f3n recomendaba agregar la capacidad `admin_all_objects` al rol `splunk_app_soar`. Esta adici\u00f3n podr\u00eda generar un control de acceso inadecuado para un usuario con poco nivel de privilegios que no tenga el rol de Splunk de \"administrador\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22801.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22801.json index 2bc98e458ca..689e597b4b8 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22801.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22801.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:29.323", "lastModified": "2025-01-09T16:16:29.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes Free WooCommerce Theme 99fy Extension allows Stored XSS.This issue affects Free WooCommerce Theme 99fy Extension: from n/a through 1.2.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en HasThemes Free WooCommerce Theme 99fy Extension permite XSS almacenado. Este problema afecta a Free WooCommerce Theme 99fy Extension: desde n/a hasta 1.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22802.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22802.json index 056c0bb9c93..bcc01f4a355 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22802.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22802.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:29.470", "lastModified": "2025-01-09T16:16:29.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in add-ons.org Email Templates Customizer for WordPress \u2013 Drag And Drop Email Templates Builder \u2013 YeeMail allows Stored XSS.This issue affects Email Templates Customizer for WordPress \u2013 Drag And Drop Email Templates Builder \u2013 YeeMail: from n/a through 2.1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en add-ons.org Email Templates Customizer para WordPress \u2013 Drag And Drop Email Templates Builder \u2013 YeeMail permite XSS almacenado. Este problema afecta a Email Templates Customizer para WordPress \u2013 Drag And Drop Email Templates Builder \u2013 YeeMail: desde n/a hasta 2.1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22803.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22803.json index 1b83f925321..dad69a52120 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22803.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22803.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:29.627", "lastModified": "2025-01-09T16:16:29.627", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VillaTheme Advanced Product Information for WooCommerce allows Stored XSS.This issue affects Advanced Product Information for WooCommerce: from n/a through 1.1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en VillaTheme Advanced Product Information para WooCommerce permite XSS almacenado. Este problema afecta a Advanced Product Information para WooCommerce: desde n/a hasta 1.1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22804.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22804.json index ee23f068a05..1ce02eec1a2 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22804.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22804.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:29.787", "lastModified": "2025-01-09T16:16:29.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paul Bearne Author Avatars List/Block allows Stored XSS.This issue affects Author Avatars List/Block: from n/a through 2.1.23." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Paul Bearne Author Avatars List/Block permite XSS almacenado. Este problema afecta a Author Avatars List/Block: desde n/a hasta 2.1.23." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22805.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22805.json index d1fc997b486..ff67f34c5aa 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22805.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22805.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:29.937", "lastModified": "2025-01-09T16:16:29.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemePoints Skill Bar allows Stored XSS.This issue affects Skill Bar: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ThemePoints Skill Bar permite XSS almacenado. Este problema afecta a Skill Bar: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22806.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22806.json index b4eae3e64e6..12430d2f26a 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22806.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22806.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:30.090", "lastModified": "2025-01-09T16:16:30.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Modernaweb Studio Black Widgets For Elementor allows DOM-Based XSS.This issue affects Black Widgets For Elementor: from n/a through 1.3.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Modernaweb Studio Black Widgets For Elementor permite XSS basado en DOM. Este problema afecta a Black Widgets For Elementor: desde n/a hasta 1.3.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22807.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22807.json index 480a8925b87..0b401b79874 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22807.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22807.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:30.253", "lastModified": "2025-01-09T16:16:30.253", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Robert Peake Responsive Flickr Slideshow allows Stored XSS.This issue affects Responsive Flickr Slideshow: from n/a through 2.6.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Robert Peake Responsive Flickr Slideshow permite XSS almacenado. Este problema afecta a Responsive Flickr Slideshow: desde n/a hasta 2.6.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22808.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22808.json index 9fd52cb5435..2a416a21714 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22808.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22808.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:30.403", "lastModified": "2025-01-09T16:16:30.403", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Surbma Surbma | Premium WP allows DOM-Based XSS.This issue affects Surbma | Premium WP: from n/a through 9.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Surbma Surbma | Premium WP permite XSS basado en DOM. Este problema afecta a Surbma | Premium WP: desde n/a hasta 9.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22809.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22809.json index 43e94b0e569..fad32e7014b 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22809.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22809.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:30.557", "lastModified": "2025-01-09T16:16:30.557", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gravity Master PDF Catalog Woocommerce allows DOM-Based XSS.This issue affects PDF Catalog Woocommerce: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Gravity Master PDF Catalog Woocommerce permite XSS basado en DOM. Este problema afecta a PDF Catalog Woocommerce: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22810.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22810.json index 75b067fcdb9..ed0e68fb231 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22810.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22810.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:30.713", "lastModified": "2025-01-09T16:16:30.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CBB Team Content Blocks Builder allows Stored XSS.This issue affects Content Blocks Builder: from n/a through 2.7.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en CBB Team Content Blocks Builder permite XSS almacenado. Este problema afecta a Content Blocks Builder: desde n/a hasta 2.7.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22811.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22811.json index 9b00005b52b..4915c9949b6 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22811.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22811.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:30.880", "lastModified": "2025-01-09T16:16:30.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Modeltheme MT Addons for Elementor allows Stored XSS.This issue affects MT Addons for Elementor: from n/a through 1.0.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Modeltheme MT Addons para Elementor permite XSS almacenado. Este problema afecta a MT Addons para Elementor: desde n/a hasta 1.0.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22812.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22812.json index e9ecaa12419..04f93b14504 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22812.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22812.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:31.047", "lastModified": "2025-01-09T16:16:31.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FlickDevs News Ticker Widget for Elementor allows Stored XSS.This issue affects News Ticker Widget for Elementor: from n/a through 1.3.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en FlickDevs News Ticker Widget para Elementor permite XSS almacenado. Este problema afecta a News Ticker Widget for Elementor: desde n/a hasta 1.3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22813.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22813.json index 9af043ef71b..8c5dac0974e 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22813.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22813.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:31.200", "lastModified": "2025-01-09T16:16:31.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ChatBot for WordPress - WPBot Conversational Forms for ChatBot allows Stored XSS.This issue affects Conversational Forms for ChatBot: from n/a through 1.4.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ChatBot para WordPress - WPBot Conversational Forms para ChatBot permite XSS almacenado. Este problema afecta a Conversational Forms para ChatBot: desde n/a hasta 1.4.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22814.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22814.json index b8f4a7e045e..e36861b9440 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22814.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22814.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:31.370", "lastModified": "2025-01-09T16:16:31.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Dylan James Zephyr Admin Theme allows Cross Site Request Forgery.This issue affects Zephyr Admin Theme: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Dylan James Zephyr Admin Theme permite Cross-Site Request Forgery. Este problema afecta a Zephyr Admin Theme: desde n/a hasta 1.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22815.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22815.json index a1ee235aa37..4896c81acdb 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22815.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22815.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:31.543", "lastModified": "2025-01-09T16:16:31.543", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins LLC Button Block allows Stored XSS.This issue affects Button Block: from n/a through 1.1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en bPlugins LLC Button Block permite XSS almacenado. Este problema afecta al bloque de botones: desde n/a hasta 1.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22817.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22817.json index 62938a4565c..362d920fe9d 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22817.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22817.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:31.693", "lastModified": "2025-01-09T16:16:31.693", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Venutius BP Profile Shortcodes Extra allows Stored XSS.This issue affects BP Profile Shortcodes Extra: from n/a through 2.6.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Venutius BP Profile Shortcodes Extra permite XSS almacenado. Este problema afecta a BP Profile Shortcodes Extra: desde n/a hasta 2.6.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22818.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22818.json index 75b412df346..b3bc56d7859 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22818.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22818.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:31.850", "lastModified": "2025-01-09T16:16:31.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in S3Bubble S3Player \u2013 WooCommerce & Elementor Integration allows Stored XSS.This issue affects S3Player \u2013 WooCommerce & Elementor Integration: from n/a through 4.2.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en S3Bubble S3Player \u2013 WooCommerce y Elementor Integration permite XSS almacenado. Este problema afecta a S3Player \u2013 WooCommerce y Elementor Integration: desde n/a hasta 4.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22819.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22819.json index e5244f621a1..8f42e0f9b0f 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22819.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22819.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:32.000", "lastModified": "2025-01-09T16:16:32.000", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 4wpbari Qr Code and Barcode Scanner Reader allows Stored XSS.This issue affects Qr Code and Barcode Scanner Reader: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en 4wpbari Qr Code y Barcode Scanner Reader permite XSS almacenado. Este problema afecta a Qr Code y Barcode Scanner Reader: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22820.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22820.json index 3ac0bc29a6b..6699bc09e52 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22820.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22820.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:32.173", "lastModified": "2025-01-09T16:16:32.173", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Daniel Walmsley VR Views allows Stored XSS.This issue affects VR Views: from n/a through 1.5.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Daniel Walmsley VR Views permite XSS almacenado. Este problema afecta a VR Views: desde n/a hasta 1.5.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22821.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22821.json index 6122fc241d8..608c58d0cf7 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22821.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22821.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:32.363", "lastModified": "2025-01-09T16:16:32.363", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vfthemes StorePress allows DOM-Based XSS.This issue affects StorePress: from n/a through 1.0.12." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en vfthemes StorePress permite XSS basado en DOM. Este problema afecta a StorePress: desde n/a hasta 1.0.12." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22822.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22822.json index aa1eaa6b832..bc980bb73f4 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22822.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22822.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:32.557", "lastModified": "2025-01-09T16:16:32.557", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bishawjit Das wp custom countdown allows Stored XSS.This issue affects wp custom countdown: from n/a through 2.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Bishawjit Das wp custom countdown permite XSS almacenado. Este problema afecta a wp custom countdown: desde n/a hasta 2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22823.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22823.json index f175f33eb21..b2a584f3d7e 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22823.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22823.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:32.717", "lastModified": "2025-01-09T16:16:32.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Twerdy Genesis Style Shortcodes allows DOM-Based XSS.This issue affects Genesis Style Shortcodes: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Justin Twerdy Genesis Style Shortcodes permite XSS basado en DOM. Este problema afecta a Genesis Style Shortcodes: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22824.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22824.json index 2084afefd19..6824356d094 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22824.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22824.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:32.893", "lastModified": "2025-01-09T16:16:32.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lucia Intelisano Live Flight Radar allows Stored XSS.This issue affects Live Flight Radar: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Lucia Intelisano Live Flight Radar permite XSS almacenado. Este problema afecta a Live Flight Radar: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22826.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22826.json index 695557de2be..8508035e996 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22826.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22826.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:33.047", "lastModified": "2025-01-09T16:16:33.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpecommerce, wp.insider Sell Digital Downloads allows Stored XSS.This issue affects Sell Digital Downloads: from n/a through 2.2.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en wpecommerce, wp.insider Sell Digital Downloads permite XSS almacenado. Este problema afecta a Sell Digital Downloads: desde n/a hasta 2.2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22827.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22827.json index 2c8941ed94a..e642de7a850 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22827.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22827.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:33.200", "lastModified": "2025-01-09T16:16:33.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joomag. WP Joomag allows DOM-Based XSS.This issue affects WP Joomag: from n/a through 2.5.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Joomag. WP Joomag permite XSS basado en DOM. Este problema afecta a WP Joomag: desde n/a hasta 2.5.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22946.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22946.json index c34d24973cd..ef3afb0a7bc 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22946.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22946.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T15:15:16.710", "lastModified": "2025-01-10T15:15:16.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23016.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23016.json index 2afdfbc0ff1..0fda416d8f8 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23016.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23016.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T12:15:25.480", "lastModified": "2025-01-10T12:15:25.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index 0532ef5e505..94dfd2a71ce 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-11T17:00:22.635448+00:00 +2025-01-12T03:00:19.531309+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-11T16:15:24.307000+00:00 +2025-01-12T02:15:18.973000+00:00 ``` ### Last Data Feed Release @@ -27,44 +27,52 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-01-11T01:00:04.387890+00:00 +2025-01-12T01:00:10.076049+00:00 ``` ### Total Number of included CVEs ```plain -276798 +276800 ``` ### CVEs added in the last Commit -Recently added CVEs: `18` +Recently added CVEs: `2` -- [CVE-2024-57839](CVE-2024/CVE-2024-578xx/CVE-2024-57839.json) (`2025-01-11T15:15:07.050`) -- [CVE-2024-57843](CVE-2024/CVE-2024-578xx/CVE-2024-57843.json) (`2025-01-11T15:15:07.170`) -- [CVE-2024-57849](CVE-2024/CVE-2024-578xx/CVE-2024-57849.json) (`2025-01-11T15:15:07.290`) -- [CVE-2024-57850](CVE-2024/CVE-2024-578xx/CVE-2024-57850.json) (`2025-01-11T15:15:07.423`) -- [CVE-2024-57872](CVE-2024/CVE-2024-578xx/CVE-2024-57872.json) (`2025-01-11T15:15:07.560`) -- [CVE-2024-57874](CVE-2024/CVE-2024-578xx/CVE-2024-57874.json) (`2025-01-11T15:15:07.680`) -- [CVE-2024-57875](CVE-2024/CVE-2024-578xx/CVE-2024-57875.json) (`2025-01-11T15:15:07.803`) -- [CVE-2024-57876](CVE-2024/CVE-2024-578xx/CVE-2024-57876.json) (`2025-01-11T15:15:07.930`) -- [CVE-2024-57877](CVE-2024/CVE-2024-578xx/CVE-2024-57877.json) (`2025-01-11T15:15:08.063`) -- [CVE-2024-57878](CVE-2024/CVE-2024-578xx/CVE-2024-57878.json) (`2025-01-11T15:15:08.190`) -- [CVE-2024-57879](CVE-2024/CVE-2024-578xx/CVE-2024-57879.json) (`2025-01-11T15:15:08.317`) -- [CVE-2024-57880](CVE-2024/CVE-2024-578xx/CVE-2024-57880.json) (`2025-01-11T15:15:08.440`) -- [CVE-2024-57881](CVE-2024/CVE-2024-578xx/CVE-2024-57881.json) (`2025-01-11T16:15:24.307`) -- [CVE-2025-23124](CVE-2025/CVE-2025-231xx/CVE-2025-23124.json) (`2025-01-11T15:15:08.930`) -- [CVE-2025-23125](CVE-2025/CVE-2025-231xx/CVE-2025-23125.json) (`2025-01-11T15:15:09.023`) -- [CVE-2025-23126](CVE-2025/CVE-2025-231xx/CVE-2025-23126.json) (`2025-01-11T15:15:09.100`) -- [CVE-2025-23127](CVE-2025/CVE-2025-231xx/CVE-2025-23127.json) (`2025-01-11T15:15:09.173`) -- [CVE-2025-23128](CVE-2025/CVE-2025-231xx/CVE-2025-23128.json) (`2025-01-11T15:15:09.250`) +- [CVE-2021-29669](CVE-2021/CVE-2021-296xx/CVE-2021-29669.json) (`2025-01-12T02:15:18.750`) +- [CVE-2024-49785](CVE-2024/CVE-2024-497xx/CVE-2024-49785.json) (`2025-01-12T02:15:18.973`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `3203` -- [CVE-2024-6923](CVE-2024/CVE-2024-69xx/CVE-2024-6923.json) (`2025-01-11T15:15:08.587`) +- [CVE-2025-22803](CVE-2025/CVE-2025-228xx/CVE-2025-22803.json) (`2025-01-09T16:16:29.627`) +- [CVE-2025-22804](CVE-2025/CVE-2025-228xx/CVE-2025-22804.json) (`2025-01-09T16:16:29.787`) +- [CVE-2025-22805](CVE-2025/CVE-2025-228xx/CVE-2025-22805.json) (`2025-01-09T16:16:29.937`) +- [CVE-2025-22806](CVE-2025/CVE-2025-228xx/CVE-2025-22806.json) (`2025-01-09T16:16:30.090`) +- [CVE-2025-22807](CVE-2025/CVE-2025-228xx/CVE-2025-22807.json) (`2025-01-09T16:16:30.253`) +- [CVE-2025-22808](CVE-2025/CVE-2025-228xx/CVE-2025-22808.json) (`2025-01-09T16:16:30.403`) +- [CVE-2025-22809](CVE-2025/CVE-2025-228xx/CVE-2025-22809.json) (`2025-01-09T16:16:30.557`) +- [CVE-2025-22810](CVE-2025/CVE-2025-228xx/CVE-2025-22810.json) (`2025-01-09T16:16:30.713`) +- [CVE-2025-22811](CVE-2025/CVE-2025-228xx/CVE-2025-22811.json) (`2025-01-09T16:16:30.880`) +- [CVE-2025-22812](CVE-2025/CVE-2025-228xx/CVE-2025-22812.json) (`2025-01-09T16:16:31.047`) +- [CVE-2025-22813](CVE-2025/CVE-2025-228xx/CVE-2025-22813.json) (`2025-01-09T16:16:31.200`) +- [CVE-2025-22814](CVE-2025/CVE-2025-228xx/CVE-2025-22814.json) (`2025-01-09T16:16:31.370`) +- [CVE-2025-22815](CVE-2025/CVE-2025-228xx/CVE-2025-22815.json) (`2025-01-09T16:16:31.543`) +- [CVE-2025-22817](CVE-2025/CVE-2025-228xx/CVE-2025-22817.json) (`2025-01-09T16:16:31.693`) +- [CVE-2025-22818](CVE-2025/CVE-2025-228xx/CVE-2025-22818.json) (`2025-01-09T16:16:31.850`) +- [CVE-2025-22819](CVE-2025/CVE-2025-228xx/CVE-2025-22819.json) (`2025-01-09T16:16:32.000`) +- [CVE-2025-22820](CVE-2025/CVE-2025-228xx/CVE-2025-22820.json) (`2025-01-09T16:16:32.173`) +- [CVE-2025-22821](CVE-2025/CVE-2025-228xx/CVE-2025-22821.json) (`2025-01-09T16:16:32.363`) +- [CVE-2025-22822](CVE-2025/CVE-2025-228xx/CVE-2025-22822.json) (`2025-01-09T16:16:32.557`) +- [CVE-2025-22823](CVE-2025/CVE-2025-228xx/CVE-2025-22823.json) (`2025-01-09T16:16:32.717`) +- [CVE-2025-22824](CVE-2025/CVE-2025-228xx/CVE-2025-22824.json) (`2025-01-09T16:16:32.893`) +- [CVE-2025-22826](CVE-2025/CVE-2025-228xx/CVE-2025-22826.json) (`2025-01-09T16:16:33.047`) +- [CVE-2025-22827](CVE-2025/CVE-2025-228xx/CVE-2025-22827.json) (`2025-01-09T16:16:33.200`) +- [CVE-2025-22946](CVE-2025/CVE-2025-229xx/CVE-2025-22946.json) (`2025-01-10T15:15:16.710`) +- [CVE-2025-23016](CVE-2025/CVE-2025-230xx/CVE-2025-23016.json) (`2025-01-10T12:15:25.480`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f4c208cbb97..608801b69f9 100644 --- a/_state.csv +++ b/_state.csv @@ -74952,7 +74952,7 @@ CVE-2015-1423,0,0,a859ae7ef2be6cad83a7ef4410e0ccdceaeb5fc6c26e932bffd2946aca2b4c CVE-2015-1424,0,0,cec2006d28f1b666d26a5d68f96ab3ead0fbe2bac80ec37f4fe6f91caaf48aa3,2024-11-21T02:25:23.790000 CVE-2015-1425,0,0,0fd8da360e7a9c30a4bea07f92e8217f284f97c8aebe1c7dcc8a54e77db62c48,2024-11-21T02:25:23.933000 CVE-2015-1426,0,0,423a77efe89ddb20ddf89a099253ba7c05bcab7eb7a38083082398cf40a45822,2024-11-21T02:25:24.083000 -CVE-2015-1427,0,0,139491b45d2c259eda40d0bddc513edc594ec576d267a0553b2f52ddfce74d05,2024-11-21T02:25:24.233000 +CVE-2015-1427,0,1,4bc287272197c8c33bb60dfb804cd1b5a84986a8234d2d7ab50f855f1a8baeac,2024-11-21T02:25:24.233000 CVE-2015-1428,0,0,ede17d91bd162aa9178bd11f8244e01812b114cb8d828212263a11688563cb04,2024-11-21T02:25:24.393000 CVE-2015-1429,0,0,9ca9c7a6283aff915ddfef13fc7b5aea9b94bd930070d4d07d8bec2023439d31,2024-11-21T02:25:24.540000 CVE-2015-1430,0,0,fb883bf00f80d8bccb64a347e69add15b18f9af2e1190dfce0d855c4047da2f9,2024-11-21T02:25:24.683000 @@ -75122,14 +75122,14 @@ CVE-2015-1631,0,0,3f16e6ee99636f29a88be130d961bf4a372deda7d9052f8887f0832c83e8ea CVE-2015-1632,0,0,7fd7fe2c3d73803fd4e06db046f4e0d83c73e2bce9b40038e65d7be484c7e7cc,2024-11-21T02:25:49.413000 CVE-2015-1633,0,0,60450537510b2031fe4786094d06bc0b2d5a2cf0374e1c94939fb195b11bb8dd,2024-11-21T02:25:49.520000 CVE-2015-1634,0,0,4ddb53260427bec09f06c926a30bf3bb11190a2d35af980fb19fc94478d3ad2a,2024-11-21T02:25:49.640000 -CVE-2015-1635,0,0,f38d8c0f10eae3b0a75fc43370b120c92a2404924b942bd0055f1cc05e77fd1b,2024-11-21T02:25:49.760000 +CVE-2015-1635,0,1,3b99851b88b223b945caa9d763de5c0ce2f52a4dc3b57a650301a9adcdfa37c4,2024-11-21T02:25:49.760000 CVE-2015-1636,0,0,08639d4c8567a257244c84a37e861ba149fc19985ed450d2abf075408a34623a,2024-11-21T02:25:49.890000 CVE-2015-1637,0,0,059d467417a4bcb328229f380a74be3f9a2d56f3d657eb1dbf0a9bb0f99de5c8,2024-11-21T02:25:50.010000 CVE-2015-1638,0,0,daef968245a5d8fd79d931ce1ffd08b3f2e1d88478095e206dc2c85022015bc0,2024-11-21T02:25:50.140000 CVE-2015-1639,0,0,34505230ce09a0015f32d75857dbd4437155d53d3a8d301d593db632ff0e6063,2024-11-21T02:25:50.263000 CVE-2015-1640,0,0,801ae17082793204d46bf77801ffd5de8c9c829afdb3530ebef3b0a19f191653,2024-11-21T02:25:50.390000 -CVE-2015-1641,0,0,ab75afbc5cf6f17c55f4c89de9dd99d8fdda90c8b94464918e3ca1f9a0e95717,2024-11-21T02:25:50.510000 -CVE-2015-1642,0,0,767a31541c1c483e2324356ad6bb85afa9c3a07ad4385b94064c5a2b7deae456,2024-11-21T02:25:50.630000 +CVE-2015-1641,0,1,913c22d7558bea0c75255e58334088a59285fdd02f3ed9c077433b0f9afc207b,2024-11-21T02:25:50.510000 +CVE-2015-1642,0,1,a3421e4cd449d71f7c3a1c75a980c15fe55af2cf8fbe29700f0c83431d2aa42b,2024-11-21T02:25:50.630000 CVE-2015-1643,0,0,35965b865ae4a0fe7d80f230f483ebd1ed4164b7f19a9ddda1fca4ecbbcd5c1a,2024-11-21T02:25:50.753000 CVE-2015-1644,0,0,a460657ddeb2cebbe863b19e4913930868d68bdff8abc83394f5f8a8c15788d1,2024-11-21T02:25:50.873000 CVE-2015-1645,0,0,8cb7107b2c6b144164ea8cd42a107617cf9ba3326c21773f955c39867f026fb0,2024-11-21T02:25:51 @@ -75158,7 +75158,7 @@ CVE-2015-1667,0,0,c8e8b56225942cdc89e488369ea08536d951820217b9bc72c3c2416aad269a CVE-2015-1668,0,0,4b0428494e7e9ba63442f6a623c9ee0cdce7154d9863cc57c4d8c5dae4f6e9f5,2024-11-21T02:25:53.203000 CVE-2015-1669,0,0,9e9377f53a9179c1e8bf02f36eb329dab88689648a3ef1206b44b2d15a59829f,2023-11-07T02:24:53.023000 CVE-2015-1670,0,0,d2cab4451a6f3c31693726bbb53acbaa7058623747b787db1f1e4c92c7c9ea44,2024-11-21T02:25:53.337000 -CVE-2015-1671,0,0,effdd260857cea0b31d838e1e915dae96f55d84bc7259c5e68c75fbf647d3ae7,2024-11-21T02:25:53.453000 +CVE-2015-1671,0,1,27bcc122ae25e1453c9721a91e1c64a6dc5c9d45d12beb1ecc2cd34e936c9147,2024-11-21T02:25:53.453000 CVE-2015-1672,0,0,5a4f2c0bb3a8e4a0c0726c491fb82a51751d9929e247fe9ae4b1d1511776aaa4,2024-11-21T02:25:53.590000 CVE-2015-1673,0,0,51e7d81cae4918d004e6ea474b90dfc85d42dbbb18a286351050c4819fcf237c,2024-11-21T02:25:53.720000 CVE-2015-1674,0,0,42b737c6da05e7baa817de85b8cec93b8288ff33a8d8407da41ba04bd810c820,2024-11-21T02:25:53.823000 @@ -75188,7 +75188,7 @@ CVE-2015-1697,0,0,6b51bbad2f27b9527847d07891f8518562409c695260d17eb4f98ea3c57997 CVE-2015-1698,0,0,7406d7d7989440b87400f2bfbd6ad008082568979e81788b1e17d0e730ff409c,2024-11-21T02:25:56.640000 CVE-2015-1699,0,0,39028973fe7fbc9473bcc5336fc3f507fa92a028df182138b79554701c74149e,2024-11-21T02:25:56.767000 CVE-2015-1700,0,0,2132a9f089e058148bff4577e60abeae36af3937301a92d2e707241197afa23c,2024-11-21T02:25:56.943000 -CVE-2015-1701,0,0,89c8bdc4debfcc7b98bda192386fa1534ac318af21f4c484519e18c2a1948471,2024-11-21T02:25:57.643000 +CVE-2015-1701,0,1,c5520508fd9355542f262ebad70d011cc4e209e962bc62e6ac0cdd4932c94649,2024-11-21T02:25:57.643000 CVE-2015-1702,0,0,735c45b16bfc3b23428151dd04a60f616d7c6ce5df03061291c80f9618d0a5b7,2024-11-21T02:25:57.800000 CVE-2015-1703,0,0,6ed9b8669f32099d03c20f238d82fcefda2c7eea7db1352ad88deaea003f259a,2024-11-21T02:25:57.963000 CVE-2015-1704,0,0,99a219d5ef32df40090ea715c285543c33dd4857dbe2757c69ea9443f992ffe7,2024-11-21T02:25:58.077000 @@ -75256,8 +75256,8 @@ CVE-2015-1765,0,0,0d81fef387f6776b306a0f185e451445a82c0c192c017cbc6dafd4e9c6a26d CVE-2015-1766,0,0,3f00a70e44f7fa95c26bd5cb8bcf5b39076875377af9edefc257bc0d9d230c4e,2024-11-21T02:26:05.143000 CVE-2015-1767,0,0,292b1f56789470d2933eef9d582c7832d8d18f0b3d4658197d1dc427c079f87e,2024-11-21T02:26:05.267000 CVE-2015-1768,0,0,b2fc6680ee97b1d0858e4bb59d759f45ec5d75cf1c3839c62cbe9f26046551ab,2024-11-21T02:26:05.380000 -CVE-2015-1769,0,0,ebcf8b335d237439f5e5eb9ff14674de2e3cd4050485c09b101dad52f4b2bfa3,2024-11-21T02:26:05.500000 -CVE-2015-1770,0,0,231ddac4ad63b1f530b334f149c22fd068444edd8b93a4d08cff4b21c20a7522,2024-11-21T02:26:05.623000 +CVE-2015-1769,0,1,db98a0ac6833ae3a48d3fd41229998e7725ce44ee22cf071cbe89684ba60e316,2024-11-21T02:26:05.500000 +CVE-2015-1770,0,1,ac4dd844443bdb2d660ee56ae351b4e74e4c7f4d429bf19d57edadd471942ebc,2024-11-21T02:26:05.623000 CVE-2015-1771,0,0,a44961f133acd00d46d9847eec99f2955a76b6125ced31ae1d283f363776ed0c,2024-11-21T02:26:05.747000 CVE-2015-1772,0,0,26826297cb83f5add3d9515dbab903d2b96da4af06792c133c24c3386ce750e3,2024-11-21T02:26:05.867000 CVE-2015-1773,0,0,fd832b300fcebda30714577992c0dfc0547751b17ec68289f32185de9303ed35,2024-11-21T02:26:05.997000 @@ -75730,7 +75730,7 @@ CVE-2015-2285,0,0,7e6c8d250565b288e3d44ddbdd73bf03c54604623ed6eba5409fb32ca49839 CVE-2015-2286,0,0,68914d6beaab6d72a8660b6b34347a473c69bb7b642ebb41f6da11699c10980f,2024-11-21T02:27:09.123000 CVE-2015-2287,0,0,a50cb2351b0abf60313d28967e8f7623893f16414972711aebc66526db1da1bf,2023-11-07T02:25:12.530000 CVE-2015-2289,0,0,d62fb50b189ff1d58f5f28c65ace35ccf3076705b7ab6f4500b82d1a955c8b3b,2024-11-21T02:27:09.277000 -CVE-2015-2291,0,0,94269fc877e0775465c16b7ee0f08d139629d7f63ac88b45fed9c73aaec111db,2024-11-21T02:27:09.427000 +CVE-2015-2291,0,1,430fbb85675c87f88f89c0ebab231529c3971ec5f75bf76a71c69496d6172d31,2024-11-21T02:27:09.427000 CVE-2015-2292,0,0,2e615b68e53e179e262f8589b774af622e0e4972d1ba12157776ebd95bacd9e3,2024-11-21T02:27:09.570000 CVE-2015-2293,0,0,16fde132f52bb308dd68bd8bc55004e60f1a96fc17a261675e8ee3d396418904,2024-11-21T02:27:09.720000 CVE-2015-2294,0,0,835037d83c28a86cc759949cd5322602c1aef7af0a7dbbe9da049932cc41babf,2024-11-21T02:27:09.857000 @@ -75787,7 +75787,7 @@ CVE-2015-2350,0,0,a61d3c439266cd4793d26dd677160c7fc0eb78d5317376c300f3dd027b621a CVE-2015-2351,0,0,212dd006f67ca3ef633ebc48049f242b05ffc8e2bfdfa1e5b9b2b5e19d057ffa,2024-11-21T02:27:16.530000 CVE-2015-2352,0,0,d0014c06ea0f135c7c3867f2133c309a489c5822a4ea0d3519f2e7692761eed4,2024-11-21T02:27:16.657000 CVE-2015-2359,0,0,7cae3d350c087df32df3df7093160e82aec7264b9eecf6aa4647f4013aae4804,2024-11-21T02:27:16.787000 -CVE-2015-2360,0,0,30a4b23c1d3a804e2e833bc12efbfa3c3c0531696faf00c0bd677b19e177693b,2024-11-21T02:27:16.887000 +CVE-2015-2360,0,1,0d871ac5aebd6e4ee2ce9150e381ebe26208ed67809743253449b8c45a244435,2024-11-21T02:27:16.887000 CVE-2015-2361,0,0,d4a108a4c8b8021db3f04e14e33622c7bb7b6506f17131e584e240997746a923,2024-11-21T02:27:16.990000 CVE-2015-2362,0,0,4da5a0400b6c72dec5b4cfbc12064495c682867e5449a7bc83e975bb5b893bcc,2024-11-21T02:27:17.077000 CVE-2015-2363,0,0,54a1b28069d6bede4572b942fb84e8d316e24d1b8fac78a05e1c2063c6184ee7,2024-11-21T02:27:17.173000 @@ -75814,7 +75814,7 @@ CVE-2015-2383,0,0,a9938b2adce7669516c2e0d39317dc0111ddc799392a2288a121b4c97bcb18 CVE-2015-2384,0,0,c005a1114405680728845c33908cb8345dd0509075de61a36d774e48ef902957,2024-11-21T02:27:19.390000 CVE-2015-2385,0,0,c6474a36cdfd195c898272ea95d2f5984e4a286c610bacf18f5bb29cced83610,2024-11-21T02:27:19.483000 CVE-2015-2386,0,0,bae2348f361a88c43c8cd62e8685d637aa0a62bf3183e8e3997963f368278b04,2023-11-07T02:25:14.977000 -CVE-2015-2387,0,0,02b06c57db48a6139f567b8bde6983b49dccf62edd1bec9c62c3b58316f8fc43,2024-11-21T02:27:19.600000 +CVE-2015-2387,0,1,389e8a7ce620f6dbbe4e9b25d521022b0f7fb140b1c6d5cc08a2875f6b659938,2024-11-21T02:27:19.600000 CVE-2015-2388,0,0,a38382093b6e2e011f3b4300de3903f63f6f757652b136252d7fe5ae97e976fd,2024-11-21T02:27:19.713000 CVE-2015-2389,0,0,f256a84c6f2df57029f53974a3c1ba2ca8bd4beb8ed7e8acc6172d03c5fdada2,2024-11-21T02:27:19.817000 CVE-2015-2390,0,0,bffb4fcc4a36dbabee27b5da6eedec72cd11c7d3ee37c8899d62eec144fd1f40,2024-11-21T02:27:19.920000 @@ -75846,14 +75846,14 @@ CVE-2015-2415,0,0,7512055095e6c9148a8e1d7f9bfe0464477371b6d2bb084a1f6ac532f8805f CVE-2015-2416,0,0,0b31ed452077b4b8d973eaf2946d322fefbc298dc4d1c78999b738ba9c906663,2024-11-21T02:27:21.647000 CVE-2015-2417,0,0,588f596db008224ab03afbd73ad0659a1c1a976d9e9aaa4fd43b3b34bc7a5615,2024-11-21T02:27:21.753000 CVE-2015-2418,0,0,dc1aee9b99bd6f9b84cd1406c22e3a310d0fb56f22106fc826eaf0a031c759bc,2024-11-21T02:27:21.853000 -CVE-2015-2419,0,0,4814ba3a1652a1dcf63531d98ed65c7b35a93bde4932f758922ff477c3978149,2024-11-21T02:27:21.957000 +CVE-2015-2419,0,1,8daafa99cb2294f97f995a91c888b231ec53bfb07d2e408d956b5f9b70b3e8e5,2024-11-21T02:27:21.957000 CVE-2015-2420,0,0,6cd9292688b9c4caad3ef00795f216de2ea230a683201d7a9b3ca0838bbc87d0,2024-11-21T02:27:22.063000 CVE-2015-2421,0,0,527a453b8446f5bfa81f7d5c60d49a63a5df609d371d6eafcdba71c7d77fc1f5,2024-11-21T02:27:22.170000 CVE-2015-2422,0,0,1c9f4482bc96767226f4aa227fa39b9799d0cca0ea3edee3d19f9cb162e7ab53,2024-11-21T02:27:22.280000 CVE-2015-2423,0,0,42d5bd8c456c579663bd230e11c052dc6af4b7225a1931ab55e41c0bc8c19eae,2024-11-21T02:27:22.383000 -CVE-2015-2424,0,0,88e75a20aa8253dbe9cf34b6df76a1aba98c58d3ae0e6ef5f3fb53fcd2b4a9c4,2024-11-21T02:27:22.517000 -CVE-2015-2425,0,0,05033643eb931748822ee117c393f6c059b8b010aba4088324fffd9541b24da5,2024-11-21T02:27:22.633000 -CVE-2015-2426,0,0,6c185b6fad3e0af65d5abe4fc825c8eac1d9391564ea15f0e65a78a89cab7be4,2024-11-21T02:27:22.747000 +CVE-2015-2424,0,1,9ae78885f86f4e2d9b56004384ce84c9755f220085e52e4249dd5849959383e2,2024-11-21T02:27:22.517000 +CVE-2015-2425,0,1,b34d20362bfba815c4005956e855cfc07b174653b7e61b1244f3b6701148cabb,2024-11-21T02:27:22.633000 +CVE-2015-2426,0,1,1a92d40d4b63826962b0672ebc729c6518ab0d4946164a2d26ad823983e71af8,2024-11-21T02:27:22.747000 CVE-2015-2427,0,0,55abc32dc641b1459ddff4dad2a062e6486deafbfb28dde2091ea8dd3b588f4e,2024-11-21T02:27:22.863000 CVE-2015-2428,0,0,c3fed403027608df7c604e96f1cf1d9d58f8b077ac33ed1fac80d48d4de5efae,2024-11-21T02:27:22.963000 CVE-2015-2429,0,0,6be635d2208a9a1c248aca11d3c39004b6116c618774c2e9a60c137855ab2935,2024-11-21T02:27:23.077000 @@ -75929,7 +75929,7 @@ CVE-2015-2498,0,0,202cbbf2c14229e42623ba9128bdc51ccc3a1902c2c354f8f3cede5a9184b5 CVE-2015-2499,0,0,70e8036036c71a6de7081ff692ff0e4a3549e9bd108e6c7bca9e2608a7a3b604,2024-11-21T02:27:29.900000 CVE-2015-2500,0,0,496ff078b783b269b965c0dd26ab28dfcb36e7af0def9d2fdb2b5bf345bfe394,2024-11-21T02:27:30.020000 CVE-2015-2501,0,0,774a00ebcdd2619b1e941d592326a64fd3994a8c6df23a03fe342a89e0eac333,2024-11-21T02:27:30.123000 -CVE-2015-2502,0,0,fccaeeeb4e6ebf09a4c4fc2a0b454ac0d149228179de0e8eda619a0dd89f80dd,2024-11-21T02:27:30.230000 +CVE-2015-2502,0,1,9acff03600d4228999ad3c87e88105973ae06f4e5be92405eb6dd94388a9304f,2024-11-21T02:27:30.230000 CVE-2015-2503,0,0,7e8500b80856a7799d677bc4d2caf972dea8e91c4ba249bc08c8754fe59623c4,2024-11-21T02:27:30.357000 CVE-2015-2504,0,0,2d91468948eb80c794f9274ec20d44d15c583164dac8ea9bf906f3ef46ee9088,2024-11-21T02:27:30.480000 CVE-2015-2505,0,0,e00dc56f0c8441e1a169b1e41e377b5a1a5f5ff1585811e95a57d965627ad58f,2024-11-21T02:27:30.587000 @@ -75972,8 +75972,8 @@ CVE-2015-2541,0,0,b4ad359df8ea3d6ce59de1ec9aea5fc3f9b5a7972b8730a22c8a33204924b5 CVE-2015-2542,0,0,e858356d88869dfc32fc0a5db3f8ff2e6c58c20d9b80f3e051aa3022452eec21,2024-11-21T02:27:34.567000 CVE-2015-2543,0,0,d2981f278e391c30162d239a8c90ece25d994ee78f79bc50898095faf6471efc,2024-11-21T02:27:34.680000 CVE-2015-2544,0,0,4e5b0730ad2054e505576a69c1345f1cb6192323f7c2e99a172295e5997e6f06,2024-11-21T02:27:34.787000 -CVE-2015-2545,0,0,773837149d585547cdd083d6ce04a24e2504c6028134c8c9efb9f09f666f6591,2024-11-21T02:27:34.900000 -CVE-2015-2546,0,0,3ed839d8f766f060f75917ad7d446e9be7a1aff7492ec2cf1b5c3132c7293f65,2024-11-21T02:27:35.020000 +CVE-2015-2545,0,1,90e359775dc9879bca8b59826c0a14a2a4faf8bbb4d47054783f5ab46c2c6a60,2024-11-21T02:27:34.900000 +CVE-2015-2546,0,1,0ec1ea2a09c717603d7abf368114f33e354b1246512e92e5c00485274890ada1,2024-11-21T02:27:35.020000 CVE-2015-2547,0,0,71327887aaaf05c12c1ea748b54de15f5859e1d66eadec6ddd3af104078d9d44,2023-11-07T02:25:22.523000 CVE-2015-2548,0,0,479e31aacc15b060afbe8ad07e34024eff90df53ca8ea1778dba1c3ec3a3391a,2024-11-21T02:27:35.150000 CVE-2015-2549,0,0,0611df9998e7a8096b95492e11ed27891d3ba1b63b496f542cd355dc6b2f94f5,2024-11-21T02:27:35.267000 @@ -76016,7 +76016,7 @@ CVE-2015-2586,0,0,f7336a9706450103ece990b8dc3e5cfe9fff23527d8669a2206910f1dfbf47 CVE-2015-2587,0,0,a7a8e9262ae558130626b497395f70b685474b1fabfd6cfe3ca69da5ae881a3f,2024-11-21T02:27:39.650000 CVE-2015-2588,0,0,2d6abcf9dcc87813f7c80a49e4ad91b833dc7ae4c00d52c35ee3bde9b03beb32,2024-11-21T02:27:39.760000 CVE-2015-2589,0,0,16ba72acc2ee7a44e8f12b337a80a9ba43822171758525445b69e70e502b57cf,2024-11-21T02:27:39.867000 -CVE-2015-2590,0,0,97a6b07a7a997e7559addc676f30f1706a6f3736c24e1aaaf9099a1d2842d012,2024-11-21T02:27:39.980000 +CVE-2015-2590,0,1,ef4fbcdb78328f49a496f509755b2eeeb635e5045074decc3235c9bc81fe90dc,2024-11-21T02:27:39.980000 CVE-2015-2591,0,0,3db22671feed4b1e0e0de73da2d636f599dff04de3005eb3d7522a4fbf228b95,2024-11-21T02:27:40.180000 CVE-2015-2592,0,0,00f99a81eeb661d9e79dd210fc21d75879f46783d0b78982f7627aaf7da7f697,2024-11-21T02:27:40.300000 CVE-2015-2593,0,0,1a90d85e6ce3d6eba414d138990ba3730ac9d278b575daa0ce6f2758b4eab7c0,2024-11-21T02:27:40.417000 @@ -76414,14 +76414,14 @@ CVE-2015-3027,0,0,c0b00dcc0f84a72cfde736ee4da8c784559b22039f6b517af1eb142b074307 CVE-2015-3028,0,0,69fdc1fa0a82b567bb393d4b776a663d75a366eae0e34781e8eb0fc126a89b60,2024-11-21T02:28:31.177000 CVE-2015-3029,0,0,bff423b756f07c12f6c8834008dbc96fd67933516867a88b4a4beeb0ff3f2fe7,2024-11-21T02:28:31.323000 CVE-2015-3030,0,0,907d52382a149b5155bceec324aca9cf058e96a08a1a0aef764184654572afea,2024-11-21T02:28:31.463000 -CVE-2015-3035,0,0,26ef6d7f54266b6dd5d916d4fb69ea2cafe0b7a5a69ee729a7b1b50726786733,2024-11-21T02:28:31.600000 +CVE-2015-3035,0,1,98018e8d62eff18e814e7da42ff20b6bacfc3f08ae8de53dffa5fa220b73e096,2024-11-21T02:28:31.600000 CVE-2015-3036,0,0,998bbd5091c7830e94d2de45a7b8461434c654b912ba7f97edc7af86ea47da1c,2024-11-21T02:28:31.787000 CVE-2015-3038,0,0,98b1f4f76e66e028e73f99a6bc225232a85009365d4c6894e9f0df997c403541,2024-11-21T02:28:31.947000 CVE-2015-3039,0,0,b3adb45385dca7bfa8182146c98c04268c97e07b5011d02ad8d218b9f4e7b853,2024-11-21T02:28:32.073000 CVE-2015-3040,0,0,dab5cfec3b5aa8d98ed5fb4e3a3725663bc865631030702b4167830844d1e80a,2024-11-21T02:28:32.227000 CVE-2015-3041,0,0,2ee98df78095b084022a1bc065f163d8a47b1af021e5ff357dc81dd4100bd38d,2024-11-21T02:28:32.373000 CVE-2015-3042,0,0,ae35846dd2ea4a16341a53f543f3b9372663396c4f87756ac45fb538b1249c51,2024-11-21T02:28:32.513000 -CVE-2015-3043,0,0,ef1660b12fd2cba21a47c5dba880a81c7917a00cc8738320fb5c7067b5e72f56,2024-11-21T02:28:32.663000 +CVE-2015-3043,0,1,12f042867acfee8f8cce2c465d839a6381ff80013b1de5c6e6d2a3bd01181a5b,2024-11-21T02:28:32.663000 CVE-2015-3044,0,0,c59d63f75c6506a89268c03d2b6f879139ebbe54ba850872b3b78b277b23b542,2024-11-21T02:28:32.817000 CVE-2015-3045,0,0,7247b26e06c0e841aa6dc6d83e32aee805acfd8bbb1c795bb2a354636ede17c0,2023-11-07T02:25:28.660000 CVE-2015-3046,0,0,54eedb6dfca9eb314e7f8221ac00c49c3f073edc8ef01e585efa88b9286c4dcb,2024-11-21T02:28:32.983000 @@ -76491,7 +76491,7 @@ CVE-2015-3109,0,0,55f7bed559d74932631a9289c0e282b167433393c92926f0274b286505e75b CVE-2015-3110,0,0,22e4392945cb917190f32f405660a507936fb6b4a40bbd144ae1fd0f83992a7f,2024-11-21T02:28:41.457000 CVE-2015-3111,0,0,a761c11fab71d2e174ebbde91cb447c6872894176806c00295bc4835ff9fe072,2024-11-21T02:28:41.577000 CVE-2015-3112,0,0,25a1d24318eb594ae448d4394d710de254b84e4e3c112ce5714c2985b6ca2ce1,2024-11-21T02:28:41.697000 -CVE-2015-3113,0,0,78360e2f3accee1758ca9574ccdd24a45f6fbcd2ca1dcce028d074d80fe7d84e,2024-11-21T02:28:41.810000 +CVE-2015-3113,0,1,54dd82d013718fcf766a4828d26e8c5945f6b14d7e47497a67008a47de6d7b32,2024-11-21T02:28:41.810000 CVE-2015-3114,0,0,9006b707b312fffeee7e8d0a0db640014aa4411c187d10f57433ac8a3eff6f11,2024-11-21T02:28:41.950000 CVE-2015-3115,0,0,8d1838ae2145ff7fe82197e237e868573966b34ed94e2e9e95a1029f93e652b4,2024-11-21T02:28:42.080000 CVE-2015-3116,0,0,67ba34841dfcd92305138744ea439aa32be106b911249617f45dad6fba0a0ac3,2024-11-21T02:28:42.203000 @@ -77199,7 +77199,7 @@ CVE-2015-4064,0,0,e48f0873e051c9c7315bd741fa98a65a469ce7eb2a98fed00a59faf8425d32 CVE-2015-4065,0,0,7d9521a9d47735f900c52be164d2a6d7d109c04084badb1054c6f735847a2af1,2024-11-21T02:30:23.307000 CVE-2015-4066,0,0,b427a12e6dc43cf1245205cb7c00b7cf312b2f588da450f9b0b889efd73b9946,2024-11-21T02:30:23.453000 CVE-2015-4067,0,0,be28666ba8d468db268d222f58acc0085fe6f9b675cc1d3660ef368b2d8a15b3,2024-11-21T02:30:23.607000 -CVE-2015-4068,0,0,ed3d5ccedaa7173fcf315bc4d32b16a5c5abbd053a2831aca8cb29cd8ac4874a,2024-11-21T02:30:23.753000 +CVE-2015-4068,0,1,dda2b7d07b351cfa020f3c4313cbbc833e40efb71dc45e84fbefacb700a50469,2024-11-21T02:30:23.753000 CVE-2015-4069,0,0,99f59bb4f21f5687c87fc647af6f7006d6abe388a977513fbf308105b739c134,2024-11-21T02:30:23.910000 CVE-2015-4070,0,0,0282a2e4068df5172635e16bd80103fbbd862077acf1d407e7023526f0d62929,2024-11-21T02:30:24.057000 CVE-2015-4071,0,0,7c810d3df70e887ea0c2dae1bcc81c6a21bbe94db4c40732403247d2c9faf9a7,2024-11-21T02:30:24.203000 @@ -77563,7 +77563,7 @@ CVE-2015-4491,0,0,8c4eea49b374751f373f9757f99924867ab35f3581f4fb432be32e8f4349ca CVE-2015-4492,0,0,4a0ed69bdf6458fd91948247cb9637a217530f4f23c1481cab494b1d02abf7f5,2024-11-21T02:31:11.717000 CVE-2015-4493,0,0,390d1532e2721a6f4ceb8dab48e5b0501bcdd6d2325831da7245de1c4d882972,2024-11-21T02:31:11.890000 CVE-2015-4494,0,0,1aba749a4f5ce1c5d1359656774d573e3251cd6776c8506f8239e41482efb6b5,2024-11-21T02:31:12.053000 -CVE-2015-4495,0,0,bd0bc592f422ac6140751ad020fbca1100f4bf0e27ea8831d25c77cd5859364c,2024-11-21T02:31:12.170000 +CVE-2015-4495,0,1,a752bac8c90739b964f386139699093bb8e63f7ca5fced3417ac29da4e3ddd1a,2024-11-21T02:31:12.170000 CVE-2015-4496,0,0,de69d405419a0bbd48743aa44b5c1ac8878942f07d33dc56c199c5bf1c0fd875,2024-11-21T02:31:12.337000 CVE-2015-4497,0,0,4b08eaf1ec8312ce907c7860a913ad5cd3275afc8afce41935954e78e896f07a,2024-11-21T02:31:12.467000 CVE-2015-4498,0,0,145bd10d195fb719d1c3af1fad900cfa1866bb6419b7ba07f6b72592ce9ee8f8,2024-11-21T02:31:12.593000 @@ -77865,7 +77865,7 @@ CVE-2015-4848,0,0,750d7ea2fe5e28106aadd0a3084b9228071088aa6e5db2f42974ef5cdb6da5 CVE-2015-4849,0,0,6b86c817f1babbb9d16eb1d46adb56b1cd43ff753862b97640fc51580b2c70f0,2024-11-21T02:31:52.557000 CVE-2015-4850,0,0,c757cb4f4f0fea29c5eaf2fc7e2266e0e51cd5a712fd3896ab26008767dc60d2,2024-11-21T02:31:52.673000 CVE-2015-4851,0,0,a2130ce7be15a90b933eb8e4fbae047b8ce822785a0d48fb0b6fdfe2c89b4eb9,2024-11-21T02:31:52.787000 -CVE-2015-4852,0,0,a97027c0b07dffa6827602246b5a2e7ac975c46b25b9467f4d14762fdf491870,2024-11-21T02:31:52.913000 +CVE-2015-4852,0,1,c639864ff9732ab90e2fa8695d73abd54bb692ddf2ba85e389d302a252b44672,2024-11-21T02:31:52.913000 CVE-2015-4853,0,0,ecd9661ce16a834dcc07b12bf2e769dc04bd4672748e88851b80b52aeb5a32b3,2023-11-07T02:25:58.210000 CVE-2015-4854,0,0,b610b2f8e7049df196042453871a69c9d80548566da024722248913f46b3f3c4,2024-11-21T02:31:53.113000 CVE-2015-4855,0,0,b733bffd8e496cf35a751c917a5993a27d945bb8485db7a284952bc997748445,2023-11-07T02:25:58.463000 @@ -77915,7 +77915,7 @@ CVE-2015-4898,0,0,9a4331a0aa6e4189e4bea01f6235a6b6a9d82e643e1796fa40866333e06d26 CVE-2015-4899,0,0,0ff8d0d8a04b4fc3bde3898387d4a4300ad9d14ebb4a2909c3f5397a3179b5d7,2024-11-21T02:31:58.997000 CVE-2015-4900,0,0,2ffc0604c5d679e7aafc2ed181a906cad562a82f4c606d673470926b4c3cdc9e,2024-11-21T02:31:59.100000 CVE-2015-4901,0,0,170e13edb001c0e4b204b5d1893427ac8b65cb6632299b658698c6d2e4062550,2024-11-21T02:31:59.203000 -CVE-2015-4902,0,0,b1e270b3f68f87089cb29a58aa01c3c1f669e030ae34ab5a15efa3542cf79efc,2024-11-21T02:31:59.317000 +CVE-2015-4902,0,1,c30eff13e3a027fa61730407abdf9c6ac1e642ace418dd48957a0845ec93a33b,2024-11-21T02:31:59.317000 CVE-2015-4903,0,0,88c33678cc95c478318871357faaa5d68d1d3cba886c25e49c2a558febc7dc11,2024-11-21T02:31:59.500000 CVE-2015-4904,0,0,9111a1bfdd93e26af23204ff21b2510d9af1aa581b929731d3b27c1fdc1abe8c,2024-11-21T02:31:59.640000 CVE-2015-4905,0,0,dfd4d6fc5d6900efa8f87e3ba4ba61f33973bdc27a34a33c62734278a55c334e,2024-11-21T02:31:59.760000 @@ -78098,11 +78098,11 @@ CVE-2015-5115,0,0,ae8838cf6b150886f8107c8226f31e0999b542f6d5ffc59195e20ae10b5023 CVE-2015-5116,0,0,615a4305db86b1814660e936f986671d586172d6df2cfe9afe383ed29464fc65,2024-11-21T02:32:23.553000 CVE-2015-5117,0,0,14dc814d8ff43ca828a91cbdddc327b92e9324c3f4ce6f71b07f2768334be89c,2024-11-21T02:32:23.780000 CVE-2015-5118,0,0,62caed435546b83e9a906967d71fd37f2643128020e3f747cd3d1f7a7751c696,2024-11-21T02:32:23.920000 -CVE-2015-5119,0,0,1b174950526611e4ca210846262268ee9dee0d3ecf01d4f1d5acb607586f8abb,2024-11-21T02:32:24.047000 +CVE-2015-5119,0,1,b2630f31e158daf466f0206215d39eb11fdb3c297bf4b22dd255aca3606d3690,2024-11-21T02:32:24.047000 CVE-2015-5120,0,0,9e11b0429d7854222277e353aa8600ddbeb22fe380f9e7255065000890561770,2024-11-21T02:32:24.207000 CVE-2015-5121,0,0,c93a7fc6de982412b85563391e9041ddf77e3d28f04aba44eb4c015463a240fd,2024-11-21T02:32:24.317000 -CVE-2015-5122,0,0,1cdc0832b3f8698b46c75b7d4eb62f9342e0d55bf467e20fcc745f775d2e43dc,2024-11-21T02:32:24.423000 -CVE-2015-5123,0,0,7f08e6f233cfadb945bce18977abd23472a1133f722fe0da9054ea8aa1957090,2024-11-21T02:32:24.590000 +CVE-2015-5122,0,1,f87e04a10c0527625b00380f9b67918443f5a71292762540cbd34701f4267051,2024-11-21T02:32:24.423000 +CVE-2015-5123,0,1,b8aef1801df9dd09bcf912abb10d82d52462f9210cc230d9427b562fbb9ae998,2024-11-21T02:32:24.590000 CVE-2015-5124,0,0,2c4101524d74cc893510e4e85864dd64d5eda8dbd483f222c7040999b6458e5c,2024-11-21T02:32:24.747000 CVE-2015-5125,0,0,4c9b9fedd89534b28483467417e535cf20c9e0b4683ab6d9cca7c12c789bcea3,2024-11-21T02:32:24.880000 CVE-2015-5126,0,0,5a1866006ab0338050bafd6c73f82b5a5684892c6ce77ab235a699045b048c28,2023-11-07T02:26:01.840000 @@ -78288,7 +78288,7 @@ CVE-2015-5313,0,0,d3576caa883342e80ecf64dbf17b78573cadfe7ded598f5fc735a27079375c CVE-2015-5314,0,0,a9a94c5c60a3732bc046c0b2055c472a728cb04c101455e8018df228e886a08c,2024-11-21T02:32:46.673000 CVE-2015-5315,0,0,053b67fb2a3ba7b72dcedd4c558befe342ae8fa2daf1049cf1699b366628f3bc,2024-11-21T02:32:46.793000 CVE-2015-5316,0,0,39c0ea269fddc858458abd197121cbe8edd08e9d7b6d2329e7aa2bcba1f4d1b9,2024-11-21T02:32:46.903000 -CVE-2015-5317,0,0,90730522d82eb2ff11c9dfe31297d5238f11e67838cd31865ca2ea353db65d97,2024-11-21T02:32:47.013000 +CVE-2015-5317,0,1,1d42a077b33305fe1aa6834dea81168fbe66651b682e50cdbe72850e9ca57189,2024-11-21T02:32:47.013000 CVE-2015-5318,0,0,c2359442951b13db9bef56efda91bffc5ac107484beb1d09af9b1f9a53f27ee1,2024-11-21T02:32:47.127000 CVE-2015-5319,0,0,590e1d00bb509853ed13f87fca91bc58586d6586a8b3a14e87ca072b88f76ae5,2024-11-21T02:32:47.240000 CVE-2015-5320,0,0,be0edfeab2636cefb8071966348caf575a167bdcf3863e37d17896657713bd13,2024-11-21T02:32:47.353000 @@ -79104,7 +79104,7 @@ CVE-2015-6171,0,0,598993a6790294058cbf359dbc3f3114da2458dcea6daeb7ae692c12929e0c CVE-2015-6172,0,0,6d427d4a3bfeb1d2f2b5a2f8481311c46c1de24e8b5e991078590f71f7fc4b9c,2024-11-21T02:34:34.683000 CVE-2015-6173,0,0,fcc0bc4d8a60a980b86173dc62058418cdcac913a253d6713112e21b999f7b1e,2024-11-21T02:34:34.797000 CVE-2015-6174,0,0,0f9be3dc28f7d6e9a4c66517cbfb9789a94f7709ed3a58bb99b7686a6db32226,2024-11-21T02:34:34.930000 -CVE-2015-6175,0,0,2c6eaa35e7eeb0b7106e38d86b114e920e38e5f920f19487d7ae0daf11a055a4,2024-11-21T02:34:35.057000 +CVE-2015-6175,0,1,eeb37d08764f961d138781623313b84f7863daddfa13ce3ea0d8ba585d7d0660,2024-11-21T02:34:35.057000 CVE-2015-6176,0,0,0a8eb8510c36bd4deb003f2eac1508e47a97227f6af94dbd358dc37755316b3f,2024-11-21T02:34:35.167000 CVE-2015-6177,0,0,7fdac18cb59836c74dd1e85c0abc3794ad988cd7ffc79f1d1c37e4125a59ae79,2024-11-21T02:34:35.290000 CVE-2015-6178,0,0,1bf56a91030dd59d65ca8bee85e32760901278b2eccd1f61024bceb0138549db,2023-11-07T02:26:33.597000 @@ -80279,7 +80279,7 @@ CVE-2015-7446,0,0,4408d712db309590000f8d49d950570c16d9b38717ddc8a65189cc89f0454d CVE-2015-7447,0,0,e55faf4adb449699acf0a3d77f9db0047f28bdb1e1048058843d6b5bd14981a8,2024-11-21T02:36:48.397000 CVE-2015-7448,0,0,a2240599ef822032be2565a57d10c55f47d70c56a1531ccbf00381d739347477,2024-11-21T02:36:48.513000 CVE-2015-7449,0,0,05e00f69fd9fbf840052a09d02c3f32ac18eab63dff52173a175355f4ec6eb26,2024-11-21T02:36:48.630000 -CVE-2015-7450,0,0,14f8f7e39740d169c7f434b2c05d58518ef617cda3d38a060b2da993aaf98082,2024-11-21T02:36:48.753000 +CVE-2015-7450,0,1,aef7b8239eac0a5e43691031bd7cddf37d3a8c5a7b29e1f78b06cf709ae3c51e,2024-11-21T02:36:48.753000 CVE-2015-7451,0,0,3cb8a45f37ce10b54da691c117905594e5f8a702160d03215807ca198d92be66,2024-11-21T02:36:48.880000 CVE-2015-7452,0,0,bf345883402eaad8adbd20fbae43b92aaaaf0c2e9ccbc4c71e2d4f902a4eb4fd,2024-11-21T02:36:48.987000 CVE-2015-7453,0,0,910457479a0baa218b21460a837949bffa30b5886fff7532f7329978bf5a0077,2024-11-21T02:36:49.100000 @@ -80460,7 +80460,7 @@ CVE-2015-7641,0,0,10d40adddc2127ad8ba46d3d4cc4501a8479759bba4e5951e48458d06f6c95 CVE-2015-7642,0,0,66d14d7c4464ceb706d1491f113696c59382efd1f4b8232955d8f26f73fff8a8,2024-11-21T02:37:07.250000 CVE-2015-7643,0,0,22c98f3f092bcca4abafb0f3002d399885dc7135d84d10a28f2f41ced4c8f0b4,2024-11-21T02:37:07.370000 CVE-2015-7644,0,0,ca1f68b4c27f648468906579197dde35b7bcdb3e868c2cdc0140b37fe0fec040,2024-11-21T02:37:07.490000 -CVE-2015-7645,0,0,ee4fd32e3858f2a6f59b6e492f0ec89339cf9b4dc2b8f4fa1127399831e8d6b1,2024-11-21T02:37:07.620000 +CVE-2015-7645,0,1,863ab2ac20ee107b73197630b34f6406eedc782b3ed04102a775299c0fa9fc78,2024-11-21T02:37:07.620000 CVE-2015-7646,0,0,53406fc00814552e11d9355d4e37495e78bc61adac02d9f25f24595de67b46ad,2023-11-07T02:27:59.680000 CVE-2015-7647,0,0,f49a5ad7c8e3fd3b8f30c94752fb3831c870a619f7ff89abf805abf38e730c8c,2024-11-21T02:37:07.797000 CVE-2015-7648,0,0,745782194fb2fc8d9b15b4b735ace7375234f1924d127e6d1a28f7a61237961c,2024-11-21T02:37:08.487000 @@ -81348,7 +81348,7 @@ CVE-2015-8647,0,0,ea72467c103ee64a81e5118290be3db7844ca0629ca684db71b71ce3fd49ed CVE-2015-8648,0,0,f4c0d7443c694b8e2d90004779d56db83546ca16b6fd562efe975963bd8f2ae0,2024-11-21T02:38:53.380000 CVE-2015-8649,0,0,14a272b22091276a126039f5517587b69e0d7843a9b5945c5f273f72cfbf499f,2024-11-21T02:38:53.523000 CVE-2015-8650,0,0,67660a6ffd36503d04e70552906d7d0b94220da1e43224ae65dc7ebc1b3ec04c,2024-11-21T02:38:53.657000 -CVE-2015-8651,0,0,7a5e3fa372edab37d390d8a2b9cd002bb03a7e0b7f9bcf340e2ac9dcf82fb89a,2024-11-21T02:38:53.790000 +CVE-2015-8651,0,1,8cd4cf3202426345d3028b78b3596cddf3717c9943ecb2c01bb1db7f506b080a,2024-11-21T02:38:53.790000 CVE-2015-8652,0,0,21fbe4e57fbdc807a6a0c2b1e927f2ab4ee3617467913fef63d4015566695bfc,2024-11-21T02:38:53.950000 CVE-2015-8653,0,0,dfed7b76d4565bce8f1fcc6e233292c7d20a45c8ba88bd03062635b0d74ac60c,2024-11-21T02:38:54.090000 CVE-2015-8654,0,0,ab078b303f20bfe8b8a8e35928947a843886bbb64e2502a588481c4b7e160969,2024-11-21T02:38:54.220000 @@ -82248,13 +82248,13 @@ CVE-2016-0030,0,0,b84d0768c035c71726bc0c7b07ea9cac07a91f0f85744d87e10f1a4bce9984 CVE-2016-0031,0,0,a31f4be4156cd94427780304c5b8d48fea8166417158ede788fda033eb6368be,2024-11-21T02:40:57.727000 CVE-2016-0032,0,0,0e019f9566a3edc72c3d0fd73e67bdf9d3cc420c61f8754bb665d7575764fde1,2024-11-21T02:40:57.840000 CVE-2016-0033,0,0,08ce8af26aea2e0b3403ba68547870f33b0f1acd130a6f52042233792d2d1031,2024-11-21T02:40:57.960000 -CVE-2016-0034,0,0,6119b356267e03918cf97e08440ff6471217dd448b09cf42296d78f07fa0d8b2,2024-11-21T02:40:58.077000 +CVE-2016-0034,0,1,b9e571001ce359194185d218178709dc4aa982cc444cc513e61ee145a7966ca4,2024-11-21T02:40:58.077000 CVE-2016-0035,0,0,e32092299e2ce8c2adcba6d535c921c478de969e8313004b5472467c7acec2c2,2024-11-21T02:40:58.197000 CVE-2016-0036,0,0,733ecda21a89c56f308e7ef1394bf35ba207f2669b506b24077cf48d0a8d43fd,2024-11-21T02:40:58.317000 CVE-2016-0037,0,0,acc79b40aeb0697ca00416d2ed1bc31ed06fad3f29c20d69b54fd9de1b02f048,2024-11-21T02:40:58.440000 CVE-2016-0038,0,0,5caff9750a9fc84cffbc27f69d1c34c5fd35f985c72e0e49c405f89a9b9de6b1,2024-11-21T02:40:58.560000 CVE-2016-0039,0,0,1f34a5d22d40effe55d48a316508fb902f40185f5c7f5e7f35b2a55b43d219f5,2024-11-21T02:40:58.677000 -CVE-2016-0040,0,0,b8e7e5069c55de1206d4024de13ae35550c0ba3ae2f9cc98edff550cdd207bdb,2024-11-21T02:40:58.783000 +CVE-2016-0040,0,1,0df48ab7a61a0dcf98f3181e762b02179fa7d3ed16105a344ba961b0c628a6be,2024-11-21T02:40:58.783000 CVE-2016-0041,0,0,cc67a9ab27d8b71eb861fbf14cdc3699f018be2a1e4698ca4957d4159c513b3d,2024-11-21T02:40:58.903000 CVE-2016-0042,0,0,e8dbd7526f4296c07e49bd7907baf48bd279819ed9efaffb14dfd8766b3a8f52,2024-11-21T02:40:59.007000 CVE-2016-0043,0,0,53b2276908342bbdd6826ad14d9c7e573590a6732280285a7945f21b3041c480,2023-11-07T02:29:01.650000 @@ -82313,7 +82313,7 @@ CVE-2016-0095,0,0,c3d8d962259c8376b9aaddadd4036baee0a1ee57214d14c112c51247c33304 CVE-2016-0096,0,0,b53ac2b2050b1fb7c7b3649ce3013e49c0392a746dbf3e50018dda8a5361424c,2024-11-21T02:41:04.060000 CVE-2016-0097,0,0,38e5ed1e34b04f0ecbc3d69a1c00c831ad23e0a01f2e5eaf5bfcf35582b22df1,2023-11-07T02:29:04.853000 CVE-2016-0098,0,0,7facd175d33dfe7baa4d4d7141adbdcd81a6e18838b2e26b72c9b1501fad68a2,2024-11-21T02:41:04.190000 -CVE-2016-0099,0,0,d07fb8bae8694255152bf632fa64adbdfce4628291eea07d04c0e3a20b7a9151,2024-11-21T02:41:04.300000 +CVE-2016-0099,0,1,82ec791e84d4fd9f3ad68b2ec77273027dc3c8876cd07054b20cdcbca1f7f005,2024-11-21T02:41:04.300000 CVE-2016-0100,0,0,da4b474b9dadd02044724689a50d66dcfdee0e886e31eeaf2296865a51d33291,2024-11-21T02:41:04.447000 CVE-2016-0101,0,0,fbf8fe63e42a95c53b7ea5a672b49417ef84563505187cd2ac44cc4228aa53db,2024-11-21T02:41:04.563000 CVE-2016-0102,0,0,f175724ec9f121d54efe77f72a94475f902a72ce379092e7dc54573fe661bea9,2024-11-21T02:41:04.673000 @@ -82365,7 +82365,7 @@ CVE-2016-0147,0,0,ffdc18783240c5be97805e2100bbcf0fef5ad5692780cb70997a1fcfc5260b CVE-2016-0148,0,0,e9a04f4e2d2c0eec4cc426e5fdebf78f33d72a4f6dc401a36979b007744f81ff,2024-11-21T02:41:09.507000 CVE-2016-0149,0,0,3435e0e680ff7673b6cb309ad12046180f9f933dc2e0c080fdef422b02af6cdc,2024-11-21T02:41:09.630000 CVE-2016-0150,0,0,e2156e34145d142288947f4003469099a28e9705b5ade608d3214aa425916c4e,2024-11-21T02:41:09.747000 -CVE-2016-0151,0,0,893fd98cb626c9a06172c7b900c8d6c09d527f075acdf7d2ed860847ffb2b2bd,2024-11-21T02:41:09.857000 +CVE-2016-0151,0,1,40678f0d42fb44666909f21cb81c1205703b1c4e8a3910943c639ce70081be7d,2024-11-21T02:41:09.857000 CVE-2016-0152,0,0,3319caa959d35811dcc19d8d02e28bcd14a6abe888d5a7ce6472ce5998fcf94a,2024-11-21T02:41:09.980000 CVE-2016-0153,0,0,9756bd776076d4e0bf687b63a63a36845542afd43d961b68d5c616bb4b428023,2024-11-21T02:41:10.097000 CVE-2016-0154,0,0,3d5e511cea897ce6650167f29b415ec731c10a7ec23a789dacfc9811a7002604,2024-11-21T02:41:10.213000 @@ -82376,12 +82376,12 @@ CVE-2016-0158,0,0,af894c7f96f32d35218cb302ef3c33fe6ff85768ef3832afdc0080982a45e7 CVE-2016-0159,0,0,8abc97b2d503ac23d47d39fdb6376f4b0cb373bb4009f82eefd1453915194ce5,2024-11-21T02:41:10.787000 CVE-2016-0160,0,0,16ac027f7f56c251b5d53678e68f7e052b40d594590c29ecc9b4c02ceca161de,2024-11-21T02:41:10.890000 CVE-2016-0161,0,0,e386e6e5fa4e155c5292a188ff768e6b59c10c7cfd776ecaeac25df09bfd56b9,2024-11-21T02:41:11.013000 -CVE-2016-0162,0,0,62d8cdf00c003d1d3aea8c1863c95f61b2c3bd1e2a8c2ffd6ed02b6def9cedf1,2024-11-21T02:41:11.123000 +CVE-2016-0162,0,1,393faa4d44f523472572be9eeabb44f48cd54dfde483024ed67c513dccee40ec,2024-11-21T02:41:11.123000 CVE-2016-0163,0,0,ad012537ac7387ed104107f6ad783b07e56491dc0f59c8c36f5426188f5ab08d,2023-11-07T02:29:06.743000 CVE-2016-0164,0,0,0cc7e74697a6f509ee78bbcf4160b49e7dce65514e4212ffcddb9e5d137b4b53,2024-11-21T02:41:11.287000 -CVE-2016-0165,0,0,71ab1ea38a0c4a9656e995bf6ff7e4baa16db5f1ebe8a492a03acacb347b4abf,2024-11-21T02:41:11.413000 +CVE-2016-0165,0,1,faa48ad497c1655582fb69e0f5f35cd81d201d88711b616ed597806de11e159b,2024-11-21T02:41:11.413000 CVE-2016-0166,0,0,69549e127809e10bba9b84ab535c37c1e9aa646d5feea4f44f99415cac724c19,2024-11-21T02:41:11.537000 -CVE-2016-0167,0,0,408846ac09fb0d66bca6240121f43dc1bd03da3f543fd84ad3a765e6fe23bc6a,2024-11-21T02:41:11.650000 +CVE-2016-0167,0,1,f80914cac1141fcafd225f4b91f1e8c9664792e36d1699c5a1fcf65112e790e5,2024-11-21T02:41:11.650000 CVE-2016-0168,0,0,6b24f5181c25e3f3dae828dadcc4e6a1555c84285f49ce491ea3c12cbed265f7,2024-11-21T02:41:11.770000 CVE-2016-0169,0,0,003d5efe96740f169b652b428cb5685e37d75ad4854a16deb0552c8bb38c5283,2024-11-21T02:41:11.907000 CVE-2016-0170,0,0,187de215368ba02754a0c90078b26b4cd7d0baf66dd498b953572ae9f0984e11,2024-11-21T02:41:12.020000 @@ -82399,11 +82399,11 @@ CVE-2016-0181,0,0,ae01f4ace243428d22268ff51e846d5ad6964599551130edd131689bd133c1 CVE-2016-0182,0,0,6fb883c276c290c9f8df233ef856aa51adf75e5a98e7f967c3fb960e8c9e124c,2024-11-21T02:41:13.537000 CVE-2016-0183,0,0,82e02504eb740e52c6df437a7265f911c20b6d96633279aa3ae3ffe9c4a4e755,2024-11-21T02:41:13.653000 CVE-2016-0184,0,0,be31b3f2dd06d598707d7878c1dd51f7f8cb2ba0bd7476e4a334b10cffbb46c4,2024-11-21T02:41:13.760000 -CVE-2016-0185,0,0,eb139ee2091ab42fcc0d75e305a876aa085bff3aeb2c258c4ac20940b9e21b0c,2024-11-21T02:41:13.873000 +CVE-2016-0185,0,1,4b273969a623eaac1aa012c564381aec545bf526fe26e016c8fce74145efcf60,2024-11-21T02:41:13.873000 CVE-2016-0186,0,0,195bcfa5a8530274e284532031535eaeade49072b00901ae3a4a15ace1083158,2024-11-21T02:41:13.990000 CVE-2016-0187,0,0,b4a85d3c2059c7b0a2f2929488d121ad49cbbf045fc09f7f39bfaa9d67da4c5f,2024-11-21T02:41:14.100000 CVE-2016-0188,0,0,ec99129c3974ac62012853aaa8152132e434c26eb18cfcf825678705e1ea8d09,2024-11-21T02:41:14.210000 -CVE-2016-0189,0,0,ea40dabe03f5f24a078772dcba372f0ed912bdb4d2663d15498a917cb1a5b5ae,2024-11-21T02:41:14.313000 +CVE-2016-0189,0,1,5165eebab3d6aee6223b2e360d0e48ba71ebd52b5f9d88ea6b48c46f8b0952d4,2024-11-21T02:41:14.313000 CVE-2016-0190,0,0,e1d6f1fc8234ca5e4d36ae5747c72ca6fa437ddfedd68839e4738219dbb7e9c8,2024-11-21T02:41:14.443000 CVE-2016-0191,0,0,c57af6eff531fcc735e82119cecc3e7e46e19b2893c402bc0b6158d02e32a751,2024-11-21T02:41:14.567000 CVE-2016-0192,0,0,ab5b7be141be42650e6f03796d8bedae00de895de94b1fad76bcd038e0f160e7,2024-11-21T02:41:14.683000 @@ -82946,7 +82946,7 @@ CVE-2016-0747,0,0,658bf021d2078ac58daea5f9a7101e0ab9c6482217feede7762850a3c1d1df CVE-2016-0749,0,0,5d8b926c399674f591ff34d41c6003b58648d1953fceabe026812e87fa98b6cf,2024-11-21T02:42:18.057000 CVE-2016-0750,0,0,fa34ed8c4ad13ce67ea98905d7586e6467600b53d5dec1df6d3d7b5791b87521,2024-11-21T02:42:18.180000 CVE-2016-0751,0,0,611dc4b2c50ba47f2baa8b8283697b31a138ba6f777e71841d48f17c8e27142a,2024-11-21T02:42:18.350000 -CVE-2016-0752,0,0,1b5b9882419298c9abca50ede7925d431f02eeae0e82b15506fe8db967e46d76,2024-11-21T02:42:18.493000 +CVE-2016-0752,0,1,57576c69c90093a1000994e692199cbbfade9e944da6307862ad9e6e58575e1b,2024-11-21T02:42:18.493000 CVE-2016-0753,0,0,8293fd73e1d78f4ff3da4f0c08455661272ce89da72f1d1b0231b9f31c4eacdf,2024-11-21T02:42:18.643000 CVE-2016-0754,0,0,698741e9381fa9cff9326f05a765a4f4833576a92fe8868e5042d934a734d629,2024-11-21T02:42:18.783000 CVE-2016-0755,0,0,d92d406a30e2205d0398dadb3f9f3942b0e68d3fb59989c9c0816c3fe8f52857,2024-11-21T02:42:18.890000 @@ -83174,7 +83174,7 @@ CVE-2016-0980,0,0,f5c5f87eb80494a0ce6be29c6480f742518a5e77f8f19941f192c150904e69 CVE-2016-0981,0,0,70e6d1567ffb0569ccc9ec93f13b182bcc348dbbef7d76c7300e0dcf8034a098,2024-11-21T02:42:46.423000 CVE-2016-0982,0,0,b3a2f9dd630e9da8f8de36c95780a581181e13827e5cd675de6e824256cbd173,2024-11-21T02:42:46.553000 CVE-2016-0983,0,0,cb309542f23ed3543025eefab0df6c848bddba79eed0df52bd2dfe635c408514,2024-11-21T02:42:46.690000 -CVE-2016-0984,0,0,bcfcbf5802361c98935ef64cc6834aaf4042b529bea85c1d3f94821244195eb5,2024-11-21T02:42:46.840000 +CVE-2016-0984,0,1,2c96703f0cc0998e1dcd394c507f4c0d880a850755c41731b61459cb04dd9c3d,2024-11-21T02:42:46.840000 CVE-2016-0985,0,0,69fd23207b2d70ef82541ff240072f612de7b8dcd9e6dcacad605f70e67a6049,2024-11-21T02:42:46.997000 CVE-2016-0986,0,0,52c05d3ba1adf782a673c4f69af097d6a6debeb51b3c4d2d20a6cc1b7b2923e2,2024-11-21T02:42:47.150000 CVE-2016-0987,0,0,35c562afe53f7b86e66dd8b520af8b3d001c3c85942988a2d909ef1c7938b882,2024-11-21T02:42:47.297000 @@ -83421,7 +83421,7 @@ CVE-2016-10096,0,0,97ff445e0d4479a576be80f3d972eef5ab80b8c51b0b4409305cfa153ff9a CVE-2016-10097,0,0,cc04d3716804c94a5a2c4fe4b33a6105c5f929e79cfc0e4403f47606e4542aa9,2024-11-21T02:43:17.813000 CVE-2016-10098,0,0,b5eb3409e285848e7fdfab1aa388e62ee9dd25d826f76fb8ce9bba54348be3f8,2024-11-21T02:43:17.957000 CVE-2016-10099,0,0,64cfc73d8db98e67db680d7c9258fc32b0d90972743f0482a62e4d42f89e686f,2024-11-21T02:43:18.103000 -CVE-2016-1010,0,0,8350c0585e1c2fc215fe0cdd4d17fb6b62d42008091ea6c9cddef5bd0b925cd8,2024-11-21T02:45:35.210000 +CVE-2016-1010,0,1,a7f8a483e138ab02319b4ae5f86bb20bbb21567267ef1035929592b9f461ed8b,2024-11-21T02:45:35.210000 CVE-2016-10100,0,0,8a4acbab5fe4248b4b681e893f5aefbf58eb2bcfae280968bcd1b756de0aca54,2024-11-21T02:43:18.253000 CVE-2016-10101,0,0,1503451fcb8515842d1d0fc8b81b3d938da9e340138b7288af462afb8365c8e8,2024-11-21T02:43:18.390000 CVE-2016-10102,0,0,d1b6e747eb40512955803d6f753e947a4dada25477b951c2523bf56b37635a56,2024-11-21T02:43:18.547000 @@ -83500,7 +83500,7 @@ CVE-2016-10170,0,0,7592044d47a056af104aafc7bfeee0c3044e0380924e41a3869e4a0722939 CVE-2016-10171,0,0,6087bb6f3bfcdc5e2b5ba47fc47415f1659e8ed56dfa8db6ab8c8c1efb22b8c6,2024-11-21T02:43:28.270000 CVE-2016-10172,0,0,4b0b0db17031d1970e7b227ac66fa21b58c0569dbad9ddcc34a71a343ade4bbc,2024-11-21T02:43:28.407000 CVE-2016-10173,0,0,ad94427bfefe214cc24f5d5a3c472d99b99c826dc9343b3c06fcb6345b4e9e5d,2024-11-21T02:43:28.580000 -CVE-2016-10174,0,0,050bff0d637495821915ac56b16470f155aaeb75c6792b0815ad747d966d338f,2024-11-21T02:43:28.730000 +CVE-2016-10174,0,1,f3f4a6db77eb5b270fb1b0db72a02b334ab56d10610f0a10f3b2a0d6d2d3848d,2024-11-21T02:43:28.730000 CVE-2016-10175,0,0,03a7281f438ee7c374f7a315a0d5b5f0218d66baf6d2507305a601b11cbe894b,2024-11-21T02:43:28.927000 CVE-2016-10176,0,0,4efa8f83a2cbc7d75e83982787b51433f3aea7f3bbc2a3e11ed356a6d59378c6,2024-11-21T02:43:29.070000 CVE-2016-10177,0,0,a9bd2a596d592ccc0d40fe0dc22f21577bf4eb01b989198a17e22aedb068e81d,2024-11-21T02:43:29.210000 @@ -83517,7 +83517,7 @@ CVE-2016-10186,0,0,15758f1f8681c2cc8380dba677370f04cd254fd12c5b20664fbeedd23f072 CVE-2016-10187,0,0,c9ef2ad8ba903cc9103901cb05165c7f4b5f151ac24cfd75344afc64130357a7,2024-11-21T02:43:30.700000 CVE-2016-10188,0,0,3291a2d58cd04214ee78aae94c6869bfcc0149dd73815a7d4ed65fd2620c9aab,2024-11-21T02:43:30.850000 CVE-2016-10189,0,0,a38add0c494fbbd4e5f8138f98ba1fbb63209ad24df4732c774e73e104e8dbb5,2024-11-21T02:43:30.990000 -CVE-2016-1019,0,0,8925befd601ae0eb302f49e74e221dbc9be83167f0d7500493b40fc72d1f2013,2024-11-21T02:45:36.547000 +CVE-2016-1019,0,1,1e13356e66f920b99786d6e46da5806bd2aa81dbd65d17fc2a25f77c6b7eda16,2024-11-21T02:45:36.547000 CVE-2016-10190,0,0,9f736ff72d592266043deff0b295b82212e7b1144a98ea2ba779eb1ecd5a3902,2024-11-21T02:43:31.140000 CVE-2016-10191,0,0,c282bb724b89bf6bef3e8c6ac93276ef30f5c1b99853b91cf6dd31d0eb4da05e,2024-11-21T02:43:31.293000 CVE-2016-10192,0,0,e7716fdf5411c9fca2f6c03b9618bfa5da03788f354427582a158fc3bed28041,2024-11-21T02:43:31.453000 @@ -84413,7 +84413,7 @@ CVE-2016-11017,0,0,34b1ba2067c14f8c683debbedf50e7f57b82bb5c2572fb247b4da8db5295f CVE-2016-11018,0,0,46b7ba23a557b738b8d7c825f1fe06f026f8f9a04635ae34a086af440b461b9c,2024-11-21T02:45:18.797000 CVE-2016-1102,0,0,20dc9024c3fa3054e9f6b9ca8bbeed0a2920a8ec4742a918ecaab03a8e1862ea,2024-11-21T02:45:46.240000 CVE-2016-11020,0,0,5415ccf95fecd802b75e37e815e06c0a96dc472845579eb4228b286fe4d6448b,2024-11-21T02:45:18.940000 -CVE-2016-11021,0,0,6d5bb319a4acee22bbdfc15744187a1f89ed41a8fc2846560e64135f36c658ec,2024-11-21T02:45:19.083000 +CVE-2016-11021,0,1,663f04eb1a662bfe7362d6a55796b646f4dea4b310037a13edb17c393db44108,2024-11-21T02:45:19.083000 CVE-2016-11022,0,0,1923bf727454365e64cce1a52a322fec4a72ea3f6ffc18358d9b523f187ed3eb,2024-11-21T02:45:19.230000 CVE-2016-11023,0,0,59ed52d2c3ab82d81d90617d2330481e496055bcbcfe045bac476f51af98a370,2024-11-21T02:45:19.380000 CVE-2016-11024,0,0,be03e2921dd62eb05ce2cfee871a7c033dc6059389a17af673c097dce1ab0ebe,2024-11-21T02:45:19.530000 @@ -84939,7 +84939,7 @@ CVE-2016-1548,0,0,e414be2c06473d6fbe33c95a23d42aa77a453e97b5aee6d31bc19a7fe02208 CVE-2016-1549,0,0,fcbf62acb0ec1d965ad546e0587da0ae4dee368b77f9d5101bb3ee182ddb678e,2024-11-21T02:46:37.430000 CVE-2016-1550,0,0,1cf262d9a8c6d7f26bb89471991e900e6e3ba22b7a15d00d1fd1284a89976634,2024-11-21T02:46:37.563000 CVE-2016-1551,0,0,272a7ce629bccb1323f718036d5b4ca82fdee3c8d072e91f2869c843800e0892,2024-11-21T02:46:37.710000 -CVE-2016-1555,0,0,ddfea0df435ab6841da2cdd3ae9dd287c02feda6180ac8a42fabbfd60ad16ec3,2024-11-21T02:46:37.843000 +CVE-2016-1555,0,1,c0e992f1b4c970900d6a8d7764348d6c584bafc7f6a20581478fb630e97e0d32,2024-11-21T02:46:37.843000 CVE-2016-1556,0,0,9acdbfa1b90efaaef5e4098967e8eacd0b267b60bb78187980ad4a13b1de3806,2024-11-21T02:46:37.960000 CVE-2016-1557,0,0,77e9a6b93558bc7ab187ec7ff7ede1f6a26aba867d9e0ac67d5c6542393b11a6,2024-11-21T02:46:38.070000 CVE-2016-1558,0,0,e99308e966da0aabfe0a3119b2b40f57c8b739b5527f6cf9434ff9e50b26f51d,2024-11-21T02:46:38.180000 @@ -112836,7 +112836,7 @@ CVE-2018-11806,0,0,a5f588cdaab4f8a649f1634b02c5612f682b105e02b9bd2ed0104e54771aa CVE-2018-11808,0,0,10b7765be18c21f04d1e776317b54947b44b9b1c54f158e09e2289e2752da927,2024-11-21T03:44:04.587000 CVE-2018-1181,0,0,3e98bd65bca0888ca0d91ce1a2a6e808c0266ef9d976889b9d4a13cedd1849bd,2023-11-07T02:55:51.020000 CVE-2018-11813,0,0,52ff473fb49b01041c020db7f233a431925d03ed15a13967a97be7afe7b68fa1,2024-11-21T03:44:04.737000 -CVE-2018-11816,0,0,92e922d7b86f0c2f84647c9a1f9cf4e092253f923c4a50188d2fd9a5d41b8ede,2024-11-26T14:15:17.723000 +CVE-2018-11816,0,1,181ce8754252f40d45f336c53b4016e12840fd64e01410977cc0141f59745c74,2024-11-26T14:15:17.723000 CVE-2018-11818,0,0,693b6ab2c5aee4ee49aaf9f37b0ae42c92c06c0aafbfa813b992ddff5638bf66,2024-11-21T03:44:04.897000 CVE-2018-11819,0,0,cef0b72398808eee38e7df58643b4a9402c82af3de6296102911ef205880de5a,2024-11-21T03:44:05.023000 CVE-2018-1182,0,0,962d98a6da0abb362e2bbe3665699b85c9af69946bbbaeddeda30f1f271be6c2,2024-11-21T03:59:21.017000 @@ -122856,7 +122856,7 @@ CVE-2018-4296,0,0,290bf618fbeee80f7c7e65fa32cbf0b9dfc19a5048f3b55b3ef1c5193a2ca5 CVE-2018-4298,0,0,007162c812763de89784475274b0213bd5f3b3445aa20eda4840d113b63f9252,2024-11-21T04:07:08.840000 CVE-2018-4299,0,0,42b23e7eda66a0b308a029c6815c510458bbff6006ff36345af771ef91431c9a,2024-11-21T04:07:08.960000 CVE-2018-4300,0,0,584e6a13a646a6130b68caf2fc8a3da27299adc088b83cbbbed5c31e133b577b,2024-11-21T04:07:09.083000 -CVE-2018-4301,0,0,d630b9abbad0fba2321ad28dd93f3a43e251a56bea48d2f87f61094fa8344ff6,2025-01-08T18:15:12.493000 +CVE-2018-4301,0,1,2d7a08b0b80afef2e0d6018785f5e9e3e7f5e07757077520ba1616ce6a141fc0,2025-01-08T18:15:12.493000 CVE-2018-4302,0,0,6b424f7b74924555e5de84fc0bd1e5707973310f2c3c8c50261acb5429d57bb0,2024-11-21T04:07:09.207000 CVE-2018-4303,0,0,425eef900cf525324087140efd91b482b05d558c5f55446f554414b49feac51d,2024-11-21T04:07:09.337000 CVE-2018-4304,0,0,77755b866f9faaa6cdecfbe90d4be8e19b9e687a2e08e6cb5f94b189e29ba89e,2024-11-21T04:07:09.457000 @@ -152063,17 +152063,17 @@ CVE-2020-18191,0,0,19c56ae3e2117a539ce0ec995b7d09a93e98a8c51ed958bc18b6f0bfa22fb CVE-2020-18194,0,0,54c713b4f65cc26d43c42b007edc0b4d855084ecf547a1cd30369fa8c8521c58,2024-11-21T05:08:28.907000 CVE-2020-18195,0,0,0060cb677a270d581371d776344f6b9950bdd190d2acbc16b2092c2cd3d548bf,2024-11-21T05:08:29.043000 CVE-2020-18198,0,0,371da80ca3cccdc5d0da8b636ff3e22589e1c4bf74e1b74c12245b968150ecc0,2024-11-21T05:08:29.183000 -CVE-2020-1820,0,0,ef6e3159ac9a5849dd56d3e26f79ac9d6168cbf7427bc2bc5519067a4c62bbc2,2024-12-28T07:15:17.230000 -CVE-2020-1821,0,0,e17535d75f9a268974ddaa3b6d3bfb816e40e80f46d9cfb005850f9e74aaa16e,2024-12-28T07:15:17.973000 +CVE-2020-1820,0,1,ba73be8abd315cb6ce2091d7fee5a9d48258cb65f05d2f940a8b86085682d0d0,2024-12-28T07:15:17.230000 +CVE-2020-1821,0,1,de7b305c09d83de1e757f7cde25954c65d5936c72b8c320347f4dc92d78a2061,2024-12-28T07:15:17.973000 CVE-2020-18215,0,0,276eef64aa4a8b79b3a46616d24d133865a5ed2bba973c10957013f5507470ac,2024-11-21T05:08:29.320000 -CVE-2020-1822,0,0,26702ede411c853f68f3140e7725bb7a1406808c4e34c0f5ccebf9e60e35b683,2024-12-28T07:15:18.170000 +CVE-2020-1822,0,1,61091ad51689dcefdd7a3776aa1d932e8906496f24692126d87a42f68c93cc6b,2024-12-28T07:15:18.170000 CVE-2020-18220,0,0,fcadbf12c706c185ba245780ea87b3c85d5c7b487234e5482fa49302b6c3f60b,2024-11-21T05:08:29.460000 CVE-2020-18221,0,0,c828beeb6390a6c9cb50654e2c2b08c43e13791f7c51b611bd9e30e60b2b507f,2024-11-21T05:08:29.610000 CVE-2020-18229,0,0,de9c2971ce3c744dceeb564dc0c669d2d99acde568c9be68f645ea66497b0c74,2024-11-21T05:08:29.760000 -CVE-2020-1823,0,0,657ab04dcbaba5ff2922247e6e2cf9053464ffe1e39fd4ed769b247e6f713c31,2024-12-28T07:15:18.357000 +CVE-2020-1823,0,1,2d8bba92c35e7aedd722a5007b799767863f78b9ba394a39b034e46a42836f93,2024-12-28T07:15:18.357000 CVE-2020-18230,0,0,ebe6a5a6a2698552960b0422ae9d0e50a9d70f16138ca3d85f0e7ad4347f523d,2024-11-21T05:08:29.907000 CVE-2020-18232,0,0,5705461e816b6f6694e9ef2f2718b69a045749e869a3533e3ed5283cd8248b1c,2024-11-21T05:08:30.053000 -CVE-2020-1824,0,0,f4bdd10684e78b91022e6133605a34599687a61977ecdf3fe6de377bf700962f,2024-12-28T07:15:18.530000 +CVE-2020-1824,0,1,939668b3275e1e06099c2a2ba07ed4df9c37ad1d24675bc0538fea8579304c18,2024-12-28T07:15:18.530000 CVE-2020-1825,0,0,a942dde46b900514ca47c8e921ccce8d9844cba45eeb3a931cde0bf330b07fb0,2024-11-21T05:11:26.497000 CVE-2020-18259,0,0,b06cdddd0c60b9cb1417c4294714ea460eb7e87371666ba861010dfe792d37cd,2024-11-21T05:08:30.217000 CVE-2020-1826,0,0,9d793ee12c01e44af13c183cf0b2187da1411c3957dcb1f4bfb4e1b041d3db56,2024-11-21T05:11:26.610000 @@ -164061,13 +164061,13 @@ CVE-2020-9078,0,0,f43ef09e2a731606ade09aad3ca195abd7d5155388eb5da29fa44635d8cd7b CVE-2020-9079,0,0,5dfd828a298dd684d82ee7fe6a168d292df9bc58757468cf9749c05bd90460e4,2024-11-21T05:39:59.417000 CVE-2020-9080,0,0,a596ede2234ba16ad3bfecce2d8c9f98bdd3c85baac7566199e99cae4360870d,2025-01-10T20:36:43.037000 CVE-2020-9081,0,0,139ec462eaad02a81df0d28c173666bfaa32c021ae89aee5708babc237e9fecf,2025-01-10T20:37:44.267000 -CVE-2020-9082,0,0,c9b6719f34a429d99dc822d6cd6ccbc8b86b8afcf008d24af0951652a96f5926,2024-12-27T10:15:11.687000 +CVE-2020-9082,0,1,d6a05506574f6256e17dc7ddb7951771587a0da245df28e03ad97d6f33888ce5,2024-12-27T10:15:11.687000 CVE-2020-9083,0,0,3c67ba6c3c22aed2d55188918dc1f94331e35d4b01a5cc2f0a70002dd81e58ff,2024-11-21T05:39:59.550000 CVE-2020-9084,0,0,3fb7e0a38e1ed1b2f47bc2a7d12484efaeacd91f30486ad7c04c91bf9ed38a27,2024-11-21T05:39:59.720000 -CVE-2020-9085,0,0,7862405511b7433a9bfe122bedcaa59ab053cf21e2d4a055369e2f874e824c7a,2024-12-27T10:15:12.217000 -CVE-2020-9086,0,0,d62c4b33966ccde575c610a2e31c8152be9818ea18705616ec14ea55f2f6e05c,2024-12-27T10:15:12.800000 +CVE-2020-9085,0,1,5d6b3b014e60c8545bb72a1f6df32fc2d87f683d70c054b5cb73c2d5b19ad485,2024-12-27T10:15:12.217000 +CVE-2020-9086,0,1,f42c35ee65e65225877cbb726ec9053b96f403e3587f18603970d7b51d8fde58,2024-12-27T10:15:12.800000 CVE-2020-9087,0,0,dadbb4b83a4b8ec94abd0f2857ea18ae49acc834c93ab896f9adffcec8c83e15,2024-11-21T05:39:59.873000 -CVE-2020-9089,0,0,5093e09589fc71bf6648906c8ea991e71ce72535530ea0d32e12e4955a7d6d5d,2024-12-27T10:15:13.487000 +CVE-2020-9089,0,1,68de3571ac18457ca73a8b28a4e0ee79a6dbee280715af6ea78813268a91701c,2024-12-27T10:15:13.487000 CVE-2020-9090,0,0,c50b319bf7c060145234fe1c0d5b88dc3689e5efe15671f86e1c19a5ed9f4539,2024-11-21T05:40:00.040000 CVE-2020-9091,0,0,c0385c8aa8379da17e2b5726a0fb14236b220fb1db6fd0b8cafa9ae38198a379,2024-11-21T05:40:00.187000 CVE-2020-9092,0,0,937b27efff0a9ba6560bff8af3ad978c113b9b104bf96f451356a3188f1cd3a7,2024-11-21T05:40:00.350000 @@ -164129,11 +164129,11 @@ CVE-2020-9206,0,0,66c8d926ce17a8dceebc323e986b82179d3968495f255e5371bdd3850b6a74 CVE-2020-9207,0,0,fd8fb207bf56a082cb8841446e7ede931b036786be53851cfaa1ba39641b71e1,2024-11-21T05:40:10.117000 CVE-2020-9208,0,0,19d6370a98790b39b434b9bdbf16f1b96172dcb41e7e2e6d2e802ec6da2cc463,2024-11-21T05:40:10.257000 CVE-2020-9209,0,0,718a3425df33701055c363309ab66bac95db4d83dd128a7acf2c699263cf87cf,2024-11-21T05:40:10.383000 -CVE-2020-9210,0,0,39d226ca2fd2ae7b2cf48473d65ef9f465aceb262ce367b2f853dcc2879449ec,2024-12-27T10:15:14.037000 -CVE-2020-9211,0,0,2cfe00660fc1cbc59010377857e244d05e8252beabb53c83802364293d610f6c,2024-12-27T10:15:14.620000 +CVE-2020-9210,0,1,14cd71a0a2b553c44b01fcb0a27a958c4087a1261e500fca43e4c4eaabc9014a,2024-12-27T10:15:14.037000 +CVE-2020-9211,0,1,f5bd601047969f9ef40229085ce377808f304f238c402e7388d3b12536319cb2,2024-12-27T10:15:14.620000 CVE-2020-9212,0,0,ba27fda5a1a83f7c8a9792732635631dbc8f62392155cb4a0ecda41f0eb0c3fe,2024-11-21T05:40:10.563000 CVE-2020-9213,0,0,4cb4f2d9c83e4508a8bf6c989885c005f775d5e8a40a232cc9d6e497bff4cf1e,2024-11-21T05:40:10.703000 -CVE-2020-9222,0,0,571b038acfbbdc0b3f1837374d1dde3c1fb7b62d8089bf90023e81eb692a345d,2024-12-27T10:15:15.270000 +CVE-2020-9222,0,1,8cd921f336272b9aa0828458d0e6989c11f3f674cc2e2267b2fb4519bf52b8a9,2024-12-27T10:15:15.270000 CVE-2020-9223,0,0,d2caf95754ffa4f54d6c3a94c77e1a52ce9347d87c8c5ee51ea3d1614f384636,2024-11-21T05:40:11.200000 CVE-2020-9225,0,0,26661ec5a217e1ca10ed2eecb9876148cf698b088c73c9df81306b0ca7e34623,2024-11-21T05:40:11.343000 CVE-2020-9226,0,0,4f4dede2041ff04c7e1bc23d10d200b2e9fe8515e3639ca5f3a2aae5391012cd,2024-11-21T05:40:11.470000 @@ -164143,7 +164143,7 @@ CVE-2020-9229,0,0,2b66920e71c10598242b4b45fae8a9baae3a2c4b1b83ff5c3e1e010e04dc32 CVE-2020-9230,0,0,d7918b86ed25189a30a19f4b50e59af64d3457fa69f0c50697e3f8b1fbeb5390,2024-11-21T05:40:12.070000 CVE-2020-9233,0,0,2e8f64faf8791078091c9c671fbe44fdf57362a5ff258a195af1996cfa293a95,2024-11-21T05:40:12.563000 CVE-2020-9235,0,0,b52524f03760bbf10f45a3fe9733d60e1fe049f17c3a7d83cf1cd16a82ab4667,2024-11-21T05:40:12.693000 -CVE-2020-9236,0,0,2e772e5bdc94639cfb2964e90e41818a3917744e00645daa19f6b646b0ce0904,2024-12-27T10:15:15.930000 +CVE-2020-9236,0,1,4ba7fab93f66d5ebcbf4ec332c8cea7372c70d24452c08bca463dd73d6443b6f,2024-12-27T10:15:15.930000 CVE-2020-9237,0,0,a8ae3d81130d7391451ba81847330c8e9fed8c9722aeaa2f066464a65f64a6a2,2024-11-21T05:40:12.860000 CVE-2020-9238,0,0,ba3f816533edaca3b284ed99d9290c5d9b9543c5f97949ad9ff0289b27e876e1,2024-11-21T05:40:13 CVE-2020-9239,0,0,65c6da892921671dbcc85d328b1918a64b30589dd2e820db526f2d961590c275,2024-11-21T05:40:13.153000 @@ -164160,7 +164160,7 @@ CVE-2020-9249,0,0,609764363abccd920effb2bb4981a1b82100be4147729a6eea32d0b2b51486 CVE-2020-9250,0,0,f7f77a70e77b7d3e7da6c17b80f87212212c85455a191473f067bbf159588602,2024-12-20T18:15:23.860000 CVE-2020-9251,0,0,beb705051b54230fec1f0b04aa58d84ce8712d444c3c311bd3fd0ff8818aa691,2024-11-21T05:40:16.453000 CVE-2020-9252,0,0,2e27eed374d3e6d0d74e9cc4bbe3815fab87cc2001c720694ee08405ff819d2a,2024-11-21T05:40:16.590000 -CVE-2020-9253,0,0,a4dfbe39092034506d84abaf6481059d4a7e33abb9e09e7df81699af80bb3a80,2024-12-27T10:15:16.610000 +CVE-2020-9253,0,1,c03fdd01d3f6287d21fea5d4bfb7c24087a0d72e0c42831213087c295985d4df,2024-12-27T10:15:16.610000 CVE-2020-9254,0,0,8e32c6d6bacd3be7a3f1960e97a7c4a004fc1a8bd60e5faabce33423b1584654,2024-11-21T05:40:16.763000 CVE-2020-9255,0,0,d036c0683a7ba9ea33dd8401b86455b8b032eb429d4f3aae3ba5ce1ac0d45705,2024-11-21T05:40:16.913000 CVE-2020-9256,0,0,6668546b9f3d0474a15fb090ad48c8e6a42fc578072b411e8ed96bf814159430,2024-11-21T05:40:17.043000 @@ -167040,7 +167040,7 @@ CVE-2021-20450,0,0,c277954dcc01142621c71d59d5d1fc644df23a1ada38b6368abecc3ca6c27 CVE-2021-20451,0,0,797407a62df654342e8aae6c25ae355b48050c7c796e0fa8eb4c7dcfa98ad018,2025-01-07T19:25:37.353000 CVE-2021-20453,0,0,69cac692ccb994b91ee56611307326b4371e627412e63b371dd093ede4578a39,2024-11-21T05:46:37.100000 CVE-2021-20454,0,0,b5a9b823983a12936ec287dc3098e2bed23b7aa3e8189b7deea101639225c258,2024-11-21T05:46:37.220000 -CVE-2021-20455,0,0,8b7018f692a10e801c382acdf873135d57690a09d34295e52fba3a2cb6405207,2025-01-07T16:15:27.430000 +CVE-2021-20455,0,1,9579d97eb104245cf663ed351f720c9d41cda049c2ac8a45b98c17103813e9a9,2025-01-07T16:15:27.430000 CVE-2021-2046,0,0,ad9de75bfb455d28bedfc8d0200a0362300a00bb9087c78e5ba220afb8420fbc,2024-11-21T06:02:15.540000 CVE-2021-20461,0,0,32bb741266cc653229bac24a9612d59bf6c19ecf87f4dbca4826c2185db1cdaf,2024-11-21T05:46:37.343000 CVE-2021-20464,0,0,47ae6cb8b812d3b3a5c9f84cd7749fc1250c97a6b5585c32f4656f620f51f5cf,2024-11-21T05:46:37.480000 @@ -172704,7 +172704,7 @@ CVE-2021-27277,0,0,c0500f09d2de8af927806deb53c5b89586648bc24f65938947093558ea6ef CVE-2021-27278,0,0,0b849bf8ecb1b33ad2c418b7753387e3742705746cd273f87bc2b00caeabd639,2024-11-21T05:57:44.973000 CVE-2021-27279,0,0,9c1c22f6fce2e2c0a5b3e3c5e960440c197e62d251afcdd93c46f655ba969489,2024-11-21T05:57:45.090000 CVE-2021-27280,0,0,fa97a1c3c0b93673391e1f68371111a1e43626abb251aa7ad077acd7cead7459,2024-11-21T05:57:45.233000 -CVE-2021-27285,0,0,bc2e2d7f6620fc7e4dd88c333a7711b358a5bc903ca61b62fa989912a7f58cf4,2025-01-07T17:15:09.260000 +CVE-2021-27285,0,1,cb462cd233992fcf83f47ebd4c13f0bbcea85a9884fba7f39f0d12b3e1613a72,2025-01-07T17:15:09.260000 CVE-2021-27288,0,0,606ad26a1abd722ab2cd939613d0803a2551dc95bf04397c8efcf59866de7236,2024-11-21T05:57:45.377000 CVE-2021-27290,0,0,be04b1216152563800893871eddbfc237f57b512e2d32676fcdada8b5e6c4b91,2024-11-21T05:57:45.503000 CVE-2021-27291,0,0,a6a2bca68b907033ff929c7ca1aee0cdabfcf505cc9ed4eff271611781565338,2024-11-21T05:57:45.667000 @@ -174264,6 +174264,7 @@ CVE-2021-29665,0,0,7e5695d6127b48298ea7a39a0b7c1f52d5697c39aabde813968a985029a5d CVE-2021-29666,0,0,c956aa909016c8fd792ec9d0506c621f960402a0bdbad6c0d199b2b03a1d0cc0,2024-11-21T06:01:36.700000 CVE-2021-29667,0,0,204f33d2e93b2f7c4000af49d6cbdd9fe254cb37e57eb71116729bf060b5b52f,2024-11-21T06:01:36.813000 CVE-2021-29668,0,0,4bc6688dbd585f03f869f8787298e797bbb7b3a94a375019815f5b87327677fc,2024-11-21T06:01:36.923000 +CVE-2021-29669,1,1,13264af598ad11f5c4cfeb52f926550e58c709e4569971f59b3fca5ce04ae85b,2025-01-12T02:15:18.750000 CVE-2021-29670,0,0,9e5d2d4c81e10903681f3116de30d2fdfd5ab87d5e23c5429709bdaa022e399d,2024-11-21T06:01:37.050000 CVE-2021-29671,0,0,a3a65df1136d33cfc981e3b56c61454d7aff843c82febdbd654fe2a0e21e1e37,2024-11-21T06:01:37.183000 CVE-2021-29672,0,0,43e17476e9d7e006ad0a9e796447e41df8645f9785ae18e25a2c57bf08bd5285,2024-11-21T06:01:37.297000 @@ -176161,7 +176162,7 @@ CVE-2021-31978,0,0,01440762722acb63943eaee5dc1a5bd0703cb368b3bcee59f15c46f8994b6 CVE-2021-31979,0,0,8d549953b2cf46a016eaa5dcf18efd5fb36aa49baf0f652154706cda206e2bf5,2024-11-21T06:06:39.417000 CVE-2021-3198,0,0,75720823131e8fafeb57fd611000fd44ae4615f796074e8626b00b96edb947fa,2024-11-21T06:21:07.707000 CVE-2021-31980,0,0,fd4b30db4b74cff39d00583afcda5c0b332b9962989f1726553e79e42d64824a,2024-11-21T06:06:39.557000 -CVE-2021-31982,0,0,67db96e1055274595c678444b0d6deed4a899434b6bdb55be642554f04e710c3,2024-11-21T06:06:39.680000 +CVE-2021-31982,0,1,da4c93fe5c34e95ccefc3df131a0d4b2e9753ec8f88d67c7309816d877536c9c,2024-11-21T06:06:39.680000 CVE-2021-31983,0,0,2e97bf3e718999ada1cef6809f2a718de62cecbf3983e99368fd1d52f133b75b,2024-11-21T06:06:39.803000 CVE-2021-31984,0,0,8f1cae8bcdc1abceca9656a2c6987f76ed6e788f845a3f161745b2b977fafaa0,2024-11-21T06:06:39.923000 CVE-2021-31985,0,0,c8addc8274addfec115fa884afe6aecd901abc7696da0441e971062781a3c981,2024-11-21T06:06:40.040000 @@ -177971,7 +177972,7 @@ CVE-2021-34500,0,0,0e9b67d5cb5357ef926f693b07e0d46c480d0c95eb807c166fb3066bb4932 CVE-2021-34501,0,0,50c89b43e912896231713df4e360838d6b1bdc5a510ce9d645ddd452d0d0f5d5,2024-11-21T06:10:33.050000 CVE-2021-34503,0,0,017583849254c75505e2242384012bac7d320f7c5f3cb984cd19a0e552e9894f,2024-11-21T06:10:33.200000 CVE-2021-34504,0,0,b876edbf8bffb220e700a561385d5c878134ef1fc8b2abddb2b0990996d1de99,2024-11-21T06:10:33.347000 -CVE-2021-34506,0,0,2320686323cfb3218f60bc78c1d3ceab58204fd8a03b52749153b8dc05a7721a,2024-11-21T06:10:33.527000 +CVE-2021-34506,0,1,ff7c339ca37dd006599fe2678d864a3ad483be0db0b8d732d774e16174806f18,2024-11-21T06:10:33.527000 CVE-2021-34507,0,0,e1978c65cd18de43d3e46b3b933e8de610f2f96acbdfb69626a74106e99bde06,2024-11-21T06:10:33.673000 CVE-2021-34508,0,0,3d91672b445623c80644eca5cce7f38fb093dcf246546a86fafcb89856d538e0,2024-11-21T06:10:33.847000 CVE-2021-34509,0,0,5789690a96fcb92943885ab9254672276838bc2ab033377065ca76f6bab6f17b,2024-11-21T06:10:34.030000 @@ -187273,13 +187274,13 @@ CVE-2021-47078,0,0,10d2cc255b79f1ae1b2de2b41ed383d0a6ccb70ddfa9cdcb0b129f97f8f6a CVE-2021-47079,0,0,c036a75d1b217059f3eeacf84ba954225baad506d2ec7a3aba1818ec631ba415,2024-12-09T18:41:59.903000 CVE-2021-47080,0,0,b2998f659a4b3e4f9d004f3f3d103d7ee3c84ede27b87e416214f7ed38cac5e7,2024-12-09T18:45:03.330000 CVE-2021-47081,0,0,c79ecd1b9946b285c3884a9a56e60cd0cb09c044ce0d23fa0a81bf00575bd5a3,2024-12-09T18:45:24.617000 -CVE-2021-47082,0,0,4aa4964dd1821918c57b50fe99a83efe35e0db971bfb457f7de7f9e1d01adec4,2024-11-21T06:35:21.873000 -CVE-2021-47083,0,0,a9c5377e0acab8df7be32358c99d43fc370667635d94d5a05992dc67b1258341,2024-11-21T06:35:22 +CVE-2021-47082,0,1,b25c7de4bb455a9bb32312ade34b51f026d75a539ac422613fb70062f281e995,2024-11-21T06:35:21.873000 +CVE-2021-47083,0,1,d313d9ba2dfd6064dfc1dcad1f1d1733557ca01f3dec69d2d5c73e9e4b39d72c,2024-11-21T06:35:22 CVE-2021-47084,0,0,8d21d41f3883696e4e6639e5c99ebe9ddd0bd5818bf039723bb272148d178138,2024-03-19T14:15:07.540000 CVE-2021-47085,0,0,99425eb67a70567219ce9050998d710c23af03d38c7b64b5ce0c488c80c15b34,2024-03-19T14:15:07.603000 -CVE-2021-47086,0,0,d5679abb7ad09766ad2098d311e42b7334ecb6bf4a8bc8fb42b5690e969bdce4,2024-11-21T06:35:22.150000 -CVE-2021-47087,0,0,53ec40e11f7a4167ec240bd4ff4b297504893c90b42e474ff8dfe350d3aeb2dc,2024-11-21T06:35:22.267000 -CVE-2021-47088,0,0,385cae727f15c16b67edc135e7f822c134e4e8b9ff88efd8486eaee9a822f69c,2024-11-21T06:35:22.377000 +CVE-2021-47086,0,1,a16eba96b6a7546513452224a091b1fc2224a6e5760ff855e7177be66c29f47d,2024-11-21T06:35:22.150000 +CVE-2021-47087,0,1,fc64c4182b6ac426ae2571533cce6a7f34956712366dc6a2e4c0d92eefc62356,2024-11-21T06:35:22.267000 +CVE-2021-47088,0,1,491816e918085f907954821201bcbfc5d9af31410e5716502b4d29e0f484953a,2024-11-21T06:35:22.377000 CVE-2021-47089,0,0,3c63067315f69f55d4d68a1f446b6c6645fe126c9efbab98d8eec1fa81d922df,2024-11-21T06:35:22.480000 CVE-2021-47090,0,0,6db0d43f1a2c9e72b0da19e5aaaad073fc89b530dc54a875e9bad79b12380136,2024-11-21T06:35:22.647000 CVE-2021-47091,0,0,01b41e88028f350f16a13041540bc4155867909fe7c12b4c9b8428b97f0dd61a,2024-11-21T06:35:22.760000 @@ -187297,7 +187298,7 @@ CVE-2021-47102,0,0,e3d7ce077927f70cf04a6ee8106db62100f560b49e92f6f23722ec7838698 CVE-2021-47103,0,0,db3e5e9d3ae7e807e359f19f747350aa2c349e7dc8e83b609a63a55c8d4eda05,2024-11-21T06:35:24.260000 CVE-2021-47104,0,0,106f2b5520760467943f47cb23329a1907137148a138d2cede6ef704d6e1962f,2025-01-07T17:32:24.537000 CVE-2021-47105,0,0,c70bcdb3e4cbea4051aa23250c557a66de07f80b342d42024622054eb24f08ea,2024-11-21T06:35:24.523000 -CVE-2021-47106,0,0,27334527400dbf9b93c9b718dd5f958b31aa596e4bfc81d49d5ef21b989aaedf,2024-11-21T06:35:24.633000 +CVE-2021-47106,0,1,295dad75471914b8af0c0197ea64d6d1464b3b26b1b5a4025b0f42bd7e2c0eb0,2024-11-21T06:35:24.633000 CVE-2021-47107,0,0,be272f01aeb3781cd9faff996c74315b3c711ebc0838122ffa859b7f28658968,2024-11-21T06:35:24.743000 CVE-2021-47108,0,0,c23d21093fa3a1351345df0e77e2a410b9bd2af3a158493fefa58626321a1a7f,2025-01-07T20:14:35.703000 CVE-2021-47109,0,0,d0d4755876ffc6bcaecd2654bbd49d22799ea5ef8fd867c14e00689af63486ed,2024-11-21T06:35:24.957000 @@ -187314,7 +187315,7 @@ CVE-2021-47119,0,0,b8835ce6595fabe87b0a3dc81d3bad5d613873557aa970029021aba98ef9b CVE-2021-47120,0,0,a8931334cd0ba99593e580c28269f1e44ba4714794111d8fb18c2df3029c4179,2025-01-07T18:00:30.300000 CVE-2021-47121,0,0,1b44ddf91b918ac9517f5d49bf9f6811990d7b57b41644e2f05a7bc400f7096c,2025-01-07T17:30:59.237000 CVE-2021-47122,0,0,9ed5437e226d5c2adada117d14bc702c320b44fe8e911e47dbe54e2d10713b94,2025-01-07T17:30:41.093000 -CVE-2021-47123,0,0,1859bc393986e6935259f99c094a75f5745bcda1015b985ec75ee1c9b9520857,2024-11-21T06:35:26.560000 +CVE-2021-47123,0,1,1751c6d97e6b7073c87574a82b0ab078b16b91612121cf92cf34b08d31ca49d5,2024-11-21T06:35:26.560000 CVE-2021-47124,0,0,95081f73f1ff6a03bad9e22ba5f2a0e4ea2c4dd1aa8571c317ad81b73a779839,2024-11-21T06:35:26.677000 CVE-2021-47125,0,0,0c24e7c9f662e9f81dde4975d7878b1f80e26ba4dfaf797617d164908767a28a,2025-01-07T18:00:04.453000 CVE-2021-47126,0,0,e6599ae461bf84b325c1e83e708846c87910ff2ff4d8decc1af2fae4062ce137,2024-11-21T06:35:26.907000 @@ -187395,7 +187396,7 @@ CVE-2021-47200,0,0,f7d0a9f6d9d00fe034547827f9d38362c4dd747ef6c9609a6880de97be1ec CVE-2021-47201,0,0,95dca28d1aec2043b14c4b3d34caf8b5c6cf58f315fe66aad9fdae98e9727b41,2024-11-21T06:35:37.100000 CVE-2021-47202,0,0,a628118a2bcd86097b64a32a6575f766823194503c974f84f61048c0ba9fd763,2024-11-21T06:35:37.220000 CVE-2021-47203,0,0,9564d820cb2d93da0a0ae7eda2757d5eef2fa0adaa3776421915d06aab3e590c,2024-11-21T06:35:37.340000 -CVE-2021-47204,0,0,e90b5c66a7c909d6593631617c20be22d07f44baef0b63f3582fdf62d1585af0,2024-11-21T06:35:37.460000 +CVE-2021-47204,0,1,0807d36e06039a60390844a27b9c29f575861e7c311ab45fd65648923120e6f2,2024-11-21T06:35:37.460000 CVE-2021-47205,0,0,18551c172472e25239345747128ada0ccd7cc6fe471b57ef495541cf1516fa26,2024-11-21T06:35:37.577000 CVE-2021-47206,0,0,6c20cc18955b069ca564695979ba4d69e50258ddcc033c348c73d4096f845cb1,2025-01-07T17:12:26.390000 CVE-2021-47207,0,0,d6e7ebba058fbc26c30ff619791823f11271eab1f7f01abbcae995ea6a305b67,2024-11-21T06:35:37.800000 @@ -187532,7 +187533,7 @@ CVE-2021-47337,0,0,8ec2c16fbd2d59b62517775d6a115d978a1c780bdbe272cf5580ca5a86d19 CVE-2021-47338,0,0,425f97b29f6fd84c1870c95018e168e8eda67e84848abca9e2dfac701dc5c166,2024-12-24T16:39:44.677000 CVE-2021-47339,0,0,63b9388e39658beafde59035eb1ff3db7cc9adf87b46e1928c207b238898cde7,2024-11-21T06:35:55.093000 CVE-2021-47340,0,0,4800185c819526cfdd83b27045687b91c60e90a3e12af11337074c136ce8ddde,2024-11-21T06:35:55.207000 -CVE-2021-47341,0,0,3c56be93889c9031de34d846ba219a9d43c0e65a95b6d7ca5af5e5a8890138b8,2024-11-21T06:35:55.343000 +CVE-2021-47341,0,1,8aafb5750709fad1693acdc712eda0ba10f5d970c1fe167542e0eeb104e21f41,2024-11-21T06:35:55.343000 CVE-2021-47342,0,0,87691d96ad1a4689fc95ec83dde8f8407d98a729b3e3a4eff31c1bce3aa3fc7d,2024-12-26T19:29:20.557000 CVE-2021-47343,0,0,05baa50e8f01703dbae3936b2595f3acbc4f37225bdead1e4b8828946131a960,2024-11-21T06:35:55.597000 CVE-2021-47344,0,0,0287c421eaf460be9da303f1ed618d93b1e3b5047e6ae4b098d9a2bb4b53f405,2024-12-24T16:13:44.487000 @@ -187593,7 +187594,7 @@ CVE-2021-47398,0,0,e3630a76992a0e0cb4d4e034ce74e3e0d8ca68d2b2971f1033b9e16a7a38e CVE-2021-47399,0,0,c94f1ef0340f44c1b19ac5f27a7318803b709fd2ae8159cca95350b02a34346d,2024-12-24T16:06:15.200000 CVE-2021-47400,0,0,dac63ab253e754c2b35510166f57e6916cfba5dfd95e7f078149171e94273e9f,2024-11-21T06:36:03.997000 CVE-2021-47401,0,0,5db6c53ad5a3be89617dfb52bbe448175afe93c316c35bb6429dc1b11b0da18a,2024-11-21T06:36:04.170000 -CVE-2021-47402,0,0,cbc02f9fc26fbe6e1a1a08c7dbb130f4d519e7034addb43196b7cdda394a63a5,2024-11-21T06:36:04.283000 +CVE-2021-47402,0,1,f870ed43064917b8326f880696a3d4b9f8e8640298e6f1c68a441f3fd56d0dfb,2024-11-21T06:36:04.283000 CVE-2021-47403,0,0,8e9a0db3b62d6c0cacc4676198b64747930d54d96a5fcddadbe78d515353f56a,2024-11-21T06:36:04.397000 CVE-2021-47404,0,0,b4a6c4984c318e0b5f084184228def57d269d3a8a4195164e12844a9b471a71c,2024-12-24T16:05:42.447000 CVE-2021-47405,0,0,89d57154146c49bfe9495517a8aa4581b03bbe87f488a973134e87054c50fc28,2024-11-21T06:36:04.693000 @@ -187650,7 +187651,7 @@ CVE-2021-47455,0,0,1a1f41b696ae21c27e7e2a897ae57ebd9a61cb12cf0d7e83f1f25a2ffc711 CVE-2021-47456,0,0,4ddaa2c39228c384696ccc40934589bde4a34b71179391c191c86b23bf03726a,2024-11-21T06:36:10.987000 CVE-2021-47457,0,0,a30b9683f99ab89487cb7d1c61913061d00751fdcaa619f7f2c5c468df97cc89,2024-11-21T06:36:11.267000 CVE-2021-47458,0,0,b0740f1105f4f3b0cecc1dff6707d133ba1d3a9dfde873431b9cfa43a199a3be,2024-11-21T06:36:11.440000 -CVE-2021-47459,0,0,d62b1698bc2637634ae901d3f8b430b323ea0b19ce8a1bc70aa409c2a8d2ae1b,2024-11-21T06:36:11.650000 +CVE-2021-47459,0,1,a9044ff32f3f3ca2d19b05f824a56a5c76f45d8597ef0242be8b1e4a048bbf0a,2024-11-21T06:36:11.650000 CVE-2021-47460,0,0,4fa9a6823e8f7339eb4af8652dc04156686fd1f1bbe70f7751fd5589f14e1865,2024-11-21T06:36:11.843000 CVE-2021-47461,0,0,852072f0892813a794fab5c178c5261e9ad7507002361e2c7cfcaebc62748b00,2024-11-21T06:36:12.090000 CVE-2021-47462,0,0,07fb99f6b69fcff11957f81be22850be05321e21eb2876eebbef290a5bea7360,2024-11-21T06:36:12.487000 @@ -187661,7 +187662,7 @@ CVE-2021-47466,0,0,1032289734719583c5e473b913f50de249ff26383cf0cfb68845789d6c777 CVE-2021-47467,0,0,f1671883b861b3993e0f37b61979df79b70a26ce821e0ab47424da081f565ac4,2024-11-21T06:36:13.530000 CVE-2021-47468,0,0,a10cb21e48d1fcccab4656f6b0eaaff4aefc96cc2dc1aa8d51c23ff6e4c1f711,2024-11-21T06:36:13.810000 CVE-2021-47469,0,0,67fe82e28202ca2974912a33338985564dfb800014a9f9ac7cf4cf17baf2aa69,2025-01-10T18:17:53.087000 -CVE-2021-47470,0,0,31b51d65d4f91bfc13870b25b73da1134ebe92d090430ef26caf88d4ce9503ce,2024-11-21T06:36:14.467000 +CVE-2021-47470,0,1,a83809bddd2643bba6ccb858e5ddfd73a323d41fcac5c06e781b0f2695a3a2cf,2024-11-21T06:36:14.467000 CVE-2021-47471,0,0,d878bb0529efd29ac48845865976a4b915822b3369f2778ab6066a3c3081c56d,2024-11-21T06:36:14.623000 CVE-2021-47472,0,0,4a163680eb0964c77bae31dc9771b9bdcab4b71fd554a2d2151c19134b7cbb1d,2024-06-17T17:15:51.050000 CVE-2021-47473,0,0,5fca53b1af9e776f298f7a6ef44b038561cd25810ca2fc0d88e4a5892f204ef8,2025-01-07T20:19:15.517000 @@ -191636,9 +191637,9 @@ CVE-2022-21974,0,0,b4e71c0e1517ff1b577ad4adc1c21ecb2a5321f1fea1f0b5b913ec932a3bf CVE-2022-21975,0,0,a366707364cd3074e483aaf927cc298b6b5cfcf554bd674d442cbf0a16709983,2024-11-21T06:45:48.890000 CVE-2022-21977,0,0,522db4960bc321fa5487a8cc1f8057c06c009b4dca074bcad77d2e280cae65ef,2024-11-21T06:45:49.023000 CVE-2022-21978,0,0,2b31e60364b2c225d0f0b134576e98ec3148bd8ddbc25df4a1a90a0aad9272f2,2025-01-02T19:15:25.517000 -CVE-2022-21979,0,0,d845baf56a9dab03209eb128d4f03d588b819a70fca7e8ff7b191a0f8764fa24,2024-11-21T06:45:49.273000 +CVE-2022-21979,0,1,643849a64107cf4d03a124049a1146ab0c1ad3fc46599a1839710082f927eb9a,2024-11-21T06:45:49.273000 CVE-2022-2198,0,0,6d51012b349cfb222caf7c065c8ed955d1001714dc94c998a21fb1bf11124576,2024-11-21T07:00:31.623000 -CVE-2022-21980,0,0,65e496b1cb95316a16576bedfe9261515579cd86991d0cc8570a0b16bdad5cb2,2024-11-21T06:45:49.400000 +CVE-2022-21980,0,1,c6118e7af5db14ebea05209b5713689fb9db843fff0a8e8fec2ff7b252967c83,2024-11-21T06:45:49.400000 CVE-2022-21981,0,0,c706f26d4c986a693de2f7154579f3f04287069fc8d7a8856a5592eb9e00bb0c,2024-11-21T06:45:49.530000 CVE-2022-21983,0,0,6ab77b4c62afb3d1ec8c1e5b3078b465019505f7ceae99807635349a88c06a40,2024-11-21T06:45:49.683000 CVE-2022-21984,0,0,ea9a281c48e8f6fd1f0896f199cdadc283c5a3b5d7c0f05fa4722a4f066a393c,2024-11-21T06:45:49.843000 @@ -191690,7 +191691,7 @@ CVE-2022-22028,0,0,34bae50ac821b476a56831e4175198c55dd2e0fd4449cdc22096e09b363af CVE-2022-22029,0,0,acf88f9c042f25f808165def55819f629a3e9ffacddc4fd92088ea729baa6fe6,2024-11-21T06:45:55.680000 CVE-2022-22031,0,0,d68470646112b28fb59e68fa85d854ffd5da3b292c35e486c29ddcf58f6709d7,2024-11-21T06:45:55.810000 CVE-2022-22034,0,0,41c3ba45ed7a5668884e6e40cb1a2846062ebb55123b278f8f416fc346c3fd18,2024-11-21T06:45:55.960000 -CVE-2022-22035,0,0,d81c52a117cbd65499db1d7cc979cde29747576349396a784d46d892357b832b,2025-01-02T22:15:07.213000 +CVE-2022-22035,0,1,8ba0018fb52e48a3b900c19cf096edb58a900939c2a914f2f9661f48dd203e3a,2025-01-02T22:15:07.213000 CVE-2022-22036,0,0,952291182bda9d6c0d2c806f3c7aa22e07995a661efccab59d2ba1fd6dca37de,2024-11-21T06:45:56.250000 CVE-2022-22037,0,0,18a732438100214e921330b74864c4838cf87843b460d6ae18046ec0e2c12f50,2024-11-21T06:45:56.393000 CVE-2022-22038,0,0,44e5e994a83376fa92fb6311f1306b5cc43f813503ec28b549093cdcc7ac5b7a,2024-11-21T06:45:56.540000 @@ -192021,7 +192022,7 @@ CVE-2022-22358,0,0,84767261124809a9d1ed519f9f64155fc6ba5ec9fdf71fddbcd7410488522 CVE-2022-22359,0,0,2bf01eb540622dca847eaacee6236e255186c1277196c7cc79e981387a737156,2024-11-21T06:46:41.857000 CVE-2022-22360,0,0,565952d652a3bdb7d639feb074a1b0e26498767df3453bcf21d65b3148621e6f,2024-11-21T06:46:41.973000 CVE-2022-22361,0,0,10b0f271693e25631ef1989315b59440c197a948d70ee3735bfc385e81ac916f,2024-11-21T06:46:42.090000 -CVE-2022-22363,0,0,e770f7f5dbc3b57de7d846ca0e694a449e70e29864fe0c3385ac95fbf3aa5eb9,2025-01-07T16:15:28.050000 +CVE-2022-22363,0,1,2b202a27d134c656ca3512bf7b46a7d1186447ca8d907c5ddc1cf75f17241bc9,2025-01-07T16:15:28.050000 CVE-2022-22364,0,0,699859f56e67a1509bb3bd386cabe5337a40af606a12e422bc971d532159bce0,2025-01-07T20:16:36.033000 CVE-2022-22365,0,0,93b131a9b6677b900794e8bfb444f14fa30b748b1163134645f09fea46b11764,2024-11-21T06:46:42.330000 CVE-2022-22366,0,0,09a7cac2af7c3326b1c4db129ec697d7b77dfaf6bb69f773673a6a77e39cac91,2024-11-21T06:46:42.450000 @@ -192122,7 +192123,7 @@ CVE-2022-22488,0,0,751c29dbee36d83335b23168d227cd8328bede456f664b99f974a1bfe6336 CVE-2022-22489,0,0,5f1556c7256c6f92b82acd98490ae006367c358c421db4749ae385bce82df17d,2024-11-21T06:46:53.557000 CVE-2022-2249,0,0,ceabd1c20b10f38cdd0b712e84486da1a6a7b8ef842b2b1ebb84e463cbd612f9,2024-11-21T07:00:36.947000 CVE-2022-22490,0,0,593a00f1de774c9ec0a96444726f03fa955e796e0aa4f002be8bb0d843d5006b,2024-11-21T06:46:53.687000 -CVE-2022-22491,0,0,52e85de5e80c95fe72a7a5ed054ccbdb93d2768b6d4900f9a0439b596c518651,2025-01-09T15:15:09.430000 +CVE-2022-22491,0,1,70f135f974badcbc4e88f5e6344089832a8a26ecfef376408f921114958e69d4,2025-01-09T15:15:09.430000 CVE-2022-22493,0,0,2c81a9a1c4db3537835f820bdb8dfd63582e309e954db84e55dc0894d89b17e1,2024-11-21T06:46:53.810000 CVE-2022-22494,0,0,628b4d685fe11b805cdf2fdac5d4434648bcf8e613d0cf599e9aa7bdb337a1e2,2024-11-21T06:46:53.923000 CVE-2022-22495,0,0,df0152cb71335edc282cedfe69dc1685f87727909f151648d280807fd77b54bc,2024-11-21T06:46:54.053000 @@ -192818,7 +192819,7 @@ CVE-2022-2326,0,0,fcfb3ef633c778fe1a75989e78be6494f20013d37f0aee1fac6a14394833c0 CVE-2022-23261,0,0,75560b2a429fe55077826ca84a27a0839e5de8f92b7c5ff62310728087b69479,2024-11-21T06:48:16.603000 CVE-2022-23262,0,0,03d9012f3b5b63d202b1cfb1883fe7ac8ac26b634cddb6a9e510d32f89dbfb0e,2024-11-21T06:48:16.743000 CVE-2022-23263,0,0,ed2220bb9872721a4a540bfeadd505b2fd7bad5e2b70dc78a92b9f1fbae7cb44,2024-11-21T06:48:16.870000 -CVE-2022-23264,0,0,5903cc574083a3c2e029762088c7cac96a8e098300d7da26a2234968f642b74d,2024-11-21T06:48:16.993000 +CVE-2022-23264,0,1,3fb6b7ece52c922fa99d38a6db42dd69086f6b4fe267cda0eae8589e96735d62,2024-11-21T06:48:16.993000 CVE-2022-23265,0,0,2c154c3118da1ee4b1995237444e2cf42dc33d77994a9b442d578e691f5b6295,2024-11-21T06:48:17.130000 CVE-2022-23266,0,0,d2d90d04ddf716b3398e27dc090e6c33c0ffd1446f40d944b95ae22fc01d7e63,2024-11-21T06:48:17.257000 CVE-2022-23267,0,0,176a8dd7851e5f76955ce16a1a3ee60a070b4ec1bfae09e79cc77c8a434aa5b8,2025-01-02T19:15:39.870000 @@ -193895,10 +193896,10 @@ CVE-2022-24472,0,0,8359fd0ece5f5db6e3503abf8bb28bf5173f0932c65c0198b9a7e0274de12 CVE-2022-24473,0,0,a92f066ed6a78c4fd506276a7531562b807ea450d3b47fd3680df893297fe738,2024-11-21T06:50:29.480000 CVE-2022-24474,0,0,f8574331b4baa2e8ffa521fc1ce4cb5807e8ab4f81d4dc08d9c332a176a8c4b4,2024-11-21T06:50:29.600000 CVE-2022-24475,0,0,3ed1c9c83b569f72dfda56505f74807c9d877ac74ed393457f90c0dd4c47e7cc,2024-11-21T06:50:29.747000 -CVE-2022-24477,0,0,bfc6e8f44c7c3c62ec2a54341ef2e4142125c6c5debfd7baf2fdf75bfdbf34f0,2024-11-21T06:50:29.857000 +CVE-2022-24477,0,1,2cd5b777a7fe5bad6874b3ee87361511821674d2ac3957dc6c81ff46e7c132f7,2024-11-21T06:50:29.857000 CVE-2022-24479,0,0,e95d2983e031067bc887a6a92a24e18a285ccf755a68cf2593110f97c75835fe,2024-11-21T06:50:29.973000 CVE-2022-2448,0,0,f2e6cef505ceb14bbfd664ca5dbb902cbbe921de6c47ee0f7cbde10f4b764aad,2024-11-21T07:01:00.677000 -CVE-2022-24480,0,0,0aa94d2c0606be7d56f6f0d0ce1918f80762f96afc47d0aca00312ec07c254c2,2025-01-02T22:15:08.190000 +CVE-2022-24480,0,1,01dbade8378986aa28e4a016075e1fb37e3221ec0c4a434032e8e766e01d83e8,2025-01-02T22:15:08.190000 CVE-2022-24481,0,0,0b7d99910318f434fb3aba07df7ad1e3a0cfde50512272f60f56642e844f09e6,2024-11-21T06:50:30.230000 CVE-2022-24482,0,0,adb153b25e79780bfe64f3fc7ec7379de67563533f3cdd432d508c71903512b2,2024-11-21T06:50:30.377000 CVE-2022-24483,0,0,937cd667dc68edd7ff54ff9cf5aeb51e8f3be76c3b91e684b0167f0bbdf85294,2024-11-21T06:50:30.503000 @@ -193924,7 +193925,7 @@ CVE-2022-24500,0,0,9b38bfe6b32ee4ea20a350c5b78fe5861bef68d01a4ec02e241e7b0f56112 CVE-2022-24501,0,0,a0047cc14e4b015920af3d8f4d4cbd43c84b2afd7baad2d3851d1ac70808f307,2024-11-21T06:50:33.157000 CVE-2022-24502,0,0,18846587a460a905eab7d093558929d38733fe341b23f8c69fd2826e8c65283d,2024-11-21T06:50:33.283000 CVE-2022-24503,0,0,e1707c5550bdfb0508ab727fe2173169c637ea63639e8a63e836652154acd832,2024-11-21T06:50:33.453000 -CVE-2022-24504,0,0,26c585714c00d8f3f01dc5686f18bc50bb1fecaf716805f735172564531ba83b,2025-01-02T22:15:08.327000 +CVE-2022-24504,0,1,d9cd47912d969460f07b8b509362be7f90ef9293f1760aad3c430d135795e564,2025-01-02T22:15:08.327000 CVE-2022-24505,0,0,b4f7244f8822366c2da2adfc9b096c3e46ac6d3ff3242b233b97ec9dea399881,2024-11-21T06:50:33.777000 CVE-2022-24506,0,0,f2d197dbad486be1e18966c2a115480cccf64280973b86f238080a840f0e6840,2024-11-21T06:50:33.923000 CVE-2022-24507,0,0,03c1c02947bab14e32c826ea36c822f23f18785e849332ce1e799f79413c8ee6,2024-11-21T06:50:34.050000 @@ -193935,7 +193936,7 @@ CVE-2022-24511,0,0,37f487d02734edd5558270c54cf6f06c436bf08618870a429c510bf1886bc CVE-2022-24512,0,0,af53a89e9c4f11341cdf7fc61cd4146fab976376257f5f655b2d31ab1ea9a40c,2024-11-21T06:50:34.683000 CVE-2022-24513,0,0,d4e4230c6c215c0aa10fc37ccf2a37960044e211a347645ac3e659f663b8b2f7,2024-11-21T06:50:34.817000 CVE-2022-24515,0,0,200d692a36b57fd42621309894b314eb47c9642c7c6779bf48088054f14d1713,2024-11-21T06:50:34.940000 -CVE-2022-24516,0,0,36eea2664410696a8bd4c264d22a37186e674652f1be617c6fdb381e214d4dd9,2024-11-21T06:50:35.053000 +CVE-2022-24516,0,1,e0b661e331729283f85fd6fdd84372b97fa2092eb92fccfa44a9a3f434d56ff8,2024-11-21T06:50:35.053000 CVE-2022-24517,0,0,976ee993882a7905c82c05f5af5ab1a71a8008f20bf5530d2f6936ce8e48d8aa,2024-11-21T06:50:35.180000 CVE-2022-24518,0,0,3f656079681678859ef7766766ebbca2a0d289d14d6322178dccd570d82f0351,2024-11-21T06:50:35.303000 CVE-2022-24519,0,0,afba24f646cad3b0321a1dad00d502fd95d8463d4825cf8dd965c5826ae6bd33,2024-11-21T06:50:35.437000 @@ -195853,9 +195854,9 @@ CVE-2022-2680,0,0,66d460319f078beaf69858659df41877f39c10fc45b4e9dc3cf70dcb79e0ef CVE-2022-26801,0,0,a97feb1e2d5cd71f748ec383b76d0fdcc01a183151efbaefbf117b741a935191,2024-11-21T06:54:32.063000 CVE-2022-26802,0,0,9e74a4e6f4368fca2d0f27b54ae553e27d70aac935792a58fe8338af8c635190,2024-11-21T06:54:32.240000 CVE-2022-26803,0,0,80e7d7300a9c035317b7143772d029d2064f2da22dc3cae03c6749a8ce7bf1f8,2024-11-21T06:54:32.403000 -CVE-2022-26804,0,0,ba2759ad379a46ba358e851c39efa268c24b094a951452752a7bf139d2e33962,2024-11-21T06:54:32.550000 -CVE-2022-26805,0,0,73adf7bf57a984dff1c92b1ed68f196c370e55382160e18f04a0236c20842586,2024-11-21T06:54:32.670000 -CVE-2022-26806,0,0,068255e6d5c493cf5a6a61c440712011f13b033223bc3fbdbc7170bd7df6ccd2,2024-11-21T06:54:32.797000 +CVE-2022-26804,0,1,ee4a8194b2d4b7bc7dfabaca3ca90c6a1d4f951c0846ee673ed7e198e846fe71,2024-11-21T06:54:32.550000 +CVE-2022-26805,0,1,d58624bad78c937bb03e2cebfd87c011398e8d0aebed757445fb9ce83cce6140,2024-11-21T06:54:32.670000 +CVE-2022-26806,0,1,a6a7f390db6c2a3596f318ea81f65e33897f3ea8bb1ec4c6aabb3470f4df6f42,2024-11-21T06:54:32.797000 CVE-2022-26807,0,0,1a99e10caec04f07fe87d45dca23dcbade6060d481d344ab389ec45cd4a9ff3b,2024-11-21T06:54:32.927000 CVE-2022-26808,0,0,8107c623d93f35719213832d256c124137dbcb4f13408bb32373884f983937a8,2024-11-21T06:54:33.070000 CVE-2022-26809,0,0,07702384430cf36f35165f9704721cf7cf73154af824ec259850ff6fd9775d42,2024-11-21T06:54:33.227000 @@ -195974,8 +195975,8 @@ CVE-2022-26924,0,0,88a880ef73d10c778e003f2b302cf4b2bbf71c2545921c162b8a20045f08b CVE-2022-26925,0,0,678a4ff9ffb757aff803974d75e8acfbef39aaa0eb958d8f9132923ed861ab02,2025-01-02T19:16:05.153000 CVE-2022-26926,0,0,12e459ca497e8e9c1fc9512c8e135fc9eace00b6b68dc32a7687e47916fc5c00,2025-01-02T19:16:05.313000 CVE-2022-26927,0,0,2afeff873aba1802ddfafb1bce4dc5043958167ff653fe98f58dae867bba9294,2025-01-02T19:16:05.490000 -CVE-2022-26928,0,0,44949310af552dcef843c34465fd955f8148407c88e4e2e9eb63c694fe47de34,2024-11-21T06:54:48.860000 -CVE-2022-26929,0,0,37a0bc7bb1a5230d7a3cae9eb08bab79069298bcf310586a8cd278a964291ce4,2025-01-02T20:15:14.593000 +CVE-2022-26928,0,1,678ccb6dc79c21bc2d956d0c5c459704bbf3ca96625fb3b98792ae1399c41543,2024-11-21T06:54:48.860000 +CVE-2022-26929,0,1,a7c003a015322064abc5dcfc8d6aee7dc72dbeb4aecc517dbdd758c10ae90f06,2025-01-02T20:15:14.593000 CVE-2022-2693,0,0,9116b8a76ac89faded93eab0e304daecf551978a1f49dd3a525a0130c575dafa,2024-11-21T07:01:31.780000 CVE-2022-26930,0,0,a6d2d916bc583b4a67274ec014fc7aff7bc14bf207580642bb7445e48f778469,2025-01-02T19:16:05.627000 CVE-2022-26931,0,0,280cefcfa5a36e398ab1fc2a68aa8ee71212f7fa22746e84dbc874dad82eeb9e,2025-01-02T19:16:05.770000 @@ -197729,10 +197730,10 @@ CVE-2022-29140,0,0,0cb619868cde4df05cfc782a106874f44876a6978a15c472fd04a39297086 CVE-2022-29141,0,0,d6c78b0c4c08150e00cad2bffae75d1ac62272dce3501a55d808dbf349b7d268,2025-01-02T19:16:12.153000 CVE-2022-29142,0,0,c421ea2387c94c38daa4d0c7f8219d704d64b337956f599c1f038bab335ad969,2025-01-02T19:16:12.323000 CVE-2022-29143,0,0,2b7a1c9f5c499b70d18377caa4de8aaffebb7262583af19f3420fccb2dc1cc4b,2025-01-02T19:16:12.467000 -CVE-2022-29144,0,0,3f75b73c57e097f463c0314793966f9c5e5d9e7d0d6569671386336aa06286be,2024-11-21T06:58:34.593000 +CVE-2022-29144,0,1,2172e537f22d1b877d04dedd8cce361841c4e49c2d340cdd64dc09eea8239d30,2024-11-21T06:58:34.593000 CVE-2022-29145,0,0,5c312ff9bea7f017b4383829ceff54b5c3c5550d35d0d93d5000ed4e185b3eb2,2025-01-02T19:16:12.750000 CVE-2022-29146,0,0,dc15e1bf0f68573d5d2c1ddc78f56dc20d745d3cd10c97f8c1b56249713b91b1,2024-11-21T06:58:34.853000 -CVE-2022-29147,0,0,31acfbd20dc3ca1ba073d893c8796f0b70bde6b12f4f3855127d31180e0db1bc,2024-11-21T06:58:34.967000 +CVE-2022-29147,0,1,8e096898fff06038d124c4f71c0013b4d5874d022323768c280ff853d314cd6e,2024-11-21T06:58:34.967000 CVE-2022-29148,0,0,eaddf9d7c54b17c3e93a673484a6b965ebadf1c56ba8a8dfb83a0645faf03874,2025-01-02T19:16:13.103000 CVE-2022-29149,0,0,945d219293169a5574c090670a8d8979c2e5d822aae96058a70d5cc8e15dafbd,2025-01-02T19:16:13.227000 CVE-2022-2915,0,0,380d584316364d19cf56550570dfa8eefbe699d84f852fe8f42f15cd9ded2c47,2024-11-21T07:01:55.157000 @@ -198534,8 +198535,8 @@ CVE-2022-3013,0,0,bb4a4348932baf173a3232a1c3b0ead0c4228ddfc1e60d46374682b53df449 CVE-2022-30130,0,0,5c540d13502dcb1c87ffc0e4d13a14d34dba65580440eb277616f3237105eae2,2024-11-21T07:02:13.053000 CVE-2022-30131,0,0,9119dd0753873b8a1feedeaa2b0fcf696b7719767104a70878b45495ac001f2b,2025-01-02T19:16:14.063000 CVE-2022-30132,0,0,5aac6f4cc4546bc201694ffc7c37e7de80cc2e3e02a3b8d080aa8e776b78a228,2025-01-02T19:16:14.183000 -CVE-2022-30133,0,0,a9585499496d447d6df19137adec8cbeff7e0529459f89d96ef087e9872ae91a,2024-11-21T07:02:13.473000 -CVE-2022-30134,0,0,3aa1b154d08f0bbc6e21310c4571eceb2ec33b4ba6869168a834de5f27cce2e1,2024-11-21T07:02:13.613000 +CVE-2022-30133,0,1,8b5644e40862e5f0b688ad89b4c3f675598a23d4c2a841cb2156fdd1207b7ac7,2024-11-21T07:02:13.473000 +CVE-2022-30134,0,1,2ef5ab1b84afee02ed5bf7f0821d49accfc189cb613a51b0299ef732a7f3f81e,2024-11-21T07:02:13.613000 CVE-2022-30135,0,0,cf4abc249fcb2cf5a9c46359eaf5ca4d8dd6d1d1a83517efdd85c6b3d9126a6b,2025-01-02T19:16:14.307000 CVE-2022-30136,0,0,c75b926bb6edf44e98fb35dd8006ed5e10c913a8727d651dab67752ea200a3b7,2025-01-02T19:16:14.440000 CVE-2022-30137,0,0,a71e0995b35ae2e4b06d946249d7e80c337a8b732f6314c705826ce1f74bd8df,2025-01-02T19:16:14.573000 @@ -198546,7 +198547,7 @@ CVE-2022-30140,0,0,d5f48ebefab60057abc4c0b55e84df31eba053f766d4cbcb104fe39bf6b09 CVE-2022-30141,0,0,c0b1d5423a7740a5b0e4ccef9596e55405d3d39b967ef0ed7c3d0e3936dff474,2025-01-02T19:16:17.180000 CVE-2022-30142,0,0,a40380c7dd69d038aeb2c47dd40d7d807d19f93a515f54fab693510b7ba7ae9e,2025-01-02T19:16:17.330000 CVE-2022-30143,0,0,96ff65a0d9d7ca78981b9ad9580f250c5470572c0477d3062e89f80fb2ccfa5d,2025-01-02T19:16:17.497000 -CVE-2022-30144,0,0,dfa811345326ee91ae8b24166c3c2187de97ac16f79b8587b40af48f74e2f8b5,2024-11-21T07:02:14.930000 +CVE-2022-30144,0,1,24c9b23e212d0a86de7318a327c977397323c3531b4935d69f652569e22d0666,2024-11-21T07:02:14.930000 CVE-2022-30145,0,0,5c7a2161d399f3cb268c832bb2bc8e69a480967d405d85667a9ddb46e676d781,2025-01-02T19:16:17.643000 CVE-2022-30146,0,0,892293c8ac91fe622a27fbe6baf02ca2e2e3d5d050439955b17845c6d5208ea0,2025-01-02T19:16:17.800000 CVE-2022-30147,0,0,649584d30d1aa717d4ec408fa45972059e5a3ca83273d39a56ce92fc5f5c1316,2025-01-02T19:16:17.963000 @@ -198573,13 +198574,13 @@ CVE-2022-30166,0,0,42bb4e8b721ca3e21b8e8e1c9f6a4a6cdb21166453f71d4eaed365742517d CVE-2022-30167,0,0,84d17e1a59e0fe63e997f4d8209c3a169059d67fe54acd658adc415643f1bf89,2025-01-02T19:16:20.770000 CVE-2022-30168,0,0,e9a7110c6f7e9f2d33f7fb348642dcad6d49cd6be955e0ea227d514da098a810,2025-01-02T19:16:20.890000 CVE-2022-3017,0,0,0568d3e540be66821d72d792db7c53e2217975863c3c2b91e4fe4b5df028ac9d,2024-11-21T07:18:38.720000 -CVE-2022-30170,0,0,81d14e71a27e7ab1f2d731374eabb0547603bee236ea84a1a582c72bd729bb91,2024-11-21T07:02:18.230000 +CVE-2022-30170,0,1,173de204dee6103497470161cb2cb0708c54beaca7bf78b1ac9a4e270821a9b3,2024-11-21T07:02:18.230000 CVE-2022-30171,0,0,ccd765640e5dda39ae7d1ad214009223ca6f1eaf2e1bb1a754b573673e94f80f,2025-01-02T19:16:21.003000 CVE-2022-30172,0,0,28fb04851f9fe4a26d9534eaea9ca784e3c380b0bb6bd862d59514fd996d2f36,2025-01-02T19:16:21.130000 CVE-2022-30173,0,0,96c923acc0309d1ccc0a692e6296f3def0018c6e4c4cb8055662326ed0537491,2025-01-02T19:16:21.250000 CVE-2022-30174,0,0,db7939baee4b160ca5f12e2340bfada994a7467371f87b34ad853d8a97827d00,2025-01-02T19:16:21.367000 -CVE-2022-30175,0,0,931241376156234c701d53ed306c20e7e9b5d028ac6348c7370ae96cded30734,2024-11-21T07:02:18.887000 -CVE-2022-30176,0,0,fd800bd359c3b637ec55770326e43aab582d9a8f011e1c0cfd26e14ff8cea775,2024-11-21T07:02:18.993000 +CVE-2022-30175,0,1,76b07705c54858ceb3946ad97c933eab7e03d402e7bbd6e18507d8578aa1aa00,2024-11-21T07:02:18.887000 +CVE-2022-30176,0,1,8e71888391c93aef1dbefbc06354f65a0860c682b45ea3d09f473623b2cca060,2024-11-21T07:02:18.993000 CVE-2022-30177,0,0,534c35369415b0ce21af47a33416afb945c385cc28aaa4ba2f29281327270d48,2025-01-02T19:16:21.490000 CVE-2022-30178,0,0,0c1d9bb3a779ace7846976f666ad10e21e102a6ad9c7c7b3e020788afee30b16,2025-01-02T19:16:21.597000 CVE-2022-30179,0,0,fd9668375b6bdc3bbfea5f72d745b1473aa042f289e2c883e8a137fd37d57926,2025-01-02T19:16:21.717000 @@ -198594,11 +198595,11 @@ CVE-2022-3019,0,0,699aa72743ebef964bd50c3b949d73c946ed800706a74517bc948b67f928f9 CVE-2022-30190,0,0,eeaa0f947b59033791abccb441b7941d66dec591b908eb5b9fd0bed1174b0b4f,2025-01-02T19:16:22.317000 CVE-2022-30192,0,0,d0fa3f703c3532d2882a3ffa92d6ac8f74486d22b3b21d3b4689701d5ae7a39e,2025-01-02T19:16:22.460000 CVE-2022-30193,0,0,e1012bdeb2f7d44c596c9dd5b6f2695bb91fc936b857957cfbe4a94cfcf3bd11,2025-01-02T19:16:22.607000 -CVE-2022-30194,0,0,a126a32c1250a59e8ec1cab76f4ef0167dcbdc667da79fa447ea7b5e81f8a64c,2024-11-21T07:02:20.577000 -CVE-2022-30196,0,0,40d8b0edc44899ddfc001397077dca843c8c2d19792e5ea2c47f2a2972e2815b,2024-11-21T07:02:20.707000 -CVE-2022-30197,0,0,40915371fc21f4b5c3ed5514dc151ff5930ec1cf57f41190d73017726a8c82c1,2024-11-21T07:02:20.830000 -CVE-2022-30198,0,0,5e5646b8d3887a71d6d4d519040f6c061194e76de18ea7a79346ef40b6fc6ada,2025-01-02T22:15:08.783000 -CVE-2022-30200,0,0,f391653d8b25e81e711d2a46e4377cf91dcd6921249227f6a3c6fd8c95111e68,2024-11-21T07:02:21.100000 +CVE-2022-30194,0,1,0f02841c3d18f663a3b092e71d1216fb48b288beb8580df1e48bd2877b0bf8cd,2024-11-21T07:02:20.577000 +CVE-2022-30196,0,1,d630c91b74c1c4b7e0d754215ec8c1c4e2a34e03a540b6072253efbdfc10da93,2024-11-21T07:02:20.707000 +CVE-2022-30197,0,1,cc5d64c80a8791896f091a97dfa020d7e434fb4e36acc8933f8555d86b27254e,2024-11-21T07:02:20.830000 +CVE-2022-30198,0,1,0d32174fb45d51c99aa2fa0959ed02b0ea2f959413ec0d36c41f0d1a17447f76,2025-01-02T22:15:08.783000 +CVE-2022-30200,0,1,5241ceb1c6145dc1d6d735886dbf29a05232ee9d0864589a654564239835145a,2024-11-21T07:02:21.100000 CVE-2022-30202,0,0,e972eeec09af33d8e11218d92bbd7e9b24b58a7300790ae9cd2e59ea2d078df3,2024-11-21T07:02:21.243000 CVE-2022-30203,0,0,91fb4d6e0fdb28673e4450171a65f05ecc67c650fa3179d08181d602af418fe8,2024-11-21T07:02:21.397000 CVE-2022-30205,0,0,013fa5f722f6c428a633c0a15cb8f507a2a44f625e523d00d89ca14a2460454f,2024-11-21T07:02:21.553000 @@ -201315,26 +201316,26 @@ CVE-2022-3360,0,0,470b2b51d5a96638f9b8fa8d27579b40b1bf154abdbc6ee5c2b1839792e368 CVE-2022-3361,0,0,673440507d463bac799b27de862a1e0ad14d5cdec3dbef09bb9458f1a54b72b9,2024-11-21T07:19:22.360000 CVE-2022-3362,0,0,fa3c85c78075a5b23404fdf0b4d624d34b6a473a82a2cdd4464495179acf966c,2024-11-21T07:19:22.487000 CVE-2022-3363,0,0,3791f44db6e51d6b387bffd8522b7571cc745e75d05d49e5929be55c4bfe89e1,2024-11-21T07:19:22.617000 -CVE-2022-33631,0,0,b28930ac1276678cf7c3095cbcdf7ce54fe01d6f3d6eaca2d9096106cf276246,2024-11-21T07:08:12.750000 +CVE-2022-33631,0,1,a9607c981c0a9fb46801735337549412bd131562cbab74957081eee7844141b8,2024-11-21T07:08:12.750000 CVE-2022-33632,0,0,2d5701cdc42f201c2433fb655509c4d2a1defcda100427b44020705bbb936adb,2024-11-21T07:08:12.893000 CVE-2022-33633,0,0,fef725eb13c393831b5dbb62dd8fec4a0e534d3260f0274ca793099b1e337544,2024-11-21T07:08:13.023000 -CVE-2022-33634,0,0,d101eb85473e1f3f12c8c94fdf0b2d2093a3b6718b9bc6f9e98e0b022b272a05,2025-01-02T22:15:08.940000 -CVE-2022-33635,0,0,7f198bc081519469be8f49ad075152d32bbfb5672676f06efca13353f89c4b3c,2025-01-02T22:15:09.073000 -CVE-2022-33636,0,0,03b22c0e6d8003a227e72c380814db9f2308b48d16c8523c629a6979c407a391,2024-11-21T07:08:13.450000 +CVE-2022-33634,0,1,1dfe9695b9e550c027b75e0a390dfa54c6a2109b703d65bf90d5819e30e3598f,2025-01-02T22:15:08.940000 +CVE-2022-33635,0,1,065833ea5444870158fcd6ed8f8a36e75b563df3f01377f8bc7f3728b07208e5,2025-01-02T22:15:09.073000 +CVE-2022-33636,0,1,46272dc1244163d4fa529df971ce814df71347d2629cb05e561f3f3753532581,2024-11-21T07:08:13.450000 CVE-2022-33637,0,0,779febcbab98162c76b6ec463230e5fc34868ff3a3dcc5a9fab77810e7d58010,2024-11-21T07:08:13.563000 CVE-2022-33638,0,0,0eecdfb7405c847be7e8eda462ff1a2a6b3623c97651ac886a152f749e4ce916,2025-01-02T19:16:22.737000 CVE-2022-33639,0,0,98b84b2f3cdaee0a8e1bd846d2c3f7c04234364254ddd88312755ea62747ebf8,2025-01-02T19:16:22.877000 CVE-2022-3364,0,0,dd4c407f031cb9b9c49d3371609695761320debb49469eb58b1198a34ae105ad,2024-11-21T07:19:22.757000 -CVE-2022-33640,0,0,da89d773d66e824c218059c14628039cf6fef4151a85f0a3c07c3d6e46f0992a,2024-11-21T07:08:13.927000 +CVE-2022-33640,0,1,89a0d961ea376c9d193140978fd96f8908caf1f8aa80a9e0d9956f469674621f,2024-11-21T07:08:13.927000 CVE-2022-33641,0,0,318881ea1b50d7310c93c9ffdac2eaf18504877678fd8e052b56a3a1dceaa97e,2024-11-21T07:08:14.047000 CVE-2022-33642,0,0,a7a480dbe6276f162cbaf4a7b95a7ef51b29c38f8cbf4ca18680818654776f35,2024-11-21T07:08:14.193000 CVE-2022-33643,0,0,47b44c8f88d31e82c74f7cec9dcd27957458dda6b9400efcbfe6894a68134f4f,2024-11-21T07:08:14.310000 CVE-2022-33644,0,0,9142403ea74bf872e3b0ee89f6b304d39dd3d9d6e3d19bd9969a9fe6293aa847,2024-11-21T07:08:14.417000 -CVE-2022-33645,0,0,d84352593aa743913a55c27ef0893a101380552613da1d0b7481f0f831db65aa,2025-01-02T22:15:09.210000 -CVE-2022-33646,0,0,af4fa943ba02bcdc4a0f13df08b0c1e18c5fcfd1a8924122b6b8d5a7732f01cb,2024-11-21T07:08:14.673000 -CVE-2022-33647,0,0,773d20b5056330c260b891e0de9113c485e954b6fce436c0cd3fd485b43deb69,2024-11-21T07:08:14.783000 -CVE-2022-33648,0,0,45319979abc5c23903a8a8f2d1db90a9469c02b0e860c9b06e82a3e6feac3434,2024-11-21T07:08:14.930000 -CVE-2022-33649,0,0,417aaf678de4159bd6a1451e13779ff0f719f9bd446cf50fe038e374985c795c,2024-11-21T07:08:15.037000 +CVE-2022-33645,0,1,d9eb7feb61490f8806217bc8e13f400a1ee5841901ede1bb733f493f7be8ebb4,2025-01-02T22:15:09.210000 +CVE-2022-33646,0,1,a925c07ce65ac2d0e9d211e2b2398ad1e57da525d523e15541a83f12df881fe5,2024-11-21T07:08:14.673000 +CVE-2022-33647,0,1,5feaf3e010cc5e97535d4d65fbae2bcc87803779c2e96b8fade981b7b9313e94,2024-11-21T07:08:14.783000 +CVE-2022-33648,0,1,bae79337c5e892df17da958d9ae52fb1686becdac8f975642c755225e29a4d86,2024-11-21T07:08:14.930000 +CVE-2022-33649,0,1,591f61d96d2d65dbce03b14161fcac0fbabc7445443fe2e93a52054518a13ee0,2024-11-21T07:08:15.037000 CVE-2022-33650,0,0,8ce80787b8df19552561bb21e3ad24057869ada7a0f0f982878d44e02b7ceac8,2024-11-21T07:08:15.140000 CVE-2022-33651,0,0,9a318cb6a42b4e621fd1d5fee25d959d8bc2f3e44dc0a50b3ab6016651bb5f61,2024-11-21T07:08:15.250000 CVE-2022-33652,0,0,f5146da1cfd413adcad997798a0d1b636c0788d5c4cd20b5dffba13a0f13cee1,2024-11-21T07:08:15.363000 @@ -201356,7 +201357,7 @@ CVE-2022-33666,0,0,93a1a79503830ed824340451efb20a3853ddc231978b0ee83ab36eeebbed0 CVE-2022-33667,0,0,20694c5775b94438d44ad914d3f961433b8e29960f13f8ab526e04ddccba1d65,2024-11-21T07:08:17.280000 CVE-2022-33668,0,0,26b8776ffdda7e50da80f79b5d5c87366059ddca5548b87e2479a18ede3af6ab,2024-11-21T07:08:17.400000 CVE-2022-33669,0,0,d7737c68630942b852312e0a60132d1aea69426f8fa8f2b29b088d714b877dde,2024-11-21T07:08:17.520000 -CVE-2022-33670,0,0,5a7feabc0f47bd4c6ebe169fa8e1035af4a3edad3e67249c94d514e0784b4437,2024-11-21T07:08:17.637000 +CVE-2022-33670,0,1,5c07157bdee1a081e137684c51905e74dd11b3a1b5ab9424441412750822c8f2,2024-11-21T07:08:17.637000 CVE-2022-33671,0,0,92c37415deb333c8f3fee76c0d34e5f85bb917afbd8dde4f62d6cb00aaa7dc0d,2024-11-21T07:08:17.780000 CVE-2022-33672,0,0,c66cd71f2f2365a96348c1229ac30aa3ccd202744ea2abae1e70a61fdd0427ae,2024-11-21T07:08:17.913000 CVE-2022-33673,0,0,9758c7883344f18adf25c46135489280f9ea22a92e3b96530dfde231f1e617ff,2024-11-21T07:08:18.030000 @@ -201365,7 +201366,7 @@ CVE-2022-33675,0,0,88efeb0b59b70388ad49a041e52e2f32e9ff6958dffa077d33f5ba304746f CVE-2022-33676,0,0,c5002a2e2810af0c1be3cc9a468555fd1c1fb16d7b5c8cd014211f0953ab2f32,2024-11-21T07:08:18.387000 CVE-2022-33677,0,0,9fd6a9fd0c121b020644ed4e20b8a4bdab167d826f5da8b42bb7c93abdc88325,2024-11-21T07:08:18.510000 CVE-2022-33678,0,0,559d4d846e4df6cbc84ffe450a71bd1eb8413b850d97e5b7b69882091c58ba5f,2024-11-21T07:08:18.633000 -CVE-2022-33679,0,0,29b2545f2aca2ea08cfaa742c2fa3745c6f43a622ee275221f3f1a04cd05e4a5,2024-11-21T07:08:18.757000 +CVE-2022-33679,0,1,4a0013ab79f4278dcf82dd8fc2009ee70a5deee8458934b79b5bf2c76e5a2a6c,2024-11-21T07:08:18.757000 CVE-2022-3368,0,0,e76e850221574c49ce0ab5a63bf8d19ac8eff46eb812e81ae8f6b2cfff3ad1bc,2024-11-21T07:19:22.987000 CVE-2022-33680,0,0,cab75f00d36ff01e0d65f89bb58bfd6f2bb83f631128bf5b7d29cd3872a43928,2025-01-02T19:16:22.997000 CVE-2022-33681,0,0,a670409f702638afcce364bac262f6bce1d6a05da2109cbff1afdcb60c098ccf,2024-11-21T07:08:19.030000 @@ -201893,7 +201894,7 @@ CVE-2022-34352,0,0,014f8d336c1a0c9d3bcc8cfff40cdb278b804a1e0cd082e0e111140d7e9a6 CVE-2022-34354,0,0,4cbcb478ef062a56f902ba0b9236308dd74c2d99933a4b1428f0623d49d4f788,2024-11-21T07:09:20.750000 CVE-2022-34355,0,0,deac03771ea8eedafafeea932f34828a6874f0836ebda800d3d2539b915cb2d3,2024-11-21T07:09:20.873000 CVE-2022-34356,0,0,f0941b4c5952b20da0acf7861a0e0afae44611ef3d3e8a59ee0498f3994c39ce,2024-11-21T07:09:21.013000 -CVE-2022-34357,0,0,c790441e5f5da43885a88f7919952569348cfe765cef9d236b89a3ae94dcdbf6,2024-12-17T16:49:34.733000 +CVE-2022-34357,0,1,e58c33540a7dd12dfab097f404c072962076b38ab988b6c977d7609302603dea,2024-12-17T16:49:34.733000 CVE-2022-34358,0,0,5681d2199dcf55684aec20e6304d0a8e9597be22fe9f0be186d4415114a80e1c,2024-11-21T07:09:21.267000 CVE-2022-3436,0,0,5cc2f322cae31533f59998e05315d75d74bfc1c2153b4140326e9917b458b171,2024-11-21T07:19:30.800000 CVE-2022-34361,0,0,49d90f51d7bbc17bfae465f45aff440f0f12f2a65dd148a5db2e6cb61dd53a97,2024-11-21T07:09:21.383000 @@ -202170,55 +202171,55 @@ CVE-2022-34681,0,0,4b8fd87c36c4c9099b37fbbe6d360f7451b6d552f5b4a41999a31dab04607 CVE-2022-34682,0,0,ca84e8bd5b4f0f9269723107b3b19ac6dac93828771aaef9689988c8f0dc2836,2024-11-21T07:09:58.607000 CVE-2022-34683,0,0,f5a53aa7c78b041c76c12d8a387bd76f9635f59765e169fc4ed890c68976f171,2024-11-21T07:09:58.747000 CVE-2022-34684,0,0,6407eb8b7c4cf9bb2155834efee291df6eb4a4f37d91655ed288b00b27abe002,2024-11-21T07:09:58.863000 -CVE-2022-34685,0,0,5117688fd3626adb60181eabaa7a68d31a39fb20f22e7d3206ece11ab1bdb84d,2024-11-21T07:09:59 -CVE-2022-34686,0,0,9d5cd2f2c529eaa771753d0255c4d857833a64766b4e34d5cec54ab5cbeebe2e,2024-11-21T07:09:59.123000 -CVE-2022-34687,0,0,c18cb242493c2e1e8b8d6b7217c209dacf83f746dd848e4ef1927dfc4b835d05,2024-11-21T07:09:59.237000 -CVE-2022-34689,0,0,26eb3032a62170d4dd71e4c2018981e8debe2f80fdd4d5cc70f9c726934ed6d4,2025-01-02T22:15:09.340000 +CVE-2022-34685,0,1,b72a00d1c1d0b241f5bc145a077f0ce13d06f4260487429406792a5585c067e0,2024-11-21T07:09:59 +CVE-2022-34686,0,1,3650fdae0c82c13238a43fc1f491346f8f9e455fa873aed4f51ab27b2e1d1d2e,2024-11-21T07:09:59.123000 +CVE-2022-34687,0,1,2b66e6e48713f193838e1e3175617e3f479951db6200d541b21a1cdeea604c52,2024-11-21T07:09:59.237000 +CVE-2022-34689,0,1,db21f78b3afaedd2575289f6fd8bf0f1c10969a8069015eb080e1d5a826cc32d,2025-01-02T22:15:09.340000 CVE-2022-3469,0,0,2bf022092c6651178599f9a897781f2abfa0629b5300ab1212d4e9d067d6d082,2024-11-21T07:19:36.040000 -CVE-2022-34690,0,0,1061889bb27cc9a0e7459528c7f0319d3b3d1a2a1e7f744bf50a26dc16e3e56d,2024-11-21T07:09:59.527000 -CVE-2022-34691,0,0,a6aea69c0653376c5bfefa99e304c4823e7e767050d526fb9b398c2008c82f4e,2024-11-21T07:09:59.673000 -CVE-2022-34692,0,0,7119ad298659d17b7162c2e7f6633a697217064fe2c5fe817a8d145d80f68763,2024-11-21T07:09:59.810000 -CVE-2022-34696,0,0,31697de28d3d10775409ad6276e286799702d52eaba083330a8e47dd9df1e1cd,2024-11-21T07:09:59.943000 -CVE-2022-34699,0,0,2a6274cfeee2a981436490d68f6c9634795696c141110910b3d845adca5aa511,2024-11-21T07:10:00.077000 +CVE-2022-34690,0,1,5e3f87530474c6f7c234aae46cb9569a96dd48c7023f237d61ff86b0bfc52811,2024-11-21T07:09:59.527000 +CVE-2022-34691,0,1,60948b269e191dd67b146e3518cd5627992b9459b66b24be6aa452dafcdb1f5b,2024-11-21T07:09:59.673000 +CVE-2022-34692,0,1,22c94034553643d46e5ee07aefb318c4d36521097d6b41ede5334de708c90465,2024-11-21T07:09:59.810000 +CVE-2022-34696,0,1,f9e0d3afad546ac99a392470f5ff015af812bc4749f94c9e5116ee6f3f4b2ab0,2024-11-21T07:09:59.943000 +CVE-2022-34699,0,1,6a5a8c69a8b7c6c8ed3b8248efce85f059ae11bea74b030f22c0f7d94de5b8a0,2024-11-21T07:10:00.077000 CVE-2022-3470,0,0,6b70323dd8a65a812f10a8f5c605b87f2826655f9d33b767c741c021e15ce04d,2024-11-21T07:19:36.163000 -CVE-2022-34700,0,0,a4bd7204d1707beedc379e8588a058ad1ec63b5f1ae229534b5bc767ce14b3ed,2024-11-21T07:10:00.193000 -CVE-2022-34701,0,0,9ed62789edf3ddc2c2a062ce3680d314c435b8fb86b2c333a39a66ea8d327841,2024-11-21T07:10:00.323000 -CVE-2022-34702,0,0,1906718f9fe3d11b8251a7285c264ffee9b51d64e48387daee7b7c91555ee9e1,2024-11-21T07:10:00.490000 -CVE-2022-34703,0,0,28786bd88b049cfae40e3c9054089f09a0f6a548a4ec35f4af5c199b2389548c,2024-11-21T07:10:00.630000 -CVE-2022-34704,0,0,0da6700ffe6ec58978a9be3d472f4a4a795e07f4c759b2586cdbb6806f34949f,2024-11-21T07:10:00.757000 -CVE-2022-34705,0,0,bff786dabd98dd64307d7af2acadb9265ab460421a3cdadecc7efdf8bfb6eea4,2024-11-21T07:10:00.883000 -CVE-2022-34706,0,0,4a03e1bdad227d94af352c1c4a9c10b9d64b34e61c6fcfc4fbd5139f90c6d3ef,2024-11-21T07:10:01.003000 -CVE-2022-34707,0,0,ff7d05557559ec6bef8399f766f1884b1a7f4447535aae76192c4073d2f2c8fd,2024-11-21T07:10:01.167000 -CVE-2022-34708,0,0,8b91728654d7da2c27db2f760981f92f12b243732872e896310566c93da865a3,2024-11-21T07:10:01.333000 -CVE-2022-34709,0,0,4509ffac8f923c729f55ab92654eef3bcda47768210e26832507ff43c32c2bb5,2024-11-21T07:10:01.500000 +CVE-2022-34700,0,1,41a45300ea949c0a1460904beed7f685410746696b8c090e89295661c979c0e8,2024-11-21T07:10:00.193000 +CVE-2022-34701,0,1,f0a4aa55c726eec10f6ef694a64f26ea663001f7c3ba93e8040c59ebfccca0df,2024-11-21T07:10:00.323000 +CVE-2022-34702,0,1,1767ac48eb3adb015b69a7a324d1e7896083b1649b37b7c3529c54e63f94ff60,2024-11-21T07:10:00.490000 +CVE-2022-34703,0,1,367cb299cd38e1f596e75fde22811482d1139ce4157f08672fd70778bf6d7fca,2024-11-21T07:10:00.630000 +CVE-2022-34704,0,1,525ba7bb463fd38ba363431e398002a06b63603c5df56f8813b5fc6f74a3b997,2024-11-21T07:10:00.757000 +CVE-2022-34705,0,1,2909528aae2516d127d0e3521581b3c420f4fbf6fd12a52ba8aee3a778458642,2024-11-21T07:10:00.883000 +CVE-2022-34706,0,1,22f36abfd3aa2e95e19449a5c4ae1ec9b76ca9514773757381f49c140c1b6fc7,2024-11-21T07:10:01.003000 +CVE-2022-34707,0,1,49d73c2aebf51bf26633b29344e220edf6926d57e590ea236f219284655e62a7,2024-11-21T07:10:01.167000 +CVE-2022-34708,0,1,0e949580b1f4afed58f00111a0228a34e8bda4004c737956df69bf9cf97853c0,2024-11-21T07:10:01.333000 +CVE-2022-34709,0,1,1577c0b0e6f210a5630779004bf00fe0f1c99113e5be0a882ac7ec54312f1100,2024-11-21T07:10:01.500000 CVE-2022-3471,0,0,495d0e8dcc7168cf73d6752bd352dc355254512638404907315f8c8587cf2037,2024-11-21T07:19:36.303000 -CVE-2022-34710,0,0,ff560bd017369405cdce3d46b2b318e4ccdf23b855d1814872e9181fc79d39bf,2024-11-21T07:10:01.627000 -CVE-2022-34711,0,0,ccd5b1acb9f0f4b10bbadbcd9a8495bde3825329c3005eade67b020bc2f120a5,2024-11-21T07:10:01.790000 -CVE-2022-34712,0,0,c8bbed1a3080b472f9d0bbeb316710db2b6a842b8ca54a4e12b20a3c9cdd188e,2024-11-21T07:10:01.950000 -CVE-2022-34713,0,0,99cc47ebdfe322074dde9a9f449c6e11e0fdc8c34de50f64698fa63c44938b97,2024-11-21T07:10:02.083000 -CVE-2022-34714,0,0,db281819bdfc9307e586f3ab17de9caa48c123483d33868d0b8e6fc2a773cf9f,2024-11-21T07:10:02.283000 -CVE-2022-34715,0,0,949b3e66ed0056e52de1c345eb0a4d6d601484f3325518e26a4e87cf95788193,2024-11-21T07:10:02.580000 -CVE-2022-34716,0,0,1ce61d3209288661e5eea20a97b89c20dc12e8157e240be522d40ff0cf75bcbc,2024-11-21T07:10:02.710000 -CVE-2022-34717,0,0,83dfeaba4a9c5b18a5257f5748f781bdf76f08a448cd2f5a2b49fdf88515a218,2024-11-21T07:10:02.843000 -CVE-2022-34718,0,0,e36b88e5fe70af59e150471bee08a2627f397a2b3bf0eef5c3d5e58f3c5d9451,2024-11-21T07:10:02.963000 -CVE-2022-34719,0,0,3884bc8c3746c7fab3b9f97fa3122362ae1324bf5e8aeac336f91705c1707315,2024-11-21T07:10:03.120000 +CVE-2022-34710,0,1,873660d048e28a149e24e157bf627764663cd5072c4620ae24c67a19668c7527,2024-11-21T07:10:01.627000 +CVE-2022-34711,0,1,c44da15e9a9f787ffdb3f343336e0d67972465f3cc3917d88950889394348c41,2024-11-21T07:10:01.790000 +CVE-2022-34712,0,1,b3b95e93f77b00695ba541618424625a617fac2c395c356b58b85959b0196871,2024-11-21T07:10:01.950000 +CVE-2022-34713,0,1,c213befcfa76bf61c530a8d956ecc8d9bc6f1dacfc62577512f94aa0ad7e8731,2024-11-21T07:10:02.083000 +CVE-2022-34714,0,1,cd7847bb81aa6cee536f4b993097e8160f3dd670d1c0e9f6376413be64c73e46,2024-11-21T07:10:02.283000 +CVE-2022-34715,0,1,1a6430359b7e294a3661adff75f8cbcd008524c0b3380f11bf12898f184ac7f2,2024-11-21T07:10:02.580000 +CVE-2022-34716,0,1,823de494d6afe6089e979b6e89b590f446004ca2a60a6ac4e68b91b576e3ce40,2024-11-21T07:10:02.710000 +CVE-2022-34717,0,1,2517394a0c5453553cba841a6213330b2531c366018af717029c124b76e6e829,2024-11-21T07:10:02.843000 +CVE-2022-34718,0,1,939c861a33a2a88bb2e80a497b5703661f21a6610a9bc7cc9b47795190461376,2024-11-21T07:10:02.963000 +CVE-2022-34719,0,1,c34a4dfb3c93c2c1cefd296899f5e615ca262000526e46bf9acda677ab537902,2024-11-21T07:10:03.120000 CVE-2022-3472,0,0,e46c847f8316d3ed802e66427e0cd72bc5044af3b39e0f9614dcab4e00b311d4,2024-11-21T07:19:36.447000 -CVE-2022-34720,0,0,1873b7d71c5b6250b2c1605ba7d798ca01773b6ae0d5b6f42563decc92400724,2024-11-21T07:10:03.290000 -CVE-2022-34721,0,0,d31bebd6bfda00f2216c2737943f6fc3095c64f5a54f160f0e48a56f3d940073,2024-11-21T07:10:03.433000 -CVE-2022-34722,0,0,4388526fbcc05027b960e905bdcad079d40b2560844b3db6bbb93e06db0dcc36,2024-11-21T07:10:03.600000 -CVE-2022-34723,0,0,b7562a12ebaa0d1130a56316504770a9a966f4868a1bb07b0653e53549efb918,2024-11-21T07:10:03.743000 -CVE-2022-34724,0,0,7f16761e7d0fda0822d17f671fe372a000afee573b815bacd2a1004cfbba1505,2024-11-21T07:10:03.853000 -CVE-2022-34725,0,0,20b46204d6ccb0c9b481611320990c91154f56538c2ebaa1ac4a639713eadfd6,2024-11-21T07:10:03.983000 -CVE-2022-34726,0,0,1e6778fd10dba859e4acad85598965a7ae2614a395c58f057f9fd952c9fd7c24,2024-11-21T07:10:04.130000 -CVE-2022-34727,0,0,b3b287ce03cae45553537c3638d23c970ce0524c9e54e9c3b9d5e90be2720359,2024-11-21T07:10:04.267000 -CVE-2022-34728,0,0,82eb3cf9923ba6cdf8a40f1710afb00944882fe2e4ff13163fac4235884a33ee,2024-11-21T07:10:04.407000 -CVE-2022-34729,0,0,294cfaf9349483d6b353f25160b1222fac4db266ce5f613b171c71d94f040b28,2024-11-21T07:10:04.550000 +CVE-2022-34720,0,1,3b4796b500479f8e882173463782660c8e77b42e6c423bddc2b4df0dee0b8343,2024-11-21T07:10:03.290000 +CVE-2022-34721,0,1,5c97a26877d91dbd76834f527b1dfc4b9b7c129a779964b4d4bbbca7a55b5e37,2024-11-21T07:10:03.433000 +CVE-2022-34722,0,1,b3eed11fba985681c2d70c4df90095cad223b6a402fc989bb1b4dda611a30912,2024-11-21T07:10:03.600000 +CVE-2022-34723,0,1,f9ff903e6b30a4e0c1f5b8601bbaad914a5399a920cb5378af465ac146672aed,2024-11-21T07:10:03.743000 +CVE-2022-34724,0,1,5c26d80330579843395449a3a4ab03c4861e60a60c0afeead90202da5b990bd2,2024-11-21T07:10:03.853000 +CVE-2022-34725,0,1,f19059cc2b893634bd4646194ef40abe9985413cd2dca7089ad002e6b7d6e412,2024-11-21T07:10:03.983000 +CVE-2022-34726,0,1,3fe85d7cfa0726a9a941faceaf0a121685721b205c6f4f27f31b4c11070d0b40,2024-11-21T07:10:04.130000 +CVE-2022-34727,0,1,cd4d0ec9765c5b9e3a7df7ad4c52656fc4f8d5febded6e915b8e3582c6a21697,2024-11-21T07:10:04.267000 +CVE-2022-34728,0,1,0a749a2d078dd57356eb343001e2a24cdb4663d2151bb9d3872ce584fb7cb79a,2024-11-21T07:10:04.407000 +CVE-2022-34729,0,1,108b80296361bce4e52f62b4f2e1e401c8b0c53da1d471110bf17d47336873cf,2024-11-21T07:10:04.550000 CVE-2022-3473,0,0,765f7b56414de5b36f65c256dcd250a6df295529b062e989549543bbd40e75f7,2024-11-21T07:19:36.580000 -CVE-2022-34730,0,0,9bed2ea7e9652321e12d3fe33cad2eff8b8cebe80ef269a4e6fd44ad5a1e1fe4,2024-11-21T07:10:04.720000 -CVE-2022-34731,0,0,4a78b41c869fa03586e6f5676b943c16210096bb613da6ed84ee5aaad1818bae,2024-11-21T07:10:04.870000 -CVE-2022-34732,0,0,d86606d1e69eac2b48e7dd8c6140bd394791cbbce791ccea05e491feaae30310,2024-11-21T07:10:05.027000 -CVE-2022-34733,0,0,f2094f3f5261522fa0f76137c303309ba4463f36af89193e1c008475c97126bf,2024-11-21T07:10:05.180000 -CVE-2022-34734,0,0,f97fa3dbcf346fbe1958e5db18fa7a22a6898611fb67e6c3a35b5bf585f21188,2024-11-21T07:10:05.330000 +CVE-2022-34730,0,1,4ede53908a92bb7f7f3357538bd1716c6ccce4fdd601037d5c4a6f011b168095,2024-11-21T07:10:04.720000 +CVE-2022-34731,0,1,d7dc76e60766938dee2225254986b783e1defcb36cd37b650eeba3d89b3ca243,2024-11-21T07:10:04.870000 +CVE-2022-34732,0,1,8760691b97c8ce54c28ad56411734765795d51ed3048e7d9812c47da1f0d6b00,2024-11-21T07:10:05.027000 +CVE-2022-34733,0,1,4ac66de8e3d85e25f4c5774b5ebfc06485b7fb69e3c052442cd9f5174f7041a7,2024-11-21T07:10:05.180000 +CVE-2022-34734,0,1,f090951f5f87a61f61308ce39de440d2f162b9090b4857f09f56bab51f17f336,2024-11-21T07:10:05.330000 CVE-2022-34735,0,0,96372e7fc0af454d47c0fbf280c4d372cfa23c360e6df9ec2c3fd639216ac7a3,2024-11-21T07:10:05.483000 CVE-2022-34736,0,0,49109cbc7c6b98f035afb858f6ab02a2a773cd4886681bfdb0288e905967393f,2024-11-21T07:10:05.597000 CVE-2022-34737,0,0,8e6d84fd2b57dd145321491cecfa7f2f8cda3640c9180266515f9dc5bf81e9d5,2024-11-21T07:10:05.710000 @@ -203050,114 +203051,114 @@ CVE-2022-35739,0,0,2cffc9e3d889ed051115ad9c6cd91a4d4651e7d4112463a720339156eb568 CVE-2022-3574,0,0,1018467764e59c503e40bcf97c94be912d31ffa17d3df8af8f856b87356bfc4c,2024-11-21T07:19:47.920000 CVE-2022-35740,0,0,530999063b74709d6fe2d74b51fb7c248df2465775e1a8fa1463c3a068575386,2024-11-21T07:11:34.837000 CVE-2022-35741,0,0,607ed6b2b45784194fa0be3a6480137ab87e75d30a2151973c6774b350a07b24,2024-11-21T07:11:34.990000 -CVE-2022-35742,0,0,8addb8e20c7fdcaf7802cd2eb86d96580fb03ba7706ad7c9a21a58402183b3e1,2024-11-21T07:11:35.107000 -CVE-2022-35743,0,0,f4121ff82e8444e9153783c9ae536f3a47ffd7052bc0e73ec81f3a1d9ecfc832,2024-11-21T07:11:35.253000 -CVE-2022-35744,0,0,1cbb2acc07e29466adb9b3ca1961526c4bd7bb4dea993b3b52adaa97e39fd812,2024-11-21T07:11:35.413000 -CVE-2022-35745,0,0,016c10220ecaa2a120bb0ccdbed25f71d98982ecf6f0cce13ef9d0ab1dd053e7,2024-11-21T07:11:35.557000 -CVE-2022-35746,0,0,04e1a908ee6f898a70d9e7d4c56e154e8ab1818b1beb593de967c91cc97f7350,2024-11-21T07:11:35.710000 -CVE-2022-35747,0,0,d7d68ee588053d72b8ba465420c0d385c2511cc97fd759f90be442aeb694ea70,2024-11-21T07:11:35.843000 -CVE-2022-35748,0,0,cb5fb656ed88cedd87ac6bd3440fadd06bf33b34cde8d01fa26afd51e9b70cca,2024-11-21T07:11:35.987000 -CVE-2022-35749,0,0,a2eed28f6e327c457aabff395d79963c06ec806761fbbc895b4012b6ecbc0022,2024-11-21T07:11:36.120000 +CVE-2022-35742,0,1,1e0b548b31e5952a3460d1456d30fe11c4b59f3f1bebeec6bf8f2dbbd01473de,2024-11-21T07:11:35.107000 +CVE-2022-35743,0,1,7e55abe2e12ecd7c2ca921bdd8537b8494819eaab09e3d6bec7abd674118b814,2024-11-21T07:11:35.253000 +CVE-2022-35744,0,1,42312a420923e89d1d25824229fef0e5e0fbcd7476c6cac67b2c6c9d0e074959,2024-11-21T07:11:35.413000 +CVE-2022-35745,0,1,3e91489c28764d16b403c0160e236c6b94f24f2bfff6d3af48479efe01fde637,2024-11-21T07:11:35.557000 +CVE-2022-35746,0,1,70348d165e5440521598424efce735308aa5147e4655eadbfb1923970ddbddd4,2024-11-21T07:11:35.710000 +CVE-2022-35747,0,1,3618faf868e931d5d930bd709ef7aaa1d8611f7f77c0a4ddd547f0ab29c7e843,2024-11-21T07:11:35.843000 +CVE-2022-35748,0,1,22672dc8d99d29694fc3e01a5fc987b5a4557a99331868f9a9fdd5d3048d55c6,2024-11-21T07:11:35.987000 +CVE-2022-35749,0,1,5f5abf064c5332c6bb011913a8a5a2129df90e696809a728cd4ef180f00d4cd4,2024-11-21T07:11:36.120000 CVE-2022-3575,0,0,578308f084efdf8dce87547a6c7fa622857a4d24b32c83892c663adf6296fd5a,2024-11-21T07:19:48.033000 -CVE-2022-35750,0,0,bcf6046fc9909aeb4e13ea1855d84fbda1e933cf8cdb570d40bebe99dd3223d4,2024-11-21T07:11:36.263000 -CVE-2022-35751,0,0,e1df38534509c9ca6700e047df21d1e962457a10e04fd01b2ff66f6319bccfe5,2024-11-21T07:11:36.443000 -CVE-2022-35752,0,0,91b0f6bb39584abbedd3a514cd8acac99cd42a1764b189cbf075ce1ac029d1c8,2024-11-21T07:11:36.603000 -CVE-2022-35753,0,0,a8174cad39158ee31ace94ba03d93a3fc338c4fa8503b4b21137476b7a33b3e9,2024-11-21T07:11:36.760000 -CVE-2022-35754,0,0,4e0a0ec036479bacadc8ccf407199f82a5eab48c2606494cecb3a8d8e6134a6a,2024-11-21T07:11:36.920000 -CVE-2022-35755,0,0,8e00c695f3219b8c93ede7ef32bc91d4ff328bd199ad5ba99fa679d904690401,2024-11-21T07:11:37.063000 -CVE-2022-35756,0,0,d060d5617f9cedfd7b1364df944c3e29ae9e91acc3a78002d25843cef2756cbc,2024-11-21T07:11:37.187000 -CVE-2022-35757,0,0,0e4988cbe6f09e47defccbb7c234fa4b9927cbfcb31c419ae95c97d86ae69dac,2024-11-21T07:11:37.327000 -CVE-2022-35758,0,0,791aefe96d352c58c9c7f9eede4b589b1a6d599695aa3d23a5c0b14e40e1e789,2024-11-21T07:11:37.450000 -CVE-2022-35759,0,0,27d855d7b7a5521ea129630e40133f7168bbe27423b53bd23852658cbd33295d,2024-11-21T07:11:37.583000 +CVE-2022-35750,0,1,44784239550818991427192a1f3af69f7c0e938ac7db5ec698fc0afb6009eafd,2024-11-21T07:11:36.263000 +CVE-2022-35751,0,1,57c8052635eac7240c31fbfde96cfbb4801c43a44e6872cfd4609714f30b40e4,2024-11-21T07:11:36.443000 +CVE-2022-35752,0,1,8f3e69e0f85f95ec0fc3b4361de5f79ededcfb4ab6aa9edcea5ad048c2f7cac4,2024-11-21T07:11:36.603000 +CVE-2022-35753,0,1,539de4cb1c3b1c68cd3a26850bf5c093ae247bd93080700ee5fb2aa84fed206a,2024-11-21T07:11:36.760000 +CVE-2022-35754,0,1,6ae2acceaeed0d0476010544a84e3a97d9e42f36c08cfc638bd1b609c41dc43f,2024-11-21T07:11:36.920000 +CVE-2022-35755,0,1,18e1133142b3a58bb21eb508fcff7394cd650eef992cd9d563a1b151f2dd1901,2024-11-21T07:11:37.063000 +CVE-2022-35756,0,1,298507a1d911a3fd7a622de065abef027492f7aa3f1f6d0aa8cf051cf4858cce,2024-11-21T07:11:37.187000 +CVE-2022-35757,0,1,312fa0765b878a38501176e81bb1083d666cadbf865b6b4298777aa283fa71ed,2024-11-21T07:11:37.327000 +CVE-2022-35758,0,1,820514448838533f6f7488f2f804202b4eac37503bea018316380d37837c68ac,2024-11-21T07:11:37.450000 +CVE-2022-35759,0,1,0ce896ff6fe156d355d525e18fd319669f78f0224a2da50c6471a147f0f35298,2024-11-21T07:11:37.583000 CVE-2022-3576,0,0,96b152f6de9c589d96a868ff16ee57abe0f7186b4a8dcc1947690f6d9858d572,2024-11-21T07:19:48.153000 -CVE-2022-35760,0,0,f4014352e0c34ef6192cd828a934cfd46179db821ea06d18c1e8afba519ca285,2024-11-21T07:11:37.747000 -CVE-2022-35761,0,0,6f70ed0a18aa5b770b9b09098ad1cb39a2f427fc2d85082bac142fcf1ea65019,2024-11-21T07:11:37.903000 -CVE-2022-35762,0,0,367bc4c0c4f84f3009e822e7d0a4b68b50cbd0536745980546e43182d0a21c74,2024-11-21T07:11:38.033000 -CVE-2022-35763,0,0,34e5c2069b58f591e2ffb8efb2b6a98565b2e0ff167fa319539cc814d541a968,2024-11-21T07:11:38.190000 -CVE-2022-35764,0,0,067f7dbafeff81f03d7afc3d78a2b64473b61cd712ab9c438658f9d62d93e512,2024-11-21T07:11:38.330000 -CVE-2022-35765,0,0,99f8ead5a99f8b8fa8ca9c92c459574de658a39f6267d07b8aded88df190b51b,2024-11-21T07:11:38.447000 -CVE-2022-35766,0,0,827675dd70e6dbe1c67dbe74f2b484381e653792ba0499eb2991bfb5038624f9,2024-11-21T07:11:38.570000 -CVE-2022-35767,0,0,c04971b24d39570132fce3d0995cfa0af2e16c9501a0d003a64d1082563f50a8,2024-11-21T07:11:38.700000 -CVE-2022-35768,0,0,14a50e9c29465bafce56f134706482b8589a8ebd1672133ae3dab24912cb003d,2024-11-21T07:11:38.850000 -CVE-2022-35769,0,0,cf031ab1ab7c56d8b71091cbf5e23f2ba3eee9a1de03b56b1dbbcd3328558cf4,2024-11-21T07:11:38.993000 +CVE-2022-35760,0,1,3df9e791102aa5304be438a7044a1ab1988754b326563965a34123ab3aec210a,2024-11-21T07:11:37.747000 +CVE-2022-35761,0,1,56fcfb068fba38b4cc091fb752ab3c85406cb3560ef84ccec0305b8d4fac6f5a,2024-11-21T07:11:37.903000 +CVE-2022-35762,0,1,b79290d50d31cbc7807a0d12a29903c64ba428ebf5d6233cf24de89a16890082,2024-11-21T07:11:38.033000 +CVE-2022-35763,0,1,d810b2bb050bb761dbabc67fe263ffd3a84f0f6f81264c80fc757fa2cb00d9e6,2024-11-21T07:11:38.190000 +CVE-2022-35764,0,1,72f9f8b9d10e1e92693612743e9e4d1aa993ae85344f079610829cb7d221b86a,2024-11-21T07:11:38.330000 +CVE-2022-35765,0,1,764499070604964b5eff64fbe9260da36c70728b9a821239ea06ce765e34e76b,2024-11-21T07:11:38.447000 +CVE-2022-35766,0,1,993a98e5c4a0998321aec3d5a74577e4ea89d1fd4765a7b74ca90ae9cd36d99d,2024-11-21T07:11:38.570000 +CVE-2022-35767,0,1,e1a6f8e7f70ca43791d3e3e4a45acf5f4a1c9eedb25b1555850e5e667388f826,2024-11-21T07:11:38.700000 +CVE-2022-35768,0,1,bfd4eb6be4cbe485457b3f684ac5509b4539d65b113cadf9127f52f14e757dde,2024-11-21T07:11:38.850000 +CVE-2022-35769,0,1,25a37c3f7e123c2258abdcacd8007b37bcc2b531010498c9d077057c6da49d5a,2024-11-21T07:11:38.993000 CVE-2022-3577,0,0,20a04e62937e8d3cb0524623d39d6e07978f2a833fa38c487b42cd280881426e,2024-11-21T07:19:48.287000 -CVE-2022-35770,0,0,a3437f3dc0010b7dfd8a36c4fbe6914196acb0ac2c8fc1c048ed943a2bafca94,2025-01-02T22:15:09.473000 -CVE-2022-35771,0,0,487f8169f910bac0118e73daf4a37fa6c062f9b97ba15ff6cb41ed0ee89ccc54,2024-11-21T07:11:39.273000 -CVE-2022-35772,0,0,70a85a91168c17cf713735680944ba11be5322d3f414eefe6ef699c8eefdbbf6,2024-11-21T07:11:39.420000 -CVE-2022-35773,0,0,10a8e3c0a84810bfec18cf3d3ed699bcb51788293697388b2466ec845cf3018e,2024-11-21T07:11:39.527000 -CVE-2022-35774,0,0,8f1781645368862ad54583338e78cca7ee073778cda03b2e8221b9acae814863,2024-11-21T07:11:39.650000 -CVE-2022-35775,0,0,ac028b34d8abf6cfc69c0bbac6073b64c1d195f54ff7f2ac6e2ceaaaa2ee23ec,2024-11-21T07:11:39.767000 -CVE-2022-35776,0,0,a6ef6c86bd1f4c6b9e517f3feb7d22ef7bb5fe31cb48df3ecdaaf44f80df752a,2024-11-21T07:11:39.880000 -CVE-2022-35777,0,0,31e86ea81f95f5d899ff17e8bf2e17fe524603392c90056a84316df9e4ae530b,2024-11-21T07:11:39.990000 -CVE-2022-35779,0,0,c4ec6dd2e100b9ce312f8474870f81d3c28a1114cc2d27c03e25c54c841ed631,2024-11-21T07:11:40.123000 +CVE-2022-35770,0,1,dc2096618f598ce0952aa989fb7d57b0fa1faa02564f331491120988da89afa3,2025-01-02T22:15:09.473000 +CVE-2022-35771,0,1,fde8c2d7412a9cae32def57218c3623873ea1223530e0abb141b8796feed992f,2024-11-21T07:11:39.273000 +CVE-2022-35772,0,1,5c514e3f817f5253edb53e2444af92e2126713519cb7ef61a29d620ed45eefd9,2024-11-21T07:11:39.420000 +CVE-2022-35773,0,1,484b86c3c8e11bd0aa3231e418004c7960b6b33b8b6bb5172874871d80522765,2024-11-21T07:11:39.527000 +CVE-2022-35774,0,1,b7e69e338f72f0a32ee8e0e53df0beb8b74d2ef8f54a9a689c98da57c11a4287,2024-11-21T07:11:39.650000 +CVE-2022-35775,0,1,64cbbed0b84258d8842cba5c7f0ef411aecd806bf23c4ca84a9a7e719e9180ed,2024-11-21T07:11:39.767000 +CVE-2022-35776,0,1,359462b52409a83621d271e40d1e8869937c749b57ad53591772b6904b773124,2024-11-21T07:11:39.880000 +CVE-2022-35777,0,1,3a2e64f60acc8062b48cf0d1b02e752e829d2742bcad65cd5d2baa1c482461e4,2024-11-21T07:11:39.990000 +CVE-2022-35779,0,1,2f8d27e2bd32fa86b56ccb1496b28ef1f1d62d0390a1d88cb1259b6c0a056522,2024-11-21T07:11:40.123000 CVE-2022-3578,0,0,9f06c4d7a61d32210ec05b588a8a8aac0ab5fa1811e285aaa322f5ee08c34ab9,2024-11-21T07:19:48.417000 -CVE-2022-35780,0,0,f570defb3cfa39897b14358c4965f7d147c1ee22c48d4d2233c1038cbb235552,2024-11-21T07:11:40.240000 -CVE-2022-35781,0,0,4cbf169a091d17224e0a08da28be5a3a5633226d2c306043ff04c1984eb69eeb,2024-11-21T07:11:40.360000 -CVE-2022-35782,0,0,4a106b36a594510a8e5a5a3776ed96001c26ed4e8113c680b3feb44b35c97b36,2024-11-21T07:11:40.470000 -CVE-2022-35783,0,0,7813445ec67fc9c568a74c823e54e0e450ceb87a2d65203a53a78b71a3593ae7,2024-11-21T07:11:40.583000 -CVE-2022-35784,0,0,d97651a78e609091b5470eaeebbbab23a02e3cf60673afb7b785ad3ddc9a474f,2024-11-21T07:11:40.693000 -CVE-2022-35785,0,0,0315b864cc1c81135b8ab10f8b3627967d07105a6783d70feeefa638221b4e83,2024-11-21T07:11:40.807000 -CVE-2022-35786,0,0,5c18f2554009de812de2fadaeb74bf22e2f12cce22758184080f70b0d062ddb5,2024-11-21T07:11:40.927000 -CVE-2022-35787,0,0,a4dc421a4b0c8781208ee912878506c4f9c6ec47e4982f17cdf16643f8328e10,2024-11-21T07:11:41.050000 -CVE-2022-35788,0,0,dea5527d4e7ad5c57a246244e716bf14d460cb97f15e654c0b4811719fa4853a,2024-11-21T07:11:41.173000 -CVE-2022-35789,0,0,7a95f87745166a700f218c96e68a35d41a192fa1c495e44ae1a6a8d4178109d2,2024-11-21T07:11:41.290000 +CVE-2022-35780,0,1,927309eec673d73bc02a0868b4e2d20dc7b871af4f9e7bd57fe479dc2318b7bd,2024-11-21T07:11:40.240000 +CVE-2022-35781,0,1,466b9114972fd670caa94cb407463e1ca6b89ca6f38ae0e00f904cdd84def885,2024-11-21T07:11:40.360000 +CVE-2022-35782,0,1,0311aa48e7ff9ba253a1d5b7e417615248f46ce546b581fcb8325d667b43d4b7,2024-11-21T07:11:40.470000 +CVE-2022-35783,0,1,c2a9d33b464bd78c515b38e0d773660d916f18538aa6756f6549e7ffbc18287e,2024-11-21T07:11:40.583000 +CVE-2022-35784,0,1,5b19da11ff5583e351665d8210e2037d4632c54e92813ff921a83ef9b5afd2a4,2024-11-21T07:11:40.693000 +CVE-2022-35785,0,1,120127e97f7092d8e2474e5d6bbb7f43e0c3be12209d6a9e86418ee10d6070b6,2024-11-21T07:11:40.807000 +CVE-2022-35786,0,1,3b3b75eddf4e95eed334e36776b73a75eb44f957f09d1d96903ab98d1c055519,2024-11-21T07:11:40.927000 +CVE-2022-35787,0,1,20f40054180ab6a08014a5c45b25a61eab66fe1e1324e577f13d963c17bae700,2024-11-21T07:11:41.050000 +CVE-2022-35788,0,1,36880cb6314656dde7b90c2c46de18483e592b6071cbbcee9a06b132324812f4,2024-11-21T07:11:41.173000 +CVE-2022-35789,0,1,80ffc2e39f1a3c22eaf0ba7e497ac3601b88c3f6fda7914d8d45f3aeebad512c,2024-11-21T07:11:41.290000 CVE-2022-3579,0,0,df29e4ea7625a437ff49ee0683ec591bae5a870f8392d15b49fcb87066d9e777,2024-11-21T07:19:48.543000 -CVE-2022-35790,0,0,bdd98a241cdbc9d5ea1e3e8ff20577dacda858eddf21639e698279a990bf10ae,2024-11-21T07:11:41.420000 -CVE-2022-35791,0,0,1985d371e737d65d7be68bf7889593d29ab310f51b325d1c74c3cfc63d869e54,2024-11-21T07:11:41.533000 -CVE-2022-35792,0,0,f4992699e25160bc14f6c2704bdcdc9766b851bbcc9fa305c06fc8fc47bbb031,2024-11-21T07:11:41.650000 -CVE-2022-35793,0,0,e2a35a761b19ca7824f27d2690a4c772afb28af1891a3d74873880639e502a8a,2024-11-21T07:11:41.790000 -CVE-2022-35794,0,0,a69e89fb3bd41caee6ca7ea14a5aa55f59464bbeb25c20848c06f6a5afe02589,2024-11-21T07:11:41.950000 -CVE-2022-35795,0,0,8b6ef4da79534cd1c0933cde9f97e9f4cf69eaf5d1001d983dafa909be96645c,2024-11-21T07:11:42.093000 -CVE-2022-35796,0,0,f3f375b020165e3069ad37654ab5058928aebe01360e58ad5e086f668fec6eaf,2024-11-21T07:11:42.250000 -CVE-2022-35797,0,0,3ed74dd88750dfe8bf5f3c88767ab0b191ef0f9ab418e2aa4c8d000770950336,2024-11-21T07:11:42.367000 -CVE-2022-35798,0,0,edc0d5a5a8b8d45bd3ed79cdb83eb38f3d2e566e8453bdd1c1f0707467eec2ca,2024-11-21T07:11:42.497000 -CVE-2022-35799,0,0,c6f383a34b4c18051384f79b1b93b6a81ca5523846c9bacaa36777cc922ee8f6,2024-11-21T07:11:42.613000 +CVE-2022-35790,0,1,230d86598e65b8f630e9151f47f5c94b8c541b53f643de67a2c4b0dbb979a90b,2024-11-21T07:11:41.420000 +CVE-2022-35791,0,1,5cf4cc28705a85a880599fc00a167f4260b8271eb07d4aa4dd4606adcfffa1d0,2024-11-21T07:11:41.533000 +CVE-2022-35792,0,1,c232a963e325d6319d249aff35a6aca8aeb5eedfb22d74a798a8bd79678c8ecd,2024-11-21T07:11:41.650000 +CVE-2022-35793,0,1,521facb01913d9d46a02fd7e0d22109b35c676867ae79b8c5ee63daa8e61c758,2024-11-21T07:11:41.790000 +CVE-2022-35794,0,1,2767d7799799946ddf0c255a5db8a304cd093d884908db2cc316778d8ad4e568,2024-11-21T07:11:41.950000 +CVE-2022-35795,0,1,4156703a431496c26c631e5349d23436004d6bfade0ff5333d59ac6afa8ea234,2024-11-21T07:11:42.093000 +CVE-2022-35796,0,1,9b96199b1667682cbfd2c0d12e287146802fd7b3ae90d3d5e893549ce20282e8,2024-11-21T07:11:42.250000 +CVE-2022-35797,0,1,6892da5d880c17fde9f129e79fff4e989ab7894df0efaa666abb81d73c9d44ba,2024-11-21T07:11:42.367000 +CVE-2022-35798,0,1,4c52d7a80d22dde43485b349190041e902bbcce72c24417207a02dfb54d6039a,2024-11-21T07:11:42.497000 +CVE-2022-35799,0,1,b63a24c3324ae3a16a7333ed3f32620235244352424b053e2cac9d0c9cb29b20,2024-11-21T07:11:42.613000 CVE-2022-3580,0,0,9bdf272857e014fe1cd0a288c757e0f3cfc33acca3e793cddf6e304372644e74,2024-11-21T07:19:48.687000 -CVE-2022-35800,0,0,abb37f22ee4ddf95b9c9e52314bf077811f9f7a8b130e0e8fdce5ced5d12c171,2024-11-21T07:11:42.740000 -CVE-2022-35801,0,0,ce14fe609ab19f8a9c1ee796517d19e3cf18758e8eaa0e4470913d2469278579,2024-11-21T07:11:42.867000 -CVE-2022-35802,0,0,ba06502b62f37423af723611a07b7b37e649b2bc15ac5a073c5dc0ea3c833ba9,2024-11-21T07:11:42.987000 -CVE-2022-35803,0,0,37abb1a48936f0e20956f26512b05f6f5d0c6af8609e407ad01a7e424017f1b9,2024-11-21T07:11:43.110000 -CVE-2022-35804,0,0,b2e30d332e4924a5fe83c8ca7bd55b02fd9c8b24ad2fbe001bfd588eb3295c54,2024-11-21T07:11:43.263000 -CVE-2022-35805,0,0,c9f8d31d91f755f84baa13f7225309a4c625ee9895d216299fc4bc5c8a9468e6,2024-11-21T07:11:43.383000 -CVE-2022-35806,0,0,210523b3d0d41be0dd64a5ce1dc8b6990d2194429f226309f4c77da79ef1751c,2024-11-21T07:11:43.503000 -CVE-2022-35807,0,0,16925d10e8404b7c0fcd6d0e0c06dad56665fb30ea57af3ba7f932567fb62687,2024-11-21T07:11:43.623000 -CVE-2022-35808,0,0,fe66ea97d783d24395f38a39e4be1c07712da4b36a031612f872d750de558e4e,2024-11-21T07:11:43.743000 -CVE-2022-35809,0,0,f8155251ecac1145a480c4f90afde49d788a1f07059407806c0727c5b01c8e47,2024-11-21T07:11:43.870000 +CVE-2022-35800,0,1,807463d7d87d4da24c0b636dc2bb891b8a473f0009fb52e47808d0a3c8f01f6b,2024-11-21T07:11:42.740000 +CVE-2022-35801,0,1,a614b7b7ca5205d431375bf5f565816491502b2955e08c9fd7b1a20de42244b1,2024-11-21T07:11:42.867000 +CVE-2022-35802,0,1,6954556c27c5f12b52ad21a3841b3b580deb5e93b0813f8c15a06efff917d9fb,2024-11-21T07:11:42.987000 +CVE-2022-35803,0,1,3f6e37f12c6e7fe213ca3462fe823ce2581b1917f342432fd27fdf6db65528b6,2024-11-21T07:11:43.110000 +CVE-2022-35804,0,1,b094e24f88a355f94af95822947c9f3a7563c7a7a74fd1b7f9c8d46f54370694,2024-11-21T07:11:43.263000 +CVE-2022-35805,0,1,dc3bc15eef81c2d798b7962a31ffe1e2dc909f1ea6c746e329c4f0ddcb2e6480,2024-11-21T07:11:43.383000 +CVE-2022-35806,0,1,ee845946e77c722ba2b8a90cbe2e552da522ef510c5e3ddc17017e3f9cc3fd74,2024-11-21T07:11:43.503000 +CVE-2022-35807,0,1,ed90a978a01aeacbae79281fd7849e6ec85b30c43a6fbd8d73c8919b24f210fb,2024-11-21T07:11:43.623000 +CVE-2022-35808,0,1,017087a7235840beb90b999dcc25bc3552b3a30445947743ed0c7ea74b014260,2024-11-21T07:11:43.743000 +CVE-2022-35809,0,1,0437d8953ed33d2060e7ec6e826bc962db2109f583e07b81b57da7e974704b31,2024-11-21T07:11:43.870000 CVE-2022-3581,0,0,5d36522ae7f00dd1969337532e06e09989a9b1906951cf339475af591c891912,2024-11-21T07:19:48.817000 -CVE-2022-35810,0,0,f9adabfe3c56e7b5c6c69c41cc5ace84b7b9ed1d96c514a44f85787b247cf262,2024-11-21T07:11:43.990000 -CVE-2022-35811,0,0,aa24be1c4945f1070b355916d3c14d10693d20ce9c0658b74ccebdc68fbab441,2024-11-21T07:11:44.113000 -CVE-2022-35812,0,0,1750148ea2c9fa65554efd9cb74a38832d5062ebeb3959e40f005dd5d099ef44,2024-11-21T07:11:44.227000 -CVE-2022-35813,0,0,69fe6cb75131db9f50783419663d238844f7dca5e8bdac96a4ce22c9a2b1801c,2024-11-21T07:11:44.337000 -CVE-2022-35814,0,0,bc3fe1be651dbeeb40fdd86d1616d76530f9478dad1b4ed0841e330c1809c50d,2024-11-21T07:11:44.460000 -CVE-2022-35815,0,0,6c51eef8b172a699253d776019f1ede4bc2eb0201a7f87aa870a1b031efdd4a5,2024-11-21T07:11:44.593000 -CVE-2022-35816,0,0,5573004cdd5000afd3fee11ea66271d7400c870a83fd13adae5821e9663aae42,2024-11-21T07:11:44.710000 -CVE-2022-35817,0,0,37257b3cddf23a7f79cd655a1e9888f79d22f173ab7c13a6b8d08005dd7d2dbf,2024-11-21T07:11:44.827000 -CVE-2022-35818,0,0,106f714793c0dc5fb70de19fdcc15ac45d69d18490f34c08d9b745b4f28c4219,2024-11-21T07:11:44.940000 -CVE-2022-35819,0,0,628aa8f03a46f95245b065649639c85e376ccd85fcb3e7ba4c21052eeaec1187,2024-11-21T07:11:45.053000 +CVE-2022-35810,0,1,3f5d93b2b6417c029456f2d1f1ecaee84a4c867e5a2cb1c38c8d9bee1d891fbb,2024-11-21T07:11:43.990000 +CVE-2022-35811,0,1,9882aecf7b6458ae39acb91c4fe1a1f7c55c57112b72f2ec3c69d8f8a601bac0,2024-11-21T07:11:44.113000 +CVE-2022-35812,0,1,0552081785e2c2b75b984ec0cda1c9b836f94d82858e9a4de1fc13ae74e9b174,2024-11-21T07:11:44.227000 +CVE-2022-35813,0,1,b2d7030ebabf5df9a4307020f131321d6d59ec3a12cbaef2891988cb272aa159,2024-11-21T07:11:44.337000 +CVE-2022-35814,0,1,bcaca301ae94a05f624ef00818f78eb89482c40d9218572d8e7d4240c7586c84,2024-11-21T07:11:44.460000 +CVE-2022-35815,0,1,e8ac740845ead59f36295f5ed6fad6f054967bd301f2de01eb06bec44b713a84,2024-11-21T07:11:44.593000 +CVE-2022-35816,0,1,bf2f792448432e76ce6191353a2e6b1da3264fe31d427d1429e42e4b4a3ae9b0,2024-11-21T07:11:44.710000 +CVE-2022-35817,0,1,4981e29965b62818ce84c582fdc8c4f873c79cd4e3d606b8630dca2f12cf56b4,2024-11-21T07:11:44.827000 +CVE-2022-35818,0,1,af12fcf216027cf0b241e87499f78f3d8d35d82f3166f647bef883f44190ad2e,2024-11-21T07:11:44.940000 +CVE-2022-35819,0,1,28962cfa287f3daf78956b1ef60478fbcc23b13d3ab1803729141664baf25db2,2024-11-21T07:11:45.053000 CVE-2022-3582,0,0,fa7bbbaac7f3a7d919866eeb76955f6a735b07606d7517fc11955a1610cb2b74,2024-11-21T07:19:48.950000 -CVE-2022-35820,0,0,fc0f9d62d66240e2b6fd1938f9dc031cf1712d12a5dc098fe21659a3272ed901,2024-11-21T07:11:45.163000 -CVE-2022-35821,0,0,ef198c45a8f76005062db5df9f5cb435beaadbc0a9da0fad20e5cb58f7b03b9e,2024-11-21T07:11:45.307000 -CVE-2022-35822,0,0,e191abc8b8e466e0978f5a1f961f5c064321b4ff0fc7fb47ed29ec7afe431aab,2024-11-21T07:11:45.433000 -CVE-2022-35823,0,0,96cd4313876e8bb9e5c4a36ac7362f0297aa5e4133ecb4b6e4288c784c4d3d41,2024-11-21T07:11:45.567000 -CVE-2022-35824,0,0,0795891d835d90ff018c0096112e6af6bb8fe8f851ea7d237e1aefb5cd4694f2,2024-11-21T07:11:45.683000 -CVE-2022-35825,0,0,99dd608241e2ce3e63ff93fd9c710a7818c6a8506345ff1bd3aae008d4939c28,2024-11-21T07:11:45.800000 -CVE-2022-35826,0,0,c4e9b9064ef22301618d80f61a9020f4823a7ab13e87dc663cf5a154f2afbb18,2024-11-21T07:11:45.927000 -CVE-2022-35827,0,0,c9b11efef6d18f227645b90913f5d4a47a5b7131ba262218aedd0ef725b6aada,2024-11-21T07:11:46.063000 -CVE-2022-35828,0,0,9c766dc0e9686caa5a2521e888be1d6aefb5372aa64edd7c797ebb278f24ce34,2025-01-02T20:15:49.700000 +CVE-2022-35820,0,1,cda4f0210ed220f33bbf82332d3bb67aee715ca04cb310a52c72204b383f17b4,2024-11-21T07:11:45.163000 +CVE-2022-35821,0,1,5668aa7267e1acf73aa2a5cc694cc6523c34a698307f176cd2e6a5067d867cef,2024-11-21T07:11:45.307000 +CVE-2022-35822,0,1,55859c58a051fe0d6c20c8f40059aa511edebdab7111bd431889fe445ff5dd7f,2024-11-21T07:11:45.433000 +CVE-2022-35823,0,1,975c542484f77fce6eaa12522d09d8d8c9485220df4241591a3aac7c335bb9b2,2024-11-21T07:11:45.567000 +CVE-2022-35824,0,1,e6840a471f8d5cf48396dec528efe9bcd488015c76ec59a1825495f7e626aeaf,2024-11-21T07:11:45.683000 +CVE-2022-35825,0,1,59153bcee653c9c7e7d6b2fa8d7b5f8dca734306d96986db476f69673454f142,2024-11-21T07:11:45.800000 +CVE-2022-35826,0,1,718c7e061d3c80d8d6ab67a0ceb3be5e0fb0b0ccee8e21506edbe213b10c6a9e,2024-11-21T07:11:45.927000 +CVE-2022-35827,0,1,e466bce0f448ecffb55fb2487c9d058c87f3e5f7b055f14e1c54797e97162f62,2024-11-21T07:11:46.063000 +CVE-2022-35828,0,1,20309e2bdb81dfb24725a85c16f4f7700fedfbf457352a51b88b55961dfa1216,2025-01-02T20:15:49.700000 CVE-2022-35829,0,0,cc5c747c4d45908b8b912463dede5aa60ab33fcb64b82112e25a8e145907a19d,2025-01-02T22:15:09.610000 CVE-2022-3583,0,0,cad9c14b9ace1d5f6ec370fef348096bdbc3014ef19e44b78e8d4b29f4da497d,2024-11-21T07:19:49.097000 -CVE-2022-35830,0,0,244cc63e2779f420a6c59299ed8e1813e8fa8d3fbdcbd32124e6623454e236cd,2024-11-21T07:11:46.433000 -CVE-2022-35831,0,0,837b1b839c29a583e912a4569562d3247cd46e84948c3c8ad50565b0a7dd69ef,2024-11-21T07:11:46.597000 -CVE-2022-35832,0,0,821764782f563151f3a1d7f4f43fa87bb6f74137b5428c13a6c93efeb7006cb0,2024-11-21T07:11:46.753000 -CVE-2022-35833,0,0,6afbae8f4806b9697f595ce1d6d266b2f3645559f41e6d02bb19f284e2fe1a31,2024-11-21T07:11:46.913000 -CVE-2022-35834,0,0,8513a7ccf3ddd1da8b6a6cd68ba6a420fd22ba60e0df2404e22cc311ed80afd1,2024-11-21T07:11:47.067000 -CVE-2022-35835,0,0,cc6ad7b458372f654b3ef33de4032f1cf72a79ed81b93939b365ad8f5adf16d6,2024-11-21T07:11:47.220000 -CVE-2022-35836,0,0,1f84f7a8d87569949e946201b13f66705c25001f1319f98f56e1fc0d0cecf326,2024-11-21T07:11:47.380000 -CVE-2022-35837,0,0,85aadaf94076ae1fdf2d002931ca2bef492a95f5d066f2ddf823b4ff3435dfb3,2024-11-21T07:11:47.543000 -CVE-2022-35838,0,0,fdb7cb25d22f354821ed51eeba76fe6319be17d43b2d3751c900ff86f66ee521,2024-11-21T07:11:47.717000 +CVE-2022-35830,0,1,111c5deaa28309e9cbead2c1a7da9dbeb2942f80148228d0144f932460f3a6ae,2024-11-21T07:11:46.433000 +CVE-2022-35831,0,1,67f67686f0a836493d01f804ea84eac7d5bb43459a74d706633766b2062edb1f,2024-11-21T07:11:46.597000 +CVE-2022-35832,0,1,10a40a200f516f665b9c92ca82b50a638802b2f48c8875f12d2b21247d1a586c,2024-11-21T07:11:46.753000 +CVE-2022-35833,0,1,541e1f87eb922c58315a7517f86b5aa1aa97c6becacdf935f444c86be07232c6,2024-11-21T07:11:46.913000 +CVE-2022-35834,0,1,d2b5bf8750524434966e8fcb05bf918731bf10082f67a5deed2ba016551d7b53,2024-11-21T07:11:47.067000 +CVE-2022-35835,0,1,354a6e43567a3523ddae8c2b2c510d49e8a389a62563a0faa0957b0c212b6532,2024-11-21T07:11:47.220000 +CVE-2022-35836,0,1,b0d1f5c9b282ea137c7cd97e62ad12e057927935fa43ab2030a32838c0c670cf,2024-11-21T07:11:47.380000 +CVE-2022-35837,0,1,5828997a9ec23761d3d545fad288eb6e05afb0b1cb95886f399a5c7a9ee6b030,2024-11-21T07:11:47.543000 +CVE-2022-35838,0,1,fd003e6eb0b166a2c741d7dd99cb4d001aa467c574df22a43503b0e9ab09684e,2024-11-21T07:11:47.717000 CVE-2022-3584,0,0,eb9f46a267ec5e767ca9ef1f970de6fcff565b1326030744d0c843f27e61b136,2024-11-21T07:19:49.237000 -CVE-2022-35840,0,0,da4f26e9f89cae411582602187136fddfc64b1b456427d64be207bc1bdb85dbe,2024-11-21T07:11:47.847000 -CVE-2022-35841,0,0,d4027b3525cca768480a8e1f923f18ca8f47e2b3175ab0b5728d7d92e02c700b,2024-11-21T07:11:47.990000 +CVE-2022-35840,0,1,42c104dbd7596c71711097eff0b34f044b49e949dece63634254b95a2f25901f,2024-11-21T07:11:47.847000 +CVE-2022-35841,0,1,75f9ef5aa12506c0338555ffea446c938d5350c796676de552c0656a465a8246,2024-11-21T07:11:47.990000 CVE-2022-35842,0,0,390eab30cb4fa479082d599ad2c26a03adc0141f8e28296b2f85edae19d9d869,2024-11-21T07:11:48.123000 CVE-2022-35843,0,0,85bceec2fdf33680ea4f22e06ba4aa869dcf18c7dcc55920aa151eeb903008bb,2024-11-21T07:11:48.250000 CVE-2022-35844,0,0,6c0887ef48d920dd733079b2966f2d0be9c1085085d5a9d94bd70cbc7302e9ec,2024-11-21T07:11:48.393000 @@ -204777,110 +204778,110 @@ CVE-2022-37950,0,0,a9b43ebd758178fd354e5a9c11ef0efaa741254b065c6953e14a055014e61 CVE-2022-37951,0,0,ceb9777ab704ac1c3c92af35e2d85709b6bfa737e0eaf9ea0fbc781614a8fba6,2023-11-07T03:49:57.867000 CVE-2022-37952,0,0,64441640184ccc156000976275101ddc9992b8b72a7e09350e0c072ad728f625,2024-11-21T07:15:25.883000 CVE-2022-37953,0,0,927e70c26064483644bb55e2a699651a27d9395ed64e64f288bac178ca6ab563,2024-11-21T07:15:26.010000 -CVE-2022-37954,0,0,9fe94208419666ac06c3014cf87437a2cbb891a6933eaa978288f16456040201,2024-11-21T07:15:26.137000 -CVE-2022-37955,0,0,bc67151e906537e7b56fcd2a769f0117bd2af0908ea3fc7f3ed82f57e6c5008d,2024-11-21T07:15:26.273000 -CVE-2022-37956,0,0,4aef8c41594decd90f20783e0ca94f8b6e779eaf85f509800ee1612b1803f597,2024-11-21T07:15:26.430000 -CVE-2022-37957,0,0,0309ed6859ac864d8014efe71a375f6528e291214cd2cb6d3609a1b40f851e8c,2024-11-21T07:15:26.573000 -CVE-2022-37958,0,0,bb7d80f60a9e4705b060dd3d68966005bccd00912ebbe8b94d5afa387a5acdd4,2024-11-21T07:15:26.700000 -CVE-2022-37959,0,0,c6fa9b92a16643abe7846cdc612dc764c44764dc391f0ce9203d02b3ed82f844,2024-11-21T07:15:26.843000 +CVE-2022-37954,0,1,15be0ac1ec220234a3f65f70bfa0da2cfaa3b9900cc452a8e15c920742942588,2024-11-21T07:15:26.137000 +CVE-2022-37955,0,1,d3c3b1e98b2cc3469892f7b3aa58ac95752ebf854883e6b5e232f136c9aa488c,2024-11-21T07:15:26.273000 +CVE-2022-37956,0,1,edbad59574e123f92907be6846a88e3e275be345f3e1acd8aa194b54407aa2d2,2024-11-21T07:15:26.430000 +CVE-2022-37957,0,1,e5cebb6a93df8c4b07d00192e8e1b68c0316c77aed131e8eff30541973ccbd55,2024-11-21T07:15:26.573000 +CVE-2022-37958,0,1,50936a43c282cac68e20a687fc47b7d1ee65ec1ba6afc350453cbcedb548a972,2024-11-21T07:15:26.700000 +CVE-2022-37959,0,1,588d345dbe0b5a6bcf121dd68c796dd68203d673833c1ad77eeaf2ab81ffe641,2024-11-21T07:15:26.843000 CVE-2022-3796,0,0,09b3b33dac7e52202aab232158b86da731ee9859263c3a3351c439b14b568248,2023-11-07T03:51:48.547000 -CVE-2022-37961,0,0,30dc17cebfe7836362407adcf649fe3fedd964dbc21e66c13e38f5343144f8f0,2024-11-21T07:15:26.963000 -CVE-2022-37962,0,0,71a61d8d98fe3e4d8828b914c383dab9695d5debcc3593aeb561f97dd054d8b0,2024-11-21T07:15:27.073000 -CVE-2022-37963,0,0,57484d84bd76674946d5a12e494ecdcc6e222cbd1370a09fc31e52e97e5ab5ee,2024-11-21T07:15:27.203000 -CVE-2022-37964,0,0,6cd763e913dbd2383cbebb0727c23901912ced874976ebf38b2ba62826a67d47,2024-11-21T07:15:27.320000 -CVE-2022-37965,0,0,2a7503120e60c0b5e02ad3acc8e2519cdfdf8a1bfda4ab428b792f6d1a19a8ef,2025-01-02T22:15:09.727000 -CVE-2022-37966,0,0,4dcd94bedd8277b7f76b33cf224864aa2cc069313b4fd75131ae205af19568c0,2025-01-02T22:15:09.867000 -CVE-2022-37967,0,0,f86e7986d335886598ba39fd1bc4e3d132f08287f5b77ac735546e39c70f2720,2025-01-02T22:15:10.010000 -CVE-2022-37968,0,0,1f1e232a25e7e8f5f0ede8232a86b4473cfb46eebf352f696f98f771986cf96f,2025-01-02T22:15:10.143000 -CVE-2022-37969,0,0,307e3a7f8e1cf2ea7f3c8d1b5b18d3e14fc48182eb8225978a8118961a7ee6ba,2024-11-21T07:15:28 +CVE-2022-37961,0,1,ecb1027fe6ca2e18c5e0441a945edf154c4901a36f2680216273e2cdd567263e,2024-11-21T07:15:26.963000 +CVE-2022-37962,0,1,f50ff8e8094815d8816fc513b829a1ce46a74c8282897c68e04a12fbf08a8146,2024-11-21T07:15:27.073000 +CVE-2022-37963,0,1,6b24206a0819936f29a14d50e6b0a98c60b695f0cbcf78fefb85d2165d88064c,2024-11-21T07:15:27.203000 +CVE-2022-37964,0,1,904f2be60e94f5d3e0bef95b7dffcbc667f77d6b6e301201714a874e324af319,2024-11-21T07:15:27.320000 +CVE-2022-37965,0,1,7382339f174de9fdc4b84849a25276f93f4cba28d66c4e02be65e6c4c9a260e3,2025-01-02T22:15:09.727000 +CVE-2022-37966,0,1,e7ca4037eaa67c01820375a90d40ed51c66c9acd2b7e40a9f1ea8dc246ba3edb,2025-01-02T22:15:09.867000 +CVE-2022-37967,0,1,f583f9211879c0c61033a7b05dcaffc689e2c7f204c11c47debf243169222056,2025-01-02T22:15:10.010000 +CVE-2022-37968,0,1,6a79a831585dfc274b8d06497d20b84f4f0f567a45a9c981f18e711d1714e0cd,2025-01-02T22:15:10.143000 +CVE-2022-37969,0,1,730c88e6266ce922e60fc7a16119f2527fd7c0c5bd8ada716eb5a9782c859004,2024-11-21T07:15:28 CVE-2022-3797,0,0,1d258bd702d02d61f24422c553d0aeb93ad0a41da7597475f19b3996eb769180,2024-11-21T07:20:15.157000 -CVE-2022-37970,0,0,e73b387d20d1fb3a593d6871215d74dc358b13c35d3fbe8cbdb0d9cd1598b45f,2025-01-02T22:15:10.263000 -CVE-2022-37971,0,0,63fd816db3dc60de56a975685a8db02a6fcd581f08c89689ab21303dca41f8ea,2025-01-02T22:15:10.393000 -CVE-2022-37972,0,0,ac9c9c3bdde84dc6d4927f45a3e1c4e98c3c239970562f2678c90bfc76d480ff,2025-01-02T20:15:55.460000 +CVE-2022-37970,0,1,e7f565127a61644046a05135c4956f50b7b6d230fb402b297bf3685c102bf1dc,2025-01-02T22:15:10.263000 +CVE-2022-37971,0,1,3eed1a5f28bd8db707e5862d22ffbad5d063c63f776130157ef9ee169fa1c3c9,2025-01-02T22:15:10.393000 +CVE-2022-37972,0,1,20d6669b79ebecdb93297a5648f10640d04e4fbbef1c0e5646128ef72af58e98,2025-01-02T20:15:55.460000 CVE-2022-37973,0,0,72cc4cc34f0c093fc489ea8f3e9e3bbc2695f6d3d97d2b127fc46dc9de3c377a,2025-01-02T22:15:10.500000 -CVE-2022-37974,0,0,21b5964298d45a0b32e81b29c77c76302e076d09af5f56e3ac37974936755752,2025-01-02T22:15:10.610000 -CVE-2022-37975,0,0,7912d16ae589c08adf2df20dc4841f474d76d0a0d3eca4de70c172f550a038f2,2025-01-02T22:15:10.723000 -CVE-2022-37976,0,0,c1a2ed7eae71398c46273e25f9f639c7178949414afd98596179fa304e29cee4,2025-01-02T22:15:10.860000 -CVE-2022-37977,0,0,bbc0ec0056103dfdf2ca12667b7697e3c086f44152966c103344229afbd9bcc6,2025-01-02T22:15:10.987000 -CVE-2022-37978,0,0,2c0d3f0c8bf80db3e09f0518f5962d78b13ca95ac3e3c8ecd00e79bed0dcf152,2025-01-02T22:15:11.123000 -CVE-2022-37979,0,0,255c9fa1932ff09e84335131b732d6322a68e999d241171316c663113249f7de,2025-01-02T22:15:11.273000 +CVE-2022-37974,0,1,3c1835c6966c4c32df90639e448137a175027eda188ab5f66e63074dde3b6265,2025-01-02T22:15:10.610000 +CVE-2022-37975,0,1,1a3240d85f05f8eaf1ad0441b4a3295b308c54fedf7ea4d9b895f5ea83ea5fc9,2025-01-02T22:15:10.723000 +CVE-2022-37976,0,1,19313ee440da2132adc5a61d5f1e9c928c2b6df371f0bb785feaafd5a3671e01,2025-01-02T22:15:10.860000 +CVE-2022-37977,0,1,1be8525a5ee7b38487016818901d2c367297d741b8995fac952eaaa1cc631d60,2025-01-02T22:15:10.987000 +CVE-2022-37978,0,1,a661c2445661ef7d8f603deb59a17b3314c7540fc83a7d3ea851100b4150bd03,2025-01-02T22:15:11.123000 +CVE-2022-37979,0,1,ceca4effd58a6a3b398a7a816bb9a5bcc108a6833460968f5d04e98047bdd992,2025-01-02T22:15:11.273000 CVE-2022-3798,0,0,5b2519bf67ab64c32d7543e2b749aef28926c4b4037fb23c6154dae48f9a6b4c,2024-11-21T07:20:15.280000 -CVE-2022-37980,0,0,2a21ca5037b80af8934587e59d1b32d24ecf437909760bede7cdf9c4bd202da6,2025-01-02T22:15:11.390000 -CVE-2022-37981,0,0,55c853aa30a9f2de8690297c9805019448ebedec0193f11c51b89b7d1f93327f,2025-01-02T22:15:11.500000 -CVE-2022-37982,0,0,94ac2224605d2d7e9c7ce0a7aac139818cd7209cb8c797c88e1a748d8dfb033b,2025-01-02T22:15:11.663000 -CVE-2022-37983,0,0,599e047668038b9dec0d4119b9865f445933bff3003e8ba670ac304d2d29294b,2025-01-02T22:15:11.810000 -CVE-2022-37984,0,0,7011fe5ddd4957cf17f455dca93cf147db035736a086042d7e0d2762cf03700d,2025-01-02T22:15:11.930000 -CVE-2022-37985,0,0,99d7c7685d4a9f16c595d776accd9baa1983f7b19314f1c4eacabce15508f355,2025-01-02T22:15:12.053000 +CVE-2022-37980,0,1,9f263412257ef137f8b28d0f6df70b3d5be48728765c7f42648005055628d7a1,2025-01-02T22:15:11.390000 +CVE-2022-37981,0,1,b866f4a2455a83940f78e8c6cc249aee79f7a7dba22c3059ed1ebdf301b79378,2025-01-02T22:15:11.500000 +CVE-2022-37982,0,1,300ba562e1dd7e1d629a1a7324b4972bd10eff30a2c71dcc5f2b61a2f8067196,2025-01-02T22:15:11.663000 +CVE-2022-37983,0,1,c311c80164dfdb403ebec4edb6c79dddfab5d09172664c1772444e3c17def611,2025-01-02T22:15:11.810000 +CVE-2022-37984,0,1,ec9acc00fd3e83cc61e881cbddcb52f3380a7cb4ecaa5731b8aaa13a0e7b796d,2025-01-02T22:15:11.930000 +CVE-2022-37985,0,1,6659a2042bde8e21959a7d42f36c30b7d706fee3ef65d6dbef052fdcc1c5d852,2025-01-02T22:15:12.053000 CVE-2022-37986,0,0,426a94dfc885e0a984214e58194c70ca31375f0fd61a4bc151ee467a205c160a,2025-01-02T22:15:12.183000 -CVE-2022-37987,0,0,acee1df410e6c99f5c0914c719fb849b359bb6ed49b3daeed9c4c01d99c6d3ed,2025-01-02T22:15:12.313000 -CVE-2022-37988,0,0,85ef852ede33e44d45b198443769bd8d0a403b2416fdbe0cf1a8b22ff26c6c38,2025-01-02T22:15:12.440000 -CVE-2022-37989,0,0,ef3a988eb3e4ab8a399e05c8d0bdccb416981b6b55c85e1355a83f17e723d2a4,2025-01-02T22:15:12.573000 +CVE-2022-37987,0,1,f04749d94404d3311dd71d17fb8289195e5d7a613640d5841abffc4668d07022,2025-01-02T22:15:12.313000 +CVE-2022-37988,0,1,2b0eb4a6b3de8d5471a627d6a16356a7529cc7772b11f29a1771ef70bc1b8e15,2025-01-02T22:15:12.440000 +CVE-2022-37989,0,1,36fd2757ef0a32e3d546b0f5a581ba7fea529d3b3a440490c8945948431e1794,2025-01-02T22:15:12.573000 CVE-2022-3799,0,0,bd4feda0ea286a6117686d70813f8b3e22d246a7cbabe0ff1c4a9874b8aad7c6,2024-11-21T07:20:15.403000 -CVE-2022-37990,0,0,54bf2ab4a4cd648b70df865379e9ee4ea2232bfdb2a869728cb8ff3f34143631,2025-01-02T22:15:12.703000 -CVE-2022-37991,0,0,9636c6257c89b5e061781459e7dd5c345a3b8c01225401ca7ba86e6e7dd89eb1,2025-01-02T22:15:12.837000 -CVE-2022-37992,0,0,2c61745389ae6245683b3f8b78e4db981a1ffb7f289e1f48ec228a248eef9d1f,2024-11-21T07:15:31.287000 -CVE-2022-37993,0,0,90623cd4a446eab5f534de2ba6b0a4365f8ebd736c834ed7db7e36132bd3ca83,2025-01-02T22:15:13.090000 -CVE-2022-37994,0,0,5048da72cc852ee1729baedf2f0c39f82c510e5235ebc143c8fb606ac4336a5f,2025-01-02T22:15:13.227000 -CVE-2022-37995,0,0,7142e073535f152e19bb1f82388828582993e14c46cbbff7aa31588a2bf26804,2025-01-02T22:15:13.400000 -CVE-2022-37996,0,0,acf727a7fed968ef5ea56e14d1c825bfc364d76fefe203c696f28bce8393bacc,2025-01-02T22:15:13.533000 -CVE-2022-37997,0,0,836fd8381f0cdd73ebb0cb472be7977f09a9de0eaeeb46b59aedb9ee7cbf2849,2025-01-02T22:15:13.670000 +CVE-2022-37990,0,1,f258cb9131fac2b9cd10f3f28dd4e2e4b570fcd11dc788d3dfad5f84b83393f4,2025-01-02T22:15:12.703000 +CVE-2022-37991,0,1,ee4553e201fb15e4d34c6f73e56d3a7f822f7518eebfe99fe0ed6c33594935c8,2025-01-02T22:15:12.837000 +CVE-2022-37992,0,1,bcf5e143e4dd65cb53c28fa19f62105bb19548b114b989ea8af71fc20397f48f,2024-11-21T07:15:31.287000 +CVE-2022-37993,0,1,f5e067407640a9ac93bf7441e15bc10d52535f949d1e94f5f58fb7c7a147b569,2025-01-02T22:15:13.090000 +CVE-2022-37994,0,1,4383bea5c28695c35220102d8397534462ec68bf2d4bfec16c0543b44fe5fc74,2025-01-02T22:15:13.227000 +CVE-2022-37995,0,1,16991715e3b611d6541309ffb88ed8e653a5385203610e72f3b0e650d197e776,2025-01-02T22:15:13.400000 +CVE-2022-37996,0,1,b953af11b7b7c5354a14baded2650ccb40d5462cd50b5c005d3aed5c48b68f31,2025-01-02T22:15:13.533000 +CVE-2022-37997,0,1,1cc2e96976582840fcdf1a913ae391d479a248953206b8ba742bb0980890f40e,2025-01-02T22:15:13.670000 CVE-2022-37998,0,0,8eb4d9ddf6e93a20f854571e87a5a5cd28758521292fcb9e8d12304a95f5d047,2025-01-02T22:15:13.800000 -CVE-2022-37999,0,0,044a5f742a6f5a925af09311eae67865d35014afe22fb2c0edc5b5d9181f0063,2025-01-02T22:15:13.933000 +CVE-2022-37999,0,1,bfcb02a2ed5b5629cfb845cc79c7ceb0db0479c2b8630c73b043d9826e1fba63,2025-01-02T22:15:13.933000 CVE-2022-3800,0,0,009a2f1ffc89126a18a19398fa31d0c8bf602de0784559deb033c7bd39c0d39b,2024-11-21T07:20:15.530000 -CVE-2022-38000,0,0,0b2fe2649409fa001e42b7014bd9488d9d2ddf7fa2b84e5ab10ae6de3c31d1c6,2025-01-02T22:15:14.093000 -CVE-2022-38001,0,0,63499bed96b21cd246301cb1fdf41942facf6eb91e604646d50dc48e562c37ef,2025-01-02T22:15:14.223000 -CVE-2022-38003,0,0,8143183a92c47fecfa6d301edaeebe0ad2737d8fdba57226ad859fe73b335dc0,2025-01-02T22:15:14.343000 -CVE-2022-38004,0,0,b75cdc6132995035f702850cd505cafed2b21a558d1f7e1134795d3538b89588,2024-11-21T07:15:33.220000 -CVE-2022-38005,0,0,e32ff440cb6bde97cd5ec46493cb90038c3238a33596a60389be5dec46b733e1,2024-11-21T07:15:33.377000 -CVE-2022-38006,0,0,dcf4f2f82a5aa2304bdca4c504400418cbf8b6e4098bb914697ddca04b202b03,2024-11-21T07:15:33.537000 -CVE-2022-38007,0,0,bc2e6bd3380421aac98bfde2f30a723a0aac3948c1fb1d6fc52e4bd3d3854359,2025-01-02T20:15:57.027000 -CVE-2022-38008,0,0,1de1011cf13143b0704ee96c7a007546770d6e2041907fe009181ad79ea06a2f,2024-11-21T07:15:33.823000 -CVE-2022-38009,0,0,a072594279657fa7817fe0d3809a765d87512b1b123bd86e73ce795fdc43bc38,2024-11-21T07:15:33.950000 +CVE-2022-38000,0,1,9c09893efba97c0d136bba4608444d70166514c0d34b4276546a868bdf71e4ea,2025-01-02T22:15:14.093000 +CVE-2022-38001,0,1,df55df1bdf3376f9f6eb8d1fab70a86c36fc0ee8abf4d152decc14ec66b5e5ae,2025-01-02T22:15:14.223000 +CVE-2022-38003,0,1,363afad24afdfaa6b114089b8e692172b0d619c6b8b5c3dccb4ac86d1277ea28,2025-01-02T22:15:14.343000 +CVE-2022-38004,0,1,606514e2e76bcc3b48872cc536b3becdad73f6fa8f776dff9ad8946383e36667,2024-11-21T07:15:33.220000 +CVE-2022-38005,0,1,7f42316e087cd78164aa9a7768aa11685c61af0091ce3a4ea3e98435d3ecd484,2024-11-21T07:15:33.377000 +CVE-2022-38006,0,1,6c1cc0c26635b19134df4d32b3603779308d209690617c33f69b94f586bf9f7a,2024-11-21T07:15:33.537000 +CVE-2022-38007,0,1,134a487d8a9103b5e27c2887347ca3d17852ec11dc90b42b6b9b569be85bf3b7,2025-01-02T20:15:57.027000 +CVE-2022-38008,0,1,5f62b007ae73d821f2beec0a3f687708555b0e5e5bdfc8182ae5ec0934624067,2024-11-21T07:15:33.823000 +CVE-2022-38009,0,1,d36c17a90bc4ddb7b01cd6b002503e55b28fefbe4cf06230d94a5acb07a4eaef,2024-11-21T07:15:33.950000 CVE-2022-3801,0,0,6a2932edaa8c4457e880a47341f679a9f7181ef3d1cc58b672efd9a50fe4cd33,2024-11-21T07:20:15.657000 -CVE-2022-38010,0,0,f6dd5e253f45ba7bb7be1c35d2ddf8bac2dd950e9262b1ecd088e67e48d89185,2024-11-21T07:15:34.063000 -CVE-2022-38011,0,0,4d425f3ebe231657258ec681deb8464a4b59f2eb4baf17ce6e229cba85627df9,2025-01-02T20:15:58.447000 -CVE-2022-38012,0,0,9a5f464f509d797b6bc127db49a6f238669221d8d6a8f57517e0ca575528423d,2024-11-21T07:15:34.340000 -CVE-2022-38013,0,0,f9a7a37c49a9aaef328b3e0a665231b4efcd94ba3dcd868e897162d97d7db814,2025-01-02T20:15:59.087000 -CVE-2022-38014,0,0,4af262bb1ba087c4fd2114c6e992bb062cc573b6dc86dd3990a6dff98bf63c6f,2024-11-21T07:15:34.600000 -CVE-2022-38015,0,0,d5a20ef04299c103c8ef3b7e56b2ce8df29962fd1fdc5e822bdf98664522093d,2024-11-21T07:15:34.737000 -CVE-2022-38016,0,0,cf4189df7fd5c5f2d103ac7918a34d405222881d2e17f5f928f09c43fa7db6e4,2025-01-02T22:15:14.690000 -CVE-2022-38017,0,0,133dda42040d3ccacb38cd48a4c342ac505224c5df31f5ce1c0a697b592a045f,2025-01-02T22:15:14.793000 -CVE-2022-38019,0,0,c666c747f426f7a2bd98d00f7c014e5028f382241bcfcb7023e36e944790bdb9,2025-01-02T20:15:59.590000 +CVE-2022-38010,0,1,d8fce97ebe64cdd9f24a231887e1312957a33dfd18108b222e1d641a193b14b8,2024-11-21T07:15:34.063000 +CVE-2022-38011,0,1,6ad78b5e519fe2fa223d9950193c4674c1991249bcd5e03a13e189c054ee3904,2025-01-02T20:15:58.447000 +CVE-2022-38012,0,1,1a1c9e068f1a2c75ebde1a3c1aae0c83b966e067ed02af01ca655fd4cd640bcf,2024-11-21T07:15:34.340000 +CVE-2022-38013,0,1,6edd5908bdbcdf96fbf4ae40221b761cb5a4d81c83fa68570a864c4778eeb60f,2025-01-02T20:15:59.087000 +CVE-2022-38014,0,1,84ebd5fabea6216797492cf809bb9a2161e8fc537dfdfdd606c8f251e1d78eff,2024-11-21T07:15:34.600000 +CVE-2022-38015,0,1,56e641670ef386604ae45c37cdb48641c700784d9d0e522b893a764452f0535d,2024-11-21T07:15:34.737000 +CVE-2022-38016,0,1,2988a785c7255cdf0245c1ae5579a2f159f0b84d5874c471ac0d0a1ba9a5bfd2,2025-01-02T22:15:14.690000 +CVE-2022-38017,0,1,c34c1f9443f949e78129be361f3e9430a1133ace6b4a57afef07bd7395709d83,2025-01-02T22:15:14.793000 +CVE-2022-38019,0,1,41beafae1efbd1f136b63ecc0ab765cd2acebb0735b36f7cc6353bdc40aa6520,2025-01-02T20:15:59.590000 CVE-2022-3802,0,0,304bb009f5d5e2fdbddc8d316bd8865bbd97f82518e88a05a7ebc6159d11f242,2024-11-21T07:20:15.780000 -CVE-2022-38020,0,0,fd39c0730e24fd375af9beebcee8625d1cd0917f3763c85c53ef08ce1ff2755f,2024-11-21T07:15:35.300000 -CVE-2022-38021,0,0,396c9820b3722db70971c13fd380cff32b59b39e3a4ae9d5c89170880a3b0ac2,2025-01-02T22:15:14.910000 -CVE-2022-38022,0,0,38a5e5af7897ea460c0948a30693ececb6a3a065c23d573d3ef5fc7b31d31e2b,2025-01-02T22:15:15.030000 -CVE-2022-38023,0,0,573e994ef185aef9b9576a5500716c1690caaac490ba5a4e2ccfcd6e4622708c,2025-01-02T22:15:15.160000 -CVE-2022-38025,0,0,6ae35ad3b90b516c1df50e82df5a1dc01a57afceca190612c8348e290d51ccb7,2025-01-02T22:15:15.280000 -CVE-2022-38026,0,0,51ef296f78870845899db062dcaf9d555f33148ce6780046d09fff5e607cfbd4,2025-01-02T22:15:15.387000 -CVE-2022-38027,0,0,9538fb3b189096d0490090b41ea48ef9b6c27063434344f351d1a83466239b6f,2025-01-02T22:15:15.507000 -CVE-2022-38028,0,0,e551e85121c80dac4fb988d440d992fee5c850b674dafab902571562e702b573,2025-01-02T22:15:15.627000 -CVE-2022-38029,0,0,780c79dd194580a386570e13d040aa9f8d81d04189545e2296e4d6cc7d31ca1e,2025-01-02T22:15:15.767000 +CVE-2022-38020,0,1,ad24136fcd432b8862c6330e4dc0cf45d86f3080544a7cd36ee02a3ae8a4e931,2024-11-21T07:15:35.300000 +CVE-2022-38021,0,1,298c4cdd00edb03b73583dc407c308bc33c0cfb05b49e66ac349b86efe3f3df4,2025-01-02T22:15:14.910000 +CVE-2022-38022,0,1,d6f6b4e0b962169401ae6fa503e2622021b5e1ce9968a10939334d704215e234,2025-01-02T22:15:15.030000 +CVE-2022-38023,0,1,b2bf76fe493a54aea83c89d488503724cb4e0acfb2e09eddab7e383c4fbf04d7,2025-01-02T22:15:15.160000 +CVE-2022-38025,0,1,2fbe7b6af16ee60663aad4ef0d5195fd2bc9b26dc61865ad4ac8601d6668c280,2025-01-02T22:15:15.280000 +CVE-2022-38026,0,1,37f2ff090d821e66e5eab5670f57f1ba1a809d9db2e9754725baf68bbf43c2d0,2025-01-02T22:15:15.387000 +CVE-2022-38027,0,1,a56ef9ce5c13768e5527297906dd0f702997af51d6db65af9e35614bd781e10d,2025-01-02T22:15:15.507000 +CVE-2022-38028,0,1,46e162bf90901004293be908cc3acaec6487cd20ccfadf1fba71508a9ce7eae3,2025-01-02T22:15:15.627000 +CVE-2022-38029,0,1,ab2ba2e76553fe608a91e10094eb3f094c6ed720a90496919f7d1aac13218139,2025-01-02T22:15:15.767000 CVE-2022-3803,0,0,f9a82102bc1b99c085a341ac3f87ae6f137fc82a63316e78638bed214cfde5a4,2024-11-21T07:20:15.897000 -CVE-2022-38030,0,0,abb77b3e59376116cbfc48c5a9b19b4ee938c82fa8cd68d0098335adfdfb3f6d,2025-01-02T22:15:15.930000 -CVE-2022-38031,0,0,c73f7cc6dcc453c9970c64ecb9801fb5d89893fb014c54ba7b3e3fd5ae08f252,2025-01-02T22:15:16.047000 -CVE-2022-38032,0,0,1f1c7c2f9b6c45be8292cb9ebca98514eee3d0b9cda5939e9026f5cadd43da78,2025-01-02T22:15:16.177000 -CVE-2022-38033,0,0,538214577ccf3677996c9539d0dcf6423feaf637d3f2b760eb422138d6b4dc43,2025-01-02T22:15:16.310000 -CVE-2022-38034,0,0,883c9f99c1a6bce4152896222be8d8fcc890a9a0767a089f30e16b0d704f5a1c,2025-01-02T22:15:16.437000 -CVE-2022-38036,0,0,b1234b0af29c87887f5d0ec3eca1ec60fe6e3b7b6cb235f4672fad808b271841,2025-01-02T22:15:16.563000 -CVE-2022-38037,0,0,32936da88379bf918e7199d5d9cee7ba141a6fa78ad785bc547bbd80a7719bea,2025-01-02T22:15:16.667000 -CVE-2022-38038,0,0,3eb5454218a50288c72efa9b4a6c4403a638b1811f84de2e22bba5a37bdfa3b6,2025-01-02T22:15:16.800000 -CVE-2022-38039,0,0,198be15bcfa4c8fbda964350f37f51bcd600702ea793f05bbb6748cbfe2996f2,2025-01-02T22:15:16.963000 +CVE-2022-38030,0,1,8eaf770e2217e7deffaa351a49e9be0a54ba3fc7de524a8a85d11e758945d947,2025-01-02T22:15:15.930000 +CVE-2022-38031,0,1,b290dc43e3630d76be0219d9e985d312c4d71e203ffd9ff7b88621d86ed2b081,2025-01-02T22:15:16.047000 +CVE-2022-38032,0,1,df71b30b58af0a4a1aa00e29bd64d6a8e864a3885799eb5f17ed05cd345046cb,2025-01-02T22:15:16.177000 +CVE-2022-38033,0,1,226f67371186e7c00d865804a2bd32f99879c1e7670d475eb4bc7aeda431ed9a,2025-01-02T22:15:16.310000 +CVE-2022-38034,0,1,319e35f200e4a30c95d18a41ac272f59ee31311bc6d90b8cedb5694e905f2b00,2025-01-02T22:15:16.437000 +CVE-2022-38036,0,1,a9e0e330878eef41f4c94758b9deff210fd412451275fc017569728aa2980a50,2025-01-02T22:15:16.563000 +CVE-2022-38037,0,1,7743dca68463e29cb9ea0cc1ce3cb188580d99edd9520f307a21ce588b18156b,2025-01-02T22:15:16.667000 +CVE-2022-38038,0,1,fe33a4e4652e45c5cc84e883b75332ea2867aec23d73bf6dbfb38f80b5ea4464,2025-01-02T22:15:16.800000 +CVE-2022-38039,0,1,1c0fd7bba8347a084b5f4d2d7b87fc9d416b3e81be58f3abdaef6b280dc3cbc3,2025-01-02T22:15:16.963000 CVE-2022-3804,0,0,86c344a88db3e55024b19949c960fab49e5bf9205711934212a935613ae0a73a,2024-11-21T07:20:16.030000 -CVE-2022-38040,0,0,e29282f07dbcff51bdc0576d5cf7ec703b07bbe3b770ec0e9d53a92fd4801810,2025-01-02T22:15:17.073000 -CVE-2022-38041,0,0,32943b051bd674944262ccbac7d29fb24d13c2c2b3e80487bfebd1d2b69be674,2025-01-02T22:15:17.207000 +CVE-2022-38040,0,1,b5bbd59dc2985fc6c161e33dbb6c91368ef566bafb54bb295389b4ba0498411b,2025-01-02T22:15:17.073000 +CVE-2022-38041,0,1,bee9c9e58c01086a411649a52507266a26b7d71dbd8f55babc65a6bf1adcf689,2025-01-02T22:15:17.207000 CVE-2022-38042,0,0,2704f3a8cbc130be47a88b7c3cd0ee1b558b4bc54cc95d9654532d7dbb797899,2025-01-02T22:15:17.340000 CVE-2022-38043,0,0,52c1be8e4c0fd2363dc23545afa88137acdee99c3a9e28444f68e9dd28a88e85,2025-01-02T22:15:17.467000 -CVE-2022-38044,0,0,e64b968dc54c1a5373dbb44f6f50ef8c0d7447fb0c1731b909858e07b26dae0d,2025-01-02T22:15:17.587000 +CVE-2022-38044,0,1,9aa1353240ea59c08d8e12739c28c39e6739a3957f46b3cce3b5cf738bdb3722,2025-01-02T22:15:17.587000 CVE-2022-38045,0,0,6deef714b593f05f3576a57c5360b97d92a5e035c064c91e9f6b07dc5db7e528,2025-01-02T22:15:17.720000 -CVE-2022-38046,0,0,1fd2aa1142d73e8e0f023ccafddcec152f660220f8b57c904659cd298bb593bb,2025-01-02T22:15:17.847000 -CVE-2022-38047,0,0,008ec43706b3e4e39944b808fbdc2be07d68318835af96986cdd94722c39bdf8,2025-01-02T22:15:17.957000 -CVE-2022-38048,0,0,574d0dee6418701bd23bff633ca1563b21d43c14d8d89d0524c88f9bb803b4b0,2025-01-02T22:15:18.080000 -CVE-2022-38049,0,0,391c9fc7a9dcac34e166e2c805cd6cae92c21bcdd3fcb111fd39d934233b97c6,2025-01-02T22:15:18.193000 +CVE-2022-38046,0,1,2f820d666dcf7971fb27d188ad46d26ec39943e3e575b1cc50c391ea5cc88ce2,2025-01-02T22:15:17.847000 +CVE-2022-38047,0,1,b8593a88a81758085d03c844b81df5a5f31aaec43b1881aefccc2c2d899e60cb,2025-01-02T22:15:17.957000 +CVE-2022-38048,0,1,c1f92c9e75e55b4121081aa27d3a494804f97accd497b51eb870372e2f1aca85,2025-01-02T22:15:18.080000 +CVE-2022-38049,0,1,79301ad375ddaea8deab1772087476cd431506e743a2ebd32ed5ada32f8c2029,2025-01-02T22:15:18.193000 CVE-2022-3805,0,0,1e1e3b91c79786cab570de602008ce32b7f6f2deba218191dbf162634cf267c4,2024-11-21T07:20:16.153000 -CVE-2022-38050,0,0,ef96c4517e66c0edd5c72b01fc25fcdb806a7e176c00a94763cbddd632d69c50,2025-01-02T22:15:18.300000 -CVE-2022-38051,0,0,15d45bc992e82d4477af1f1dd1fd0760ff692e5510a91e7c7914d0013ad099ae,2025-01-02T22:15:18.420000 -CVE-2022-38053,0,0,8b550475f24e349edc79e8b0731c23e65e9bfb0c04fa532e5a8839a95a114986,2025-01-02T22:15:18.543000 +CVE-2022-38050,0,1,eb0bdf88122a9c491c15e0fcc5e6cb76ba7303b1043c79d00efb29453974f81d,2025-01-02T22:15:18.300000 +CVE-2022-38051,0,1,bc0fef0161d5b62775feb5c934168f7556c06de848274f30f8ffdd6682661f77,2025-01-02T22:15:18.420000 +CVE-2022-38053,0,1,a17601c8603825444d07bfe7aff275dcda300b73ac0dfe3a197aab32083162b6,2025-01-02T22:15:18.543000 CVE-2022-38054,0,0,4d5ceeb0f44f2ef9e04b42fe04b0f7578f709c27221165b87ab0c6e0f3c1d4ca,2024-11-21T07:15:39.843000 CVE-2022-38055,0,0,a2b6c19dbc779c76452b417a396d12318c67e91d4ba0336afd5485c7718a23da,2024-11-21T07:15:39.987000 CVE-2022-38056,0,0,746a15f6f75642bc0fb8eb5cbb93be585dc94b5878458bf142def18ac16833a2,2024-11-21T07:15:40.140000 @@ -207100,93 +207101,93 @@ CVE-2022-41028,0,0,0f069afedee51534ab4bd5c4e0f010ea4876ba566b9c62ea35116be5571a6 CVE-2022-41029,0,0,57b6bab290839c844a88c9768b9c9db17269302cd6990bebc9737151631a1486,2024-11-21T07:22:28.703000 CVE-2022-4103,0,0,4c05014aa0765748247f87bee8a935d3c132ab5ca2adb78a073a99aa93a5edc2,2024-11-21T07:34:35.357000 CVE-2022-41030,0,0,b3577d4ca82e93752caa1a3d7f3609f465536474c5a262356d39de03612da04f,2024-11-21T07:22:28.860000 -CVE-2022-41031,0,0,9a7b3b22c704b75dca030247d0b96a41214b928c69c2e9233a783ff52e4442e4,2025-01-02T22:15:18.653000 +CVE-2022-41031,0,1,97a6d60c08a57ba4da8a0c7683aa4d1fdeee6dc5540f936ee4741e9a05b22b78,2025-01-02T22:15:18.653000 CVE-2022-41032,0,0,e9ed2fa23a7cd11ec0f7bfe301eea97c379c7f98dc823ed943e6d7099a5f62ab,2025-01-02T22:15:18.767000 -CVE-2022-41033,0,0,f4880366973cc424b0e9d25c8f05292a0e77a0339f50fc1378a63dd796fa7665,2025-01-02T22:15:18.907000 -CVE-2022-41034,0,0,0ca583e1ba13bee318589d5a0e31615aebf3b0c5167a7f64160cc3a2f9a15478,2025-01-02T22:15:19.073000 -CVE-2022-41035,0,0,91b22dc63b5863696910a5b50791911f67691e70cdd05f78afbb4e29fb82c064,2025-01-02T22:15:19.207000 -CVE-2022-41036,0,0,df1f84f01d08ecc20e96ba3b31b9aa3f3e707352ca72007bf69ef8d67b78ac1b,2025-01-02T22:15:19.330000 -CVE-2022-41037,0,0,bfcee6e43856c5be49f32e52eae3f45a99297acd7e3f226777b06f4954493c40,2025-01-02T22:15:19.430000 -CVE-2022-41038,0,0,2386d089cd3eeb8e3438c15b0acfdb5ee12f097c6b9bc476c1eb8790269c5a01,2025-01-02T22:15:19.540000 -CVE-2022-41039,0,0,3a9f8d500c03424dd433787fae8508dabb0a608426a7ab3d1bc3e605ba5f3efa,2024-11-21T07:22:30.020000 +CVE-2022-41033,0,1,9005a6b068175e32123fa2d7cd48f9c5600bdc21baabe1d843749c3da0c65e4c,2025-01-02T22:15:18.907000 +CVE-2022-41034,0,1,8e6fec6d67b5b719cdbc24cc08e71869b6472869c18b3d788a549290c412a25a,2025-01-02T22:15:19.073000 +CVE-2022-41035,0,1,0ef79224ebb9f15f304bdf827cf13a2c6f51bff393ea2707169a23b70b7ea311,2025-01-02T22:15:19.207000 +CVE-2022-41036,0,1,c64f07b9b85a8e2d1ebdc0796825f7afa1fba903722ade590e5eb177a9261e3b,2025-01-02T22:15:19.330000 +CVE-2022-41037,0,1,a5207e410031b473199d76f446ea7aff35e792754946afac9d20e1b0f82936e2,2025-01-02T22:15:19.430000 +CVE-2022-41038,0,1,5139f0eceb1c1c9e3c7156a1f72ea48e3023a913c5b772fa68fa0237089dc6cc,2025-01-02T22:15:19.540000 +CVE-2022-41039,0,1,d301a8df2867f370f24c22b4f7dcb22e58d455c45934b727d390db5faf7449a6,2024-11-21T07:22:30.020000 CVE-2022-4104,0,0,c3f870f41b7e05a558f4ff2f68c6ab2edadddcec1c1e03e5ab7274cded1720e9,2024-11-21T07:34:35.460000 -CVE-2022-41040,0,0,aacf829d1a0bf86df873904e042c60f997f2a87dafb4ea73c4762ed68078ab2d,2025-01-02T20:16:00.183000 -CVE-2022-41042,0,0,fccc467bfcdeae70f357a06e87a87e97d3e670fe2164ed739a0c4f7b5d2420ed,2025-01-02T22:15:19.810000 +CVE-2022-41040,0,1,f3f7ad4f7ec9f9d8514c304bf57931f6185f81b13d935ed5d4a3e1a4e85c9b4a,2025-01-02T20:16:00.183000 +CVE-2022-41042,0,1,8ed51dc60d4bf92596b08ebe51d7e2bf87951e8e15107f41266aba185b392fbb,2025-01-02T22:15:19.810000 CVE-2022-41043,0,0,47dd01e700c1c2263498dc011e32ab62a1d287f7f2170cff13f42ba9c4f6612b,2025-01-02T22:15:19.913000 -CVE-2022-41044,0,0,c755e81b69d6fd6cdff7596fbabfb29d25259d11036c2628f2e6a0b978dc47b3,2024-11-21T07:22:30.543000 -CVE-2022-41045,0,0,eb94121e8e8550608f080208d238317c344fe1bd56871643b5897799c9182d40,2024-11-21T07:22:30.670000 -CVE-2022-41047,0,0,ec8bba57204cfbb0e09a4009edcdbae826f9389a04193ae46e586f614e18b351,2024-11-21T07:22:30.820000 -CVE-2022-41048,0,0,0868b1f11f82c906bcb6559c53696108bf017293933b069b73262edbbd9ce1e0,2024-11-21T07:22:30.990000 -CVE-2022-41049,0,0,50106b81a8203f9daec899daf66a11fdb0c75876bb06cf3b7dd06f2f15dab9ef,2024-11-21T07:22:31.177000 +CVE-2022-41044,0,1,94f3c64acf4be3fb4c2844eb836cb9f0d7aed4cede614dc2097e5d01b05fb35f,2024-11-21T07:22:30.543000 +CVE-2022-41045,0,1,2c7746ae8e1e932b2d88ac880d0098f2cc0f1b86f29deb55d7d9973c6c689257,2024-11-21T07:22:30.670000 +CVE-2022-41047,0,1,6a0ae7ce4562257b0d603bd01b91f8be796bd6f172a32ffa93b6cd11cdc35e85,2024-11-21T07:22:30.820000 +CVE-2022-41048,0,1,480414d14aca950b2941a5ecf68dabd47716cb3806071b62a04418f97fdf5db2,2024-11-21T07:22:30.990000 +CVE-2022-41049,0,1,27884c116a645ce71f62becbe9f35ff894f2a2ed0e0b2acece8df2240db3a921,2024-11-21T07:22:31.177000 CVE-2022-4105,0,0,cd1b56dce82e30d11c9a21d18fca44a3e88c77944c888fa8e763622943817a5d,2024-11-21T07:34:35.557000 -CVE-2022-41050,0,0,01971dd831507b0c309ba7ed67ca3714adfcb0c81eaa4ff04564123acae95a07,2024-11-21T07:22:31.310000 -CVE-2022-41051,0,0,8198b9686a797cf161e3d46a08b535267a28314025135685d86621956a175516,2024-11-21T07:22:31.457000 -CVE-2022-41052,0,0,d0312c3c95c4230156fd61fdc667b427a478dc83de59b53f00ca1709be3d6cc3,2024-11-21T07:22:31.573000 -CVE-2022-41053,0,0,37871f3c2089a8bb608636a466a70b6ba454ad7ad6812ec9d257b883933df98e,2024-11-21T07:22:31.703000 -CVE-2022-41054,0,0,62cba71b1e2b3ac6ac2383adabdfbad0055410d71fdd30eec6fd2366067a6bda,2024-11-21T07:22:31.863000 -CVE-2022-41055,0,0,8d53dbc97983eebaca187b2680834e6c429caf3b4dfd3adc69a1645e8cf0a316,2024-11-21T07:22:31.997000 -CVE-2022-41056,0,0,d244d96a87cc301d4ce64118dd42ab0fe87430cecdc23dc1e76207b256423b06,2024-11-21T07:22:32.130000 -CVE-2022-41057,0,0,b7ea0198650b9f96ef1347d9d524e6b1f6eaa4b69849c531a3b253c9b8df2c82,2024-11-21T07:22:32.283000 -CVE-2022-41058,0,0,4052515006ac6b000478d55f6f498e68d10208907cb33f737fd1b9739d4cfe26,2024-11-21T07:22:32.440000 +CVE-2022-41050,0,1,b9a7da6a62895ac068765a81a1753cf10ca24d8496ba063a3fb037f63af3ecb4,2024-11-21T07:22:31.310000 +CVE-2022-41051,0,1,91f5c37a632e3e8c803acf4d44cacf6e6914c78e08e48fffc960383c791cc77d,2024-11-21T07:22:31.457000 +CVE-2022-41052,0,1,32ae19d5c8c298362a6948b178a8bdc7c261dc1d21655755532ac1d51082ccc4,2024-11-21T07:22:31.573000 +CVE-2022-41053,0,1,2a570c7231f36f3afe0a26f34d2c34d220ead562b5902806c7aefc4af2bf964a,2024-11-21T07:22:31.703000 +CVE-2022-41054,0,1,c4aba24d2a2d5a7d2a2f38172e793166b20bb607469850d71a9f7ee2c2ee003b,2024-11-21T07:22:31.863000 +CVE-2022-41055,0,1,75db852e487eca25f535fc690c252ff188eb67b9629e73bfea7867ccf031e77d,2024-11-21T07:22:31.997000 +CVE-2022-41056,0,1,760c2b0e1e24e1c29e670e56d8f4db957062329b269a25c2b3571199c09c862d,2024-11-21T07:22:32.130000 +CVE-2022-41057,0,1,054a066a43f21eb7579caca9716f978bff58e872c2e7e8266dcb30731418e291,2024-11-21T07:22:32.283000 +CVE-2022-41058,0,1,73bd8928a378a002e757ca9a21edbcba22869395aac190290f089c70476e64d1,2024-11-21T07:22:32.440000 CVE-2022-4106,0,0,dbe89ded2e546ade2fab7f13d467837b61db8343d9487b3106680714fdc7d41f,2024-11-21T07:34:35.663000 -CVE-2022-41060,0,0,0576b52ec8c84621523df3c4c79c58111abc060b5aa2cc5766883b608d3f7841,2024-11-21T07:22:32.610000 -CVE-2022-41061,0,0,5ee68f10cb414698301d063e087ce08575cb4cfe9334b7a2de2f7cdc9c40fae8,2024-11-21T07:22:32.743000 -CVE-2022-41062,0,0,f030027852af1ee0548fcfb494b468eff293dbd6e1d1537741fe7760c252d216,2024-11-21T07:22:32.880000 -CVE-2022-41063,0,0,3b397adf0d03d14fa15aea3901bdc4ca3fcc6dc883e57fb82fd7780819084cf6,2024-11-21T07:22:33.017000 -CVE-2022-41064,0,0,18a758a3d4e1f8d586f40cee3ecb85e8c97f83fc4f6b53ca14b885a82e0a4e80,2025-01-02T22:15:22.180000 -CVE-2022-41066,0,0,f8b72d92716ac367cdf296b47cb72fa296cc7554d585bc2a8e5efbbc9f2daecc,2024-11-21T07:22:33.333000 +CVE-2022-41060,0,1,cdfe90ef6c059d82f36589ebe1bcd3fda18c5b72a6a4a8ec4c313385323ea20c,2024-11-21T07:22:32.610000 +CVE-2022-41061,0,1,fb0d29d54aa52dd1e0f54c2cf6dd9c84d5b3dfc2c126d886efe7a7faef1007cf,2024-11-21T07:22:32.743000 +CVE-2022-41062,0,1,9e11a0a3323dce9ed7289ce4b7e0867252529ed4d0e920b693872fcbfdc285e5,2024-11-21T07:22:32.880000 +CVE-2022-41063,0,1,9435a8e4ef0bd0f50fc908a2dbba3cf01fddc74e86e7c27bcbf629ae50f6c71e,2024-11-21T07:22:33.017000 +CVE-2022-41064,0,1,f04f6f08373dc8a60423f3ffa6286de803341a47388fd1b659533c8de9b8a34d,2025-01-02T22:15:22.180000 +CVE-2022-41066,0,1,ce1a2b1b5b482b1b2b3c54fda71cd53caf8a12b892d2129ed715010d9e9f4ebd,2024-11-21T07:22:33.333000 CVE-2022-4107,0,0,c246852a852714826df52737e54f6a60efe1fcbe46137aab522cc8208332341d,2024-11-21T07:34:35.760000 -CVE-2022-41073,0,0,515c4bc82d8b65b9ede9e234fa484955feaa5826f2971df2bd4dd4c7534d3694,2025-01-02T22:15:22.443000 -CVE-2022-41074,0,0,446b75c0b48deb3d0ada8a17e507e069fcf55f31be0f3a5ba1717d8bac49c85e,2024-11-21T07:22:33.643000 +CVE-2022-41073,0,1,5b26e0502f0e825fabd221bb81443a9e64c6ce9af7a6aa26bc65ef8c071b18ea,2025-01-02T22:15:22.443000 +CVE-2022-41074,0,1,5acedadf8aae837bcd545bf7b350b491a313ea4094c95e5c67cf49e8835a3aa4,2024-11-21T07:22:33.643000 CVE-2022-41076,0,0,78f083f1c56486769c87d0b1bd55077536e9e81ee66ff16a6d0643fe9a1b0c6b,2025-01-02T22:15:22.733000 -CVE-2022-41077,0,0,9330e437ba6a2aa439b05f0ed6b0d40a4e511b4c859a10eb3e18e4ef6315d0da,2024-11-21T07:22:33.977000 -CVE-2022-41078,0,0,dbc774c26d2a8559de1bfcd48ec28604ec8a41f3d1714be4baea07fdb83351cb,2024-11-21T07:22:34.130000 -CVE-2022-41079,0,0,95b93f52fd981c0fda8973198f304beaf5d0a322b8ba1c55490e5e79a3e47c6a,2024-11-21T07:22:34.253000 +CVE-2022-41077,0,1,40acf21e5d76581c02e04050471af0c498e2c168e60da0536ead36041499f6b5,2024-11-21T07:22:33.977000 +CVE-2022-41078,0,1,2bafa7e567944ce69e58f4c25c11be178f784c5f8aeb892c2b58f2f3bc426e0e,2024-11-21T07:22:34.130000 +CVE-2022-41079,0,1,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6ade,2024-11-21T07:22:34.253000 CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000 -CVE-2022-41080,0,0,4383f6ac195faa48fc124e96131a60bf969d3cff6c4c7f1691bc6591a054d9d8,2024-11-21T07:22:34.373000 -CVE-2022-41081,0,0,e36025042333bef50d321aaba100b27cdfc4edf26a5e003f17bc874af6509bd9,2025-01-02T22:15:23.300000 -CVE-2022-41082,0,0,1298c38f9382c7988d18b0eea16073ba57c89cd6dfd538ed58e8b1a412820132,2025-01-02T20:16:00.767000 +CVE-2022-41080,0,1,118ce96839b1c410d17219d24a9d8f3d5178ee213eae751c931efd6882bfa0af,2024-11-21T07:22:34.373000 +CVE-2022-41081,0,1,d0874d67097784f240ef5603929486a06b5db95fbe7ad1c71a8ac3dcd5aa4c31,2025-01-02T22:15:23.300000 +CVE-2022-41082,0,1,8265238b01f4de42b80aa65d0d252777d37feee2c3760d3909b574f8b5ba0b3a,2025-01-02T20:16:00.767000 CVE-2022-41083,0,0,084626592c64929d07344eea7c6ab3a7ea5ad5e5f3c0d8564ea600c205440078,2025-01-02T22:15:23.427000 -CVE-2022-41085,0,0,5cdfcfeefe5a9482f722d8c99c9d2e45b59563b8243fc371d80636936628d90a,2024-11-21T07:22:34.880000 -CVE-2022-41086,0,0,75c98981913d2ac7be2094c39cecf027f7927a7823acc204a85c2a0a2fc82af8,2024-11-21T07:22:35.003000 -CVE-2022-41088,0,0,a0c9af7e449a9c56f2362b22c56731be2687a1e65a544ea844930ebe4b8bf9d3,2024-11-21T07:22:35.163000 +CVE-2022-41085,0,1,35c4c18282b9684b5665eb1e13ff5ce57fc93a683cf80152d18b94ba8a2944e0,2024-11-21T07:22:34.880000 +CVE-2022-41086,0,1,4aa86b9ce801b11663f0efd2ca3a318416479c6adfa1c5be19f6a824db3bafc8,2024-11-21T07:22:35.003000 +CVE-2022-41088,0,1,ab89ed5c520ec325a6ffe5470c7903109306c76d03d95c10448ecb00ab3ac980,2024-11-21T07:22:35.163000 CVE-2022-41089,0,0,df0a3e15dcd3f9a3ce27ded14418b03e16cf6b26899830e16cc83a2749a1c6b6,2025-01-02T22:15:23.873000 CVE-2022-4109,0,0,8242ca420abd65ec1d7db1932bc9868236d63b3c2f25ebd475f1b2152147ccbe,2024-11-21T07:34:35.953000 -CVE-2022-41090,0,0,5aefb72c3b5eac337b492fb38283083775d779b638f3e84260f91c23a98383f3,2024-11-21T07:22:35.500000 -CVE-2022-41091,0,0,bbe079fdde30baf40ce7575296b01933a05f0c24083a723343db79e5cd3e21e4,2024-11-21T07:22:35.650000 -CVE-2022-41092,0,0,0e2390ed9ef86ecd5c63beff529a8600e1516c9d580b2caedc1f1287ef37ca26,2024-11-21T07:22:35.823000 -CVE-2022-41093,0,0,f2ab9ecd7f0f8aaa15444ce90a232de6996219da55260e9eda853a049f69af67,2024-11-21T07:22:35.960000 -CVE-2022-41094,0,0,2dd2ac5bcce5aa946426ab54b2198c70e2a4b367b4bb5852511fed4d32ad2a09,2024-11-21T07:22:36.110000 -CVE-2022-41095,0,0,1f720af3e60dd63f0f06a504bfd10c2329efabb6e51957638314b0af387cf841,2024-11-21T07:22:36.263000 -CVE-2022-41096,0,0,a942ea0f2a2d406256724db99b099fffc5e4d17c52d489946c88476f91872bbf,2024-11-21T07:22:36.413000 -CVE-2022-41097,0,0,9d5b52cfd64961b5381192115a7b1b028967399720c86158b712f8fd7d8fbe8f,2024-11-21T07:22:36.537000 -CVE-2022-41098,0,0,dda3fa769c520618e5fd61718b8ee0af22e70f137ddfa32236462e4cdeffd1c9,2024-11-21T07:22:36.683000 -CVE-2022-41099,0,0,21cc226f9e86677c65fa0507320cc6173f79c6b501ba3afec3bef60026659178,2024-11-21T07:22:36.830000 +CVE-2022-41090,0,1,29e7b6b47012d97a66f07e755d8c87d490ef49309b8229330a86ddec353adfab,2024-11-21T07:22:35.500000 +CVE-2022-41091,0,1,3a45fe4903e9ffd2a9e08ba947cb247e5ee76bcdaa1b4e2f1075e9d818b7032d,2024-11-21T07:22:35.650000 +CVE-2022-41092,0,1,41e3cfee41d5f02a34baa191de367e83717dd69802c3b3d24246f67d5831f980,2024-11-21T07:22:35.823000 +CVE-2022-41093,0,1,9350eb3d75cc5dccb961cba82ff6a17778e1c3c2da082e2b9b144df4694153dd,2024-11-21T07:22:35.960000 +CVE-2022-41094,0,1,e87660715ed3be1193126d0e4af1ba4deb4a776f43e1e3ea5f964e87afcab35b,2024-11-21T07:22:36.110000 +CVE-2022-41095,0,1,f40c7d7bd77e017c9df5693e72b5689f56e902106f6467c65fb93f51c8add79a,2024-11-21T07:22:36.263000 +CVE-2022-41096,0,1,7e343507fc52ff8dd2b62a05cbe7a14dd37100304244b3189472b46a5a191995,2024-11-21T07:22:36.413000 +CVE-2022-41097,0,1,7103e372a8a3cff66657e2df58958f6ffb052fd020b515d2d69037ecc392d303,2024-11-21T07:22:36.537000 +CVE-2022-41098,0,1,f68ecb5ccf6ed44e57547abb2e63021b407cc64921012c82c01d5d152151f77a,2024-11-21T07:22:36.683000 +CVE-2022-41099,0,1,befebb05338fc8c82f149b240ef4268e8d18140b07e50e95efa5ec89c6a3260f,2024-11-21T07:22:36.830000 CVE-2022-4110,0,0,ba614deeedfaedbc6d0ca45228f2622d013d2040233d635c7f77f057002f76fc,2024-11-21T07:34:36.053000 -CVE-2022-41100,0,0,4a97d343bcd9aa8cb5ecd0c00963fbdd98e1a9b9cccc2409f0a3cf3f011838cb,2024-11-21T07:22:36.957000 -CVE-2022-41101,0,0,134d3be1433dc61581e6f05e77e30d8a28d509163884862267f6d3f0c4197895,2024-11-21T07:22:37.100000 -CVE-2022-41102,0,0,93fc70a5814ae1ec44a6ce9560a74ada6257394ac2f460d45d6fa8072a1030b3,2024-11-21T07:22:37.230000 -CVE-2022-41103,0,0,ccd59956c7e774775e1a26050d7eb7519cb2cdf8877eba7e152088db223a978e,2024-11-21T07:22:37.420000 -CVE-2022-41104,0,0,6c3aab3d37833fb32ea228f80df9717b728783dbe4cf71efa3f1629188d1fa6d,2024-11-21T07:22:38.160000 -CVE-2022-41105,0,0,5c7dd7579900b3c3189814bc641e4965ac7028b2fcb47bb78364c7ac2d6c6f7d,2024-11-21T07:22:38.297000 -CVE-2022-41106,0,0,4ff055d2ecdbc0368a84e4e55b776c86f618a67d53edef0fb8105c2247c98c9c,2024-11-21T07:22:38.410000 -CVE-2022-41107,0,0,bf033a4c615924762fbfb90a656c9470caa8862cc370ad6cadfd6fa8f33f9ae2,2024-11-21T07:22:38.523000 -CVE-2022-41109,0,0,1eb6eba4e1ab8b2733f0753dcaf92424be9a2e67656db3cc7ef5a3ad2dfada05,2024-11-21T07:22:38.647000 +CVE-2022-41100,0,1,a84ba9888a3107f07d9aca26f56e978e53dea06a80fc20388c23818c1cb93bd5,2024-11-21T07:22:36.957000 +CVE-2022-41101,0,1,f4d9524902c8877294eeab80bf2491d9deaf8b307142c3f68898bdd7c8ccd7a5,2024-11-21T07:22:37.100000 +CVE-2022-41102,0,1,e7e45da71d57c3e483d2e1d2b360b95a5a161ad9ec4a54c843049ca65d5741f7,2024-11-21T07:22:37.230000 +CVE-2022-41103,0,1,a5f2bd69c1d30e5e382d3484ee2d72f9b7ea1aa03d1ac50ca3024c28a2dbc8e2,2024-11-21T07:22:37.420000 +CVE-2022-41104,0,1,10d11d3bdcc7d47100b48a4a9076dbf74e18f0990aca663c35d7670819fc8a37,2024-11-21T07:22:38.160000 +CVE-2022-41105,0,1,804f5a43d1f4a4c9d3c35eb31f754c2a5aadbc44e1f4d79343d3d6b962cb371a,2024-11-21T07:22:38.297000 +CVE-2022-41106,0,1,d064adb3b9d60bb167fb02feb1c3bbac843049d1ad818baf297fc053f09e6eed,2024-11-21T07:22:38.410000 +CVE-2022-41107,0,1,b63de9bcf403de74eef300fb71af968a818987e7d803e5342a9c2d1246e7b262,2024-11-21T07:22:38.523000 +CVE-2022-41109,0,1,6c173198e8e1934223134d3fe2cf38825293bde3fa8853ed06c99e49111dc48e,2024-11-21T07:22:38.647000 CVE-2022-4111,0,0,772582732f6083bd9da6e4b7e7bbf257d72607196ebefb1a6df95f9ae031425c,2024-11-21T07:34:36.150000 -CVE-2022-41113,0,0,0eb52abf82e88bbdbdfabbb9c1a510171bba1b07f2ad0584ca5f420f84edeb4b,2024-11-21T07:22:38.803000 -CVE-2022-41114,0,0,79e8069d6b466133d2b382d380db2d998303f8c00fe16e7aede8147923d49353,2024-11-21T07:22:38.947000 +CVE-2022-41113,0,1,8641fcc00c5164b6666292ced24470e3dec239424b6164aa50adafb6f696d3f3,2024-11-21T07:22:38.803000 +CVE-2022-41114,0,1,05f281f1898ab412380ec65f64dbbef368ff01a861b498f956bc5e9b87591c0b,2024-11-21T07:22:38.947000 CVE-2022-41115,0,0,5f2fa42e511c06e846c035504fad0bc47ece12afb3bfee1366974056ea131286,2025-01-02T22:15:26.453000 -CVE-2022-41116,0,0,8506908d245bb1845b06d195e65ce5d1f7cf69fd7e495aeb8d1fd2bf9ac71130,2024-11-21T07:22:39.220000 -CVE-2022-41118,0,0,134b0b412bb7f1fa4e0c34af525eb25f73ec2920fa59cc801d03264bb7006a53,2024-11-21T07:22:39.337000 -CVE-2022-41119,0,0,d942a0ce42d9b57a66cff606816c5e0cd11e75770aae2d4c6a083266f6075c47,2024-11-21T07:22:39.473000 +CVE-2022-41116,0,1,1602c7ac189392391670e2f6b05c3416baecdfd168d918479a26c0b4b0c03fc9,2024-11-21T07:22:39.220000 +CVE-2022-41118,0,1,2598f10dc252db05f260d2c92469a0eca4d4af325f3b0f2dc368233b7be47b13,2024-11-21T07:22:39.337000 +CVE-2022-41119,0,1,9712b6447171728c5f6b73123f73d73b6f5b879466ee2ad1391a8d90e6d99237,2024-11-21T07:22:39.473000 CVE-2022-4112,0,0,7bf6c1e820ca7996d910bd7efa5c4b7929c70e43768b81341e80878da0449acc,2024-11-21T07:34:36.277000 -CVE-2022-41120,0,0,7a2bb0e200e20e0d81b1a3db2c8cfb4b7f580bf854de9fba804ac4231c81b961,2024-11-21T07:22:39.590000 +CVE-2022-41120,0,1,84857395e75383ab804a670dc49a3d8950fdb1fef0ab47fbd83e5999ee279f2a,2024-11-21T07:22:39.590000 CVE-2022-41121,0,0,4e594b1edf648c1fb0fe39657ca551c3229e2ba56f66b60b38dbff70d860305b,2025-01-02T22:15:27.007000 -CVE-2022-41122,0,0,c6a5c405f491e7e911624564fd0dfb5709d289eeb0cf37b2f8ad6364b4fc0dd0,2024-11-21T07:22:39.850000 -CVE-2022-41123,0,0,a59c22162ac8ef574e655e74387cd10fa3940aaa0b90fd298a72a9442b40221c,2024-11-21T07:22:39.970000 -CVE-2022-41125,0,0,42668d7a113a6c6a0db140ee4680d197124d6c835845156f69c61bebbef89e01,2024-11-21T07:22:40.080000 -CVE-2022-41127,0,0,0a64148a03f5602fb3e7cdc28417e355a12a67653fb2deb62a61fb6bc28f5858,2024-11-21T07:22:40.220000 -CVE-2022-41128,0,0,54c961e3bded3e88a1639576c60f0ebcdcdf3f6d96bf439c89eebda07ffae235,2024-11-21T07:22:40.347000 +CVE-2022-41122,0,1,133e8735e10ecae83fee6579759d253bb3c7ca5d683d17cc0c179ed130908ba1,2024-11-21T07:22:39.850000 +CVE-2022-41123,0,1,c21f7ec46912883651196d10160a60b8e8210f5760e35c9197740e4c6b4104de,2024-11-21T07:22:39.970000 +CVE-2022-41125,0,1,d0a748e9ad17bf3fca5b80110dd42a16fd471346585ba36d07db9dbc90bfb874,2024-11-21T07:22:40.080000 +CVE-2022-41127,0,1,c5470238c8916101c4c113c61b86334eac0b25796dc9bb1b6c150173f84c4526,2024-11-21T07:22:40.220000 +CVE-2022-41128,0,1,06b3b8a1888f0c96f33c0aacf94835ccc39c664e258797f30e5849ce3524ab78,2024-11-21T07:22:40.347000 CVE-2022-41131,0,0,a9b352ec223f536926e75cba1208c8854d94f58ab28fa8a4439b6ee55aa538be,2024-11-21T07:22:40.500000 CVE-2022-41132,0,0,0021f0455ec0c801bddfc18c16a84c11f48d6765338ebb1892496f988aa9539f,2024-11-21T07:22:40.620000 CVE-2022-41133,0,0,ab83932016bc2710fa33a83a4af239bea65fc8ffc549c1152d8cb884b7c238a9,2024-11-21T07:22:40.770000 @@ -207556,8 +207557,8 @@ CVE-2022-41568,0,0,6205fdde5e39bc36de73db4dcd6211c4ac286d5b081b138486c1c05c18b4e CVE-2022-4157,0,0,662b08d19a468f391d3afa6bd0cb88ad7c569aafdca4fb8c2cd984f331979391,2024-11-21T07:34:41.270000 CVE-2022-41570,0,0,68d8e3713c67a900ebaccd270512214f137c6b2444cfced04a663beebd955153,2024-11-21T07:23:24.863000 CVE-2022-41571,0,0,d21192f5b84bd2e0d8b3b7685c8fa13d81d53fbe0d3de64478a1014c88f8f353,2024-11-21T07:23:25 -CVE-2022-41572,0,0,b0dc6ad7d1b67857938cfca4e4b20eba7e81e5e0165572ea9bcf51d7cfda69f1,2025-01-08T15:15:09.427000 -CVE-2022-41573,0,0,a94e75bd02f03aa45bd2ac9b3fa3cf466ed18f3c4cdd1e841cb8938f64873b3b,2025-01-08T15:15:09.840000 +CVE-2022-41572,0,1,f8d1325065b5d6bee013c9cfd94d734da51afdec637365f5298f4bfb2f718e61,2025-01-08T15:15:09.427000 +CVE-2022-41573,0,1,bab3410501c8850e950c5a66d689d391095aee77d84a2c3c751b6585883d88b4,2025-01-08T15:15:09.840000 CVE-2022-41574,0,0,21e917fa5154deb6e3b8d21ad116ef9dde7c875c812d3df1ee5d78c46dfa6a1a,2024-11-21T07:23:25.140000 CVE-2022-41575,0,0,8334a25c2009fcf3e6c0edb09d3dd5a6ab1272c7f22935bf5852c90ba12a2139,2024-11-21T07:23:25.287000 CVE-2022-41576,0,0,f5bafe8f1c17d8fad2ba21f970ed4ca48d42f1479d46600aad0cea7bb4120781,2024-11-21T07:23:25.433000 @@ -209398,7 +209399,7 @@ CVE-2022-43830,0,0,2f64150b363b8e69222f4767b2a962c4259c9aa91848800fda8ecd6f999d6 CVE-2022-43831,0,0,4b824d13f4654134bfaa17c7c5acf538260c76da9795c9bb806d1640e5487247,2024-11-21T07:27:15.673000 CVE-2022-4384,0,0,25f24049ccb5584ac2286059b580466c788619146479cad249f1b9e96586286f,2024-11-21T07:35:10.520000 CVE-2022-43841,0,0,6dac3a6012885404339a039f533cfe4b8c4ab64fc90a590d1b6f4c9d270c1163,2025-01-08T17:13:14.077000 -CVE-2022-43842,0,0,6e561483c3801b15ff00dd2bfb39984ef10bf648e6925ca1d605d91b8d4bb1e3,2024-12-31T15:32:22.737000 +CVE-2022-43842,0,1,968543d78d4d0106d71002238fd33b4337c8761617723fc4383d8ec785dd2e77,2024-12-31T15:32:22.737000 CVE-2022-43843,0,0,aa4e8920b27430c0e020c56337aaf572b7590d86ac4b80d6e5ec6ab868ab7eb7,2024-11-21T07:27:16.070000 CVE-2022-43844,0,0,12fe96ea4e7f35e34da57a23786e8679400ecf390c193dcfa13dea7351d25cce,2024-11-21T07:27:16.227000 CVE-2022-43845,0,0,4dd0555a0d80dc6547097d2325e631aae8cc1a25ed03e0c104688f7fd5b7e883,2024-09-30T15:53:01.643000 @@ -209928,48 +209929,48 @@ CVE-2022-44652,0,0,67db30badeefb96fde339a3d62324c7e214ccb26dfcd0c39111c4e5157964 CVE-2022-44653,0,0,3a7d57519b71f5e10d1d7e7e6354fa683e057b66274d10564d6ef57f1d2ac5ab,2024-11-21T07:28:16.437000 CVE-2022-44654,0,0,aad1a29668196bdd7f6bf72ba7d12d61263d690479e465d7c94bb8ce496a3c58,2024-11-21T07:28:16.533000 CVE-2022-4466,0,0,c1d3f905e17335b364f11c2d403ce5a23031ba41e34e3133ab0283bd0011dae3,2024-11-21T07:35:19.140000 -CVE-2022-44666,0,0,84ff376565b0e3b68b7b7b584fef8fa16406dd58b1d55095c0699be0ae3ea01d,2024-11-21T07:28:16.640000 -CVE-2022-44667,0,0,ba5f79c211df3103065becb6d4b67da0e38e341d275d56e3932f3c5f54575d16,2024-11-21T07:28:16.777000 -CVE-2022-44668,0,0,a4488f51f1f311e7a27bfc83f6099952110606749e0a0f97117fca443236f2c6,2024-11-21T07:28:16.917000 -CVE-2022-44669,0,0,e2472b595336fb432a9e7c1d35ef39c3226cf16a4343703f8c82f9a226a387e0,2024-11-21T07:28:17.067000 +CVE-2022-44666,0,1,d2cbcaee03b3f5be8fc66b212f973833dcf85745b321dabdc7a29944da696700,2024-11-21T07:28:16.640000 +CVE-2022-44667,0,1,cf2495015663bda7489dcb818715c44b17c3658cb254872115559898ede3dfbe,2024-11-21T07:28:16.777000 +CVE-2022-44668,0,1,8d3bf294d7dde6db71f7f44d1f8d2b3816033401edb914cef097f31844e78e8b,2024-11-21T07:28:16.917000 +CVE-2022-44669,0,1,db599fb6fbc8e933751aa51497d2438936f4b9087517af33e4590ad02304e2c8,2024-11-21T07:28:17.067000 CVE-2022-4467,0,0,1ea55de3d0d3a652e614e25542441af5c68f25c299f8e415b077766a46009083,2024-11-21T07:35:19.260000 -CVE-2022-44670,0,0,c6047b08a9b7607969266a24b49dad5e6095d6e44455f388ae2eb36429328144,2024-11-21T07:28:17.200000 -CVE-2022-44671,0,0,72fd686e8a55f5911431ed31a2b88268804ecfe0d5f5efa7976bcf168694626e,2024-11-21T07:28:17.343000 -CVE-2022-44673,0,0,f4057bab4aed613f02c1bac1627c1264532ed281453af70ea9d438d2b1ce1b0b,2024-11-21T07:28:17.477000 -CVE-2022-44674,0,0,593ecf81c95e3968f418be3f88f30f815b0e30fcd48c8160cd9f3c4f12714852,2024-11-21T07:28:17.600000 -CVE-2022-44675,0,0,6a6b488a2b771d5833fcd5880ca341e904a2404db25bc5427caf669e275a19d6,2024-11-21T07:28:17.730000 -CVE-2022-44676,0,0,874bb5a9ce6f4843d1f386c61ede87f3ece6c17743d484a2a885839bc6e6b59c,2024-11-21T07:28:17.870000 -CVE-2022-44677,0,0,acb45d5e2c7bbe55f3133bdf41ad6f21c06504fa6dfc90892947bac74fd75729,2024-11-21T07:28:18.013000 -CVE-2022-44678,0,0,4a9ebd83b878a762ce36e63faac16fae7f039ebe58417b5eb954ef6afa720a85,2024-11-21T07:28:18.147000 -CVE-2022-44679,0,0,a7e3d9adf10e2c9b456847bac95f5c87e3a927d1b7946bb6b74d1bfd7347917b,2024-11-21T07:28:18.297000 +CVE-2022-44670,0,1,2e5a6e485915a84aa92d41320bf1c7b889425157ba9860e7373f2d3af6834cbd,2024-11-21T07:28:17.200000 +CVE-2022-44671,0,1,34204c0d6e5c34c6e3a08e5ddb8fb298a9aac06b792cd5ad6311917d6ec6b9b7,2024-11-21T07:28:17.343000 +CVE-2022-44673,0,1,bc2b4f559ab57cf6493f460cb446109c4b4cb46290565a0683e622c9107ff769,2024-11-21T07:28:17.477000 +CVE-2022-44674,0,1,c4059a3e3a762cf9ce71cb7507758ab3186c9b1def2b28ca944286cb22f96d0e,2024-11-21T07:28:17.600000 +CVE-2022-44675,0,1,9bb2ffc8c33b83d174927e99e3a6e1d878c613d71bd82e3e78c81e17ea4972dc,2024-11-21T07:28:17.730000 +CVE-2022-44676,0,1,d37bbfa4660d3f448024b8b7316587fc65eaf33b5f95b1cdd6c01921e3ddfe98,2024-11-21T07:28:17.870000 +CVE-2022-44677,0,1,5bed1b41b3576067f8603c021e5fdfbcf57377878b4478fbf5f65a58f09becca,2024-11-21T07:28:18.013000 +CVE-2022-44678,0,1,2e067b974f148f17b17e345e6c86dbea203e5eae553c42a2c61bde1ceacecdc5,2024-11-21T07:28:18.147000 +CVE-2022-44679,0,1,79903d711e7691a9e47f3c8584456522b55ca72957d209e1d4edac20854e537e,2024-11-21T07:28:18.297000 CVE-2022-4468,0,0,3b6d3ebe80e5f094803d3b705ce125344f1ca4936de06c3c98373e52a7afa37a,2024-11-21T07:35:19.400000 -CVE-2022-44680,0,0,911cb4de4cb2d448e76114dafacf93f04ffaf8262795d0fb35abe0d20e35914c,2024-11-21T07:28:18.437000 -CVE-2022-44681,0,0,e0cc31df504caeed6b4f0b29882a65f4b9b25ea09a17bcac37044cbe2fb4e884,2024-11-21T07:28:18.570000 -CVE-2022-44682,0,0,2d6d341ba64a87841ebda4cb9f6194042dc1d053d315ce3455d380b8d17007cb,2024-11-21T07:28:18.723000 -CVE-2022-44683,0,0,677ffa637f2c458af6de848035b0ecc38b0afa11ddc3ea97b8d4fa254964cc0e,2024-11-21T07:28:18.853000 -CVE-2022-44684,0,0,8e925b0918d7a32a637faa9ba8773ac877bd04674bbd533d49c81e7434b19f4d,2024-11-21T07:28:19.023000 -CVE-2022-44687,0,0,06e28b750ecf2b80d07cdf7d13089cc0917453f3fcad1d350414f11f802fc14d,2024-11-21T07:28:19.177000 -CVE-2022-44688,0,0,d459fb9cf67358bad9c7669f84ac9d2759a16bf41092ace260aa9443a5c3449d,2025-01-02T22:15:30.203000 +CVE-2022-44680,0,1,96c2ca9f8413e544591f6a484e639b25cec91d32e80ea1a2f3adb65bacb2b3b3,2024-11-21T07:28:18.437000 +CVE-2022-44681,0,1,57f3559eb6ef51af1f6c5eb3e4dddbb4a15c51ee28f8ce4af6a570da4cf639dd,2024-11-21T07:28:18.570000 +CVE-2022-44682,0,1,a62deeddb2a1cd2c00897e40d45d3fd2b35f9deb803674fce184b2cb008a5b70,2024-11-21T07:28:18.723000 +CVE-2022-44683,0,1,a02af3a42b855460f9249306daf53f390dc1926bc46b02be98a05b4f76676cf6,2024-11-21T07:28:18.853000 +CVE-2022-44684,0,1,d1f218031af682a60e29ad728f06117a9f740daaf91f91784446f9fe35018cbc,2024-11-21T07:28:19.023000 +CVE-2022-44687,0,1,3e3f2214e94721256a86c0da2004a0e3357d2e7703ff412eccae9774bb3c21fc,2024-11-21T07:28:19.177000 +CVE-2022-44688,0,1,b7e2623b6d8ec5fb0252ebe781d7107ff654672e01ed8821d0741ac16fdde0d8,2025-01-02T22:15:30.203000 CVE-2022-44689,0,0,c5cdd024b981233acdd0665be4637dc6074226f24560673e68349be69fc1b1a9,2025-01-02T22:15:30.320000 CVE-2022-4469,0,0,a62dfcdab10ed52f0ffae15818f457aaa718da23e58a67f85ba4a7c844ccd12c,2024-11-21T07:35:19.520000 -CVE-2022-44690,0,0,4cb789e4c3e0dd978bbda922551d971e1417be52afe423e3e7dbe6f171c42879,2024-11-21T07:28:19.557000 -CVE-2022-44691,0,0,df58edfa764811237ecf7723dc611f6a4f31a021418a4c783cbb2d917f641a77,2024-11-21T07:28:19.680000 -CVE-2022-44692,0,0,c536936ce234565b252d39a12c80bba699454b7c4916e4880140741186029bb4,2024-11-21T07:28:19.790000 -CVE-2022-44693,0,0,82d81eae1caed3132518948e076ebc2425b86e1fe139a28043457c824c6e9f26,2024-11-21T07:28:19.903000 -CVE-2022-44694,0,0,6096d3b8d31ddad88d323f67be3d012ae383a364147a354b32917afbfe2b5e7b,2024-11-21T07:28:20.013000 -CVE-2022-44695,0,0,a60aef4612eb4571582d680af25c89d8664dfae73e76c592b48797d958554a2e,2024-11-21T07:28:20.130000 -CVE-2022-44696,0,0,4dedfb56811bfbd63762a5eb2a8b41cd7585e96a97f337e04c6fb2f5b970c2e4,2024-11-21T07:28:20.247000 -CVE-2022-44697,0,0,b3e1e7ce1fd270f870734e650c37e0952abf4c0808979acc6be5cbb6ec85f716,2024-11-21T07:28:20.360000 -CVE-2022-44698,0,0,d562087ded6d7e3708e28319d3ac1f847b8776e7b538db8c3c6e1791e0a6d5ed,2024-11-21T07:28:20.513000 -CVE-2022-44699,0,0,8a1017b667e12b4c4b5b2b941b7b7e6831ebabc6be1378c52f16f2c80ebad78d,2024-11-21T07:28:20.650000 +CVE-2022-44690,0,1,7268ba3fb6f3f5f289bafffcd1642f5d3471e7129f7904348545d7fb881f7b32,2024-11-21T07:28:19.557000 +CVE-2022-44691,0,1,ee538c6f0c3125e57e567c14811ff954563d9fb12b7b3974c4fc0923c7d8abb3,2024-11-21T07:28:19.680000 +CVE-2022-44692,0,1,50e09f5734ed4b1b3ad3136d2be2e1605b418e5a02dcce92c56d1f78e69044b8,2024-11-21T07:28:19.790000 +CVE-2022-44693,0,1,7191b087844a2b6425cecebaef0f5368d5f7821de020aa58e44a368236b4c3bb,2024-11-21T07:28:19.903000 +CVE-2022-44694,0,1,9646af3ebc44d26db41e8c7312dbf160d088be989069db89fae1806cd40e8c79,2024-11-21T07:28:20.013000 +CVE-2022-44695,0,1,b8aadc89229c0172dbc172ae4e06b239dcb16cc8bfc264c3e7019f8822502674,2024-11-21T07:28:20.130000 +CVE-2022-44696,0,1,34ee111de7c93ee0757e921e5302d9aa108c4dacd86e693f482c22f4947a66d0,2024-11-21T07:28:20.247000 +CVE-2022-44697,0,1,46d5dd6975f26ada715ac8e4a60b3967c23f5b630cec717c7634b4b2ff7f29c5,2024-11-21T07:28:20.360000 +CVE-2022-44698,0,1,f8af999b171a767d5b235430551fcabbd2bf43f40ea1472ec8159a9eff6139eb,2024-11-21T07:28:20.513000 +CVE-2022-44699,0,1,2852e1d04a62e8e83d3aea9d2e18e4c8e360396d0b437138a9c7b474e5cb114c,2024-11-21T07:28:20.650000 CVE-2022-4470,0,0,3a66d837fdb4f5df95a57e4851f55489d7fb170e97ac8963c9637daf671d1c97,2024-11-21T07:35:19.637000 CVE-2022-44702,0,0,6508d698ae030632393a4c7a60962b0c4f66597818e229532cca17e5e19ac5fe,2025-01-02T22:15:31.540000 CVE-2022-44704,0,0,952ac3f1ef2ab64f209477761b4d6a15c178a4b48e6fac1d78930cbde9b8f717,2025-01-02T22:15:31.667000 -CVE-2022-44707,0,0,5105fbb72d566723ce09d8055efbbfce32ecaf8671eade558e2ddecbfbb904fb,2024-11-21T07:28:20.997000 +CVE-2022-44707,0,1,7597f7b59c9f6e57b37cb82149af8b18323bc714f53d32c4742d2be8940ca107,2024-11-21T07:28:20.997000 CVE-2022-44708,0,0,f7cbdb8548c7f785475d1805fda91d8ea425f806cec91f8c2bb140f40b5e1396,2025-01-02T22:15:31.920000 CVE-2022-4471,0,0,176ad26be089d3cf694f316d4aa2fb8421e5622b93c54338fd24e2d36831269a,2024-11-21T07:35:19.763000 -CVE-2022-44710,0,0,7b3508b8026d64bfd8d0e484a206d40ebd8b850e277c071b09b7cd77b4d18350,2024-11-21T07:28:21.250000 -CVE-2022-44713,0,0,f57850dbde58bf4c593b8611ed63550075f373e3012f2c2ef32c8df66e2aea79,2024-11-21T07:28:21.370000 +CVE-2022-44710,0,1,ad9f08e12c0fb5351a2179f6a61747fced7d535659cc0b15f734dbcaaf510a07,2024-11-21T07:28:21.250000 +CVE-2022-44713,0,1,a733592feaf7fca1a67d4e144d0a7996e96a6a1f34eadd0a295eb2afece0d67e,2024-11-21T07:28:21.370000 CVE-2022-44715,0,0,5b241799ae6b884fe57141f2d8c41ed6fa02914a646428e290f97256578fe01d,2024-11-21T07:28:21.493000 CVE-2022-44717,0,0,370b019989f037e96a2c2262b0f3225e0b3668c0e0eb0527ab6534489888b4cf,2024-11-21T07:28:21.630000 CVE-2022-44718,0,0,c025de4fda89deb0c067b8ab3aea8e39e154a2f234fe3d24caaab84771ed0768,2024-11-21T07:28:21.773000 @@ -210256,8 +210257,8 @@ CVE-2022-45180,0,0,c3040cfe413949900a60ea83b3e98e1e8732363bd29ebf48fee6449f220d6 CVE-2022-45182,0,0,5ce5fd3aa8778337f722afc8524f8be33eca4a37a3b49427434ef8a1f42497ed,2024-11-21T07:28:55.140000 CVE-2022-45183,0,0,17c24bcc8ff5f83b3692890867f1b0390aceb5de23aec693bc352190eaa3a4c7,2024-11-21T07:28:55.287000 CVE-2022-45184,0,0,3d0fcb0285b7ec260e08c96917c32aa853ace4307fda2ec9ee77dd573c819440,2024-11-21T07:28:55.440000 -CVE-2022-45185,0,0,b6c4846ae35e9fe36f5d1ad4643521400ec3f7b52d3df90ca6bd8ae3e9eb7d4e,2025-01-08T18:15:13.847000 -CVE-2022-45186,0,0,64a4b00a8b229e3e97b7b7d060922d9a52051a5c5b63a0d2d5c2608e5126d79b,2025-01-08T16:15:26.787000 +CVE-2022-45185,0,1,16d3421e1dd997b987b16e5a1be92166802a096c290aa7656430b9fee7afb2fb,2025-01-08T18:15:13.847000 +CVE-2022-45186,0,1,5670ee5a46f5e4938195d00385aa4e9d5840fb229a927ed2b9bfe7bbfe73fceb,2025-01-08T16:15:26.787000 CVE-2022-45188,0,0,897fe5d1be1d67bd18e0e84eecbd7aca5e96a3d426012bdcc62fcf1d224f7bf1,2024-11-21T07:28:55.583000 CVE-2022-4519,0,0,7e1b44f974b691b3ba99a7d6700f057355f3a483598f1d23e777976a85d319f9,2024-11-21T07:35:25.163000 CVE-2022-45190,0,0,f89ea31ba0ad427a758e6e41fdbb51266db819bb50b4347855d75db4180bf5f5,2024-11-21T07:28:55.763000 @@ -211700,9 +211701,9 @@ CVE-2022-47208,0,0,6815191a681a3c0c6d3daa5c6e6ffd42a8d80bc798b18c60170ca85e06742 CVE-2022-47209,0,0,e47df736d049118dfa8b1cd2b5d501e96cf14470171827a94170bc964f9bb584,2024-11-21T07:31:41.747000 CVE-2022-4721,0,0,b73834b989a7c65620a32a953410693e26ec61f8975898c0ba54a0a370c92313,2024-11-21T07:35:48.540000 CVE-2022-47210,0,0,a2d6a623a957ac5dbbc95d495a687f3bfac50c3f6593a7b7b1f9e21b0acccc33,2024-11-21T07:31:41.870000 -CVE-2022-47211,0,0,200030a6f1298d3b20318af0eb2f21837e90b82b177e4c1c7dc21daec3bc5c02,2024-11-21T07:31:42.003000 -CVE-2022-47212,0,0,5620b85b1251087f74192a7d796fe29ab4c9ffb0bb369c4816702cc2e7fefd26,2024-11-21T07:31:42.140000 -CVE-2022-47213,0,0,f6df1d1e51ea506a85d4677961ec7bcb52500e43b1d26132b19b5ba44c210e80,2024-11-21T07:31:42.260000 +CVE-2022-47211,0,1,4b267c4ef06dbd34ed70da1d74210a52e2a27f87200737ff37a51f1648a68dde,2024-11-21T07:31:42.003000 +CVE-2022-47212,0,1,8d57f60677545db04822826446fcee2269ebd1d5aaec30680ba9e7d95207eb79,2024-11-21T07:31:42.140000 +CVE-2022-47213,0,1,5feb1d847db518724889ad283e4b1ef0d931406043f2224843f9600cfdfe2c91,2024-11-21T07:31:42.260000 CVE-2022-4722,0,0,0714fc55941e29b600459c115197510da206de28732c2618eecfbd347a40d8e1,2024-11-21T07:35:48.660000 CVE-2022-4723,0,0,f34ee973591129acb7840614759411bbe1ef3137776e5f79dfffbc5b366c6da7,2024-11-21T07:35:48.790000 CVE-2022-4724,0,0,ec7bc0d0c15bad74858b46545d87f7afdaf9d5657e5be7ee57635f1a31a1b566,2024-11-21T07:35:48.903000 @@ -212476,7 +212477,7 @@ CVE-2022-48464,0,0,a04fc4617e9ce4c5c7547ef70a80faa0a5984e5206bec685dabecaf476960 CVE-2022-48468,0,0,5a37548a7bf2b40090f4df223a3bcda96f0d11f5141fa27d34925420224fb5d1,2024-11-21T07:33:23.727000 CVE-2022-48469,0,0,c8be7cb84f7209b7e20d7afca6a0bded7a57841c1c6838648c6954339674324c,2024-11-21T07:33:23.890000 CVE-2022-4847,0,0,f9ea10dc433f0a7ca49492c0d40460c777d953f69b3b03890b21104c2804ed2f,2024-11-21T07:36:03.903000 -CVE-2022-48470,0,0,3cfdef037689f910cbad2ca1c249a4df9140cf1855415d9586171a7c44fc3596,2024-12-28T07:15:19.087000 +CVE-2022-48470,0,1,9955682c0e269cf9c45fe3197c26085416ae58073569fe0a769beef4b6b6d51b,2024-12-28T07:15:19.087000 CVE-2022-48471,0,0,db2cd97ca72fc35f2ee71aea0631bbf20792fdae315427d0f09b57bf07c09399,2024-12-17T17:15:06.510000 CVE-2022-48472,0,0,c64808511f56edb7b006436264e030f2b912db2c8e92b1bb7f5768827a0b4344,2024-12-17T17:15:06.680000 CVE-2022-48473,0,0,8a14d908a6798de0b50f6c1c8018fbd60fb222ffabb0007655323679b7bab324,2024-11-21T07:33:24.200000 @@ -212599,7 +212600,7 @@ CVE-2022-48624,0,0,7d8340193c28814d34deb47e64461c30715aea3f85cdee8a05ab3feef2ca7 CVE-2022-48625,0,0,ad1548e03625a1597bed096d4ae7617552f2279c80077db9d95ac7c5db9b122e,2024-11-21T07:33:38.110000 CVE-2022-48626,0,0,9d4f63da0a918f51b7c85b0ffa7c98eb3b3f0bdfe14eedcb544bde294c904c2d,2024-11-21T07:33:38.317000 CVE-2022-48627,0,0,450773013a86dee085659fbeb135aaa41eee00eb1f2d7ba0c46cf0fcba42ac12,2024-11-21T07:33:38.493000 -CVE-2022-48628,0,0,1bc92cb9e5f028e8c150815e12f613a246aead3cde1900ce40016eb3c30c4045,2024-11-21T07:33:38.693000 +CVE-2022-48628,0,1,115f5bcac6cebe23cc67d0a2a0eb54b4a2afd12111d307c06312d3bc339bdf2b,2024-11-21T07:33:38.693000 CVE-2022-48629,0,0,22ed839ae28d9bc6568331788266afa09b73a958ff038fb89be480fe23017988,2024-11-21T07:33:38.803000 CVE-2022-4863,0,0,d4d829a1beb8e4fd89587644cb89a6f79551c4f0525d6fe5f92668872dbe819d,2024-11-21T07:36:05.650000 CVE-2022-48630,0,0,cc35d21a7ef8def8b0a421e82faaa17c2b13a0616e1a81c5178414600588878e,2024-11-21T07:33:38.930000 @@ -212653,7 +212654,7 @@ CVE-2022-48673,0,0,a3b3e1b191bf54d1d35641ef15860e93c5f6bcf6251c2a1ee471af7c096d6 CVE-2022-48674,0,0,476f798f507d34935218ba718ac33f89281bb639644ff47b067bbd67e73a8b95,2025-01-10T19:07:06.760000 CVE-2022-48675,0,0,2e140dc2daa62f186248541550d61a53638faca278f40224378d5e0e771340b7,2024-11-21T07:33:45.427000 CVE-2022-4868,0,0,b9c3b1a08b57dcb26ba3ee07b19943516c634eee26d7ea962dddd7acf565c91a,2024-11-21T07:36:06.273000 -CVE-2022-48681,0,0,a4e9ba5101f54accd3e8c53068e89e178c2d420bccf817690ab7fcfd8d81c384,2024-11-21T07:33:45.550000 +CVE-2022-48681,0,1,0b16b039aadff5dfb1f8a515f448935a385d3c29ed71a607ce25e18d7cffb213,2024-11-21T07:33:45.550000 CVE-2022-48682,0,0,12529a09488b50d6d8f48eeec3b6736def9f240a5bc84fb15dff6b7ad726022f,2024-11-21T07:33:45.687000 CVE-2022-48683,0,0,9209f585b554c943b4f5f4a0134c903e29349e157b26c04845198b5f85941b3b,2024-11-21T07:33:45.850000 CVE-2022-48684,0,0,68c29ecd5a7f25e318ccfa66c362d1bd337123f3c5a2e5892ad392b4fb225b0d,2024-11-21T07:33:46.047000 @@ -214937,7 +214938,7 @@ CVE-2023-1903,0,0,efc0da96e9efec639f57af0da1386824a9dd54cff194afba825592fcb11607 CVE-2023-1904,0,0,ffbb7dc031b91f22a73be42c7f56c7040dc466cc7cc9e04b2035e3635dd9de4c,2024-11-21T07:40:06.983000 CVE-2023-1905,0,0,1c8e69e154302dafb57f6191602005d1fb9f553d13ff7fd58cbba47c267631e4,2024-11-21T07:40:07.103000 CVE-2023-1906,0,0,2474c3121c418f8f1b9c7898365edb5f0f5ff817f30d9fbbb045c48845873f42,2024-11-21T07:40:07.200000 -CVE-2023-1907,0,0,17434c9b55aaeec8c2bbd187b92c8a0c1370e44ddaaae0f0be8e16bb856a68d6,2025-01-09T15:15:10.753000 +CVE-2023-1907,0,1,7e5d444ed0298ba9f7785c55a14ff0c356de0bcf01ec3878593a7572234eb140,2025-01-09T15:15:10.753000 CVE-2023-1908,0,0,a7f3750c6e61e1597fb00574a671512440b074bfd7d382966345f4da285e0184,2024-11-21T07:40:07.320000 CVE-2023-1909,0,0,e49817fc9d0a21e868f8dcf99cb6ba1f1e8637a8a1ac71c8aea4dcba2d56a97b,2024-11-21T07:40:07.440000 CVE-2023-1910,0,0,37c041e704ac5ae2514337a89fa66ad555ee848903b68628fbb411ed56a08fa9,2024-11-25T16:47:33.943000 @@ -215688,8 +215689,8 @@ CVE-2023-20884,0,0,b542ae1ea197f6a83956405861656e65fc906b8e995ce857358b3a1f7aff2 CVE-2023-20885,0,0,0dfdf492922f0b854de542b4e33abc881f21c058cd2a01cc3c31dff463cde87b,2024-12-16T20:15:06.557000 CVE-2023-20886,0,0,7a982823666f96ea57050e3be9fa8d457665501ecee354ebbfe73207a1794a5a,2024-11-21T07:41:45.290000 CVE-2023-20887,0,0,072fa55b19037026443d59f5a8b6eb8c8f0d66a8ce2a12de803a75a2e2066424,2025-01-06T22:15:07.900000 -CVE-2023-20888,0,0,723c7f0b957cdef56a4661c479c825f356eedc0bc04101cdf7f7700b2e357931,2025-01-07T16:15:29.400000 -CVE-2023-20889,0,0,fd83950042aec40275dad2507592571009f6b50d10101fb2b79214d35f573bc1,2025-01-07T16:15:29.613000 +CVE-2023-20888,0,1,d713a2875d180635eba29edc6936b1cffede28ba882bf72c4e051b9b84ccc7fa,2025-01-07T16:15:29.400000 +CVE-2023-20889,0,1,5b048b4730c770f57986fed04260e31b816f31eaf7108b4ee24f65d46a19b529,2025-01-07T16:15:29.613000 CVE-2023-2089,0,0,71b86ef69634c1f1cecb80679171d8c1d18cdf2b9a712b87a474c4a7b660ee38,2024-11-21T07:57:54.870000 CVE-2023-20890,0,0,c6d89d2ff550700edc8ac2e64d97d12842613e678a3a487ff3860e6c922c6b29,2024-11-21T07:41:45.750000 CVE-2023-20891,0,0,0a9ec7ceee2a6f45f9dcb69e11b8f16e9ae513637c8989ce0cc9bd0e4e2531fb,2024-11-21T07:41:45.863000 @@ -216347,55 +216348,55 @@ CVE-2023-21520,0,0,f9ef42e60f0562a58d71a4eaf0d4d03f7dacca342c88905ec7396c241cc86 CVE-2023-21521,0,0,8a519fd2fd7bbfc1d114fb34c45e13bbe717f1b8eb83cf0d03061eb95d14a3c3,2024-11-21T07:43:00.160000 CVE-2023-21522,0,0,4cc0e933f087eab50f1432c247e8b3c0521c4158574473a1e9e3003b856d076b,2024-11-21T07:43:00.303000 CVE-2023-21523,0,0,e9277ffd814c8b4544f9668031360743937493b41a7220378ad86a87b631e832,2024-11-21T07:43:00.447000 -CVE-2023-21524,0,0,a62b2bed2175797e800a9efaf1b59ecf80091cb75616e439adf1cc3dba7b2818,2024-11-21T07:43:00.560000 -CVE-2023-21525,0,0,f5115033236a87769d27df2fd52fbbf26bec94fec8720812f078951f2a105068,2024-11-21T07:43:00.720000 -CVE-2023-21526,0,0,284d282c74a234ec0707c10bf33d66608a2eaf4b0dc3a52d07ec658d23576e3d,2024-11-21T07:43:00.863000 -CVE-2023-21527,0,0,a8b93043aa8a4fef021a65a1d8e32272e273c4fcd54728c929cdbe9ec5ab2a08,2024-11-21T07:43:01.003000 -CVE-2023-21528,0,0,01784db35daae1e1421976f164d6757312a3c0243f9a6b93ab8d09946af2b212,2024-11-21T07:43:01.150000 -CVE-2023-21529,0,0,af59b8c74c279cc4c9224a6c829cd40a82886b61be0dd7e9c934af3a3daf67c4,2024-11-21T07:43:01.290000 +CVE-2023-21524,0,1,aed58cf508c51719a18ef4ad5b45e104a50e1cc4682a780434f752c4fdf67044,2024-11-21T07:43:00.560000 +CVE-2023-21525,0,1,d28aa4365adf4fb1538f9ccf4ad52bd88e4c5b193e8d777dfa32cdb51c529b5a,2024-11-21T07:43:00.720000 +CVE-2023-21526,0,1,2e7140d8285c43682bb81693824226306d1bd2eda7d4584156c32b4a3119b0fe,2024-11-21T07:43:00.863000 +CVE-2023-21527,0,1,95a2bdd48d6e614dee0c2fa5dcab8f98ff8d68efa71b778963903ffd077a64eb,2024-11-21T07:43:01.003000 +CVE-2023-21528,0,1,d02da8ce37dc6303b0b665892d9e2e9835ae2a732b3df36d1f46416f1aade101,2024-11-21T07:43:01.150000 +CVE-2023-21529,0,1,02c8a6971ab369f6142519a608f715046d48e16a983a2cc09548080f8050dc1b,2024-11-21T07:43:01.290000 CVE-2023-2153,0,0,a0b4a4ec44e9979b4cd3478284de288db8d95c90ff6b66d903d4270b71eb1775,2024-11-21T07:58:02.383000 -CVE-2023-21531,0,0,ff9d8934ea31e31f94d973437f1959f8d3b903a4bd6990ecc3c1ed319fc8f473,2024-11-21T07:43:01.420000 -CVE-2023-21532,0,0,2e2b27fbf2b160440db648798f22dc44d16436079416769cab98a9dd3a493d2c,2024-11-21T07:43:01.540000 -CVE-2023-21535,0,0,4c3f1db1f64b59f6286e2c50f806730caa831e9acc9514faf95ad83882a3a4a7,2024-11-21T07:43:01.693000 -CVE-2023-21536,0,0,fcefc65b6b7ad3425492ae5a4169094cc32cc8b27ec942ff0d1bb3e8402ccd7e,2024-11-21T07:43:01.843000 -CVE-2023-21537,0,0,da54d8b10c9b68e7ab4b36763f2cd4a6d2c72343623c3c729ede24aff9dbf153,2024-11-21T07:43:01.977000 -CVE-2023-21538,0,0,637925e963ed9c329886445f76470028d300e29416a0a8796e68d0512fcf29a0,2024-11-21T07:43:02.130000 -CVE-2023-21539,0,0,ac7cd098d0fd5899f96ccf13b298c412fcf5c2831d51908134894e3d6e68df9d,2024-11-21T07:43:02.293000 +CVE-2023-21531,0,1,83558370f51a6f945eee78f0738bddefbdc92a208fe749ac38d30d8c66634dcd,2024-11-21T07:43:01.420000 +CVE-2023-21532,0,1,e7b9cbd8adc0ec5b880569b852644aaaacd05893e0ab368bac5d82025f1995d9,2024-11-21T07:43:01.540000 +CVE-2023-21535,0,1,c9c7e8408560b26f39bd06a5df8d83c8de7595aaac44bcbc4b07a649748fb74b,2024-11-21T07:43:01.693000 +CVE-2023-21536,0,1,ef86d34256855b7e09c5e6fb8d359040441d4e27e4706830ed17efa858c47c56,2024-11-21T07:43:01.843000 +CVE-2023-21537,0,1,13bdf146f42beadb35ec8a5921e10070cb9f8a201193effaaaa7066aaee827d4,2024-11-21T07:43:01.977000 +CVE-2023-21538,0,1,a6d17773f591ddeddca14d18a1e129d89aa8c4ef2a55e65bc7d39778f7946194,2024-11-21T07:43:02.130000 +CVE-2023-21539,0,1,c14763061edd727ba3e4f2e6ddc2b3acaf7639dd083fb7173b3258a97cb02ad6,2024-11-21T07:43:02.293000 CVE-2023-2154,0,0,db660c703c5368ad15b8dd34492b6e1d47b4154215d2ffd30942539bc34cced6,2024-11-21T07:58:02.503000 -CVE-2023-21540,0,0,6e83a3abd6bbcff9e95cbf3e2b1018ee8401ae544a0780c53b4d2d79aee9eae3,2024-11-21T07:43:02.447000 -CVE-2023-21541,0,0,7007ea0ee2db37eb31c6522af4dd634babb26fd2bd69b17cb8c02450078a3842,2024-11-21T07:43:02.590000 -CVE-2023-21542,0,0,67c487a3444c3241bac3d5c9a1abe9886051b63f520e2e1ae258d142e25102fe,2024-11-21T07:43:02.740000 -CVE-2023-21543,0,0,5e6adf0861d83461486cc3c85eea7f1294a25825ddb84f24e9c90f22bc2d748c,2024-11-21T07:43:02.880000 -CVE-2023-21546,0,0,c117c72749775f7c0034f6df93736919401719121ac583721bebe7919181180c,2024-11-21T07:43:03.033000 -CVE-2023-21547,0,0,713c3e0655681cd462b575d1ffa3dc02d5a8a0550221ff6d9d2c9c1936591d85,2024-11-21T07:43:03.193000 -CVE-2023-21548,0,0,8f88b10f705d8a7381be584480d97e2e7843672383fe187423a1e8d5dc6d31b4,2024-11-21T07:43:03.330000 -CVE-2023-21549,0,0,dec6be28ad258fcde9362d8ca2ff1277cd019b485eecb1b0e411c61bd0d14fb8,2024-11-21T07:43:03.477000 +CVE-2023-21540,0,1,4d7d121c7e248481a31e6f319c663d3cb7977f83f565dd0ae97f57642fc9eeae,2024-11-21T07:43:02.447000 +CVE-2023-21541,0,1,e3085b05a4274a83acfd084778034147250f180d98bc10e5ac57100c13709c46,2024-11-21T07:43:02.590000 +CVE-2023-21542,0,1,1beca00bc739e227bca6cc8042a200547f274b1584fa8835e1467fb58104a967,2024-11-21T07:43:02.740000 +CVE-2023-21543,0,1,8d0b33de7eb4782c77768e8b7092a63205a50cf19dce9cc44fa81a8254e4940b,2024-11-21T07:43:02.880000 +CVE-2023-21546,0,1,7baa3a78b8add5fa05c4e2f900a11391f31ea4c32d9209ff8622b89fea70e7dd,2024-11-21T07:43:03.033000 +CVE-2023-21547,0,1,28dbfd00ec9816fbebacb1220b91497c8c94a3c8363bffc8328b82c596840f69,2024-11-21T07:43:03.193000 +CVE-2023-21548,0,1,6fdff1d487cd7518c868e032ac721f94eec7fac80d4b50ea261fa8baf8d94ba1,2024-11-21T07:43:03.330000 +CVE-2023-21549,0,1,ae68bcba1027449d340057f5e7349e082a18e2fa42844c65ad7f1f6dc8f7aae5,2024-11-21T07:43:03.477000 CVE-2023-2155,0,0,43553d196e83088b4f730b06b9b7a691159b6caf8ce96209070024f7c60b5a11,2024-11-21T07:58:02.627000 -CVE-2023-21550,0,0,dddf06e756b413242cbb7a52177a91cfb1817a0057238acbfd5bc21bc87e7be1,2024-11-21T07:43:03.623000 -CVE-2023-21551,0,0,5a0974f920566b48be6db4039cb3e655f88ad8a1e8c8fb76cbfba1748c9ee75b,2024-11-21T07:43:03.767000 -CVE-2023-21552,0,0,e9cd7687d03ba0f31d7d656cb36d1d7bdd37ce00fe72e5b5fd2a96595e68a4fb,2024-11-21T07:43:03.893000 -CVE-2023-21553,0,0,5e53ba231f677f74083a3a901ea309bd4fbd5fe6a99f4bf7174c075d7ffaf2cc,2024-11-21T07:43:04.050000 -CVE-2023-21554,0,0,16a3459932fc3a6a1b63fcaa67154a69eb22c5a7b047d6af886d1ca75916c46b,2024-11-21T07:43:04.183000 -CVE-2023-21555,0,0,62636963fe8629a733aaf96e2b4ce83bbd8b22bbb1615f183619544c576d71a0,2024-11-21T07:43:04.340000 -CVE-2023-21556,0,0,35130bfe05ce3a6d65a0378e1e502c87de14e79a322f1c5df269d0f44a0fcf72,2024-11-21T07:43:04.500000 -CVE-2023-21557,0,0,2271c49fc1280edccd562cab7b3df33491bee2c8fd0ad928ed8cec32703aaa40,2024-11-21T07:43:04.667000 -CVE-2023-21558,0,0,ef2de7fccabd2cfd8cb1cf2ff725a8db39c36fed91ef0450c8c2c8674155c10d,2024-11-21T07:43:04.843000 -CVE-2023-21559,0,0,7c293052ad41295f11c2d39f32628332a47e0f05309e40c610913d9c63d2a4c4,2024-11-21T07:43:05.030000 +CVE-2023-21550,0,1,98106053f702d222e56aa4c9f06bd4eaa1bdb851c9aceee01e199a07e7142ee0,2024-11-21T07:43:03.623000 +CVE-2023-21551,0,1,b8bd6c858b5db6ae3e4c3232630162142f3999d7cfa6e959458962a7581f864f,2024-11-21T07:43:03.767000 +CVE-2023-21552,0,1,b854de657fc9131a27816e8cf85d9c085ff9c036648ab486863828631d9a5c4d,2024-11-21T07:43:03.893000 +CVE-2023-21553,0,1,a0f0e52e2d76b7d91ae5af96587b200f97362617b8c2b7a97f445cc54d9e5fa6,2024-11-21T07:43:04.050000 +CVE-2023-21554,0,1,8a5a8d6974a831c4e5444ffb44626182df40ff5841a591601ad3c0255ec172f1,2024-11-21T07:43:04.183000 +CVE-2023-21555,0,1,567e14a8462f23f1e88e6a35b0220333c548ee92afb76fbaf108d7a71eca988c,2024-11-21T07:43:04.340000 +CVE-2023-21556,0,1,179998d54272e87585f60d15b4938fb8884d2ee8c13d3c8bb8009ba39f338783,2024-11-21T07:43:04.500000 +CVE-2023-21557,0,1,38ed29bdd9d64a78f01a2eeb7cdd684d5fedfe0f674c2cb5dd2b532103ff5952,2024-11-21T07:43:04.667000 +CVE-2023-21558,0,1,adae002aa8d890ac38f0a14b477308c6cc2a1a74c5b1552f70ebf8a3ad4a863f,2024-11-21T07:43:04.843000 +CVE-2023-21559,0,1,161794248447bcdee4cb3834070186325b4a1f31fffd988a40eae2e0f9bb9697,2024-11-21T07:43:05.030000 CVE-2023-2156,0,0,3a231202adae71e22cb10ad42b40a6ed8d187c6b0f3dc2669e2076dbebe18b71,2024-11-21T07:58:02.757000 -CVE-2023-21560,0,0,ca78e0683483e182fcb560f789d2df7925b67c7b449b94d46638bd288758afa1,2024-11-21T07:43:05.177000 -CVE-2023-21561,0,0,66df231fec42f37f4e3bb812d77a0dc701c9cdda4cc57478a883e7f54a176401,2024-11-21T07:43:05.353000 -CVE-2023-21563,0,0,1568742eb4598e6126a932222c716e15aa68800798d88383af4a4f4554ae508e,2024-11-21T07:43:05.547000 -CVE-2023-21564,0,0,b74ea3e276a67eed3eae21f8d15c38611d711107de0b8347634c8cd39afb8bd4,2024-11-21T07:43:05.687000 -CVE-2023-21565,0,0,c0375640cb5dd1fc4d88fb21b95eb1f8ea8782cbc03d5071c31329b2079b25a3,2024-11-21T07:43:05.803000 -CVE-2023-21566,0,0,a6208efd3bb20875065bb908d7c048ac83773ae3f620ff7a2072cab13d45a546,2024-11-21T07:43:05.923000 -CVE-2023-21567,0,0,7c0178689b609fa19a702c1ab4b58e4795bf76ca3a16a2366aeb7558ff130a35,2024-11-21T07:43:06.047000 -CVE-2023-21568,0,0,4f69f941be8ddb65f9859d2fdfa33a84a899aae234b548f142ca072d6d5f94fd,2024-11-21T07:43:06.167000 -CVE-2023-21569,0,0,c6088c24db273d99b3d49ee91bab9430920364f586581be35edbcdbcaff027b8,2024-11-21T07:43:06.307000 +CVE-2023-21560,0,1,664a24c6df2a270f6f2d196fb8f443e92782abb19335388aca8d4d2d924edbc5,2024-11-21T07:43:05.177000 +CVE-2023-21561,0,1,000c6a115dced77d966b97b9228e49bd182563c3f1bee3c1b96a4595e6110480,2024-11-21T07:43:05.353000 +CVE-2023-21563,0,1,8647f76a4cf7e97e1278dc144ef078ba34a49606f1e90ab844aab0afbe8ebf22,2024-11-21T07:43:05.547000 +CVE-2023-21564,0,1,d3c1243a5561a27d711c621f136b9d2cc9a2a98bd7c8b2b2cb0d822b8607977b,2024-11-21T07:43:05.687000 +CVE-2023-21565,0,1,eab940f0a29d21b16498deada1c3a84762f4b642e35de940abd7b77e231144d2,2024-11-21T07:43:05.803000 +CVE-2023-21566,0,1,5768cbe3e0b312ffcf09c6aadf7fb52648171dc27bf9249b4f1d66537957b3dd,2024-11-21T07:43:05.923000 +CVE-2023-21567,0,1,bcc27d4fc1af8c786bb37d2652bb5ce245d15d10c6e71a6a639daad8e06e1103,2024-11-21T07:43:06.047000 +CVE-2023-21568,0,1,15eb4ba0bbc6c187526d2bc36ca4af77f6dced6375fa8a98e297a662c744b045,2024-11-21T07:43:06.167000 +CVE-2023-21569,0,1,edbad24a453f03d543d1490e915d3bdb8d0dacc7d0f607a59bd985dd6dc56094,2024-11-21T07:43:06.307000 CVE-2023-2157,0,0,83b41c36ae466de262ff181b4a36d36aac22dd0e160799cc0120741cff68f365,2025-01-07T22:15:29.647000 -CVE-2023-21570,0,0,12d9133b308351c5314894481afa1a9c3d69fb7d36d6f6fe2e1201a1fed2b6db,2024-11-21T07:43:06.430000 -CVE-2023-21571,0,0,08ca5c4925fa3101f176929345187173e682e2dbe9bae34d43306545519ed0a2,2024-11-21T07:43:06.547000 -CVE-2023-21572,0,0,8a990d13e7e7225a4ea34e6669638dea7280e14c6d6971c32d936fd6550f5052,2024-11-21T07:43:06.670000 -CVE-2023-21573,0,0,391853ec161050fc27190e98800e1067c99342cdea4eae9bdb4d8df12d16ae2d,2024-11-21T07:43:06.773000 +CVE-2023-21570,0,1,5513de701368170e069c9273fb128549835b8bbb02efef2dbf9b1bbd398ff81e,2024-11-21T07:43:06.430000 +CVE-2023-21571,0,1,fd8bd021aa728124b9d4da285837619600d2b7edf83903f0871f2e65947ee926,2024-11-21T07:43:06.547000 +CVE-2023-21572,0,1,1646ed2d1a0546e4f61ead416538abd121a8ed83da5855a3c97ac3db74e03b6c,2024-11-21T07:43:06.670000 +CVE-2023-21573,0,1,9a5a3ab85a9a185f17e996336c9d4dabc21454d76d6d9da728a180da76c0e92a,2024-11-21T07:43:06.773000 CVE-2023-21574,0,0,5b9d604920bda0609b7a46cddc62cee02f2205c62f49b2cc8908c9236210243e,2024-11-21T07:43:06.893000 CVE-2023-21575,0,0,04f15b4233f6cec89c5c6ff06aad7aac788546ec64584d55d7a43f801bd6c26b,2024-11-21T07:43:07.020000 CVE-2023-21576,0,0,5f6f97355a9e4386f8437497841d58a47dfb3df972a6058095e48b96c9af4d0a,2024-11-21T07:43:07.143000 @@ -216497,161 +216498,161 @@ CVE-2023-21670,0,0,2ee13d35132b2fa343bd06939813af865a53d3dbaa56ad6fbe5c4e630c2b9 CVE-2023-21671,0,0,89ede1df7f9893229594681477c80e5a2fcd551d29fdfa16b7f55494cf3e3eaf,2024-11-21T07:43:23.660000 CVE-2023-21672,0,0,26152e26b36e1dd84fa2d27ca13d0c243f834ffc6cbce77755ce66e96b9d4940,2024-11-21T07:43:23.830000 CVE-2023-21673,0,0,0785ce600ff2c554266233cbd91282a629db79eb3f2c9adfa3277a33f74dafd6,2024-11-21T07:43:24.007000 -CVE-2023-21674,0,0,2cc70cceb1a03d5c1c7918777ca94c3044a77b5125eedd348c03bc0576589652,2024-11-21T07:43:24.307000 -CVE-2023-21675,0,0,c6064af67ce3346e29b3fa90d60ccf1f113e5ddf98bb133d41aee70809e037a8,2024-11-21T07:43:24.460000 -CVE-2023-21676,0,0,4e5288c0cfbd27a4a16fa7c7b28cb5f0b231ff4bef6593a6b6f6e1666a685d12,2024-11-21T07:43:24.610000 -CVE-2023-21677,0,0,175542e63c2638c0531258df1d639d8078469a1e99c564762bbcc4cd08c39042,2024-11-21T07:43:24.737000 -CVE-2023-21678,0,0,0e7f57de03714d30d4ba327693b34b24752b7ab1132d5e5a4c910cbeb53e9b5f,2024-11-21T07:43:24.870000 -CVE-2023-21679,0,0,96d7be39b834fa0b28a70c502ac5b85edfb87b3b04eb4d529bff969878fdd62c,2024-11-21T07:43:25.020000 +CVE-2023-21674,0,1,b7e4d62f93e2336d25e066189ce3b131bf11cf5b23a4868a6e9ae51db28eede8,2024-11-21T07:43:24.307000 +CVE-2023-21675,0,1,e85b87b77d14107bde80b3fe4f2feab9f6281ccf5d667ed0e8cbda03b508fab6,2024-11-21T07:43:24.460000 +CVE-2023-21676,0,1,7e011e7ff082b113dcb6c262bce6cbf392b9a3cb07d1729b8d69cb58bd692897,2024-11-21T07:43:24.610000 +CVE-2023-21677,0,1,253e07a3eb512706504976018743c4669311057f8c1d5bfa43bd25f09d38d095,2024-11-21T07:43:24.737000 +CVE-2023-21678,0,1,d9098186e0f62d59dcc7f67b945b60def87e39d620cbeefb3ba572c14b4498c2,2024-11-21T07:43:24.870000 +CVE-2023-21679,0,1,a7ff3c2c4cac828b3ec95ffc75ea8029b9ddbfa74cbb62ec8fcdd828ccfce931,2024-11-21T07:43:25.020000 CVE-2023-2168,0,0,7b1933249567dd474a29b74d030d776154122f86bb0db2c0cb9e0693b24f1a36,2024-11-21T07:58:04.183000 -CVE-2023-21680,0,0,127a79139f916af6096a5891f90cdd84c757b9e61427209ec34298ec8b904ca7,2024-11-21T07:43:25.170000 -CVE-2023-21681,0,0,8ecc9024339a1c1d437d297dd9873658283d9acd43f964d01ed2910e369d3966,2024-11-21T07:43:25.337000 -CVE-2023-21682,0,0,2c0cd4ed2df499329f18a678ba711b5d619379f7b5b664e3c588d145a714c265,2024-11-21T07:43:25.487000 -CVE-2023-21683,0,0,dc1c5fa351edbf7029f385a9434880ddccd0b252bac8405ed9cf81be0c71b8a1,2024-11-21T07:43:25.640000 -CVE-2023-21684,0,0,a4d890f2dac201cb4487c665657ee802d923d94ca23893c2ece5a7e4a0052b09,2024-11-21T07:43:25.780000 -CVE-2023-21685,0,0,ef7d8e1ccc588a8b817472356b73c6443365b1528d3ae1c26fb428cf2ed612a2,2024-11-21T07:43:25.930000 -CVE-2023-21686,0,0,d4b7daf5ebf4dbaa6889d0d28e32899e8f9ad59f95bc49614eda95fa1c9f8d08,2024-11-21T07:43:26.077000 -CVE-2023-21687,0,0,115f41be95ef40db7f35fe63c3f4dee9736cbbb683aa59a8c04095a145e04e77,2024-11-21T07:43:26.223000 -CVE-2023-21688,0,0,a4795099285e4e434bba7b85d2951c9882e4d7fc88c25c3a610bc6dc276aa278,2024-11-21T07:43:26.350000 -CVE-2023-21689,0,0,f6d9a020feb0030adbdfac23f39ef116311bcdd73c7c88b9181102ca78cef237,2024-11-21T07:43:26.500000 +CVE-2023-21680,0,1,07be7e1567040ccdcd2664db97b3f510b2c32ed5ffc814919d6ce52686fce89f,2024-11-21T07:43:25.170000 +CVE-2023-21681,0,1,d5907f53b73064d81948c57851cbd7f010908d7e0075ef4dfa4a7d7036569407,2024-11-21T07:43:25.337000 +CVE-2023-21682,0,1,3a40527a9a2bf72073ffdb99c7c42e5a4af86cf7c05971b5a03ed4f345738055,2024-11-21T07:43:25.487000 +CVE-2023-21683,0,1,4c4ff3f71362c05006f96a50b9e7bea9fb47aa2a3b28c2f91fead1567ff0a6fd,2024-11-21T07:43:25.640000 +CVE-2023-21684,0,1,f7f1c5138b67290102de3bdeedb70fb5e5b8530f2e0a57b311a2118ce6c48346,2024-11-21T07:43:25.780000 +CVE-2023-21685,0,1,032dc18c4e8fdce7333d9b3955d63adef018f0ca025371a26cf2a81be8098808,2024-11-21T07:43:25.930000 +CVE-2023-21686,0,1,ef68f0e00fb66dde4ce26c7b5b28bd5c5faf380746b6700ddbaf66257c864a64,2024-11-21T07:43:26.077000 +CVE-2023-21687,0,1,7458c863f0374786fb28f34e7dad253bc7c8d83dfb322f350d9d5517b1783994,2024-11-21T07:43:26.223000 +CVE-2023-21688,0,1,0b83470ca0b3fe6e3034de33b632f2c27434beefeb0edd5b5616c1be239f553c,2024-11-21T07:43:26.350000 +CVE-2023-21689,0,1,9e223c869ba56f27346107b89f195f2780fa698a417f616707364e5317178abe,2024-11-21T07:43:26.500000 CVE-2023-2169,0,0,a9822b95e63c612fc6baf060ef93caddcf2e1776ebd3c24c28beee6f2307fc71,2024-11-21T07:58:04.320000 -CVE-2023-21690,0,0,959119df720aef8ccb28a4def505352dd0c7c08f88a6d4529b9510814d36f376,2024-11-21T07:43:26.643000 -CVE-2023-21691,0,0,bb10be1472fd797eeac661429184d2addd8377c59a14abae2580fe0973f2c368,2024-11-21T07:43:26.783000 -CVE-2023-21692,0,0,929678f705757438ab19f3c5f5186e376a189b21a36fc9475f6bed596ffce346,2024-11-21T07:43:26.927000 -CVE-2023-21693,0,0,dabff197cbd74ed38ddc407c95b810f9803554418a91c69678b0858acc27a58d,2024-11-21T07:43:27.097000 -CVE-2023-21694,0,0,99fdb84a98a7e5f1dbffea13a5e5bf7f7c7bdcfb4d34a5dc6fc959815545da96,2024-11-21T07:43:27.273000 +CVE-2023-21690,0,1,623a0993173783d95232be680de2b73e2d8ddfc24a975e81e08621312653ac36,2024-11-21T07:43:26.643000 +CVE-2023-21691,0,1,26ba247f6247f4e2dbc8d5b802d8c66a4b43ea6e45e7979bbb82d231e93cad26,2024-11-21T07:43:26.783000 +CVE-2023-21692,0,1,a7bce2f38c6c057b000addcb57058b14ebc4fe72db510fa5b709e35501a144d9,2024-11-21T07:43:26.927000 +CVE-2023-21693,0,1,a8a05caa0857c7e202ef843785f74e5459cff79c3f901527d9463896a4d77f35,2024-11-21T07:43:27.097000 +CVE-2023-21694,0,1,7b26b73acbad9d49d9a05a06a5d72f333b15212ccf0b78681708146377f531e8,2024-11-21T07:43:27.273000 CVE-2023-21695,0,0,64cba5812e46a285dab0042a02b5464c9b546efb47f178f96f7a9aa121c00689,2024-11-21T07:43:27.453000 CVE-2023-21697,0,0,6d5ba1ae96d9bf1bc31c4e33478ada7e2bf74ae2fa91c4f50728d0c19528ff74,2024-11-21T07:43:27.593000 -CVE-2023-21699,0,0,69958f65c8c5806caae51e9ba146a49bcfe7b52adbee670fa7d608da42941158,2024-11-21T07:43:27.730000 +CVE-2023-21699,0,1,0894d80ceb7876b3b3b40de33539cfb902ddf6a384d0630f774e1f3f225390a3,2024-11-21T07:43:27.730000 CVE-2023-2170,0,0,301b7acf5f7f2769c72773d345173f46b48671832623dd15e10063d34c300c39,2024-11-21T07:58:04.457000 -CVE-2023-21700,0,0,2765a994c78fff0b820a407a715831bee8fee9cd29735fe30fbe9708d9370bdb,2024-11-21T07:43:27.877000 -CVE-2023-21701,0,0,d23b2adbe5bf5e9b6c0468355d365011064c2b103a3f50efff338118085a386b,2024-11-21T07:43:28.017000 -CVE-2023-21702,0,0,aafdcdd2221586a61a740cba717f96d51abee1360a1fbf08ef55dd22558a1ae4,2024-11-21T07:43:28.160000 +CVE-2023-21700,0,1,5e84a767ae8c26f724ab28f70037e705ce97ec3bb44154a10938ee99935d98db,2024-11-21T07:43:27.877000 +CVE-2023-21701,0,1,4a1334141dcb27df478df748dae82e605ae3d09edf82d61b0e5d3e91d20525d4,2024-11-21T07:43:28.017000 +CVE-2023-21702,0,1,7bdcf79b22532f9c87e3c9857fd61067c549978a4ae48050b803e911a776f52d,2024-11-21T07:43:28.160000 CVE-2023-21703,0,0,2d150537f9e20514a5d44e5c722107f9d97afd258fe64c1f266bdb617d017285,2024-11-21T07:43:28.307000 -CVE-2023-21704,0,0,4d852ab42de69dbe397e6331511e51835bed85cf709540d1c9d88180c5bb76d6,2024-11-21T07:43:28.430000 -CVE-2023-21705,0,0,35671842a750dd533087f2fc4a43a8f26ebf534e0f6cdd85658d420e03c4411c,2024-11-21T07:43:28.563000 -CVE-2023-21706,0,0,0fe428843b733220b0da6ab83b81f9c5e7cd5a17ba58f855775dcffc444dbf76,2024-11-21T07:43:28.687000 -CVE-2023-21707,0,0,6bcca2d8bb6ab11c82550385e838e5b018ddf09b20bda0fc8b515aaa851ed58e,2024-11-21T07:43:28.793000 -CVE-2023-21708,0,0,31c12da37575dbd9d22838bcd8b0778ef86a29f06ae43f412a0424e3c0116db4,2024-11-21T07:43:28.913000 -CVE-2023-21709,0,0,0668b35767ca30e72f4e2389bd878ad3dcaed3a042e487fbeb55131745ed9fa2,2024-11-21T07:43:29.080000 +CVE-2023-21704,0,1,5f72619dcceff359195d078262d9520f385ec393d064d93b1ba9315aecd4d7ff,2024-11-21T07:43:28.430000 +CVE-2023-21705,0,1,345b34d728f37a11673de774bf2c9847ee8f76ac23926beaff7244f0c82a1b83,2024-11-21T07:43:28.563000 +CVE-2023-21706,0,1,83dbb6c64697eb7db968ddfa9ef023f7e6d55d11373b106aa406dc35bcc30860,2024-11-21T07:43:28.687000 +CVE-2023-21707,0,1,ceb722c7b38fb777e28a2cad2551a6141fcf313cf4dcf9135c2ef8b27b869c63,2024-11-21T07:43:28.793000 +CVE-2023-21708,0,1,1e3bb3893e9144d963a37f81d42aff70e00b3b7b51c980ec2cea4f741a19d533,2024-11-21T07:43:28.913000 +CVE-2023-21709,0,1,66c22ff1db7a734c305692545225b693ec58b505d71a564431a8768bb940d134,2024-11-21T07:43:29.080000 CVE-2023-2171,0,0,5b78d97977da023d095afa5a8fe272028473e0a41920a915372503b91c51381e,2024-11-21T07:58:04.587000 -CVE-2023-21710,0,0,db17b6a96969b95794e89ba9da7c1086951e59524786220c86db0ca2fe03b828,2024-11-21T07:43:29.213000 -CVE-2023-21712,0,0,ddd55b1322030e52f18af851d35f8b2f2a319fb6da07ddaf14ffc1783975d3b4,2024-11-21T07:43:29.337000 -CVE-2023-21713,0,0,15d8dfebba5bf5bedb8ce85fb30c929657895402aa9db9f1cf03abccdb6236e7,2024-11-21T07:43:29.480000 -CVE-2023-21714,0,0,a9c245039d8c2784d2a89a85951fd565563212befdd902e683de102abbba0b55,2024-11-21T07:43:29.610000 +CVE-2023-21710,0,1,46cb73bbae0fde737c406113b547ec1e56542b60dfc41df429c6d6df9a100dca,2024-11-21T07:43:29.213000 +CVE-2023-21712,0,1,60e3ef1ca88f29bdb619d8594e0905393083608a7f4615df3f488ed3c5afbfa1,2024-11-21T07:43:29.337000 +CVE-2023-21713,0,1,433d7cc04f19f3fb1fcf71108ffcbcc5954fe0261bf7262cf2e93c999bf1ac85,2024-11-21T07:43:29.480000 +CVE-2023-21714,0,1,a826bef743d768f3ebd08bf088949ea45f5b963c3a0d06e84b06f187d376b633,2024-11-21T07:43:29.610000 CVE-2023-21715,0,0,c62357404c14ad76670202c27b94e1078a5bfcbe605604d7490f175d03b91925,2025-01-01T01:15:19.397000 CVE-2023-21716,0,0,ad0f14110c9c94a0a58aeed9fd7dd6b2c2c61bbba9c251e02ff545f237448e86,2024-11-21T07:43:29.853000 -CVE-2023-21717,0,0,ff4c66012e71be7c441be66f8b8425964bfb5534f4539ffe9ddb1b30ab5a3a8d,2024-11-21T07:43:29.993000 -CVE-2023-21718,0,0,882733da8adcec0074a8fae42498ba701d503eaa04f386af3217021a84d63d10,2024-11-21T07:43:30.117000 -CVE-2023-21719,0,0,5e06cf1b59f8b00963de9bf9d0c49e9b30eaaae075ed439735f1a029d6288316,2025-01-01T01:15:19.883000 +CVE-2023-21717,0,1,5d705bca19752be9d11d65ce9f294a675e0c7c2df02156816b58f244babbdff8,2024-11-21T07:43:29.993000 +CVE-2023-21718,0,1,c9cb58903163963e0ff91d227721f5a6f31d7c877cdb3900ef3f4e255ae68d11,2024-11-21T07:43:30.117000 +CVE-2023-21719,0,1,6bf855c0325c540cf5651a8f35de080cd8ed66ade29e6c11d17fb04757949e00,2025-01-01T01:15:19.883000 CVE-2023-2172,0,0,b692d9bcc456a5c1dda926a32bf1ec3dd5514f32c3576a77142f581d1744f846,2024-11-21T07:58:04.720000 -CVE-2023-21720,0,0,2e3194616addda3456ce9f6882c315035a7fecdc1de6d22ebd04ff2d6921450b,2025-01-01T01:15:20.017000 -CVE-2023-21721,0,0,9e8139d437afc088f85520bdf157c3bd0fc53b96cddc2644a76e974eda43430f,2024-11-21T07:43:30.490000 -CVE-2023-21722,0,0,da54f0e2a312e8a8274dc038616c5508020733ab9fdbefb172a5e8f8f62d5bb2,2024-11-21T07:43:30.603000 -CVE-2023-21724,0,0,fba732cef2da74efe3039c4e9d49464821fce8141d0ee4c1077e784e66dc8845,2024-11-21T07:43:30.767000 -CVE-2023-21725,0,0,63a36221d505c9d06b4fa01abb287edf66b32f58ba5d73be9f29e4378bc6a15a,2024-11-21T07:43:30.890000 -CVE-2023-21726,0,0,a3b352afc702774542b2f47b2c983278986b2f88ac32e302ee81102e68e05557,2024-11-21T07:43:31.020000 -CVE-2023-21727,0,0,2a01793039dc1a54bf9adf46a011dd91f20b6692fa123e73a781eb24c197aada,2024-11-21T07:43:31.180000 -CVE-2023-21728,0,0,c3826692165935562cc1e7e41d829bdc2b72be3270ac1f946441040c3fd2afcf,2024-11-21T07:43:31.347000 +CVE-2023-21720,0,1,23a004a91d4f53c918e14fb5d3f548a63b17913fe196a14cf34c80a5209c1f3c,2025-01-01T01:15:20.017000 +CVE-2023-21721,0,1,df46aca9340b0d535ccdd066275fbff36c6f99a481aa893df56abe263edcf234,2024-11-21T07:43:30.490000 +CVE-2023-21722,0,1,e1861e4746a1629c7e2ccb6d2385a2ba86097914bdb8008016ec270425255e74,2024-11-21T07:43:30.603000 +CVE-2023-21724,0,1,d5b8e1df28b42fc089ef5d8e4402b71932009d652d406f9a992239857d234213,2024-11-21T07:43:30.767000 +CVE-2023-21725,0,1,2f70ad880a4a014c5a41c0f02c6c683825e15003ba7de45abb4e495e80461952,2024-11-21T07:43:30.890000 +CVE-2023-21726,0,1,0a9d02bbc7ccb48511e6902b8e1c2334d6d3e6f032414d3c4f398f25d499073c,2024-11-21T07:43:31.020000 +CVE-2023-21727,0,1,8567ef451034a6649eb5859cc9b50b77fb6481730bd3fd9edcad7c7dc84d1b05,2024-11-21T07:43:31.180000 +CVE-2023-21728,0,1,893c421689a7abcecbe337ed33ae539bf82a82d46c26db45cf84f6f60485b61a,2024-11-21T07:43:31.347000 CVE-2023-21729,0,0,7d7486f8c7ed593134a6972b4f814b0e726c298a85bf3cf309434a00c5149687,2024-11-21T07:43:31.507000 CVE-2023-2173,0,0,7b9d50526b2772c973845121690999b75715e5043ffe076c1e5d7fcb855d0da9,2024-11-21T07:58:04.850000 -CVE-2023-21730,0,0,1f00e03ccbddb1eb4c3ae9d5cc31040cceef8cea42ec5d846ce67e739da628b9,2024-11-21T07:43:31.673000 -CVE-2023-21732,0,0,00a8f7ac17193cce6eb7edaa67d053a9e0ad430da28d117298fa716f2e149ea9,2024-11-21T07:43:31.830000 -CVE-2023-21733,0,0,8e2c1127d459c7e4f5ed0a4d9799c6611567f6f325f90b68b8a35f4530d11360,2024-11-21T07:43:31.973000 -CVE-2023-21734,0,0,9eed00dd937f6a9ded66e767dea72816f956420b47a1f4407a550f7efa801cdc,2024-11-21T07:43:32.107000 -CVE-2023-21735,0,0,ea069ce2ea53f41eb143a2df0bbfadab38767093282e3542e02ca9e858b65adc,2024-11-21T07:43:32.220000 -CVE-2023-21736,0,0,dcac10e538aba140dc525f3a201bc97ca2d5c5bf30d1a8845fec21c147dc409e,2024-11-21T07:43:32.343000 -CVE-2023-21737,0,0,6a5644af39f0be347d4e4d2a76bb56757da80e43ab4e5d35e00b80bac5e17e70,2024-11-21T07:43:32.473000 -CVE-2023-21738,0,0,9c8669e4d87aba0a4ce97e03f4a625d9f3d7736c2b274b9542f8d5adb6d4f6db,2024-11-21T07:43:32.607000 -CVE-2023-21739,0,0,13504764c061b8bf7c9e5c2e981d3e2d13709229714223810499d7f589f75a5d,2024-11-21T07:43:32.740000 +CVE-2023-21730,0,1,2e2d52f453252a572be2991ff7dba1adba2c32649439b1db3911ed1edf3fa12f,2024-11-21T07:43:31.673000 +CVE-2023-21732,0,1,0644dd6a7448dce3065b05452dd789c4eabd53be8fac1c70ee5d211a53d55d60,2024-11-21T07:43:31.830000 +CVE-2023-21733,0,1,e9ef7a0ba3c756fbdc70ba3baa0f2c10ad736d1ce0e2257f5e4fce91cf96945e,2024-11-21T07:43:31.973000 +CVE-2023-21734,0,1,b88e2ae1d4712923cf8453549113d552b009c8f2883c4ab9afe1d8de53b32893,2024-11-21T07:43:32.107000 +CVE-2023-21735,0,1,b35d21558ba7720e6ef100b025c0fd8ffbdd386b8bb9bbe32d47e52792a99148,2024-11-21T07:43:32.220000 +CVE-2023-21736,0,1,b0b8c000b202bf97bf6c342b2663cbec6cefd22deb1cc9b198c4b980f6d4c822,2024-11-21T07:43:32.343000 +CVE-2023-21737,0,1,d61caa29f887301d898044ee6651dffcae5af82d926e729882496824f80c4514,2024-11-21T07:43:32.473000 +CVE-2023-21738,0,1,8bb12903332d365847192078a6fa61f95c2d7ca376e74532d476ec93fa177b4c,2024-11-21T07:43:32.607000 +CVE-2023-21739,0,1,59b6bde9dfc2e260e55665c2e330f3f792a18a75788b131d149c9fe2968c2e02,2024-11-21T07:43:32.740000 CVE-2023-2174,0,0,831f5d4ad7634bc5898111359cb5a81f8c7d5e10655fb1ce18a6a999a247d72e,2024-11-21T07:58:04.997000 -CVE-2023-21740,0,0,3c0238f5a2dccf7912df96885312cf2c7e46360cd311f130e43ada08cdabea7a,2024-11-21T07:43:32.917000 -CVE-2023-21741,0,0,8e6fc80d4cc809e9c60cd6a774f84e9eab7ab804946af6df076fd6785c1d2824,2024-11-21T07:43:33.080000 -CVE-2023-21742,0,0,dcd3ea100bcee850f7cb00fbccdb30f7bfdc75a897c1bb2ef798a6246fbd4fde,2024-11-21T07:43:33.203000 -CVE-2023-21743,0,0,f79f9aa7ded1c4a7b20ae46ecddc0419199193ca9fd56f8a2889360a1ded77a9,2024-11-21T07:43:33.327000 -CVE-2023-21744,0,0,98318f6cc26162313743f2b83286a59d52806d480b610ae7fd29e4364b4e3ee5,2024-11-21T07:43:33.447000 -CVE-2023-21745,0,0,5db4825a2cc2a9b933f7dca380b9aa3189dcfbfde4614f923b9778f87e0ac0de,2024-11-21T07:43:33.567000 -CVE-2023-21746,0,0,e93636d18b57a790c7b6d517436be573097881a8f73c888f4b997b34f12570f0,2024-11-21T07:43:33.687000 -CVE-2023-21747,0,0,fd5dc843d9cb1edb0918ff69066a2e3a5de1f0eb7a580bc2c5849920d3f1b480,2024-11-21T07:43:33.840000 -CVE-2023-21748,0,0,02d05b1e7751518024db3920ed2f170e97d3b53ffa1856e3bbd20b4308065cc1,2024-11-21T07:43:33.993000 -CVE-2023-21749,0,0,9bec24c689c0e64168b95d5e4320a5042f27513684ceaaa057b32930352cec14,2024-11-21T07:43:34.143000 -CVE-2023-21750,0,0,22c286ef8a5222f87e3cfcde530a0d6e5b98b03c6a7cf6f4cf8cf2a74abcd499,2024-11-21T07:43:34.297000 -CVE-2023-21751,0,0,8549e6ef8fc1e3742f754cfb62fd8fc060c10a38ab4e23f8f59d27c525189aa6,2024-11-21T07:43:34.450000 -CVE-2023-21752,0,0,3195b9d9a612df6dbc132718e3aa8b840a710054d0d9595664887aaf23d13155,2024-11-21T07:43:34.577000 -CVE-2023-21753,0,0,4cd8128e57a44d40423af3027785ea3e53a19b7954df507ee1a86c327967361b,2024-11-21T07:43:34.707000 -CVE-2023-21754,0,0,6b660f24705ecfc8222f750a599fd8ecaf1250b2e116846cb2b3079973cd007b,2024-11-21T07:43:34.823000 -CVE-2023-21755,0,0,3f9416e637d5488448b7ed681ccb800154237b0b8db2e3c1846c4e3d92bf10b9,2024-11-21T07:43:34.983000 +CVE-2023-21740,0,1,c7e43faaba233e088593217caec368e0807cbd2bbf906cceea1462ba8c5eecaa,2024-11-21T07:43:32.917000 +CVE-2023-21741,0,1,d98afc087ba64459fc87eca2a5f07a618c33411352f3eb9f29e7028c0ba1265d,2024-11-21T07:43:33.080000 +CVE-2023-21742,0,1,0c32c342d249de98c28901fa2834ed5da36ffb1c0b47d4f8f0d0eaf73026e054,2024-11-21T07:43:33.203000 +CVE-2023-21743,0,1,886482f3852d664b1c4f034e1d7489753d3aeb904d2e79baee6e69f6262880f5,2024-11-21T07:43:33.327000 +CVE-2023-21744,0,1,c6ba74d2c9c8f110cb861208be777dd4a55dfcf832536d958b11a22d18c44b7b,2024-11-21T07:43:33.447000 +CVE-2023-21745,0,1,d773f5b76d70066fba3ad93190cc11cee5540685eb5131558a28765220d97282,2024-11-21T07:43:33.567000 +CVE-2023-21746,0,1,ef3b909227f80491ca080646a08ba47a1430112a02eec2c8c8a8d43a3ad9efef,2024-11-21T07:43:33.687000 +CVE-2023-21747,0,1,3a1d544245781984088c2e9fc8541ef257f1cd7b996ed2f3355b53d82c2bfdb8,2024-11-21T07:43:33.840000 +CVE-2023-21748,0,1,3fc9bb217561a2093e69a6ca0e9a0145923604539ebd959188dafa2f538fef8c,2024-11-21T07:43:33.993000 +CVE-2023-21749,0,1,c5192e03873c45536cd3e87f4dab326126c0df4271bc4e1d27b057a364afb3aa,2024-11-21T07:43:34.143000 +CVE-2023-21750,0,1,2380ff4beb679e94b60bf306b357884994faf9c4f827c919170e8e9372d5d7d0,2024-11-21T07:43:34.297000 +CVE-2023-21751,0,1,e3cc21e4d41d96cd38d71b0676c7c194c0ce6b1c18c7463cd354bba559db9118,2024-11-21T07:43:34.450000 +CVE-2023-21752,0,1,729e385f0152acbc7731dec1ef80500f7289e66edf610377985cbe39bdaa237f,2024-11-21T07:43:34.577000 +CVE-2023-21753,0,1,09e69aa4ea2d4fb3a2022f20e0dc3dee685c0de6576e4db624540087d5a1349f,2024-11-21T07:43:34.707000 +CVE-2023-21754,0,1,327ddcc66d9878e04b8c2d2fe90b1da25a4cac5f2400352183d79bd50c628b8c,2024-11-21T07:43:34.823000 +CVE-2023-21755,0,1,56cff2c87043237223f24cb66d3e51e26698cb17d6db7cc1120f7baaec3d210b,2024-11-21T07:43:34.983000 CVE-2023-21756,0,0,9dbb3a2c22c7a3026ad19283ae6d3286b8749c765cce2574d6d4a6793cbabbbb,2024-11-21T07:43:35.113000 -CVE-2023-21757,0,0,2ed54b3b6541affc8b40de96285b1c8f5f10322bce781c5f4c922a43ebafe0a6,2024-11-21T07:43:35.253000 -CVE-2023-21758,0,0,514d82fb95646df23306357fea215d637f1e9207feca4faa6e020037603c6f4e,2024-11-21T07:43:35.407000 -CVE-2023-21759,0,0,a75a26215beded9e47f7f3105411e9a37ede03397de8f74e3ee01b61fd3ab8ac,2024-11-21T07:43:35.543000 +CVE-2023-21757,0,1,0b960a68762fed1b432ffd29d0cd80ed87964ea6dc18ac5cb1b068f6a662ad34,2024-11-21T07:43:35.253000 +CVE-2023-21758,0,1,dbaaf7c0a5b455a23217959fe4226d87d322e9dcce16ee9a028aa306fe715d30,2024-11-21T07:43:35.407000 +CVE-2023-21759,0,1,3756286c804000b2604befaf099d658a53d5d43cec03ec0d504dbcc3d2159067,2024-11-21T07:43:35.543000 CVE-2023-2176,0,0,ec78bd8f3f6436af0257eb7474d99b8c2f41962ada84eda9c22d6e394d8264fa,2024-11-21T07:58:05.120000 -CVE-2023-21760,0,0,7d6a6587ae21acc5367b570033a66083ba2361b06f9a0832007d08ab5ce0bc07,2024-11-21T07:43:35.670000 -CVE-2023-21761,0,0,1c7542b69ece25e92c9c3cafc7df74bcb465920e3ccfa94e07919d73768c74a8,2024-11-21T07:43:35.817000 -CVE-2023-21762,0,0,70e775b5aa4b9ce01bad8ec2f8c6c24b1526b6be4283afd0f8e1ebec2efe0837,2024-11-21T07:43:35.933000 -CVE-2023-21763,0,0,b283dc4b96df2272e077f53be0da6c15d9c6f5b6d1214883738c321729150ea3,2024-11-21T07:43:36.043000 -CVE-2023-21764,0,0,db548fc98d326a4794744f2352908a3c5b9ee1fe994a95a63d19cc098d7c556b,2024-11-21T07:43:36.157000 -CVE-2023-21765,0,0,078e109f908cbce06e82b987970caaad40744b278632de9007f2db537ab01885,2024-11-21T07:43:36.273000 -CVE-2023-21766,0,0,a272de879606aea5cf4e50e66cac63f9d18ff0c80dc6e2c2ec6660bbaadc579f,2024-11-21T07:43:36.423000 -CVE-2023-21767,0,0,a3d680ca65f8a593140fa96cf23a2837d1b3cd099c05bb0d0e67c0d7735c4520,2024-11-21T07:43:36.557000 -CVE-2023-21768,0,0,c3a6a4e28df84c2e0fe9dff7a44ac5698648eb9a8921a74f8b4e04a9a4ef2d72,2024-11-21T07:43:36.690000 -CVE-2023-21769,0,0,8097c6e3b2211a79e414e4c4d67f430dd4289886da06046b219c985f1b0d0017,2025-01-01T02:15:12.437000 +CVE-2023-21760,0,1,1595c42d81722ad21dd38f03492a597448b273b4d98389633a69f64aba2a1e35,2024-11-21T07:43:35.670000 +CVE-2023-21761,0,1,3ae488010d480f9b5f10ba416762ac438ed2be668ee16283efe10514ba7bf469,2024-11-21T07:43:35.817000 +CVE-2023-21762,0,1,feb8bb0276dfd10ff7e32a8ad80c6e99842097a2c678ab76bfc63ff70ad3897e,2024-11-21T07:43:35.933000 +CVE-2023-21763,0,1,d24fe38d99c2b9e7f58684be3770fde06439b093c1490ea1c97691b9be799014,2024-11-21T07:43:36.043000 +CVE-2023-21764,0,1,dcec7b4b9727cc665f064a149614970bfec6cee0b67116dc7d159e417522331d,2024-11-21T07:43:36.157000 +CVE-2023-21765,0,1,1eb8ae21c3afb6d7ef3dcd6a7d953035ee3ffc35c800bb9e32a840718349f7ce,2024-11-21T07:43:36.273000 +CVE-2023-21766,0,1,3ae78d62c4a120a7a0d3c73ed26f87e68abdb1fde3dc73c26047c0a3e52be97f,2024-11-21T07:43:36.423000 +CVE-2023-21767,0,1,adec4fd3947a70d0d838cad74c7e8dd688899131ee5acdb70152dac3a243b9ec,2024-11-21T07:43:36.557000 +CVE-2023-21768,0,1,5728348bde56f12be5eaef217a5a6282eaeb75d1d9cf5e45d9f1176e6c1ed727,2024-11-21T07:43:36.690000 +CVE-2023-21769,0,1,295e5d37a2848d42458aa7c5db7bf6dd0524079786ff8a4cb345313bf99af0cb,2025-01-01T02:15:12.437000 CVE-2023-2177,0,0,8c83e5915e3f7edb7fd22f31b99af9df44194d4021bbd405188a0984f3d08f7b,2024-11-21T07:58:05.267000 -CVE-2023-21771,0,0,196418733703151abc33fce1a77c9acda75441b10884462c1c1d8bddb722ac20,2024-11-21T07:43:36.957000 -CVE-2023-21772,0,0,3824d38f5929d8c7461005b4f3b490a26dd642e23f259208f82358cb1d38aec6,2024-11-21T07:43:37.080000 -CVE-2023-21773,0,0,7311c3764e60fbb79d9c0a5aa46356f8f69db1611e31e62079827ee68d4d6b73,2024-11-21T07:43:37.223000 -CVE-2023-21774,0,0,9242203a8438a1801e2f9ac201c417023816a3b7cc706b5fd07d374d026f1f43,2024-11-21T07:43:37.370000 -CVE-2023-21775,0,0,3ae3b445661bddeb8dc7ed01d9be7dcb7db951c15e764d61689118b6e190de16,2025-01-01T01:15:26.063000 -CVE-2023-21776,0,0,f3a710ba55371489fbec59d8e317c47b802d6035e12ae42403833e09545b44f0,2025-01-01T01:15:26.190000 +CVE-2023-21771,0,1,55ae2e0105e274985b2b5825f7918198244413a0af92c9e4a09ae15fc0508917,2024-11-21T07:43:36.957000 +CVE-2023-21772,0,1,1f96a6aa9c59106b93baea567d329fc2056f8ac58937da85c0b7cf13be2ec2e4,2024-11-21T07:43:37.080000 +CVE-2023-21773,0,1,b4887ef24fc7b4b0f101c7a33ee9d8de515838ee475e5301eba330d71388b7c5,2024-11-21T07:43:37.223000 +CVE-2023-21774,0,1,14f22e9c4f36a305f75808dde8b89d46a9cd924eb19301415d55a78cd108f3e9,2024-11-21T07:43:37.370000 +CVE-2023-21775,0,1,9f8e0cfd633cf0cccf1d0a9f8f0c04ab3ed659c79d694744a3689e183349870a,2025-01-01T01:15:26.063000 +CVE-2023-21776,0,1,d1d87666468ab2bd17e1c31c927f90e73be545fa273c66293f9e467c32d76943,2025-01-01T01:15:26.190000 CVE-2023-21777,0,0,f0cae1b4ba1c02a98e2d4cc92393375f34e2140629b9013f86810f82236976ac,2024-11-21T07:43:37.797000 -CVE-2023-21778,0,0,926a9d89d07001fa205c9c17f6ccc879586c4400789379161c370c9b9388c700,2024-11-21T07:43:37.920000 -CVE-2023-21779,0,0,f2a81bcb40ce68d405566367f3b1f46cfbc25018b3f4991dbb77ad54f80c5dae,2024-11-21T07:43:38.030000 +CVE-2023-21778,0,1,7ab56c37d51c203de3e38c103c922d4083e4190c0f9cf272cd7ab9474b9e26f2,2024-11-21T07:43:37.920000 +CVE-2023-21779,0,1,78a974494f3264657f42792173cc5c88e367079df34ae627dee714e65468119d,2024-11-21T07:43:38.030000 CVE-2023-2178,0,0,7900c8c84c5ed3d023f6e97554f9393792ed6b06e0dc38bd21f68ab89fe53a3d,2024-11-21T07:58:05.400000 -CVE-2023-21780,0,0,832d0bc0828a81a2708b8e4f9ccf59390cbb2766a9880d14e5591d1f89da7d9f,2024-11-21T07:43:38.147000 -CVE-2023-21781,0,0,5d3804042046c9d13909ca7d33cd7c3a40b0ea304db0641d1a435935ccbe6c06,2024-11-21T07:43:38.263000 -CVE-2023-21782,0,0,05db25abee72b9b9f6cdde6438f0a0de990455f56e33482e1774f24b6e7ee6e0,2024-11-21T07:43:38.387000 -CVE-2023-21783,0,0,9495e1bf863e3a3d2ffc834e6ab12627070df8ca8627769d2920fc3a151923bc,2024-11-21T07:43:38.500000 -CVE-2023-21784,0,0,035e6e22543f637abbfb8840ea8dd154d986bef07b4746e364a4680f88094e8e,2024-11-21T07:43:38.620000 -CVE-2023-21785,0,0,bb8360e7ad2fc7c293449b4086d9005a62611f340abf8230b59ec12cb33cf0eb,2024-11-21T07:43:38.730000 -CVE-2023-21786,0,0,9acf6ca88384a435da21d024737d05d2da09614e3ff38cccc81504b38a326616,2024-11-21T07:43:38.857000 -CVE-2023-21787,0,0,1e0a1c7f684e251f447b0882a4f54fef1a3d8a99af4a857fc842648889708df5,2024-11-21T07:43:38.970000 -CVE-2023-21788,0,0,41e35629a87f63923b5e1a2366ae6aa498499dd6c810edd76d923fe1e15266b8,2024-11-21T07:43:39.090000 -CVE-2023-21789,0,0,e0f1580469404579aa5c182a6a18b778be6da574c7dbac148cb8a378ed14154e,2024-11-21T07:43:39.207000 +CVE-2023-21780,0,1,d3c03ca542a995a05f762b4f4fd952070dc934a32f8248f15479c683a8f90f5e,2024-11-21T07:43:38.147000 +CVE-2023-21781,0,1,9e5168a4a8385e840f002af6e96f335d7fe34ee8e884e144e7745ffeba416c5f,2024-11-21T07:43:38.263000 +CVE-2023-21782,0,1,83dd9ecf05e6c6116b8bf10b6cd7f8df87d12e33dc6838cd0a215a996071bea1,2024-11-21T07:43:38.387000 +CVE-2023-21783,0,1,ea0a1013c5dcaeca8d6e399a1221fe1af47a9253a526c4ea3a7958675a735a9d,2024-11-21T07:43:38.500000 +CVE-2023-21784,0,1,d9bfa4db04ec70ebebc2fa116aa8fd122bce3c4f2135a3e010fffbad56b32ace,2024-11-21T07:43:38.620000 +CVE-2023-21785,0,1,8f75829f0e028846fd9ad9887294f180e76da387b9e6ee3d04a48548029440ad,2024-11-21T07:43:38.730000 +CVE-2023-21786,0,1,932220c7ddcb15104fb89c9e3e68ebb9faa5c0e9e4ff123d87c72323652c57df,2024-11-21T07:43:38.857000 +CVE-2023-21787,0,1,7be99ec9d3ca0287928b79f05fd8ca4b21ec4d1ab92ef410b8ca389b258c002a,2024-11-21T07:43:38.970000 +CVE-2023-21788,0,1,586e8bed2f43e4145c01adaa10a3d874a880283f1a4e59cebcdd371f25d998f2,2024-11-21T07:43:39.090000 +CVE-2023-21789,0,1,5114d9fd6e31a40b9cc7306f857c1ef70152619a5fa48d3714786f5983527b38,2024-11-21T07:43:39.207000 CVE-2023-2179,0,0,6b486a3a489f98aff89dae6e57518f5b0430125998818af6e464583de9a1238d,2024-11-21T07:58:05.520000 -CVE-2023-21790,0,0,037fddc36c6bc546b08f1d95b0d85fa03e46bd24cb22d28cb1fb8ace9bd45dc6,2024-11-21T07:43:39.327000 -CVE-2023-21791,0,0,119d6567f23e26b1ac56c4dcfa15e27e737c7f1e817e97eb7baca89da64713f1,2024-11-21T07:43:39.450000 -CVE-2023-21792,0,0,b8eb6d4ec979be6c96c8affb44a24b3e0ffb936bca8142f75678ef693bde45fd,2024-11-21T07:43:39.570000 -CVE-2023-21793,0,0,37f0c96316375ce5c17db1be2a1e78c609b08a320de4f86486ecebe8ed0c62d8,2024-11-21T07:43:39.683000 -CVE-2023-21794,0,0,68ce305d268c02fd522ff50b23098721a0f1be007b970cc8667d71bca4506697,2025-01-01T01:15:28.320000 -CVE-2023-21795,0,0,3e2b8a7e341ff03a8ed4df0e353feaf620b728b794464f97a875f223135887b8,2024-11-21T07:43:39.923000 -CVE-2023-21796,0,0,c064076f2178bda53181fcb809134f6a60d05805e9fe39d77a1e1aa0cbc30afe,2025-01-01T01:15:28.520000 -CVE-2023-21797,0,0,8c510ec36e094fac64f26daa6009b706496c209761c9369bbbb7a4c67f39e1c3,2024-11-21T07:43:40.163000 -CVE-2023-21798,0,0,e465dc8a281470b992e82b0cc84f6d14638c3d32fd6d379e7602b9f1bd4d3ed8,2024-11-21T07:43:40.317000 -CVE-2023-21799,0,0,9c24a9ae69aeaa24fac542b4e62ab307f4cee129b8a391d379bad967f17c8281,2024-11-21T07:43:40.463000 +CVE-2023-21790,0,1,bbfea0e558d87b03c2717255d3e5c811dd971e1f0844b973600036e2ad6b5d42,2024-11-21T07:43:39.327000 +CVE-2023-21791,0,1,118ecf5763039dd5ddd198cac11cb242ef8a9526e35d74843524710cd3bdd4e8,2024-11-21T07:43:39.450000 +CVE-2023-21792,0,1,125ad34890fe142688e3f25013ef35654f8d00e9736a23df582592c2c001e600,2024-11-21T07:43:39.570000 +CVE-2023-21793,0,1,9d598276b1ee22af7777b3c64e60212e953f9126bc3af5a3aba73f42f54c9107,2024-11-21T07:43:39.683000 +CVE-2023-21794,0,1,315c4b37a7c778e4b1db504418650187e322892d7606b1bd98638d3a2af9332f,2025-01-01T01:15:28.320000 +CVE-2023-21795,0,1,c1d9ba786ae7a3af62f29ca85c28a9f375806b466cf2bc2a0dffa744808ae1b8,2024-11-21T07:43:39.923000 +CVE-2023-21796,0,1,46ea9df62ce1e27b6c4fa0899508598812d4a3a13138697d29e6c3c61964e7b4,2025-01-01T01:15:28.520000 +CVE-2023-21797,0,1,caf33020db36bcce29f533019a9e71b5b3a000ceb1d373b108122c8a16c4128b,2024-11-21T07:43:40.163000 +CVE-2023-21798,0,1,a81bac8cbd6f7cb10269038977441cfab158f6ae25c2dfac1cf1016dc7c210de,2024-11-21T07:43:40.317000 +CVE-2023-21799,0,1,3c3d1822594d619966bb3fcbe18f22cb4ee87fb76c2bc9ed4e36fba31c7a2d81,2024-11-21T07:43:40.463000 CVE-2023-2180,0,0,b7f624be62349b96e0542877d757490c013e1a8d6416ba45d4ebcd237092af7a,2024-11-21T07:58:05.657000 -CVE-2023-21800,0,0,f581f37aa7b042344ef7197a71712eb953dfdb102b5e62c59b8a23e73b728ceb,2024-11-21T07:43:40.607000 -CVE-2023-21801,0,0,26f23a97798e473a24bebf2baa26dfafa1a4ecbab0ab7837422694aba67c3bba,2024-11-21T07:43:40.730000 -CVE-2023-21802,0,0,1859b2f5f7955583b0a89ec368b6bf057030e7bd1a6e5573599eb41b760865e9,2024-11-21T07:43:40.870000 -CVE-2023-21803,0,0,0d50a41e151abff65614f25fad0a38b629c4661602d5350f7e4eb5062b9b58a5,2024-11-21T07:43:41.017000 -CVE-2023-21804,0,0,85d98e0ec23b536f7b3867d70ab2ecf0985ac960723b3d2f89e2959881aa6fc8,2024-11-21T07:43:41.140000 -CVE-2023-21805,0,0,219de83a18e0762acf0a6ef132af64962f648c7c7f57bedf2527c5d2f6b4c9fd,2024-11-21T07:43:41.283000 -CVE-2023-21806,0,0,dbaecb789e8d2b7ee80a2ad9d41ea977f79b40bddffeb180a414f4257a2cfae5,2024-11-21T07:43:41.430000 -CVE-2023-21807,0,0,635396201d837ca96c3dcc4905c86bd02ecba4cecc4e35348fa9ec22a2d8deee,2024-11-21T07:43:41.543000 -CVE-2023-21808,0,0,e4d45bb4e51a8522cb8318acbb9a155f027cce38238330cde8b3777dcda2deab,2024-11-21T07:43:41.657000 -CVE-2023-21809,0,0,374528759f4d07a5324fad0d7f0bdb4e9df18bc9bdd0c6e74ebf7632a99b5d5d,2024-11-21T07:43:41.817000 +CVE-2023-21800,0,1,855d48f6cfe538c05b3064a92d11e99fa587b5143e29b3f00cae747080b2de09,2024-11-21T07:43:40.607000 +CVE-2023-21801,0,1,a23ec49559eb1dbdf892ff0b6359b4656365f03f6d710f9b57e855ea7a189dc1,2024-11-21T07:43:40.730000 +CVE-2023-21802,0,1,c379a51a60038b31350da2ef862997a367a87fd1de1e7c096ad0b5613c32e164,2024-11-21T07:43:40.870000 +CVE-2023-21803,0,1,91a989af59b2d4690450d96e4c9ed3b2f4395da5ac8933014150b2c05b6cf9d2,2024-11-21T07:43:41.017000 +CVE-2023-21804,0,1,cd4304da5cd37691027c9b557d8cec72d7374b3370bfe3dac9bfc2c5444c9953,2024-11-21T07:43:41.140000 +CVE-2023-21805,0,1,880722cdfcc0cfa9447280d98b08facfe33d6437d14c1c7421ff1b0978f99339,2024-11-21T07:43:41.283000 +CVE-2023-21806,0,1,eebb8ac65e654c81628bae1904ce99c8b0134d1761e8d21126f38392b9f49ab2,2024-11-21T07:43:41.430000 +CVE-2023-21807,0,1,e304911a2c3383e0e6685bc14e7b532fd9f024822ad354f0fbeeb3e4eac747d7,2024-11-21T07:43:41.543000 +CVE-2023-21808,0,1,8969834cc410680577883d9896f7cd290c760f88a814eb033074ace9e776a8bf,2024-11-21T07:43:41.657000 +CVE-2023-21809,0,1,9a87ce0d0a371d01610cd79f4a5991c37ea3da35cbf2729e09a295deed725637,2024-11-21T07:43:41.817000 CVE-2023-2181,0,0,3dfff589ddb85dbcc3428494b9538a1c11ed08eca53b99025554a32199d833a1,2024-11-21T07:58:05.767000 -CVE-2023-21811,0,0,980233baa89a81d5cd1337dcb08b2c9d33774b1e04c9f312bd3c2f3c775bc502,2024-11-21T07:43:41.930000 -CVE-2023-21812,0,0,e877c95f2b45685d8b46f59211d8ab352f81256e313bec4bb251abd952a2902e,2024-11-21T07:43:42.077000 -CVE-2023-21813,0,0,60a8d0f6e56684345709eccfe31bebff90e33859f88121cd92768e55b3dbe7aa,2024-11-21T07:43:42.227000 -CVE-2023-21815,0,0,af22fe5b75c0c3aaefb4f7f8eb68753beadc94cc6eac0410b45f223018da724a,2024-11-21T07:43:42.360000 -CVE-2023-21816,0,0,d5517f9718af7c96c89f0e704875b5f24e26e91bb90b05055aa2d7e52099b993,2024-11-21T07:43:42.477000 -CVE-2023-21817,0,0,1e52f172621cee60b5cfd29b378052558100d127c1e505a6743658f3ea676473,2024-11-21T07:43:42.633000 -CVE-2023-21818,0,0,868993bb80f35c84042454a126817fea624b69cf453bec8a10f7bcbcc865d094,2024-11-21T07:43:42.790000 -CVE-2023-21819,0,0,8cdb8efd4dfc27cba2461e6e8f4a35be1f8d4af9966c861b6f4396be31cc4685,2024-11-21T07:43:42.930000 +CVE-2023-21811,0,1,e401747b79609a1d508431793782d4e98efb7dce1b2d8173107af2a0973963da,2024-11-21T07:43:41.930000 +CVE-2023-21812,0,1,43eb16dfb6ae374bcc032e113fab5307e91361cb8ff86b58ed88f13e4346d559,2024-11-21T07:43:42.077000 +CVE-2023-21813,0,1,0a05c2a7e6895148e907398b84a757d45e5a0c72590478c46ec679dc3be95e76,2024-11-21T07:43:42.227000 +CVE-2023-21815,0,1,528afba3ac2759791a4d86bce2879abda3dbbd8ad95ae14eff41a96f118b7e20,2024-11-21T07:43:42.360000 +CVE-2023-21816,0,1,00b2c1763b1a582caf8e94055e7dedaf4cefa09c3e5f0f66fa79f046b568dc67,2024-11-21T07:43:42.477000 +CVE-2023-21817,0,1,58716c4b5ecb88cb98f06778ca824574544c9e2685b89163474f8235b77f9908,2024-11-21T07:43:42.633000 +CVE-2023-21818,0,1,d38aba7f313f25fe43f06855115444d9e6b03c6a06ea59c6835ed9a76c7263ae,2024-11-21T07:43:42.790000 +CVE-2023-21819,0,1,d95b6e7825d0b50d11d68e06a3e82a92b955b9ee052be53c567992865cbe290a,2024-11-21T07:43:42.930000 CVE-2023-2182,0,0,fc8168c62f5242f07ce66b95e264bcde0b35da8eeddf996c2436afccf21d4ba9,2024-11-21T07:58:05.890000 -CVE-2023-21820,0,0,ceb0c92d2569934897a5ec1b3dadfe5db7a79a50fbd41060278824cf68f9f927,2024-11-21T07:43:43.077000 -CVE-2023-21822,0,0,117b767418e3cb5dca5401fc972b201b93b853137ed891644ce4c4c163664203,2024-11-21T07:43:43.233000 -CVE-2023-21823,0,0,f0385ae9dcde0a5dd73229ec9dcc70527aeffd611c7eddd7188a95f7b6f1b1a5,2024-11-21T07:43:43.367000 +CVE-2023-21820,0,1,8050cf3d86ea29dc8e6b6f649bd18d71b4e09a37945d46cbb2fc167e7f560b3e,2024-11-21T07:43:43.077000 +CVE-2023-21822,0,1,d4ae205113fa77e56b6cac34370e9b520ec3fb299f26c15630d518429bb5cb45,2024-11-21T07:43:43.233000 +CVE-2023-21823,0,1,fda177ee2c4fdd83f8da353c01f169de20489b213064cc039f29c0c5afa5369e,2024-11-21T07:43:43.367000 CVE-2023-21824,0,0,23dacaa84c5db895143551171e8c953d0dccdbaa83e3af26fcbfada9c093dd29,2024-11-21T07:43:43.517000 CVE-2023-21825,0,0,e9c9d19813a0b91fbd1af08329d85c95a445c84628148dd8a10ab2f2d001efee,2024-11-21T07:43:43.640000 CVE-2023-21826,0,0,e8e3501fdd4f90cabc0c92420c90b07f3bd3a5e28d9b5107a30a984e50bb24eb,2024-11-21T07:43:43.750000 @@ -217582,7 +217583,7 @@ CVE-2023-22860,0,0,e5615e04bec3d81c417ab60fa1c1fc3ade4fa45b3627ef7e6d93fe403deee CVE-2023-22862,0,0,dadcaebacd64131ef9e81479051edc0ba41de0aeab33debdeff1ec9a64abe564,2024-11-21T07:45:32.817000 CVE-2023-22863,0,0,e74cac72684833f98504dffc53dad41465cef576e0bc1dbbb88f255db3401635,2024-11-21T07:45:32.963000 CVE-2023-22868,0,0,5225754a7cbac17a0862e4697f7578952ee08bb3a8fc285ef8a12fe85316e2d1,2024-11-21T07:45:33.107000 -CVE-2023-22869,0,0,eb460deb53531fd2a5ab4f8838af0378194892d8711f8a8a66b548386c52e87e,2024-12-19T15:41:55.077000 +CVE-2023-22869,0,1,d8ee2a6f18d0977c6324bb98f93eda29cec271f5e7b706a271ee637bfaba6a19,2024-12-19T15:41:55.077000 CVE-2023-2287,0,0,fe9c69d8c4ec8782ad5b12a5001b4af70fd8f8c7e16193925eafccfe8afefe56,2025-01-10T21:15:11.440000 CVE-2023-22870,0,0,5ec1f75eacea8442f5d839893a47e3347a333b538c029e0833811a230f083142,2024-11-21T07:45:33.363000 CVE-2023-22874,0,0,54a14c70ce82511bdae6f7fbef627022818461d69e7cfda75ea30f1a27cd0c30,2024-11-21T07:45:33.503000 @@ -217834,58 +217835,58 @@ CVE-2023-23370,0,0,e80e28dfc847d90ddfcc4f53271fde3578641b23254bda402ad324d1d97c8 CVE-2023-23371,0,0,9e9dc0873136ff23b429c4a427bcabcab6948e079c09d937802f774a61b89c28,2024-11-21T07:46:03.173000 CVE-2023-23372,0,0,7eee6bdae6e08d9f320d57c1bfbaf83ec9cb5285cf090233cc4f43506a603f2b,2024-11-21T07:46:03.323000 CVE-2023-23373,0,0,1032df50e76076126c057921858f8a43ed87811dfdb3eee8580ccc5b7679c0fb,2024-11-21T07:46:03.497000 -CVE-2023-23374,0,0,b54b901f155c771b15973db3825b82223fd31d3d9f268ac2245f57a78759c115,2025-01-01T01:15:32.340000 -CVE-2023-23375,0,0,4b74bb60b5f52578fb7d238922ff0de465a494e428382d747ddd0cd9824c8637,2024-11-21T07:46:03.770000 -CVE-2023-23376,0,0,3bcd1f84287aa496ca655b7909487b1c30c1828c428ebf246769192997e7cc06,2024-11-21T07:46:03.920000 -CVE-2023-23377,0,0,f30d55f8094e57fc7f4994d3f157c66e26a79ab12d1e206c89e4e7fffe198066,2024-11-21T07:46:04.080000 -CVE-2023-23378,0,0,6029dbe6fc13fcd1d37f277f9ce8a9c1bbe12469e184076b41e8013f6134285a,2024-11-21T07:46:04.197000 -CVE-2023-23379,0,0,ff63d96f0bdebbdd01ac72941bea16662e323169f65d2385a9e6c92eec7613e1,2024-11-21T07:46:04.313000 +CVE-2023-23374,0,1,7ae424037a8590b2d1f48cbaff8b5c6bce3b7b7d319d2584dfeddae917357148,2025-01-01T01:15:32.340000 +CVE-2023-23375,0,1,235c815880bbbd7eea58d62512a5e7221580bf11d7c0ab14180ffc6ea486395a,2024-11-21T07:46:03.770000 +CVE-2023-23376,0,1,3a63f36f93bcbf6afa75866837445b3ca63898dd9d3564a7e51dabbaae51feff,2024-11-21T07:46:03.920000 +CVE-2023-23377,0,1,8dda1f41f91cc2a6340c23ba862d5c39473b3f6d77c17404d0d531247d1dbcd9,2024-11-21T07:46:04.080000 +CVE-2023-23378,0,1,f9964ccde7b47bfc5b16a333a7343eec303c36bd28e601b63664b221d32a8755,2024-11-21T07:46:04.197000 +CVE-2023-23379,0,1,7ef6c62ff2f0caa7176d16edc40ce60ad0a5f37022e2a622af090942554e159e,2024-11-21T07:46:04.313000 CVE-2023-2338,0,0,1bcc733fc7f9175a245b2cd9fa373867b67fbeee7631f93100d65ab4e1d1e57a,2024-11-21T07:58:24.833000 -CVE-2023-23381,0,0,721bd43e65c8f121b5ec43b81b29681d06c39c5911d6d08b8ccea326ea77fa45,2024-11-21T07:46:04.430000 +CVE-2023-23381,0,1,0a1f2645e724062c340c7716d8093469a64996f0cb1f4872809c1dd9d9e7e8e6,2024-11-21T07:46:04.430000 CVE-2023-23382,0,0,c26a61991fb476f25bd9c9102b3deda1beb4a0b29d91c312a93e3972732a9fe4,2024-11-21T07:46:04.567000 CVE-2023-23383,0,0,aca10dc1c8fd3c12c3a19f2a19ef308c8b28ab30005447ca7f46bd526f51beaf,2024-11-21T07:46:04.680000 CVE-2023-23384,0,0,b487f2f6dd5f66f02780201a4936be7554e28cf806038c865080e97d0500b845,2024-11-21T07:46:04.823000 -CVE-2023-23385,0,0,357002aef357384775f15c0f484c59dec415b33c489ce683e3284c9e30f1032b,2024-11-21T07:46:04.963000 -CVE-2023-23388,0,0,0d61cfa0e6ecb35d2a7e344ea44a60fd6879a779d59bebad411b72b1b7bbe124,2024-11-21T07:46:05.140000 -CVE-2023-23389,0,0,6fe7ba69e17393d9939d3ea46a60ea2e4fba33d02e1c82b26628387d32ee4451,2024-11-21T07:46:05.293000 +CVE-2023-23385,0,1,b590089e35b523c3a591a676425c3b240dfdf5322563b2b44ec1d25726b792c3,2024-11-21T07:46:04.963000 +CVE-2023-23388,0,1,cdcb60180fb4a745d15766d66b991997afc6b0bffa64623b403c8057a7a0b2f5,2024-11-21T07:46:05.140000 +CVE-2023-23389,0,1,98d2d6c9c6cb92d808fb84e20d6495ed2669674b1794bdd945d0f9558cb7047e,2024-11-21T07:46:05.293000 CVE-2023-2339,0,0,b5ab9f2e8b639c7dde1d5835354bbcf3b85bdce418985f685ea99f401e2afe1b,2024-11-21T07:58:24.943000 -CVE-2023-23390,0,0,24633f09e7b1eb1eed0604e81e27ddab470dc37c818a079cc512f8a64c3a6d75,2024-11-21T07:46:05.423000 -CVE-2023-23391,0,0,c67fc357f5b5c66e5ad88e096d6bfeac9faf537261ea1f4d1e6f9194cbf4565f,2024-11-21T07:46:05.547000 -CVE-2023-23392,0,0,111ad98398f9c96eccc1e35e80ce8ef8e4b772468a3756f680b7c5bc265ab543,2024-11-21T07:46:05.667000 -CVE-2023-23393,0,0,c4498702b7db11ef9ceaa3c5a109dee9b7df20afdf9aed14706193c1b9f1c8b8,2024-11-21T07:46:05.820000 -CVE-2023-23394,0,0,a022152eaa95bbdc5d976e53522fd2e5a97897815cb34ff4f99cfe2cd1fe2929,2024-11-21T07:46:05.963000 -CVE-2023-23395,0,0,37d3cfe963e38f60e699aca785ab2ecd122b9cfc33a7234fdbebb0fec6aaa23b,2024-11-21T07:46:06.100000 +CVE-2023-23390,0,1,bb3c394306c5b7f8f6b2ab76af6c0077b69a903332bcfe286faa1a877c0f9f79,2024-11-21T07:46:05.423000 +CVE-2023-23391,0,1,5886ecd4141ad547c7c69543408300b3c3e7ab00e84e6003a3c18a4fd4460444,2024-11-21T07:46:05.547000 +CVE-2023-23392,0,1,11f19446211d46aa8b672ccf6485671d60fb5a60e23f79c560bff54c19cd6892,2024-11-21T07:46:05.667000 +CVE-2023-23393,0,1,6712c6e12d894754bfd308246615db32682ea6a3b7a539af9d7c1bd2d225f522,2024-11-21T07:46:05.820000 +CVE-2023-23394,0,1,9874e586be791395da779dfa8cb4bc07aa118ec797dfb7e07d57b7034fb85392,2024-11-21T07:46:05.963000 +CVE-2023-23395,0,1,d54a87ee714e443d70e5918d92c1e663d92587b87b8027478e370ea69e0f23ed,2024-11-21T07:46:06.100000 CVE-2023-23396,0,0,24716a39835e77688b9309e0476459414ba125ec85e7a4ec428596990c1edb7a,2024-11-21T07:46:06.237000 CVE-2023-23397,0,0,0d802729bdaf44fffe97fe8fdbb36c07cae0debb0550d971150e9bf02b77cfca,2024-11-21T07:46:06.367000 CVE-2023-23398,0,0,94722ef10f39eb3bcf953223413406b5a0da42c051058458bdbd0812a0bae78b,2024-11-21T07:46:06.493000 -CVE-2023-23399,0,0,4e59cf1bf42065fbf3779c33a1504004c9ca32d1e09c7a0ccc1b56a6e7097b43,2024-11-21T07:46:06.617000 +CVE-2023-23399,0,1,c6181e57243ccb4af31f49cfcbf30b1fc138d1e5ce30a9417d4d0b1ed6ffdb04,2024-11-21T07:46:06.617000 CVE-2023-2340,0,0,bb7287bba957e421f0beb5d480905b77c6e6083394c6e595c5b248599d9bfd85,2024-11-21T07:58:25.050000 -CVE-2023-23400,0,0,65e691d2aef686bc710f4d37840350ef0150faed776497269567f64b64d45a0a,2024-11-21T07:46:06.757000 -CVE-2023-23401,0,0,6449824bff79c98118a0fca0c9dc0662fe4f8a24c29f5d15633e83f8e613155c,2024-11-21T07:46:06.890000 -CVE-2023-23402,0,0,b95b611753984875a94523a6f6c7cc3156ed54fc4718d0799d5219591d6645f6,2024-11-21T07:46:07.043000 -CVE-2023-23403,0,0,258dc02c729208dc504315e536734097f247d1e0f17b466b329aeeec32736e65,2024-11-21T07:46:07.197000 -CVE-2023-23404,0,0,1afd99a4043a9c6d99f562f7da80d5883c6db7b294b08d0a6785f38820083eea,2024-11-21T07:46:07.340000 -CVE-2023-23405,0,0,49750bab4e38045d40d9fe1295fcf16a5115594371a6d0962770b9ce47ec8396,2024-11-21T07:46:07.490000 -CVE-2023-23406,0,0,3abc1f141c56e78396da0199b59e7654180bedf6d2ee72248cd7cc486bb485ab,2024-11-21T07:46:07.630000 -CVE-2023-23407,0,0,adc9243ceb8900463fefe685d79ff9725cdcdfbc6b508dc58f24d5389b8f5547,2024-11-21T07:46:07.793000 -CVE-2023-23408,0,0,ae3458172c72c48f69542f8d252d6b97bb61acb547ba4b667c8ee87af31e0ff0,2025-01-01T01:15:36.510000 -CVE-2023-23409,0,0,6f341ea67c2fc17258f3037e9b3e816014e29cb701434126396cb0715b172c07,2024-11-21T07:46:08.073000 +CVE-2023-23400,0,1,f541b55979d9118128313cce620661fc467da7bdeea790e029bec52ce9acadcc,2024-11-21T07:46:06.757000 +CVE-2023-23401,0,1,0889d260da3e1cca377d73ffed682baca80d17a43c3ba4145d1e2a66150a87a6,2024-11-21T07:46:06.890000 +CVE-2023-23402,0,1,1501f749b569b4b402d7bd0d01746c562dd3c974b4ebe3fee5820fe5d28d38f5,2024-11-21T07:46:07.043000 +CVE-2023-23403,0,1,a8bfd31c577815776bfc7d9e15b107d482c25ba64b41e4a362377b827ad51683,2024-11-21T07:46:07.197000 +CVE-2023-23404,0,1,a30d64dcbc9ca9ae7a4f5a07fdad7265a8a7cd57bf831eca2dff030238dc3bd2,2024-11-21T07:46:07.340000 +CVE-2023-23405,0,1,def3310236c6878221ae6a7055f947e81c225f39ba36e90a944dd2981bd28e80,2024-11-21T07:46:07.490000 +CVE-2023-23406,0,1,4c1864e421bd1177bd4d1afba1a8693396e7b53e2e4c1275259b79a6bee76b63,2024-11-21T07:46:07.630000 +CVE-2023-23407,0,1,092b7e2797d523778971c1524d99d65ffce47c2f50cae69734c40bd93cef722c,2024-11-21T07:46:07.793000 +CVE-2023-23408,0,1,a5282a6620e26277a352c4e81d9b76632346509e0fad4635eade50403b2749e0,2025-01-01T01:15:36.510000 +CVE-2023-23409,0,1,7ad24e5542e5f51484dcc002fa1501e9979a000c9b13229e2ab71ff52a0e811c,2024-11-21T07:46:08.073000 CVE-2023-2341,0,0,3f41c747fbf94db1d07e8f7c8b645e5c0578849167d613950689f686be854df6,2024-11-21T07:58:25.163000 -CVE-2023-23410,0,0,980c53869d601104f4f9f890453078239a403bacad3dfc5f3e5edd952f72f01e,2024-11-21T07:46:08.217000 -CVE-2023-23411,0,0,b49ff024296a7a07c53e399bee147d6cb6bb51f15b98423bfcd505da94e9b5de,2024-11-21T07:46:08.380000 -CVE-2023-23412,0,0,12957ab13fde4cdb565f3e25139f0e0d67a2a3b258daa6f93eae41dd76fbdaf2,2024-11-21T07:46:08.510000 +CVE-2023-23410,0,1,e0212029c407f39785b453842f4e8c2b786279d70c93417e35c44ceeade34c07,2024-11-21T07:46:08.217000 +CVE-2023-23411,0,1,874e6fdb556f55b5ab4aab518dacb44841400862300ce0352e32a8e00fb2bffe,2024-11-21T07:46:08.380000 +CVE-2023-23412,0,1,d50725f2118c43f9f7acb491b2cde51ebd966105a5cd596a9677638afe8e9b81,2024-11-21T07:46:08.510000 CVE-2023-23413,0,0,daa00804a2855e659abef13c6cc8095da067f808af576eedeea8a7307d2a5410,2024-11-21T07:46:08.660000 -CVE-2023-23414,0,0,e6113e675f45d70f5b47a949bd27fc309c3cc4dfb6c7c74398b63421a51d325d,2024-11-21T07:46:08.797000 -CVE-2023-23415,0,0,28231b4d9a824401bee7eb06dc88065f46ca4f9a953681a2087fbef95f098efb,2024-11-21T07:46:08.937000 -CVE-2023-23416,0,0,e8bae919c05ae755e84f209279dee3ec83ed046b2a40c030d5f09db4338dc411,2024-11-21T07:46:09.103000 -CVE-2023-23417,0,0,47732b71f97798bbbc9fe8ad3df781c37da2c012019540ab9c1cca5b478d8182,2024-11-21T07:46:09.250000 -CVE-2023-23418,0,0,ee68a268c01f99121ea3839ba4aa4a6d20b0cfd9d93cfc158c8691e395e58062,2024-11-21T07:46:09.393000 -CVE-2023-23419,0,0,3aaab72bbaf1dcc1e3e93767ef02ee229aebc8c3118beeea214801a2a0106bf1,2024-11-21T07:46:09.513000 +CVE-2023-23414,0,1,d54d9a5a3b5b90cd35aede0a5259abc43e2e8971a40161f2e1dcabe239a92dc8,2024-11-21T07:46:08.797000 +CVE-2023-23415,0,1,72a39c766ef5f2be42131d477109a17f9f9bdfa80e45861df173bb6aa86d175d,2024-11-21T07:46:08.937000 +CVE-2023-23416,0,1,8ceebc30314dbd2f093dbff177270035c84a4694b6e073394f4b0f8038c74af8,2024-11-21T07:46:09.103000 +CVE-2023-23417,0,1,6632e9c9b7acd5127da0882e83ad06556a09b410ef6bf39742fa4702772d81f6,2024-11-21T07:46:09.250000 +CVE-2023-23418,0,1,a5bd82fced0260c00722be99380ad9f89ae7d80a95a7b7e0a15bb04fbf84a070,2024-11-21T07:46:09.393000 +CVE-2023-23419,0,1,8223c9db8153bad9be0dee795decc0fb8a8b8f737e2f956d1462afe72a2a0f52,2024-11-21T07:46:09.513000 CVE-2023-2342,0,0,bfcc0a709920e463cc766c8e71c21791499d37db8da78ffcfdc8b2e0add47a20,2024-11-21T07:58:25.273000 -CVE-2023-23420,0,0,7079d8ab9c79c337e167ef1dce4d0f84bb6f1246af41da31d99e0d32753dd495,2024-11-21T07:46:09.637000 -CVE-2023-23421,0,0,21195c2be75da427f58943705beb921e1d5a4590bf6386283abcad712a8171a8,2024-11-21T07:46:09.787000 -CVE-2023-23422,0,0,9e78aa0c544c290df5a90c6268f7625ebf86c8c8c27940aa37966acd4fab3f48,2024-11-21T07:46:09.937000 -CVE-2023-23423,0,0,1e9de2ca6462e48cf7bd93a487be27691c404dadb2f8a1fbb96acf81c86a6b41,2024-11-21T07:46:10.080000 +CVE-2023-23420,0,1,1a090071945e02fa8bab8f83e1b4bbf7e0fa2e408fd4b656a396e9e20a5b5f32,2024-11-21T07:46:09.637000 +CVE-2023-23421,0,1,4735bdda8f118fd7b0db4f5aa8b97eaf91518c5095c1a5031c39c43cd79e85db,2024-11-21T07:46:09.787000 +CVE-2023-23422,0,1,f884aa6dd7269e1ca31eda92ec19e7839db8600da2c113a00a9c964869143d7b,2024-11-21T07:46:09.937000 +CVE-2023-23423,0,1,e0db8f10fe368e6f3cf6528b6e34ccc1494665f2b2cc8309e5e7e144068d0928,2024-11-21T07:46:10.080000 CVE-2023-23424,0,0,bc47e1ccc5d2bcb9219cfd19d269cc920a30edefcef64f1cc40385a12508f99a,2024-11-21T07:46:10.223000 CVE-2023-23426,0,0,0b4317a1bd10066a35d55db980e6403d2fc51030838cafa8ec48b4b4ee2bf3fb,2024-11-21T07:46:10.360000 CVE-2023-23427,0,0,634fb0471ea38bc324d839acad86aca21fb7166b104402bdb758c86d196b2e93,2024-11-21T07:46:10.470000 @@ -218378,7 +218379,7 @@ CVE-2023-2391,0,0,842b5ed1e83f3843cc8ff569595999d59ab60a89d681911295b32b17482d8a CVE-2023-23910,0,0,63dd2cbd6ea1319bd3dfbe7034480d2df6c3610536e09ad75b890a6424f8445c,2024-11-21T07:47:04.990000 CVE-2023-23911,0,0,21f6240ed9aeb3ac846a763b503b5b3c1d795b32a63b3bf506eaaf00a1bef61d,2024-11-21T07:47:05.107000 CVE-2023-23912,0,0,161d529023d5efa110c9e01ceedff90a5c8e1f1dbacb3f558d319d2d5b757b61,2024-11-21T07:47:05.220000 -CVE-2023-23913,0,0,9897ef3eb127d3e36d381f562c75b48d2950336d7df095f8384743a3b01afff4,2025-01-09T18:15:24.993000 +CVE-2023-23913,0,1,7c66c3c53d7f9008d824296c97694a84dde754a479a7f655be0f671602cbf776,2025-01-09T18:15:24.993000 CVE-2023-23914,0,0,121f340e4a39b81a4db03b348db17224f75a3193a520311b64556a5e4bc44031,2024-11-21T07:47:05.357000 CVE-2023-23915,0,0,dcd22de65c54681cbaaa36e8c3304723129cf00bf12179d0d4f5df436b3c2155,2024-11-21T07:47:05.507000 CVE-2023-23916,0,0,50b3eac92c83746250383e0d0c2541bdf9456b5720cc86fdbbe8c6ebf0f59647,2024-11-21T07:47:05.653000 @@ -218474,9 +218475,9 @@ CVE-2023-24007,0,0,6a24c347f0b8463b4572e0a24f9ca98a7dbd80db0fa8c7ec9e8bc11fd747e CVE-2023-24008,0,0,02a1ed0d1e18731487ef9c44b206e07e2c31abc738ce33c22e81a092fceef383,2024-11-21T07:47:15.373000 CVE-2023-24009,0,0,0c24bd24ff15762e844810a28a0ab724a37ac7c10dee186b8dce92a14ce8fedc,2024-11-21T07:47:15.493000 CVE-2023-2401,0,0,de3ebd2f5178f8cc174ba00a1341d9845db88638c383f99065882adf2e200bac,2024-12-12T17:15:07.527000 -CVE-2023-24010,0,0,a1b8fb65806a77ca547c45ff950a788755d7cbd488174e0ea12d8e894daf2183,2025-01-09T16:15:30.803000 -CVE-2023-24011,0,0,336d6d6cfdf8d9cd3a336a2fd4f38449967446cdc53a88d865b9f66b91698bfa,2025-01-09T16:15:31.323000 -CVE-2023-24012,0,0,bfe7ca5fb437c7517fae6158aeda73075c09dde9be3d1cd3bd0e7669583f3392,2025-01-09T16:15:31.440000 +CVE-2023-24010,0,1,cc9bf264950654c1de4327de10c8f13333b309c3170b26ea8c16b37a1ae51773,2025-01-09T16:15:30.803000 +CVE-2023-24011,0,1,6e91bc59f15b02202e39505fb441a5731c65a23c3277e80a23156e83535e56f4,2025-01-09T16:15:31.323000 +CVE-2023-24012,0,1,7ba90be2cdf370a182a3b4f74c93d1d5d56ecb722c747e32a31e2d511f876b63,2025-01-09T16:15:31.440000 CVE-2023-24014,0,0,32f856f86fe8d2de973a5458b37a5a1dc0d01d6415d716c92f76c8a0e438acf8,2024-11-21T07:47:15.617000 CVE-2023-24015,0,0,9ecbc6a93f98518f757a2df0d46ee23ef35d716dbcadadf0691d5faa7144f101,2024-11-21T07:47:15.730000 CVE-2023-24016,0,0,b48667be27205d0b93087b031ab3c023bde5a4e35b4ee2229386ecdc467a170d,2024-11-21T07:47:15.870000 @@ -219107,100 +219108,100 @@ CVE-2023-24852,0,0,dbe8a062db25cf95ed4303e40df75cb8dde28ce72e6c0bd78b31f458af936 CVE-2023-24853,0,0,0b34f0d7eef33242a84691f83cac6c31be44a81c596b4d1d21b03ae02a9a16d0,2024-11-21T07:48:33.683000 CVE-2023-24854,0,0,404cc2e85cb25413bdc0e4638edda315e234655fd2c0a6605da5adcdaa29ec37,2024-11-21T07:48:33.950000 CVE-2023-24855,0,0,94dc04d5f1778f8b1b35fa069ffd20549167adb012259998cf570f65a5636dbb,2024-11-21T07:48:34.260000 -CVE-2023-24856,0,0,aaea74b22e2222e05ddcd770261e00b0b79f0f362da9801ed802879e455acb69,2024-11-21T07:48:34.477000 +CVE-2023-24856,0,1,97b4f395b6e652def9dcc2f155c3a39d88ec8c14a0f8ee8a6b453e25f782598d,2024-11-21T07:48:34.477000 CVE-2023-24857,0,0,8d12d9e91adc3444862b40e2e824f8f830420628e6b976054799769fca4d5e4c,2024-11-21T07:48:34.623000 -CVE-2023-24858,0,0,329613ebc17b947e9270bc516cedb3e15d22aeec1364b13b80837834b4926b8d,2024-11-21T07:48:34.777000 -CVE-2023-24859,0,0,3b7fe301e26107aafee69b4a8735f8a85b707861dd40ce16ff7a8c5cd090c79a,2024-11-21T07:48:34.933000 -CVE-2023-24860,0,0,aa408c68c976a75152941d476e8149a70a3940f1073952b3f525dbd9f11d87c5,2024-11-21T07:48:35.077000 -CVE-2023-24861,0,0,3d1e3a113ab89153900c9ab9c53d835fb52b7641a785b1bd52a419f36d987d73,2024-11-21T07:48:40.240000 -CVE-2023-24862,0,0,3dc383c3199b58472ada8fc1753db2fc42285de4cc5c884f291e1c2a35df0826,2024-11-21T07:48:40.393000 -CVE-2023-24863,0,0,d7ae7d6a9edcfb3e0dbdfe227402297336f4191122877d5e433ce556bab3b34d,2024-11-21T07:48:40.530000 -CVE-2023-24864,0,0,4fb583a765c9ee6b7ea3750cb41fe5491ba2c226537c0100cc487db527499d22,2024-11-21T07:48:40.660000 -CVE-2023-24865,0,0,b496f8838feb80812dd97a8e39e125082d0a4782dd1674d9970223cecd2e789f,2024-11-21T07:48:40.787000 -CVE-2023-24866,0,0,86e64cbd6f7e3ac8ca20fea9bbae6cdd08591b9661a67c6d59ac1b5f4d485a0c,2024-11-21T07:48:40.920000 -CVE-2023-24867,0,0,9fe3f7e8bcb14cb0156957dbafaa7c53551ceb577fad0ef70444d1bc839504c7,2024-11-21T07:48:41.057000 -CVE-2023-24868,0,0,457bf409b0ab9ce172c8f7bc7869fc95bf73b680aab2ac28dc30e21e59593fad,2024-11-21T07:48:41.180000 -CVE-2023-24869,0,0,76ea91610803504ce4e3f90740b01e79029723151d5f02f11e3e34ab8068766f,2024-11-21T07:48:41.317000 +CVE-2023-24858,0,1,93cdabe458d178c29458255066e72b6b36fe7b40a33c7619e719b9bf6f8a3677,2024-11-21T07:48:34.777000 +CVE-2023-24859,0,1,c2a70e25c0c2f119ec3b74bbfef2068feb8afe3838bafea5b4a91a17f423ea36,2024-11-21T07:48:34.933000 +CVE-2023-24860,0,1,47d8b5ccbd8fdf5bdb0c3128aadeae660d411dc441ac629af16a49c59ae1cc05,2024-11-21T07:48:35.077000 +CVE-2023-24861,0,1,7b79f6f2650458a480566f9582c9bb906336542d4ce0f354d0d1778f3436de83,2024-11-21T07:48:40.240000 +CVE-2023-24862,0,1,1c89f212e5c544b0b4b082ddda99d8333b9815a65de708bff9f1d462aa904753,2024-11-21T07:48:40.393000 +CVE-2023-24863,0,1,69aa7df86355c41218a4d8b50ed2a5af0c71fa8414de9e2ae34fbb22e54c825b,2024-11-21T07:48:40.530000 +CVE-2023-24864,0,1,5aec6dcc579f15acf9d3174ac7bbe48e618c4b7aa1ca11db0a4973abd09c0308,2024-11-21T07:48:40.660000 +CVE-2023-24865,0,1,e096b31a80d89bcd7bd7ef325ced095008c5bf2052327d235cadbae4642fd7c1,2024-11-21T07:48:40.787000 +CVE-2023-24866,0,1,dd8df26e08e091916a144ba7bebadbbf7d70fcab2421a52689ff5c456f167bd3,2024-11-21T07:48:40.920000 +CVE-2023-24867,0,1,1c3b83e37dae0500aad5b1ff3bee312d8778fa5dd24c27af12e0499c003e5fc7,2024-11-21T07:48:41.057000 +CVE-2023-24868,0,1,b3b8a5d252fedcd7754fa80fe7304017320e9e50efee4476580e2cdd5be37d69,2024-11-21T07:48:41.180000 +CVE-2023-24869,0,1,358446d9d3592e30c805cb548dfec130891fd276637843502fea08fc790bae09,2024-11-21T07:48:41.317000 CVE-2023-2487,0,0,1f762627a2106178e6628266ae4f451ef4f45aeaabbddd53ea3a191c80a33dbc,2024-11-21T07:58:42.587000 -CVE-2023-24870,0,0,a5cba91bcebf0573d9849df7c63d00d223d642fbc0573abae036cb761fe4aea1,2024-11-21T07:48:41.450000 -CVE-2023-24871,0,0,c316268b6c8117f618bd2da8a83169044e4c90ae174af0ff2a24da3f1643fd39,2024-11-21T07:48:41.580000 -CVE-2023-24872,0,0,7a85cc881baf96177e88d060a0a196055522f4fd219461d23c21c02bd6d88397,2024-11-21T07:48:41.693000 -CVE-2023-24876,0,0,ce9d4e35a36c71d1e199e2c85c097a6dae2875edfec4961459c6ebda45706fd2,2024-11-21T07:48:41.827000 -CVE-2023-24879,0,0,50f96bee85af3c52e5023966fd9e747a8595f8b7d5884dc966d7fb926d620def,2024-11-21T07:48:41.960000 +CVE-2023-24870,0,1,8599ebbcfa3139a569b085f982e3ee51bf17624171c69af6249d9ced40f95464,2024-11-21T07:48:41.450000 +CVE-2023-24871,0,1,007ef30de0e40fb6fd98f3dc553ee1946c748d33e5f3b8eb4f7e68ecf7ef080f,2024-11-21T07:48:41.580000 +CVE-2023-24872,0,1,671db372b4fc5cf0a6a0e4e79a322a469f6ee9128071f391172290f9fdc06310,2024-11-21T07:48:41.693000 +CVE-2023-24876,0,1,b6b8afa42ab869a9a2feba8724301da7d4129a5fc5bc8a3dd1f583bca1fdcc07,2024-11-21T07:48:41.827000 +CVE-2023-24879,0,1,f72aad5ba8755e42c3f76fe291f888c146ecddaade48a1928011910b5d07e6a0,2024-11-21T07:48:41.960000 CVE-2023-2488,0,0,1ff030b9a9cc358926f2f31f1cebcdc10263b6fd1a8f39d3ff95a9e9e914dd17,2025-01-08T17:15:11.237000 -CVE-2023-24880,0,0,979166593d7eda8b024552f0eb36771e4323fa2bd76c007faad39d1d077223cc,2024-11-21T07:48:42.067000 -CVE-2023-24881,0,0,9309c40952e29646b3e986b6b73d3384ef98206aa56a7d872f76589472eb5f6e,2024-11-21T07:48:42.197000 -CVE-2023-24882,0,0,b9a6b265648d5a4c47b3a2f5c8243cef068fa5d84244abca120c82b497ae74ee,2024-11-21T07:48:42.310000 +CVE-2023-24880,0,1,4c89ae2911a7e08b0c143b8b45af1eda38a9d94f7c256bc0446ab48600d30af0,2024-11-21T07:48:42.067000 +CVE-2023-24881,0,1,6b069e84033388c6b792588edb6dded8ddf1805480c83fada6521fb31796bbfe,2024-11-21T07:48:42.197000 +CVE-2023-24882,0,1,aa9fb886dcc5cab48e91df247f90a69aca2b6abd32e6f6bd56dacc0faefe4e9c,2024-11-21T07:48:42.310000 CVE-2023-24883,0,0,f8cd2e3c588975da658157610ea853db7cf61d2aa3e5ce70748358ea9d242e3f,2024-11-21T07:48:42.410000 -CVE-2023-24884,0,0,60e5a6b0b3573670377d54c2fff1dbeb70110f95e7c3722a99d2d3d41d978365,2024-11-21T07:48:42.543000 +CVE-2023-24884,0,1,73e41844b7e07f1b3039fd3a0ec6d7100971bb2ec55e89d87f704b8c2df7a471,2024-11-21T07:48:42.543000 CVE-2023-24885,0,0,9662d94e242ea3b0e8333672deb3193424405f26d0206b6d719c84bf8f41bb99,2024-11-21T07:48:42.673000 -CVE-2023-24886,0,0,9b4390d88c6062609e6f2f231300d240908d833654a62f9283d65a8b40391f0f,2024-11-21T07:48:42.810000 -CVE-2023-24887,0,0,1fa3f5996ae51b40e8ef126b7800ea35d8fad303b2337b9e81b066421b8756cc,2024-11-21T07:48:42.937000 +CVE-2023-24886,0,1,24e4b24e2e74694fd8e7417ccfe8d08c50d2ebd353d71a0bcb9239210a8109f8,2024-11-21T07:48:42.810000 +CVE-2023-24887,0,1,0a51b2549252711cc2c924f14ac2cf21056ec8d5ec46b8caa58ba29516c9aa78,2024-11-21T07:48:42.937000 CVE-2023-2489,0,0,5a424baee54accf15cb35e970432f5c16b21b4a2d25b4c6512fb478e634bdc3a,2025-01-08T17:15:11.450000 -CVE-2023-24890,0,0,e2ae22af124c90f24a70ba451ffa99356cdf86f9205d7329b5cf2b69bbc3e413,2024-11-21T07:48:43.077000 -CVE-2023-24891,0,0,e11ee3ba86a5fb03e6c6db0a26d307cf540786366fc1a47ebc7854a48b591c01,2024-11-21T07:48:43.183000 -CVE-2023-24892,0,0,f6596eec952d734ef3f6f80f1050e5bc03324a4af4641a8eddf5728d24e0f371,2024-11-21T07:48:43.293000 -CVE-2023-24893,0,0,e9f12ccf9c7149afa05548088c93262ef124fac5601753f6d2e7cddd64461e23,2024-11-21T07:48:43.397000 -CVE-2023-24895,0,0,2e41bacfe43e15fd1d785f38a8773f157b1398212d8dec88ed92d1dfde2cee4e,2024-11-21T07:48:43.507000 -CVE-2023-24896,0,0,2cf5da8f1aae20498226adf72d76f761f4ea0f99d607ac30a49d883219af2d5d,2024-11-21T07:48:43.680000 -CVE-2023-24897,0,0,bd5d82c970029b410ed5ded54bfd54e26f712d53fd3b4f477edd5ae054954e0a,2024-11-21T07:48:43.800000 -CVE-2023-24898,0,0,667cc31bff550d61dd1d1ec56b3fc8b4fbf12680a5f3671ca950876be6f23867,2024-11-21T07:48:43.957000 -CVE-2023-24899,0,0,b0c1efb7568a4b1f8ecf4ab42c7d14561d214fdad1b3d6bf13a1dee32b101913,2024-11-21T07:48:44.063000 +CVE-2023-24890,0,1,0c9591a70fb15e43dbe8f570343175177ad2f9d0f1b8dbedbc9cedc1c2972968,2024-11-21T07:48:43.077000 +CVE-2023-24891,0,1,6d09c3103d23416d7e1f9cd2dcfc7ab06bdff03290f23f0e1a8fefe151239e3d,2024-11-21T07:48:43.183000 +CVE-2023-24892,0,1,00f38f29ce286e181827dcd91d90594c674ac3abd8ce9bca3b40489f44f45951,2024-11-21T07:48:43.293000 +CVE-2023-24893,0,1,8627a23e388e284cf88678588e944a3f2e53919cf726af6b8c1d2f82c9572708,2024-11-21T07:48:43.397000 +CVE-2023-24895,0,1,04bc1307e556e27de816a66d9491db01faddf8128e5015116cdad5aefb041734,2024-11-21T07:48:43.507000 +CVE-2023-24896,0,1,51437fa19d80d9021db06310e3a4cd99648d9935ac62052618478ab1d0b7ed93,2024-11-21T07:48:43.680000 +CVE-2023-24897,0,1,a49e1d0d98bb3def766f519432a4a7662ee6bc944546fd98a9006baede7437b8,2024-11-21T07:48:43.800000 +CVE-2023-24898,0,1,a2d595c2c459d1c55aa72f53fa735f7650c5de005ad53ae41d993e2ff84dda07,2024-11-21T07:48:43.957000 +CVE-2023-24899,0,1,b748ad4020f6e224f6969f4a9eef22df06386e30bf93da99988939845017d6c7,2024-11-21T07:48:44.063000 CVE-2023-2490,0,0,185c90ca1f3caa4675ddfc9d8baaa9b8ec7e0123cde57d117f894e45e0aade3f,2024-11-21T07:58:42.913000 -CVE-2023-24900,0,0,91bbc310cb9e659703ed933969ef678e725a54bed42136001bf6bfeb9fa3780e,2024-11-21T07:48:44.173000 -CVE-2023-24901,0,0,5e60e2adb03ddcb622ddbaf55466bbe0a6dc3ea3f2271576c7fe70d41314fef2,2024-11-21T07:48:44.307000 -CVE-2023-24902,0,0,df1636f906600ccb1e91dacb4377baa4a60387bf3e88331772161a7cb426f3e9,2024-11-21T07:48:44.433000 -CVE-2023-24903,0,0,671278555d1274fb04672d2261267f5d11b122c9bbd06aa1cb7fbd27ecd44c08,2024-11-21T07:48:44.537000 -CVE-2023-24904,0,0,bcd0b13563536814aa916f93ee60faff1a1c6ae944b373bd0d592c46327667a7,2024-11-21T07:48:44.667000 -CVE-2023-24905,0,0,f753e13d06610c2a0943daf970e8b185e0b4115f2ca5ccaeb33f9e4d0eeacd36,2024-11-21T07:48:44.777000 -CVE-2023-24906,0,0,f2d234e8b1b458669beba584a72246279c2f66717c9addc588265cb06921a417,2024-11-21T07:48:44.890000 -CVE-2023-24907,0,0,04f3ef82a22bff37a5f4b516dd713eb1b9f0636ed98e3c19216aceef7e931ca8,2024-11-21T07:48:45.027000 -CVE-2023-24908,0,0,67091da081db02e9beb81e8bb849de15084b8b9c1854f1d9071e957528182826,2024-11-21T07:48:45.150000 -CVE-2023-24909,0,0,6bdc2921a8cec7967a78fc0ffa94e5db3951ef82c5454db64b23a21835b5c0f0,2024-11-21T07:48:45.293000 +CVE-2023-24900,0,1,52cacad4803b578e00cf809f5230f1ebc51d7e26dd5746811889d6aa87ad97cd,2024-11-21T07:48:44.173000 +CVE-2023-24901,0,1,88318530fc9d95f1078fb252b0f0f57ab00d1a670248e8e208a3100375116a9c,2024-11-21T07:48:44.307000 +CVE-2023-24902,0,1,b3383c2226da66c182f3b4929bccf2b7b36d90b07518716bb97b17e028649703,2024-11-21T07:48:44.433000 +CVE-2023-24903,0,1,a9b9f683bd4b8dd8e859fd93245669e7df47162eacca4b1a2e640114a0f58e74,2024-11-21T07:48:44.537000 +CVE-2023-24904,0,1,b0d61e734bd07162c3d2b5e8e65670338d6ed67a31b7d573f3f4e08ddfb57a69,2024-11-21T07:48:44.667000 +CVE-2023-24905,0,1,e72a8a7ed09e51a97b89b3711eeca8513b67fb5850092fd71c6b6c4de331ef00,2024-11-21T07:48:44.777000 +CVE-2023-24906,0,1,a606dd15dc73e53f85d7c9a06eac2a1a5282f6bd8d5424b4a87abc494d661aff,2024-11-21T07:48:44.890000 +CVE-2023-24907,0,1,b208e4a28c6fbda1082363f9df7498260c08f1323f8c5feb0879bdf6891fe7ba,2024-11-21T07:48:45.027000 +CVE-2023-24908,0,1,d6e86ad95e5c1ac0d6d48acd6df16ce268e92a0f53e6dd4d6f0d86dcad5d8a84,2024-11-21T07:48:45.150000 +CVE-2023-24909,0,1,8ffcff644069df3ff7a02634a00d047b0f7e0b6265349f46975db5df04c03522,2024-11-21T07:48:45.293000 CVE-2023-2491,0,0,dcca6ccde30bcc94787124a71e4b6d82ddd1876feb662a33b12830d3af0efa99,2024-11-21T07:58:43.033000 -CVE-2023-24910,0,0,9d9dbbcff6abd584f8d9ca72aa9af6198425a6b5cd5d351a37cc2874514bf132,2024-11-21T07:48:45.423000 -CVE-2023-24911,0,0,d812a4d53e267876bb393159c11a57e05a90b54573ea86e933c7bb36333a8f06,2024-11-21T07:48:45.560000 -CVE-2023-24912,0,0,d2d9222100ee00ca00b8cef3e812f0e0f79e3e218c7efd86547c918bd7ef8bc3,2024-11-21T07:48:45.687000 -CVE-2023-24913,0,0,45eb14bdbb6d0fdb24d2842bb3f3ba7857a2f02e1d6f880f52c48da78d68fd2d,2024-11-21T07:48:45.823000 -CVE-2023-24914,0,0,e0a477a168e663e856ebd6a8d424d078b91aa3868bfd2a499544cdab0d1fddd0,2024-11-21T07:48:45.947000 -CVE-2023-24919,0,0,123013ce02cf1f448a0b309998bfa4b4ddd38f771aa5279c4308e7ae456ae19a,2024-11-21T07:48:46.067000 +CVE-2023-24910,0,1,9491feb056aee9ea2222ed35792f9b7b67296dadf614ff12caae4e1441ea2c5f,2024-11-21T07:48:45.423000 +CVE-2023-24911,0,1,5353260055884475fa01079d23663aebfcb01476d0d089bfcb3986a340fc0952,2024-11-21T07:48:45.560000 +CVE-2023-24912,0,1,78d72bfde34e5ba6220e43ddc4048217279ae23798a1f0f972a498ee4a24392d,2024-11-21T07:48:45.687000 +CVE-2023-24913,0,1,7879fd296a10f51a1826f819a375a0f6b3808f22c6c8df664e52c58f8c0ac2c3,2024-11-21T07:48:45.823000 +CVE-2023-24914,0,1,bb4e06abc46e6e91ee7133bcf1a0952d367f87286b6d57b679b4c58f0115d19e,2024-11-21T07:48:45.947000 +CVE-2023-24919,0,1,972220fa1c9f044538cb6dbfb9c9417b616f93d3dc8da228c0ffa248116365e5,2024-11-21T07:48:46.067000 CVE-2023-2492,0,0,815b785fca7d6abc348e9b027950fd2d8e4a246d4324fc755593fc639b6a9261,2024-12-12T17:15:07.720000 -CVE-2023-24920,0,0,998f85b51ae02cddc5b4154373146e7762d07e4cbd1bc765efdc49b36b761295,2024-11-21T07:48:46.180000 -CVE-2023-24921,0,0,e342ca60f74f873a21eef34db96ddb815f17f7c824e832988df83b790b6a8267,2024-11-21T07:48:46.283000 +CVE-2023-24920,0,1,b27bec2aec362183060b41b5fd66da117e2fae147fa7b2e01f00361c8c9ce0e9,2024-11-21T07:48:46.180000 +CVE-2023-24921,0,1,05f3c5ebc5b396734db95b79e280ceec38805f4ec089084d146385c1a8ec44e0,2024-11-21T07:48:46.283000 CVE-2023-24922,0,0,eaf0894a4da74776255defcbf4a307740bf22c1a754553075c3f47fcf25992de,2024-11-21T07:48:46.390000 -CVE-2023-24923,0,0,5f8cea8002836fced8ccfccbd0d6a78606a47b234b98925279adeeefcba7e93a,2024-11-21T07:48:46.497000 -CVE-2023-24924,0,0,0d57bf29601b54eee0fa2e42ef8206c615073291d1e1831389b35209c048f5fd,2024-11-21T07:48:46.597000 -CVE-2023-24925,0,0,6a9c1a7d77565dd88a3be3eea4c52272b728acebdfb7fdd6268e638f37fc692d,2024-11-21T07:48:46.723000 -CVE-2023-24926,0,0,915774aa3577a86270406945352ae900e0f33245ddcb504313ca168e71e8e9a7,2024-11-21T07:48:46.850000 +CVE-2023-24923,0,1,ee74b3e238ec2d7230684b28a233716aa1704b64075b5fc5de2165e85780aad7,2024-11-21T07:48:46.497000 +CVE-2023-24924,0,1,6bf5509a654c5e535ce0ef7466bb3989cb125ca29e8fe177b492484a2a320910,2024-11-21T07:48:46.597000 +CVE-2023-24925,0,1,f365fdbbd4bb40f0501f0dd9edd79f72c7a6312084ca81999119dcfab6bb1431,2024-11-21T07:48:46.723000 +CVE-2023-24926,0,1,ae44c4c5e920f119ed5408b1fb83345c66660790daac93367ed5c55a7bdc40de,2024-11-21T07:48:46.850000 CVE-2023-24927,0,0,999f53f60ac8ab5006f0e36a70cc78bea88830d0cffc9bd57fbd2d84259bf49b,2024-11-21T07:48:46.980000 CVE-2023-24928,0,0,96cf111b649bdba3469c480dba0957322f2f6ca4a440cfe9a2bf7adf7cf0148b,2024-11-21T07:48:47.110000 -CVE-2023-24929,0,0,220ce885cc95a8721db711ff2d7722730ab6f4cbf8b8c959e588dd4563eac9f2,2024-11-21T07:48:47.243000 +CVE-2023-24929,0,1,10392ef33a8f953951d5f358167592dcf06de88228e77d7c025367d2b06897e0,2024-11-21T07:48:47.243000 CVE-2023-2493,0,0,6fd09106e82f4d15ca0700ed3c72d8ef5c11402ca9bdc4289502812842581d37,2024-11-21T07:58:43.250000 -CVE-2023-24930,0,0,2812ad645c6b329822d95f97c3d12cf6658c0475433cdad9940771c1b2dc92b7,2024-11-21T07:48:47.377000 -CVE-2023-24931,0,0,e0c9f4d06615ddcb5d45e960e336d0a7b38187e5d8a51beccfea4a71fac7d914,2024-11-21T07:48:47.493000 -CVE-2023-24932,0,0,69e57209b8f96c1cad11574f2f7d5e74b2418f4aede963515c0c35c6fc327082,2024-11-21T07:48:47.630000 +CVE-2023-24930,0,1,9f9e561c144213e77edf7be5969762b4d914f545cf0c22227904b800cf15e12b,2024-11-21T07:48:47.377000 +CVE-2023-24931,0,1,4cb3f680aee2110301457c68ae711581649c05db20ed022c69aef2e15fdee122,2024-11-21T07:48:47.493000 +CVE-2023-24932,0,1,e8a46cb1a1efe6585d0924bde867a63f0e2815879b41600f60665d01530ae6fe,2024-11-21T07:48:47.630000 CVE-2023-24934,0,0,b063256a223adfefb231bf44cf66744c128745708e070ccb4c8cf146c607f43b,2024-11-21T07:48:47.787000 -CVE-2023-24935,0,0,5a1cb248fa66884c284957bc37ef0b1e20e2a82303cf82b2d68858c363204c6e,2024-11-21T07:48:47.897000 -CVE-2023-24936,0,0,855ccb0df97231e5f807f35f92c7d440d890d9ad9667b74bcc36c90ad2b64a92,2024-11-21T07:48:48.003000 -CVE-2023-24937,0,0,bb68309eb8f636ae2bcefb135be2ee9377e8c6faea3d2000d05c05933eebbd62,2024-11-21T07:48:48.187000 -CVE-2023-24938,0,0,947bf702ba3419f695362d0302afa7ecda0932f68fd5bb103cb2070ab1b61767,2024-11-21T07:48:48.330000 -CVE-2023-24939,0,0,fda08cae2f622457412990481bad4393eaf318dbcd633f601203fe948a7bc98e,2024-11-21T07:48:48.457000 +CVE-2023-24935,0,1,a464a2a549bfe1345b9858d182cccaf8f191895f87138caaa3956d068ac27ce5,2024-11-21T07:48:47.897000 +CVE-2023-24936,0,1,505bcf4b6a5f58019032a1d5b6159bf29aaa4d730ba53d1a3bb4919bbceffcb1,2024-11-21T07:48:48.003000 +CVE-2023-24937,0,1,45be0bdf310f7ea0dae27b5a09535a058dfe5731f6609e52cf4744010d4cb0b0,2024-11-21T07:48:48.187000 +CVE-2023-24938,0,1,d12e34f15419e9b00a7c637a8a6db492342337e0d2eee9897fa539eb02d353f6,2024-11-21T07:48:48.330000 +CVE-2023-24939,0,1,82b2cf48dbd2c88e9a59665c9c753d6ab549aaa9f48226e64f56c97fb9bb1b57,2024-11-21T07:48:48.457000 CVE-2023-2494,0,0,0ba18749941907064301180692bd261d9a8c0d1b36dfb6bc8c8c1fa7fb6d6fdd,2024-11-21T07:58:43.353000 -CVE-2023-24940,0,0,d251358521a3b7ec679cb4b56caf4a0882e3488b4455fe9ad31f41e548ea7ef2,2024-11-21T07:48:48.590000 -CVE-2023-24941,0,0,6658ffb2ff18be05022f22b5fc3356e1058e65ffedeca633ff03c0fa93c2a5ac,2024-11-21T07:48:48.750000 -CVE-2023-24942,0,0,7b739f32f14ac9a22d380e8b1dc53b5df7bfbddb8adc5db48a97117e06618ec5,2024-11-21T07:48:48.890000 -CVE-2023-24943,0,0,14e47316accec790ffb481cab7b7d57d786742d313979744ee851f206d1648e1,2024-11-21T07:48:49.033000 -CVE-2023-24944,0,0,65b6c2e44cd155b7fd11329ffb2f421eedb04f1c1e76927ff4bdc173e7c9c814,2024-11-21T07:48:49.170000 -CVE-2023-24945,0,0,f135c35cf637286fc1b800086c3c76d624be35b7087b2bb887458ab5115842ce,2024-11-21T07:48:49.290000 -CVE-2023-24946,0,0,a4ffaa4734ce5b617b6c6e1cc84605c01e2c9fc20c1e8180895baaf0ca9b6a14,2024-11-21T07:48:49.437000 -CVE-2023-24947,0,0,5f926b0704bd794cfdfa51ed39a237598b968752d6c886e6a04d4949138ee983,2024-11-21T07:48:49.573000 -CVE-2023-24948,0,0,3a1b78776fbdac2c742fc8cb017ed93de31d616b4b24e042a17b1040e059c3d4,2024-11-21T07:48:49.700000 -CVE-2023-24949,0,0,098df26677d1d7026773e58934e5f04c816057f92564cfc8f791950238cacecb,2024-11-21T07:48:49.837000 +CVE-2023-24940,0,1,d93d7abf88811c537649c0b3bf70a0464fae31c113d860086c9d9a8178df4577,2024-11-21T07:48:48.590000 +CVE-2023-24941,0,1,c641f47ba717884e1b76f9db72ac02ed885a37f30145b8686df435383bf4c95a,2024-11-21T07:48:48.750000 +CVE-2023-24942,0,1,36a858c2c2942e18e280c6d833a9184ac5e8e63bb9ac9d4b4aef070004cb85e0,2024-11-21T07:48:48.890000 +CVE-2023-24943,0,1,fa80c388fcf4c4c8b40696b0d713bbc0e3d6f750a083a4606ecc1412cbaf1818,2024-11-21T07:48:49.033000 +CVE-2023-24944,0,1,bc477c6574c6efee49e644abb82f231301a1011f843921dc6b7bc9f11eda00b6,2024-11-21T07:48:49.170000 +CVE-2023-24945,0,1,e3a251c2971f2e1710e7360121b47b7f6a67d35f0ed2224d0eb7c0f1d1e86657,2024-11-21T07:48:49.290000 +CVE-2023-24946,0,1,08a7717a99eabcd4131960dd07f84d09c6efb20bb9815a101dfe47aa571fa6b4,2024-11-21T07:48:49.437000 +CVE-2023-24947,0,1,5fd77fdc0e502b8ab94874c991963d8b4077c48147e6a6842449629e9bc60f98,2024-11-21T07:48:49.573000 +CVE-2023-24948,0,1,aed63dc003486117341e0ed4d6c9b55ffcab4c395818005af1d76732f93bddd8,2024-11-21T07:48:49.700000 +CVE-2023-24949,0,1,4db157a51884e1cfaaf13b4e096045e1d2a78fc9aa8b73ce8e1e7df2836da559,2024-11-21T07:48:49.837000 CVE-2023-2495,0,0,8e34730e9458f3bc4307bda7553befd5f0ba7277cb5524be75a3ff157ffbd92a,2024-11-21T07:58:43.470000 -CVE-2023-24950,0,0,c2186431daf3124c4b7ea3ca5d44e492b0e56fa101ef6f32217c7ef3646d0c94,2024-11-21T07:48:49.973000 -CVE-2023-24953,0,0,daa932a3ec2d853506a2e4db1f1238544cf650d2ed48c6633c0fa12696533bbe,2024-11-21T07:48:50.093000 -CVE-2023-24954,0,0,a34bc7ece917fae9bfa52f7c147c445e0c6a96cc891217bd6be00c926b0ad886,2024-11-21T07:48:50.217000 -CVE-2023-24955,0,0,e9c8cbbf0671ce3a3b77902ef18285920c0a06d3e75af80b79dc69ad6858774c,2024-11-21T07:48:50.347000 +CVE-2023-24950,0,1,b624265189ebb68c09ff639128ccd91c0fb8abb32ce40517135600dbc62d8854,2024-11-21T07:48:49.973000 +CVE-2023-24953,0,1,1c1f0ac5177555e37a36553ae1e1f5a489744209078e480c6c56424e3231f02d,2024-11-21T07:48:50.093000 +CVE-2023-24954,0,1,4769172ebadb5135d6b5565d3a1275ad7fe587670eaf4cbcfcf58c85add51792,2024-11-21T07:48:50.217000 +CVE-2023-24955,0,1,5542d5ed3091ae37d4774db32c2ceb7bb9beb86f3e9648bd1febedf1c5faab26,2024-11-21T07:48:50.347000 CVE-2023-24956,0,0,617042c50ae6231f5774921d4079adc25b67a60be09b0750b5d9faca4185fcb4,2024-11-21T07:48:50.477000 CVE-2023-24957,0,0,c9bf5556706d1c46c488f4bdfd23a4e6b661a07b0c4e97892d721c44791ca7c7,2024-11-21T07:48:50.620000 CVE-2023-24958,0,0,1c2ae7c888d61fd05b35f841bed2de1b91f6e80eb7865bcb6181ec4ec4a2a67d,2024-11-21T07:48:50.757000 @@ -219499,7 +219500,7 @@ CVE-2023-25289,0,0,de0ce224bffd109739500be01369899ca72d949f8d8a7146bf4bf245dda25 CVE-2023-2529,0,0,e0c597e5f44df4f0fa35a31922c8c63e9eda9621312de091657b5b531d976868,2024-11-21T07:58:47.050000 CVE-2023-25292,0,0,1f86a32d6a4338c659d4285a5fc98df6a17b54f2c670480f9fe0a7bdeb97ad9e,2024-11-21T07:49:23.620000 CVE-2023-25295,0,0,a98834b6bd1f87785173f8777c2482cbef1ded510a102976fe5e23312fa33c78,2024-11-21T07:49:23.760000 -CVE-2023-2530,0,0,db6a677f08220af6ab3816d0cbd5e5581c51871954258b8e0fcc2eb2fac4c605,2025-01-07T16:15:29.843000 +CVE-2023-2530,0,1,c36e5a9f5a23eb0efcedd6cdd8d45f1a0a10adb98425deae26560f2b5760cd78,2025-01-07T16:15:29.843000 CVE-2023-25303,0,0,0fff8997fbb0dad0658b1458cb96909339d0a3ee3f17f6cda9f8e25ba49cee9d,2024-11-21T07:49:23.910000 CVE-2023-25304,0,0,28a9fcfe9f8defd2b94db49ca3a63558bcf2cd3ca6efe7b0c3e6f407ffddeb97,2024-11-21T07:49:24.047000 CVE-2023-25305,0,0,e034ff43c37edb7c066168ed0e8780cecf32ded05354e03285f0640dac3342bf,2024-11-21T07:49:24.173000 @@ -219996,7 +219997,7 @@ CVE-2023-25886,0,0,a667aac9fb2b7e06e6c5e9a3a1dbf948965b850711504b7919852f1ed8adb CVE-2023-25887,0,0,7ec861a622f4794e61b2e6fec5731407dfc1aeaf59e6818435b4939d22be7261,2024-11-21T07:50:22.033000 CVE-2023-25888,0,0,cb61bb4da0d7b45f7ad4dbf03ed740dc6f9c38e55cfbbe6f1dff451113de96b8,2024-11-21T07:50:22.153000 CVE-2023-25889,0,0,970dc38107ab7ea466443753c5a66522701cb0b176a3ddeaaac1802ddba3bb52,2024-11-21T07:50:22.280000 -CVE-2023-2589,0,0,b52c61f074438217d19fccb25acfdf69239b46f2a65d382d8e51d41e096b5062,2025-01-07T17:15:14.747000 +CVE-2023-2589,0,1,ba169ae5cc6f9ab09416afdb671540e610098b80e7aef58cf4505d99afbbf12f,2025-01-07T17:15:14.747000 CVE-2023-25890,0,0,6cfdb99688214de6b1031c37fa9da504a708ede570574a9d98f15d46b0637d20,2024-11-21T07:50:22.393000 CVE-2023-25891,0,0,dc9e63daac65232f21b0a5ffa2aaf6ad6f7b94b7d96078e378d75ec9be3604a3,2024-11-21T07:50:22.520000 CVE-2023-25892,0,0,4317a18ccd927e44e948b08b50b4a33078a85143890420e5956eaca1a3b959ee,2024-11-21T07:50:22.647000 @@ -220026,12 +220027,12 @@ CVE-2023-25913,0,0,6a91a9eded59c00cc598635ddbe6932ed1f65268ece3db527fc9c04fac8cb CVE-2023-25914,0,0,59463d2416f03e6ec5060d7963c40a18472420a29b874c6c0db6f09f0993e112,2024-11-21T07:50:25.230000 CVE-2023-25915,0,0,ac1356fb3904fb3480ee562c53e20c2c96f303b68ae0d6270f1b87a4d55643e6,2024-11-21T07:50:25.357000 CVE-2023-2592,0,0,d74a21ad07e81cc347069c4edc810aec39f12ab86f734829ab6d0c99d89af9e9,2024-11-21T07:58:53.627000 -CVE-2023-25921,0,0,ed6a86193cefef832b6db32045792d426942887558533ac52fd9a8f56ce593fc,2024-12-13T20:53:05.783000 -CVE-2023-25922,0,0,e03c3b6f89b78633d964cda7c842681582bca126c7bcb2cac775a9c1626c6088,2024-12-13T20:59:47.813000 +CVE-2023-25921,0,1,f72a487373fc04597a1201466c7f2d8d56c50717e5bd21fbde587ac436cc3f45,2024-12-13T20:53:05.783000 +CVE-2023-25922,0,1,0f1b8f78298cca9f068ffab08027b1337d94c98e2e6d7df4df0fdc8dba2aaec7,2024-12-13T20:59:47.813000 CVE-2023-25923,0,0,473d219abf0328b6dd56dc847f6b6bc59c8326971f759bcc579692882ea35441,2024-11-21T07:50:25.720000 CVE-2023-25924,0,0,f52bb709f423a8715d390f866655b920b2fcb347c7260b10abdc2f8a31dcad4e,2024-11-21T07:50:25.840000 -CVE-2023-25925,0,0,e11e78595ee4fbac7719c241c206a80f47e84d4bef9b7a78c8af25c2b894fb47,2024-12-13T20:55:13.413000 -CVE-2023-25926,0,0,f12aeae3021231ea55ef221609e30c8ab55d4354a68466d740983e2de5ddd011,2024-12-13T20:45:41.380000 +CVE-2023-25925,0,1,86335b40d592e7c966cbc3a9f3a74c9b8f696f9150bb0bb4844419e6450e4df9,2024-12-13T20:55:13.413000 +CVE-2023-25926,0,1,c8793dc2ab3604c1e66bd177e93195403392fac0b8ca20b8587efdbaaa8bdd86,2024-12-13T20:45:41.380000 CVE-2023-25927,0,0,ec21d61b5adc661924dd6c5184ab4a4733093f59ec237d03d1cccb1c473d4bef,2024-11-21T07:50:26.190000 CVE-2023-25928,0,0,d2122af5ad8af45fe9b8b4a6861fe20b6bd15440331ce2d37b2b28f570d3d098,2024-11-21T07:50:26.307000 CVE-2023-25929,0,0,208b322401920243bf16b64125ec40b5a36f38d8dae5823cd311ba9a035a8cb6,2024-11-21T07:50:26.427000 @@ -221014,7 +221015,7 @@ CVE-2023-27285,0,0,1007a628ba537eeb9cf3829c1e971c955976a8c54c997aa8b8fb2b201a43b CVE-2023-27286,0,0,0ddae44b2ed029aef181f2c509a039c45c2fa7e460c42bcc46086a02769bb052,2024-11-21T07:52:35.267000 CVE-2023-2729,0,0,7ea70f9a23bdb638173c1dc3736dc1124c05150e55610a5ba19e6ba87c6955b8,2024-11-21T07:59:10.930000 CVE-2023-27290,0,0,e8f6c4ee4e5a554d54ff4146c0d8e3577fc9a770269c23444485b190b99f4c6e,2024-11-21T07:52:35.390000 -CVE-2023-27291,0,0,71466b680d180061708f71e970cd5fe72b643359a570e62afaca5342fbfcfd13,2024-12-23T17:58:44.957000 +CVE-2023-27291,0,1,f15103f462a9934b3ac93d72050d98408ccebda0d448d74ff8c344a5fe4344be,2024-12-23T17:58:44.957000 CVE-2023-27292,0,0,97dcbe475305ce7caa822a272d7c9ae7ba2ff74ad54d20a927c7a39de32fb198,2024-11-21T07:52:35.623000 CVE-2023-27293,0,0,a6bd67d7f4699cf2b8a0eaf868b22b96444ff9300c334690ff1df27158d500f3,2024-11-21T07:52:35.733000 CVE-2023-27294,0,0,a8c2ed9f7bf316e1c8137f253452c0e613f7a6b7e34251d8285938c38d5a8709,2024-11-21T07:52:35.860000 @@ -221262,7 +221263,7 @@ CVE-2023-27527,0,0,ef895853842493f6d6e428aef03b5f2da5176173f94982e6fa7ef668485ee CVE-2023-27529,0,0,742fe919ca459273a4aea573b60b776ff584255cb3cb0584166ca44156cf4224,2024-11-21T07:53:06.277000 CVE-2023-2753,0,0,07c6e809a42ad3b510370047ca6a9af0cbf43d74dbab18486dd49105dce46294,2024-11-21T07:59:13.583000 CVE-2023-27530,0,0,b38d60292378b01f02071b1a709b01b4844b4ce61f4f988722b92fc121e4966a,2024-11-21T07:53:06.430000 -CVE-2023-27531,0,0,e30611c48279ecd703ec75edbea3176656613d33a4392cef427825ac23e063b8,2025-01-09T22:15:26.207000 +CVE-2023-27531,0,1,470c592a54054490454a11c4bcc4669f0b59dff66b009f26fb795e2e9e988986,2025-01-09T22:15:26.207000 CVE-2023-27532,0,0,e3663dce5d0ed9e697881b0b0fb6ed82ce0fa73f270203c1c47b2cc37854ca94,2024-11-21T07:53:06.657000 CVE-2023-27533,0,0,4454110a1b2f4b69eb0494f7d72ff64548b9621981ce044c5c229000994a20ec,2024-11-21T07:53:06.787000 CVE-2023-27534,0,0,89bb3378a6d88f9b6e7db9854c050ad3fe776e1519d432e0012c35b7535689e5,2024-11-21T07:53:06.953000 @@ -221270,7 +221271,7 @@ CVE-2023-27535,0,0,c2b4abc030cb6f06518e4e055ad1676e5925ae5eca610f01961ce82bf7c34 CVE-2023-27536,0,0,b10dfe16758c3908f32d3f68323ce92c363c8910b2934bf81b45b45349f6537e,2024-11-21T07:53:07.250000 CVE-2023-27537,0,0,26116245d5d8e954b6679b002b6cf07b10f8de81bf04eccd9a74edc79eae29ab,2024-11-21T07:53:07.407000 CVE-2023-27538,0,0,ea16ad7cd9b8585d2cdc0b52344854924f577fe779142b677c99cf89474d171b,2024-11-21T07:53:07.540000 -CVE-2023-27539,0,0,7e80b8b5b1419f2471f9c82eef5c3da7aeaf49952819eb2d1b5377dddb827c90,2025-01-09T22:15:26.340000 +CVE-2023-27539,0,1,79c56876ceb58bbd6b856aaea0384a545d7c13f924cf40b93447a0213977b7c7,2025-01-09T22:15:26.340000 CVE-2023-2754,0,0,d5f6eb5ab236b3e3f181c76459d82ae29b6dfb8e4cabb74d93353265b6c24b94,2024-11-21T07:59:13.700000 CVE-2023-27540,0,0,e4f5a1b7cec8ef2d7fa729e4f9d99a9b9a12336eae9d656bd8d408965b9762f1,2024-11-21T07:53:07.683000 CVE-2023-27545,0,0,b2e7b47fc90259bf8fa905eaab6313d354638d5c3596602c89dbf7a17d90f60f,2024-11-21T07:53:07.830000 @@ -221763,7 +221764,7 @@ CVE-2023-28117,0,0,1c4b87e6ffdac2461e6f67e5d4a60b1df82d2291b34817c12ec807a0e1a77 CVE-2023-28118,0,0,3c4e31868a5835a82fc3f7399d5ec399e19eacb503ecafc6816367f80ed133f1,2024-11-21T07:54:26.560000 CVE-2023-28119,0,0,177e497f643703ca71425d1fd44f8f0691bf1adeafa102f689da7214fb97326d,2024-11-21T07:54:26.683000 CVE-2023-2812,0,0,8ca2b5941b57d889e8050dd01df5d6332faab3b7c9be173cb34b6d5df0649316,2024-11-21T07:59:20.210000 -CVE-2023-28120,0,0,6d2eca7d01fa49f27fe1055847efa4031f445b8ea6b85c24e518589f5c819a74,2025-01-09T22:15:26.470000 +CVE-2023-28120,0,1,57858c0e8bcf3062b0118eda472c86c2cdc9f51919a4f4773f1ac03b842e6fad,2025-01-09T22:15:26.470000 CVE-2023-28121,0,0,ec8fff6d6e41724f8544797a24801e52673d8d932749cae73931ca46b253f482,2024-11-21T07:54:26.807000 CVE-2023-28122,0,0,2bc21c696415be5bb15ee8705cc555d3392196074dceafbd506b758ce250de18,2024-11-21T07:54:26.937000 CVE-2023-28123,0,0,6aeaec24addbc5446d4b9dfcebba426183a2c5b7ba1d5c92eba28e82a2e7be5f,2024-11-21T07:54:27.050000 @@ -221850,100 +221851,100 @@ CVE-2023-28212,0,0,da0ce5dfded38a2987b9094cbf118ffc80212a72f93249f8791fdfae0bab6 CVE-2023-28213,0,0,8c46738d5bc47e330afcfffe8664d3d5e0d2249d2eb18ef9ae7a24c15eef6a68,2024-11-21T07:54:36.823000 CVE-2023-28214,0,0,06fddd0d91d1c6e8b2d836253119bd9343d80e9e9fccd9be0cfa2f97b5054f9c,2024-11-21T07:54:36.957000 CVE-2023-28215,0,0,71792a40164ae7ab2a4b584598ff7e445f2f80c7ef807687223db7472d484c64,2024-11-21T07:54:37.080000 -CVE-2023-28216,0,0,7fe09fbb9e31e9d533bd94e1efdd33d94124b2b6c356ad6c0141d27fad4cbddd,2024-11-21T07:54:37.217000 -CVE-2023-28217,0,0,a4bfcc13860d8d426adf1667c86acf8472a05e9b1dc94801a9a464d16fc397fb,2024-11-21T07:54:37.370000 -CVE-2023-28218,0,0,66d9601e3c82acf16aac82d0a58018bacb750748fb58f7ef307cf535c880b9ed,2024-11-21T07:54:37.527000 -CVE-2023-28219,0,0,0a4c3f3093b48764c03ded2ca74e731c08631f48201ddc32ad9adad78516c641,2024-11-21T07:54:37.683000 +CVE-2023-28216,0,1,b2d125bea06cb7bb1734ba11f5fd5356b74627392457ac8f344513e9cd98df8d,2024-11-21T07:54:37.217000 +CVE-2023-28217,0,1,81807bce1955171c185900aee83c3380c1749d3604c567fd46cebd7b57d9a0b3,2024-11-21T07:54:37.370000 +CVE-2023-28218,0,1,aba3540add773a88ac0d00a1a2b9aaca6e472563f26c9a5a7b34249b25febcc3,2024-11-21T07:54:37.527000 +CVE-2023-28219,0,1,1842350ca254de52af3ef2cba8b4dc8f4b9b93690827e1d9cce30b53fff6f57e,2024-11-21T07:54:37.683000 CVE-2023-2822,0,0,3afccf6a5cb09431befe93664bad522f9314374d9ec693499628d92d85041b72,2024-11-21T07:59:21.347000 -CVE-2023-28220,0,0,5e3608901a5559ffab134ceeb6395bea8171dcdee4853c4c059d9d1c314cdf01,2024-11-21T07:54:37.840000 -CVE-2023-28221,0,0,5b3bcfb58b028ba974b203bd50799e8ac89ce8ad86a5a8d9c550fadb63ecec77,2024-11-21T07:54:38.007000 -CVE-2023-28222,0,0,a976045d78f2a2b725adc7b372ec5ea9e18bfaa9f3df5399e5696f4e69b2ac76,2024-11-21T07:54:38.160000 -CVE-2023-28223,0,0,54a25b4226bfc421186345a34f7aff04631402b0f5ccbcf2299ed93e202a68ef,2024-11-21T07:54:38.320000 -CVE-2023-28224,0,0,cc60a130734e4479161c26a8c3f8294f791f0e1a2cb214428cd57e2549c19458,2024-11-21T07:54:38.453000 -CVE-2023-28225,0,0,7edcca2f296be07654e8e2ce10c2a82e44b0dc347b72c338bb874687220dfa98,2024-11-21T07:54:38.617000 -CVE-2023-28226,0,0,eab155c5f3a7b8d4b8e3877de154401c81ef3ff688747d9e3b6dd5092570a4b2,2024-11-21T07:54:38.770000 -CVE-2023-28227,0,0,581fddc86391459100b1ece04d8ee86d13774aee9e06e8c7bb32a67a1bbb7391,2024-11-21T07:54:38.907000 -CVE-2023-28228,0,0,bc8ddc1d8b45a5b2ff11377ee5aaf73c093a53a8d664926e83a14ac07d33b778,2024-11-21T07:54:39.060000 -CVE-2023-28229,0,0,314bcba7fc79345897db878f1714406cbe2c6196ea4a8950727cc64e199a6f93,2024-11-21T07:54:39.223000 +CVE-2023-28220,0,1,cef795af2d62a24d6b89ef3494872c0aed40de3e23d8e83df767f3bb28d44265,2024-11-21T07:54:37.840000 +CVE-2023-28221,0,1,b0e4d3f1f92e8f7cd5bc99c39ed884bf600798f800633bd31a34ae32b144758e,2024-11-21T07:54:38.007000 +CVE-2023-28222,0,1,1d5139e84fd8e7ffd55b533f561264800e293293d0975d3046bf122cc0798d43,2024-11-21T07:54:38.160000 +CVE-2023-28223,0,1,d58be746fdd689f0caa4d337bc759d413ab1ca251dd740e68aded9fd23ae4bfd,2024-11-21T07:54:38.320000 +CVE-2023-28224,0,1,e7655a5fd83a53f0e90fa685eb193224675f763809ebd33f168e57839829b7b0,2024-11-21T07:54:38.453000 +CVE-2023-28225,0,1,fc0f4d6e8ae131282489535b1b0e71e5974e3970022cb4f491663ce13b3c1e6c,2024-11-21T07:54:38.617000 +CVE-2023-28226,0,1,24f45c15d2d3818df6081da3bf69e7dd3a6e9438ec2e61e1dd753367e5306ca1,2024-11-21T07:54:38.770000 +CVE-2023-28227,0,1,997952f80c93c3916ae15ac044654bce3d12ad2f35f530fe3e57a269d438a5d6,2024-11-21T07:54:38.907000 +CVE-2023-28228,0,1,43b61bd7ab6bdc54ed70e306d69d183962360c96eba0e69f0625381076e2782c,2024-11-21T07:54:39.060000 +CVE-2023-28229,0,1,f5d30ef9bff04a0aac3220a2ed8fc63e96f69d95bfa0b3b85175c5d46c87a348,2024-11-21T07:54:39.223000 CVE-2023-2823,0,0,c4291e667ee5a8c549c4231fd575b61295c8d918a1dc21385a6bf1de476e1bda,2024-11-21T07:59:21.500000 CVE-2023-28231,0,0,d1441ac9eee9d2a0a909837303d7b2e20b10c81a8f5f3b443a337fe046a65124,2024-11-21T07:54:39.390000 -CVE-2023-28232,0,0,549b04cff310cee02490b8797f5ee7b54c4490e2afa4383c56b76b90b98f86be,2024-11-21T07:54:39.587000 -CVE-2023-28233,0,0,9fa3283fce9ca3965dbbd592fac76a80a0e2a1395e1d7c6e4043f1d484987b98,2024-11-21T07:54:39.743000 -CVE-2023-28234,0,0,032f519724369b4ea92acce92e37f7f72e19669451021207605093f330c8550e,2024-11-21T07:54:39.863000 -CVE-2023-28235,0,0,4071088435b2d19c9614d9d2768c2b0d44f6a3c9ff4bc3b46d4fe767462a970a,2024-11-21T07:54:39.987000 -CVE-2023-28236,0,0,ddb88bdc4e90f1c14217deea70ab1c1b6e54565d71053ff3288a41695edd41b9,2024-11-21T07:54:40.107000 -CVE-2023-28237,0,0,1e2e1f584c4fc7e873c6f200a8b400b9eae02c1a592898c73dad02653b5846c6,2024-11-21T07:54:40.270000 -CVE-2023-28238,0,0,2aab96f4e40c68207a2836b65591ecb2bd0e720c618713025c19f19f27cba54e,2024-11-21T07:54:40.417000 +CVE-2023-28232,0,1,5a0aa6410ef140509028f5378d02b0b12717f8753bdbb347007832f67ced9b55,2024-11-21T07:54:39.587000 +CVE-2023-28233,0,1,74195a40fd21ac641281031f7d092dd54286d90bc729965e93087489af209779,2024-11-21T07:54:39.743000 +CVE-2023-28234,0,1,fb53ecf25d142fb11ee9e6829ae64aff9f2785178d966eb821f537efcfd31eeb,2024-11-21T07:54:39.863000 +CVE-2023-28235,0,1,60f3270cdaf46602603a131b63ac81bae8152e081ee805325e834466b1ebd244,2024-11-21T07:54:39.987000 +CVE-2023-28236,0,1,78d84fbeb92e471652ac963ec56f4665307b26fb5d88aeeb5ea32c7729578185,2024-11-21T07:54:40.107000 +CVE-2023-28237,0,1,cb0bb9285dc679d9d45a0a21038ef070407a8662f6cf556cdb5deef2323515bd,2024-11-21T07:54:40.270000 +CVE-2023-28238,0,1,29ed30cae713436372aea8da3d9f1b4ec626dace52f2b34af28d3eaf299a1dd9,2024-11-21T07:54:40.417000 CVE-2023-2824,0,0,9aee44db01208f96edfbbc710885de3a16c9c17be189f663d2d50365edc69a94,2024-11-21T07:59:21.633000 -CVE-2023-28240,0,0,7e6d22974090946e0ce5b55aa0d19f21567c504b6f04e8f473e93c5eb703f663,2024-11-21T07:54:40.597000 -CVE-2023-28241,0,0,2c8053601642076e052d0819348e1f5935ea6234eacb830387174f123ade443d,2024-11-21T07:54:40.737000 -CVE-2023-28243,0,0,497ed87c136d82b8a00d17ab929ccf010e5a3c0db9870b8c3e3546ae9c3ce782,2024-11-21T07:54:40.900000 -CVE-2023-28244,0,0,f3436d9c5ea93c548baf6731e380a3f39a5de1a2148db848e864b29281308b1a,2024-11-21T07:54:41.040000 -CVE-2023-28246,0,0,1bba61ccb11f64e3cb9c73d3c7f4814fd1f7e3ed1e4dee6b1d570c27763f2fdd,2024-11-21T07:54:41.190000 -CVE-2023-28247,0,0,38c3ed6927905777e5415e460c918998833188c5d55a8db0ea2a2774de48cda8,2024-11-21T07:54:41.320000 -CVE-2023-28248,0,0,b7aee981e3c2f2315503469c70769b0ef5edb675418cb6d9f5f196fa2dd7a9b6,2024-11-21T07:54:41.460000 +CVE-2023-28240,0,1,c9281d29bc32fb2de011aaf005e690c578a9fa113e2c5857fe70852a60392fcd,2024-11-21T07:54:40.597000 +CVE-2023-28241,0,1,61d57075030dcc0fc6ec17a133e6e79b157f7ea2230418b5f741b6a5d7399abe,2024-11-21T07:54:40.737000 +CVE-2023-28243,0,1,b0d3941f3efeaeb7e2532962f7dc4c9fcbed0cce7fc8824b0a677724f8e4bfc0,2024-11-21T07:54:40.900000 +CVE-2023-28244,0,1,704720461022e70ae6daf92d8c27da1757d6d02242af6f618517694b29958a15,2024-11-21T07:54:41.040000 +CVE-2023-28246,0,1,6485c8587cccb4d5e457372653520a918600bddab348643827f151b07c67f751,2024-11-21T07:54:41.190000 +CVE-2023-28247,0,1,aea4a6e92609b5a812376f44dd7aa279fe970a4b3528f580aa01c733045c40a2,2024-11-21T07:54:41.320000 +CVE-2023-28248,0,1,8b9e5d5cb876dece83f42c20105114c61cfc4cc5d3bbe92cb7d422136de691a5,2024-11-21T07:54:41.460000 CVE-2023-28249,0,0,326a9c4e15a4a0a950f59607f9ab58eb7dac24f96e18a7109a34c1e0432baf99,2024-11-21T07:54:41.623000 CVE-2023-2825,0,0,dc7b13ab0091d4407dcc3c9b1e23d371e9ddd01ba9c6fc175e8d459dc2f2cebc,2024-11-21T07:59:21.760000 -CVE-2023-28250,0,0,f98364ddbdfa70772cbe5d8b382925c4df0781ddc1ba4f36f8d102cedf8be11b,2024-11-21T07:54:41.770000 -CVE-2023-28251,0,0,85747c7bdaccbc7bc012f272a795af4dc8f7981f18f67f92fe615bc2908ca728,2024-11-21T07:54:41.943000 -CVE-2023-28252,0,0,e80161afd9a90114ba8a3d9f8719ac3e43ba2cb62376040555c9b4905fb871b4,2025-01-01T02:15:24.757000 -CVE-2023-28253,0,0,21d322914d503b40b88c65414591d4294e19cd1c15a84b0e8c4001adb9008d52,2024-11-21T07:54:42.277000 -CVE-2023-28254,0,0,4b52ecfa5d4eaaa569889fa9b099b5580feed666346f1c16f4f5ec4bd92873b9,2024-11-21T07:54:42.433000 -CVE-2023-28255,0,0,acfb86aedff209a051058b64f19af0870708b98119bdb99c2d939f88a7fd6154,2024-11-21T07:54:42.577000 -CVE-2023-28256,0,0,a46ec0a6ad219af379d9e8fc433e1a82cfa1f6e9e84dd4dea5448ff9bd311cba,2024-11-21T07:54:42.730000 +CVE-2023-28250,0,1,09cf1043327f069d5f578b3511ea352a939a2176bb05976386d7e313aca118aa,2024-11-21T07:54:41.770000 +CVE-2023-28251,0,1,fd62b263e9cfbde4eaa981b7f26d19e6afb86c9aa3c08f1b5e124a57ccf3c145,2024-11-21T07:54:41.943000 +CVE-2023-28252,0,1,44d57fe7bb3c869521971a7919e25b72f43b70d9a888f688989911fc1ed9884c,2025-01-01T02:15:24.757000 +CVE-2023-28253,0,1,da7e3df64664cb20ec2e3fc06d7be22698fbd7e6b6a9abc7dfdbb84df83f20b4,2024-11-21T07:54:42.277000 +CVE-2023-28254,0,1,8b55c3baab01e9a81aa806c3b78547158c80aacf8d4e0fed1a2dde2d27a33aab,2024-11-21T07:54:42.433000 +CVE-2023-28255,0,1,6282d05de0f55c623ef60cff2392c95be1270053be6c69e955f1bd171f1790d6,2024-11-21T07:54:42.577000 +CVE-2023-28256,0,1,53d012c4f4b9abca5c1a189025597db086560275d3d5102dba44da8993793d55,2024-11-21T07:54:42.730000 CVE-2023-2826,0,0,9debfc446c07cdfa45f1ff780bc199b2de300c169067d8045820a765822f516d,2024-11-21T07:59:21.890000 -CVE-2023-28260,0,0,f83b4ad45a228558971eabcde83e9c9d7dd0ff204ff6302c6a55272b39855df9,2024-11-21T07:54:42.873000 -CVE-2023-28261,0,0,6c364a19666b29ab49d353eda2ed6dac76a5064fedbd5aa476993f93ac00dabf,2025-01-01T01:15:44.280000 -CVE-2023-28262,0,0,c1b2d7271ce4a25ae43ed986f98e4ffa1577fe8efde796f0680cf45d553343e2,2024-11-21T07:54:43.140000 -CVE-2023-28263,0,0,3d383de3ccbb0d73750fe91c699b7e7b60f4eeee667568668e8ec4c256893ca2,2024-11-21T07:54:43.273000 -CVE-2023-28266,0,0,9c185dff327d3adaad069b6585d725ae204654137ea3f2d8713e2a9753d73d29,2024-11-21T07:54:43.407000 -CVE-2023-28267,0,0,34d412f3dd42ef2addf074a71dd75b5516329fc96104b8289c98358a1dce17b4,2024-11-21T07:54:43.547000 -CVE-2023-28268,0,0,35fa2026ee9ab899259a3ec0717a5f432ba1dd29556f64644f48cff31e445fbc,2024-11-21T07:54:43.720000 +CVE-2023-28260,0,1,9d42909900dc5b743b635c40edb3388a3a1b977b27abb173433e9bf06d8a3542,2024-11-21T07:54:42.873000 +CVE-2023-28261,0,1,f824058de5eff95abc36d6f6a46bba4e2c5eb13948639fd11bcfe28268e84d37,2025-01-01T01:15:44.280000 +CVE-2023-28262,0,1,5688fdb5c21f038bb05742d43ee3ebb92be8fddb0b80ee5d81721383b6735563,2024-11-21T07:54:43.140000 +CVE-2023-28263,0,1,48218d485f27fcdc8957f621c7d4aa0fe8187a4dccb65445dc074430a9ec6a34,2024-11-21T07:54:43.273000 +CVE-2023-28266,0,1,466ca78921baf11e6120c13a28d81ef39d9861bf4a872c75b075323c4d8d00e0,2024-11-21T07:54:43.407000 +CVE-2023-28267,0,1,b9c3a767d5601c0118d8fc0b85b9e15d8e703efe00a2988cd34514af2aa3aa05,2024-11-21T07:54:43.547000 +CVE-2023-28268,0,1,36ed0878a25c7a58867f33ba6f6c48f3391acde2537a812a19e8bc2672870f18,2024-11-21T07:54:43.720000 CVE-2023-28269,0,0,f50ac524499cb694ffc993b79d50bdf56db2d8d9ff7b031b8c3cfe5bb680956c,2024-11-21T07:54:43.847000 CVE-2023-2827,0,0,15949a212b8cf6adbda64f9381a20c3d57b4b63f6c4d99509cfbcb61d5cef011,2024-11-21T07:59:22.017000 -CVE-2023-28270,0,0,171d19ca43d471ad58a4effed9d83b5a5fd472e2d511e2acd75678b02c07ae2c,2024-11-21T07:54:43.993000 -CVE-2023-28271,0,0,9f078d6b80b6f8d20ea5c23cb282aa060777c32d4e867ef8e4a02c72f2a9a88d,2024-11-21T07:54:44.123000 -CVE-2023-28272,0,0,39cc85f53af12fe967a3c949fb1eafefb33dd023a4e041fa173d8b0c9fd56ebc,2024-11-21T07:54:44.280000 -CVE-2023-28273,0,0,02ac2fcb5c61095c297a2b0f2582d56f33b6c74153f53386f1f340ff9234c951,2024-11-21T07:54:44.430000 -CVE-2023-28274,0,0,e73af7f5eb51db7cac9a59543ce9a1aa61a06b81443929724ab3f02728d7dab9,2024-11-21T07:54:44.573000 -CVE-2023-28275,0,0,e64c01c7b7e982bcbae39ce09b6b29cf5f4744c598bf4fc1174a354d698c1834,2024-11-21T07:54:44.707000 -CVE-2023-28276,0,0,f0e44a284b197c1fd34de901c4e1c711955c0c79ecaa3782d4d1f2ef0e94dc1a,2024-11-21T07:54:44.853000 -CVE-2023-28277,0,0,d90b4edb46fc4f4200da3f8ed37c4f8ee97263e517a928757d977843758d0556,2024-11-21T07:54:45.003000 -CVE-2023-28278,0,0,fbf2b8867ccb372c14aee20ff81d8946e8e2fe2e361c821547459357423b2ac0,2024-11-21T07:54:45.130000 +CVE-2023-28270,0,1,ae4da388553d15efbb5972efd462d5d9b4a00bb81b36b410c169ab692512d301,2024-11-21T07:54:43.993000 +CVE-2023-28271,0,1,35296cc8fd3316d65a8e43cee75d85a44c78d04c834afd80a04fa425e53d958c,2024-11-21T07:54:44.123000 +CVE-2023-28272,0,1,224e133efb0bc7003c755bd2e88a61ed78921add954bd6989fe332262e05e138,2024-11-21T07:54:44.280000 +CVE-2023-28273,0,1,220afe1b8d1eb288e4606826526ceb7e5e1f1f6956611d9635437632cb0f4dec,2024-11-21T07:54:44.430000 +CVE-2023-28274,0,1,3fb03ae468eedae3d702ad4b9f729fda3b756776e73cbad82fefb13a7942c28a,2024-11-21T07:54:44.573000 +CVE-2023-28275,0,1,8f87d46d967a0d8acfcc5b7cfa5a8bbbf02bdb882c74bd7c7239ec972ca4c483,2024-11-21T07:54:44.707000 +CVE-2023-28276,0,1,fbe9ed0ac1b08d9e118710dd555b2d0d37b413d576f38160bc89fb828a7ec9e3,2024-11-21T07:54:44.853000 +CVE-2023-28277,0,1,657a7cb51bcd262ae465b48fb5cc2738f33eaa082d0cf305a1a6b58ccbab4ad2,2024-11-21T07:54:45.003000 +CVE-2023-28278,0,1,d6e5f85eb923c94d6e2f6deb971e32f2b4acef13e2303b60fc3047f28c83242c,2024-11-21T07:54:45.130000 CVE-2023-2828,0,0,a371c564bc5051c7daa5d723658e0ad0cbde32021c5dc6c3f2f1c91a8f0e860e,2024-11-21T07:59:22.150000 -CVE-2023-28283,0,0,8c12e9fbc7e8ba9a2a81a6bb2b9712e81ef22cc1a7abb1fc3f047e9fbe8b6694,2024-11-21T07:54:45.273000 +CVE-2023-28283,0,1,02e2f2a7203b3861503e7b160552cadcd206518a229a8ce3d0443ed5fd7c1d2a,2024-11-21T07:54:45.273000 CVE-2023-28284,0,0,3d921aa1718834b3faeb6fcf3a3a7497450bca669e20eb0e92b4d8b26ac05626,2024-11-21T07:54:45.420000 -CVE-2023-28285,0,0,690ac379c37e4dd2836dc38b9f378e114fa736e4dc1caa1bc6471ef0be428b7c,2025-01-01T02:15:27.993000 -CVE-2023-28286,0,0,e3d0d61864d764306c17beaf646039cb3914e09ef426fe0a0c66f39005fd8c04,2025-01-01T01:15:44.420000 -CVE-2023-28287,0,0,2d5e7dde9d665a09175c5e4c4972804cd72b28a97f9af983bccce8680129c2ea,2024-11-21T07:54:45.827000 -CVE-2023-28288,0,0,30ea820193afb5b49dde69e6bc6dafc903ba0df4fb826c6e3b69ea3150b72ad0,2025-01-01T02:15:28.247000 +CVE-2023-28285,0,1,bffce47a511701c672d6dbb7f2c407c6eba0aa8c1b86a8a603a5ce6bed3d46b4,2025-01-01T02:15:27.993000 +CVE-2023-28286,0,1,906a963bd5dd8f60b9f3b2ac42783ec5daabdeed7322659bbce7bd86fc88eec9,2025-01-01T01:15:44.420000 +CVE-2023-28287,0,1,450f128d8cc60abae7a7311bf9f2f3652ccd28483332b949efd1b7c78aacbfaf,2024-11-21T07:54:45.827000 +CVE-2023-28288,0,1,5093b285423c1d16cfa9dcf547b753158acbd3a696c51969307e022d2c719c95,2025-01-01T02:15:28.247000 CVE-2023-2829,0,0,ebbb99be5ef9f212ce39405dbc1217e37028f76941bdca8ccb91a39adaaf1790,2024-11-21T07:59:22.303000 -CVE-2023-28290,0,0,69717c93c90512aee9c1ba7046b8e07b2a065db720abae6d2fe498d5522651a0,2024-11-21T07:54:46.100000 +CVE-2023-28290,0,1,b02e3d78ebdd173cee41dd1b90216f639285589b4099ca0c2e8d1dd7d07f0049,2024-11-21T07:54:46.100000 CVE-2023-28291,0,0,f69a372e7a772397c1f263142d3d6f1b07c539d0fde78d2bb46aaf23ae6a1782,2024-11-21T07:54:46.213000 -CVE-2023-28292,0,0,c78e5aeed5f840eb0e08647ae9aef9b46a8c857a650037f63a7ef5b83d6296bb,2024-11-21T07:54:46.350000 -CVE-2023-28293,0,0,d91cd80d89ebdc241fb9e237244359330f3bece049db252cd6a8032ce5a39394,2025-01-01T02:15:28.683000 -CVE-2023-28295,0,0,e7e7ceee27867755b923aba7ae486c053d734a0f898d7455f11c91d1fff36c07,2024-11-21T07:54:46.643000 -CVE-2023-28296,0,0,9ee84ee021d819fd871ba9988fa34a402f4d6d5e6b8cd64f187130bbb657d156,2024-11-21T07:54:46.780000 -CVE-2023-28297,0,0,1c861bfe2e297ab95d1fe4ca82cda991f785d0643b6f651622e3fa04de6d0c79,2024-11-21T07:54:46.907000 -CVE-2023-28298,0,0,2c5a7c22034a5784b759a6d0cb828e4ac4dc09146ed7dd6196773d9723bd297d,2024-11-21T07:54:47.047000 +CVE-2023-28292,0,1,f1f8611af430fbc2df038333ee2f2725042f93824e7590bbb4e67749175033aa,2024-11-21T07:54:46.350000 +CVE-2023-28293,0,1,e5541a4985b1c37eb9ed6e8f66b82936e4d114a14055c18d0a3c76fcee0383ba,2025-01-01T02:15:28.683000 +CVE-2023-28295,0,1,eee6c5d33342536b29da069ff1bdc69fd6a0acbd0674d64bd819c16074875464,2024-11-21T07:54:46.643000 +CVE-2023-28296,0,1,caa5ad799204d1fe6e39a7879f2214ca1777aecef53211daa6c7363c58a11e0c,2024-11-21T07:54:46.780000 +CVE-2023-28297,0,1,32a415e74fb2f943c340493980b16b80be723e99214061a74795f54be1617a5d,2024-11-21T07:54:46.907000 +CVE-2023-28298,0,1,27d98d1a1c8be95757d28327184cd0dd130dcb4fd2affc307b1d4802caa63ea3,2024-11-21T07:54:47.047000 CVE-2023-28299,0,0,151b97af0fd12592cef19a08217c6ccf186f1c8975a380f67f50bb0eaafb3253,2024-11-21T07:54:47.197000 CVE-2023-2830,0,0,afa9f35d5f92e9adb5e591002c9550a94202603384c5cff69d3a30a0f7b43281,2024-11-21T07:59:22.423000 -CVE-2023-28300,0,0,8d9466adef3cdec9c78cb5f2c374146efdca3f0c70c341f8026f70c6d249511d,2024-11-21T07:54:47.337000 -CVE-2023-28301,0,0,b6484041f1ce113d248c0894d50f34b95f896ab56886420c807da188b033fc5f,2024-11-21T07:54:47.467000 -CVE-2023-28302,0,0,421fbbcc8a4bbe61f0bd4fbc1bfb9be3e01c71456ee528748ab22b8280990e71,2025-01-01T02:15:29.660000 -CVE-2023-28303,0,0,a86806c1b85cf174f85ad69f1e1779392ff26bde46268b836df4e409965357fd,2024-11-21T07:54:47.747000 -CVE-2023-28304,0,0,675596aaca2097e33127be006074f8af024b4cf027d074663fa99154aa9d1191,2024-11-21T07:54:47.887000 -CVE-2023-28305,0,0,10ee9aeff3f2faea26fc25c06f69eeda54e5535101edb64ff954bcf7c9f8e46c,2024-11-21T07:54:48.030000 -CVE-2023-28306,0,0,afe893142790b41aa2e71c67889bcd429843c0d8748d4089e015de64d40f30c6,2024-11-21T07:54:48.180000 -CVE-2023-28307,0,0,4b5bcd7e7721de63258bf40d67fe9566a8a9c4c1c06b54be0cea8b80fa353c9e,2024-11-21T07:54:48.350000 -CVE-2023-28308,0,0,dc6af8e87cc49e385ce2bb26edcac17f142e652b50cdea2a42aaec5fa1a533b8,2024-11-21T07:54:48.503000 +CVE-2023-28300,0,1,812c280bf87b13295521f04f7cc6bd8d0a2ed615cab7a8fe9c057e24fe6e3637,2024-11-21T07:54:47.337000 +CVE-2023-28301,0,1,11f942d09a75a1f1d36c8760ecffe42cb42cf5fd9f8444c5aa7bd16b75fbfebc,2024-11-21T07:54:47.467000 +CVE-2023-28302,0,1,c0ed64707c937a115ef4295335123a6bc9891a84888456b11a9b02e3ea1c8dd6,2025-01-01T02:15:29.660000 +CVE-2023-28303,0,1,177a685c7dbca7f5e511c6e6e701da63dc297ee31accda0a4197f4bb3f5dafc1,2024-11-21T07:54:47.747000 +CVE-2023-28304,0,1,d2b1131b10699689d0d11b14f99b769843da22dfff9bef2fe414995080975fba,2024-11-21T07:54:47.887000 +CVE-2023-28305,0,1,1752011dd3d43d1446349d4ac13c6b5e911d66f7ed60aaa6acd5c1e6d8a3ea8e,2024-11-21T07:54:48.030000 +CVE-2023-28306,0,1,8d24e9f9f4d2ef42cdfa367b466b5429b249bf3a5927d35ddf7f983329c44f7e,2024-11-21T07:54:48.180000 +CVE-2023-28307,0,1,c6a966f6abaedf61500f3fc37ef8be1e9fcebdbdb5f99e824b0acc04b4d977d0,2024-11-21T07:54:48.350000 +CVE-2023-28308,0,1,c52bdfbe1f6f5be041c27458d6cf097e592dae688d6cfa3b9ec3a5fe64577f75,2024-11-21T07:54:48.503000 CVE-2023-28309,0,0,4b276512dcdeced204e1258a295395183ffdcf8a18794759da4dfe5baa6549e2,2024-11-21T07:54:48.650000 CVE-2023-2831,0,0,e2c5ce5e2c28d316cd6fcef8975bb7dccd2540fe5b1001b8c29b94300c96916d,2024-11-21T07:59:22.540000 -CVE-2023-28310,0,0,ee5548ad38790debdaf6ad88f9627b18c89cbce51c43b3986ea2e67270d9dddd,2024-11-21T07:54:48.810000 -CVE-2023-28311,0,0,7905e3580bc6367f09de3b41ce47950f80f93b5168ce14a84e0affa2eeb676bd,2024-11-21T07:54:48.950000 -CVE-2023-28312,0,0,d996310dd28a922329145a3cf5e9f695e27d41db2a9ddd28ce881a5d9660a205,2024-11-21T07:54:49.080000 -CVE-2023-28313,0,0,044a79469196810877392122bae53c35cf431498a0be28d56a7b078e3d7b132d,2024-11-21T07:54:49.210000 -CVE-2023-28314,0,0,6553fd82c19c88065658dc1f7eff0801162c87007d36e832e30fbb630531d524,2024-11-21T07:54:49.333000 +CVE-2023-28310,0,1,7cc1a50059449f03df16f0c1e5f3e16fbadde3000ad71c2e5842997f6f62ebd2,2024-11-21T07:54:48.810000 +CVE-2023-28311,0,1,ae1d98713c13b437aeb41be3fb141850b3b329b1e2b07eb845b6321be0898d7c,2024-11-21T07:54:48.950000 +CVE-2023-28312,0,1,9bbbb50d3a478374571c35118a910e274ec76c430b5052387859617e62c880ac,2024-11-21T07:54:49.080000 +CVE-2023-28313,0,1,7e92813a60a330cd8b200147bcc1a72031a7e6eb7ea7d87eae4d39aaca464fc4,2024-11-21T07:54:49.210000 +CVE-2023-28314,0,1,0677a18d37e1afc599db6a9caa4520f9a84a365ea28fe178a16403c8396123d5,2024-11-21T07:54:49.333000 CVE-2023-28316,0,0,afdda6cc1ead6cc81ba00f263c51ac9465d7ca8726f43216ab3351c2056633ee,2024-11-21T07:54:49.460000 CVE-2023-28317,0,0,9fca8e37a5f16effde329a894565f685f1a580f3fd9795f7a92b105d47f6e502,2024-11-21T07:54:49.590000 CVE-2023-28318,0,0,5677355d4a68e7382bd107644eb5403fbb104c2bf2f9e8d18b2828d5c599e5b7,2024-11-21T07:54:49.720000 @@ -221994,7 +221995,7 @@ CVE-2023-28359,0,0,cd55c22312372fb6f15a04d4134b33870fb2934978c373a7db0c340ac2a08 CVE-2023-2836,0,0,e304035203056a4f4a3afb3be38115d5014b45bcaf46fcbecbc18c914bc80cef,2024-11-21T07:59:23.180000 CVE-2023-28360,0,0,5ceb5d0d6176a83870db92b27e5fb686afcf6195e7abefc91242e0e5f5fa8572,2024-11-21T07:54:55.440000 CVE-2023-28361,0,0,06fd1bf43032dd9213305815ba759914cce3eec23910c1687ab4d395be68b16d,2024-11-21T07:54:55.543000 -CVE-2023-28362,0,0,5bb40ef7b7f873fb579b9933f5c4a52b81cbbed8ffea168857e759807dae4eba,2025-01-09T22:15:26.737000 +CVE-2023-28362,0,1,27177a8d408082bb8174e3277015cbad3f5c47547c0db03786e552334779b676,2025-01-09T22:15:26.737000 CVE-2023-28364,0,0,b8e69a33d67631d2c3d239f1c01280f5576d4f6621054c060df4f07489827dbc,2024-11-21T07:54:55.643000 CVE-2023-28365,0,0,4859f30e6a1c91c44b3748aad21832f67bb60327910ad2139bb1ab931e722eee,2024-12-12T18:54:11.327000 CVE-2023-28366,0,0,960802829fc443cdad65c26e57c943b97bd525d1c3e69a293aaac3644999e79b,2024-11-21T07:54:55.887000 @@ -222153,7 +222154,7 @@ CVE-2023-2851,0,0,7ba8f792fc3fa0e1fc66d41c7883c06fdc98e4bafbc9a4acc1539e5335343a CVE-2023-28512,0,0,905bced05b9d94f9fb010dd76a64efd044b1e18c0d17f0fe01c0e785c0fcf691,2024-11-21T07:55:15.773000 CVE-2023-28513,0,0,e9946240011947f68ba84203cd8006bb612def46b47525afd835dea122138d0a,2024-11-21T07:55:15.897000 CVE-2023-28514,0,0,cd4136cacd314150419772de032429e96c9c80cb63cb7edbb8650a7546b78f76,2024-11-21T07:55:16.053000 -CVE-2023-28517,0,0,cf364c812d6baddeb7eca7babc0373ec037d3ca6767ac1d5960eaadba032e082,2024-11-21T07:55:16.223000 +CVE-2023-28517,0,1,11acce6f7519925feb9780bce41c0d48c0b180e03546256515973ab09ddc162b,2024-11-21T07:55:16.223000 CVE-2023-2852,0,0,15a8736ecba62a5495ab259dc73cff27cb5ca3e70bdd52b5da508eda2a3c8683,2024-11-21T07:59:25.320000 CVE-2023-28520,0,0,7afffc97c67b44ff449392b73a6c12d9c670fce2954c4beff250981a10d5820c,2024-11-21T07:55:16.367000 CVE-2023-28522,0,0,880ed0441dfc22421005d6fb849b60ef66bf3fdabed2fa72b4d627271bbb03a9,2024-11-21T07:55:16.517000 @@ -222891,55 +222892,55 @@ CVE-2023-29322,0,0,1ce4e008dd58db745222a8a36aa5950fbdcf4d59dbe5036fbf2bc9aabc359 CVE-2023-29323,0,0,d2c1d12da18398f09203e505901faca9343d6982f925e0efaf9943d04271fcc1,2024-11-21T07:56:51.893000 CVE-2023-29324,0,0,1c26b5e7bd5faa1bc2a103ebf5fbdb81c32380d04f6f66404c5222e053e7f911,2024-11-21T07:56:52.040000 CVE-2023-29325,0,0,e47e6a3bb44b268832343bf40eda68820a438a656791e1018a772121699a5cff,2024-11-21T07:56:52.187000 -CVE-2023-29326,0,0,adfa4473eb21c3f36980ab93553b759b9d59b40e49f3a6bab9780d112b6edcaf,2024-11-21T07:56:52.320000 -CVE-2023-29328,0,0,756afa6dddfe9789eaf4edf7bf9f45edda73d8158f090ffd73a254e242d73351,2024-11-21T07:56:52.457000 +CVE-2023-29326,0,1,ef1e895bb4ec0f5a810cfd1dda894c61f395c350f7221e0521889ab17e3a96a0,2024-11-21T07:56:52.320000 +CVE-2023-29328,0,1,4fac17a53f952773efe9ed61f1e9eee4a0238d50556e82a87ec62a17a157f6b7,2024-11-21T07:56:52.457000 CVE-2023-2933,0,0,506fe21d298d60e81cfb459c778ed6f01e9fe9fb433eb44e4e20d5f10537cf51,2024-11-21T07:59:35.787000 -CVE-2023-29330,0,0,18f4ad81fb1531af4273cebddffe5353c75e00ee736fded4849809c77f09f07f,2024-11-21T07:56:52.567000 -CVE-2023-29331,0,0,6188fb2aa7eadd21f5f453c41aaf2ec9e619e3a13ecc23b25ae70fa2e512a517,2024-11-21T07:56:52.667000 +CVE-2023-29330,0,1,b081a0b9606df4872e479593d4c39109a0a6e927bc23a0f9a36e4cdff9539df7,2024-11-21T07:56:52.567000 +CVE-2023-29331,0,1,2c87d248fb12110e9d3681dbc35a6bacea3b3865feca7228ffb2a45f791233d2,2024-11-21T07:56:52.667000 CVE-2023-29332,0,0,426a3f2d7c6e1861c2689b1ef1d51fd2ed2c65028037d9c2f1e87622c3393c2f,2024-11-21T07:56:52.810000 -CVE-2023-29333,0,0,8edf2f750f0cc2ec151d0f98ba38b334f6e4ea366139c630055721a815c6095d,2024-11-21T07:56:52.937000 -CVE-2023-29334,0,0,bde2887a6cad1d9016d7e93942e1ee53333edf102e8234a79ed2a9cf967ddd9c,2025-01-01T02:15:32.397000 -CVE-2023-29335,0,0,56f84a2a327bcaf4b4a021b59f9cd01da408ca5542d6e24c1786ff1d28b6c3d9,2024-11-21T07:56:53.140000 -CVE-2023-29336,0,0,593b322c1c20534cc81a08b9e17594c96bfc4ba48fece2bb5c6a57630aacfe93,2024-11-21T07:56:53.257000 -CVE-2023-29337,0,0,bf0a4d2104699d97cd9a5cbf9af37c9a17296f42c1f4f4995f666a000079a0b7,2024-11-21T07:56:53.383000 -CVE-2023-29338,0,0,eed945c303e84792ba97144897830baa72423d5ba45d3d6aa6802c73e8eba5ed,2024-11-21T07:56:53.497000 +CVE-2023-29333,0,1,ebe99c0d1131974e4053f49a1a29c24033d2fe038321772c4830d71e04c90cee,2024-11-21T07:56:52.937000 +CVE-2023-29334,0,1,a2be4617c60955eabc94b1810147ba12fb3f251ab8d5e63a7300da6e524e3635,2025-01-01T02:15:32.397000 +CVE-2023-29335,0,1,61181b1a8a11a5838648b960745a60fbd0089db6dfa8e380519644f6fe0f4ebe,2024-11-21T07:56:53.140000 +CVE-2023-29336,0,1,d636ef46c4e59eff92a5ec73bf9aff4e82f4d80ff63c06cdba53f2761ef054af,2024-11-21T07:56:53.257000 +CVE-2023-29337,0,1,56f7ebb5d77e680d8eedc44e0115faf21d19e36d9a2d179e33c83a37194e5627,2024-11-21T07:56:53.383000 +CVE-2023-29338,0,1,0a206c80a6cbabe76544bbefcbabd7c4cd4e002b38f989e3be76bf80ce800e41,2024-11-21T07:56:53.497000 CVE-2023-2934,0,0,778832cd1bc7f448d8f80d3d8991e2c0037e5e70b5060dfce6fadeb9ab5bcc90,2024-11-21T07:59:35.917000 -CVE-2023-29340,0,0,e1d3afd85458bdf8d91afc270e3cb5b62d1b43429362be0c76df1015cc369829,2024-11-21T07:56:53.593000 -CVE-2023-29341,0,0,22d31b547d05f79ccdfe3ac6c3dc5e99969521b665190a5752d77c9b019455c7,2024-11-21T07:56:53.690000 -CVE-2023-29343,0,0,89ae41d499ade18130cae24f58e4410a085a7e771844b3133ca81e14157f3309,2024-11-21T07:56:53.787000 +CVE-2023-29340,0,1,e966cc708b35531d0e45f9b981317d33515108418beea9c7366f1e3c2ea8dfa6,2024-11-21T07:56:53.593000 +CVE-2023-29341,0,1,1b699b9ad2eb804877376073e76ece4b61190c4d50727cb158d1eaeb5f735266,2024-11-21T07:56:53.690000 +CVE-2023-29343,0,1,cfc81706f22482b588ec8d4d8f313a6c58dedf406801f4ffbd4237aa891636ab,2024-11-21T07:56:53.787000 CVE-2023-29344,0,0,aa9a273c7d2a522ac37d5ad0cdbeaae05813b658602af8017f63cb8a17b4fcde,2024-11-21T07:56:53.887000 -CVE-2023-29345,0,0,1aac494e89efefc7f64c882e89c6765103532264a28599de47146c776f52f3f6,2025-01-01T02:15:33.550000 -CVE-2023-29346,0,0,2fc1408092444fa0eab213e479d91323bfd07a0dd63f5c14c3b8000ccc3d18e2,2024-11-21T07:56:54.103000 +CVE-2023-29345,0,1,3e6f767c3a559321f7adb5c3177c5c494d0b29138bf9d6b87cd3926904a7c64b,2025-01-01T02:15:33.550000 +CVE-2023-29346,0,1,9fec9678f6f849fcd1dcd7b229832f02e19eaf4372492fefe24a8743ad6da639,2024-11-21T07:56:54.103000 CVE-2023-29347,0,0,7540a8b8428988d01d75207c6801c8a4498852058d52dd035965bc8e2062d910,2024-11-21T07:56:54.247000 -CVE-2023-29348,0,0,781dae73d0f9b05a2214a79d71b773079359d436a6ba59d60011648048c434ad,2024-12-12T01:19:43.200000 -CVE-2023-29349,0,0,6c0d9d5d432f12de3e77ae4d3a7dbcc03ac4a53a29f7cc093aa9c73a5ca58adb,2024-11-21T07:56:54.493000 +CVE-2023-29348,0,1,cde6c9d0d1c4a590530eacdeaf218fbd357f360dae86b83faf7599fdfa227cbf,2024-12-12T01:19:43.200000 +CVE-2023-29349,0,1,68f1fee57235f288caf20ce8e4d0f85f5f33cf9c2891304252a1903ff58cce8f,2024-11-21T07:56:54.493000 CVE-2023-2935,0,0,a1f830d805349a093c6cdeb2502a942677ce9d486e83c5e09da994318fabaf74,2024-11-21T07:59:36.050000 -CVE-2023-29350,0,0,bd5784de0ec57b4e20e139c7ac5918533df0732255bd42ecb783bb89a9a81e94,2025-01-01T02:15:34.217000 -CVE-2023-29351,0,0,ebb16a2df9a36f58f1daefb8b638cca62465a36c93aa65d7b1092526d73230d2,2024-11-21T07:56:54.710000 -CVE-2023-29352,0,0,afc285f13a13f38673adbb171154d73343b76b59066c9f6d95b514a4f39e2341,2024-11-21T07:56:54.847000 -CVE-2023-29353,0,0,a2d9a0bb32320e278427a81f57cba08d43f6305e40a742e68e4d6f6899d1c985,2024-11-21T07:56:54.950000 -CVE-2023-29354,0,0,9cb69fb20e359738f721c0e7436b376b33d2a2756db3f6b11e6b0c5803189235,2025-01-01T02:15:34.737000 -CVE-2023-29355,0,0,92e5aef7f675f8560c41c03f171e1c7e23270cc4b9912a5427361224e74a6a4b,2024-11-21T07:56:55.157000 -CVE-2023-29356,0,0,d3aef79cb01a98b5464b8faa27add3a20097ff2b55a94ad1b8691e7c1d484e34,2024-11-21T07:56:55.277000 -CVE-2023-29357,0,0,f55df43678bbfcba0c52b8b471be9c3db92d9eaa3073039d11d980b03cebe484,2024-11-21T07:56:55.393000 -CVE-2023-29358,0,0,1839adaacdcd048eb55b6224d41e3eabe255476d4cf0897c47fcfd2789e9b7a4,2024-11-21T07:56:55.520000 -CVE-2023-29359,0,0,50576f9fa6fc3ad178602cc1ec86f575267908d7d1f7c7b1e10dcd222aafc147,2024-11-21T07:56:55.653000 +CVE-2023-29350,0,1,e4cb2f7ec0908d2b3b078b0f23e5d927b06a084bd131812f934270e4638ebb1f,2025-01-01T02:15:34.217000 +CVE-2023-29351,0,1,c6062460c858a11fa54fe28b1df1eb831b3681fa11b330d5f4bd8bff873bd007,2024-11-21T07:56:54.710000 +CVE-2023-29352,0,1,61aea718674b1cd43fae5ad5029d7058a355bbad52de0a500c7bb8958f696e69,2024-11-21T07:56:54.847000 +CVE-2023-29353,0,1,e45da25f220130fb5cb22b2ad186a54f698750c2df7dce2298e1cb7352ee3695,2024-11-21T07:56:54.950000 +CVE-2023-29354,0,1,cdbbf01d45f9364f6431f7299c4d54db6a7c17ef07bc4a27b4b5c983265d4dab,2025-01-01T02:15:34.737000 +CVE-2023-29355,0,1,37a7c5aee10b1e24a3440064cdb291401fd0f225379840c469ffc476bc6e1e48,2024-11-21T07:56:55.157000 +CVE-2023-29356,0,1,60935bcd3b095359e91882913cbcf4abe11e68728d0771cac0006d94e9e34dd9,2024-11-21T07:56:55.277000 +CVE-2023-29357,0,1,90f01b95361796ecd66f8e6d1f581fd4022b1a9f00b76a98ef1592bdc460b378,2024-11-21T07:56:55.393000 +CVE-2023-29358,0,1,7ccae9f82193ec7bc0c32c5adb10e39049b93d1ae77a4746241d0a8ac0d92eca,2024-11-21T07:56:55.520000 +CVE-2023-29359,0,1,51914d31d344268e10e3fa53982ed350af46f96e5d10efe6d4cadfbd88d6d4d0,2024-11-21T07:56:55.653000 CVE-2023-2936,0,0,35f1cc12fb7af17c48afd6aa8328fec33f868fc27aead065fec431992c565531,2024-11-21T07:59:36.180000 -CVE-2023-29360,0,0,17fd97595460050ec7da53060a09657bc0f981b0bb0ca6f0e7913e758a6f420b,2024-11-21T07:56:55.787000 -CVE-2023-29361,0,0,5ba8101fa03a406d4d876de80c6a8d09acf2bf5d5da63739c24215b3acc8ea27,2024-11-21T07:56:55.913000 -CVE-2023-29362,0,0,27f8a52cffb7a5d20b1c0d08a6f01797dd5af1396fa918088a0fb862fbfaa6a5,2024-11-21T07:56:56.020000 -CVE-2023-29363,0,0,772e2f455dd7a72cc5b062eb535aeb16b01d855ed338c76810b230c837487e20,2024-11-21T07:56:56.143000 -CVE-2023-29364,0,0,aa597951ee0c72380c520f957497cb2c878d7189fb3cbadf30a638503f5260b1,2024-11-21T07:56:56.273000 -CVE-2023-29365,0,0,e3570477e8cc44d59882c3901a635ed3f3f3307ddd0618e7a78aaee540dc0240,2024-11-21T07:56:56.400000 -CVE-2023-29366,0,0,b895dc442a14d7917c3dcc080ad0165378fa5283558eb715253c35fa5fa7af5c,2024-11-21T07:56:56.530000 -CVE-2023-29367,0,0,ec21c98a6bb878ff880d44017e7ebaf2710cceed269b79fe4fcab9d282888199,2024-11-21T07:56:56.630000 -CVE-2023-29368,0,0,e4e7e23834cea51f26a055904cc0213d519bf11d0334a1e2100f543511bc1694,2024-11-21T07:56:56.740000 -CVE-2023-29369,0,0,d61af9320f652c99757788b15b9ef21416511cf04191217a29b6a924b42a4ec2,2024-11-21T07:56:56.870000 +CVE-2023-29360,0,1,3b12bd44f49a17ce46c541d0b70a322d835d77759f4586f163e5c184c6be11c7,2024-11-21T07:56:55.787000 +CVE-2023-29361,0,1,d0050d38806dd20e0260e844860d6cf031fbbd3abe4d0c166344fd1826afec3c,2024-11-21T07:56:55.913000 +CVE-2023-29362,0,1,794effcc8a78fd69dcca30e59df44544c99f1ac12347f460d805fe0a92bbf06f,2024-11-21T07:56:56.020000 +CVE-2023-29363,0,1,0b84a5ccc103207dee77fb5e109928817515938cbc02f20456004850b7c6e677,2024-11-21T07:56:56.143000 +CVE-2023-29364,0,1,4b17e5db96ec1b264f8f922ebfcbe9754dd3f3c53033785437b523ce9367883c,2024-11-21T07:56:56.273000 +CVE-2023-29365,0,1,79de0ea652570d16fc086039b90dad4434e4d69db0336a8d1aee78b56fa8888f,2024-11-21T07:56:56.400000 +CVE-2023-29366,0,1,3efed68d33a4ae1a17338ba261e03adef17a82981a155ca0db57a1c6401f59da,2024-11-21T07:56:56.530000 +CVE-2023-29367,0,1,23c40728404323e849f595204253bd7a6fd6f5ea5e9c120bf0de4f71469c062e,2024-11-21T07:56:56.630000 +CVE-2023-29368,0,1,a0ec5af6df86fc2c7d9673164b6dd99f180a8cff7ef089b3c457e63919e51b90,2024-11-21T07:56:56.740000 +CVE-2023-29369,0,1,bca25ce565153219d1f64d4ddee39f94d6e725abf989120af706b83272f6994c,2024-11-21T07:56:56.870000 CVE-2023-2937,0,0,6f7e4f154f7ff10d2a9c91933272a27da8a14d5b93cfed9f30b3356498bbe32a,2024-11-21T07:59:36.307000 -CVE-2023-29370,0,0,61ed87d39ff98a6a72d3f0e66532d4a3a766381cddfcec512e627b82aeb40452,2024-11-21T07:56:56.980000 -CVE-2023-29371,0,0,5605c7477b20727f7b0d2df9c78d815cc3b81bcb06b56de58612a79b5a9aed8d,2024-11-21T07:56:57.097000 -CVE-2023-29372,0,0,69f054919dd65d609acf95879bb680fca752d554639ef86c2b679500aa16a4c3,2024-11-21T07:56:57.223000 -CVE-2023-29373,0,0,505d3c2acdb78c7aa82acf007057a2a548ee07c56737b09b415c27b1ec40ed37,2024-11-21T07:56:57.347000 +CVE-2023-29370,0,1,3b5427bcb35bbac847bac96cb577c102996a23e0a01985a30a9a44e9cff3aa3e,2024-11-21T07:56:56.980000 +CVE-2023-29371,0,1,191e519a42a5df41f1023bf9ae4cf5523dea74950c0461050b0eb7e4427adce8,2024-11-21T07:56:57.097000 +CVE-2023-29372,0,1,8115b339cca23a604fd3b3fa184a2dcefdc174f8cc9dcd53bc8c9ebc153d7263,2024-11-21T07:56:57.223000 +CVE-2023-29373,0,1,270d476731a85cd63c291e58603c75d0ed7fc1e9b98fefc1fc724cd6a3e371fc,2024-11-21T07:56:57.347000 CVE-2023-29374,0,0,930a115a381ce3b53d56fc0e8d7eeb8e796c5679738528df6470c841a2b982e1,2024-11-21T07:56:57.473000 CVE-2023-29375,0,0,418a75d525bc59a552a62e3394d5f3eeba826fa75fd7504a8ad79e98dc8a19b5,2024-11-21T07:56:57.613000 CVE-2023-29376,0,0,247f783a93513e425c49b2a22920737e0d36f3d75a22eeeea0a947bb7e6d1fe8,2024-11-21T07:56:57.740000 @@ -223530,7 +223531,7 @@ CVE-2023-3039,0,0,5fb1117a3c974bb5675369e9814fd755e9c2c006e24e1faf7e2d4e7dfc8e49 CVE-2023-30394,0,0,0029c2f10bc315baa8071d1799ca0506df08206db7f66c6b9f0205ee7b2e5992,2024-11-21T08:00:07.210000 CVE-2023-30399,0,0,b6956a22b0bc087cbd98c36f25069d5d41456450781cd6d5930cc67d63cbddf5,2024-11-21T08:00:07.447000 CVE-2023-3040,0,0,67b10a7d0cecd4a947310cdb25b708f4d546d578a5f4921b2c7bf1b13d0b5a63,2024-11-21T08:16:18.200000 -CVE-2023-30400,0,0,bb78308803fe6c1020bfaeee5d3b90938cc2692e9bc738ed02b67caa3fca347e,2025-01-07T17:15:14.917000 +CVE-2023-30400,0,1,12950301b15d2ff0df9404bed25a6b84a57d9a17ff834ac2eba356cba5785e46,2025-01-07T17:15:14.917000 CVE-2023-30402,0,0,efa5059955c4d7e3b68dacb1538cae5e0c524acca0015b8971b4926f93dbd6aa,2024-11-21T08:00:07.747000 CVE-2023-30403,0,0,ce8104defab1170a8d832bf42d1268c7fd633f46e683c6fe27dc6198a30f5e2b,2024-11-21T08:00:07.907000 CVE-2023-30404,0,0,87b22d02f8d2dc3fb5adecb232d7bdadb45a7cec15c53d553846e4223dd2f9c5,2024-11-21T08:00:08.073000 @@ -224062,7 +224063,7 @@ CVE-2023-30991,0,0,de2db56c71af8399357ed8a4cf112de28b8178f3b8cb578da629d46944877 CVE-2023-30993,0,0,4a4de5d6375514e64f0eaf44f23e28d3a676249e3d88e1a005c9862b520400a4,2024-11-21T08:01:12.090000 CVE-2023-30994,0,0,cbd02525e8c908b73ddd06670bb50a8ca2b810a29d63f2c4e4ccfdfc7e6a1110,2024-11-21T08:01:12.227000 CVE-2023-30995,0,0,b7e2b13b20a5ca839c0ac38928ecc607d6aa4242d09c5d748ccc5e751f7c7a3e,2024-11-21T08:01:12.387000 -CVE-2023-30996,0,0,75a66c615d454ad54ec2a1248c2ec39a1ff476003c0ebfdee175d7c933a52a96,2024-12-17T19:32:35.977000 +CVE-2023-30996,0,1,92d968a719a07ec7918fdba7e70048b08ef63002fac0331f7aeedafe7cc3247f,2024-12-17T19:32:35.977000 CVE-2023-30997,0,0,8dd5dd26038e55ebdb519363fa8b82860935b7ce10ac507b51f97e598ebd99ad,2024-11-21T08:01:12.673000 CVE-2023-30998,0,0,1b00f28dc35f59176e7958f557b09890b72dce1faa64188da2cde648bd14afbb,2024-11-21T08:01:12.820000 CVE-2023-30999,0,0,d65467b8e34ab6201a64660d8da5fb62f7701957461fda4704000f7f78596ddb,2024-11-21T08:01:12.980000 @@ -224167,9 +224168,9 @@ CVE-2023-31101,0,0,84390422dbf5a5821e8f914f92993664c448911aa69b3d18f44ad9c02ab10 CVE-2023-31102,0,0,0befc70f83111f1d99f825978a0e14dbded8ec6a90b35f966fe71f085d9e1dd9,2024-11-21T08:01:25.310000 CVE-2023-31103,0,0,c126d74ecf5c8750ea2a8ac6630f10fb115366517006f7188ade051da19d7f41,2024-11-21T08:01:25.553000 CVE-2023-3111,0,0,6d3d3c61c7709921810ccdbf24a159b026d4c2c7113ef97420750e9567380cc7,2024-11-21T08:16:29.017000 -CVE-2023-31114,0,0,00399776dc80a67be64865596040d39cdeea521434ac9adca360562a6af8fb2f,2025-01-07T15:15:06.800000 -CVE-2023-31115,0,0,0a9658ffe7dda834de67822bab10923e699c8c59bb4f6fc69994082426af92d9,2025-01-07T15:15:07.683000 -CVE-2023-31116,0,0,c55675266d454aebeb27737d038748d80f3794b5e0768fb210700351bf7de879,2025-01-07T15:15:07.850000 +CVE-2023-31114,0,1,646b1559a286dbf251a9b7e4f4171b3a4dbed22d483d4f1675a074315a9b26c9,2025-01-07T15:15:06.800000 +CVE-2023-31115,0,1,3242362ac93541a142ec8095fb492b63b5074bac2a58e07feee669eb134cb4c9,2025-01-07T15:15:07.683000 +CVE-2023-31116,0,1,6dd28f9b47964f9452401150e23ebca890fc68db0e10bd48a3aa6b82b934dca0,2025-01-07T15:15:07.850000 CVE-2023-3112,0,0,5732cc69571acd1eb4f8657f50860bcffb6be054e7e94a4152f7d92b7818c82a,2024-11-21T08:16:29.187000 CVE-2023-31122,0,0,775fb6ca489442b871f995b94e395eecdc6cd94f9e7eb529e9f77ce9781aabcf,2024-11-21T08:01:26.177000 CVE-2023-31123,0,0,ea5a6bfa14cbab83c854da8d4aca838cc24c3e204831291f3a9eee8f9ee2648a,2024-11-21T08:01:26.327000 @@ -224715,58 +224716,58 @@ CVE-2023-32004,0,0,cbbaa092062a4f5510a61e528f98f6b50fa674934ad1ed60d751841c90d43 CVE-2023-32005,0,0,6d4155b2672f33e3bf5b22ec572249b8c49a4805bfa01f83395becc1d3c4a3a7,2024-11-21T08:02:30.747000 CVE-2023-32006,0,0,d210f7ae470fbe6e4f3a8c259718564743c91cb71fa2e515e00cd5c340e22f37,2024-11-21T08:02:30.857000 CVE-2023-32007,0,0,1cd7e1f4df7242f31d9df2f018850d2604581679f9a1ccda35018569d05f656e,2024-11-21T08:02:30.967000 -CVE-2023-32008,0,0,09b5b776711afacae04762cb7c6eab4d26e15d324182c25aa8ef70580e2e57f2,2024-11-21T08:02:31.147000 -CVE-2023-32009,0,0,4b1375a4ba8b427dffd65bc41d7a3f0436e0ed95506ec448350f81872c7807e9,2024-11-21T08:02:31.280000 +CVE-2023-32008,0,1,227bc10c17310e67d389c62fd62bcad31ba1b277e85591ae5d2bc79457754297,2024-11-21T08:02:31.147000 +CVE-2023-32009,0,1,093d7270e11b425dcc3e32a3222cf78fa35f53123ce63b99b2238f276585fbe7,2024-11-21T08:02:31.280000 CVE-2023-3201,0,0,a0eccca55192dd81f5c66cb7e12ff089b38056e691d02336b0d4a03db1609306,2024-11-21T08:16:41.083000 -CVE-2023-32010,0,0,ba6cc53cf2f7aeff611101c6a328e85be2e187dc8641400f02254fa9d2c8c50e,2024-11-21T08:02:31.410000 -CVE-2023-32011,0,0,163602ced48af3fdeb83ea7ad142f0638bb32c95c83a89b35cdf92396e352791,2024-11-21T08:02:31.543000 -CVE-2023-32012,0,0,1b66c96b7160ef6cf04a9f286998d0f395c79c3a0afdf3f385631b7c16924891,2024-11-21T08:02:31.710000 -CVE-2023-32013,0,0,17a9f396f7526e66139cd19848e88159c90db82500585b127e2837b5bd6e8bc6,2024-11-21T08:02:31.857000 -CVE-2023-32014,0,0,5e82f576a68b8505146095a2612f777f20b2fd9591212471cdca25bcddf06eee,2024-11-21T08:02:31.990000 -CVE-2023-32015,0,0,ae3c68af6caf136fedea3ba07ed20b51fd59bd7f94b9d990ec1b0e9502f9f1bb,2024-11-21T08:02:32.143000 -CVE-2023-32016,0,0,4025b327ee6439ba008e041d34f84ea6caadc2b787799f2865d6fad12812fa6e,2024-11-21T08:02:32.300000 -CVE-2023-32017,0,0,8130a11379b938f71d6c80567aac3f659195d16556955552a36117e2fd4868ef,2024-11-21T08:02:32.460000 -CVE-2023-32018,0,0,d63fb0f834c2330de0ba72bf5c036ac654237ecf9cdffe9311ff60113b4950fb,2024-11-21T08:02:32.610000 -CVE-2023-32019,0,0,80309b738176c34249257013970ac7230c5a146bc936a3ac7668c54cbbb20eb1,2025-01-01T02:15:39.340000 +CVE-2023-32010,0,1,a8c8cccfe48b7b5ff23a554c084b3a58ac7e8735ec3b16e535ff839b3f0ce6e4,2024-11-21T08:02:31.410000 +CVE-2023-32011,0,1,c826172ffbb4c09e0676fda5809dbea7e27f1f2c705ffc59d26c9c234cde4b6a,2024-11-21T08:02:31.543000 +CVE-2023-32012,0,1,2e97e814048d2e97b6ea9d089aa2a8af45ab878bd8634179a04c953c9730dacf,2024-11-21T08:02:31.710000 +CVE-2023-32013,0,1,b5e5b23994cc70188ce1518bd3f12d9bed9ac9c2ac2b8362f3f57273e617608d,2024-11-21T08:02:31.857000 +CVE-2023-32014,0,1,bfdd549199dbfbb1bf0d7815906ecfb51b7000624ee53417ec08dbf95e374957,2024-11-21T08:02:31.990000 +CVE-2023-32015,0,1,af68aefdee650efe4f2a96681ccb47b15a261014c65e7e1535684fc992de9c7a,2024-11-21T08:02:32.143000 +CVE-2023-32016,0,1,ae63b051c4350cbf90109f2fab783f828a8ba295883a93ef2591b7d7765b1651,2024-11-21T08:02:32.300000 +CVE-2023-32017,0,1,0ad67657824dec65b9cfafe273aadc2d36e501ee8630f4e860c61efb8774ff89,2024-11-21T08:02:32.460000 +CVE-2023-32018,0,1,65fcb92a6ca1d51c17b687f0c38811a9947463a3ab115c45354c594b56113980,2024-11-21T08:02:32.610000 +CVE-2023-32019,0,1,0b5e71171840f51a97922f0a125674a62478b380006d5e72d14a5c8c4a5c7ee9,2025-01-01T02:15:39.340000 CVE-2023-3202,0,0,0ab1ff700226b8564645469fcc0896872eff87e4a741c7777fcb42b454da0792,2024-11-21T08:16:41.210000 -CVE-2023-32020,0,0,dd222a854afaaeffbf7e53756fe1bd4e3136f21f41bcb8d8796306d9c8a2167a,2024-11-21T08:02:32.887000 -CVE-2023-32021,0,0,49fbfd9f5b8d26c40714323a401cae8aad4f7fa75e719d2b197825e46d62df1d,2024-11-21T08:02:33.027000 -CVE-2023-32022,0,0,292f0a0b6182f1780610843316cd1df9b7223663bdc90f496ea8199e7f99a845,2024-11-21T08:02:33.147000 -CVE-2023-32024,0,0,0e834a5f0e2ab6ac93750156d163ebcb04328f7090a2a2357e8c8bf98d3c2161,2024-11-21T08:02:33.270000 -CVE-2023-32025,0,0,e41a989d9f51609aa2ae68148d93e7e2ea41494900084c1f2be36d1f5f19be70,2024-11-21T08:02:33.380000 -CVE-2023-32026,0,0,7de81ca96d7025807cbb3cea62bb4b884a21dbeadfb1f02bf0d344c9efe3943c,2024-11-21T08:02:33.503000 -CVE-2023-32027,0,0,5661f698fc93ff6ecd5837eb6ead536d379411f6fbd498ed27157acbfff486f2,2024-11-21T08:02:33.630000 -CVE-2023-32028,0,0,e5745dd7173bcfa18964eb15724084ede8f0de7ac0f0a5a6fcd48778d9daeb7e,2024-11-21T08:02:33.753000 -CVE-2023-32029,0,0,8d5ea02cc4bfac5b21023bc16f981042fc901d05f0af49076f3a1ecf9efe4471,2024-11-21T08:02:33.880000 +CVE-2023-32020,0,1,346041a1e74009042b5f758f2ff4a27e17af90e7fc3267142f8ff874809b38a5,2024-11-21T08:02:32.887000 +CVE-2023-32021,0,1,11591a8d4f8a93f3cfa0af2db8430632ed4ca9e32b24598d85f0904de041fc32,2024-11-21T08:02:33.027000 +CVE-2023-32022,0,1,5e2c55151e6e8d8903819cd2237e17ca1cfdf2f2b8d7fff30b6a039b4cc51cb3,2024-11-21T08:02:33.147000 +CVE-2023-32024,0,1,51adb8cd32e260a9c505ba44b939f721aae78a898beef93d2c5c6e0a59fe9907,2024-11-21T08:02:33.270000 +CVE-2023-32025,0,1,855d46b6a9042fbb407801950ed37437dbbf74b881f407e5a49fe87b1d043f6f,2024-11-21T08:02:33.380000 +CVE-2023-32026,0,1,120e5021bbf8c12b02c856604cd9af60850425760af6595d14ee07e862af58ee,2024-11-21T08:02:33.503000 +CVE-2023-32027,0,1,0e94b7baf101f514ed556edd2d2fd215ece183d8b3bc024c94d27161a27d9af5,2024-11-21T08:02:33.630000 +CVE-2023-32028,0,1,14ba2660816f06680927bd6b46728d46f20b4d3cde0fc5b85adf0e3a934aea86,2024-11-21T08:02:33.753000 +CVE-2023-32029,0,1,ffe49a06c254818204ebe465924ab5cffb07218c415fd5349a1f725c3452acdb,2024-11-21T08:02:33.880000 CVE-2023-3203,0,0,cf88b5660b4548d8e1a7596e7ad479b96df8a06cf0e1e556eeabc42813986b83,2024-11-21T08:16:41.350000 -CVE-2023-32030,0,0,49d94f9aa1badcafba482af4954ba0cb516815a2edcc03e0ff59a96b9565ff99,2024-11-21T08:02:34.007000 -CVE-2023-32031,0,0,4bf0a3e2060858957922b2003861df19c42f072e47218951266bbec457b2e621,2024-11-21T08:02:34.183000 -CVE-2023-32032,0,0,901b68b15d3b16aa9acbd56cd6ba7bd013caf55831ee427080c829b548d96088,2024-11-21T08:02:34.300000 +CVE-2023-32030,0,1,7c9fcee963322ce0bccd36ca0446fcd835917f1cf0c3c60e08be5fe61b9ce7e2,2024-11-21T08:02:34.007000 +CVE-2023-32031,0,1,43e7cbbc218ade87e6493b8030ee0a62a2c629aa040efd5f9fb721dcdfc2153b,2024-11-21T08:02:34.183000 +CVE-2023-32032,0,1,9d197777be6c97a161d4efa877aef1a319c68e85c6a3abd4c6de74b9cc926976,2024-11-21T08:02:34.300000 CVE-2023-32033,0,0,9c070dc76bd88ce3e78e90d58c58ed40a54843091a7802a8a4d902921dd030a1,2024-11-21T08:02:34.457000 CVE-2023-32034,0,0,0390151391936ea0b185a58aed4e54b0dfb496d1759fd1425436cf161ccf57e5,2024-11-21T08:02:34.613000 CVE-2023-32035,0,0,1f0cfce4b2ff323cb443f0f0745350c61ad93051150ec10b1e509c4f6ef520d5,2024-11-21T08:02:34.800000 -CVE-2023-32037,0,0,60f2150f27ac61d28880982c348b5cd2673e860c89bfb123d7c17e4a31c2cf6f,2024-11-21T08:02:34.967000 -CVE-2023-32038,0,0,29710098e5c65ff79bc92572ccad6bda72c63e7c1561c44315fae224e3d506bb,2024-11-21T08:02:35.103000 +CVE-2023-32037,0,1,fd036433a981eb6cc0b8e967537aecf1dbe49c7c50fad592e085c1212693e8e5,2024-11-21T08:02:34.967000 +CVE-2023-32038,0,1,b6efd0a259d10c795ac3e6eddadcf53abb950d975165bc781700a38777aea011,2024-11-21T08:02:35.103000 CVE-2023-32039,0,0,128533b509b4f1362897c482e0de284685ed872e6134a7a0e14ae24f1e0ed65b,2024-11-21T08:02:35.247000 CVE-2023-3204,0,0,76b541820c43f463fbc886c400ebb0bda784221eea1793bc1a30023df52200f8,2024-11-21T08:16:41.480000 CVE-2023-32040,0,0,3f5dc29eaa920f33b43c1115fee44c81470a187efc3ecc42e2cc2de3a573c39a,2024-11-21T08:02:35.387000 CVE-2023-32041,0,0,72b996207a43eb8143ef7397e29ce2f010478077bc23fdb5bb3d20131f353bec,2024-11-21T08:02:35.530000 CVE-2023-32042,0,0,5f290f5f1c8d614a89d78dbcfa49809fab027812e6c001b9b3300ec09234c954,2024-11-21T08:02:35.663000 -CVE-2023-32043,0,0,8e110ebb629835a32382e70f777aab9c6381f94febab2275646d3427324bb688,2024-11-21T08:02:35.820000 -CVE-2023-32044,0,0,bc3dcb085bd0d4d474d7b5986fbcbe04138569ad1840a7c15892452080740693,2025-01-01T02:15:42.417000 -CVE-2023-32045,0,0,114bb32ab06fef8bc424ede7fa5337db9fc4ce6eea66fcd78b53825c427b413d,2025-01-01T02:15:42.597000 -CVE-2023-32046,0,0,cd113fd97d1005799374d7abde6a875136d39519bc0c0283e3ea8949c250ee66,2025-01-01T02:15:42.747000 -CVE-2023-32047,0,0,e1b3eb2bc50996c92f61c483e63b0f1de67bd521b369e1bb3a36d286479506a6,2024-11-21T08:02:36.427000 -CVE-2023-32049,0,0,9b2209b1511bf8669a73ea924d6b8d1e384a6e47ea3230c6502cd9893e09e24e,2024-11-21T08:02:36.543000 +CVE-2023-32043,0,1,2a7d05fd3f7a70a3d987b95171cfde579b93431ce2de1c4026749db9445afffe,2024-11-21T08:02:35.820000 +CVE-2023-32044,0,1,435d711813854754470f6f0cb64b7782fd7dfb824d093076488d02706951d057,2025-01-01T02:15:42.417000 +CVE-2023-32045,0,1,6806b381fb83d1d65b0304d5f2c111fb9450cb947867afbbdef666424f8c5da4,2025-01-01T02:15:42.597000 +CVE-2023-32046,0,1,e074f722313daa390fa3e119e2fa080cc09f74a4c18afbb4768129326136f38c,2025-01-01T02:15:42.747000 +CVE-2023-32047,0,1,dd872c626a54ae37928bc11d8a2d53e4e59d57c0e0636c20d31bdc391f716f53,2024-11-21T08:02:36.427000 +CVE-2023-32049,0,1,5b93030fc39bf48d19ef648a3823c3dd02bf777232f8bf51cb1e94aa16155c07,2024-11-21T08:02:36.543000 CVE-2023-3205,0,0,f50a33d8c9cf94803a8f87e9e3439b490e3fb5def430be3c992f06dbc5b7bcef,2024-11-21T08:16:41.637000 CVE-2023-32050,0,0,6e6eab390f48e9a9854dfb0c7f4d8bd90f21437b5a0cf5482c1b3d94019e4630,2024-11-21T08:02:36.673000 -CVE-2023-32051,0,0,ffe381d9f9de79a1931382e4c849355356a1d34dd073eb6c25df01557e62fc6c,2024-11-21T08:02:36.810000 -CVE-2023-32052,0,0,87a694b27eb6a270fe4a1171b92ede54e415778713995febaab264aeb069df00,2024-11-21T08:02:36.947000 +CVE-2023-32051,0,1,e28d488bef227a840144c7d3649e0e8b2a0cb4501b7002045c5ae6fe6cddd6e9,2024-11-21T08:02:36.810000 +CVE-2023-32052,0,1,36fd2ce403493c09343cfecfbe07111dbce91049790b71367a67d81c5134fb43,2024-11-21T08:02:36.947000 CVE-2023-32053,0,0,f807aa2fafe83c402249f2232f45e4f97336faafb378ca26ec9c257082adf9d6,2024-11-21T08:02:37.063000 -CVE-2023-32054,0,0,5291ba6f5cb7b599ad802131338e0a12f3f5a7bbea8b97cb84ec5aa875b165cf,2024-11-21T08:02:37.207000 +CVE-2023-32054,0,1,43f8a478b0cf21abf197ad3f98e1ede0d9dc9fb99f9bb0ffb66bf18dc5003fab,2024-11-21T08:02:37.207000 CVE-2023-32055,0,0,b108e9b579e96e99031370531d8ff900b3636fa0852d0cafd06a706bedfd6bb1,2024-11-21T08:02:37.347000 CVE-2023-32056,0,0,77fc61836a442c4a874042832c90313a78519587674b7788c06635f79aedc787,2024-11-21T08:02:37.493000 -CVE-2023-32057,0,0,b86f92145b5ba05b4e8a6ff7fca121ee509a5a1617b0a8201ba607a625dd0aa2,2024-11-21T08:02:37.617000 +CVE-2023-32057,0,1,b876159d1a65a9365a9327fdb6ef4e8a575020a76d0220e7843e508aedff8e36,2024-11-21T08:02:37.617000 CVE-2023-32058,0,0,62b926d464645a1831d9f3d7b0c52c44091fd8a8d2cbab557d4bd30fc3b038db,2024-11-21T08:02:37.770000 CVE-2023-32059,0,0,e512bcf8cb4bed5136ca7ce0eff2b0eef46022c2ecb32ed7149e920c3827b07c,2024-11-21T08:02:37.893000 CVE-2023-3206,0,0,7acd6ec61ef74b27192653cb468faadf9b045770661206ef36d1b65ac66d72df,2024-11-21T08:16:41.793000 @@ -224796,8 +224797,8 @@ CVE-2023-32080,0,0,6f980a99d6bcf19cd757ba5032b3a1ecd9d3977adc0ab1178742f01a9443f CVE-2023-32081,0,0,d102e5a52d3f7a9858dde8858866bb54d729f6b0a51e565c93bc2d47b7df908b,2024-11-21T08:02:40.483000 CVE-2023-32082,0,0,4557e9dfd5b96a9a300d6fbdf18378e86e7ddaf25df60a8bab3ed3c78f110c42,2024-11-21T08:02:40.597000 CVE-2023-32083,0,0,274ffc58850818d20d2a3d90c36be12dbc0676af7066b26f34b77dcd2c129176,2024-11-21T08:02:40.727000 -CVE-2023-32084,0,0,1d16f3287575f0f51748bef7190ec4b10a42350a1e6a557ba8e02ec200f276c8,2024-11-21T08:02:40.840000 -CVE-2023-32085,0,0,c30591602926e6022983b97580abb72fbbe4122220f1f32578545e00b3c6594a,2024-11-21T08:02:40.963000 +CVE-2023-32084,0,1,6ae3ffbfe0f4e00e118c467cca3cbc6301ba88b41e9d69ff04ffeafe5365d0d8,2024-11-21T08:02:40.840000 +CVE-2023-32085,0,1,39bab457b3252c4cf3af6dbb035e1ae3d318de3faa9ab03c1232d1e2502cb639,2024-11-21T08:02:40.963000 CVE-2023-32086,0,0,5f9d1fe55badf8b271b2bffc567f3520f56cd1153104c6bb42f49f1a977ea91f,2023-11-07T04:14:28.530000 CVE-2023-32087,0,0,1f3e1c0fbee8b6f47312489bb5eded433427eff106ae709bfd5f094b2ad67443,2024-11-21T08:02:41.110000 CVE-2023-32088,0,0,8675cce14784a6a1f3b17755e5e6af706ce6364e610d8a13b48192cd3ff5803a,2024-11-21T08:02:41.223000 @@ -225060,7 +225061,7 @@ CVE-2023-32339,0,0,56e5e5057225790255da00ffb858773794e855ce0038d02d9bcb9ad217984 CVE-2023-3234,0,0,0fa1466c040a99f283157c1612582306e508dc74f92b2c2292dbaa2cbe7e5460,2024-11-21T08:16:45.660000 CVE-2023-32341,0,0,d38b9ebaa1a9c25da70da76b9a1cefb48113ed83bfcd9e5e955b91cec0095134,2024-11-21T08:03:08.987000 CVE-2023-32342,0,0,cb80571e1573bb95c1a667148885dc625dc45a1310587dac64fa32bf27bd1e3f,2024-11-21T08:03:09.113000 -CVE-2023-32344,0,0,511113b27a79454502b51167212efb8d88e1d6ed4932f06507267d5e2b0a4cf2,2024-12-17T18:55:38.543000 +CVE-2023-32344,0,1,7bc8b77d90defd48ee4bb5a1611c065560350060add6413ed28dc594c84c459d,2024-12-17T18:55:38.543000 CVE-2023-32346,0,0,a01a197138d430e0b7287e075f5c9975fe50a6d25371c9b6aa016dae1bec8b66,2024-11-21T08:03:09.357000 CVE-2023-32347,0,0,6d1df463a2253794069200e537915ca4bd0a8e98173d53c11f3c287fb7f80ccb,2024-11-21T08:03:09.477000 CVE-2023-32348,0,0,9ab9ab4f6db401f2fd833625fd69359b9cce59b0d73abc632b6ccc284317a88c,2024-11-21T08:03:09.593000 @@ -225760,7 +225761,7 @@ CVE-2023-33086,0,0,0e0d5fcc06f959a931ba4b37866744959c8a1c5089a302c98fb58548fd37d CVE-2023-33087,0,0,f8493077219394e12e3af04e2e125065f5dcbfaa0574cbe023d9fb2cac598856,2024-11-21T08:04:46.507000 CVE-2023-33088,0,0,e1160bfb1e1e936ac0215cc3bfdcb4994be99dca79d4fd17b220fe15b748241d,2024-11-21T08:04:46.773000 CVE-2023-33089,0,0,ca94d4abaea68ca13a805689fb3e29b882357d7b1647b6389eb448dc56434905,2024-11-21T08:04:47.340000 -CVE-2023-3309,0,0,dc1b527e2c2b49a13ee21828b76155a17529f34f0f322065757100e3dd2c8362,2024-12-18T16:15:10.390000 +CVE-2023-3309,0,1,8e6edf6fada93115ebece6f349e41ac31cc7395fd93d853c0b17d3eb0d7b0ff2,2024-12-18T16:15:10.390000 CVE-2023-33090,0,0,87e49833baaff1560c71cb5ba1c814a10e1ce0242639feb4a147a3db7f8d9b16,2025-01-10T17:48:40.023000 CVE-2023-33092,0,0,c9ab9cad61633f2fd68e1dc9c0a2e4e2e703bbdd2248acaac7659a80de3bf105,2024-11-21T08:04:47.867000 CVE-2023-33094,0,0,09423103034990f4a4f996fd2d1004e0117123e7ec543387e6bb63ed73701ec1,2024-11-21T08:04:48.100000 @@ -225768,10 +225769,10 @@ CVE-2023-33095,0,0,9b9e113265b42caae1e61a48cf31e1a001fe0dc6eb1ac444ed55e60e6d756 CVE-2023-33096,0,0,0a538ed08f01d9c2331fcabc83fbefe5eb729c25da247db44d10725fcea38007,2025-01-10T17:49:24.857000 CVE-2023-33097,0,0,4feb8955e289cb02a24b3b7a5fc68e38a6a14033dde616dd9e946d26887bca7c,2024-11-21T08:04:48.807000 CVE-2023-33098,0,0,fe62fc8d5d4ac8c029e4c5a2b07570f234b016add8db0f502a6c0529839d5be6,2024-11-21T08:04:49.120000 -CVE-2023-33099,0,0,b5f5e059219a537d4c6d37f58857ed45c1b42c5e7e64d5ab44b2d01fc706f4db,2024-11-21T08:04:49.630000 +CVE-2023-33099,0,1,9c3211d370317fbc84fbf8484ae678baa5ceefc431d1f4bf850b9247b436167c,2024-11-21T08:04:49.630000 CVE-2023-3310,0,0,1024134338cf1251822572ca174bebeb2f8c7e2d817c56d25337ca9dd161149b,2024-11-21T08:16:59.020000 -CVE-2023-33100,0,0,dab56d097e3fbcb7fdc151e90dcd8ef8f9fe9b3108ebc50d440f0ceeebab9dc0,2024-11-21T08:04:49.790000 -CVE-2023-33101,0,0,7b266e6d4f4e14ac1bc9a867ee49d60ef81d4190c99141c450b942a11f388791,2024-11-21T08:04:49.923000 +CVE-2023-33100,0,1,dab6043d0080b7fe21dd15bda67e6b7b029a603ed8b3f6d7591e227c028e4cdd,2024-11-21T08:04:49.790000 +CVE-2023-33101,0,1,90a9c222c363623f7bd44fecd867f6c16835651d95980762bd7cdb564ce02bac,2024-11-21T08:04:49.923000 CVE-2023-33103,0,0,c305191ece7f010de62be8f0c04a3fa08e9047365c07e7da124617ad07495653,2025-01-10T17:49:53.227000 CVE-2023-33104,0,0,ad744b90a2f6252debeae540f84ed774971f67d362d8625207801eef4ca63f71,2025-01-10T17:50:09.057000 CVE-2023-33105,0,0,1d8147cd4ca05abbc46aa022d7d4c1ae36e1d41b8ed7f4ada074d3580a8039f7,2025-01-10T17:50:21.293000 @@ -225781,73 +225782,73 @@ CVE-2023-33108,0,0,bbfee09a95ac73fb523a36dd592efd9298dc6262dceb5817999a83af6ab51 CVE-2023-33109,0,0,37368388c3169338c10bf0bd44a2b926f27a0f227723e7587f5a945876fda9b4,2024-11-21T08:04:51.680000 CVE-2023-3311,0,0,0866648adf435d32ee42ce7653e738ccc0b13653665a64aafff9168828cd425f,2024-11-21T08:16:59.160000 CVE-2023-33110,0,0,03dbc7451bd773907334276ea794be05ed4ca79b6745a02c56a0ba78fa105440,2024-11-21T08:04:52.980000 -CVE-2023-33111,0,0,c3a9fea2ff1859a8bef17a45fdb7525ef9e665c9dcd9d31799c85e749e91c914,2024-11-21T08:04:53.287000 +CVE-2023-33111,0,1,0adf3a5b84c76bf0cf0aca42500c5ef0412fc45a106ba6cdc4105188d8b53503,2024-11-21T08:04:53.287000 CVE-2023-33112,0,0,4259ac94c45cd15024b867f4a58abfd994f6fee9c58c670d4fa6a0df735400bb,2024-11-21T08:04:53.423000 CVE-2023-33113,0,0,ae01d6f9507f95dfb63a588a91839aa08008aee7941ffa27b1a45797b565ae3e,2024-11-21T08:04:53.730000 CVE-2023-33114,0,0,5ed0a0ebcb975ee46cfb30352ad36c4608b9f2776b1f3e896e04897bc6008094,2024-11-21T08:04:54.010000 -CVE-2023-33115,0,0,5d5f25763b4db876bd9334588673975feef82ca7cfbefdeba6dc592e16d326fe,2024-11-21T08:04:54.283000 +CVE-2023-33115,0,1,3d274ff95ebc1a442d2baeb3cb7c5fa6c1543ec95dff36d8bbb9b02ac2ae6870,2024-11-21T08:04:54.283000 CVE-2023-33116,0,0,dfcef9c8334a0acb87b8001f56cb0f04aafba30b05250b8b559dcdd0d7889840,2024-11-21T08:04:54.503000 CVE-2023-33117,0,0,59a3900abd3bec20ba1bdafaf2bd6821d245a29db49340145dd95d4263cfbcd8,2024-11-21T08:04:54.777000 CVE-2023-33118,0,0,311a1e75022fef946ad8511d4b1180941618f1456552ff26b006cdfe4c4bda60,2024-11-21T08:04:55.117000 -CVE-2023-33119,0,0,51a7e7001247848121cf43779c74da1f71e5a0cd1f457d1c9d454e82e6455d9d,2024-11-21T08:04:55.413000 +CVE-2023-33119,0,1,41318930ca83523e977699bd68d34877c749e8d42f0425c51c7d32a0b1badc3d,2024-11-21T08:04:55.413000 CVE-2023-3312,0,0,3cc4808ff767e5594b25d5c1d2b414d4db5bf993a389f22d77e903b37958dedb,2024-11-21T08:16:59.297000 CVE-2023-33120,0,0,ff013e7810720ade575f621016b108b78ebe0d52d255793fa7231eaeb83f3624,2024-11-21T08:04:55.597000 CVE-2023-33121,0,0,c98ccbf6651851cb4fa5b2ac401fe1ee978a151c32f0f7209b34ec22d7330171,2024-11-21T08:04:56.007000 CVE-2023-33122,0,0,5e2cb2b9a663891c6b40b58a62dae64e80d60dd6ac2b9e532dbbe052a12cad9f,2024-11-21T08:04:56.120000 CVE-2023-33123,0,0,2a4b966b21f46390ed949ddb86787ecbed0b9d81c703590ef47bc9dbd29cafbe,2024-11-21T08:04:56.283000 CVE-2023-33124,0,0,63277c225d90930f2b4f696fbf9e3ccd0f712985f912d2609a55040bda04cc5b,2024-11-21T08:04:56.410000 -CVE-2023-33126,0,0,36286c22e9b766ec402abfa58d1472483c21dc581f4acd3af4f191bb6ece04b9,2024-11-21T08:04:56.533000 -CVE-2023-33127,0,0,3eb8104295477e91eafc60e46a53a1d594809298e61d73cfc13c7aabd1cf8b0d,2024-11-21T08:04:56.660000 -CVE-2023-33128,0,0,ca337e2f80b68ccf3a9abe94614e1bc7419a35cb5bd486ec56a98bd5d91844c0,2024-11-21T08:04:56.780000 -CVE-2023-33129,0,0,75a40a31cf7f51ebe09454679460420c2162da767c0e9494a857c7ddc478d919,2025-01-01T02:15:45.030000 +CVE-2023-33126,0,1,51e75fbf33992b2fb8764d0888f794382078b93bc37d8c77fc96fac0ed2cb1d5,2024-11-21T08:04:56.533000 +CVE-2023-33127,0,1,1463b7e45f0047b887ffd2b700d2335abaa809244ad814d8869e20a78ff996b6,2024-11-21T08:04:56.660000 +CVE-2023-33128,0,1,772c47a195903987cfa6221ad03af8ca52aed890cd2702133f6ee6f12331b8d2,2024-11-21T08:04:56.780000 +CVE-2023-33129,0,1,27c2c660dfe64c3f463f9f465a98d93e6b7658ef9955d742caaa3b16d5317f49,2025-01-01T02:15:45.030000 CVE-2023-3313,0,0,35a41bb99b4450acb54669178d01dec620869198d155697de5c92593c1a1d832,2024-11-21T08:16:59.433000 -CVE-2023-33130,0,0,d4671b1c22610e056ff8695d70dd390b6ad75ed52bfd559da2cc10eca0466ebf,2024-11-21T08:04:57.070000 -CVE-2023-33131,0,0,3c939cc258ed6c00993533757b45ed5484d74885938f1a1879137f81aa591bae,2025-01-01T02:15:45.250000 -CVE-2023-33132,0,0,399c71ade9abfa4effc3bb71cf7417d09e22c0cef92fbfb398f843d055865f3b,2024-11-21T08:04:57.330000 -CVE-2023-33133,0,0,3b1d274122cf359ef25947aa19b2ed09da4904305ee2355ac5947766796fac51,2024-11-21T08:04:57.447000 -CVE-2023-33134,0,0,e3247f1cee3b634a73ce06c826a3a9786caecaab3a1683e19e092e21d22a25cf,2024-11-21T08:04:57.577000 +CVE-2023-33130,0,1,216848226a9ee176c9362044c0015a98fc59522fe53383acd38430b1cf9cb9df,2024-11-21T08:04:57.070000 +CVE-2023-33131,0,1,f875beadec58dbdbf48a406ef35dd6823e3522f640e41a2f64ca454be7ad6181,2025-01-01T02:15:45.250000 +CVE-2023-33132,0,1,0d9a65533d7531be65ccdf067c48a00affe18f9dd7c2fc2d4e416800e769931a,2024-11-21T08:04:57.330000 +CVE-2023-33133,0,1,376f41ef4b45180189a2dece784b8004759c786b69569a0af0a6657c0a5aabe3,2024-11-21T08:04:57.447000 +CVE-2023-33134,0,1,dc4d5e56efdcd5e7aa4fd806cba38aa381b5014743f43d84ed56194f9776f6f5,2024-11-21T08:04:57.577000 CVE-2023-33135,0,0,ac48a06da2655d956cf19e8026b5046517e1c822fd1f5754287b2e8a8e396f02,2024-11-21T08:04:57.700000 -CVE-2023-33136,0,0,21faae1d8d772aad0307272133c831c22bd5aa0df9e0f8c7aa0bbdbcde42beb2,2024-11-21T08:04:57.833000 -CVE-2023-33137,0,0,77a8f0c18a11658263bccdf8714dcdbce921db083e297b6b4a6084273db0b7b6,2024-11-21T08:04:57.960000 -CVE-2023-33139,0,0,aebe2da992d994d73c553a61d427c6cf185ec34a912ce4988c07a3a02b3b7bc7,2024-11-21T08:04:58.090000 +CVE-2023-33136,0,1,99eba898fff23d82c47f2c792c222f3f3ca6ed5327fb5baca69d268d06909b8e,2024-11-21T08:04:57.833000 +CVE-2023-33137,0,1,103ba212dcba54c28261d5a1e10e51442a71026eccdde0a1b3adbe2e820d70c0,2024-11-21T08:04:57.960000 +CVE-2023-33139,0,1,c5c93e304d7d4040bc790da55af757379ee9f4747fd79e0fed8e66046830fc4c,2024-11-21T08:04:58.090000 CVE-2023-3314,0,0,66b3623bcd12750794511e8de7bd12735c80df59f69ad19e4e2815979a9cb344,2024-11-21T08:16:59.577000 -CVE-2023-33140,0,0,ab566dc3598662cd9ec7a2279b1efdfdf3b63416511d201a35a00c7bddf1b190,2024-11-21T08:04:58.230000 -CVE-2023-33141,0,0,a52872fb57720ba5924623c4259c74dca4bc5c256673bb5e670760e5e4a330fe,2024-11-21T08:04:58.350000 -CVE-2023-33142,0,0,8915f5b226cb95a8f34596d76121e8a16e1564eee02d4e8140ac254e78334280,2024-11-21T08:04:58.470000 +CVE-2023-33140,0,1,236e5e62add43e748eefa94aa27760152c4c2fda24e07ba9e791c64b5403e3be,2024-11-21T08:04:58.230000 +CVE-2023-33141,0,1,e880fe3c971966a3951b20760badd2a5635eb6ba4eef38878fc8dd765bea29bd,2024-11-21T08:04:58.350000 +CVE-2023-33142,0,1,cfbfdce9ccb97bc615b3e8847adfcc51cf9b6f48a434bfa7862a5ca2dad7fdd6,2024-11-21T08:04:58.470000 CVE-2023-33143,0,0,39b8f2547e4a4602a4caf4bdb0635a664485290ebbdc3d4fdc4e3d2d068fd000,2025-01-01T02:15:46.503000 -CVE-2023-33144,0,0,2c08e93c5774376279af66229e7a71d54a3cdfd7a28121226d326b5b64a1cf01,2024-11-21T08:04:58.710000 -CVE-2023-33145,0,0,9c49ac039fa88b20d9724e00f394fb203596b020b1b12366ff7520cb344de36c,2025-01-01T02:15:46.720000 -CVE-2023-33146,0,0,62b0baf309490bef58d990803990f4af4f3fa21ae4cd8768b3a32ce768ffc5dc,2024-11-21T08:04:58.943000 -CVE-2023-33148,0,0,180d177e60eda614b6e4a18e3d9d54a240c4c7556ae5c948864c43165c8c2e68,2025-01-01T02:15:46.930000 -CVE-2023-33149,0,0,6413da57aef145e283f8087dc70557481d79fb6fa3adf4241227c36dd9dfc6ae,2024-11-21T08:04:59.187000 +CVE-2023-33144,0,1,c5c99a4cc2d46831ddb4bfd99ffad8b12eb567b507918c6a894656cd1e008e86,2024-11-21T08:04:58.710000 +CVE-2023-33145,0,1,d4f81efe6c7251455dcad2808b397fb637fcc0835388397053cb440b967b6877,2025-01-01T02:15:46.720000 +CVE-2023-33146,0,1,75077b07f61cf9475551388324a9a1aebc58b8358dd1b7357824810a762005eb,2024-11-21T08:04:58.943000 +CVE-2023-33148,0,1,5423ef88fbea67a9acdc4417b5028db6b61e6156cfbc7b8cdeef9ff941ef7a0e,2025-01-01T02:15:46.930000 +CVE-2023-33149,0,1,f75f0a747a83f3f235651d937dd265d40c46a2ffafd9e6970a83f54434de4e89,2024-11-21T08:04:59.187000 CVE-2023-3315,0,0,a5cc1682b0bd1470d76652335c3939881cf5018e24052724b93fef0a4f802a67,2024-12-11T17:15:13.593000 -CVE-2023-33150,0,0,987839709486c00887e2b770e91b767f36eb554c2a1871d2a3eeefc07f4dff5a,2024-11-21T08:04:59.320000 -CVE-2023-33151,0,0,b39cf03400f73ebe82ff494954e8bca17e93416512e4a60e9f46de3104965bbc,2024-11-21T08:04:59.440000 +CVE-2023-33150,0,1,6caba448143db509122b7504b690c83b3cc3aee90d66e70f5c8040cea0e99105,2024-11-21T08:04:59.320000 +CVE-2023-33151,0,1,f17e6ac28e2729340aa6594d68ce2d2b7fdb7124deed3a7280a0d99b4b5d9838,2024-11-21T08:04:59.440000 CVE-2023-33152,0,0,939457a123619614ab551649c36717856d708fedb4cfe7b746afc7d87b9f32b9,2024-11-21T08:04:59.563000 CVE-2023-33153,0,0,5e9fc1087f90fd2b4b68734df3f7f4734c87850c5f8b21ad4d501f6aee250e98,2024-11-21T08:04:59.690000 CVE-2023-33154,0,0,25f0e57f58f755458e4eb749e40bd8c8036d520fd9d1513cb98d3d5f3b677715,2024-11-21T08:04:59.827000 -CVE-2023-33155,0,0,0e71785464495e3b306e4f3575197711791f2b518590990e4020f8f1d806ff26,2024-11-21T08:04:59.980000 +CVE-2023-33155,0,1,d4c6dd394ea9af744964b67a6d993e9655abe1a91fb9caf6ef7ec73241037a14,2024-11-21T08:04:59.980000 CVE-2023-33156,0,0,fcd883ce5dda35d41ded90747b81fa8bf1e922a9d7bb9e8bf32b07ca84636c43,2024-11-21T08:05:00.117000 -CVE-2023-33157,0,0,fd4c2caafae7d4fd5f774024ac5d04baf0534c777d671a85891794ae6694898b,2024-11-21T08:05:00.240000 -CVE-2023-33158,0,0,08e8ed88ee9fc819f5f5891aa702e6948f90d502ebeb7de189c7ba4e54abb586,2024-11-21T08:05:00.377000 -CVE-2023-33159,0,0,3ac82d5e617eac5348559c96417b3b0e60997920737bf17914c8b12531967489,2024-11-21T08:05:00.503000 +CVE-2023-33157,0,1,c2a0dd25d706b60a495e26d5b1fc7a2a22100e576c8901539a5ec197a133eff6,2024-11-21T08:05:00.240000 +CVE-2023-33158,0,1,c910ac69cfbb64efec2c91fb00cf4d6f27a0268f3ab61a941c758b748c55cf10,2024-11-21T08:05:00.377000 +CVE-2023-33159,0,1,70f344d7dc1310cf844805f4d3d7c603c77f7c9b9820843f9a333ad2e075ee57,2024-11-21T08:05:00.503000 CVE-2023-3316,0,0,0aff9282862e74d3828b2758997e809225f172299b82277a34fd773e24c59bcd,2024-11-21T08:16:59.813000 -CVE-2023-33160,0,0,67dfb5dd8bdc96f9899db7d39a1548fbfa9103d383e5f0031f63dae49f7d7d86,2024-11-21T08:05:00.620000 -CVE-2023-33161,0,0,a5c11deebcc4e99776a350325d94e95cd047022d964eb4490c2953a05c2d489e,2024-11-21T08:05:00.740000 -CVE-2023-33162,0,0,a84566a5d9ecc256f6572e40d5065b2d596a413f6db27252d08d43d9bb1ba33a,2024-11-21T08:05:00.857000 -CVE-2023-33163,0,0,2b03682a79e084326d1e68be6edd3448aeea660d39ae0d98f380595381f28854,2024-11-21T08:05:00.990000 -CVE-2023-33164,0,0,34d02e3bb9e0b39fbd2f8c66ed9489fb01f342628923b0a4b6700197b25d2c23,2024-11-21T08:05:01.137000 +CVE-2023-33160,0,1,bb408d28ff5ab9aa77b6c530e2c8312626affe5a3e301b447101980097e0a0d5,2024-11-21T08:05:00.620000 +CVE-2023-33161,0,1,3417e8693495a78234f9fe872255917a5a722e58a29d43de1f68991ac17a7e76,2024-11-21T08:05:00.740000 +CVE-2023-33162,0,1,d0a00c725f9259f61522cf86d3c9bcae3e7d1c201ab9b6530dff3025eb42998e,2024-11-21T08:05:00.857000 +CVE-2023-33163,0,1,a3e45cc954d74ef241b373d627ef9ebcd67154f9b30597cff014f60c004b8436,2024-11-21T08:05:00.990000 +CVE-2023-33164,0,1,efbcf751e1238136c93b292f98acac64266a91baa20a212394371837cc1fb97c,2024-11-21T08:05:01.137000 CVE-2023-33165,0,0,0528b655b3e1ede5464497b0469164fccf22dad69f1a1c9cfd8275dcf68a1100,2024-11-21T08:05:01.310000 CVE-2023-33166,0,0,fc5e669407323aacb94b4eb443ff4eb247ac383d2f497736606be2e5df6272f9,2024-11-21T08:05:01.457000 CVE-2023-33167,0,0,65961ffe8131c25aac2b3f553b81fafddab9a6fd559f0114ebdce0f087773193,2024-11-21T08:05:01.640000 CVE-2023-33168,0,0,07044c818c72aac62abe2732395c444fd1b037729139bab2dae0cd3b65b36418,2024-11-21T08:05:01.803000 CVE-2023-33169,0,0,5f7ddbe87df22202390df4e9f76089de0e3ecd8e7a2e91c834aafa11f8bf01f2,2024-11-21T08:05:01.977000 CVE-2023-3317,0,0,a809aef9c1ae7b0e78356e31d72e1338c0c053ed2f52c542e4e4a7721824a99f,2024-11-21T08:16:59.953000 -CVE-2023-33170,0,0,e17d8776b9d178a2c5150142ea409ba93805443575af26ba334437914d6c4753,2025-01-01T02:15:49.803000 +CVE-2023-33170,0,1,4740fdc1650bd08609ec03a3acc7df1767c51bc386a704677bc0d493ad016b9e,2025-01-01T02:15:49.803000 CVE-2023-33171,0,0,1e3a87325870a0adb4c2a3210560f6a055d1e803c99efb6a10bb0547de89d341,2024-11-21T08:05:02.320000 CVE-2023-33172,0,0,cc229436a781d727cc8b2e22ecb008a3f1031f9e3accfb65eee1bcdc2932eeee,2024-11-21T08:05:02.460000 CVE-2023-33173,0,0,3374639b9767afd68b73169c6926e1e65558cf6ea9d1105d5fdb1b92a544b9e6,2024-11-21T08:05:02.637000 -CVE-2023-33174,0,0,6f85e082f9ae4379cda2f728e71b96ba282de707ba16790b4c043c735fa0333c,2024-11-21T08:05:02.827000 +CVE-2023-33174,0,1,ac3ecd0efaf6dcad1f50a382c54ba511a5e4f7df48836091bbcb4ee1b6e2561e,2024-11-21T08:05:02.827000 CVE-2023-33175,0,0,f4493e9a7dde3cbcca4c16f56ff0c38749b6261fd04c5113fe27fb0ecaad7dbc,2024-11-21T08:05:03.017000 CVE-2023-33176,0,0,ae7b6756585e414156d127a5870af6fc5ceea6405f2165efdb369c6c84194c8d,2024-11-21T08:05:03.173000 CVE-2023-33177,0,0,99870f259433fe766236123d994ae223abdb7902e4468ea283f6238c16f1e2da,2024-11-21T08:05:03.337000 @@ -225951,9 +225952,9 @@ CVE-2023-33279,0,0,c5b52a353f3ee6325fcdbc23e78def6dd9840f906e0c4aa43a168e1260736 CVE-2023-3328,0,0,19ff79881d8bc75c570024c2c95120dd8f165b34196c4c953dd29948c4479610,2024-11-21T08:17:01.480000 CVE-2023-33280,0,0,dd129b41a63a61652c937421f2797c2268bcb168616b41614739762f2d92381c,2024-11-21T08:05:19.307000 CVE-2023-33281,0,0,067771f6ca325b24677ebeb151358c2c9e2cc8b783e08f179c67a9925546697e,2024-11-21T08:05:19.500000 -CVE-2023-33282,0,0,b9105cd79bc3fe38b67de1004c426bb3546015ffe36bedcfc063a51cc7e790da,2025-01-07T15:15:08 -CVE-2023-33283,0,0,aa728629f1c9780c7132c3e98fa5e81cf6102cf0d8ded155986326ffa98868c5,2025-01-07T16:15:29.973000 -CVE-2023-33284,0,0,db41d8e24bc207a166de9f5ad7b6c86c72497666dab7cc586996e222d3bc20d4,2025-01-07T16:15:30.170000 +CVE-2023-33282,0,1,21991d1cda740d3863a04439b55493f23b10252d0a74f48de2f6c46509abcfaf,2025-01-07T15:15:08 +CVE-2023-33283,0,1,e3c0431f01e27d85457d31c72e20d8bfd74006a2c83ee61b994e55fb29b647c1,2025-01-07T16:15:29.973000 +CVE-2023-33284,0,1,d0da5008a48df8a13ca95a55afa039e69b1f0015e97eafe62f93398991b7e5f0,2025-01-07T16:15:30.170000 CVE-2023-33285,0,0,30741f1677c923d9321a174f24cbcfbb45d70b7fa16adbecc164042f72c69993,2024-11-21T08:05:20.157000 CVE-2023-33287,0,0,4589690dfbbc05dbf65975779ea5f06e069047b263db7ad14eeef921b27b9778,2025-01-10T16:15:26.393000 CVE-2023-33288,0,0,26838f7327104c1b47d024f5db0a9eb1c2668da883675bbf3c61e6d3c54ee2da,2024-11-21T08:05:20.497000 @@ -226079,14 +226080,14 @@ CVE-2023-3349,0,0,198f0750e28fec680b199f31ee62e51097776525e0e38e70fe1488f9073098 CVE-2023-33492,0,0,f18ce2f813c3ba55047411a06441328b89b300d96f041da133c6dcfb061e2cf2,2024-11-21T08:05:38.440000 CVE-2023-33493,0,0,1adf36c0169de71a220f9b04ac78654488990b0d222648e1c9e4c1d68f48a9b9,2024-11-21T08:05:38.587000 CVE-2023-33495,0,0,b41da8a24563d7ec6c8b1e481c93b00b01b328f982e2b129df4bb9b0e2fe8de5,2024-12-09T22:15:21.557000 -CVE-2023-33496,0,0,3fd0a52821141bf6f5309c19678c375cd3da0df157cfd4491cb9856f63310f2a,2025-01-07T16:15:30.370000 -CVE-2023-33498,0,0,379c46b468fd16d5349d5ed08fd815599da430bed83605ed93a8b87d62e95229,2025-01-07T16:15:30.577000 +CVE-2023-33496,0,1,6670e87df5bc1e38c1d024b6d561ac3118e9763a0626258cf075bba76ad01d5b,2025-01-07T16:15:30.370000 +CVE-2023-33498,0,1,dcbccd00cb438e7e0d180c9962227485269ba146f5e7204d4934ac3accad1235,2025-01-07T16:15:30.577000 CVE-2023-3350,0,0,c693ece6a6dc8a063084324beeed66e17765ab0612916966eb644715f1b77e3f,2024-11-21T08:17:04.707000 CVE-2023-33507,0,0,503f767595170702c6b6cddfaf1994ac1e80c4c335399ea90eaf9e13cd293d47,2025-01-10T16:15:26.803000 CVE-2023-33508,0,0,364c0210bffe6fba4f2e160795ddbd2217d72478877e68024443859012bd02df,2025-01-10T16:15:26.990000 CVE-2023-33509,0,0,141c1f6990ef2fa453ce42dca73b8780ba29da9a50c0824de4eee6d0da2aecd1,2025-01-10T16:15:27.183000 CVE-2023-3351,0,0,f64258e34e1f6e2c3debe6ab542c8550e84fbbc69c1d8f132c263991d8bde067,2023-11-07T04:18:34.703000 -CVE-2023-33510,0,0,2fdbca3ef3ec1beb92f8e78ca0e200b48de108215e8c467acd4f2362be303f38,2025-01-07T16:15:30.803000 +CVE-2023-33510,0,1,573cb7afdf682a138010b43ab6b1104ff650ee740411ad852358bb1e160ec5b2,2025-01-07T16:15:30.803000 CVE-2023-33515,0,0,365a9a5f6a7f4c9eca56bb36b50c44f896d0d4286fd9bf91ea545127cf4cb344,2025-01-06T18:15:14.737000 CVE-2023-33517,0,0,b525e4f20df193bb6cbce03994f81acd991418a35811daa2f53394dfc22d6d82,2024-11-21T08:05:39.983000 CVE-2023-33518,0,0,288f98e80c2ce2d2b6ef03190cd0b75d8f426b4c6332c76faf7054e7d4c8708c,2025-01-08T19:15:29.863000 @@ -226098,8 +226099,8 @@ CVE-2023-33530,0,0,3f5259f03c4db54a4fbff9537ee74602648d0c16efb6528bb870ef05b10af CVE-2023-33532,0,0,109d64130a4769ac20cd8a57448213d04ce1cb12fc0189129cfa30fade0a6a41,2025-01-08T16:15:30.250000 CVE-2023-33533,0,0,3c4dc916ce0e09629a4d1fe9abe3d09a4054678118c9121ca7e5c0b829b1c3fb,2025-01-08T16:15:30.463000 CVE-2023-33534,0,0,375224b30005c5c6b4df976c11ab08ed3b921dbd5d50ac7db6447c43e9441aad,2024-11-21T08:05:41.057000 -CVE-2023-33536,0,0,4483a4c84bae9df5f08f3544144640e560096a5f4d7b065a9e0bcbbe032477f3,2025-01-07T16:15:31.153000 -CVE-2023-33537,0,0,06a836a8ec9a8a82dac73cdff5c990d7b4a0e29c9bc271ecada9cf746e2d2bd8,2025-01-07T16:15:31.423000 +CVE-2023-33536,0,1,cb50e37274d092888d1fe39ac87a363acf8eaa47d7301bb2b831795e57af7d9d,2025-01-07T16:15:31.153000 +CVE-2023-33537,0,1,e4de1c536060f7cf7b6b601cdcb55c69fae53fc6ccc20322c7e5aead8394ad75,2025-01-07T16:15:31.423000 CVE-2023-33538,0,0,b3b643fe39302a1c48ae218034aade7823381ded5695561882bb311b6c1280d5,2025-01-07T15:15:08.190000 CVE-2023-3354,0,0,c1971a8d35c84792a7e3b4b69170665e207a3bb365fff75d5a707072047933e4,2024-11-21T08:17:05.117000 CVE-2023-33544,0,0,ea770ac3095100c0cf3dfef2c91d44acce796d4bc92ed10e70a1e80795446c94,2025-01-09T17:15:09.997000 @@ -226108,8 +226109,8 @@ CVE-2023-33548,0,0,b51dc1575c1f7daa608b0b5836c474f314a242a913214763d5debf853883d CVE-2023-3355,0,0,66c43df3dd0ee91c832932172c9cb5c8a55655cbcbf5f77d9dc727f70b08e4ec,2024-11-21T08:17:05.290000 CVE-2023-33551,0,0,a4dfddb59ce749b636114722bc7e227dadd5beadd604ec4bebffa41debf639f0,2025-01-09T19:15:16.993000 CVE-2023-33552,0,0,ee1087ccfd9a3e3baacbad0d60bd717ae7303666f219bedcf581fc6b1a61de5e,2025-01-09T17:15:10.250000 -CVE-2023-33553,0,0,100e48dbe8dcd919ffada509e862616914253c61bf4e10f091c0f3eae04e1bbc,2025-01-07T15:15:08.367000 -CVE-2023-33556,0,0,296f7cfa4be2684388b87c0d047b815a94475706490d2524330b63115be6fe38,2025-01-07T15:15:08.523000 +CVE-2023-33553,0,1,2c7c4d709823d974d63c2907d9ff410a132adb98e3ded48b02d3752f26bb962a,2025-01-07T15:15:08.367000 +CVE-2023-33556,0,1,62f8fe856c6f35739d957225023ce40893233ee31d60e71493257f5129e8e91f,2025-01-07T15:15:08.523000 CVE-2023-33557,0,0,cc03734a1aa1840f74f9352ffd50d3d02541603dee095c93032d40edd69bf2c3,2025-01-06T18:15:15.217000 CVE-2023-33558,0,0,b7fdfe8e2f5f7ef9885330921ddc07a85ad745f4e7ac06e0631fdd030c9d0f58,2024-11-21T08:05:42.920000 CVE-2023-33559,0,0,fc3f3f42dddfccb0ab6605167a971e0c19be007ce1b19ab51ab90f1e64cff7d5,2024-11-21T08:05:43.100000 @@ -226245,7 +226246,7 @@ CVE-2023-33778,0,0,ec297d113928561e7859958d46d7eccb202240d5061dd5aa70f2fa420f913 CVE-2023-33779,0,0,1eb55c2bfcdb14a79b3fd3b01e17b005110092a805fd4ef937e8dad4263f6c70,2024-11-21T08:05:59.100000 CVE-2023-3378,0,0,b0837eae984d75a22386db3789972e8c74c698027c143f4d7579a37ec8c86ee2,2023-11-07T04:18:37.350000 CVE-2023-33780,0,0,9ae1d559f1968f9d1c9b4ea057170a356d47e42b68a94bb638f2d18fa1a6a09f,2024-11-21T08:05:59.243000 -CVE-2023-33781,0,0,c90d3f3e88fc22ed2c2116e02df4f6097f4d0f53cc84aa386821b9da17b0bf0a,2025-01-07T15:15:09.010000 +CVE-2023-33781,0,1,6b0368bf72b8357d9a988624e893986e54291b8b5f410db5ae4906fbc8806695,2025-01-07T15:15:09.010000 CVE-2023-33782,0,0,7113ddd4c34555a3f3c6eb824db06cb3a795e9dfcb0ec4ed13c5bc2328a8b8ae,2025-01-06T21:15:11.420000 CVE-2023-33785,0,0,9c7ec92d4a5d0a7399391c5080a052fcbd29a0f4edc35f1cf7df2fe324674784,2024-11-21T08:05:59.697000 CVE-2023-33786,0,0,47b4a818f4852512dedbd0ed4174db94426bfbe71bb01a9a604089696e58ed83,2024-11-21T08:05:59.840000 @@ -226299,7 +226300,7 @@ CVE-2023-3386,0,0,d30955c349e34a557fc3604c8361d5876aa81b368c9209af3e63334e0abe2a CVE-2023-33860,0,0,e017fbdba9558f00704985467fbde4b07f66309a8eaddc6d0377f397c304755f,2024-11-21T08:06:05.317000 CVE-2023-33863,0,0,ebb2e4d8b6a4c68a946bf04c04a71478bbb02a9f17a0babdce52dd828f7ea17d,2025-01-08T15:15:13.933000 CVE-2023-33864,0,0,53f5700cd5421e46dec4948a579e37fec38186c25c2f7b31a3f71fa57e91f83a,2025-01-08T16:15:31.320000 -CVE-2023-33865,0,0,591f9efdebada9c214b8e020ad4d4a40ea13edda60a879949af086ed7a44751d,2025-01-07T16:15:31.647000 +CVE-2023-33865,0,1,52f5749fb310201fde524f9c960a9243f859cd3d798ff951bf48d34d9707b4bc,2025-01-07T16:15:31.647000 CVE-2023-33866,0,0,53d4f76ee94f995d0e197f13a803b8e21e4131a9ec8c445c7c4748c9b252e41c,2024-11-21T08:06:05.900000 CVE-2023-33867,0,0,98339c98bcebc4a0583c8f1275d8bbeb85001b283b4aa10d817a65e0b7c91382,2024-11-21T08:06:06.030000 CVE-2023-33868,0,0,e24a1154738a185102ea2e84d77190f97c9ca31bac268c2b85291c46052f93b0,2024-11-21T08:06:06.163000 @@ -227326,105 +227327,105 @@ CVE-2023-3527,0,0,4cf9972735c5318c0743c13cc44474bc30251e6ae58a9d722633a0f2165886 CVE-2023-3528,0,0,348f150e77b2ac24d53d684314dc105ba1031b0acdcfb610efb9f6b9c261dd7f,2024-11-21T08:17:28.240000 CVE-2023-3529,0,0,eb6209a90a3a8e4dfe568b95b1b050e47d438d75ea4636911e96bbb48fb235f4,2024-11-21T08:17:28.390000 CVE-2023-35296,0,0,24ad4d99f1dba90aea52c9d1bd3aa3a7ccb8b2207a5900f56e6ac9f8d6af1b52,2024-11-21T08:08:08.320000 -CVE-2023-35297,0,0,f3645d05ce140d555c17639d90804e1b98864ec8aefead71a4486dafb02f6ee1,2024-11-21T08:08:08.500000 -CVE-2023-35298,0,0,e711e6a452acfeac0020be422a6535bc09a89cb9562aa53bbf05f2e9a52f0799,2024-11-21T08:08:08.660000 -CVE-2023-35299,0,0,6175d013ea21b4456a75b80c9f639d0ff97d83d7797ec11a8da2122c3ea401b6,2024-11-21T08:08:08.807000 -CVE-2023-35300,0,0,b22c02066100fcaff80055b84f123241599035ab9d294c8f4194bfdbac5cb1f2,2024-11-21T08:08:08.957000 -CVE-2023-35302,0,0,daa80a3dda2071796f3626d337c6e2f1f8a7d8eace216a0776113045bb0124dc,2024-11-21T08:08:09.167000 -CVE-2023-35303,0,0,35e06cad2eddff95044575bd8e483cb21262d7606f507a5b18720cee529d1e3c,2024-11-21T08:08:09.317000 -CVE-2023-35304,0,0,9d1e57f8c15e8a68f9f117548cebbcf591148c0c81e16e5182d775c741ac7e64,2024-11-21T08:08:09.470000 -CVE-2023-35305,0,0,90d2b2682d9e7b32a3465fb087c7c16374fd6c4dd1a1b7426e0512c3a1c14262,2024-11-21T08:08:09.617000 -CVE-2023-35306,0,0,e138b99ff60b666b779bfb0fa1388fcdb5a2bd3aa1ce9c09098822c1ff4e683e,2024-11-21T08:08:09.760000 -CVE-2023-35308,0,0,1ad73dd9084f1519a90ee41b9c8b4a5caf6ddce0fbb6441bc33fe6ca264136ad,2024-11-21T08:08:09.913000 -CVE-2023-35309,0,0,a50a5dae0037c78e5df48bafb5d04f7fe6c721313d6dd4c285a5db865968960a,2024-11-21T08:08:10.077000 +CVE-2023-35297,0,1,4f4577effa9b3f840655645e225d9b33f8350aeb501ee75471b4e6a6d1578541,2024-11-21T08:08:08.500000 +CVE-2023-35298,0,1,deaaf674a60fb0eba1b86ab115c642e5d76c612e5c748f00f06f12eabc373ff5,2024-11-21T08:08:08.660000 +CVE-2023-35299,0,1,172fed0af4069e32aeeac317d5e8b04f492912b6bd679dfbc5e8a45a3be7d83b,2024-11-21T08:08:08.807000 +CVE-2023-35300,0,1,8b832ffa42ff9fe8cccc9b9d8bd43d8763cee3775050e2ab5b1b3e686a71c3ea,2024-11-21T08:08:08.957000 +CVE-2023-35302,0,1,d06ff070929c012527ab17adfe0854a9b67e88ce397c6bcad83b416797528990,2024-11-21T08:08:09.167000 +CVE-2023-35303,0,1,84f1c0e1dab1841c958f6095da216fab2ef0e5b504362d3dcc8c8a78ec059247,2024-11-21T08:08:09.317000 +CVE-2023-35304,0,1,efc1c274c048851b6589ca9078b031e97f0d7126806527e3fad64608c8b569b3,2024-11-21T08:08:09.470000 +CVE-2023-35305,0,1,433aa2691f0773424ff2849ca061eb80dbe834205d34bb58783b66caa7c63589,2024-11-21T08:08:09.617000 +CVE-2023-35306,0,1,738472d118576d013a6768f3f312f760709a869849b8b8cb8424a776a900a433,2024-11-21T08:08:09.760000 +CVE-2023-35308,0,1,13e4114220fc9c48ff9841670fcd68b6ab86d906703814c29682a4ee5547a680,2024-11-21T08:08:09.913000 +CVE-2023-35309,0,1,980d5a35f197dac71c8f2317064604961ef18a89cf386f049614b9e223b1bea3,2024-11-21T08:08:10.077000 CVE-2023-3531,0,0,23ebf6c83ab3df762052ace36aee3bdef61cfbe9a96d0daf5810bff21aa78a6c,2024-11-21T08:17:28.530000 -CVE-2023-35310,0,0,5c5ec08d45d6f87486220f3f92956a74d7ec58ae5a7103e86b467caed5250c3d,2024-11-21T08:08:10.237000 +CVE-2023-35310,0,1,47816059f58d263e460d1950c3539680c85dce004167caec9aa6bf48f47c12a8,2024-11-21T08:08:10.237000 CVE-2023-35311,0,0,5827519778aa300156ad10077c89cb2b49a14e0ecc1860bc8f2970197604919d,2024-11-21T08:08:10.387000 -CVE-2023-35312,0,0,f84e1c941a83dc2671a1430c6e95b04b624a5690c8ac96a90f158855b942831d,2024-11-21T08:08:10.543000 -CVE-2023-35313,0,0,2c92a7752066e2f5ada69752b3e75722dc3d3355ff83395ac05dc4f8016f6254,2024-11-21T08:08:10.727000 +CVE-2023-35312,0,1,07c82402b8ef0f7054174a97ad43862822e2031c303ec10473e2390c19f9ad64,2024-11-21T08:08:10.543000 +CVE-2023-35313,0,1,5a5a417bf0edbe8e1fc3e7a26dacb0cc0843993ed808f37b71b47900df20ab18,2024-11-21T08:08:10.727000 CVE-2023-35314,0,0,08de05a29737ac79aa834841f146a600bbf8d4a47889b7d0ebb3827b9679f15e,2024-11-21T08:08:10.897000 -CVE-2023-35315,0,0,838b030742f4ec27ac81981d6e77abe3a2e2e5e3bb6c67868cf8df9f0042b21e,2024-11-21T08:08:11.087000 +CVE-2023-35315,0,1,82244c730b211db283eb92c5a02a2d8328a2337411006395853f99019e2917f7,2024-11-21T08:08:11.087000 CVE-2023-35316,0,0,809e7553168108db5979baef4068954ce7899a78cdf7a6745e42f7d2810621ad,2024-11-21T08:08:11.247000 -CVE-2023-35317,0,0,ed217fbe81ea7577d2dca21bde59d21e23e48c5c9b032b840bb6566966e2d6d9,2024-11-21T08:08:11.407000 +CVE-2023-35317,0,1,301af3f64c4fd593d051424f41a7ca9f716e0626dde3eeb086482a0f1832489d,2024-11-21T08:08:11.407000 CVE-2023-35318,0,0,6aebae440fc835e2464a457e0b6c3d673a30a4e6100d08f07f67bf193180a081,2024-11-21T08:08:11.563000 CVE-2023-35319,0,0,9d38a0de990c20060be30f5c279767d3f32dbd7f81d481913d2f4f76a371efc0,2024-11-21T08:08:11.727000 CVE-2023-3532,0,0,a340b9b588e737e3e93f5a228aef5c67c997f9c3375b154059cc51b050252b20,2024-11-21T08:17:28.687000 -CVE-2023-35320,0,0,eb37cbddce0d4f97a51acb32e235ac0bfb1d25e8a8baf960695882ac8306d5c9,2024-11-21T08:08:11.900000 +CVE-2023-35320,0,1,21a599c0f4514596b753a118006bd25788d3d1565d6b7c080ab21247b3c4fc36,2024-11-21T08:08:11.900000 CVE-2023-35321,0,0,b15e5dc7219b6d8706bb98ce2f027d47b9e4293a6e5968d82a4987950c076bd0,2024-11-21T08:08:12.043000 -CVE-2023-35322,0,0,242518f4ef8e920d11419a1260f9c1e6a7155fbb7763d1c06e2ce16f99b3196c,2024-11-21T08:08:12.200000 -CVE-2023-35323,0,0,4efa5989a7e8b3f0847cf9a3eebd724a89d46743cb47c42760f922f9907d4f0e,2024-11-21T08:08:12.343000 -CVE-2023-35324,0,0,ff76f9ff7f38955ebf7911f9e57857f517bf665e6530f804e8705c459679aaab,2024-11-21T08:08:12.473000 -CVE-2023-35325,0,0,a11f8e727668f77bb21f3a760f7601cbff1efcd3bfb580ca62091d4cb8e9e9e5,2024-11-21T08:08:12.610000 -CVE-2023-35326,0,0,f4a6334cd39dfc6e3fd96bf1c9332da192b78727fdb5493d88b0e045d282a29a,2024-11-21T08:08:12.760000 -CVE-2023-35328,0,0,e9ab4a7f9cfd6a0ae990ba66c2d32db1a41a215ef2de2f1c80f0edc601906835,2024-11-21T08:08:12.897000 -CVE-2023-35329,0,0,d67d68e4da6dd3183ce5fbfdfefcd32fa752aec08c5968a5eed4a74ae5910c47,2024-11-21T08:08:13.057000 +CVE-2023-35322,0,1,5d084caf6e6a346558bf2bac8a919b21fb7a910001209981125eb634eafb2bfd,2024-11-21T08:08:12.200000 +CVE-2023-35323,0,1,29c6e28f2d3fdefc2365c90a44a0fcd9739249c49c6495b27a3bec768260fc60,2024-11-21T08:08:12.343000 +CVE-2023-35324,0,1,2708b6f6f5381c07b64a1f8e3a725f1ae71f36bcbced0d3045e2b8ad7b72741f,2024-11-21T08:08:12.473000 +CVE-2023-35325,0,1,9fbbe4fe8a00f1787e7e8a28cb7b0c4a672d137a69d4b71eeedbfee8e1c90a1b,2024-11-21T08:08:12.610000 +CVE-2023-35326,0,1,31bfa5060c7d31505867978095c9e4540833ba0b290e8ffe7dfabbaa4f500802,2024-11-21T08:08:12.760000 +CVE-2023-35328,0,1,395e4d55fce2c1caf0f617b394a755c56ba28ea64feed3fd9aadd4268055b884,2024-11-21T08:08:12.897000 +CVE-2023-35329,0,1,d9835e48b267269edf72bc127be2936b47e35284ec680f5152a33bb7bc6ff99f,2024-11-21T08:08:13.057000 CVE-2023-3533,0,0,0d1bec12a177cae32c89a9f4aaeffdd7b4a3bfa2f534e85d2f0a07eb3f1003c4,2024-11-21T08:17:28.827000 -CVE-2023-35330,0,0,6dc75d1ea016b055a7a611973b06caae7ec51f7f045b859d392b21b9bf33bc5a,2024-11-21T08:08:13.223000 -CVE-2023-35331,0,0,0c6e349c7d269c586e5e506455227ad8705446bd333674edd8f4eb89540d5791,2024-11-21T08:08:13.387000 -CVE-2023-35332,0,0,9b24b08ccfea5ff488e49663af1c75e8c98a809763c535cfa48f4c7628ac4747,2024-11-21T08:08:13.523000 +CVE-2023-35330,0,1,689ff2db87a8b8ef0514ea3618783a1a74b6c49d331e1704dc2dc98e38c8555f,2024-11-21T08:08:13.223000 +CVE-2023-35331,0,1,4d57e7f5811fbe55fa08cad038b8a49bf0eef6a9ae91b8574ae8d3a86f6f7624,2024-11-21T08:08:13.387000 +CVE-2023-35332,0,1,4da525153d87c20168ebd2162f5f09ce0253ea18fdd0d7987f1085f1500418ef,2024-11-21T08:08:13.523000 CVE-2023-35333,0,0,b1a7a9f86ef4bbf0e92098bad159e152adcb2ed6d05c4db4a8921f49bde0c3c8,2024-11-21T08:08:13.673000 -CVE-2023-35335,0,0,a7cc40efd78f6fb07935f180405c0b20ad2dfc2ef044281c7fb9662bfcb9a0d0,2024-11-21T08:08:13.803000 +CVE-2023-35335,0,1,360af8f8477f0d26148252580f5e852392850579f55deb4c3f4f1050bb22ae96,2024-11-21T08:08:13.803000 CVE-2023-35336,0,0,7fecbb7219bcc688866b322da29a40f6e6cde5fd85542e9c0b311d12b9545e83,2024-11-21T08:08:13.923000 -CVE-2023-35337,0,0,fa88c989548d23ee024cde72e683b449f88f44af603f6555507b5076dd3e190c,2024-11-21T08:08:14.070000 -CVE-2023-35338,0,0,8cdb7430e1a8d6dc8ac3fb2d784fe3476044498337ef623116a930b97f986490,2024-11-21T08:08:14.230000 -CVE-2023-35339,0,0,bb41ab06e48a969ddcf096024a2b0c34e9590929d2e270034bc0ee4201779be5,2024-11-21T08:08:14.393000 +CVE-2023-35337,0,1,f14683792c8bec8a8b09504804534618e80dda35bd01456f3a0277b78fc0bb2a,2024-11-21T08:08:14.070000 +CVE-2023-35338,0,1,f31d785a740dd45cf4e91c05951cc7079ef9beb8010c24902f7a60971bcbc0fa,2024-11-21T08:08:14.230000 +CVE-2023-35339,0,1,7f77f9130279ab82604d3b53e218dd23805d03883693181d34e2dacba157843d,2024-11-21T08:08:14.393000 CVE-2023-3534,0,0,d387d05164484f5cd3a518f4a86708c3b31f68baa5b3d6a5d22ad740829126df,2024-11-21T08:17:28.980000 -CVE-2023-35340,0,0,31c35460f8ed821c1b855f1e8c8ff8859e285a6b93e1b910cabc849abbd2df7d,2024-11-21T08:08:14.547000 +CVE-2023-35340,0,1,2b4e52ad3147b78784b5de2de8f6469144ac1e3b64574e7cee990765b0aa6fff,2024-11-21T08:08:14.547000 CVE-2023-35341,0,0,94de6c6953e563536ce54cfec46b11bb57cd2847fe3a00da3d7f676a57f93aef,2024-11-21T08:08:14.717000 -CVE-2023-35342,0,0,078e60db3729a3217f04cd1e6fc1e691f418a0969fdfdc24420dbabe0a6ed4ee,2024-11-21T08:08:14.863000 -CVE-2023-35343,0,0,38b6642e21b91a24593a8703d962a902dccbca25d604f1afd708f4e45b52e7eb,2024-11-21T08:08:15.020000 -CVE-2023-35344,0,0,1d61c3cdd2446880a5492b0ba8717614a306aa1d2ac1833067aee9462c911fa9,2024-11-21T08:08:15.160000 -CVE-2023-35345,0,0,10891520f091dae6a6f9f7854160629386e465fc0401e5ebce86ae870c9db4f1,2024-11-21T08:08:15.313000 -CVE-2023-35346,0,0,b568551025884b0511358bc69fe89d9cdc7fd4daa1bf6a10ac7df24ec282523e,2024-11-21T08:08:15.470000 -CVE-2023-35347,0,0,a3870746c26c3b4a8dea06a36b565a0c43d553537ab47cccfdfda46cda9b3b86,2024-11-21T08:08:15.620000 -CVE-2023-35348,0,0,6ba6c299e4fd27f25540f303d28b2d1f8c6600cd204da1c5537dd4a586d5c942,2024-11-21T08:08:15.750000 -CVE-2023-35349,0,0,6ba0ab1d19f2d7c0782fbac0d7ee15cfc0664c61bb7d966cf47e59d1fab1c19a,2024-11-21T08:08:15.900000 +CVE-2023-35342,0,1,dad7378ce87e233d1709bbe92d7c6604f50e1b1b46701af16602a40acae2f9c7,2024-11-21T08:08:14.863000 +CVE-2023-35343,0,1,f190ae2518d9ae172825611b3c11a95eacfc9d957bbc9205e4639d27c5bb33df,2024-11-21T08:08:15.020000 +CVE-2023-35344,0,1,eeb2f75e747829783ab42d8f12551dea32b4e1dd6d4a9ab38d5300ae7cff93a4,2024-11-21T08:08:15.160000 +CVE-2023-35345,0,1,185c5b0da1ba9ab47461891cd8e1a2922704c239b28568fa0531894413397c76,2024-11-21T08:08:15.313000 +CVE-2023-35346,0,1,f3dbf4fda227b259593662e04585e9ee313b20d07883d567544a1f91c6a0fb4b,2024-11-21T08:08:15.470000 +CVE-2023-35347,0,1,d7900e543b0d1b7694272eed6e3c53e4d161cc105c4b83fba8257d4c6dda1694,2024-11-21T08:08:15.620000 +CVE-2023-35348,0,1,328795f813cdb7cd01699e4bdee10f4e7907e8c554501cfafcc615fe205dc275,2024-11-21T08:08:15.750000 +CVE-2023-35349,0,1,8af72565db81aa3654db34f265535a06249aec401a19a76d4dc719fa0701efe2,2024-11-21T08:08:15.900000 CVE-2023-3535,0,0,d1fa270c031bcbe951a9acc906b802115ecfb791da61a549d2ae4cc9cdad9da4,2024-11-21T08:17:29.123000 -CVE-2023-35350,0,0,dd588ad899d106a2ff1f666df74eb847e35f0136357b7193bad11cd894105049,2024-11-21T08:08:16.077000 -CVE-2023-35351,0,0,487ef2bf8d133d0af8326e7a5dc2e717f3f7f5061393eebce1dfac585603a790,2024-11-21T08:08:16.227000 -CVE-2023-35352,0,0,3c4a4f2b905e0a9fa1e5d9ef58df0f3e28c8e7f9bff74b47fce70b056d43df2c,2024-11-21T08:08:16.390000 -CVE-2023-35353,0,0,2a2d996f7b7f1286fa477bc6a97b55b1073ae618e706ef369f927f0579be3076,2024-11-21T08:08:17.167000 -CVE-2023-35355,0,0,768541d10d39fd3146a817c22a0b914948f4f77945640a2a5985c476d1834c22,2024-11-21T08:08:17.320000 -CVE-2023-35356,0,0,71fcc601481b821143cb0263df1b085bf52441c1fec9fcd8c71dbd7eb7684789,2025-01-01T02:15:58.307000 -CVE-2023-35357,0,0,893de27fe29e3a63595782972c78e0a26d65a22e14ad4e4b1bffaf8aedf3e71f,2025-01-01T02:15:58.433000 -CVE-2023-35358,0,0,4ef1c8eb24e43049fec0740ae0822bf5e2d3df268e30b592d16aa7769b1777ce,2025-01-01T02:15:58.583000 -CVE-2023-35359,0,0,bd80558240b9b153007c90c03e7c3ecae33328b3635b722fa2ba0ae6cff61d04,2025-01-01T02:15:58.747000 +CVE-2023-35350,0,1,197d77a640c3b886dcb3cd00f7593e0f1fa9eb73a57875f78f619d785091baba,2024-11-21T08:08:16.077000 +CVE-2023-35351,0,1,498b890a10fe8ac1ebb2c66e2aba0bcfa6ff095c06efec9dc31f9f5c91abc4c1,2024-11-21T08:08:16.227000 +CVE-2023-35352,0,1,5870686c2798bfd0432256f5a77219f5ff72c4d5fba6b9838440df5e87e3907f,2024-11-21T08:08:16.390000 +CVE-2023-35353,0,1,67fef8e375a85677a2c9657d0e2ee5c68cdb3508ea03fc7637e39667be566a73,2024-11-21T08:08:17.167000 +CVE-2023-35355,0,1,5295476b2674da417b64d6964c85c62632c067ffc68dca26a85707163eaee851,2024-11-21T08:08:17.320000 +CVE-2023-35356,0,1,1cf3972afb2e35ecb1789cabe9b3ebc020e48435861ccaaebc1a97576b9c3c7b,2025-01-01T02:15:58.307000 +CVE-2023-35357,0,1,c9a38160ad85f8ea1f814e6c29247c92f2815e37a29d1001ad47c14354cd9c9d,2025-01-01T02:15:58.433000 +CVE-2023-35358,0,1,d6a23960f6f1adb4f49000920c92582dc4a7fcb7fd2e835e6e251f93c70b9740,2025-01-01T02:15:58.583000 +CVE-2023-35359,0,1,075e6b4ff5b9a2a6e7f44e9e976ca87af734b81e91cff874b81857b6d071b49a,2025-01-01T02:15:58.747000 CVE-2023-3536,0,0,847194652db1bb9284435aeb5eceaa43d5cd617774bc8693e7a0fc3bc26985a4,2024-11-21T08:17:29.260000 -CVE-2023-35360,0,0,415de0d5924e44ae7fabc0e61814e51c629f22b27bf6c1b85a5ed59be44b8cf8,2024-11-21T08:08:18.083000 -CVE-2023-35361,0,0,56b6011e5661a260df3104675354ed0356de254de160a775cc1ffb8ed5876c9c,2024-11-21T08:08:18.237000 -CVE-2023-35362,0,0,b10413819ac3881bfc36369b8c8595cfe64f782fd5a2523f046add026cdfbbaa,2024-11-21T08:08:18.400000 -CVE-2023-35363,0,0,c0edb1531211d69f67f083c162cdb61730fd40cea96175b11fe8c10b091cac75,2024-11-21T08:08:18.567000 -CVE-2023-35364,0,0,1397fd1c2b0b5d5469c356a4ac2ca89c05b85d8a409a282440080a936dcb31ab,2024-11-21T08:08:18.723000 -CVE-2023-35365,0,0,68113cda62f77f419bb6e8d4635e36c850cd069d9379a73c6208aab685c2a176,2024-11-21T08:08:18.890000 -CVE-2023-35366,0,0,96792a2ce83806f50315d2866557915a837ca4aaa0f57fbbb7a3f50a327cdec9,2024-11-21T08:08:19.067000 -CVE-2023-35367,0,0,614f0395fc6a2fcdddaad3a02a85f5d184ad8f9281bc2e66195a16857cf84e64,2024-11-21T08:08:19.240000 -CVE-2023-35368,0,0,70cc5714382c7f32799886fe4283870fa3549739ab70fb881951caa5126abcb5,2024-11-21T08:08:19.423000 +CVE-2023-35360,0,1,427b41403f026f1fd3aa41f5b36e2085afea51a05914d7a7c815eca831bc6235,2024-11-21T08:08:18.083000 +CVE-2023-35361,0,1,aa890c102e829cb08d3f19e244c3e39777a4ec05a2ad98524a7d06e83d746c8a,2024-11-21T08:08:18.237000 +CVE-2023-35362,0,1,208a126aa753c76d4f763ec11d1d53672c734dfc3ace436b9acc656df30e9c7d,2024-11-21T08:08:18.400000 +CVE-2023-35363,0,1,db350d8c80c7269c2aba0f80d05315d025928a2c190681dea08f5216ce9aca33,2024-11-21T08:08:18.567000 +CVE-2023-35364,0,1,3aa72b7b6b80de137e08f738cc89840694aad787366c15599613b0c6fb925905,2024-11-21T08:08:18.723000 +CVE-2023-35365,0,1,fe33f7dc9842bce0be288c22bbb03befae827c509471277fd4290b61741b657e,2024-11-21T08:08:18.890000 +CVE-2023-35366,0,1,bf13fef0dee343b9ccf31bc6b8058ef094aa27e7300e0b6cb71df23e49685bf4,2024-11-21T08:08:19.067000 +CVE-2023-35367,0,1,7434c885e9c3725d7c4a744c6f4e99079d936587cb7ff80a9cc275966e1d9124,2024-11-21T08:08:19.240000 +CVE-2023-35368,0,1,730a7532f5ea6e0b0cc7604136998fc8469860258c33342192dca0696cc58251,2024-11-21T08:08:19.423000 CVE-2023-3537,0,0,00738af02b9281b413de342ef6b84d4f251f1c34aedf6ea5c06a14c6c5ca65a5,2024-11-21T08:17:29.400000 -CVE-2023-35371,0,0,f85e0cdb33172b61bae42bedf8ff0540778303c55fb22c7829e0d3803d87d4e6,2024-11-21T08:08:19.560000 -CVE-2023-35372,0,0,dda09bee09ca6dc4318d385b7d1f91560b66789e2762c412ac07903568e5049f,2024-11-21T08:08:19.693000 +CVE-2023-35371,0,1,08315e9fbeee0508bd41c9b74788eaac87883e1343a107fe0e6ec5bdacce2335,2024-11-21T08:08:19.560000 +CVE-2023-35372,0,1,4c143b4cc4ed2d8144ab8c733f1a6cd7d519ae78885d53a4a8adc584d6cde79a,2024-11-21T08:08:19.693000 CVE-2023-35373,0,0,0a9b0fe02f1941b547687df205f973bb60c5e0c3f1476618c31936a72d0bdc29,2024-11-21T08:08:19.823000 -CVE-2023-35374,0,0,9db5977f196600d568648309451bbcdb3fa613c922cd743ce1f9fe19ee0cb9fd,2024-11-21T08:08:19.957000 -CVE-2023-35376,0,0,d58eaa2f73ec47e89cbe5bd64ac81a13aab2b4857fb32c585db4e8d45f30a605,2025-01-01T02:16:00.650000 -CVE-2023-35377,0,0,a64a337391ee1c4c98934023ec8c8f76614292bcd68ecf52ef35f465b772bd49,2025-01-01T02:16:00.787000 -CVE-2023-35378,0,0,63153dfc83d9b4d6ac7a59e9c72a07348063efd2aeaa02c45f9f353132e6c0bb,2024-11-21T08:08:20.397000 -CVE-2023-35379,0,0,556826e9357911c97f5fd5199e0377ecf99c02eee037b0a56b5decec6d5bc04b,2024-11-21T08:08:20.527000 +CVE-2023-35374,0,1,424f338ee090c1895622680c1098adb5c7ebfb0eb94ebc8b4e74f95753aaf7a4,2024-11-21T08:08:19.957000 +CVE-2023-35376,0,1,b4aa4a2702bb24d6aaf43c3cd86d517630dfa4db694571ca5dea86ef4076a043,2025-01-01T02:16:00.650000 +CVE-2023-35377,0,1,fffc849e481c3312c894d1abad16a388279dac80dcebebc14190523ea99fa36e,2025-01-01T02:16:00.787000 +CVE-2023-35378,0,1,13b22833b5c017c0f8c644f559587566c97abb98e5bb303273f64af59db82a19,2024-11-21T08:08:20.397000 +CVE-2023-35379,0,1,270d07bd60f59d960f50c3604dace85eba61d114afb171b90c575fcc74ab93fe,2024-11-21T08:08:20.527000 CVE-2023-3538,0,0,a08335884eaca3a983cc6d9ea1d0b514ce96e3fa321428b58964d26e756ef4cf,2024-11-21T08:17:29.537000 -CVE-2023-35380,0,0,80502525bf745f67f06d1577fedc25e622293884f708f0cd9497a8a5eb557024,2024-11-21T08:08:20.657000 -CVE-2023-35381,0,0,4eff30c4034b3e35f71f64b00eb640924b26a9dbe6e919ffc616897a8d935c9d,2024-11-21T08:08:20.830000 -CVE-2023-35382,0,0,938a2796deef3db72a7d215793e57835104d6d85c356784150538d41bf8f68b7,2025-01-01T02:16:01.533000 -CVE-2023-35383,0,0,427d091b14a4ee6f97f338412ef5228cac2e95bdbb76a240f93ef23312d76148,2024-11-21T08:08:21.150000 +CVE-2023-35380,0,1,ab059e3ed616b011b166883fd6f03fe63e2a1d41b6625fe1f6914c97847c60df,2024-11-21T08:08:20.657000 +CVE-2023-35381,0,1,a2f13ed936e00688a45721f826e4fdb5af1436ff9b12d078fa3c9b818830e7fe,2024-11-21T08:08:20.830000 +CVE-2023-35382,0,1,e568aedfdd26f447ffc7c4c125faa632361b63143f6b67f1aa757ad44abbca85,2025-01-01T02:16:01.533000 +CVE-2023-35383,0,1,2bb688757d39302265fed4d1264ad32df783a3df19044d8e1b593a76b58d8e69,2024-11-21T08:08:21.150000 CVE-2023-35384,0,0,a5f483f971ec4411e34bc0f1792b60d95654231b65c4af61090af25850eadec3,2024-11-21T08:08:21.317000 -CVE-2023-35385,0,0,a2e7a6467808c8bda6dc3895730c0da8e57b596b6bcdf1b94ce6efa96ca6d95c,2024-11-21T08:08:21.477000 -CVE-2023-35386,0,0,69eaca54f1ac409412f267eb28fd0c81e623aa7a8c3dcc8ae8970b4eb4c6cef9,2025-01-01T02:16:02.157000 -CVE-2023-35387,0,0,855e087930b140d07c1be3c870a71e616469057ed87ce00dd738b3585d8b0be7,2024-11-21T08:08:21.807000 -CVE-2023-35388,0,0,30ad75341bdef1ad7159d7e35f351735c0569e7abaa1e04937f2c273c05873a2,2024-11-21T08:08:21.960000 -CVE-2023-35389,0,0,fa686e7ee16f42db86fcf3a1124edea71070db54d69dedd83215c4395b060f75,2024-11-21T08:08:22.087000 +CVE-2023-35385,0,1,dc2b1092130eb4ace50ca5f1688ccd12e7223d8bc74fd51cbb89d6bb740e7d1b,2024-11-21T08:08:21.477000 +CVE-2023-35386,0,1,1505be68d131166196b97503ab6b4df8d412db0bc69d8249d817e14b58a9dc1a,2025-01-01T02:16:02.157000 +CVE-2023-35387,0,1,1683556d470e13b3544765cbeaaf43ce147be84111917712313ed68dcf9ac46d,2024-11-21T08:08:21.807000 +CVE-2023-35388,0,1,3f10725e92328af72c1d3b6133ff4c883eecf07313ab0012c083fffe48915190,2024-11-21T08:08:21.960000 +CVE-2023-35389,0,1,5a62eb7d579c869493b8eccc441dd2c6c2d0bdf876845e9ffa41601c68bce035,2024-11-21T08:08:22.087000 CVE-2023-3539,0,0,44eac7bb26efe9fa8f35bebef930a683e7cb2aa7a2bed5694e5228d1009e441a,2024-11-21T08:17:29.673000 -CVE-2023-35390,0,0,6ebf40dcc440bd64799284169ad2ad75429bbc1685cc570837e4ae156e47a249,2025-01-01T02:16:02.787000 +CVE-2023-35390,0,1,9888ca187426062a7d12cbca91e60e372647fcea5214b27c9b3d579f113a51ce,2025-01-01T02:16:02.787000 CVE-2023-35391,0,0,bb103be9307ca23d479248deb4e446266c7cfa23c30add9bc5c5b54fe2dc2df8,2024-11-21T08:08:22.370000 -CVE-2023-35392,0,0,821b5e742b6f8e2a3bbc5ca7d08a44c604fc8d63d0cf3bf5611f90788f75781e,2024-11-21T08:08:22.520000 -CVE-2023-35393,0,0,87d17d33fa5d8f40cf20fa756f1773504fea3f78951f8f77301f9da171e3676d,2024-11-21T08:08:22.650000 -CVE-2023-35394,0,0,df25d326096e5ebb42a129fcd5a5f50bb6b2e3865733732b79efdf6f4a67284e,2024-11-21T08:08:22.777000 +CVE-2023-35392,0,1,efc400cbdace4ab004a7024a0c8474474388f2d5d813132c54ab70eafdd9b187,2024-11-21T08:08:22.520000 +CVE-2023-35393,0,1,e8b92057ca70bdca0d1ebb492b43a66f358d460ebbf5b74d0dfaadd60685e4e7,2024-11-21T08:08:22.650000 +CVE-2023-35394,0,1,c1212bf7152173930e08a3ccc6ec822345c4ed792bca80b7bc1d1b4f3b202f2d,2024-11-21T08:08:22.777000 CVE-2023-3540,0,0,fb54c5e79c718e673ee36cfd65d0f38ea01746e1f383e8e3255fd878034c9e15,2024-11-21T08:17:29.813000 CVE-2023-3541,0,0,025331cdfefef6a2518b55c43f9fd37c9318443d1c9b9db0d606a09522dd23b0,2024-11-21T08:17:29.983000 CVE-2023-3542,0,0,ed3e32fb71d82ec69c2c8c18465ec16ccd923c275549ac5a7227e72036a13f34,2024-11-21T08:17:30.140000 @@ -227445,30 +227446,30 @@ CVE-2023-3558,0,0,2fa92a4f84a13f6b4c5a5fe41778276d8c7b99ff6c68230ded386aca0567e3 CVE-2023-3559,0,0,49d54ec63b8d460a6f18cd9b5608f88e8e628f46f6acdd9a851538c906b8aea8,2024-11-21T08:17:32.483000 CVE-2023-3560,0,0,b70a9db1aa5d1e7f2b48d82aa202fb71a96d8787f2244abe2fc2b452ea3bbf90,2024-11-21T08:17:32.653000 CVE-2023-3561,0,0,eb46b0fab4c611be02d39dd60ea2ae54085d45323aee192dd33f48392e27ab61,2024-11-21T08:17:32.807000 -CVE-2023-35618,0,0,e18834cdbefac84c3447faa751bcf24ff064bcf9d0efc45ada7f3e0794dbb38e,2025-01-01T03:15:08.007000 -CVE-2023-35619,0,0,8b7e04c0b83969af4cd951c3e9ee466df93a023f93d6a5f43c530dc482ebdf79,2024-11-21T08:08:23.030000 +CVE-2023-35618,0,1,a79d351f75069f972aafdafe1f9fc6acd410b4d68e8f3e3df5a2ec465abe55e4,2025-01-01T03:15:08.007000 +CVE-2023-35619,0,1,c746950b7158cb8308d48cd52b451af23dfe81a4bc4a379cf9d0137edcc21de0,2024-11-21T08:08:23.030000 CVE-2023-3562,0,0,e83c45c6e7c87ddad32488fa82dbe36c9e01aa54596dbc385dc87e0df4bd9667,2024-11-21T08:17:32.960000 -CVE-2023-35621,0,0,106a1cf6b96f4c9352fa6f90113e27a6d0793ced930377373f285d94b46bdb35,2024-11-21T08:08:23.163000 -CVE-2023-35622,0,0,ca893aa82c4d4f77f807ea1f1e67f41856117310f74ecb5f76efe55ad3561823,2024-11-21T08:08:23.310000 -CVE-2023-35624,0,0,b2b9ea2facddf907ce8b7f40a0d2615ddab92677240d66da1f325d7cafb6b279,2024-11-21T08:08:23.443000 -CVE-2023-35625,0,0,3b6c52c9a5c7a2bc7bab67e0cc141feb5ec4d3166009e77073656dfb045b7f8f,2024-11-21T08:08:23.577000 -CVE-2023-35628,0,0,10736699650b35fb0bc6307d5627a07353e0286aeac8116e690470d6ef1aba3a,2024-11-21T08:08:23.720000 -CVE-2023-35629,0,0,091babfbbf51820e7c7356ca3cc786ec418ee2bf57cbad166afacd2c017e9b26,2024-11-21T08:08:23.897000 +CVE-2023-35621,0,1,bc1a960b9395a1610047e58f11252391bbba8f00771652a433c4e42d655b0cc8,2024-11-21T08:08:23.163000 +CVE-2023-35622,0,1,b0fbc590191f8d0bc13491663d7aaa224b94194ecb54d085a8c141e9b861daa3,2024-11-21T08:08:23.310000 +CVE-2023-35624,0,1,7d59c3a2d3c88a0354d83bbdd7add3641d5a785c65d4402da6f30736ccde3599,2024-11-21T08:08:23.443000 +CVE-2023-35625,0,1,6b2c950cf135f617fc9c4ab35a3a2251c3db77b29587508c74ac6a8ecde91838,2024-11-21T08:08:23.577000 +CVE-2023-35628,0,1,56ae6ddb2c0f7291bd94824486e15b14c163649786cc6a44d1b5dc89aae4aac2,2024-11-21T08:08:23.720000 +CVE-2023-35629,0,1,606937d53e5166f13509d95d1a4a1fe9c996dce2358850f63ad2e931f9550184,2024-11-21T08:08:23.897000 CVE-2023-3563,0,0,cb50af0f4aa9b4c341852d9bd9f9ed197142a84ce1c17aa053709ebeb85723d7,2024-11-21T08:17:33.100000 -CVE-2023-35630,0,0,cce744e62bb406e67f515c0808eb74d9563969dc675fdd9c38dbed963ee169f4,2024-11-21T08:08:24.030000 -CVE-2023-35631,0,0,9c596b0b40389d4c2596206a68583e558fda18085ac7390cc849467a27d5e230,2024-11-21T08:08:24.187000 -CVE-2023-35632,0,0,5ba43a4ebe5a3c1a4722268d7c1398cbc7f1d98981d7e027fac3b708a591943e,2024-11-21T08:08:24.333000 -CVE-2023-35633,0,0,cc6af9fede4f1024c7d3538581ee8203ef5917242a5f4db66e266ee34e73c539,2025-01-01T03:15:09.293000 +CVE-2023-35630,0,1,66998475bdba7489fe2c3536a3034f1a2ef50d3ac0a9771fe7e0a137d5e8b890,2024-11-21T08:08:24.030000 +CVE-2023-35631,0,1,29bd2ba32fab7c0c60eaefb240b0645e331024235b5742041a568a18cf0c5367,2024-11-21T08:08:24.187000 +CVE-2023-35632,0,1,633396e2e6e8ef9352e48027fffc86a58bb3c084a3ca91f9405fcf9bd2a67140,2024-11-21T08:08:24.333000 +CVE-2023-35633,0,1,6c85ad1626a00e8d688550f2575374ea04afcd9674e0637071eead587ecbeb4f,2025-01-01T03:15:09.293000 CVE-2023-35634,0,0,42b3093daeabdffac2f45ee5579b2b605f34e8c6a92cc8cdf957468396462991,2024-11-21T08:08:24.600000 -CVE-2023-35635,0,0,5c8ccf126416c38ed2184e3906b3eb7c63edf57c5ba01ce26d93fc0d3f3315c8,2024-11-21T08:08:24.730000 -CVE-2023-35636,0,0,122b1a7bdb0fecbd69f3e23cef07a7d0ef21fee0cc10cd7f5a9b4d2c42ac399c,2024-11-21T08:08:24.853000 -CVE-2023-35638,0,0,c3928330299e4a01d8f894c60c0e026557bd5ae3aa7e34f178c9f03dcf195624,2024-11-21T08:08:24.970000 -CVE-2023-35639,0,0,21a3d1394b56ec4cecff3aa69583cdd2e18a3b2246870f4e45f338b91a127f2c,2024-11-21T08:08:25.107000 +CVE-2023-35635,0,1,2af573ad8827dc9a214378ca5ca84c4259df2c2dac81c4492bfe20b56a80f9d1,2024-11-21T08:08:24.730000 +CVE-2023-35636,0,1,d5bb589af805d67caa460f5de130bc74af50dd1652712f6e27be84d1f70c7b21,2024-11-21T08:08:24.853000 +CVE-2023-35638,0,1,cc16ab8e22db8fe562d4d3fcc334b8140eb2dd3876cb882adedadb8e12de6d7a,2024-11-21T08:08:24.970000 +CVE-2023-35639,0,1,5d9669ad9fc7a19a9d4a70ba0b8ba2bbca4cf08c5b4fc7fe04b6c2d7ef60e8b0,2024-11-21T08:08:25.107000 CVE-2023-3564,0,0,f21971e9d5090bf313ac7ff564cc5d7d126fab38eb62d8e3a91b1d18531d812b,2024-11-21T08:17:33.273000 -CVE-2023-35641,0,0,d9975f478d898042a56faab64a07d3d23b233f5919540dc660739bacb6deedb0,2024-11-21T08:08:25.263000 -CVE-2023-35642,0,0,6a97c1ff9adae61dfc0345b9398cef5bee2f4bc6beb8ff1ed7f6e53d6b7b6d98,2024-11-21T08:08:25.420000 -CVE-2023-35643,0,0,abcb88d71c175876330527a8609f9a69c278f0c3f7b1803278e5dfd490591bd9,2024-11-21T08:08:25.570000 -CVE-2023-35644,0,0,78de64abef132c4af5ce69edf36c85d093ae0692e1b1388f8d9eeda844a5a015,2025-01-01T03:15:10.550000 +CVE-2023-35641,0,1,0ea13123373962b369cd2d428cb39ee549dc34adc1a278f5b3438d7ec97dc37e,2024-11-21T08:08:25.263000 +CVE-2023-35642,0,1,6df7f9f33380233a850d7c546cfdfb41b1d719e91586f8404d72edd51e1c0a44,2024-11-21T08:08:25.420000 +CVE-2023-35643,0,1,65807eaabe0efb8d9bddd92f3421e29c5254a4d4a1c59952c5ba23d79c94b69e,2024-11-21T08:08:25.570000 +CVE-2023-35644,0,1,d0979429a0aad9e76e76c19278d888a5cbe1598f19e8dd53e6394427964a0a33,2025-01-01T03:15:10.550000 CVE-2023-35645,0,0,04896050d7bc70245ed42b6e32a41b4e7e46c34f48970d2e1603c73ec922afce,2024-11-21T08:08:25.850000 CVE-2023-35646,0,0,3dfea307ace5abaccadc8f0afb593d7fb9fc68af7b681047da673b991ab294d0,2024-11-21T08:08:25.990000 CVE-2023-35647,0,0,a4e47d68db51ba57909083c5c583857396d2ad1872b94e23f9a644b5dfe60562,2024-11-21T08:08:26.113000 @@ -227811,16 +227812,16 @@ CVE-2023-36000,0,0,5d8c688eb130e5ca68d65b349743645af285897af52e729cd8ce8e380fda7 CVE-2023-36001,0,0,29d744b3833d138071964fe3e129d292d517bbc0ff85dc906114ef045a2ff0e2,2023-11-07T04:16:06.937000 CVE-2023-36002,0,0,b01e0280d235efa7c17b7fd5cd67379409252de21c222cd39b34ef6eb56d1207,2024-11-21T08:09:08.817000 CVE-2023-36003,0,0,f38f71639c671972ef57898132c75eeb62a2b40c59101cd03cfb94238a5e74fe,2024-11-21T08:09:08.947000 -CVE-2023-36004,0,0,310c75ea8c9a180336b67844fcff967b7d2c1fda3c6632b04675954f4e5c570b,2024-11-21T08:09:09.093000 +CVE-2023-36004,0,1,6e7f0964de9b1826ae4118c9a6ced25dff262d4ed9be8cab654a9ee4a6c2e177,2024-11-21T08:09:09.093000 CVE-2023-36005,0,0,92ca686d94ed06e0cafeac4a09e55b7710f71fea82bf30dedc250026e8866e70,2024-11-21T08:09:09.243000 -CVE-2023-36006,0,0,ce3f0372c38e65e2dd9210bc1505eb14727c9690c841e8b2543397d4ce79721c,2024-11-21T08:09:09.403000 +CVE-2023-36006,0,1,ea11eeedd02baa64907a43e8d8cc9b31c2e7e83086ceb79d2b8e61e42986a9e3,2024-11-21T08:09:09.403000 CVE-2023-36007,0,0,4c676a5dd3588be81ab5d16aa6a3724306df2a2c762c5a1c9c7864be8358e7d5,2024-11-21T08:09:09.550000 CVE-2023-36008,0,0,96509ecb0e575b6c901e918b48bf714b6fb461b73a0ea97f950f585fe12da31c,2024-11-21T08:09:09.677000 -CVE-2023-36009,0,0,c77eff6e4404d433316055fd9a4fe24a79cf9edb840b115997b67abd2b35ef08,2024-11-21T08:09:09.817000 +CVE-2023-36009,0,1,5834b735afc684f1c196350c1228d712a0df48d94796d1212c926371d5033d83,2024-11-21T08:09:09.817000 CVE-2023-3601,0,0,de6efb2f82239a416e2eb20c2614079f451122862059fbbe4342274cf02ce15f,2024-11-21T08:17:38.600000 -CVE-2023-36010,0,0,f2038eedb862653b40fed744fecfda6cc35d90fdc2fe7314870be24916947960,2024-11-21T08:09:09.957000 -CVE-2023-36011,0,0,32305ae4c3cb34a6084b8059262e8ef21613415ae3fdafd665d991b2dfb5c716,2024-11-21T08:09:10.080000 -CVE-2023-36012,0,0,48f9b5b59d49b8f0d26ea94982d2d13292d9c8f918f46e6b32aafc4acb3f0f33,2024-11-21T08:09:10.233000 +CVE-2023-36010,0,1,2975bfae42115e9167c232a324695b9f1c42f122b82549b5ad5077c89d03b65f,2024-11-21T08:09:09.957000 +CVE-2023-36011,0,1,773a5843377f80c9615ad341f6b375558265114a520bb767ed1e96cfcb30492a,2024-11-21T08:09:10.080000 +CVE-2023-36012,0,1,c4cf14dad6626258a5e24f3df2bf26a6e1df9a4cca819c0d43dff8aeef20b1cb,2024-11-21T08:09:10.233000 CVE-2023-36013,0,0,7d56db6bf8f9319b2817534b44f8b5da214ca6bbd4a48c58c2cc9533c83c9a12,2024-11-21T08:09:10.433000 CVE-2023-36014,0,0,9fe5c102711c1e215009a22946f4f88c271b250afdf8af1004868e70b7972cb8,2024-11-21T08:09:10.567000 CVE-2023-36016,0,0,ec2fb2049b2f05c7238b206d536dbce12bbdb67227714f3f402220b56650b788,2024-11-21T08:09:10.697000 @@ -228048,7 +228049,7 @@ CVE-2023-36387,0,0,e3c3a11268b5d30b5239d30e9cef96971d422bae837e64ff562350ec0c8b8 CVE-2023-36388,0,0,d4a8933c12c8122adc70f910f1a9216c2dcff32294c3e760e211986799ffeecc,2024-11-21T08:09:39.183000 CVE-2023-36389,0,0,94f7303a8e11a97c1698eca628e29dff643936fd2e8e0087dccfa1c333e56f75,2024-11-21T08:09:39.320000 CVE-2023-36390,0,0,86a3b2189611f7e1b321576040a4195a398abdd455dd556d9ff88a19383e840e,2024-11-21T08:09:39.467000 -CVE-2023-36391,0,0,e9cd6614d551fa5462903e94d7082ab6a62c377b2fb8971e78a017e66ce0695b,2024-11-21T08:09:39.617000 +CVE-2023-36391,0,1,07c7b4ec224a2f09bd462c52fc264b0afa73110f0288aeb42167062d6435eac5,2024-11-21T08:09:39.617000 CVE-2023-36392,0,0,d4f3dbdcb0c1165e9372bdd15b1b1955586b1ac87394134dadac3276d4c3d24a,2024-11-21T08:09:39.743000 CVE-2023-36393,0,0,a2a9afe8a293e32622fb38857cfcf376880a3a1aeb5a5b75bda81707e1e345f6,2024-11-21T08:09:39.893000 CVE-2023-36394,0,0,6a8bdda8ba5f9a38a6ac9c36923ac8bcdb8824da35c7c77b0111fd6aead28179,2024-11-21T08:09:40.063000 @@ -228087,13 +228088,13 @@ CVE-2023-36427,0,0,7d7b65fb1ecedc0c25957971a376c0665f55233092338b68ca5de65fe0f6a CVE-2023-36428,0,0,0daa254ccfe22797edb189b552309d7f8d308cbc2b13760257c7656194581b16,2024-11-21T08:09:43.867000 CVE-2023-36429,0,0,d962c1ca69422b6b22e770288216c8bf352a576b2ee33ff1a9c8648bd0702c53,2024-11-21T08:09:43.993000 CVE-2023-3643,0,0,4c1df1608263cc8030549995e896fb08abe219509705e692121442256d47635d,2024-11-21T08:17:44.260000 -CVE-2023-36431,0,0,46437c1e60896885876e5223939efc9353da75532b8fcc3e0b198a28dfb82e3c,2024-12-12T01:24:41.270000 +CVE-2023-36431,0,1,9aa1566135a7654a267ed9e585291d08b3cb066d8357fcd4ca0e566adafaa93f,2024-12-12T01:24:41.270000 CVE-2023-36433,0,0,044d052bd3a0dfa762cb10da5592c4d4ca08a3484a56f6d3628ea7646e68f2b4,2024-11-21T08:09:44.217000 -CVE-2023-36434,0,0,2436ddc9ccc1e43d093eed39451f0cf61aa3f639957f6d63329e407b1f2f479e,2024-11-21T08:09:44.313000 -CVE-2023-36435,0,0,33ae0ee2d2cb90ce0bd2ba75e5c8f2f638df49358ef6797634e4ab932d15e648,2024-11-21T08:09:44.447000 -CVE-2023-36436,0,0,9b9e7289da17617adde81d0db3f73fead29738b05bc3281f9089de6838bdd159,2024-11-21T08:09:44.557000 +CVE-2023-36434,0,1,0eafe32f1c032f5f5e7c75e622076df7be65ae6e423f02ead2bf37aa3ec6de6b,2024-11-21T08:09:44.313000 +CVE-2023-36435,0,1,bbe2e78eeb1b64b9a57431295ac5f742f0ba71286fa874873874a0ad06c14817,2024-11-21T08:09:44.447000 +CVE-2023-36436,0,1,7bc3a2e3ad38eef5a12cc4dbe044e13e66bd9c77384f84012a8177992285b3a6,2024-11-21T08:09:44.557000 CVE-2023-36437,0,0,ff454ae92511c7cae9f15e97d403dfe2a9d6c579df1a0e0bf8c6a45efe0bfbda,2024-11-21T08:09:44.687000 -CVE-2023-36438,0,0,dcaa3d94c08f0e64b88f260434ca4cb4110014d83e0ecc8b251ff7a7b6d9ebfc,2024-11-21T08:09:44.793000 +CVE-2023-36438,0,1,4347849fc3c1996f9c36dedb905a93cdaf723953dc72404a9a52d21c24caca50,2024-11-21T08:09:44.793000 CVE-2023-36439,0,0,55c07004afb8c24dbd6110c08d98a1412081bacd50dd0337136b779f8d187d61,2024-11-21T08:09:44.923000 CVE-2023-3644,0,0,21bd58b788ec322d244a04961f1d56052775b3a653a6327359d3d888833466f2,2024-11-21T08:17:44.413000 CVE-2023-3645,0,0,5bf31b3c3356c26d882d59ff30218467168df018ffad2342056c4420f3fd4aac,2024-11-21T08:17:44.560000 @@ -228201,51 +228202,51 @@ CVE-2023-36553,0,0,ccb5948b6003ccc1d7e4677301ab0e4fbe1f9c909b4c7fb74b0f08479baef CVE-2023-36554,0,0,233040b66c216587906c824e5c912e20e4c07ccbf4f5dbe351bac0530efe11f6,2024-11-21T08:09:55.333000 CVE-2023-36555,0,0,77e8002980dd5279b1eab2a2d9647a74a358b30c4e4ab4e57de272e345903b32,2024-11-21T08:09:55.470000 CVE-2023-36556,0,0,ad32053ae9687fead556e8963218c218f451b3bbb938a9df9f5e3df7c0d77d41,2024-11-21T08:09:55.593000 -CVE-2023-36557,0,0,e5e45397062c529b2e1d349468a8b0c8c676736db5f94a6aac399a3f29814fb8,2024-11-21T08:09:55.717000 +CVE-2023-36557,0,1,6865cba0e6a8115b36ee4277cf9f680688686bd4d4b691c3b4bdc0ffc1f4badd,2024-11-21T08:09:55.717000 CVE-2023-36558,0,0,fad343469e5193fe0ea5c39af394bd4d44905caa620c0211308f767acf6da65a,2025-01-01T03:15:20.607000 CVE-2023-36559,0,0,69e20d2b6605b9d93f7f219805595123d47e84117612456947dd9003b9e47d8d,2024-12-12T01:24:47.080000 CVE-2023-3656,0,0,f930570918774958aa46e1f6bfca82256000c3ab197bcebee6918dccb4f1fa30,2024-11-21T08:17:46.130000 CVE-2023-36560,0,0,da816317c751ee57919ebac64ce332d4d30ef1436a3dcdf3c6a3093b110c2240,2024-11-21T08:09:56.103000 CVE-2023-36561,0,0,4ba8b597a417127094fee0349e109a05e685c72cfd62834f9412d306cbf18fb4,2024-11-21T08:09:56.273000 -CVE-2023-36562,0,0,a621685cd2955bb4cbe24b9750ed4408e1dc9780209bf07404d85f63cfc3b628,2025-01-01T02:16:04.990000 +CVE-2023-36562,0,1,2d0663f506c08f6d60121d28b5e7f7ddf287957391ad2550953de143fe659e6c,2025-01-01T02:16:04.990000 CVE-2023-36563,0,0,00ed61e9445cc8189090044ac6401e1041607b58872239a39bd2c48d0916969c,2024-11-21T08:09:56.537000 -CVE-2023-36564,0,0,e10ccb65603c5f60092f119dc511b8e6c4eac05bb5681cfba284736ac08eb221,2024-11-21T08:09:56.737000 +CVE-2023-36564,0,1,c5967239384963828aafb70a1d302aba48cfff61d85ee6e1d9bc5ca0e4ce8916,2024-11-21T08:09:56.737000 CVE-2023-36565,0,0,d69016aee0ac6d9c8cfb446934e067ae10ba3e94b9d318759f4243fbf9bf5723,2024-11-21T08:09:56.903000 CVE-2023-36566,0,0,0532ced63dda4791fea6c3f4a039c3872b4ab90c4aa3ffc97eeb9085799fc4c2,2024-11-21T08:09:57.040000 -CVE-2023-36567,0,0,6817a2af7d99400d35f155793ed3cd0de217ee6c52791a0d0805237a276e66e5,2024-11-21T08:09:57.173000 +CVE-2023-36567,0,1,90dd6c86dcaf7aa52885a963a7772ec9df8849054e39553e70bf4f20b7d7d096,2024-11-21T08:09:57.173000 CVE-2023-36568,0,0,da0a43b72f15e7c15f54813da9f5228e0916be206987c7408ad21521b93105bb,2024-11-21T08:09:57.340000 CVE-2023-36569,0,0,7faad834a6053ff7a536b66904deca5a38fe7e7944263995c7b8feed6f0c6424,2024-11-21T08:09:57.470000 CVE-2023-3657,0,0,4f568d65bba5d62a7bab42f452d7d96d81fee35c105b734b0fae95ec37042221,2024-11-21T08:17:46.270000 -CVE-2023-36570,0,0,06991787174767a5e88a4341650610e6078e8e017831e2345b82644bc3715857,2024-11-21T08:09:57.600000 -CVE-2023-36571,0,0,f47e7c74ef26a72dd77c8ecefbe70151268b566186d50206b6c4881e3776cf95,2024-11-21T08:09:57.747000 -CVE-2023-36572,0,0,6ab4fc207c81eaa2c3754015a2977edd3a40fac93e00d90ad62d5877650b7478,2024-11-21T08:09:57.887000 -CVE-2023-36573,0,0,1d40b361c1d1f38bd449800c1c023c7fc7a36b41a21f3fa781eb9624b7dd4d03,2024-11-21T08:09:58.030000 -CVE-2023-36574,0,0,7e6451cd4c666c50b867801818a7ceceac11e3621c1ad47eecc610adfc52ef9b,2024-11-21T08:09:58.177000 -CVE-2023-36575,0,0,5d8b38d09d4fba99855394f681c4167b2d9d9a96102b316d090a98beea42751f,2024-11-21T08:09:58.320000 -CVE-2023-36576,0,0,5fb8af0cca87fd2256d4d6d3dd23e8f3e78a2619ee5994e552443fc5913d712f,2024-12-12T01:24:49.650000 -CVE-2023-36577,0,0,0dfe2cdc688b470fb4149d96fc3c0f60086f235ebec3d732965651666fed1fac,2024-11-21T08:09:58.613000 -CVE-2023-36578,0,0,97cba745af7aa1a963d2fd2d7a1598aa7f410c496a73855e6fb078b3e1a6e194,2024-11-21T08:09:58.770000 -CVE-2023-36579,0,0,9db373cb9650d90e994e84bb77785709325f48277cc55705979a36add041705c,2024-12-12T01:24:50.247000 +CVE-2023-36570,0,1,94a34979974b7c28d79d149aa969638076406f4db3427d80ae922eb8bee76959,2024-11-21T08:09:57.600000 +CVE-2023-36571,0,1,5e76bf4a0d29edf502b3739e413501d7c2df511e7b6f24a0b118c548f1f30f82,2024-11-21T08:09:57.747000 +CVE-2023-36572,0,1,eb3066fa46f1cdb576b5ddca55cfe6b0160d263be0a4753c868ffb717be27ac8,2024-11-21T08:09:57.887000 +CVE-2023-36573,0,1,09a7d77b39a55c06df1f7d7299708ffa2d50344b42b6a1db80f6984be839c5c2,2024-11-21T08:09:58.030000 +CVE-2023-36574,0,1,56c216f141ed7273e3aea477eba8f7a7903319c571b3db8435b8d52672401fbc,2024-11-21T08:09:58.177000 +CVE-2023-36575,0,1,51302a868fdff18097a8a73acab10d3e6e50ad1c86ab2048fe9f1b891093317b,2024-11-21T08:09:58.320000 +CVE-2023-36576,0,1,08a86ff3faebdb619f94c5c219b23dee9d749bd6eb6bc5c9fce64eade6793407,2024-12-12T01:24:49.650000 +CVE-2023-36577,0,1,e50aeafe79c861d091e7057a4e84c858e731c6a359aa0fa9fd6f18815c5b1164,2024-11-21T08:09:58.613000 +CVE-2023-36578,0,1,0ff8143c5a5c65144cb69b60fefece7fa8ae33ca61d56f8d26ec4eddd5eee6b6,2024-11-21T08:09:58.770000 +CVE-2023-36579,0,1,608c5a8eaa22d55e4a6c224060c2cd0a840c1cba53d6d32a266b7c93b44143fb,2024-12-12T01:24:50.247000 CVE-2023-3658,0,0,ec5f03be4eca8fd20383389dae278dbb7876f77e4fbe350e8a8c4e6ecacc70e6,2024-11-21T08:17:46.420000 -CVE-2023-36581,0,0,038266ce2e7ce60ae77739f4585d3065136584591f5032528f12d26fba11bb30,2024-12-12T01:24:50.473000 -CVE-2023-36582,0,0,1ffe06c6fd212812255834c10ee51c33ec91cfe874e838adcfa44a7dd8271ceb,2024-11-21T08:09:59.247000 +CVE-2023-36581,0,1,90a68f019e5341f3c487224a76a62c0fef0f708b60a93804548008e2a8365f48,2024-12-12T01:24:50.473000 +CVE-2023-36582,0,1,17fa89a7fba58752482f8d60d13589452a956e1b0a95299a16c8963661bd30c3,2024-11-21T08:09:59.247000 CVE-2023-36583,0,0,16c68d118ea57336250d71f3b0e590b09e39662e96b8c1bbb32d494d1ce6430a,2024-11-21T08:09:59.397000 -CVE-2023-36584,0,0,1a5ce4c004be36b942fa9069a53df592ac18172a4a87a5cb6429974a9f820454,2024-11-21T08:09:59.547000 -CVE-2023-36585,0,0,7925c315321fd15e53af6f19a10a8fe572a59206df9d86537d283460e16c1d77,2024-11-21T08:09:59.697000 -CVE-2023-36589,0,0,50e6f0767cf262ba5c2e4863654a60ee7b4b3eb33caf156ed46cd938a37c2c00,2024-11-21T08:09:59.857000 +CVE-2023-36584,0,1,3b386da0a297647fc5b9404038a4735b34c191f2cc6720119e6b149bdcbcf9fa,2024-11-21T08:09:59.547000 +CVE-2023-36585,0,1,aa6dab025f0475d1f60107ce87c0282cc6c4275369a40ec076b1a78d56d9470b,2024-11-21T08:09:59.697000 +CVE-2023-36589,0,1,86e100af68ccfb919c9d563d47fc4d37445228bf0cb9d7237455ea0462c11992,2024-11-21T08:09:59.857000 CVE-2023-3659,0,0,1b0398df8752a9e92b7411b7d875ed8f28fb4e8b2899d12a885f36a2733c90b3,2024-11-21T08:17:46.570000 -CVE-2023-36590,0,0,c3f2cd2938d8110acb2ddd5abd53c3ddde34a4fe086408c5de44b679a6864d1b,2024-11-21T08:10:00 -CVE-2023-36591,0,0,69d52e4f17d4b835d02b50ea1fcbab8d2a9db87e6401121dde934c88f1b35642,2024-11-21T08:10:00.150000 -CVE-2023-36592,0,0,54490c1cc36423532a7dd308ccde1985cdc38fc981302f910e1bd5ec19795ae7,2024-11-21T08:10:00.327000 +CVE-2023-36590,0,1,9ba231c5c0d820edd3a1004cf461398ffd81efdcd1c1746d9798e134a83cc054,2024-11-21T08:10:00 +CVE-2023-36591,0,1,e8e1cfca6f725fcd0fe353c3d453ad54f9e9516851ec45c5e1e47cf50cdd4e21,2024-11-21T08:10:00.150000 +CVE-2023-36592,0,1,c96fd29bc1500f942dd9f0d2084b023ee8b7a4bf1a22e899d8be80ac09af8166,2024-11-21T08:10:00.327000 CVE-2023-36593,0,0,8f092aab88642398752d78e4bec75756bf2a01f1327d687dd42ec3316dbcadb1,2024-11-21T08:10:00.567000 -CVE-2023-36594,0,0,77f202800b2c78e71361d9b6b9552da36106a0664bad98214202003a6b3b4d24,2024-11-21T08:10:00.800000 +CVE-2023-36594,0,1,ad71b61cfc8c350d7dfa4f0ea667fe77634aaa10562e45805a300a96ff554ce1,2024-11-21T08:10:00.800000 CVE-2023-36596,0,0,ccf16f9a1799ac121b0b73dcf1eebfe2f2e7d73b70cb2c3929077267f1287519,2024-11-21T08:10:01.037000 -CVE-2023-36598,0,0,581dee0774bdb23bfc9ae7b9f11d72de4582fbb9a07554d7c0e9fac49d79c759,2024-11-21T08:10:01.280000 +CVE-2023-36598,0,1,8b8c033c8e00ec7715a00e0ae948a8c2afb09ce34d7b5f6582aafc8847cc60d1,2024-11-21T08:10:01.280000 CVE-2023-3660,0,0,c8437846a3de8d24eb4fa9fb819ecd7a2fb7e8fd5a884a61c71549d104f4a827,2024-11-21T08:17:46.730000 -CVE-2023-36602,0,0,d932c0bbccfeeaa97a27d4616657f1a308bcf6cee686fa3683dc9760f47e5619,2024-11-21T08:10:01.510000 -CVE-2023-36603,0,0,6448d8b4bd16e1f9e87ea1f33e09cd5a58617eceb77ac92f43b69f288106cf31,2024-11-21T08:10:01.790000 +CVE-2023-36602,0,1,342c3248a27ba72f046792b417702f0b9687bd1eb072aac9cf712d7468c0cdd8,2024-11-21T08:10:01.510000 +CVE-2023-36603,0,1,c759c86fce76991f643696c60e802b2c706464b341d2aa04293abf0948f47d09,2024-11-21T08:10:01.790000 CVE-2023-36605,0,0,8880f7d1669b60b361143cbd88093eb950cdd4e178cd81385de2bd2d52f4dbc1,2024-11-21T08:10:02.040000 -CVE-2023-36606,0,0,a9c1fc156da27e86145c2f713046e334c420ee762b59ae2f211dacce104c754c,2024-12-12T01:24:53.040000 +CVE-2023-36606,0,1,300cec777a37d72ae2b0be8278017dcdcc77c83449f87be37c55c0e1db4297df,2024-12-12T01:24:53.040000 CVE-2023-36607,0,0,f11120acc4a3274bb9f632716f227d71ef5bb84f8d637bcc1efa87301e7cd4e3,2024-11-21T08:10:03.440000 CVE-2023-36608,0,0,f05d6a2c1afd2fb304b1a72cda180056170fe1992e5584eeeda1bd13afe68a0c,2024-11-21T08:10:03.653000 CVE-2023-36609,0,0,83c281d54e6d44d53442da715367df80f3ca256b02318a1aed0913cea8e5f349,2024-11-21T08:10:03.853000 @@ -228334,52 +228335,52 @@ CVE-2023-36692,0,0,a50eecb6209395d452b1a25aeb73915f56408cd164e6d18c043ab0f888a10 CVE-2023-36693,0,0,da852c320a778332b8c3582af9b2ae553b1964122d3656e35523be5313a8297f,2024-11-21T08:10:23.347000 CVE-2023-36694,0,0,4bf4b0dd012e52dc1a9cd5b9a195e05462dcdabde42ba2465d1cd0006ff3d1a4,2024-11-21T08:10:23.527000 CVE-2023-36695,0,0,94dd4ad750f32e7e5e9d7e2c263955d6ebd55507e7e3cb9088f624ddeac60131,2024-11-21T08:10:23.727000 -CVE-2023-36696,0,0,6d3f78a431cf789730c02cd0145c81983cc97beb93910dcda5c4324747e154ef,2024-11-21T08:10:23.920000 +CVE-2023-36696,0,1,ceeeb696fa1e0aeaf1d9a1ab9da4977350c26f37d95f0003fd148d7d67d11fa5,2024-11-21T08:10:23.920000 CVE-2023-36697,0,0,43e9790d418a4e6faf1020ee27d476c7a0c0804564c7cf59bca66ea41638eca4,2024-11-21T08:10:24.113000 CVE-2023-36698,0,0,3cd689f639230f024ab155106a874771c8f6bb8006ddaed81a9da7deba78ef77,2024-11-21T08:10:24.323000 CVE-2023-3670,0,0,694e15bb8cd50908e75580a80c917d903eb0fe78b7f93a80b64bf3a2f3dd8e04,2024-11-21T08:17:48.067000 -CVE-2023-36701,0,0,9b5d067c4139d11708feb2b767d74bf6353f4b6408a280d921c95df80d281403,2024-11-21T08:10:24.560000 -CVE-2023-36702,0,0,393cc5527f451649687dd2e6fcc2e4dc29cad04fcb63b76050f02b099f27e391,2024-11-21T08:10:24.780000 -CVE-2023-36703,0,0,f0169d54de12e9d975673f2c49a0027c6c4aa4d359a160abfc3f12918f911e6d,2024-11-21T08:10:24.980000 -CVE-2023-36704,0,0,5e3efd93796a336914ed7a60d65bd1638fbcd62c92419e1431e90285c7ddc13b,2024-11-21T08:10:25.130000 +CVE-2023-36701,0,1,184105cd1ec6f0788f4f807da3c0bd3f97fdc95758b89514f394f3e042be44d9,2024-11-21T08:10:24.560000 +CVE-2023-36702,0,1,4e7df8d538f939424367abeafbddf3fdf8397fc64c092da6230357645a43e74a,2024-11-21T08:10:24.780000 +CVE-2023-36703,0,1,092200a4fa48bfb934ec36f48ee95b9a46f30d492ba67f002e5a62d91bc10ac3,2024-11-21T08:10:24.980000 +CVE-2023-36704,0,1,3708e63066bff3942bc8946f1f07e72e8370ac5cb80bf9c73f35a5dd8abdbb5a,2024-11-21T08:10:25.130000 CVE-2023-36705,0,0,beaa245fd4fa27f8e8edbc69a067a3b8d66cf3f1f0621dfcfe36f66014cea781,2024-11-21T08:10:25.270000 -CVE-2023-36706,0,0,b0257a7d43993b7e9499f839d76dd3ea66bda146b6b9070b7d2c5bfd9031c63b,2024-11-21T08:10:25.437000 +CVE-2023-36706,0,1,ded4fb14deb0d32aa9210d6b9570c2967bb09b17a34f67f8243b2bff988ecafb,2024-11-21T08:10:25.437000 CVE-2023-36707,0,0,d253bb66309865c0ed6a31ab08c356f89165648a8242798bc6dfe621d41a1d73,2024-11-21T08:10:25.583000 -CVE-2023-36709,0,0,0a6a93bb2b7c5cb9147ffb1cc9b11c266557dc93e5da565985646419cd31b9cf,2024-11-21T08:10:25.750000 +CVE-2023-36709,0,1,fe0b525af5886d54e8f7ae3142fd95954a3f27eda61f614862f8438dc1998a91,2024-11-21T08:10:25.750000 CVE-2023-3671,0,0,3b40291ba0d0c41b459b9b1410e03d0e1d3a81ee986da3d5bb21274a82bf4739,2024-11-21T08:17:48.200000 -CVE-2023-36710,0,0,c6dadfcc47294d908545129f9763dbff00aaa6bfa9b3f54fc0ebc536510f52da,2024-11-21T08:10:25.893000 -CVE-2023-36711,0,0,b082598c2e841333818a307770dc5bb408f78888cb6efc30fe9a2769dbfda2b7,2024-11-21T08:10:26.050000 -CVE-2023-36712,0,0,93f0f5fb5583260a5c2a138e993a4987de4929290739c34481e5bbc5831aa7a0,2024-11-21T08:10:26.217000 -CVE-2023-36713,0,0,d0b66b8cddbb021b80bb4fdb1750f5fa7374aa1e78b25859413348d78c2f345b,2024-11-21T08:10:26.380000 -CVE-2023-36717,0,0,a743cbda0850c465adca6f254b9cccffb3a42721ef0d512979c299e6a55bbd90,2024-11-21T08:10:26.543000 -CVE-2023-36718,0,0,12a02042b141e84caa927903b7d61867e41b772b3f1f9aa799fff27aaad68644,2024-11-21T08:10:26.680000 -CVE-2023-36719,0,0,30de2f87d50986ba512bd3fd9001ce90f86ddd35d25920f5ca8125746f19cfed,2024-11-21T08:10:26.823000 +CVE-2023-36710,0,1,841b3825c0ff7e64c1c4c2ff8e9838a59bb14ef281ddecc42fe1fedc96b8881a,2024-11-21T08:10:25.893000 +CVE-2023-36711,0,1,d36987de973f0c2a52196b02be08792783ce06048b9accfe6b490601ee18b685,2024-11-21T08:10:26.050000 +CVE-2023-36712,0,1,a171c6360adf0d19b5d8db87284295dd1eb2bb11ea4ba1b005c0d0016178da63,2024-11-21T08:10:26.217000 +CVE-2023-36713,0,1,859f932df3fe5caa57d10e2f5a0fe7fb0abc2b2a39136aaa6cf39cfb189f4155,2024-11-21T08:10:26.380000 +CVE-2023-36717,0,1,a2dc69521bf271d2d274e3b90e53de6653a3339b09850007e61e78cbddf18af8,2024-11-21T08:10:26.543000 +CVE-2023-36718,0,1,fb6a7bfdf24f756300e36c3852ab264c97db4a52ca6a85825c41e2b6f05c6680,2024-11-21T08:10:26.680000 +CVE-2023-36719,0,1,cc449b368219bbd7afce9c75e780909fac4cd44d0c01f33917709595918d03de,2024-11-21T08:10:26.823000 CVE-2023-3672,0,0,a5914e0a89d7114a960dcea164372c3718fa96b5ad479d6e1b28c1170e5ead8f,2024-11-21T08:17:48.310000 -CVE-2023-36720,0,0,f14c5747c7ef018b4d7fce5ac927a77109bf68530954dcd7b6d0d5bb6720a577,2024-11-21T08:10:26.997000 -CVE-2023-36721,0,0,ac637f14d79b9633d19fe127fc3bd5a59524a5f03c40f8ed21b6d6ce9ec84e3a,2024-11-21T08:10:27.147000 -CVE-2023-36722,0,0,50588d9b8aeb6a0c9ef45c9b729f084d51992834034e10d4d81f3f28b033dc63,2024-11-21T08:10:27.320000 -CVE-2023-36723,0,0,b2aa71a9d409dcc8cfb05cef83f5180e334b3c5951bf0615e28775ff8dc2190b,2024-11-21T08:10:27.493000 -CVE-2023-36724,0,0,403cfd894df4e89aae27e01946571ec8c6ea5b95d48152d77fbbddb0ec0064cb,2024-11-21T08:10:27.633000 -CVE-2023-36725,0,0,8ef36fd1908d4a919e716d0f09e4cd46a44917ec39dd703a220c1221149f8104,2024-11-21T08:10:27.803000 -CVE-2023-36726,0,0,d87374b6b100fecf06729a46b3da9da17cc312fb62d5fff6c20eb2d8e07cd1f0,2024-11-21T08:10:27.937000 -CVE-2023-36727,0,0,8d0857d52159d7aab1a0ff26df3440b0e2cfa5671860d138bd695e298a125d95,2025-01-01T02:16:12.617000 +CVE-2023-36720,0,1,cedad55b3dcb528441dfc2a4f1bf9f02250525ddc86f3dc71148141f0b493d7c,2024-11-21T08:10:26.997000 +CVE-2023-36721,0,1,077807006656722c1454dbfb9f4ddde3702f949d086577acbc4e72d09dceae12,2024-11-21T08:10:27.147000 +CVE-2023-36722,0,1,8c3bc8b792c6056fc4b8092b0de6a68a78834d06e64c69aa7c014894df35217b,2024-11-21T08:10:27.320000 +CVE-2023-36723,0,1,ce2e8a5a9410162050928334f448b547cf3838dcc15734bd6b8366a47009b1c3,2024-11-21T08:10:27.493000 +CVE-2023-36724,0,1,27a5abe4c83d654794722c462d394aaf8282a4ce83f0b9cdc3c9f720a337ad3b,2024-11-21T08:10:27.633000 +CVE-2023-36725,0,1,a14599d6f72ea60577b56001e84e515808850a6b696589eef56f57dff8917da3,2024-11-21T08:10:27.803000 +CVE-2023-36726,0,1,b215ecfc24274170277d6f2fe50ade92db095126f6d0c40152f1ed23e19f7dc8,2024-11-21T08:10:27.937000 +CVE-2023-36727,0,1,145c2d87d07aefd492215146401756f55139453aeed626d1113632cde637ffd0,2025-01-01T02:16:12.617000 CVE-2023-36728,0,0,caa2e63799d67a8d5a352b6104bec533dfad13f4595d99620b37d750970711ff,2024-11-21T08:10:28.230000 -CVE-2023-36729,0,0,b5ded97fae7c8e02f8adba8450da82118ee67f0b9b2901bab0207f86637a05e0,2024-11-21T08:10:28.377000 +CVE-2023-36729,0,1,6509c903ce9b8a52fd6bc17cd861dd8a623400a2861f1220ce548564713b82ca,2024-11-21T08:10:28.377000 CVE-2023-3673,0,0,3c57457dd77c7572439bdafe8a62e2d1264ce377f07e343150ea921428f25006,2024-11-21T08:17:48.440000 CVE-2023-36730,0,0,2cf9149d4746981d9c98bc9e5528e0a4b32e5d03e0a11a596a75b126f547301f,2024-11-21T08:10:28.543000 -CVE-2023-36731,0,0,eed1686c03f0b66defa64662bb6e1a43fae15c2955b80b0c514badf0a8e64b41,2024-11-21T08:10:28.683000 -CVE-2023-36732,0,0,6a5cc831ee072196b8fa4b8ae2007be8e2adc8d5c63b15664e20bbd1ca943d2a,2024-11-21T08:10:28.840000 -CVE-2023-36735,0,0,84361e14dbeb98bbd54cb23799a10dd467ea882954c9f75af2a242fb44243aab,2025-01-01T02:16:13.360000 -CVE-2023-36736,0,0,d25a60e39f1bc16c4207f78a4ad5dcd53d3e87dbc3dbe42e28ffe30c0651a02b,2024-11-21T08:10:29.117000 +CVE-2023-36731,0,1,5db487d130980579eebdae85feb2da77fd5aa5d863f75e04da47ac43a0bdbac5,2024-11-21T08:10:28.683000 +CVE-2023-36732,0,1,1053cd588629447b108d57b1cb9e28517ed0e5a7322791dbd96c5c0c5b96e6f6,2024-11-21T08:10:28.840000 +CVE-2023-36735,0,1,21b73a25ec6bb24293b3a5f145c03b8755673e60cb48251806d889029d618155,2025-01-01T02:16:13.360000 +CVE-2023-36736,0,1,023f23be84c99358309d21eecba5744d1f12fff273a9f8cadfd924915e405e55,2024-11-21T08:10:29.117000 CVE-2023-36737,0,0,7c136861ddf2d730a6b66ad8aa764d1ca62fb2f1ec7f8d2b6b0233acd5eda149,2024-11-21T08:10:29.250000 -CVE-2023-36739,0,0,549a3afaec6cf2ca5e45a9723d0b932786e80c3aa512d7c1e43dd7316d19eb7d,2024-11-21T08:10:29.377000 +CVE-2023-36739,0,1,e28b80af813418a73ed4164402765edf140bba5a661d40f096126bde12a2900b,2024-11-21T08:10:29.377000 CVE-2023-3674,0,0,265dc80b4a7d04bd7b291eca4b1afcdf7c785231e49364df87c67136856a642c,2024-11-21T08:17:48.590000 -CVE-2023-36740,0,0,256360428df370818814dc9c81e413d4d363bd356a4f31d9bf47e3ea7d18ee8f,2024-11-21T08:10:29.500000 +CVE-2023-36740,0,1,8bc40eb0f7c078ee1e7f1998428d58843f5cd57870eefd674954f51991f80474,2024-11-21T08:10:29.500000 CVE-2023-36741,0,0,96027655237c2a4f2777118565e3624a3491ce361f694185c85071265c661451,2025-01-01T02:16:13.853000 -CVE-2023-36742,0,0,d769ab626f12e41471a3383dba0ce777c3ea911e44016ef0df8a06975fcdb44d,2024-11-21T08:10:29.770000 -CVE-2023-36743,0,0,cd0fc2dca4c807097418766f005f8853878105e4917bf77aad2286841a31a2f7,2024-11-21T08:10:29.893000 -CVE-2023-36744,0,0,5c730d101c5c7fc2dc8aabf2de38f871ccde1e6727fc2850d1105016c512facf,2024-11-21T08:10:30.040000 -CVE-2023-36745,0,0,db56d6c84a4d953cd29cc0972df35bdec25a31a519672e724feb6a18e82dbfb9,2024-11-21T08:10:30.180000 +CVE-2023-36742,0,1,183e55626d54d28b81aade8c5554febc63a6137a0bf743e7af5d0d417d099d24,2024-11-21T08:10:29.770000 +CVE-2023-36743,0,1,f363b6eff08693a0e9e03b6115e23bfe82de3c3b9e6959c7e7d21c3f6053227d,2024-11-21T08:10:29.893000 +CVE-2023-36744,0,1,4260afa76dacd360e7e5a20d1b27d25abd292acac875e89c4c0d88cddb486c6f,2024-11-21T08:10:30.040000 +CVE-2023-36745,0,1,51b7ce670886085eaf1ecbc2881f437a663166fb032addfbac5f92653c29a20c,2024-11-21T08:10:30.180000 CVE-2023-36746,0,0,6bf63d497ed95d648f047cccba6982a5cb0652aa3dfedecbd8587422a7fecb88,2024-11-21T08:10:30.307000 CVE-2023-36747,0,0,c7a3d967a58e546d89ec80b3167e7b11cad52ab16831cb60bbbcb88c3f1d9212,2024-11-21T08:10:30.450000 CVE-2023-36748,0,0,e95f12ecfde28cf8297b0a30231abed3f920a3f7553382a35a4131b985fa1c2a,2024-11-21T08:10:30.583000 @@ -228391,49 +228392,49 @@ CVE-2023-36752,0,0,68374e37be47d1b78bdc73e37aad34631515fe7e1b37388e4c694d52f90e8 CVE-2023-36753,0,0,9e0b84d5d5ecf8aec9dc9a3cf48a0e46ca588186b3d35231ce234d4a964da733,2024-11-21T08:10:31.393000 CVE-2023-36754,0,0,2a8dcaf6e5ddd0a3226f158f534c07f15e0e080b10460b7279c62a82380e5d3d,2024-11-21T08:10:31.540000 CVE-2023-36755,0,0,6641e8fea3274a37db6b1997166f581fe649ffc532ec57bf4de2864621eb9560,2024-11-21T08:10:31.700000 -CVE-2023-36756,0,0,07e5a1d3cf0b0a2577bbc4b8b8bdcca867400dd11b499e72b3d685eaeac46f0e,2024-11-21T08:10:31.880000 -CVE-2023-36757,0,0,128e619daa35b83cc45fdb2e4242fdbb4fbcb9f210abdbd91e050a094a6cb5fc,2024-11-21T08:10:32.037000 +CVE-2023-36756,0,1,7ad9d06bc1b3bb315a4f5fcd2fe3ac14f400371736d3f595f886033dc39f004b,2024-11-21T08:10:31.880000 +CVE-2023-36757,0,1,d483ec4faac60547dfb57748a5d1cbcfdd4e18c3a494e712a6b722adf5d2de4d,2024-11-21T08:10:32.037000 CVE-2023-36758,0,0,d326576b6d87b2419ceff5ee1f40ea4c6f8cce73c504d9fe9f28aaf4ae857382,2024-11-21T08:10:32.170000 -CVE-2023-36759,0,0,b24379579b30ac6812879d66a3eb0c3f59a7cf3e2e8877e4593bc9a12fe6e904,2024-11-21T08:10:32.297000 +CVE-2023-36759,0,1,896fa973dfa077cc262db8ec53f3139d4cb49aa0aed0503b06113cfbcce76928,2024-11-21T08:10:32.297000 CVE-2023-3676,0,0,f6211cfb6c11a0fb678749eeb24e19c9a54167f7cf79a127c8f41d6239346a8c,2024-11-21T08:17:48.880000 -CVE-2023-36760,0,0,ba62dce322eec66cb48b604cf8941e01cfc9f055578f14d6d06ca5947e82552b,2024-11-21T08:10:32.490000 +CVE-2023-36760,0,1,a1a77c8b5fcc926a905d84d323d1e5a8aeeded667c4cb2b9a69181f7e81f28ef,2024-11-21T08:10:32.490000 CVE-2023-36761,0,0,53bb128649e8e161a60997f26c1aa7a58a0c71bcefc3614fa03487eaab372d7e,2024-11-21T08:10:32.640000 -CVE-2023-36762,0,0,94ddb65d90cbe91cc8d5c81e86e4866a5fdd43b6994f593f4a2a34b73532103a,2024-11-21T08:10:32.803000 -CVE-2023-36763,0,0,6afddd07f1f04b7f82bdc7ca019b1b211acedeb8326e0f456235263a37c3525d,2024-11-21T08:10:32.950000 -CVE-2023-36764,0,0,90c993173b470d2ccdfb124bab880fae40044ff35747536639e09d77907be504,2024-11-21T08:10:33.093000 +CVE-2023-36762,0,1,f5fd95a5d08f20d5ae85bd9631cfbd0965edc93b6cc52ce4498eb321d2145d2c,2024-11-21T08:10:32.803000 +CVE-2023-36763,0,1,5364ed6a58fafc644960ec344dfef73a40722a0a225b905af08aa9ae55cb0e6e,2024-11-21T08:10:32.950000 +CVE-2023-36764,0,1,2ed2640c7f62092ee8e3d57add2be9f01422b7d7894f595bb2882a305c07e5fb,2024-11-21T08:10:33.093000 CVE-2023-36765,0,0,3191a1fb39c3c4453dfd567d075f44a6149e4e9cad4575596a6a302131518ca1,2024-11-21T08:10:33.233000 CVE-2023-36766,0,0,b491606b4cdd38b301692b20b38ff2037ff5470f6b1e501dc0a06e28ed5307dd,2024-11-21T08:10:33.383000 CVE-2023-36767,0,0,d04bf6dbd924cb1e0d6b2d73a38a14e57ac5c95e279b2ee207decf7d64aa2d3b,2024-11-21T08:10:33.637000 CVE-2023-36769,0,0,6d5adc7fe981b364eadc70e6463da15b975b2fd0d39a095b64f0fafa4375a1a5,2024-11-21T08:10:33.830000 CVE-2023-3677,0,0,8883509e11e66f80a8d05028e5910434f84099aa117660bd254b36accd606842,2024-11-21T08:17:49.027000 -CVE-2023-36770,0,0,4d963feec431c45ad3e1f3e0a777342a732d783db31cec56a9e9685dba4f28c9,2024-11-21T08:10:33.983000 -CVE-2023-36771,0,0,74810d0c0671f50261e09d9ea009b37fa204db56fbcc3a3d378aab9415c57d82,2024-11-21T08:10:34.140000 -CVE-2023-36772,0,0,845be00e4258a110e0e6edbb6076210364193a14237c0bf5805a72e13e291a5b,2024-11-21T08:10:34.303000 -CVE-2023-36773,0,0,02e2c1081f32d76c579fbb3a87847f40611bfd29dbdb8e5be10b989ebdd7cd49,2024-11-21T08:10:34.460000 -CVE-2023-36776,0,0,d46e12ec532f4dfed72fab5e9a49f4f85a6897f567bff6a82b364dc9e311c058,2024-11-21T08:10:34.670000 -CVE-2023-36777,0,0,06d105ac5cc3d3b7ef760813c9c00ab3001ace6aa5e6162e3263ee92cfe137bd,2024-11-21T08:10:34.863000 +CVE-2023-36770,0,1,467d593864e57dceffc567470c02994a6e903a233fcdf5f4b8648467fefde4d9,2024-11-21T08:10:33.983000 +CVE-2023-36771,0,1,fbac2e733ae477aafe656d885dfe7384f0830babee47268a31b87be83df9171e,2024-11-21T08:10:34.140000 +CVE-2023-36772,0,1,bc1c343c070f072e06ea3951a167a792bf47c658b6ab625c816afbb0f5ad43a0,2024-11-21T08:10:34.303000 +CVE-2023-36773,0,1,51b017a0f42ded73619de810db1cb2d9f26bab36ac77c149db10ef95d21c4a1a,2024-11-21T08:10:34.460000 +CVE-2023-36776,0,1,44b1b988b5a851722f87ef1a354d49ab549e6c2721dc6dc900493e5251436a37,2024-11-21T08:10:34.670000 +CVE-2023-36777,0,1,d46495883460559da4705ce94d53e380f5270572da728c6a9fd39dff505725e8,2024-11-21T08:10:34.863000 CVE-2023-36778,0,0,198b40f9329b169475ce98ef36d299fbc129350f9ba9154e0e741fd217a44be6,2024-11-21T08:10:35.043000 CVE-2023-3678,0,0,6f132375810e5162b2f6154fd116cc65d914ccebe35a90a11b9d698d7fd02ede,2024-11-21T08:17:49.173000 CVE-2023-36780,0,0,28df605b64f170c0e9c6a62e1dd1963e89907c87f71919b8bdf93132ff0b9e00,2024-11-21T08:10:35.203000 CVE-2023-36785,0,0,aac0a123c62ac29ce164967b8620fcbf4b32be9ac143b290ab682b333b2f5088,2024-11-21T08:10:35.350000 CVE-2023-36786,0,0,33d2a793a1a67777d9a805b549f9d4086f00af2a995afd0cc5d01a98333deea4,2024-11-21T08:10:35.520000 -CVE-2023-36787,0,0,3dea174edd1ac407e3cbf4c4a2e2af9296fc37be39e3b6a7671e316bf4c2163a,2025-01-01T02:16:19.053000 -CVE-2023-36788,0,0,8f7ebd79919be10722ac23029e7ce34bb89e839238ddc50f4fe637e613eb1fbc,2024-11-21T08:10:35.793000 +CVE-2023-36787,0,1,88f221f5651c5b06680e9411355d6e1ff0104a2ce11032b96e5b14d2f79b83d9,2025-01-01T02:16:19.053000 +CVE-2023-36788,0,1,e27f10cad010ad85dcb67d459041fd1800920da507e01cf83b5f02b4d8c7d116,2024-11-21T08:10:35.793000 CVE-2023-36789,0,0,2549408fb747f3e86da5661d5f22fcd6f8d4eda37ebb3262f7eeb18b7642dcb4,2024-11-21T08:10:35.950000 CVE-2023-3679,0,0,823dc27480cda956bade184345427d2611c9f1da6232e22a11c1fdf9eee0fdfe,2024-11-21T08:17:49.317000 -CVE-2023-36790,0,0,e81a0073ccd09c1ba82d712f5d2fbd495d8217c496a6eba07e26628448237095,2024-11-21T08:10:36.080000 -CVE-2023-36792,0,0,3c41a194ab80a27aa11b026ebde529c6d32d366021d46cac7641df080c316189,2024-11-21T08:10:36.220000 -CVE-2023-36793,0,0,925aaa25a19cc45381febb68884a330a570a5b47c7eedc633ff4f0704fd02a8b,2024-11-21T08:10:36.400000 -CVE-2023-36794,0,0,8fb2976c9ad80876d42ae23b475c6d31ecc6d8417cbfabf3dc5a877e800a5a08,2024-11-21T08:10:36.577000 -CVE-2023-36796,0,0,1cfe3c679ff3159bd998c70843dbd6e896afd842f177d8a58c8ee634266419c6,2024-11-21T08:10:36.770000 -CVE-2023-36799,0,0,cee729202ff8e05f2be10f286bbe5fb4bce13f4e71788ddd9cf1e61be269be64,2024-11-21T08:10:36.957000 +CVE-2023-36790,0,1,3957e2271bd06cf507c37d15643db2709dad04edf7b6293f4b76b22b25a0b777,2024-11-21T08:10:36.080000 +CVE-2023-36792,0,1,000b7112953a01b8298a6d9c80b1ce9df8594ea41cff6e81b5efa4fb59bd72f8,2024-11-21T08:10:36.220000 +CVE-2023-36793,0,1,46dd26c4de577f0b4f6117cb1f4ac75dd9b57d5fe26d2a0dcbd3bb43ab37e6ae,2024-11-21T08:10:36.400000 +CVE-2023-36794,0,1,f5348dbdaa1a6c027f367fdbe751609d08c275ac278ab42e662ad4a965f20ed1,2024-11-21T08:10:36.577000 +CVE-2023-36796,0,1,bd46054e216904dbaf20cf761721cc49a87e443e7db36865e1aa534a7eaee1c9,2024-11-21T08:10:36.770000 +CVE-2023-36799,0,1,fcf604f5a40409149065f63ad1967e675a441726ed0086516e5ac72321cf3b8a,2024-11-21T08:10:36.957000 CVE-2023-3680,0,0,455480171505ee1a9e38774a18e5ba69777e20947c28787293fb01f95144941f,2024-11-21T08:17:49.467000 CVE-2023-36800,0,0,4999d4e6ee0d82056b502b825877c20c8450ca5fe9650152334353cab65a2c97,2024-11-21T08:10:37.110000 -CVE-2023-36801,0,0,7c735d76387f457b4d352ec2fe3115cc1cbb0ee77cda3ba57335b85787fc2ecb,2024-11-21T08:10:37.253000 -CVE-2023-36802,0,0,f78a9007a58e3db2390b0a94bc59f923732b5ef3b1fea88b1236f8b3443e30d8,2024-11-21T08:10:37.410000 -CVE-2023-36803,0,0,5f17bfa0057029b7945f6929a180dd23f2aa411bb63ff219a95d882156ce62ed,2025-01-01T02:16:20.597000 -CVE-2023-36804,0,0,a5eacdaea5afcc1824cd2cc25a6b712520496565da8689f5133f208f648bb19e,2024-11-21T08:10:37.770000 -CVE-2023-36805,0,0,a02f07929d7503aff26708bd7cff20b4210f18db5fa13fcda9cc7d4f0b0b3f88,2024-11-21T08:10:37.930000 +CVE-2023-36801,0,1,2237963e3b90a59e82b4735fbe74f2c87e02c908d268d3908b857f8fb1af6948,2024-11-21T08:10:37.253000 +CVE-2023-36802,0,1,c5d04d171c1e2e06f41ba1ea22f1a375b834c97aaa9b1a57a4a30dfe5b4afc76,2024-11-21T08:10:37.410000 +CVE-2023-36803,0,1,2479d4889cca1eb8dbd61a47f7cdd147dfb4ccfacdad9b8770b2bcfbb11ee0b5,2025-01-01T02:16:20.597000 +CVE-2023-36804,0,1,3fa6041d1a0d6460c95c8adffd7cd1cdd9fe3018852a2e4774f59de2d276ddfd,2024-11-21T08:10:37.770000 +CVE-2023-36805,0,1,469b3460bd3ebfc27a43fff8c73d9a6af475a37acda50c03efd05056c2c1b630,2024-11-21T08:10:37.930000 CVE-2023-36806,0,0,c824511455c079aff82167dcee86f0056ca29b9f30e44c7c71c8032bbd65c635,2024-11-21T08:10:38.097000 CVE-2023-36807,0,0,33b8f0464952474f69988d3b1306bdf16091bd32bddaff31207d884164a46290,2024-11-21T08:10:38.247000 CVE-2023-36808,0,0,6b360670610b0fa229affa03ced63e1cdcac4e66d360dfde74c12293cd09272a,2024-11-21T08:10:38.380000 @@ -228494,56 +228495,56 @@ CVE-2023-36860,0,0,46222806932cddc3e928ad1dccce821b9a0a832e397f2a8eb2fd935490c78 CVE-2023-36861,0,0,c70d7e00785c17f33b98b39fba8c1cf7134b0ce5da0913d74373c49c8c94c617,2024-11-21T08:10:47.957000 CVE-2023-36862,0,0,ac2adddd2d1ab34453f05416764a2b264dbbc4e65664132ef45bef99e6c21509,2024-11-21T08:10:48.093000 CVE-2023-36864,0,0,de07d822e821786ed3d96eb1cbf75dbda5e4515f95ffd60f4f0355fcfb40fc0e,2024-11-21T08:10:48.230000 -CVE-2023-36865,0,0,cd34899cd709e38f523ede558b39a6c5ab75c788332476e81b8ff18db01fca81,2024-11-21T08:10:48.350000 -CVE-2023-36866,0,0,fa8f1f9b1658c74b36995e755483de2057a5b205bfe3818940c9d31b5b474271,2024-11-21T08:10:48.473000 -CVE-2023-36867,0,0,5b5d725c87f1b67a99e60a6a9970f0d1975101d5c25d87c6ee80e4638c076b15,2024-11-21T08:10:48.583000 -CVE-2023-36868,0,0,2c0190e0ba2720b2f4e5f2129065aa6e3d97d2ce88009de847aac3d98805eba9,2024-11-21T08:10:48.710000 -CVE-2023-36869,0,0,6def44dc6570774a929c556f252f7340b098ff0c128dd20d52493962cc823777,2024-11-21T08:10:48.833000 +CVE-2023-36865,0,1,8709858aaac89c86bbc7551404bd1b89a670995f5684a8c1e6f87ed25985a2ae,2024-11-21T08:10:48.350000 +CVE-2023-36866,0,1,71d24443b264c74d163d17f1f82f6cfe38900f5d815a5a6450984b0a6ec98935,2024-11-21T08:10:48.473000 +CVE-2023-36867,0,1,f9d8528796a64447ddefcfe3abd3d4cee5ea91a43a97ee34c2eef166e9132a0f,2024-11-21T08:10:48.583000 +CVE-2023-36868,0,1,64ee89ed1ff84e0be863cb32c30d6d11e46cb657d117b1c86e22081c90f473c6,2024-11-21T08:10:48.710000 +CVE-2023-36869,0,1,48beb25b0984562e12cbe99100fe6d74cc652875697cba702862613eaeb783bb,2024-11-21T08:10:48.833000 CVE-2023-3687,0,0,d94cceae8b3b60f4d6eb5ba30331fdfe4cf02ed52a6e8c2a71984f349da4e0f9,2024-11-21T08:17:50.493000 -CVE-2023-36871,0,0,526bb47f5482e44a962e3b7835c28a9e34d815a4f3fcd041f2a5c78d8b82b88a,2024-11-21T08:10:48.960000 -CVE-2023-36872,0,0,6bd4db39bbd8bc37e3af7e6819865ae3c4be24103105e447e391373a0582f1cd,2024-11-21T08:10:49.103000 +CVE-2023-36871,0,1,7baaa168f246a0200efc497f265b8cfe5523e6211d2299cd0e92315f4f54a97a,2024-11-21T08:10:48.960000 +CVE-2023-36872,0,1,91ba4f1f5b1b4cc06d166a93b21c65dc62d3de2c8128182baeae0e4b6e11f028,2024-11-21T08:10:49.103000 CVE-2023-36873,0,0,edb3e42e3422bcef8f44c5a7995b5ff19ef8450b3fc2102463a763d2374f8232,2024-11-21T08:10:49.237000 -CVE-2023-36874,0,0,bf7a327d876aa2c41528b84da498feeddc8489894709331dab223ae5e7d772df,2025-01-01T02:16:21.957000 -CVE-2023-36876,0,0,e1e6e4b3cc7130f4f292607b8762fd22a43b9f9880a2f99f411bd17a2b2f230f,2024-11-21T08:10:49.587000 -CVE-2023-36877,0,0,00e7d9af5544057879b130f41acf0c647cba3a97f9ee9f33454ea3a899e60a18,2024-11-21T08:10:49.720000 -CVE-2023-36878,0,0,f174baab7ae4b35467ede13c1b34e004f7233f008df459bed02f152b3f2413c6,2024-11-21T08:10:49.847000 +CVE-2023-36874,0,1,eec05345e595d1359f0a68ed4e182f434517cdcd35ce3fb46232d0ff79943434,2025-01-01T02:16:21.957000 +CVE-2023-36876,0,1,ed61e5dbcb92cf755524ae96b7c047369788e09c3161179bf24b3f97e2a0a660,2024-11-21T08:10:49.587000 +CVE-2023-36877,0,1,33b5a4c9241c186e244e7c8c9c7d729715ce934fc96064df9e0d88adce336fd0,2024-11-21T08:10:49.720000 +CVE-2023-36878,0,1,e5fa5b0ee7a1c069c4949c72084f08c4511315c29cc643f0999ae67e08082fd4,2024-11-21T08:10:49.847000 CVE-2023-3688,0,0,5fb0235848124d0ca2e69f9cddf5a22b5b970c3543d79e582d56c58aa3bfc5f5,2024-11-21T08:17:50.640000 -CVE-2023-36880,0,0,b2a3e5dfb84b5b811cb7f0ded2f0e6de5c24caeefa5d01610516108609de66d5,2025-01-01T03:15:21.520000 -CVE-2023-36881,0,0,ddae36ceb498b486ea6d084186e64cadb1769fb7b1c01fbce3a7e25fc44c269b,2024-11-21T08:10:50.090000 -CVE-2023-36882,0,0,1f04c49a75f021ffd6a2da93b47ca413bda83c5372a38d5471e12670e149eb52,2024-11-21T08:10:50.223000 -CVE-2023-36883,0,0,6ffae4575fa54399befb93b239ddf2f930c62710418faeefdda51157d5b7fd55,2024-11-21T08:10:50.363000 -CVE-2023-36884,0,0,28a58598c329501252516684907a02e15d483a664565e71ff9987ca1c221d567,2025-01-01T02:16:22.697000 +CVE-2023-36880,0,1,6b58bba983600a7c360b5b962803e7997d939ddbb9eac10bb632116cb03f0956,2025-01-01T03:15:21.520000 +CVE-2023-36881,0,1,ee6331d63c5bd22b02bd003c1b2796ed5a24b6383a3fb29762ca37a159d887db,2024-11-21T08:10:50.090000 +CVE-2023-36882,0,1,4459a20df4e535a2f2f9e1bdcbeff8a7a662c76140ddd20426310cfeb6b914aa,2024-11-21T08:10:50.223000 +CVE-2023-36883,0,1,4040db4a30a03aae750295f9760cb56367802abf8f23bde0d257dc32a689bf28,2024-11-21T08:10:50.363000 +CVE-2023-36884,0,1,8ffb89f75774eeedfdc38d872d515b92488dde462a9883bc8582caacdbe18ca7,2025-01-01T02:16:22.697000 CVE-2023-36886,0,0,7e68bc36f62d9e13deee73864578e0c6c386259e473819f67807d3c608101f6e,2024-11-21T08:10:50.650000 -CVE-2023-36887,0,0,5d4b42ac1a8100fb291303b510602e9149586535512eccd77cc1b4cb86939b81,2025-01-01T02:16:23.023000 -CVE-2023-36888,0,0,01e29739cc9cd62323506a4a291da6f50e8ffd0f7310090aa392ae8cb2fbb7f6,2024-11-21T08:10:50.910000 -CVE-2023-36889,0,0,8b1768139658a09d37693f5ea85d9aaf2c51ec3fbc122a83044d29a03088ff41,2024-11-21T08:10:51.037000 +CVE-2023-36887,0,1,023d72c61128f7fd56b2bfa340792c950f0b84f8067e8d9bd7a73a8a551828e1,2025-01-01T02:16:23.023000 +CVE-2023-36888,0,1,ddb7c0dc73a6fc7ea3ae92327dc697eebfd048c9132fdd76edcfd5b88325790d,2024-11-21T08:10:50.910000 +CVE-2023-36889,0,1,1dd3f55346001cb8090ff236c94967460371f64da8d7f980ef8984890769bcd4,2024-11-21T08:10:51.037000 CVE-2023-3689,0,0,3463794b80cec7dea229bc232b3b69e2af12bf6070a2a45b2a13d993bcdb0c61,2024-11-21T08:17:50.787000 -CVE-2023-36890,0,0,70d0c8878e2627b2c2a4c9d353f4d501202a6e900506ddd70b472d4472234d8a,2024-11-21T08:10:51.190000 -CVE-2023-36891,0,0,3874d790db895db39f60cbed3f0e206af20910482ba5fd4be5fbd59422cc07e3,2024-11-21T08:10:51.327000 -CVE-2023-36892,0,0,95c206463c62002f3d22c45e5050384492ac7ac121950639ceeda8d49b074884,2024-11-21T08:10:51.460000 -CVE-2023-36893,0,0,fd1d3239a07580becafed4e5c6b0e493f21408e9ed29135255095a1e0ffdd24f,2024-11-21T08:10:51.593000 -CVE-2023-36894,0,0,5bf52d651332c8a31c444885f59b2944ad5849ca8b352d7586c065d580e04e15,2024-11-21T08:10:51.730000 -CVE-2023-36895,0,0,689389982e699e2aca2555243f6af3b576da4d12dfeb258a6c3ce91ef3da3e55,2024-11-21T08:10:51.853000 -CVE-2023-36896,0,0,a34d0ff77bf08e5ec1c74cb72cb366563090c9ff5ed6e0d0b1481ae9df566615,2024-11-21T08:10:51.990000 +CVE-2023-36890,0,1,329c99568f2e68a4432ce2546b452f3a33514ce27c75d4ef338aa077312601c0,2024-11-21T08:10:51.190000 +CVE-2023-36891,0,1,14871eb0f8562437e89c313745ba844699ec0689cc2ad29870ba39db48dc4e35,2024-11-21T08:10:51.327000 +CVE-2023-36892,0,1,1d4290c3f10e03f142d63dd5b73af0df1051de1793cdf0e37c4b92cd96599ab5,2024-11-21T08:10:51.460000 +CVE-2023-36893,0,1,9c1cb0c01aea1f60445b339ce6d6405ed6d329335baedab29e6dfd84356929d3,2024-11-21T08:10:51.593000 +CVE-2023-36894,0,1,084077d449eab77efac4ba3c694257b7e96bc4819f322ad27a51e25690bf0409,2024-11-21T08:10:51.730000 +CVE-2023-36895,0,1,0eb63b8f7a33a5f4fed07b77d236fc1e6e4d1d33c4dfbc93e1393895463d13bc,2024-11-21T08:10:51.853000 +CVE-2023-36896,0,1,465313ed68ae2809aff2a772e6b88893dc12d9e2c53827b900b1a7a4b30fb1cd,2024-11-21T08:10:51.990000 CVE-2023-36897,0,0,68ea84cad1f81d98be05c22b48cd75d3e873c5e02672dcfd8b2e7469fd7bb0d3,2024-11-21T08:10:52.130000 -CVE-2023-36898,0,0,b6d436e0918b11baea6532cb56b4a1339a215e7c7aaf9fbb888214e4c8343104,2024-11-21T08:10:52.270000 +CVE-2023-36898,0,1,5e672e7b4bae6914d940bc4e625576c41ce33cee804778b866b5a9be81dfc20a,2024-11-21T08:10:52.270000 CVE-2023-36899,0,0,5605cedae67519c7e46be7f59a572792c74131700dd003f1a3bb8a1afd310b0f,2024-11-21T08:10:52.423000 CVE-2023-3690,0,0,8acd12ad993961757247bd6d77df57cfb170c455a20960c1aeaa702f2b804d88,2024-11-21T08:17:50.927000 -CVE-2023-36900,0,0,b236f47323a566ce56ec4a4545bccf21f0f2a1df1b0e0c2b5e1474bec546ae28,2024-11-21T08:10:52.600000 -CVE-2023-36902,0,0,5b11ba9f1621e73f7922cf7c14fa2bb253d1577f7885048c32b77a60cff4f494,2024-11-21T08:10:52.740000 +CVE-2023-36900,0,1,5d12e0fe03b03450a026aac07b183052c682f61ab0ef07a58c85dd3bf1e4686e,2024-11-21T08:10:52.600000 +CVE-2023-36902,0,1,117d5d986d9ba50ce902651cc5ef10c7c4c8cd4bfc56108e4c87880c125531df,2024-11-21T08:10:52.740000 CVE-2023-36903,0,0,8a4579bc524650084baf4dde23ff1a58cf5a604be41f864483ab36174f04421d,2024-11-21T08:10:52.873000 -CVE-2023-36904,0,0,c084585d29c397f4ce29f99cdca902290742dba4070fb8fb4e40cb04c0697d90,2024-11-21T08:10:53.067000 +CVE-2023-36904,0,1,2b7d9f53837f477aff99456a5bf46c7ee4b087e65d6a3fb5c03ff54eeeab9395,2024-11-21T08:10:53.067000 CVE-2023-36905,0,0,2fe1e9c89acaea7140db14b1d9d01276709e0fec261f6c8fa1e30346a8673fcf,2024-11-21T08:10:53.200000 CVE-2023-36906,0,0,62e480f32fc1617eead291e1227151e80a65541db7a00c64e89a0a036af4dc6e,2024-11-21T08:10:53.363000 CVE-2023-36907,0,0,1abe3b2644c0e73521f8dcb0009d35c4547802223bc1bf9e04d9d97de5c2f1e9,2024-11-21T08:10:53.530000 CVE-2023-36908,0,0,5ca16c9629aa0380767f54bedd0006f28c228526ae11cb086f6ab3b10dbbf472,2024-11-21T08:10:53.697000 -CVE-2023-36909,0,0,fedd428fa9f6f54ab0e18b4124ff160e59d8e65a5bc30ae4ce78288e95712d36,2025-01-01T02:16:25.510000 +CVE-2023-36909,0,1,5f04bc4ef5a845c908edc1f5f48e75a898aba5d1e0d0e93638894f5b81bff430,2025-01-01T02:16:25.510000 CVE-2023-3691,0,0,60350c4f301eada0a7783f0eeeee2d5b9ef61535365b7ae74be215edfd7c064b,2024-11-21T08:17:51.073000 -CVE-2023-36910,0,0,e3a5e38e90f7bea6fc7d2cc3754411ffcd18bfb0f6af44afb33eec766c663dbf,2024-11-21T08:10:54.027000 -CVE-2023-36911,0,0,4c34d040ae0cb85b30da50799071c1db3faa288b0a8ae253dc264a4445146d0f,2024-11-21T08:10:54.177000 -CVE-2023-36912,0,0,7f8639432a9df8492001081adbcfead10df11bb9d415fcaae4c5d0ca3421ffc4,2025-01-01T02:16:25.930000 +CVE-2023-36910,0,1,fc2dd6c3a08acfd89a8f8018af94f2a0a5a268deda74caab9d8428043483d0fb,2024-11-21T08:10:54.027000 +CVE-2023-36911,0,1,d7a28a8d44f07c15c1b644dd904f529d0682d3ef8655e6ff98f93570211ce079,2024-11-21T08:10:54.177000 +CVE-2023-36912,0,1,a60e91bebad0b9ecc5f394e5c63331a7a0462e5a152f7786b24d4adf39f9b324,2025-01-01T02:16:25.930000 CVE-2023-36913,0,0,d015aa35283bcda1f139254a07bc46b5d6d938fc68e6f28127e6a6a4b48c58cf,2024-11-21T08:10:54.473000 -CVE-2023-36914,0,0,4287cc77a3c6d0a5f61af95996d804441cc67a800837be47962c75dbf3f651ec,2024-11-21T08:10:54.647000 +CVE-2023-36914,0,1,be1c82451686266f4edba41b51235a126dc46d1401f18cc7eb2db6f6a189fd24,2024-11-21T08:10:54.647000 CVE-2023-36915,0,0,9005f5858a06de1a2401705f2b2774c941b0125582384a7b78fe54d6d1b59c11,2024-11-21T08:10:54.787000 CVE-2023-36916,0,0,1976e8ab6e349384c9303895c168005803bed4069ed200d87b7a2084242073e1,2024-11-21T08:10:54.923000 CVE-2023-36917,0,0,e615d6ac977f8d8ea3df31bd2ba93370b09cd2c9352b0d627beddcf2054601d1,2024-11-21T08:10:55.057000 @@ -228801,7 +228802,7 @@ CVE-2023-37324,0,0,fb54bbbb055d2bbab8e4b46713645a88427aeedfe5e03e65eb1c4516c0dd2 CVE-2023-37325,0,0,99aab0a6acc9cdc822435bab48cf8cd7d035a94418d98eb4dffc0e07b78a1383,2024-11-21T08:11:29.450000 CVE-2023-37326,0,0,de525f2fdb16627a55dff22c96a6e33e09849710cfa12ebeb6fe43f4059ef77e,2024-11-21T08:11:29.963000 CVE-2023-37327,0,0,fc1f7785ab6d270d7fbba1a6a44dd7aabf50a849305fbbf76a70408192b943e8,2024-12-17T15:42:36.890000 -CVE-2023-37328,0,0,6e5692df53743d7f8ef9a99e13a571263e9ff484cc552f0552cff27f03c6abe0,2024-12-17T15:42:51.507000 +CVE-2023-37328,0,1,3620e160fefd749a7fc7d21fb5efe0098433f43ef4082ebf680b56ff5f0b8e0e,2024-12-17T15:42:51.507000 CVE-2023-37329,0,0,8f983c9a0c9b5f5c500d003d1deb956b8113be5c578fc29f1d4f75957aba97e7,2024-12-17T15:40:41.947000 CVE-2023-3733,0,0,c8d368f9c0d4b99819dcf67ac2846be39784210bffb745ab8d538f2a3c7f5a3a,2024-11-21T08:17:56.433000 CVE-2023-37330,0,0,c32520b7f639bee2acb4b67749d5d368d3f9f3db710d825a8c66fbff5dafc9f2,2024-11-21T08:11:30.650000 @@ -228867,10 +228868,10 @@ CVE-2023-37392,0,0,5d384d02d8631121044e3a4a15b16f1d9a0f4a021dabe4d8bb61a797ed5b1 CVE-2023-37393,0,0,5f8f09fae8cdcb705f9690d0759ddda2b79a794e330faf4cfaec7caf2ec598cb,2024-11-21T08:11:38.303000 CVE-2023-37394,0,0,0338eb93ab89f059f3206d02bfc24033e086b6f86189917b378799b18d81fa05,2024-11-21T08:11:38.443000 CVE-2023-37395,0,0,ae2ea880c24ffda91fdf95fae1832230039bf46a7989dddf214f9ee098180f21,2025-01-07T21:10:50.467000 -CVE-2023-37396,0,0,d153f1aeffbef9dae43a5086d1ceff3df8243a40d5d453bcd9d77e66af9665bb,2024-12-19T15:40:24.690000 +CVE-2023-37396,0,1,3dd4be4cfa5e3ac695d22216f0156cb0e32135a72abe865fd68030e55032b284,2024-12-19T15:40:24.690000 CVE-2023-37397,0,0,495ea247e2c316b481151d70502bd709d1dab32c4174e2af8b8520a039b7ff2e,2024-11-21T08:11:38.713000 CVE-2023-3740,0,0,95c282366f230bbe869486165117092592fba41b4089df0587e4879cfea633c7,2024-11-21T08:17:57.383000 -CVE-2023-37400,0,0,be3704cb1104081f1dd220708905d6e5e97ae560bed0115a1e128e7cfcce3788,2024-12-19T15:41:42.607000 +CVE-2023-37400,0,1,f94e685742ec817d5407020ac26c99ac625870b02acacd04771125504e52e4e1,2024-12-19T15:41:42.607000 CVE-2023-37404,0,0,14062fbfb247d7eff73830bc3da8f5fe1a2fec40a3cca7bee10d3f475380647e,2024-11-21T08:11:39.010000 CVE-2023-37407,0,0,4d11a36e41fa3acc5f564431e82d0f4e97124ab39df0cb5f293ada9821e2cabb,2025-01-07T21:06:46.840000 CVE-2023-3741,0,0,1ddd4fff44ed6da7a38f77e1cd87d0e1a51a839bcb171f62bcdf113f89dbd961,2024-11-21T08:17:57.493000 @@ -229361,7 +229362,7 @@ CVE-2023-38032,0,0,aa2f8b2079aab5d644970a30e48ac48eb85abbd522684fe17754100401e0e CVE-2023-38033,0,0,4be9698fa9dd0cacdb62bf1057bd9da305a437591f9194cf06d595e16802d334,2024-11-21T08:12:42.970000 CVE-2023-38034,0,0,081598c8b55d3aa43e7d310ebcf31b7ec47c08b5aae01d60a9f9e55b7cdb47cc,2024-11-21T08:12:43.107000 CVE-2023-38035,0,0,92640fff4395ac24e8d5c20e07c44ab0e97351ee018b5491f08a52b994403d7f,2024-12-20T17:50:25.653000 -CVE-2023-38037,0,0,6f50a7b81bda83ab0fd48930ff66ff5f9ae9da70026068e83deb7513b37a2d2d,2025-01-09T22:15:27.647000 +CVE-2023-38037,0,1,618d4f10de44a3136a63b9e7e84b32604cfc7e3331af30b347f704cb184baf40,2025-01-09T22:15:27.647000 CVE-2023-38039,0,0,aa7b561d4c683a5cad232ce980133262e25984154771669a007453da54145604,2024-11-21T08:12:43.457000 CVE-2023-3804,0,0,f82e32f2db1263f9331724638e062f3a20087ab485797bbd9380b32670e68adc,2024-11-21T08:18:06.293000 CVE-2023-38040,0,0,50ded9b2062da33f47fa19ba0f8f6125ce0832d2b933587cab7df27c962ee968,2024-11-21T08:12:43.633000 @@ -229470,53 +229471,53 @@ CVE-2023-38135,0,0,a9eca0d1487abab7057a92f32328b56c514faa78c668f86dc1cd7bba91171 CVE-2023-38136,0,0,cc4955f78f48feea52a8ff9bece7ccf895118e79124cbc89767e10212b3e4ba9,2024-12-12T14:26:18.893000 CVE-2023-38137,0,0,1cec05d7be20edcda40f67c7c6ac8d770b26a8316863ab68482af52d2669688c,2024-02-14T18:15:45.880000 CVE-2023-38138,0,0,265118541aedab6ba410564980d475efb6b1cc3413d9a0d65fd07fdd99402bf9,2024-11-21T08:12:56.123000 -CVE-2023-38139,0,0,35defd568a07f8649c4d471f850efd55de4f9731902a44490a40a3b280fa8064,2025-01-01T02:16:26.357000 +CVE-2023-38139,0,1,28ae972bc6c292c9dd7822dd5342d5b1431b1b6fdb4601c453b88cb6d465c678,2025-01-01T02:16:26.357000 CVE-2023-3814,0,0,d40424dc5cdb442ffa10c4b530f9ec3fb4ff1303377698194d97909134cdaf65,2024-11-21T08:18:07.877000 -CVE-2023-38140,0,0,93f1b99079bd1d684e8dc5ecf5a3eb4610dad78333febe0f75aa9df792691a8d,2025-01-01T02:16:26.500000 -CVE-2023-38141,0,0,2dd99291e2c5f538582160bd35682cf0ed30c940be7be5870724e6115340a987,2025-01-01T02:16:26.637000 -CVE-2023-38142,0,0,c381e35b33e97254c67c39ca742793505769022a043d6111ccece7b62b484ed1,2024-11-21T08:12:56.763000 -CVE-2023-38143,0,0,794bd874bdf6406358d0b3a56f363ffc7a45156d3f2b409b9970953e970dd049,2024-11-21T08:12:56.930000 -CVE-2023-38144,0,0,bfc00335475d134f2721c1ac96d1ebe019b07f218685cd4fc9302ce7d314abc0,2024-11-21T08:12:57.097000 -CVE-2023-38146,0,0,d5ae3fb64f158f6b39249dd8e954f7f5a0920d611d5ab035e7a7f349706f9338,2025-01-01T02:16:27.247000 -CVE-2023-38147,0,0,7f53ec2dab44c21cb02acec1a0bf543bab91dd924b8c3c45af8653c5dd48f6ff,2024-11-21T08:12:57.397000 -CVE-2023-38148,0,0,0eccac4268d8a5c34b36b968c9a22b46f6097b13a7b6c6664d5cb3e0e8a6f035,2024-11-21T08:12:57.547000 -CVE-2023-38149,0,0,02824d2587869ba7a8fe0d0c3c8986e019171956e6df1ea043c636c3b129db68,2024-11-21T08:12:57.693000 +CVE-2023-38140,0,1,a34a747b89d3dcdfe8ad85324181d3e8f9bab543b4b57dbc3136d213216a9e4a,2025-01-01T02:16:26.500000 +CVE-2023-38141,0,1,738a18f3924c7c7a418c243d5f24cf5673e8b3034ee1e019b1313fe7e01db4d6,2025-01-01T02:16:26.637000 +CVE-2023-38142,0,1,884787762ba22e2f7aa32255c43142dea70f99b7c3aae4a90b5d62bc3dd70d25,2024-11-21T08:12:56.763000 +CVE-2023-38143,0,1,6f5e7c4b80a8f2ccf88dfd2325ff404766e195b177349fceebe51e29fc411bd2,2024-11-21T08:12:56.930000 +CVE-2023-38144,0,1,317a248ff474116e50494a1b6b2bf526d640ebe61d7da6ac7827e1253ccba743,2024-11-21T08:12:57.097000 +CVE-2023-38146,0,1,789d8d30273960ba331e83008afddef98fc3ea87c905e76b86b35c1189c7d612,2025-01-01T02:16:27.247000 +CVE-2023-38147,0,1,bad918abef08b834674ecfb830097c3b76f38d4f1e8e5ee664d467bf3331bb29,2024-11-21T08:12:57.397000 +CVE-2023-38148,0,1,eeb68f3b71b26b9298e5efa0601a98c70ee4c5e9795f460f076ea1637d96a1eb,2024-11-21T08:12:57.547000 +CVE-2023-38149,0,1,fcee1ceee701b529f81b3a890a4124097ae4f030dad262435f809505450cce7e,2024-11-21T08:12:57.693000 CVE-2023-3815,0,0,14c7828562e9c1b8d9652eb75cd10f9819d1d4d8f65787dd7645effe18612ca5,2024-11-21T08:18:08.007000 -CVE-2023-38150,0,0,c79a0e6c09da636d15a23410cdfdeec2e8ae94f3eedc5d23beaaf73722931cd3,2024-11-21T08:12:57.853000 +CVE-2023-38150,0,1,3b4ba243388f5bcdf27fc22944e3eaf3474f4ac12da017d4305bed9d90e6f329,2024-11-21T08:12:57.853000 CVE-2023-38151,0,0,bba41dc3121033acbfa77bd8da20a21d63ee60d2f36dea18640b942004979df1,2024-11-21T08:12:57.997000 -CVE-2023-38152,0,0,be7389386d150ecf2b255c20fd914140476b9f349bb3d18b1938f363da37a273,2024-11-21T08:12:58.127000 -CVE-2023-38154,0,0,be5e09d95766710cd77f05fec19dd880c1c1cb875450cdc20372fa464cc10dcf,2025-01-01T02:16:28.007000 +CVE-2023-38152,0,1,741bccbfa5949548b989dbf175ca6110f8b3d8918e295823f8f4790757300d83,2024-11-21T08:12:58.127000 +CVE-2023-38154,0,1,ece04d5ea2441d4dd593b0e23f14895bf56cf9391b57bd4936cbc9fd098346de,2025-01-01T02:16:28.007000 CVE-2023-38155,0,0,aba1254b93aa060c1b002473a6a0023d7e9510d26f726d9fe0d106c385f115ce,2024-11-21T08:12:58.437000 -CVE-2023-38156,0,0,31d761d3c650db5829ba59275cd8e1342e6bbfca153e5785075770f29f5637dd,2024-11-21T08:12:58.583000 -CVE-2023-38157,0,0,e8749af39a52d381f7459b61aeb084d9d3b0322191fd002ea33105cd576d6174,2024-11-21T08:12:58.713000 -CVE-2023-38158,0,0,5435592aa11c1f40302cf4a548edff6dbf6daad18f1eb5ab77dd1fccc98ce3a5,2024-11-21T08:12:58.837000 -CVE-2023-38159,0,0,ca305369a79efcbf368d0e9572c7f64845521e58f5ed4bf792a389f58c48a788,2024-11-21T08:12:58.960000 -CVE-2023-38160,0,0,b5f83363e00b05674d829e3653655f03f2cac1c15be579ec576d5459ac96bb19,2024-11-21T08:12:59.100000 -CVE-2023-38161,0,0,5d0b4e016d4b483665a763e3bb30ff7180917e5d37a223efbff25e19858de16f,2024-11-21T08:12:59.270000 -CVE-2023-38162,0,0,36e7dea6ba309666d9277415f34989f304040b9418c57f78dda817de1e5203b5,2024-11-21T08:12:59.427000 -CVE-2023-38163,0,0,77ad5db6216a5cafe347fd745d9c1b6d0bb98d5b0e8e4ea03f4ca762166de5bb,2024-11-21T08:12:59.580000 +CVE-2023-38156,0,1,51bacb16165725150d7179f1c6ba7a60857387d8947da33ad3d4fed359aae26c,2024-11-21T08:12:58.583000 +CVE-2023-38157,0,1,651c498515bcc3dff20a14eeb6b27f8ea09524bd6f55e027c5a88dd79df39fce,2024-11-21T08:12:58.713000 +CVE-2023-38158,0,1,f3f79f641b59bc303bd9d1b0715b56136cf2c3c55e2a8476221a15a2a828429b,2024-11-21T08:12:58.837000 +CVE-2023-38159,0,1,98e8cc2dacb18fb1b614f0b8b0817da70f2eb30b0c255fcc084552daa2f0110c,2024-11-21T08:12:58.960000 +CVE-2023-38160,0,1,53daefc1d1f2c654c6cd7896416e88506ea59f5c237c2bb92890e2cd6e714700,2024-11-21T08:12:59.100000 +CVE-2023-38161,0,1,425bbff8bdf397140af80aa5a1ca7762fa0f59e5f74436e3b4eac764ce24ca07,2024-11-21T08:12:59.270000 +CVE-2023-38162,0,1,fe50348239a5f74b25c79f82627d637e93bf11b77d23357d3ccd95d34c00f743,2024-11-21T08:12:59.427000 +CVE-2023-38163,0,1,363da4136b84e8e1abe889a9428310beef7b10519fb606bc68ad161a82ed409b,2024-11-21T08:12:59.580000 CVE-2023-38164,0,0,b7272feb2d8f466f2edbcef7a034330d03be1e6eaa8c2efb8b13596217bc271e,2024-11-21T08:12:59.707000 -CVE-2023-38166,0,0,d75b014127efead0d3aca796d4639db1924a8df65f503084c577de7c0bf93c8f,2024-11-21T08:12:59.850000 -CVE-2023-38167,0,0,f8111f1c99dc2dc5f0904e23dcc1fcd8a71d089e4e5041905dffc909151f8706,2025-01-01T02:16:29.490000 -CVE-2023-38169,0,0,7a56126b9aad382928bf25adc332eefa1f796b299889b5fae6f5ecc50ed77b0b,2024-11-21T08:13:00.150000 +CVE-2023-38166,0,1,22d30bb2f23cb486f0d5984b3f2641ad89ef9f1e411cdc1a8ba67a73854cd609,2024-11-21T08:12:59.850000 +CVE-2023-38167,0,1,794dea5028829fffab87eaf74dd65013baa0dcc38f6acb67ce26b6785411c5b1,2025-01-01T02:16:29.490000 +CVE-2023-38169,0,1,f6af7151aea1db5a7874af450a922bc04edb0e11329ed0632df67012e35d15a8,2024-11-21T08:13:00.150000 CVE-2023-3817,0,0,2def5a0837fc8052bc40dca5b0b65da4cf19d6372c881eaaacff6f92b1219bfd,2024-11-21T08:18:08.167000 -CVE-2023-38170,0,0,28859cd583dd24b9f9ab56882b3e560fe310188b6745c5d18eebf24bc2526fdf,2024-11-21T08:13:00.303000 -CVE-2023-38171,0,0,89c476b51edfa7edf1ade3e6396c73bc61cb9f07cd636677783d9dad39adfff9,2024-11-21T08:13:00.467000 -CVE-2023-38172,0,0,52ef55887f1b905e56f9f15504838c490e4097177646f20eb085b05367f0c7a2,2025-01-01T02:16:29.943000 -CVE-2023-38173,0,0,ea5c63805d8315b744fb588f5a90dd1d1af177c3bf523cc81653251a551f3190,2024-11-21T08:13:00.757000 -CVE-2023-38174,0,0,81fa6e93d38e290a74b992bfc2e02d20db9aaade90fccaa7301efce468e0eb96,2025-01-01T03:15:21.763000 -CVE-2023-38175,0,0,e4c1441ec49492f8cc46c81869c47e560b3a92f06b51a6f44ac6dee1bd84683f,2024-11-21T08:13:01.010000 -CVE-2023-38176,0,0,16472d13491a5946538eeb8fd355140f52a08130963d9c87dae73f6b9732b778,2024-11-21T08:13:01.133000 +CVE-2023-38170,0,1,ab6608018c2086627caece12bb829ac29b1e72b32e899b99184f429645ef8d50,2024-11-21T08:13:00.303000 +CVE-2023-38171,0,1,1d9971ce36d8e68d328048473d72c428d9ff1987304e61fc8f6bf8758182fc6e,2024-11-21T08:13:00.467000 +CVE-2023-38172,0,1,c03ceeec1921317baab0f5d33ac6ffbaaf6bd77cb8ddda3fffd24fc5a1c85f29,2025-01-01T02:16:29.943000 +CVE-2023-38173,0,1,de9202d21708a6da822dd9c2f35ec72f2a34306a1185acc0f223cd3ea6239b38,2024-11-21T08:13:00.757000 +CVE-2023-38174,0,1,58ab57eece21bd2f8f4943bc11407efa8a97b7b1460106cea2d4aaa7ceb9eafb,2025-01-01T03:15:21.763000 +CVE-2023-38175,0,1,ef1c8529b3657e2f66fcf0c37f671b4b6edc91494a166816094eac680db4dee7,2024-11-21T08:13:01.010000 +CVE-2023-38176,0,1,3fdc33ad178160a5c99abc1a3ac59e3e73fc42e8ab098f2163e13646e62e3b2c,2024-11-21T08:13:01.133000 CVE-2023-38177,0,0,730bcd01c82a54192a212d95053de3fec2969268787436a461567cb09272c10c,2024-11-21T08:13:01.270000 -CVE-2023-38178,0,0,b34316d492b0a2e39c62f944a02174f2e9bcbb9b1f43d3f2ccb6e78a4c7543c2,2024-11-21T08:13:01.407000 -CVE-2023-38180,0,0,cf9ee3eb05be00fe028ddd7163999dccafbbf18856c3c45a4a73e172fa20684b,2025-01-01T02:16:30.463000 -CVE-2023-38181,0,0,227fc59d0d9e9eed52e8859ab95410b7a011b4391b2923ab5ceff7c809e48ed8,2024-11-21T08:13:01.720000 -CVE-2023-38182,0,0,665711a32b5a041d72c83ddf64fe0b358ced96f3c61abf17f89a0586d0147e2e,2024-11-21T08:13:01.853000 -CVE-2023-38184,0,0,587f57aa70c6399d3f28abfa5489317b8231b8bf95e9d2095ee983e6731dca2a,2024-11-21T08:13:01.980000 -CVE-2023-38185,0,0,60a2644d906491fabe11fc65a9de4049e341aee078e95402d1c3786a3f138f4f,2024-11-21T08:13:02.147000 +CVE-2023-38178,0,1,7c75f8662268ca89daf277bec3375208706881a79c0c88533a7f4fd2922ae19d,2024-11-21T08:13:01.407000 +CVE-2023-38180,0,1,c702e3a96f30f6ce3af10e61eacce90e0c46f3c846980d43ffc4d909173112ea,2025-01-01T02:16:30.463000 +CVE-2023-38181,0,1,5a8b679495a586462dbde9c3056012cf04f2dc6c5625ddc2c0a5b368831d71af,2024-11-21T08:13:01.720000 +CVE-2023-38182,0,1,4d4a59af220c252b63fea8ea60f7e53085011cf3820ea3ee0c3d6c02139ee575,2024-11-21T08:13:01.853000 +CVE-2023-38184,0,1,8041243a4a2b4032f9464c8d84f0fc87c8a2d1f56ecf4620773160e63efc0f4a,2024-11-21T08:13:01.980000 +CVE-2023-38185,0,1,a896db1f9cd601b250fb437f388d78427d68869ccd41cfed4d1746d209d422a5,2024-11-21T08:13:02.147000 CVE-2023-38186,0,0,a26d63342c786f02f0f9b245c99ef8053d9804dc14ae758f614053dde58989c1,2024-11-21T08:13:02.270000 -CVE-2023-38187,0,0,c0aaa04513ba280ddeafcce5f70fa7188ddca04f66dbd279abfc9dd48ca7a6da,2024-11-21T08:13:02.403000 -CVE-2023-38188,0,0,8edbb24d0304869fc837692589a8d5ff01a897a8848a93ed20c1511f221a9788,2024-11-21T08:13:02.520000 +CVE-2023-38187,0,1,f8d470b205d24d51d2c2c0f30db7c8b1442a888ee066dc5e65df6de4d0703432,2024-11-21T08:13:02.403000 +CVE-2023-38188,0,1,26b96d88b207aabfec3486123dd721973347f93e7ecfc580763e11f91fa6cb47,2024-11-21T08:13:02.520000 CVE-2023-3819,0,0,1feaa31076019ed4aac12d690f8a6d61ad646f9c397a46d2bc6b63c68c2782de,2024-11-21T08:18:08.360000 CVE-2023-38190,0,0,247462562dbb49a297fdc6138ad19cd54122ecffd2c68d5b802461d7aea8511a,2024-11-21T08:13:02.653000 CVE-2023-38191,0,0,d83050c0727812a09b705e6e85b3ea63f96f01bafc6cb8381f2b2e279ea36281,2024-11-21T08:13:02.830000 @@ -229586,7 +229587,7 @@ CVE-2023-38250,0,0,726344ab64f9d6058fef4884cdb157333c12e197bccb986667069622eb959 CVE-2023-38251,0,0,b466e77f2af83b568be907bb2a42533bf079136a48719b40805408cfe0c14a9e,2024-11-21T08:13:11.070000 CVE-2023-38252,0,0,67208460ce39f033b483cbb74a7f822c45a5462ae8e1230f9b58e99c245fd480,2024-11-21T08:13:11.213000 CVE-2023-38253,0,0,e53959f5adc723fe391b52ed9e18587f35ec27aa7c9615ee09ece2a3559d1c71,2024-11-21T08:13:11.373000 -CVE-2023-38254,0,0,9ee0262590b1e9461866ec91f43833d932e5a5b1e47dd0230db78d8a82566dbd,2025-01-01T02:16:31.407000 +CVE-2023-38254,0,1,8c399c9c94746918a4be63e41d04746ce0345967dcd55219c8a85761a3e98979,2025-01-01T02:16:31.407000 CVE-2023-38255,0,0,dc0218234a588804481df0d11b3d017cd8b71a22a1022267d30ba44061dc1f69,2024-11-21T08:13:11.683000 CVE-2023-38256,0,0,5f5da441df82e985e7518e528fa43a02ec158e5ff13a79a1e3697622a4382688,2024-11-21T08:13:11.827000 CVE-2023-38257,0,0,09d27492b5a9015c6faf62de453ab30551289fe6c5a01aabfd73be462e45e98b,2024-11-21T08:13:11.957000 @@ -229677,7 +229678,7 @@ CVE-2023-38354,0,0,f5cde87e3c7b98d58bf876487a7728b646612c3eb695eb404edb05c311f24 CVE-2023-38355,0,0,aefb6017015b97b8fa80021bf49d8e84fec6279927899b762f61d9c0b8ab7631,2024-11-21T08:13:24.257000 CVE-2023-38356,0,0,f12d63f114b9597a741e147d04baeda414226256adf5e65851fdad50e811da05,2024-11-21T08:13:24.403000 CVE-2023-38357,0,0,3f5d7a5fbfcf76d163273a9a6775b5595ecc31ad32c5692b81055f402a613177,2024-11-21T08:13:24.547000 -CVE-2023-38359,0,0,2cc3d7177758a63f58358cc629f055a288bd166f6f79c9c65da1bba1293d3416,2024-12-17T18:55:23.353000 +CVE-2023-38359,0,1,96b1bbab8cf0763a41e9cab23235b7ddf028d4946a526bc1d475c87e4fb2c119,2024-12-17T18:55:23.353000 CVE-2023-3836,0,0,b938497c6283f522cfc6f320c334e7b21510c79dccb6b10b70b8bb7e99acad20,2024-11-21T08:18:10.880000 CVE-2023-38360,0,0,1c7da5c7700ad7488c7900db95772c5a2624c05e141bdc9ba48d2000106a4c81,2025-01-07T21:23:43.017000 CVE-2023-38361,0,0,5646b0dc24d6ba6ae916f311ff7d533fa4bb30c1b1c8f75f4f9f318ff84a8186,2024-11-21T08:13:24.947000 @@ -230950,7 +230951,7 @@ CVE-2023-39987,0,0,ec7b27858488ad489b9493d29969ba367ac6668558c5ffac734951051d609 CVE-2023-39988,0,0,402c42ea155cdcf9f869ed39cfb2bbf84c23e49800ae97d41b93e428e0ea4bde,2024-11-21T08:16:11.510000 CVE-2023-39989,0,0,726f571ee9bcf5dc47f2c24a51abc27b099f3763e764b9376d48d987eb90930d,2024-11-21T08:16:11.640000 CVE-2023-3999,0,0,e82adc70575076927945c28ec9abdcb884177ca58c4faef374d14bbf4ef780e1,2024-11-21T08:18:29.967000 -CVE-2023-39990,0,0,96b3587e2639b0320f00b87a8cc50919203ae4a02f8af8e55b47aeddfc4afc71,2024-11-21T08:16:11.787000 +CVE-2023-39990,0,1,a4c78890b67a79b9fc139f27febe92aaced711c38be1b74f2baf6ae2267a9427,2024-11-21T08:16:11.787000 CVE-2023-39991,0,0,74a383be9c4ebbeb72cb131d996b41f84dd1c8560e8c672b2e4694a32709fa2f,2024-11-21T08:16:11.923000 CVE-2023-39992,0,0,7ee9edbf56e39b17fe5662eaa21a6513fdaf7509e9723465071698fc41ff63a9,2024-11-21T08:16:12.073000 CVE-2023-39993,0,0,19bd25bb54abc9b1368859dc49e312bb28d2c35700f33dfb536d772530b61a4a,2024-11-21T08:16:12.203000 @@ -231400,9 +231401,9 @@ CVE-2023-40470,0,0,8b1f239bf46a6e8f2362a4e6511f8659de39b41590b74dee9a88ac9c6e40d CVE-2023-40471,0,0,88efadc595745ddee1aea5adadf0833258c6cba146371900073ebafefbfca08e,2024-11-21T08:19:32.210000 CVE-2023-40472,0,0,0adbf1c477a1ef53edb98808bde86cf13ff8a99c1e3805e904e403660e189560,2024-11-21T08:19:32.353000 CVE-2023-40473,0,0,a23211ba148c614bd8169e57c27de9ece0d97e6aa6265bbae1c38f20a73bf7c8,2024-11-21T08:19:32.490000 -CVE-2023-40474,0,0,8bcf31ee98703f6fc473b5b6ae72ea5932cd0d7a0edeb156d4f8a182ea3c78ac,2024-12-17T15:36:32.940000 -CVE-2023-40475,0,0,e7d21de9d238e03b562bffb12dea4211af06c007f197e91c21580975c3001720,2024-12-17T15:36:49.790000 -CVE-2023-40476,0,0,11996ceeadcf3af41b049e3465605bce8a16f6312202891a8f139bbd867768f7,2024-12-16T19:54:51.870000 +CVE-2023-40474,0,1,4c380d938e264e3fa442bd1081b9539e48aeded626b78c1b28a3ccba5d58088c,2024-12-17T15:36:32.940000 +CVE-2023-40475,0,1,111714cf89b09667f36c061c58b64912600860bfd36a406abe93700be7a37145,2024-12-17T15:36:49.790000 +CVE-2023-40476,0,1,b29e0fc73da00b5f381174ab33a9c6384e3570ff12cd78abd62db3315f0c157b,2024-12-16T19:54:51.870000 CVE-2023-40477,0,0,3eb17f110dd9fb587160e88cbd13f801056aec9679ec47603ce426a7e8166eb5,2024-11-21T08:19:33.483000 CVE-2023-40478,0,0,97084c2b4ef249d0552a8d03d3aeb2ad91f2711483ab5979ff3e9704d86b18e3,2025-01-03T16:34:16.067000 CVE-2023-40479,0,0,7f0b7df65d67216fffb5ab0177cffb527f0d01bdb735f0d704cd884d3711bd7a,2025-01-03T16:35:43.653000 @@ -232381,18 +232382,18 @@ CVE-2023-41751,0,0,1a529c3cdc2f0abaad51e6d220d689681c9182d66926d355ead42560d411a CVE-2023-41752,0,0,273c191092ce5017c1d0001b4c70c9ee08b47b415b824f60e4217c2c458a50cc,2024-11-21T08:21:37.763000 CVE-2023-4176,0,0,a74c4761fa4dbcc224ce6872cc93bd18671ea39e59c9bf5fde051be2d6702e6d,2024-11-21T08:34:33.097000 CVE-2023-41763,0,0,4a66133f3240d3b93dabe84b3b66edbfeadcf5f736c78372cca23bf8207f2f4f,2024-11-29T14:36:59.690000 -CVE-2023-41764,0,0,749e59cc55d91e919d1e27feb781136b13cfee5ffad7b572487324116f815b41,2024-11-21T08:21:38.080000 -CVE-2023-41765,0,0,0bded34475e8b32ce288072211e3fe1738ffb1027bf6a5c83490736ccadd6091,2024-11-21T08:21:38.253000 -CVE-2023-41766,0,0,22d33ee49251bd58b5a3d1ed7c477da053abc4e3dc3eec9d37438a580001ee8b,2024-11-21T08:21:38.433000 -CVE-2023-41767,0,0,5cf5316ca73895c0d648ca9d54b3032ba19cf60754d4c7a0ed41eed81b1da446,2024-11-21T08:21:38.597000 -CVE-2023-41768,0,0,80ea85881cfee2b15000b7d50d96a2fb379f28fef4d4b7e8d660bc4ec63f6ef7,2024-11-21T08:21:38.760000 -CVE-2023-41769,0,0,dc575ab3f4d7946e03d4f7c3cae9a8e0268278c0264235f21e7c0fd7ab903b8d,2024-11-21T08:21:38.923000 +CVE-2023-41764,0,1,7e46ba23bf1b235b24320a3f71d52dbde781cb43b4244d709006ccd313d56278,2024-11-21T08:21:38.080000 +CVE-2023-41765,0,1,edf615338475d0899a7d78afec9fbbcd216391794820682cf303b24d274baa7f,2024-11-21T08:21:38.253000 +CVE-2023-41766,0,1,6d98fa4a8d22b49a185c001d8a1d8f18249a1686d4ac6fe38c91e466086fb13b,2024-11-21T08:21:38.433000 +CVE-2023-41767,0,1,b1955b51d02f0d4b282a2e07f47bc04d4546a86c7bc82bedf76d11a61e293345,2024-11-21T08:21:38.597000 +CVE-2023-41768,0,1,2d683033e5f8824dbf248809add1286ccdd245efdd6dfd900ee2a4cff834c0c8,2024-11-21T08:21:38.760000 +CVE-2023-41769,0,1,03876223a1196832ac9d291be117b40610622ea009a2674e883a59614472871d,2024-11-21T08:21:38.923000 CVE-2023-4177,0,0,aef1b95bb43104254867ed57262caf33209e376741125a4e7e407b478b8d8849,2024-11-21T08:34:33.267000 -CVE-2023-41770,0,0,318437527240017b3348f60058e4a6ca45e7cfbebbad9a7523bed6ac0c04e75b,2024-11-21T08:21:39.107000 -CVE-2023-41771,0,0,6d635aa0cbabc513bcd3ac8121cc123570e429bc8a2c97ecc5efaa985e5b7a63,2024-11-21T08:21:39.257000 -CVE-2023-41772,0,0,32f84f66d41402ea8e796ed5477ede7c4f440866e005b746acc4d40db7546141,2024-11-21T08:21:39.463000 -CVE-2023-41773,0,0,56526734420d10b83c24659c83553d7c07d2a45857cbf17574cf7628b3fee810,2024-11-21T08:21:39.633000 -CVE-2023-41774,0,0,cd9e85d211faad49fdd0ed30114d9c6f5193567e3a3e7f02110d0e4af5d6dc67,2024-11-21T08:21:39.780000 +CVE-2023-41770,0,1,4885bf334e7d52aac1c13618fcf3d5af43c14a2517744eda5d00a4d1b8a9a4a4,2024-11-21T08:21:39.107000 +CVE-2023-41771,0,1,9ce788aed810fe7ebb4d80dd0339f446a3c2fce6c196aef83fb85e3013452875,2024-11-21T08:21:39.257000 +CVE-2023-41772,0,1,1ddb563420388cdf4028fe5f7f0902afcd0308e525b54d79870aa60f416e6dd6,2024-11-21T08:21:39.463000 +CVE-2023-41773,0,1,faee020eb5f5b671b82678a516460fcff37a133fe28b8d985829a1b43b710d3a,2024-11-21T08:21:39.633000 +CVE-2023-41774,0,1,24bcac0406809b3faea5bf1336407f0ed9b2369176dc7415fba33b9cfd1354f3,2024-11-21T08:21:39.780000 CVE-2023-41775,0,0,9f89db4df785067cdd4e9d4b7c2e7a6cfedbba830667dfee19afb2a96c9cd0ea,2024-11-21T08:21:39.923000 CVE-2023-41776,0,0,20f40858a9672381a8a9085848c5ece660aa82097d9a080cc208337180331642,2024-11-21T08:21:40.043000 CVE-2023-41779,0,0,00ec8dde9f3fe82c60cb3c7c6476547c2784ac010a84a48be230e9d34f1bf968,2024-11-21T08:21:40.183000 @@ -233350,8 +233351,8 @@ CVE-2023-43042,0,0,8efe9baffed04d92f23b300779bce25791698bbe539f3dd62d48d41b51b04 CVE-2023-43043,0,0,4ec93aa82436dc86b4ccb1b3684f50d48aedc5bdc1d93f254412bd4b2a651619,2024-11-21T08:23:38.790000 CVE-2023-43044,0,0,c700e000c93a60d18aeeabd55f0025926f6f0c9fba18f1ec754ac13e08b3d371,2024-11-21T08:23:38.910000 CVE-2023-43045,0,0,692f22dbc4dc19c089253751109b93bb0e5cefd8359cd7675e66e51e06c8d3dd,2024-11-21T08:23:39.040000 -CVE-2023-43051,0,0,4bfe3f7af7f7c10b085bea7a2a7c30c7295211027ed2948bc84ca1321579c451,2024-12-17T18:08:08.027000 -CVE-2023-43054,0,0,9b98929a01c3516c30a60093cdeac2c68b316c34df031c8da7e05916cee17af2,2024-12-23T17:29:02.930000 +CVE-2023-43051,0,1,ed0b2315886b0d02ae69e50125a4e57219197c24e1340da2f4eb30f9896d5010,2024-12-17T18:08:08.027000 +CVE-2023-43054,0,1,160b9682e5bec73380f263a77e3ebbeba23b48fbec834d03025c28d701ba1820,2024-12-23T17:29:02.930000 CVE-2023-43057,0,0,01fddeae7f9538027c931e3e992d44ad1edd38b1d8fac1c202a9cab42dc2359d,2024-11-21T08:23:39.433000 CVE-2023-43058,0,0,a2df93f61b20e82bd3917a094411dc8a8f78a1f838adb628292a86116ce01de3,2024-11-21T08:23:39.570000 CVE-2023-43064,0,0,99757a9c3284cfbdb78f4af3c3ec6efedfd0c84c8b418e3142622f45896692af,2024-11-21T08:23:39.710000 @@ -233367,7 +233368,7 @@ CVE-2023-43072,0,0,136811489d065b6668e0195080a2e78f62d51290723e0588de76e368b5278 CVE-2023-43073,0,0,075910ba0ed985a26ae6d6a2c1c78bfff46a383f35a0ec7192b98f003fa24874,2024-11-21T08:23:40.880000 CVE-2023-43074,0,0,3ec8b15fec9493db3a59a582609d2bd28ec1b97e594c9c9554cd9d665c0e9ad6,2024-11-21T08:23:41.010000 CVE-2023-43076,0,0,38c0c879e7151047cb3a1c77265d1b03178a427927adb392de4bb883335f37ee,2024-11-21T08:23:41.137000 -CVE-2023-43078,0,0,a15ba5a608a0b0a61d17e9c566c6a58bed3712e70add1697be7bda12fbdf6106,2024-12-19T15:53:24.717000 +CVE-2023-43078,0,1,441525e38dfece24d9f11790a68f05e1de731efa328d9a48f6f509349345ec6b,2024-12-19T15:53:24.717000 CVE-2023-43079,0,0,c77cf013dd28ba935eb61260be6352a6a8414cf9d066bdde15be6b852e02081d,2024-11-21T08:23:41.450000 CVE-2023-4308,0,0,f3830df633326f7651d0cca67089e0e16920c46a5093566e980e9d164d46d5ae,2024-11-21T08:34:49.717000 CVE-2023-43081,0,0,58b63e401d69ccb7e57787b2daf9353f71b2bfb248a3b058ce77f784b76caaa4,2024-11-21T08:23:41.583000 @@ -233597,52 +233598,52 @@ CVE-2023-43511,0,0,7fff9c982b19a2e464f34cb86af4d539295cb9734d5ae6223479bb36e671f CVE-2023-43512,0,0,b42127ddd80d42ae09fbde906e0bde259c14cedc48d14f62658e7708a6431df6,2024-11-21T08:24:12.210000 CVE-2023-43513,0,0,db5f760cbc83bf3541f96d3e00670eb0698d0c39405c43bc75de4b0b8ea66b65,2024-11-21T08:24:12.337000 CVE-2023-43514,0,0,0fc03331bc72b1c21bb67370884a89cdc506d0585566097257b44db2e7e311c7,2024-11-21T08:24:12.810000 -CVE-2023-43515,0,0,0dcac9cacd291fedb9e7611b973340719fadabca6ef9c26c137dbfbf377040f2,2024-11-21T08:24:13.047000 +CVE-2023-43515,0,1,dc2e935baa7f78b2eaa136790c7ccc62301b085f263193deb36b925f1e42f6c4,2024-11-21T08:24:13.047000 CVE-2023-43516,0,0,3f8d00d3dd59ad8fe523362b5f9c2095fb4d9c32c0c2404fdf51a005ef2bbcd4,2024-11-21T08:24:13.177000 CVE-2023-43517,0,0,73393a03cf1e7670b6c7a388db630d68a20b44dd9c826f726250b61f7cff1243,2024-11-21T08:24:13.313000 CVE-2023-43518,0,0,1eadb7f7bcb6893d3b5fa7f73588e2e5d1ce94be0c3b8aadfe5151272e71459a,2024-11-21T08:24:13.470000 CVE-2023-43519,0,0,d14580e7ea930e89d23b523eceb3fac26d1edaa64b3c9bf16b10e660c4719ef9,2024-11-21T08:24:13.893000 CVE-2023-4352,0,0,61f749eecc63d823ce9be40d79ec236fed8cc4068a0d474ff01fb9df8562b06f,2024-11-21T08:34:54.660000 CVE-2023-43520,0,0,906e45651f65df2fffaf1c9e3823df5a5cad75680c8bb93ad41c1a53de404b14,2024-11-21T08:24:14.220000 -CVE-2023-43521,0,0,268311c681831d517d94575d88ea19e3318b9e04cdaafa32176c55e219f7be33,2024-11-21T08:24:14.420000 +CVE-2023-43521,0,1,6fdd590ae537d9cd4d113939b84f938b5e5ce294fb9c6e1bd5cd9cab6aa1b228,2024-11-21T08:24:14.420000 CVE-2023-43522,0,0,9df9513b05a658a53906a327a6c0554d84a9d15ed6212d32014dec1ae01fd23f,2024-11-21T08:24:14.603000 CVE-2023-43523,0,0,64feb5fc8ac321c733cb4949d66114b0009c46662ddf839a276e57abda35c494,2024-11-21T08:24:15.227000 -CVE-2023-43524,0,0,d17476e2957d8113560ff2a6eb2160c5135534dd90a776211687e17bd389efce,2024-11-21T08:24:15.513000 -CVE-2023-43525,0,0,334b1a042fe184ede4bb23d9bbad277b5fbd69e7e46de8353ecc0a5ba2903240,2024-11-21T08:24:15.660000 -CVE-2023-43526,0,0,3fbd5f1aa2792d8058f293c347ff3c05ad511f6fd728ea2f6afe7cf70081824c,2024-11-21T08:24:15.803000 -CVE-2023-43527,0,0,eb1f1842f72ab5c55abaf9e6cbc517979faea1dacdf5f851f25a17a1d7f4895c,2024-11-21T08:24:15.957000 -CVE-2023-43528,0,0,d81537c18d64fe6e9936865ecf75a49ba1622694e5a6d5b2ad9b914178422805,2024-11-21T08:24:16.143000 -CVE-2023-43529,0,0,5ab9631a78d939e995be9ba4c7919839aebf538638052c9cfafd27d8a3b98607,2024-11-21T08:24:16.330000 +CVE-2023-43524,0,1,4319cce24b1784e4495ac0687d8360943f141bad70a328bf051a2986bb1f222c,2024-11-21T08:24:15.513000 +CVE-2023-43525,0,1,220f4471860872d553d86772a5d3f3cc1e6c6154d19baad6d5eb2b2c279dd1ef,2024-11-21T08:24:15.660000 +CVE-2023-43526,0,1,5af55c9d30365ca3b1d5468bbf221e46dbe6c03b90ecd9a8ea73e3270592fc0f,2024-11-21T08:24:15.803000 +CVE-2023-43527,0,1,06f34a91d21821df203eb492f11cd53c61353da7b5fbadc70e0ea364a1b56f9f,2024-11-21T08:24:15.957000 +CVE-2023-43528,0,1,ad100b0c05f35c2ae0f38aef6c6dec4633542bcd2d52ab88adac3c70f1f3d019,2024-11-21T08:24:16.143000 +CVE-2023-43529,0,1,c79c3ea15f541d46805df273f00413c860ddcb39af618b9cb5d457476d8c62be,2024-11-21T08:24:16.330000 CVE-2023-4353,0,0,c5d6f37637c0dea348223e00cf5f4a7425f623663026f5106b7082d286971927,2024-11-21T08:34:54.783000 -CVE-2023-43530,0,0,9724974865a43c46a5d163cc5982a75a16a1f7d4a14aae914b7c0ede28727f03,2024-11-21T08:24:16.510000 -CVE-2023-43531,0,0,dfde0dfc0460167f7886dacc1578035972e6873f047dff1dd00f1b51a64fe25b,2024-11-21T08:24:16.663000 +CVE-2023-43530,0,1,a20f7d1c37ee9f61211eb5e0aaca78f7a1b1df524daacddee5d00fc52d4962d1,2024-11-21T08:24:16.510000 +CVE-2023-43531,0,1,00f0ed430bd35b93d92ea809f0d0772f968cab7166a5dffa3a9e81802853508b,2024-11-21T08:24:16.663000 CVE-2023-43532,0,0,69608f555241824c387b609aa59a0f479d059247e6630791e2097b48ee629353,2024-11-21T08:24:16.883000 CVE-2023-43533,0,0,a611b6a340de89cc503738d64605edbf181ab9c92baf2edc0682a19fb5802357,2024-11-21T08:24:17.030000 CVE-2023-43534,0,0,de5d57ee7c2064e28688ce2748d9b4168eaea4001442b3f12171f8db0ba10e56,2024-11-21T08:24:17.440000 CVE-2023-43535,0,0,bd198a99fac75f8da40b81e58e0e07a09cdc3859220f8c36ce31b9d1349868df,2024-11-21T08:24:17.650000 CVE-2023-43536,0,0,0d385bd18e2c883f504f528dbe6f90ee76e0cb828bc5c6e7e4b56975970af971,2024-11-21T08:24:17.820000 -CVE-2023-43537,0,0,7321fc000260071db2b487d0b8bf68e765a6835e906f16a5888732e30212526b,2024-11-21T08:24:18.383000 -CVE-2023-43538,0,0,460186b4622fb7e5e1eebd71c3c6fdb4d00781e30b8d6bfbb447040d36201c0e,2024-11-21T08:24:18.560000 +CVE-2023-43537,0,1,b6dce89e6795fda1a6303ea6414a90be33f304a255d0fa39c626c412c4a05053,2024-11-21T08:24:18.383000 +CVE-2023-43538,0,1,43d4a255d99b77457d61cf4fcf535f85a7f2cfade03174075df912e75fbf602f,2024-11-21T08:24:18.560000 CVE-2023-43539,0,0,3e84f5d47fc1a857fc947d8fbcce08b05e4262de2de44bcd131b6800f0e3bc2b,2025-01-10T17:50:40.333000 CVE-2023-4354,0,0,f4d89b45e8cfe461b9cef176f9a11aa5ff8b50124e1dbb741c3fca33c06f1b22,2024-11-21T08:34:54.997000 CVE-2023-43540,0,0,a8ba104ce80b9c262224d5409ca6f18feea66c33f3793c474e6365db345b76f6,2025-01-10T17:50:54.310000 CVE-2023-43541,0,0,c76cd0c395a4eead194924d75fa86b223b4e99a5b052a87cb5efce97c8e01af6,2025-01-10T20:14:42.990000 -CVE-2023-43542,0,0,e2b139ab0f7b89abbc378441e2c98a24f8042a97a3774d331da092a7af584af0,2024-11-21T08:24:19.377000 -CVE-2023-43543,0,0,f1c15993b14bea11a764ff661a03a0943522e1ae79c8980fe29c1754fccaf72f,2024-11-21T08:24:19.650000 -CVE-2023-43544,0,0,e99e5c0549dad71cc88f132f7c3f0d006e343c7b4d78d8e81d686af9b4f1ee70,2024-11-21T08:24:19.787000 -CVE-2023-43545,0,0,35d6b9d404b20d057b03a2b4d844dd8518aae474ede64bbebe28ff6f5ceeb9e4,2024-11-21T08:24:19.920000 +CVE-2023-43542,0,1,c2ca9e5455c9f9945f5b962aeb55f9b11e3ce17a199b9320ef550caaa3d0f6de,2024-11-21T08:24:19.377000 +CVE-2023-43543,0,1,2472f8134b7070e98535db6b83046ea77bead9861e834632551d9c52df091cdb,2024-11-21T08:24:19.650000 +CVE-2023-43544,0,1,18b42c0e35a9d1f2e1ef6a7c73d0f16eac50ffaec3a7df5ece70b70a59d3164d,2024-11-21T08:24:19.787000 +CVE-2023-43545,0,1,f1d23b6410b50b60ddf88f4a0e354ff99b7dcace9f7e53b4310e23fceb3e870f,2024-11-21T08:24:19.920000 CVE-2023-43546,0,0,430c8219ff2c74bcb4afd7c38bcb47bd0ad0633e3663b058833833dc31dd442d,2025-01-10T20:07:06.970000 CVE-2023-43547,0,0,f0c5610fd83111fef427abd875ecb84930961d986dda57b78855ad177af56e03,2025-01-10T20:07:18.177000 CVE-2023-43548,0,0,56e173ce476d1e701b7b3cf219a520c0cc3a93446f759c9f0a4f39e645eaa76e,2025-01-10T20:07:40.580000 CVE-2023-43549,0,0,4a69fce9292d3793579bfa454b583974d46a2e38ba7ebf37c75ea83947ae7a3e,2025-01-10T20:07:59.390000 CVE-2023-4355,0,0,31e03f4e6ed9da3337f02df7b2a36e634a929103c7b5b7f716c88e82351c6277,2024-11-21T08:34:55.120000 CVE-2023-43550,0,0,f3dbcf69b026e5a8fe6d29ad39f52db5ed0fa500aa4696d8297b461e398d7277,2025-01-10T20:08:17.080000 -CVE-2023-43551,0,0,c6d6594514e008e5f5eb6cf6fe49b89489e4b66c0c963652f49cdd38190f788a,2024-11-21T08:24:21.137000 +CVE-2023-43551,0,1,a157c30beae7f42b7615b4b03b7b5aa84ccf826b2c2d379df2fc90f45c68c1b0,2024-11-21T08:24:21.137000 CVE-2023-43552,0,0,38cb56d152a8d870254bc3eaa790755a27f71e97952a9344763e34f6f72fbb94,2025-01-10T20:08:31.010000 CVE-2023-43553,0,0,682f7d23ef8b45bcf50fdf913eb41bf598d75002eaef8d47d9fc2f3b01a78ee5,2025-01-09T16:13:46.290000 CVE-2023-43554,0,0,ff9e342df67acc361772ce756ca6aa590135fd661810b5be1b959abd99f4154d,2024-11-21T08:24:21.780000 -CVE-2023-43555,0,0,bc25a97104aae8f848caa0d79e38e515c16028dde8c76756739290c2abccfc42,2024-11-21T08:24:22.017000 -CVE-2023-43556,0,0,7687bba0bd1d47443659047e96d5e00b125073782ad27a03cd5936564268da53,2024-11-21T08:24:22.213000 +CVE-2023-43555,0,1,5c8cd3bd5758e8f00854f3ced2a0991c790b25c5f96a0b2406374d870ad9ae03,2024-11-21T08:24:22.017000 +CVE-2023-43556,0,1,9c36c9570c30309af0cc558951802498dd47c746bdb31f671949b0d4c5ea42ce,2024-11-21T08:24:22.213000 CVE-2023-4356,0,0,9719d22935ce167437ec0655a95c6618ec2beeebdbdc24d814c3720b3074151b,2024-11-21T08:34:55.257000 CVE-2023-43566,0,0,81571b84e500ab68959170ce2190e420c994b3c7934d24e3e7a8002218ffb05c,2024-11-21T08:24:22.360000 CVE-2023-43567,0,0,a35db43162d040baf942f97c5deae77b38054bc334ed451e01f58f7e6e3d54d1,2024-11-21T08:24:22.483000 @@ -236442,8 +236443,8 @@ CVE-2023-47534,0,0,156d1827eb4da96dc3cd2d8629999ea2e2fa724590606a3354fde4b400d38 CVE-2023-47536,0,0,d84d72a63721689042d4832177b8ed0c4a9d504fac28b204af3cc47b40f30f39,2024-11-21T08:30:24.973000 CVE-2023-47537,0,0,2e59328fe99d373a050967f8884554343bd03b198b96f65b133b83e4d7c66e1c,2024-11-21T08:30:25.100000 CVE-2023-4754,0,0,0b14f0921b6667a528d8f56fea2f4c9f7f951287cede8fa8335afbbdb458b076,2024-11-21T08:35:54.460000 -CVE-2023-47540,0,0,025762b7fa86b2da8ebd726f3a759e53420a7764a2f77b0cf1ad81406a1004d8,2024-12-23T14:55:53.860000 -CVE-2023-47541,0,0,478e59dd74ae519019737dd29ef738de30b84cce6196d665d0cc88db1f1700df,2024-12-23T14:57:00.153000 +CVE-2023-47540,0,1,30ad5bce1a8ff12a551ea717bec4c760ac5e6136be380d2d553098d927c9acd4,2024-12-23T14:55:53.860000 +CVE-2023-47541,0,1,3da53a23394974b989fe8799af46c85743ab703fa3c735d56b01dc047fc3d5b3,2024-12-23T14:57:00.153000 CVE-2023-47542,0,0,2c301ea3fc1923df3d1786b1c81f5d6312992d198827db876d7bcd4ba7084720,2024-11-21T08:30:25.520000 CVE-2023-47543,0,0,0ab4ae9e1b35d4494e8292afb33e27cd1002b0f28bfd138a7061de1fa51ed1f9,2025-01-02T18:29:53.643000 CVE-2023-47544,0,0,37c99d07aab35bc0bebf060938c609faefc3158817cf4b2a384b1ee52ef99508,2024-11-21T08:30:25.707000 @@ -236614,8 +236615,8 @@ CVE-2023-4773,0,0,172d90771c156d695a1953b60a0ebb2953108f87f4c1fb387791be3c59eeb7 CVE-2023-47731,0,0,55012cea803cf1003bbde5e322863bcf61542365187c7c8c2b67d02d7f92d484,2024-11-21T08:30:44.693000 CVE-2023-4774,0,0,6689751d4db77f0b206f01f2647e5fca751f16f84dc0b3169ba7d1496a0a9127,2024-11-21T08:35:57.393000 CVE-2023-47741,0,0,538ca3f68bfbf7edf487c8a0134c536db9d83b9681aa6a4581a3ed1c92a09ab4,2024-11-21T08:30:44.820000 -CVE-2023-47742,0,0,b4bc2243821c116a3329e7b3fa598e6b3cf58fa3fdd1551ccc68fe8517921e40,2024-12-23T18:01:38.420000 -CVE-2023-47745,0,0,7af9b26ee35669461ee74d191da0d5d8effbd83bb77af923fa2278e1399abdfb,2024-12-23T17:33:15.237000 +CVE-2023-47742,0,1,7db220ceb05f44e02ae42ad302bd0d29f13f5254b048152c887c85ac42aa87e1,2024-12-23T18:01:38.420000 +CVE-2023-47745,0,1,c857b8065cd6512694ee5360dae43dfbfa25ba8191333a2a247eeddcf132afa0,2024-12-23T17:33:15.237000 CVE-2023-47746,0,0,9922788ba494dd82e5f82ac0d220ad210b34709be2a4cdaf5a2ddd8dd83e84b8,2024-11-21T08:30:45.207000 CVE-2023-47747,0,0,787aa92e7496a3bdca60bdaecffcb37941545ad2f07b22c84c019ea35422d16a,2024-11-21T08:30:45.360000 CVE-2023-4775,0,0,d0e086363573bdbbad4db0ef4272cf3e1990cfed85ee8ec4b7618602e21aca22,2024-11-21T08:35:57.527000 @@ -236741,7 +236742,7 @@ CVE-2023-47870,0,0,90674fc91b00935ca55935ec9e84b5dee66e5d5688f9bbe6b4de4aadd6227 CVE-2023-47871,0,0,cfdfec4a2737d45b346eac498c6969c85dd01b0c9f8e21357df31b1205cc6225,2024-12-09T13:15:32.767000 CVE-2023-47872,0,0,a6f12169ef04d4b51dfcd627c18e60f534b596ef65ec72eced96dd248e771f87,2024-11-21T08:30:56.573000 CVE-2023-47873,0,0,5dd5961a1e29615f7c85b89f6ca1d6467e0d9aa45488b1665947ab1206c9e06c,2024-11-21T08:30:56.700000 -CVE-2023-47874,0,0,d065eb7cc9ec7659d54380b0c5236e6587ca2a63c6ce7d1ac0079d77ae3d1875,2024-12-31T17:29:07.187000 +CVE-2023-47874,0,1,c9c460bb8c45e037b6d94dc281a302aaac33bdbc40ad3bc34517c19b5f1996e9,2024-12-31T17:29:07.187000 CVE-2023-47875,0,0,dfa066e7628f4ad6f4d51d4f7df32367a25258bc741871f3618113c0e9ee150c,2024-11-21T08:30:56.943000 CVE-2023-47876,0,0,6289baa82f79bb3e0548172170021c28f918791e25a4b59fff372b2a1421f295,2024-11-21T08:30:57.063000 CVE-2023-47877,0,0,28d0f86cb84c40f17691aae3c9e59f0461c4ae1ea9d2eb19edd88fae1e61d0df,2024-11-21T08:30:57.190000 @@ -237457,7 +237458,7 @@ CVE-2023-48771,0,0,a4a424861e0d7acc67ca6d05c1c28418c8585c100a79b9b63aab858158b6a CVE-2023-48772,0,0,0c43ac47883d8df1dd3af913749f86f550e73578fea685085738b693f50aa21c,2024-11-21T08:32:25.287000 CVE-2023-48773,0,0,69c2d10ce53d5bed5abbbabd5452f88c034b79ad27513b7475e9a369aba8c011,2024-11-21T08:32:25.420000 CVE-2023-48774,0,0,df67987526796cf9139d3a58e2031842a7b4119a36678e2120d6525442d00f66,2024-12-09T13:15:33.937000 -CVE-2023-48775,0,0,eb8866480b0c2db477a0c2b6fb537908a0b814290bf7080a2b41354207e93a47,2024-12-31T13:15:05.650000 +CVE-2023-48775,0,1,fa9fe58a38a9119748279127f270d1ac54cb2b2cc1527bcfb3bd7dca7deb38b1,2024-12-31T13:15:05.650000 CVE-2023-48776,0,0,60422db6013f51551677e22d94d4d864bd4aac472b3cb692bc594e8b25dde16d,2024-12-09T13:15:34.077000 CVE-2023-48777,0,0,da2fb312c81f4d39e1f6b619e89a76e40c7e69d7c2693339a128d1645085873b,2024-11-21T08:32:25.547000 CVE-2023-48778,0,0,65cedce3479eb1a4b909913b713ad810f6c269d477fecb40f5921fedfb5b424e,2024-11-21T08:32:25.667000 @@ -238794,7 +238795,7 @@ CVE-2023-50847,0,0,8af88a86a3973ffb9b180f3688093f1185c41115fba9de24528f2281cbaca CVE-2023-50848,0,0,03098ffc01df1a6f925be974e2b8b2896eb8309e51fcdf8dbc50d422b690e589,2024-11-21T08:37:24.307000 CVE-2023-50849,0,0,d5fdca61f99f1dbfefeff38bb6cfb6fd829f36ca030c93562f4c6219bc386f41,2024-11-21T08:37:24.440000 CVE-2023-5085,0,0,c3dc096463ec9767731a311106d0ff3749acd54e0bded3788615c36bbd3edb19,2024-11-21T08:41:02.137000 -CVE-2023-50850,0,0,00e6c1a4a3d2e9b6c4b19bcd4a375059230cf8f2a3820c7d57cb70fdd952712d,2024-12-31T13:15:06.940000 +CVE-2023-50850,0,1,150dccd964f125349565de988891e810544b416bfa48d67dfcc4c18862cdb607,2024-12-31T13:15:06.940000 CVE-2023-50851,0,0,b23caecb559751b1d7c39c8e23f07629189c7f211a209dc78210c3aab52fd434,2024-11-21T08:37:24.553000 CVE-2023-50852,0,0,07e31b4498bb410dbcfd349d83d51403c44c3e6184f018d4c847cae472dc96c2,2024-11-21T08:37:24.673000 CVE-2023-50853,0,0,132512219726e09d089c7105fb3a1079c0f04772601a90b12042f17457979fc7,2024-11-21T08:37:24.797000 @@ -239095,8 +239096,8 @@ CVE-2023-51384,0,0,6e58bfcfb6da1155236afb4714eaff5a0d73193b62b87388c071ed9812c66 CVE-2023-51385,0,0,4dd6adfe4e8a547ab40bfa763b57db46069409ffd40c7ea0c384ce7720703ef7,2024-11-21T08:37:59.990000 CVE-2023-51386,0,0,bf7934aed68840a6291648f540bc6a2a2d179fe58b03fabc7e3763433e5d12ef,2024-11-21T08:38:00.183000 CVE-2023-51387,0,0,9ae6c1ce6708d7742b5f3ef922ed1a40fc6c73895105309aad89d41f5482a5c0,2024-11-21T08:38:00.317000 -CVE-2023-51388,0,0,24429fd620dfac0dc1d9b83b8d56ed1aae7355ddd88c4ad5ea70ad4b28312227,2024-11-21T08:38:00.467000 -CVE-2023-51389,0,0,e8ed2a7a50d3adabcb6020e2e378e0a1c0f2dbb175344103561228ea35000b46,2024-11-21T08:38:00.603000 +CVE-2023-51388,0,1,784f53a667e4ebd3e800108ed939512f72b2952a0185dbcde27900757fe9c331,2024-11-21T08:38:00.467000 +CVE-2023-51389,0,1,b68ed775daebaed828ba4b940dc62017ef974c0dbb223395d833bbd647413291,2024-11-21T08:38:00.603000 CVE-2023-5139,0,0,69361bc1a2213f0600fc2fb192d98b406084fbbaf2768468c5067c08059961d2,2024-11-21T08:41:08.487000 CVE-2023-51390,0,0,496dd0af99b7fb72c4ebdc3c318e1a8996c2f7f491249e5fc1088cab7b14ac21,2024-11-21T08:38:00.733000 CVE-2023-51391,0,0,f2097631d097ae23ddb8f8956d024413f324b87cd0f46e72c0193f503c53e7f2,2024-11-21T08:38:00.863000 @@ -239361,28 +239362,28 @@ CVE-2023-5163,0,0,cf3b8b5134b9c3abc6194368c1f49f0d1625e7f19df09276fa37ea2ce1e8ae CVE-2023-51630,0,0,e515bb953de02671803c7419ad4aba130c7fe90ffc243cec72816fb33885b191,2024-11-21T08:38:31.540000 CVE-2023-51631,0,0,63990fafd7619988fcb9ea55cb59056aa18a7251357c83485d91833b03bb94e5,2024-11-21T08:38:31.683000 CVE-2023-51633,0,0,5bad642ed926588fb216d042d3401b2bfb81ffae216f273e0c12fbfc0d81c0ae,2024-11-25T14:09:45.733000 -CVE-2023-51634,0,0,24101bc2264cc1d448351081d51aca13350b240728cd6ffe57bce0b6bf8722d1,2025-01-03T16:40:16.203000 +CVE-2023-51634,0,1,f09c8d746cde46bcf17579547ce3bac22e6235c93144658244e41e78b7910929,2025-01-03T16:40:16.203000 CVE-2023-51635,0,0,ee4330766282efd840c60d0e4f3a92ff9e46233947ba1ea3659971c9610fc910,2025-01-03T16:40:28 CVE-2023-51636,0,0,064e8a3fd5ea55d58d985476470cd6b3909b601adaac084b871f121b88b13dd9,2024-11-21T08:38:31.923000 CVE-2023-51637,0,0,29910b96acccc169a530531b3226da84a2d56d602569491908f5d6d939690c9d,2024-11-21T08:38:32.047000 -CVE-2023-51638,0,0,1f8bb6fada64e2c6a4d757917c0cffb48a9990af5234b7fcae60e035c188c0fb,2025-01-03T20:19:29.350000 -CVE-2023-51639,0,0,88ea5281c15c051e4c6adbb02cb12674abd9671541743094fd20eb066c120436,2025-01-03T20:19:50.817000 +CVE-2023-51638,0,1,e1c52f8cc4e0665fd2f5e0b2dfea60ab42f977ae6f9dee468178f0b1ff438597,2025-01-03T20:19:29.350000 +CVE-2023-51639,0,1,f899da22f55fd1a251bd2a52e3af742cb451197faa5541f5119dfdff9d4b92da,2025-01-03T20:19:50.817000 CVE-2023-5164,0,0,199614649d50cde0aac75dfa6fa9bd33d7e02bddb554eb7142bfa98dfc4068eb,2024-11-21T08:41:12.770000 -CVE-2023-51640,0,0,b43f31ef68c8a8a48321e9c905d6568c592f47555256bd7dec988370e4fcd28d,2025-01-03T20:21:13.907000 -CVE-2023-51641,0,0,fdb649c1d2569e87900c5aa99d8b2590b19e3ff3a6a81fc236dc7d60b9e52761,2025-01-03T20:22:19.210000 -CVE-2023-51642,0,0,9938af45ca54ed1fcc1c094379ef07fb75e77646274f1c25bdbeb118b5bd431b,2025-01-03T20:23:03.470000 -CVE-2023-51643,0,0,870565dcf1b9e34a7c79aab456f181178934e381eea94bf4ccd1cea0007c5e79,2025-01-03T20:06:29.260000 +CVE-2023-51640,0,1,1c3b2c0c5c380e6c0a3fb927ad50e6ffac7ef9cf257ae340e7398f048137e820,2025-01-03T20:21:13.907000 +CVE-2023-51641,0,1,24ed7dbfcd421941f59e55cf3a6cc0c98a5552293e6227be0db9ce0ebc7e4330,2025-01-03T20:22:19.210000 +CVE-2023-51642,0,1,26af4af3b2d6c14825d6ef0f29c687ddf187da5a3ed3dea605f638081bfc9be2,2025-01-03T20:23:03.470000 +CVE-2023-51643,0,1,45cab2f87360cc0784112fe3fe6edbab9fd78fb25b497fa699a2416f3090a122,2025-01-03T20:06:29.260000 CVE-2023-51644,0,0,149c5ffc65f00aca62e0c31133481c33c050dbe606855e32220be36b55022ddf,2025-01-03T20:08:18.827000 -CVE-2023-51645,0,0,3dabbf069295b2a1e138c9a1048dcd2b97912834bfb5c8ea6401d6bb8b2a79bd,2025-01-03T20:09:25.893000 -CVE-2023-51646,0,0,2bd2612925192b3d32c3896f66e0929c28bc6d8318162f9b00f8aa75f4364067,2025-01-03T20:15:14.997000 -CVE-2023-51647,0,0,e075ea7dcb7713c08d87f50b232f97a3fd475c55570d4212ad5d2787a6183a28,2025-01-03T20:18:04.053000 -CVE-2023-51648,0,0,a2d6a9b99df66855a23ad0fac49c687ea3ad131a483b67befd9865fd659a6fd7,2025-01-03T19:28:29.197000 +CVE-2023-51645,0,1,069c64101e6bf8b2e06dd8819918cd069e51c8e867c8b31fccb0eb0513014b1e,2025-01-03T20:09:25.893000 +CVE-2023-51646,0,1,686490f887c4e04c13d9a4212390acb42eebf9762f5845958ed5a14f8e63a68a,2025-01-03T20:15:14.997000 +CVE-2023-51647,0,1,cb78ca280f2ea3267f6c28240aa0852504daba28ef9cec6a8f10eb6ffe725f64,2025-01-03T20:18:04.053000 +CVE-2023-51648,0,1,428efe86dfc75ca0d78541c0d1449f723a380e3e3eb8f0b9d1e24857b1d63e5d,2025-01-03T19:28:29.197000 CVE-2023-51649,0,0,022ef6f2381d5dd38178783656dbe44fe576376d529ba3b43494520910cb5817,2024-11-21T08:38:32.163000 CVE-2023-5165,0,0,3f5a6cd169442941a89e708d426d91665dc5259f42e8672e9b08aba1ff9c59b5,2024-11-21T08:41:12.893000 CVE-2023-51650,0,0,2f216a8a35441793fd8c040b6a5f4d1e641706a4eddb5c6f2648582bb8371f1e,2024-11-21T08:38:32.290000 CVE-2023-51651,0,0,5e0d84ceb36bb7bbcf590dc1bc18e3faaa5d046cddec719112ad744dda6f823d,2024-11-21T08:38:32.420000 CVE-2023-51652,0,0,2d775919d9307fee3bdc0e4ea44fb4c315f0c561cc8a5e74ca625b09f9987148,2024-11-21T08:38:32.550000 -CVE-2023-51653,0,0,4b34cb40b3868585c87c93bdb05d8dd8241898a58a07a9b7f5a616f1c89ea5bf,2024-11-21T08:38:32.677000 +CVE-2023-51653,0,1,93df48f521140a4b3e6a758a5e9afb77c21caa883c0899717d4fb8df6de143e8,2024-11-21T08:38:32.677000 CVE-2023-51654,0,0,c5d5f99f459f84ba951eeb62d2d6bd91b122f02eb2cde0a9b30cfd7d6fc656ee,2024-11-21T08:38:32.797000 CVE-2023-51655,0,0,798f763fdf003ac2a4d776193fbe546aa14799e16b8dffbddc1b635be6768b59,2024-11-21T08:38:32.920000 CVE-2023-51656,0,0,a6f4910c94ed9e900a598985d657809681a7265d1786879f1a5e8d687111bbcf,2024-11-21T08:38:33.063000 @@ -239851,9 +239852,9 @@ CVE-2023-52329,0,0,a004108f5dec698da3445c22156a25c0905c095ac77fbcbf47586a25dfd8d CVE-2023-5233,0,0,a570340c5d21a2e43bb2751db7fdb9c8db3d4a296bd64b600ba4abeb833a5faa,2024-11-21T08:41:20.597000 CVE-2023-52330,0,0,edae5aa2846da33acb4a55ae81651e74f8653528d76bac83894b7c0b43b49e7e,2024-11-21T08:39:34.823000 CVE-2023-52331,0,0,62ef0031155309b76bb1f307755a4bd733642066bdc308fc86dafb7e927b85ae,2024-11-21T08:39:34.940000 -CVE-2023-52332,0,0,8e6f1fc64aa83640f459fb8fd857ece347956e5cc83ab68fd06d6a37232c65a6,2025-01-03T19:29:05.487000 -CVE-2023-52333,0,0,a8f9329a651dddc94300c25b63ddcd98738fb66152c065975b86094d0524712e,2025-01-03T19:49:29.147000 -CVE-2023-52334,0,0,414d78dfbc068faf1ec26bd6ac4b7d3e27d68eaaed571e69547d9e8cff27fd0b,2025-01-03T19:54:44.617000 +CVE-2023-52332,0,1,a9c222edb5c352e3eba61356f5b58d86402c139b0b131bfbb24b71e3627fb899,2025-01-03T19:29:05.487000 +CVE-2023-52333,0,1,78416a98c5e043ae45a7e25f47095b78c3be68d6a46092ca3a4b2e1ebd99f2ca,2025-01-03T19:49:29.147000 +CVE-2023-52334,0,1,d15ce51af053188a815a658586a97cffe3c0331ab70b6f99665a66f884e92d04,2025-01-03T19:54:44.617000 CVE-2023-52335,0,0,fe69896d5e68ca16b373355e913cfc3ab6ceb4a49943631647f618d20cf9ce65,2025-01-09T16:05:53.673000 CVE-2023-52337,0,0,5d30b2e795d30af25a7c2557afed1bcb45315c4a68f523353a17c18460ac449a,2024-11-21T08:39:35.070000 CVE-2023-52338,0,0,a8379d6b9439ab072316828f426542121a26cdd77617df5ce049082cb5dd92bc,2024-11-21T08:39:35.220000 @@ -239982,13 +239983,13 @@ CVE-2023-52476,0,0,89c828189d91fd1242960120a533d7e398dfcbfd293ab99f643c622869d76 CVE-2023-52477,0,0,eb5822d237396c41c04f52728d9bf515c950801aef4f539b7f08b45f3cf87079,2024-12-09T18:39:35.613000 CVE-2023-52478,0,0,9e05b88e7feb0641b6ca4e17d4a850f7ec536a2d854a57f1537b6f6a4af9b80f,2025-01-10T18:27:26.213000 CVE-2023-52479,0,0,e0ff4a7b0324404fe79eee53801e5fe13d6f1e2e9c91c97e5dab8f615a1780c2,2024-11-21T08:39:51.897000 -CVE-2023-52480,0,0,cd04ea370d5bdea950880de8b151eed04d3c469cc9316c033c7f12aa23dc53e4,2024-11-21T08:39:52.090000 +CVE-2023-52480,0,1,e769e3d3dc6edbde6b851cdfc3b1fc40dcd3cc09496e1cd4498278831c19556b,2024-11-21T08:39:52.090000 CVE-2023-52481,0,0,c036169f36373e26e323dd8da99dbd8c63f236021e8c8a4a9bb39e20912dc147,2024-11-21T08:39:52.207000 -CVE-2023-52482,0,0,3a0df7f71f418f3e63754670552f138959109914bf16e4f18679cc937efd3c62,2024-11-21T08:39:52.390000 -CVE-2023-52483,0,0,1a8b1ff366173442b98b03348889fdc6d9d6815924144c23f3b8733f390724f7,2024-11-21T08:39:52.513000 +CVE-2023-52482,0,1,9162f9e39d90dbc1c0b0ced9fd241b81ea37d6a7ae408a39fd1acf340dccc11c,2024-11-21T08:39:52.390000 +CVE-2023-52483,0,1,13c42613dd59b04f551c00e3f6be740805f0cf6c5a5d8bf6bacf86f28931eccd,2024-11-21T08:39:52.513000 CVE-2023-52484,0,0,688b7461214e279f98589a82904a607b59c917943fab1d733720294c9192c231,2024-12-10T19:49:58.407000 CVE-2023-52485,0,0,c2b5d4c1676355db8fd79448f87f50421c07ae088ffc2e3215882f350721667a,2025-01-09T20:20:59.593000 -CVE-2023-52486,0,0,931d7db046363d7eac30b1a64d095d58079d7cbe4dece1d8d75f3a1561b58746,2024-11-21T08:39:52.863000 +CVE-2023-52486,0,1,b08f0dc3ea33f52f41a2f2486e0789d6ae50523a2cf24b902634bff5a67956e9,2024-11-21T08:39:52.863000 CVE-2023-52487,0,0,de51440deae5dacc8c190c40f2337dde434f7fd0e2594ff02b6d5684b990366e,2024-12-12T17:31:37.627000 CVE-2023-52488,0,0,68738be0d8dede65f330b32169dd66b0b6cfe13f45fb773a272170dda25fe6ce,2024-11-21T08:39:53.130000 CVE-2023-52489,0,0,06ac4268c68ddb320c502594803f5971db0d61ef37b6150af57f566836747b11,2024-11-21T08:39:53.273000 @@ -240002,16 +240003,16 @@ CVE-2023-52495,0,0,3848dd6249fb3b0098eceb1e102e5369e6a41e490097d267a2d230f8e731f CVE-2023-52496,0,0,1ceff2e059153d5a5937cc8a150530bebb0b9a38b1ee039de0fbd3b5f63c655e,2024-03-08T11:15:06.913000 CVE-2023-52497,0,0,94fd6b58b926a91cb8098bc30bfcace92de1e085d39a09a073793b0edb7aec8e,2025-01-09T20:20:02.167000 CVE-2023-52498,0,0,065e116d7373a70de6fabe612c4006ae940715deb24209d18d3d1d28ec7bcbda,2024-12-12T17:32:20.050000 -CVE-2023-52499,0,0,36d2ae89dfd4614baa32c134c04c9d2feb57673da7dc39f516646dcb8c9d8c1f,2024-11-21T08:39:54.483000 +CVE-2023-52499,0,1,313bd58f17dae84d5fa0e2795dc3e483ed6d6cc028cda1e7922b93f7f866e55e,2024-11-21T08:39:54.483000 CVE-2023-5250,0,0,58ce2b34b475373736e77e988be92b15eb836a64d3c5382c9b7f18d2986aa016,2024-11-21T08:41:22.493000 -CVE-2023-52500,0,0,fbb9efaa221bcebca4695082e7346353f1edaceda435306e7320013f86e44d86,2024-11-21T08:39:54.610000 -CVE-2023-52501,0,0,dce8fea28787eccd5fdf1c2279867b1856cfdadbf948affe1018e6b016ffe136,2024-11-21T08:39:54.730000 +CVE-2023-52500,0,1,d798b5d50b782d0566c8f8e30ec0eeb81594d2e1c18b176078421bcfa22f1398,2024-11-21T08:39:54.610000 +CVE-2023-52501,0,1,619722abd8213e9f7bab7564838742e6accb9eebbf575c49666ce5aa866232d7,2024-11-21T08:39:54.730000 CVE-2023-52502,0,0,53b5c7371b4f4373fe848296392853f59d8735375e39195cf54701f13f36c71d,2024-11-21T08:39:54.847000 CVE-2023-52503,0,0,b25829a16f78c14d9235d80b7c332263af083b055661f6466ab49e61a0d35aa6,2024-12-10T21:26:43.377000 CVE-2023-52504,0,0,7b00d7367755902413f54a344d1c934ccd6c5f85e27cba6919cdc853f813017e,2024-12-11T15:05:44.313000 -CVE-2023-52505,0,0,457ceb32eaa0dbf4f3fb83c3def49ce35850e4a94f5e4c24c521950a01b60bc6,2024-11-21T08:39:55.273000 -CVE-2023-52506,0,0,2473aef6ecee2b11075221629d29edc4b86db27ed7be427c580f9b517750fde5,2024-11-21T08:39:55.397000 -CVE-2023-52507,0,0,7ed8e633502cc2f91ac4507141a1f109bc31163f481bf3d02006d107ebe2cbf9,2024-11-21T08:39:55.513000 +CVE-2023-52505,0,1,56df38c978c11fed287e2d6ae978f7eb4bea79d0116d789c884d095c91af05ad,2024-11-21T08:39:55.273000 +CVE-2023-52506,0,1,ed4bbf9af12401f338a488d590f5186f0311d1689a8f262d2185e1a3645f258e,2024-11-21T08:39:55.397000 +CVE-2023-52507,0,1,c477de25c6dae0085929e01e8b125850693f2bb7226396ef8b84ca736888cd4c,2024-11-21T08:39:55.513000 CVE-2023-52508,0,0,f8139e600d46dca8f67ecb0a95236952f26c02714cd95adfe0dbbeed166d1ee0,2024-11-21T08:39:55.633000 CVE-2023-52509,0,0,4c32e1e52d82db6d2e5e667f80062d77bc1fa6b92446d15ee14c1f6c6f544cf4,2024-12-11T15:07:32.760000 CVE-2023-5251,0,0,8e5d86dd8015f5ba5db53e53cb223d5ce43b5c6420566475d898b38e0a2f8a7f,2024-11-21T08:41:22.610000 @@ -240022,24 +240023,24 @@ CVE-2023-52513,0,0,97d7c95c4e6616756fc77008da3a9e34784f63a990f4286e2a59685516251 CVE-2023-52514,0,0,96b3bc37b65a7f0f11caed4828897554155b5e08fde97001434005eb59164e32,2024-03-11T16:15:07.720000 CVE-2023-52515,0,0,783d33279e8711f2f53faff3aa4d2bf5a8bc423e48cee26bb25bf599790fc992,2024-12-11T16:41:11.770000 CVE-2023-52516,0,0,c9433424f464a3aefd00d0bda0d407932aea710f1ccd0eb4aed297e697fdac49,2024-12-11T16:34:41.590000 -CVE-2023-52517,0,0,d82939494abb052a15f83b4ca358f793f9c9e2d71a5d9b9e4a8553b5c270c05b,2024-11-21T08:39:56.913000 +CVE-2023-52517,0,1,3395b93c40fd8870f88ba156af80ba4090ed96f12fa5832794d7f6f8e33de7d9,2024-11-21T08:39:56.913000 CVE-2023-52518,0,0,6033333179ee7065b3ad5a7a294863593028e3c2a534a4a4a5dc1a8ac412775f,2024-11-21T08:39:57.030000 -CVE-2023-52519,0,0,8ece08980f7474945f483678246212b0be34fd4256183388e8be0b22bb44e150,2024-11-21T08:39:57.220000 +CVE-2023-52519,0,1,e8f503d20053c1bf295f40daeb0c34af400bf1106092d6132395d0ebe23f18bf,2024-11-21T08:39:57.220000 CVE-2023-5252,0,0,6e866dd390859261cd7659e88d39d09ee87f05ef749374a16d7e16e4e49555fa,2024-11-21T08:41:22.723000 CVE-2023-52520,0,0,d31cd448073f5b764992496529f1ce58fbaec56d048ef04f1b1f5151bc9d73f5,2024-12-11T15:16:55.293000 CVE-2023-52521,0,0,26ba094f0a43e00b237fc666ea879d557b221b56ad6aeee17c07d7717bd0e4ca,2024-03-05T23:15:07.310000 CVE-2023-52522,0,0,c13b0a3176143b06d3ccc87f08706f9245c7cdd589d25b2c0e11f3ccc3613bfc,2024-11-21T08:39:57.493000 -CVE-2023-52523,0,0,4960efaf39e9fd892e453735132ae203eea6ba386550aa6a7946783297160c29,2024-11-21T08:39:57.693000 -CVE-2023-52524,0,0,7c9782eefab52c2fbb27a17a70d133dab00dc93acf8473bcfc7d444ee733148d,2024-11-21T08:39:57.813000 -CVE-2023-52525,0,0,bc5937519d442f86b63a53c40100811a9bc3a8971c75a0285bf2356b42a88f8b,2024-11-21T08:39:57.940000 +CVE-2023-52523,0,1,c0acfce46ac1517ca8bcbb85593e9ad745512aec00b4863bc2b8f4a234a67929,2024-11-21T08:39:57.693000 +CVE-2023-52524,0,1,3d2a70525cfd480ea47dfbe29cc70243d8b545b6dc30a10d5f6fefc987f46638,2024-11-21T08:39:57.813000 +CVE-2023-52525,0,1,de1c6592edf5374eff5a62a845c9c1ae5d5d38f99effd2a5bc3d3de2256d9afc,2024-11-21T08:39:57.940000 CVE-2023-52526,0,0,1438e98d7ebd761d3e4a2b5db47e2999a34f9aed48e4e48ea616537355cbf9b2,2024-12-11T15:19:11.407000 -CVE-2023-52527,0,0,7caa2f7af5e7f96218899c315042a1cdfdb7e3e34c31f6678b7cdc5e41da897a,2024-11-21T08:39:58.170000 +CVE-2023-52527,0,1,05cf521640d10effa17532f68f36199f87dafd68096c0227670d995e7b60321b,2024-11-21T08:39:58.170000 CVE-2023-52528,0,0,f8dc1059cdecae7671bbeebfd74b733cc48cc6554467ed082aa97679e394d701,2024-12-11T16:27:49.277000 CVE-2023-52529,0,0,841566603cc3e72b05afcb01b587c6dcd4414a7fe1bc2081929dad3add9a68bb,2024-11-21T08:39:58.437000 CVE-2023-5253,0,0,7ead7effcc406218ae6035d8fe47bb748de44284fb99412a6bbf2042e8def61a,2024-11-21T08:41:22.837000 CVE-2023-52530,0,0,4f593611b75e30e5eae6b577cc331379a84a2f608d52430e3e67592abfaa923b,2024-12-11T16:26:57.617000 CVE-2023-52531,0,0,a61dc0f947d453c51b46a28fa43b6378dffa1008ab84f4db783ded8d39575ec4,2024-12-11T15:28:47.893000 -CVE-2023-52532,0,0,b26e8077130f31791dc84df48ac30adc861aa8b56f96bb902c194d9fbae75b9a,2024-11-21T08:39:58.847000 +CVE-2023-52532,0,1,ba6c5d12a08551475097b42f738ad172c51125f48fc7f93af83f381f0c057912,2024-11-21T08:39:58.847000 CVE-2023-52533,0,0,630004815d3f4ebf3c444b7ff3f11f212940db8cc3775558974c6702465635eb,2024-11-21T08:39:58.960000 CVE-2023-52534,0,0,f37e50d7149e08730fd9fe7b8b8fc06c4115123a747760e53b659858db2ba27d,2024-11-21T08:39:59.137000 CVE-2023-52535,0,0,5b5dcc460313aef0f915ae2f03151c386d496381278b48c4b17ddbed983e120e,2024-11-21T08:39:59.317000 @@ -240055,8 +240056,8 @@ CVE-2023-52543,0,0,5283d1b3068666f9df1d4bd34373b734822e71b72480090d12dd8445b86c1 CVE-2023-52544,0,0,406148b07c3e067d8a9476be53ce0c11d92291c013d48a8edbe35d723499379b,2024-11-21T08:40:00.890000 CVE-2023-52545,0,0,9a8fc8901aa644cde1d29ca0a0573e4a085058e72b5ee8839f817feebb241a74,2024-11-21T08:40:01.073000 CVE-2023-52546,0,0,595e1c1b42c7971cff7132e9cb85749c3833d2ddda52158da49cbfedf79cf606,2024-12-09T13:54:48.487000 -CVE-2023-52547,0,0,dea146192349d1d2cd37200319a3be97b4569e9d0865461e95a964ee33c3de43,2024-11-21T08:40:01.370000 -CVE-2023-52548,0,0,f0792580a3497e5e9473dba47b498b4ce823bc21046535c975ad80ddfde174dd,2024-11-21T08:40:01.510000 +CVE-2023-52547,0,1,8137c1d12289f1a7f98ca28b5eeaf4141cb9fd996bf309fb636147e5123add7c,2024-11-21T08:40:01.370000 +CVE-2023-52548,0,1,041a4244e394c3d794809c7145324075f3f7c8df545d2b61c18f23ceec55ccd7,2024-11-21T08:40:01.510000 CVE-2023-52549,0,0,ee9009133fbe9f80d74dff5352f9b88a18a64ffd6ce72d5c26cd7d7807302fcc,2024-11-21T08:40:01.647000 CVE-2023-5255,0,0,b25817cf164b6b92e839f9fb2ed96a7d7247900cb99b8587774e529fa151fa4e,2024-11-21T08:41:23.090000 CVE-2023-52550,0,0,df02f2239718e53b99444de87a20222af6feaf7990812f74cec672b0ce4ff90b,2024-11-21T08:40:01.840000 @@ -240068,18 +240069,18 @@ CVE-2023-52555,0,0,0bce05514a607edfd688ab05cf5d809587e49373a04112a081400fb17a4d6 CVE-2023-52556,0,0,6c8956bbe9164c8801611357438dca3cfdd9dd6a4b21c4b1a35a303df2e8f575,2024-11-21T08:40:03.070000 CVE-2023-52557,0,0,0a22b9021f7275058bdd115e9063ef7fec559d0df8bd741165304086449b75c3,2024-11-21T08:40:03.273000 CVE-2023-52558,0,0,79680456f3117e5c28c62f76fc61c399e91cab56f37a1e79dfeac8000c81d7c4,2024-11-21T08:40:03.463000 -CVE-2023-52559,0,0,a5eeead7ced19a305d3796a1194808a6ad5b63bc7f19fe14240baa29dd3ec656,2024-11-21T08:40:03.650000 +CVE-2023-52559,0,1,cf30bd183856d2b63ac92d373ef22fc2829696de871c58066f0d288d952437bd,2024-11-21T08:40:03.650000 CVE-2023-5256,0,0,f25b36e2d6816d15ae13d24827e811b1ce1bdb4f814d5704d120858d960e9cb7,2024-11-21T08:41:23.240000 CVE-2023-52560,0,0,8101dc5e12b61978499f3c1f952560bbf0c85a42b7e572f0d17179ed35ab4ed2,2024-12-11T15:24:15.463000 CVE-2023-52561,0,0,bbc18871877cad65375af08e325f56ae47245e643f99add72f816b7bee748d2b,2024-11-21T08:40:03.893000 -CVE-2023-52562,0,0,5a80f3b5bbde94e2506e1411a1c685dcbcc12f061a4accd03162004cc58c21c7,2024-11-21T08:40:04.087000 +CVE-2023-52562,0,1,54c4f900aa05479ac95239e18028398f065758be9e70ab8d216e70c5df211e0e,2024-11-21T08:40:04.087000 CVE-2023-52563,0,0,01157a06c1bdeb4c4102bca50ef9a48709c1400e6898d82272f45549e1856933,2024-12-11T15:23:23.317000 CVE-2023-52564,0,0,368c7f05707add455dbe5f5abcb8ce9056a0b45ef412d168e0c72b5fa5d229e4,2025-01-07T17:34:18.947000 CVE-2023-52565,0,0,573eae026add44222db4dcfafdb299400ef2ab79702c7319794326b052947218,2024-12-11T15:22:29.917000 CVE-2023-52566,0,0,0561ca08823b0139170f0520b6f130894bad2ca52e446eddfcab5d955446225a,2024-11-21T08:40:04.560000 CVE-2023-52567,0,0,18cd831f228d03b1e3290afd2f881bf52bd296c7921d05278f526558565ace57,2024-12-11T16:26:16.023000 CVE-2023-52568,0,0,8d17d4f43096b1e8e2ac821253ed4d8309c3179fdcc64f1f4e718167b321b031,2024-12-11T16:23:49.080000 -CVE-2023-52569,0,0,b178fb4a13ab6171073f91bab5945f820821c690ff14cf04ce18c757e1ad551d,2024-11-21T08:40:05.503000 +CVE-2023-52569,0,1,b578b3a55b4d2cb657966148b92ee026084f7aafdf207a9348671cd4a2368b01,2024-11-21T08:40:05.503000 CVE-2023-5257,0,0,3ce640126c4032ba9918a5e5e037c470517d8bf27f41acbde20ca80717bf2d95,2024-11-21T08:41:23.437000 CVE-2023-52570,0,0,c7a973afb4874bbc0a4a26ff210f16ddeefd555596f88f99c2b297604732223f,2024-12-11T15:21:44.063000 CVE-2023-52571,0,0,3d763ea049692222c9f2aaac9caf87c4a36407d587a5bdcdc18e08fbadbf44e6,2024-11-21T08:40:05.753000 @@ -240092,9 +240093,9 @@ CVE-2023-52577,0,0,5bd6982550137aea20a2ecd267614d20749b25811f7f7f8a84e7c7b156c3f CVE-2023-52578,0,0,7fde1fb5cbbb0a2937bb0b665d1b0debdfecb0d6288e6b5ff0d4a3ae6d5040d9,2024-12-11T17:44:23.533000 CVE-2023-52579,0,0,46d3719ad784e436d8f68041c52fb234bc85c10006dd0f7ac61db478c13665bf,2024-03-04T16:15:49.340000 CVE-2023-5258,0,0,e7de433a5f8b0381668aa81c56f5663c687e057bf10b9164f07834413eaf9c06,2024-11-21T08:41:23.570000 -CVE-2023-52580,0,0,b5e8245caac429cbfe54d5f9faf9ec643108211f2434aceb4bdea51b07278685,2024-11-21T08:40:06.887000 +CVE-2023-52580,0,1,7f069b7d2224e08dde3468c744ac1e1fcba1733cb0351753015e4672de20aef0,2024-11-21T08:40:06.887000 CVE-2023-52581,0,0,c3e6d5af82028afac4a4ca1f703859e3b8715280d49e5b32567a0d2d07c327b8,2024-11-21T08:40:07.010000 -CVE-2023-52582,0,0,2b076c99136e3512e8189fde5e2a8335450fe59e4f898fedc4dbfc0fba1d6aa6,2024-11-21T08:40:07.197000 +CVE-2023-52582,0,1,bf7e6c9da0247ab990ee15ca07ec6f89341600593c2d8abc236f9543b37844d3,2024-11-21T08:40:07.197000 CVE-2023-52583,0,0,8b9c89afe400a6ca03d637b734e61bba901e1be3a9d933dc3f9210eb865fd5fd,2024-11-21T08:40:07.307000 CVE-2023-52584,0,0,5a522db273229117adff319e88be80a572f8d8a3e6725b090908b5d18b4058f9,2024-11-21T08:40:07.433000 CVE-2023-52585,0,0,db7e2649e543632d88de0ba5f9f4eb76dfbd693c00750d96eb1fd47af92129fb,2024-11-21T08:40:07.623000 @@ -240234,15 +240235,15 @@ CVE-2023-52706,0,0,834345482be0d546ba50b0cb794dcb116ce50eb7b30eea30e56c36d1bfaa6 CVE-2023-52707,0,0,1bc7b595266b548d6027993e063414952e1e09f68ff73fe8319f05c3207dc492,2025-01-06T20:39:33.220000 CVE-2023-52708,0,0,79d1647a46a1e762e1f72065b91297259c43d8680df6c2128c54f559c8998f6f,2025-01-06T20:39:58.813000 CVE-2023-5271,0,0,57c69f88684b23484c89729e90ea1a49339f972575180d1b4d31fadcdba0e1a2,2024-12-23T15:18:44.853000 -CVE-2023-52710,0,0,80666a0f302ce95a8e0620f547eb15a0742946798e984d0862fab6bd252a1435,2024-11-21T08:40:24.760000 -CVE-2023-52711,0,0,292d4d31416cfc77e1fd0435f09d51ad7a6ee01d5d2c3c9a0958e494f443cbea,2024-11-21T08:40:24.883000 -CVE-2023-52712,0,0,1009207ad2894126bd518771cf6dcdfb26dd8c8f96e53106cdeec3e71ba3f490,2024-11-21T08:40:24.993000 +CVE-2023-52710,0,1,047e81a360897731f880d0599d295390f5494134b8904c6c7f6a32cc4bcc9d22,2024-11-21T08:40:24.760000 +CVE-2023-52711,0,1,cc83855bf8e359d211f376a5ee43650e9cad5f7403105f7df8dba026dfcb6788,2024-11-21T08:40:24.883000 +CVE-2023-52712,0,1,65525446b7fe131921c52f55da75710a708ef74b13614948d7ca7ba37ec14414,2024-11-21T08:40:24.993000 CVE-2023-52713,0,0,de6af38550e0c85a611046675f7763ec3d45059f76427f0389872a42693db02b,2024-11-21T08:40:25.107000 CVE-2023-52714,0,0,de14f64658c68077a848c9d7169099f947c3064891aa288f876f46274f59a0ec,2024-11-21T08:40:25.300000 CVE-2023-52715,0,0,40c133c7a650afa62e84d50889abdc2f10bf115a6958fb8619bb9f86fb85544c,2024-12-09T18:05:04.807000 CVE-2023-52716,0,0,e23e556efb2052738135a12d9d714c106a93095e20c11938c358672475db109d,2024-11-21T08:40:25.613000 CVE-2023-52717,0,0,6546ea96ba32ae2b161f65f20c7f1ad531534dcf0b1b8581277b1a6dce31a926,2024-11-21T08:40:25.807000 -CVE-2023-52718,0,0,b404588467a0d04d1cfa1a17d56fe908154bbe851810d8832120f8c87c611d8f,2024-12-28T08:15:04.797000 +CVE-2023-52718,0,1,5d82c4df3e9f6e4ba7fdee40f888db394f7e1d51ac8e44e1a017f9f690669dd7,2024-12-28T08:15:04.797000 CVE-2023-52719,0,0,e3f86bf719503ae7b09fa3135a17cf10d9dc9b4adbfb57625c3db8b69a7f3a10,2024-12-09T17:56:26.397000 CVE-2023-5272,0,0,4ba2e946788cd695e8caf8b6a2d9a57724a762493fbc909b19d2515ec3b7cb55,2024-12-23T15:18:44.853000 CVE-2023-52720,0,0,1fa5ff90dc57ff4a909c38527eebbb867f48496aaf35189850d5ac665cce26ee,2024-12-09T17:50:44.797000 @@ -240307,7 +240308,7 @@ CVE-2023-52773,0,0,d29ce77900eafe93634ed474a80fcf0b6b68132d33574cdcc0a9de71f848b CVE-2023-52774,0,0,7b1c516862079717c04100b862ba0b35a620f6e8d97f6b2bddcd0ff9afed4ea7,2024-11-21T08:40:33.640000 CVE-2023-52775,0,0,96733cb8f13c8dd09b128dff42194604eddeadddd0f9d7f0d63715bb838d1451,2024-11-21T08:40:33.770000 CVE-2023-52776,0,0,d1974d42417b93ea68a85bdc70a8d3ec57cc464e51d505a3a36cdf19693f71df,2024-11-21T08:40:33.883000 -CVE-2023-52777,0,0,c86a686e5854634a9ce886445b17568d60a00f426d4414a6afb628e1946bdb4a,2024-11-21T08:40:34.063000 +CVE-2023-52777,0,1,db03e23bfda6e265bb5e5ee08329350f21a472b77caafdc523a2992299aa2b53,2024-11-21T08:40:34.063000 CVE-2023-52778,0,0,1952c655ec7330890792a61c33e0609b434929bcc484de8711d061608b0a26b6,2024-11-21T08:40:34.167000 CVE-2023-52779,0,0,4c6e6239ce189e649132b49bd9a52bba719787d578c6c300d4c32ffd9463fc73,2024-11-21T08:40:34.283000 CVE-2023-5278,0,0,e0056a48d1ce688f53ab7535b5b28786d3768c25ef9d8df05fd1b28c68a75b55,2024-11-21T08:41:26.250000 @@ -240397,7 +240398,7 @@ CVE-2023-52855,0,0,fefd8691b2ed782148f182e3b7ecd154c88289d5d9aed5fb9541a88d6e6f2 CVE-2023-52856,0,0,7804a186e3b49a6e8110f30cdfd6e5d956bf8ca16640011273044d21012a2125,2024-11-21T08:40:43.957000 CVE-2023-52857,0,0,2ad03b26c44b3ae0cd56a4b0c70d6912ac0e5e2491198a356fee07a5f1552e2b,2024-11-21T08:40:44.087000 CVE-2023-52858,0,0,d13429b062d76da9af61ed855c6b54d793d44c5318cccd2a93fb27862bb71f05,2024-11-21T08:40:44.200000 -CVE-2023-52859,0,0,8ec5edd875e2596ad89314f0804016cec2b3717dca3ae86cc6f266709a65c4a5,2024-11-21T08:40:44.387000 +CVE-2023-52859,0,1,b722387be489fc673d7eb598e9587a85c18f05e62bef9d69633782da880cb396,2024-11-21T08:40:44.387000 CVE-2023-5286,0,0,b680a7049e9fecb70ad9844729500213129fb5af9277632332051b12c2cd47e6,2024-11-21T08:41:27.257000 CVE-2023-52860,0,0,2d752329ef872a97c5f242e72c4b9888cb10f5636e09df01d27c67c23258ecba,2024-11-21T08:40:44.493000 CVE-2023-52861,0,0,7e815960756fa294793a4a5bdb4ed74968ad6f0865d203e627fdcbe3be202729,2024-11-21T08:40:44.600000 @@ -240479,9 +240480,9 @@ CVE-2023-52949,0,0,2dc054c34618db3270acf55c911e73637f6c82cdce362693cea11e6d1c410 CVE-2023-5295,0,0,2b5ab72da232f5f5a3ac2b39e98a9c8864bc1570b0eb638a3035ee2c7b09129a,2024-11-21T08:41:28.337000 CVE-2023-52950,0,0,8a52d8bd2da07af53f402b62fdad2a9f6414f85db952ad75359b2aa5d8923041,2024-10-02T15:26:33.837000 CVE-2023-52952,0,0,566ca32b1444148f195c331ac2a9ad38ecb816c7a11faec5b059440b5ddf4458,2024-10-10T12:56:30.817000 -CVE-2023-52953,0,0,e1fe82dbeff07c63f91cde88d8bbeaf3d5760ac7b3a83291b65f6e8b0d59afac,2025-01-08T03:15:07.990000 -CVE-2023-52954,0,0,bcb792097cb2f2d41b36daaee7771d588bec6667b8b689c81d15a6653608b107,2025-01-08T03:15:08.130000 -CVE-2023-52955,0,0,ed1eedf087384e816453468f1a3473e44bf70cc851989a6de9f632fd211109f6,2025-01-08T03:15:08.263000 +CVE-2023-52953,0,1,937694c1ff4588049245c509a1095e9a72124fa1eb3c2f97166ac1fdda1ba685,2025-01-08T03:15:07.990000 +CVE-2023-52954,0,1,d34aec7b077777c950d019a051d3e933e9929b2b41862f5ef32ad6a30dc31360,2025-01-08T03:15:08.130000 +CVE-2023-52955,0,1,9f60510c8787852e6adfc8ce1befdf406f59d657016071f6a12e787eab28ef05,2025-01-08T03:15:08.263000 CVE-2023-5296,0,0,b04d4fbd343c2e856b8ac0aee32ec4da2662cf244be6db174bfbc8064e9c4681,2024-11-21T08:41:28.453000 CVE-2023-5297,0,0,de1f61d8e4cdd3b9b3c94e1a593ca1d09a649ba1f11645b247141deb55a46d5b,2024-11-21T08:41:28.590000 CVE-2023-5298,0,0,f53cf1dcb6f115d92d16e5c66372cdfa06b4033bbcfb51673e0e9ae138cbc0c7,2024-11-21T08:41:28.727000 @@ -241675,11 +241676,11 @@ CVE-2023-6597,0,0,89b58fa3929cae1473acd78809c36d26c8296660b8913ae3a27336303cbd49 CVE-2023-6598,0,0,6053f14e270dc7076cdc46c9acbd31f7f0ee707160eb4a14b11a84dc8ad71002,2024-11-21T08:44:10.607000 CVE-2023-6599,0,0,b0308b9ca19634b3fb537e54bec970bdcf5229a8d791c9c7b7b83a8cf17b1088,2024-11-21T08:44:10.740000 CVE-2023-6600,0,0,2434010c942a6205776298fb5a7e14d80ba060213c80be479cc1c00dcc02dd91,2024-11-21T08:44:10.873000 -CVE-2023-6601,0,0,2385a6a1a5f4115fee8261484bb704ba54f004ffe4cf6a03881f5633f88181be,2025-01-06T17:15:14.217000 -CVE-2023-6602,0,0,42413e4ead09c7346dad47aa2a6683f18d2f4e704ca6e4c2c669d39cf975e95e,2024-12-31T15:15:06.240000 -CVE-2023-6603,0,0,49bfef2fb08c9826398a082612513a67e781b4e8132721561e138e97869f52c0,2024-12-31T15:15:07.490000 -CVE-2023-6604,0,0,a69e4fc52c54880018324432fbfe512de5918990e56a7046a8dcd800adc1277f,2025-01-06T17:15:14.413000 -CVE-2023-6605,0,0,a12211c2173970ec0845ce934b9bf354dd6c5aa8b123a3a779f0f416416568d9,2025-01-06T17:15:14.613000 +CVE-2023-6601,0,1,db14bd55698577943f9024a246116c6d46b26eb1e57b3a7eb0ccaa8ee9ebfc64,2025-01-06T17:15:14.217000 +CVE-2023-6602,0,1,e0877473547f910a8588ed11eb91ba8b3675748d9c2594fc2145bffdfbe00648,2024-12-31T15:15:06.240000 +CVE-2023-6603,0,1,9aeb997ea554f48a351013a629215d389c56876326bb96fdae1efe8e5cbc8376,2024-12-31T15:15:07.490000 +CVE-2023-6604,0,1,b807aea0e9c2fe558a0d87e9444c208d9f084afa13e88d8faa8e32db5dca051f,2025-01-06T17:15:14.413000 +CVE-2023-6605,0,1,419d1fbdaf9cd4c397281320f3381e81dd57a0309528ae06d5500e3ca6057fff,2025-01-06T17:15:14.613000 CVE-2023-6606,0,0,8c51965fe5b8c0f5bc9f15f26c28d2f6ae9ab77217ae35702f9542ba8aa7d3dd,2024-11-21T08:44:11 CVE-2023-6607,0,0,b26de4c0815d9e5bfb034470256846caa6d64731defe9bbb333e33aa5af35930,2024-11-21T08:44:11.200000 CVE-2023-6608,0,0,e345741cecbf23cc4076c5f2284f1330a317f8731383fc6e8c7c4d9d02af8e3a,2024-11-21T08:44:11.360000 @@ -241874,7 +241875,7 @@ CVE-2023-6837,0,0,9013b63200b504bfb5e21fd4391df541d8fc65155ee3533211c19b2fa338b1 CVE-2023-6838,0,0,94589a15cd43d095d6904ee58354d0379e7bd4e5f6cd1d2760693ae54a8214e4,2024-11-21T08:44:39.153000 CVE-2023-6839,0,0,33aa58158b721beae894461c30e7e6926f93c29fdec2cf47a3d03407368eacb2,2024-11-21T08:44:39.303000 CVE-2023-6840,0,0,6d546453dbc1e0a3746d923568ce015e06fbb09e2bd08253f5dd212306e4b902,2024-11-21T08:44:39.447000 -CVE-2023-6841,0,0,6d5aec7db30d06ff2b80284ac81955ec4c597d983e1d4d517ef5de5546a96af9,2024-10-01T14:15:05.207000 +CVE-2023-6841,0,1,2129d22c894c63018f73c1eef70b7b46b58a4225e676119f0a9ab3a63275c659,2024-10-01T14:15:05.207000 CVE-2023-6842,0,0,c746174de0b6a4058a080b55bc4babb0a03fbc085ff4ee543c2333922d8d2f86,2024-11-21T08:44:39.673000 CVE-2023-6843,0,0,0ee91a45bfb72841fbbf62833a54745e9715ffbc699c5f10535357e7c998519f,2024-11-21T08:44:39.820000 CVE-2023-6844,0,0,b7c30bc6ead1b15cbdaa75d31e178696bf967f2cadcefa85a597cf9570012a4f,2024-11-21T08:44:39.957000 @@ -242262,10 +242263,10 @@ CVE-2023-7258,0,0,19eded96602052a8819eafc5cc41ffac2509a4daaba91945398147ff28a309 CVE-2023-7259,0,0,1c611eaee9f33d7ccd17c89183f492baf0d1cbca8df2084f000fb54a7cc465c0,2024-11-21T08:45:37.483000 CVE-2023-7260,0,0,5b13b64738d9f99d38b36ccafd3664ce3af226a3295d006866426dd31c7dada4,2024-10-16T12:53:08.807000 CVE-2023-7261,0,0,ddac2b275fa7ea517c7dade7545137efdda503fdf2e011abe40181729ccc83f3,2024-12-26T16:07:39.820000 -CVE-2023-7263,0,0,47038b709984116a0d26fd831f91702cec9ad1d4cbf85af82cfc0a7adcb0f259,2024-12-28T07:15:19.580000 +CVE-2023-7263,0,1,cf7920ff5b3068b39e94a13bb6f77d504242e61e7c2b3ec28afdd1a44dce1a82,2024-12-28T07:15:19.580000 CVE-2023-7264,0,0,481a3123c728ee9b31d977e1754c02d6eb9c9d972c045f9b799c0c77e37a60b9,2024-11-21T08:45:37.997000 CVE-2023-7265,0,0,c24118f188412f71957951e5a194c8feaa5aa2870f8d4bad1cae66392f13b12f,2024-09-06T16:38:04.533000 -CVE-2023-7266,0,0,460a94d6f48b9470c66182894f5451ef15e15564374bc846947f7ec007eeee8f,2024-12-28T07:15:19.967000 +CVE-2023-7266,0,1,06715857462d7c9870426208c4c44ce95d4afa6874f0a94bc75a0e92e1a6309a,2024-12-28T07:15:19.967000 CVE-2023-7268,0,0,a007920b048244bad12b3daf0ade65763569e4511640cd0844ab63fc1ad6a18e,2024-11-21T08:45:38.200000 CVE-2023-7269,0,0,808547aae37c3720945cb2e9fb822611d037a6a9f4f70083a54994b35322f068,2024-11-21T08:45:38.383000 CVE-2023-7270,0,0,2cf4371b77ac591f985f4aa4054d5c68cfc25f0a8d757e8da8652827f079b721,2024-11-21T08:45:38.553000 @@ -242342,7 +242343,7 @@ CVE-2024-0052,0,0,37a1306db82963a370b4d67dc21816036a55196c881fd7a2af20e4e80a19eb CVE-2024-0053,0,0,097c363e4e3cad490b0548271dd924bd22f26f2c1e234632435461606d74e6d7,2024-11-26T15:15:56.830000 CVE-2024-0054,0,0,1216b82254f7f4da2636958205697d5d1fa5262b6371495983ed800633d62208,2024-11-21T08:45:48.897000 CVE-2024-0055,0,0,9b30d5783ad7d948ca99f0b00034ba1c2204c53d4402bb8d16383f3b78766875,2024-11-21T08:45:49.040000 -CVE-2024-0056,0,0,7ce4b59e61817e467f5ce593e0daa2bfe2e68407d083054f39dc99aa5a4ad199,2024-11-21T08:45:49.180000 +CVE-2024-0056,0,1,d8360f90b74f6700272d6a41f327dccded97d4f47b60c5e947d2cd484108720a,2024-11-21T08:45:49.180000 CVE-2024-0057,0,0,6911ea0a6f9a974f33a2bfc84d09461fb97baa310549b7b23ec7e50e49e42a98,2024-11-21T08:45:49.400000 CVE-2024-0066,0,0,05604012307c9d015bd9a1531897b8404a84bf60ae836acbab80c90bdfe9713d,2024-11-21T08:45:49.587000 CVE-2024-0067,0,0,122e4a6c98538d37b86233a014d02728b12f029189e1509f4f04f30898bea208,2024-11-08T09:15:07.517000 @@ -242573,7 +242574,7 @@ CVE-2024-0324,0,0,4ea67a04f94947aa0502aea57504eb796d321250c16bfe5b9dd4e545bdde7a CVE-2024-0325,0,0,ace4a4c77432bf075e7908c77bf3779d15ba3b48033325228190ef50b39a6beb,2024-11-21T08:46:19.720000 CVE-2024-0326,0,0,23e9e39869c3329e0c467f3ef14ed5e1cea59a8aeb05acb6b189ad174da6a881,2025-01-08T18:33:51.347000 CVE-2024-0333,0,0,8d02600923b0d02e1b6c7070d1a8ded2d1f193f4c1d7d9ca81e40af9ef96b049,2024-11-21T08:46:19.987000 -CVE-2024-0334,0,0,534a9c7b527809feb97c2a7c11cdafc92a0562477e37b97746c08fa9a807ebea,2024-11-21T08:46:20.180000 +CVE-2024-0334,0,1,d3de57d5c8046a0fc1b0025c46a49baef6570025adca46e564bbfbd7b2fda638,2024-11-21T08:46:20.180000 CVE-2024-0335,0,0,ad5113205ca29b2f8742e9d2c19760bae855fe4340c6c1425f590ec6a288b45e,2024-11-21T08:46:20.327000 CVE-2024-0336,0,0,cddc79801885909118082d2802a71abc67eff195ee2e013233fbb6ac049c6ac5,2024-11-21T08:46:20.463000 CVE-2024-0337,0,0,33e1c070a211f6d43ca6d4fcb03f771464930eac32b3648b889c6cd46c41df63,2024-11-21T08:46:20.597000 @@ -242636,7 +242637,7 @@ CVE-2024-0399,0,0,e0c9666eb6b54e1bc351ebe2355d45c4620fba6932d788e054453f5337a155 CVE-2024-0400,0,0,d53ab5ef2a2202e9503db19d78333617c67c35adacd04c47616906e17a6a08d8,2024-11-21T08:46:30.080000 CVE-2024-0401,0,0,0823df990368b4b050577e6bc5b48e2ef1b07328db0e6b9bddf77162cab73776,2024-11-21T08:46:30.213000 CVE-2024-0402,0,0,c949b5bd8222e6e23b4e7ba309ff59582bbc865f49ff9c531f74ebc2c33ecdb5,2024-11-21T08:46:30.360000 -CVE-2024-0403,0,0,87f13e0d5b3ae2b2aaa1e22c5a7355c77cf012dc9fe3c296e3e1adaee67abcea,2024-12-31T17:35:53.340000 +CVE-2024-0403,0,1,c9b6ae724b586a946619c8ef0c81865180cac480da67df518481991ba669f2a4,2024-12-31T17:35:53.340000 CVE-2024-0404,0,0,e68675852fdad4a719b11b1ba5421da84ab893dbe21118b0c4ff6ad8acdc2b36,2024-11-21T08:46:30.660000 CVE-2024-0405,0,0,e66adb1ef6baed40b92ad2708a2a7f7801896af39f78da834867100b8b40a4a0,2024-11-21T08:46:30.777000 CVE-2024-0406,0,0,32138307a225ce5a983374924bf05097f2fb12720ed12df127395b83cccf520f,2024-11-21T08:46:30.900000 @@ -242816,7 +242817,7 @@ CVE-2024-0584,0,0,6d20f8338a23d66c740dd2ada9b9c1d3225d737f562208348d092c3e9d9874 CVE-2024-0585,0,0,940b680c34ad121dfa69b25eb22e69053bc2430cad3c0f48e3188936c0ea546d,2024-11-21T08:46:56.887000 CVE-2024-0586,0,0,483c6d27ef26d2b65fcaea8ba03f9ffda3e17eabeb80e6d97e4f5eea0e29ae61,2024-11-21T08:46:57.010000 CVE-2024-0587,0,0,77138ad54200d6675cf5918f9c4f964baf339e5709c9bb1413429e1cdc91821b,2024-11-21T08:46:57.137000 -CVE-2024-0588,0,0,2c6634afe88c1542e330157f89146eed99849a1eafb10687adce256dda4dee0c,2024-11-21T08:46:57.253000 +CVE-2024-0588,0,1,0b388e3e0b116d6695f41c586068e51c6d0e368f10eb2d6a381240b661f914cc,2024-11-21T08:46:57.253000 CVE-2024-0589,0,0,226846ac6698efb5192efce79755aeadfa69697e910a3ae32d7b46e4b008d86b,2024-11-21T08:46:57.360000 CVE-2024-0590,0,0,de2ecff39d8bb7ecc0e43dccf38abeb5bc3d8547e89ecead319caf442de4085d,2024-11-21T08:46:57.473000 CVE-2024-0591,0,0,98f524326e7fc7678fbc5044c03d1eca3ded8bb9446a3be7808261fe30cea397,2024-11-21T08:46:57.577000 @@ -243081,7 +243082,7 @@ CVE-2024-0867,0,0,52db5419be0dccbc4fcb881d40cec1da4645e98bb90ea08bba07e87daac2e0 CVE-2024-0868,0,0,7d7ecdcf8c305461a4e3471a2c2d7a33c9582d4f24e667b18c66c87e98eac031,2024-11-21T08:47:32.673000 CVE-2024-0869,0,0,8a4513540bf17733b1833d4a520077b6a8ad246c1bc873e6aaab883c3cdb276a,2024-11-21T08:47:33.713000 CVE-2024-0870,0,0,79bfeb4799dba456e2b3d218d051d3996916bcc2d73e30566ebfa2cf974b211e,2024-11-21T08:47:33.933000 -CVE-2024-0871,0,0,fde91a50cfcd461302eeb7b6cb295424cd80ef9e50d654766a02108e82cc01e3,2025-01-02T17:16:05.363000 +CVE-2024-0871,0,1,b104330dcdc66e71e415251a539962d6103050145bf29c2f1306c9471aa84b14,2025-01-02T17:16:05.363000 CVE-2024-0872,0,0,f9337794ed6248d11c50c48564b9fbc77f63b1b10796c9e03f742c3c0cc193b5,2024-11-21T08:47:34.280000 CVE-2024-0873,0,0,f8c2cc3455594babfafaba94fb24b58836981aec56d2a02ce97d01c5aa0a99fd,2024-11-21T08:47:34.510000 CVE-2024-0874,0,0,e6d87c152aec691915c5cf09c2b73c5a2c04f12e41874d2021eb2146aca4e3a6,2024-11-21T08:47:34.687000 @@ -243183,8 +243184,8 @@ CVE-2024-0978,0,0,e5b95e6b8cd60bc606669bd0fdf2ca409c6d12e1690aeeb535a6f721a61918 CVE-2024-0979,0,0,baa5d9094fbc29dc7aa565142f1c9b80958eef1deb5e225475c26bd3e852a37c,2024-11-21T08:47:56.553000 CVE-2024-0980,0,0,0b0cf2cf274aa5011f1334c9bf9f827ad2c15dd7211176348585ac6956002ccb,2024-11-21T08:47:56.703000 CVE-2024-0981,0,0,ff5d0045d5a8a398c8154a7c935f4019293c97480e88e5858137ddb0060d7f11,2024-11-21T08:47:56.900000 -CVE-2024-0983,0,0,914d45697e79a505a77be76eaf128e0e88329aebd661a4dbb9c54e743e949c5a,2024-12-27T16:05:07.067000 -CVE-2024-0984,0,0,b730c9eb4e3cda5325c66780d140a9d5f205de3a66a47679819aed3b27255b47,2024-12-27T16:08:43.113000 +CVE-2024-0983,0,1,b4b7f3ecb682d5ae976a20d43ffd8ad4292920373bd1edcdb3e62baac0703d2d,2024-12-27T16:05:07.067000 +CVE-2024-0984,0,1,4a75d0a6c6fbccb952386c9783605b0ef07b73ece1fcda4d0a50af68953cd21b,2024-12-27T16:08:43.113000 CVE-2024-0985,0,0,a5d15a5d9e859f9dc53b420d16404c5f439648b99dc1e5499dc4dd4c4c093bdd,2024-12-20T13:15:19.070000 CVE-2024-0986,0,0,8af20ad83e0b736451510f1abab02dc3ff951bd6641a28d581e64e2373d25871,2024-11-21T08:47:57.427000 CVE-2024-0987,0,0,1c509a99693a940ac194d4b71fa26fd5461d6e95c22da5284f444c12c11f127c,2024-11-21T08:47:57.603000 @@ -243229,13 +243230,13 @@ CVE-2024-10025,0,0,0e159e5b7f83ed3baac904fb63455340f13a4d77960b5067cf099ced0b349 CVE-2024-10027,0,0,2ce81bd167c32a3d01aeb267dfbd0bca6e3b397ce9c6e6baa5c31b253cd0d4b2,2024-11-08T19:01:03.880000 CVE-2024-10028,0,0,0796fbf5be7450f26989dd3e322b5d85f94909c55543905274765b89027cb4f3,2024-11-08T21:21:47.240000 CVE-2024-1003,0,0,86ca1680684d7f5c1f1b25eaafdbb92bc310c2a58aa6e811c7dcd01deebd374b,2024-11-21T08:49:34.143000 -CVE-2024-10033,0,0,0c8427dfa6c4f6cb04a52dc9de842c0eb3ecfae4564e013d1fe25a6ba0ed9e1b,2024-10-30T18:50:04.137000 +CVE-2024-10033,0,1,0cb30dae51f6c8c918fb97cfa1bd80324f18056fbb8eb56214a09b4659e17def,2024-10-30T18:50:04.137000 CVE-2024-10034,0,0,fee5f4d590b4e5beb00e9934c42c6280bba1fc3aff670550fc1233d40ab51d97,2024-11-22T06:15:17.377000 CVE-2024-10035,0,0,1d712f43023e008a106726b7d0612283e8db958b9552c5958fb255c66dbb3a51,2024-11-08T15:11:25.837000 CVE-2024-10038,0,0,ebd3b63d92012ddaf16057a534e828f3dfcac6a3eb398c1c9f9e757273980dc7,2024-11-13T17:01:16.850000 CVE-2024-1004,0,0,7b6f5b47804b16387719a9bf9a5f5e1230f32238a62387586392ff4de375b23b,2024-11-21T08:49:34.290000 CVE-2024-10040,0,0,f83eb1bf0d191e6ff28c64987d9d925532ba47fbade95b4f2582be8beaa243b5,2024-11-01T18:26:23.450000 -CVE-2024-10041,0,0,4bdc31a40e5b93be22916fa013287a5d9490b3f328b8823606b1e70cc7cff0d3,2024-12-18T10:15:05.850000 +CVE-2024-10041,0,1,e96e7f8c84594419ec030fff853be08e69c9ad7fe29b788dbe2f0ef3912dc245,2024-12-18T10:15:05.850000 CVE-2024-10043,0,0,15debe6a05b2854b66ec2962b60af0c6901f10ade93dabb43ab1785dfa9941db,2024-12-12T12:15:21.330000 CVE-2024-10044,0,0,1d7ade8893de2903e11b513c25d66574af7eec0ab3c2aff1a3e7a655029b82a0,2024-12-30T12:15:05.990000 CVE-2024-10045,0,0,856fc9a539db9327702f3141fe8cd970de60cdb7e18125e39405eb0d41f31999,2024-10-25T18:52:30.337000 @@ -243275,10 +243276,10 @@ CVE-2024-10099,0,0,ff238a91e24fcb0a85fcb34f700c80404c8e345e8e0c333898778e0f4a6cf CVE-2024-1010,0,0,b760c6839f8ba4fc102d84ec8eb422be6a7986ee41491a18032e2ca8b34ccde5,2024-11-21T08:49:35.243000 CVE-2024-10100,0,0,e257ac7ecea7ed9deddddca60657be7d2649829f289e846b06e9d10c365d346b,2024-11-04T19:15:05.297000 CVE-2024-10101,0,0,fec1f0c88678ca99198bb58f95f12b144e2edf82230ea1a8688c401204e642f7,2024-12-20T21:15:06.440000 -CVE-2024-10102,0,0,906252b364857cef0be371ad8a47aa6b14b73ae692c77500512501801da251ca,2025-01-07T17:15:17.017000 +CVE-2024-10102,0,1,14c3070178a8bce600d1f99f94f1a64563a91b8e8cd03146ddf491b3f5c1cddb,2025-01-07T17:15:17.017000 CVE-2024-10103,0,0,e854e5edfcf43e70adfea03c62a4fcbb787ffe431d5323bec06ca7656746d9ef,2024-11-19T21:57:32.967000 CVE-2024-10104,0,0,edcf9a609eefa3129230f441c58905f876237c83c0092e5bc98e317fac05c0fd,2024-11-15T19:35:04.683000 -CVE-2024-10106,0,0,0dc16f828d77ef443f7b29af6285c9d4a8f217572ca6372dd601d613d97365f1,2025-01-09T15:15:12.770000 +CVE-2024-10106,0,1,c19f37d23e68d7d6bfbd50fe1e1717e36bff712a011940130142f9c3bf1a02f1,2025-01-09T15:15:12.770000 CVE-2024-10108,0,0,57e3bdf5c93deb8dbbc7ad9bd9f5c8802e9586c3214ce14e9acc02b653026e84,2024-11-01T12:57:03.417000 CVE-2024-1011,0,0,bfb7dacaf11538e8035ffab6b60ef05605d5500427c2dd2c2a27b471f6c2bfbc,2024-11-21T08:49:35.437000 CVE-2024-10111,0,0,097f42f3ae37c905f2ec02b1d69af706261083e42346720ac9362d7f1a50c012,2024-12-12T04:15:04.633000 @@ -243320,7 +243321,7 @@ CVE-2024-10147,0,0,a56a79fe5a06b98cc0b76112510f81c153284d047893303acf550d79857bb CVE-2024-10148,0,0,db0d5db25a1f49f9ba7e42a06491994c37a2b37e9a76e3ae4cc30f2bbf70efeb,2024-11-06T16:02:22.120000 CVE-2024-1015,0,0,be928180cb003f6a5eec5ab2bae4726bcad9bf29373863ff5830478d50997929,2025-01-03T19:15:53.587000 CVE-2024-10150,0,0,fac5f7de9492af33015847edbbaf4e66b672db3781dc50dc161c61d03c3e187d,2024-11-05T17:47:35.353000 -CVE-2024-10151,0,0,8fcf0e00def7266a6dd970b913a0e3ad3be5178b25bb43398424a38a9aec0aef,2025-01-08T16:15:33.753000 +CVE-2024-10151,0,1,196e4fe4a8a05e0a3b22ed32baf3158e628b58ccada6bd06daf1c3495376c183,2025-01-08T16:15:33.753000 CVE-2024-10153,0,0,205337601504c6a6060c88aa213139cbdb5096813b7204f786c736b1a09bbbe9,2024-10-22T14:45:04.670000 CVE-2024-10154,0,0,8bc22a596ba6d08db60619a5118141d0b00a385670008138b09554e9c573f4a2,2024-10-22T14:44:47.807000 CVE-2024-10155,0,0,542e5dfc2b62b1a1ca578686c2a8ae79931c9e86cdbac20993e8c86f6a9756d8,2024-10-22T14:43:42.607000 @@ -243379,7 +243380,7 @@ CVE-2024-10204,0,0,c1aef3d759e33911bc7bc0be9dac4b362c17b81fcf2e1e72015f81b94fc1a CVE-2024-10205,0,0,9a0aaf8f4dd4934a818d3474215b87b0af2018b85b12463338a39662b937ebfb,2024-12-17T02:15:04.670000 CVE-2024-1021,0,0,56f2f9eee79bdc92dbb448a3c95eee6b8f89b4e054d4b7192e1d1c62db78aeca,2024-11-21T08:49:37.003000 CVE-2024-10214,0,0,467db0fceb73548b6a7ebc4075348a74b9e7e348b74ad43d9d19dc1d995ea230,2024-11-05T17:03:22.953000 -CVE-2024-10215,0,0,690b780025c01a63b91324817b83455a57d2fe23d09544ba821fabbbf8cd2a8f,2025-01-09T20:15:34.410000 +CVE-2024-10215,0,1,a9ecab0e7fd724c3c030f0f2e5a5be988dcb02c7bfe8250e94af3209351f05d3,2025-01-09T20:15:34.410000 CVE-2024-10216,0,0,3b33d4ace8102c37cd94e685981da92ecdd510dbca3a990bc771780d9758061a,2024-11-23T04:15:07.523000 CVE-2024-10217,0,0,1895a265d2132d6d454e49e4937a0fc01a8d5847eea053c3e93a0984b4bc0700,2024-11-21T17:15:08.813000 CVE-2024-10218,0,0,8c98b77c90ab06758cb11fcdce58d3e978735cbcd3800c729831353228a0e6df,2024-11-22T21:15:07.950000 @@ -243396,7 +243397,7 @@ CVE-2024-10230,0,0,0b6a0fc884e5ae244e576686edf454ca3ce274c75c14a9d5a28d123bec664 CVE-2024-10231,0,0,1cdb8518034cbde6323ad37f5ecdbdd8647d8b70c51f5e1314952e0041e1b97b,2024-10-25T17:01:55.633000 CVE-2024-10232,0,0,0d56e4d1ad2ea7a2574f878dbfab6b288953236c47236ee86211a53fb0dc2629,2024-11-01T12:57:03.417000 CVE-2024-10233,0,0,0f0fa741bc160fc828eb74121d2173934d2af8a73c34c7d13db17f836aa89919,2024-10-29T14:34:04.427000 -CVE-2024-10234,0,0,ed8db8b846566a2fb72acf5c4c36d35b6d74238b056bb8ac36a1bf474a011683,2024-10-30T18:50:59.883000 +CVE-2024-10234,0,1,0a07df80914e66d5d85b955c292b2b3cf0e6c594aacdd956ae88b148b50f22c3,2024-10-30T18:50:59.883000 CVE-2024-1024,0,0,2ce6ea613c0f5fbd9eefb91502606b7a8afa5d8203c0988924a996fbe7be9c49,2024-11-21T08:49:37.560000 CVE-2024-10240,0,0,276dba492b8757d4f6f0835618fd41c3d6de1d38b01e674953d2dce8a8014991,2024-12-13T01:37:16.177000 CVE-2024-10241,0,0,fe3dcecfada7c3764490fec385526c423fea05ceb1d8cfae03a9be08ced791ff,2024-10-29T14:34:04.427000 @@ -243515,13 +243516,13 @@ CVE-2024-10389,0,0,335cd052454e4163f5f8f1fbd243a8894512635ded4cb9fe46c87f8eafca2 CVE-2024-1039,0,0,2867c46e630f2141eef34adefe8c02e7e1c3b8751b5733406e42c25ea3c4bf22,2024-11-21T08:49:39.647000 CVE-2024-10390,0,0,eadc75c0265a2251af0e90207242caf2d4c771cd929a6213a0b7a52a99ae2c44,2024-11-19T21:57:56.293000 CVE-2024-10392,0,0,83d379ab85e5e89a3576ff9cf8715105eb816b9252912e835661d530611c1ac3,2024-11-01T12:57:03.417000 -CVE-2024-10393,0,0,2895712dcbc8203607f654b2d6f604c45ff9b0eb94bfb72c6f60f48dd9fcb0dd,2024-11-21T13:57:24.187000 +CVE-2024-10393,0,1,18a8d4efbb87a6fec0ef5ad25f08251b37f87e802afde349e0ca73037e8fcee5,2024-11-21T13:57:24.187000 CVE-2024-10394,0,0,1c13062239a25b9cff9e6f26f1b26f8ee25a1ff47a2d83f4af8592b1a7803dad,2024-11-21T17:15:09.443000 CVE-2024-10396,0,0,272e67398031519d0ec84db2984b2070d0fff6896ad84074c3b533bb58587972,2024-11-21T17:15:09.647000 CVE-2024-10397,0,0,eb0a841cfeefac1bdb6f8751be98fffeababa67bb8b15c52555a33acc05c4b9f,2024-11-21T17:15:09.860000 CVE-2024-10399,0,0,095406f8d5039a96c9b15f66c9c6aae69fc16e07792e432307aaf1afc72e7d79,2024-11-01T12:57:03.417000 CVE-2024-1040,0,0,0cf971725042aa5f584fe060b54c880b9831934b517dc5a41c0a4db005bb079c,2024-11-21T08:49:39.783000 -CVE-2024-10400,0,0,c3d7237e474b90f51d2184593e4df2886c2a12958a92d13ee5e54246ba316e92,2024-11-21T13:57:24.187000 +CVE-2024-10400,0,1,3759d39d735004e5c08f52c1cb95cd17845c5c560a4e744323f137829cf4b7b1,2024-11-21T13:57:24.187000 CVE-2024-10402,0,0,3bec3b03f6b37743b2963c176dfcef56ddbbfd70980eeed7f59bf60f8417973e,2024-10-28T13:58:09.230000 CVE-2024-10403,0,0,959dc138610d6ad2c1d126ef9cb21459a598e94cf8d488cf1201a4cf13ecfaa2,2024-11-21T13:57:24.187000 CVE-2024-10406,0,0,3ea80fa9309bbe01bfc18fc28a58ebc2cd4384a2976470d5a0c7d74740e10fea,2024-10-29T20:48:36.967000 @@ -243639,7 +243640,7 @@ CVE-2024-10523,0,0,7cc4719be638488b8b84233b435754a6a5dcc357f333b40290bb3e99a0f90 CVE-2024-10524,0,0,c2da650c8fb959e3655afb050ea98d59c38083a2db2a6841d4636c9a53404b99,2024-11-21T08:48:42.313000 CVE-2024-10525,0,0,bda89aff8006f9fba1d6edcae335516aad3cff7775fec489bf06a3c7c2abf668,2025-01-09T18:15:27.403000 CVE-2024-10526,0,0,6f7e328f774c00887292c6a9b6f09466273e7b5111063f43f180124280a00fc6,2024-11-08T19:01:03.880000 -CVE-2024-10527,0,0,2ac72a7f22b2d63c7ccf4054363b685d4c86d8a1de32c24784406b994a4aa3ee,2025-01-07T05:15:09.497000 +CVE-2024-10527,0,1,20f6d41e5e29e0e302182412500b2eb2a130577c2466d9fefa23d1fc9b785595,2025-01-07T05:15:09.497000 CVE-2024-10528,0,0,e18f91787a7b7b21f226c7e02b70dcb124a943b826e8ab41e00995ddf212c285,2024-11-21T13:57:24.187000 CVE-2024-10529,0,0,09425f1304014f480214fdc78529d3afec9b9229f4210dd5066c18fb4e21651d,2024-11-18T14:59:15.043000 CVE-2024-1053,0,0,edba6f19243ea494247333ce0355ab208593a904d055289e97a636713af04970,2024-11-21T08:49:41.450000 @@ -243649,7 +243650,7 @@ CVE-2024-10532,0,0,f3826ce705d2650c9f0c8c72a6418942413100eab375a8315e8ccfd6195f3 CVE-2024-10533,0,0,723801c2a6b49d5fb26e61442e0ba52d6cb0cf007527bfd8af0f264000609c75,2024-11-18T17:11:17.393000 CVE-2024-10534,0,0,73693b37c20d14c201bbf833a0b376a95955ad7bec222e3a454bcf2d9cff25a0,2024-11-19T19:08:44.727000 CVE-2024-10535,0,0,496e3e4073abe2adad8b54d5ee745431f58893a256de2e44bb2f056357efc2c8,2024-11-08T21:19:27.540000 -CVE-2024-10536,0,0,b7f90b63ed51a255637dd678ef409199eb3c89c4bd4b1acaeb7689e7f1b8f159,2025-01-07T06:15:13.920000 +CVE-2024-10536,0,1,a823233131559d6dd2b341d836be9135c9879264a324c21b5db4b4eee461a226,2025-01-07T06:15:13.920000 CVE-2024-10537,0,0,245f407c71543e9ed1f1e8091a091327bb8b8bb7a6ad44fab60dad856af50407,2024-11-23T04:15:07.663000 CVE-2024-10538,0,0,61014a490bb67ac6333227cbe080cbc3323afad1485db0781083c911c48fb77e,2024-11-14T13:27:00.400000 CVE-2024-1054,0,0,94b651608db3d30d3daebf6e295a99b6cb748f5b340c93c3e226c28c09fa8fa8,2024-11-21T08:49:41.570000 @@ -243669,7 +243670,7 @@ CVE-2024-10557,0,0,e65f5d89b91c24f295e5cbd0f813e2ad8ed04df13cf96a919800b770566f3 CVE-2024-10559,0,0,16e3eab9e781d1e16f0d045b8d1d79bfb09e11f3fa816a22b4936c2b8431f9e3,2024-11-01T20:43:41.070000 CVE-2024-1056,0,0,af182e17efd4af1cb9d6458d1d7d67974a36b702d2e517ba61380bf6c671d68a,2024-09-19T22:06:32.340000 CVE-2024-10561,0,0,2bfd240be58df048fbf99413f7d4286366df5405b43b9b75120456be9297f833,2024-11-01T20:42:12.303000 -CVE-2024-10562,0,0,86906989a3e088ebb6be07468d3bc50f1d72791587d96a7ee77dfe424b82a1ff,2025-01-07T17:15:17.290000 +CVE-2024-10562,0,1,797cf6d554ba2a4f7d13cc51d352a15019c8c3fe24a53e57cef8fc7c31733023,2025-01-07T17:15:17.290000 CVE-2024-10567,0,0,a04d3f3d999e2b2d50068629e658949590c474642a1d298fb74a13508e02b197,2024-12-04T09:15:04.177000 CVE-2024-10568,0,0,29a6369be6bdec3fac3a49600567225eff324bd19cbe3ade1e99b53075e8cfa9,2024-12-12T16:15:11.250000 CVE-2024-1057,0,0,82d074eff87805c0c8af6f292d67be991df4f6c4e8e298eece318c63dbd97000,2024-11-21T08:49:41.890000 @@ -243686,7 +243687,7 @@ CVE-2024-10580,0,0,7cbec3926b1e0a5918766b8a0adb238fb5e9aded2f47a47f3fe18631e2f40 CVE-2024-10582,0,0,081ced1e3bee3a0a102c94bdff81bc48301372e830a54bd85e35429dcce93b3b,2024-11-19T21:17:53.003000 CVE-2024-10583,0,0,2dd8fa86d783214098b78ecf15207bb297f91c4a4766bbf054ba7ce346e63980,2024-12-12T07:15:05.570000 CVE-2024-10584,0,0,884bde099e6baaab8d72bf2690b23c625dcbcb424035217f134401aa3c174ba2,2024-12-24T11:15:05.670000 -CVE-2024-10585,0,0,d2c01d00826f1b53e6df968ffe207a192f82d1c91d1989f925d703c622e2e51c,2025-01-08T06:15:15.677000 +CVE-2024-10585,0,1,f12d435804fa4de7aca87596b57c1b0c6052cb4bfeb9c890d3a2babcd12f0d7c,2025-01-08T06:15:15.677000 CVE-2024-10586,0,0,b69dc43541a3d4ba79cbec846432fae4b52e3fc26bdbf2ae2d19921cf034fb0f,2024-11-12T13:56:54.483000 CVE-2024-10587,0,0,d6724952982058693533d93eda32abe5adf3dfced7d03365b0a9849e1c3651d6,2024-12-04T03:15:04.037000 CVE-2024-10588,0,0,abb174590e2c3805aae308cc65206f91b43bf77d5c69f89364fb1f1e9e31b3d2,2024-11-12T13:56:24.513000 @@ -243889,7 +243890,7 @@ CVE-2024-1081,0,0,4e0bb84bfbb515e8e6662d2f875a9bb7899411cc135025881bd47d9f276345 CVE-2024-10810,0,0,462940493f0b1c5b280616ee9b6e4ca0acc2fe73d901d9b38b41895de26ba591,2024-11-06T15:16:12.497000 CVE-2024-10813,0,0,8f0d87c8561d66a428b124b04ac3dd7eb7202f93dd365239b75e2107b61a0c57,2024-11-23T04:15:07.800000 CVE-2024-10814,0,0,24cd3cc9c72ab7020b87ed743b9bbaf59702cba37c3042eada5a620d131514e7,2024-11-12T13:56:24.513000 -CVE-2024-10815,0,0,6dedd8b9c56b86dc375a171e36ba5934f6968c6a5785fa82859c5e5636f79c27,2025-01-09T16:15:35.800000 +CVE-2024-10815,0,1,8293b7f99c0a99e37b8296b8a7313de52e7c982a394f3ff15ff11be7d8d607b8,2025-01-09T16:15:35.800000 CVE-2024-10816,0,0,26285e9b2ee00beb2b7e65eb9860b931d998a377d6a13b3bf8cda452f0b657d2,2024-11-13T17:01:16.850000 CVE-2024-1082,0,0,15848b2b0524454d542c04087dfa80d78199ba8d7edfbd0b12b87db452374b0f,2024-11-21T08:49:45.430000 CVE-2024-10820,0,0,bf9d28b16e948ef83988df033dfb0ac82ff3713b45d4528e33ad22cd94422f74,2024-11-19T17:38:16.363000 @@ -243925,7 +243926,7 @@ CVE-2024-1086,0,0,688e2fb2892801c230e1dfe45afd0a98166e64f80974b1a593d490f3471fc0 CVE-2024-10861,0,0,a0a9ed450f8163c1435b46341b966a17dde352d3f4e975547d6d20959f88110b,2024-11-18T17:11:17.393000 CVE-2024-10862,0,0,2f313b0fb1bab3d86541b1d2e1ea749c0f2dc7ab6c38e8014676072089ae2b72,2024-12-25T07:15:11.190000 CVE-2024-10863,0,0,b5b227485fbe2ef5029ee042bb93b4e86d4e47bdafc29c909ac7a75d6e0d47a4,2024-11-22T16:15:21.257000 -CVE-2024-10866,0,0,a9d858e3d2316ea92e8c0c22c78de3af6f497d3155624e469e9c62faf7b9311b,2025-01-07T08:15:23.060000 +CVE-2024-10866,0,1,13e110d5a19cfea89d073cb1ad5330e517869c323a871281199fd8e329b3e697,2025-01-07T08:15:23.060000 CVE-2024-10868,0,0,ed5c74cd38793a3786fe1a207774b7d893f356dc5b7738c219f7d841c4557dd6,2024-11-23T04:15:07.930000 CVE-2024-10869,0,0,24e83078acb589a8bf17812dbc3140ca72ecc1dc51859fe588758bfcf79e45ac,2024-11-23T04:15:08.073000 CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000 @@ -243947,7 +243948,7 @@ CVE-2024-10884,0,0,16baa0ddc60b6914a200a885f7a19af70c42e03c111f9014bb7a8fee34834 CVE-2024-10885,0,0,a8e0aca0ed6b583e8b35f4d777bb46a35ed2c0e733f662c3c92bd53f59a064ba,2024-12-04T04:15:04.133000 CVE-2024-10886,0,0,06f1f0696fb00e4c4215846a85793d2e105a22d4a4fa004e0272eec7b05b7d02,2024-11-23T04:15:08.340000 CVE-2024-10887,0,0,fb1e1a2823528196fcc2145f8cf57602578b0b49c0e0002d9570cfb1dfea2ec0,2024-11-13T17:01:16.850000 -CVE-2024-1089,0,0,00bc7373160c902e28c9024d7ab1875cd57911fe2d32770007c709c73dcb2ea5,2024-12-27T15:26:53.030000 +CVE-2024-1089,0,1,147c65c4df1f886cc65952aecf6bb1b3cc2c957147d34449879a4278306dd3c1,2024-12-27T15:26:53.030000 CVE-2024-10890,0,0,291737e09e39acbad6d8cc1c52c0ae5cd2168a1e41e273e4ff02b1422afae399,2024-11-21T13:57:24.187000 CVE-2024-10891,0,0,6756c0c33d7417e4f522126d4552796d2cb16a6b1d07395aaddee44058a352b0,2024-11-21T13:57:24.187000 CVE-2024-10892,0,0,8e3017fcb4997696be5d41543367e2c13d86752e79c067544969077765372ab5,2024-12-18T15:15:08.067000 @@ -243957,12 +243958,12 @@ CVE-2024-10896,0,0,e962891bb7ff0bd290fd7c88332bde91f2f69d0bdc8b8df6012dc8f056efa CVE-2024-10897,0,0,b52986d028914704172403e43ebe70daf322cea1711e1657c62b53facd1dfbeb,2024-11-20T16:09:16.643000 CVE-2024-10898,0,0,d9a5fb3426672bd932cc2ebb845531319083e29bf1e7e7f09eeff58772f4f200,2024-11-26T20:32:20.217000 CVE-2024-10899,0,0,3278ed9055fdf20d3bd937513eb10691156bd1e9c65996b252cdb3333f0a4c29,2024-11-26T21:01:21.643000 -CVE-2024-1090,0,0,25394912143750ca3ffe33d94e93f357a3dc60f87581aca09b64a7b29ccebdf4,2024-12-27T15:41:41.897000 +CVE-2024-1090,0,1,bc0bffa7867d1fecd545d2e7f7fb647c415e4e72464ebb88604cc3a8a49285b6,2024-12-27T15:41:41.897000 CVE-2024-10900,0,0,5438023601d5947725ce57a2b51b24b31a697395c49ac1553534945223b38a58,2024-11-29T20:58:31.967000 CVE-2024-10903,0,0,4b83af475b2ee1b428df17dee5389cac414e31e1e9acd0596c2e9a6f9d70e177,2024-12-30T18:15:06.253000 CVE-2024-10905,0,0,98e243c9c6d3626765a0f5bec050b58ca35d0a0d124978428fd582cb710fa7ee,2024-12-06T18:15:22.207000 CVE-2024-10909,0,0,8a3e5be040021a81e0e5e83c9e95ad90e5ace916bf19a03e529e43ec6a7f9976,2024-12-06T10:15:05.107000 -CVE-2024-1091,0,0,d045bb00be6b727b8446a1313ae1a5f17faa5a6975f018f9a79f0e7c5bff1bb0,2024-12-27T15:45:27.200000 +CVE-2024-1091,0,1,fa73b748b3282d0c18d5fab689944bdcb646646e83d04482ca4b128ad52fd399,2024-12-27T15:45:27.200000 CVE-2024-10910,0,0,12cc5162d3cce57df46ca9addf59b20cc86c6f311c37d3d38568ce7d7c80fc43,2024-12-12T05:15:07.183000 CVE-2024-10913,0,0,639e0b55d02891f5478b4712f7fb23002245caf49026270fe765e7bbdd3b73c7,2024-11-21T13:57:24.187000 CVE-2024-10914,0,0,0c0e1d2bc49848006e629bb079ed677411f0de4d90fb8273d64b81628c286fd7,2024-11-24T15:15:06.090000 @@ -243979,8 +243980,8 @@ CVE-2024-10924,0,0,f1198492ea5d0448c480cfb52c449c77b28f46a760324baad7abe4da889f1 CVE-2024-10926,0,0,ad47f219103ae4ebd92db7592078769652c8133d266b35358f61dcfb9dc4e1ed,2024-11-08T19:01:25.633000 CVE-2024-10927,0,0,f09c2725d755f5937d35809a87d5ada4fd8d3d09c9d48fcc66b16a3fa883071d,2024-11-22T19:14:48.190000 CVE-2024-10928,0,0,862f1a88452be3b22edef7e2642809ba572832547c6da90647052695aaf77de0,2024-11-22T19:10:19.290000 -CVE-2024-1093,0,0,89814f1ec92fa01b227d327cee36cd67dae02b4651cb82beaa69cd86af716337,2024-12-23T17:03:58.370000 -CVE-2024-10932,0,0,dd1801d9fe19d3b021c926320351c8fe410752e761eadbfbe1152e13e75c9b36,2025-01-04T08:15:05.713000 +CVE-2024-1093,0,1,ac60ea90a5bdbcab92bbb148d0d6ccb636fae604fade2bd9337658c1f747481a,2024-12-23T17:03:58.370000 +CVE-2024-10932,0,1,28109702b795f9356a11af2c3727eebea623b98c280555fa2778753a6b0d3d2f,2025-01-04T08:15:05.713000 CVE-2024-10933,0,0,04454997e745a68880991c602cc8325b99e3c53905740538bda66aba85b8cef1,2024-12-05T20:15:21.417000 CVE-2024-10934,0,0,6dae70f2d9b047711f71d589675cbcb98ce87c40154b32c6e0f536ad5d783b6a,2024-11-18T17:11:56.587000 CVE-2024-10937,0,0,f3549007a000819e9c2b92d84627c6a8f0950225e9fa8a067012e5b6f0eb9781,2024-12-05T09:15:04.377000 @@ -243995,7 +243996,7 @@ CVE-2024-10947,0,0,9ca33a842e00d3bfcba6a4108f29e96d0bb33f4c08646ed141de399ea04b7 CVE-2024-1095,0,0,057a33d2e1acbd5bb0e3f092aa306aff7c071f56a28760869544731f02ce5e35,2025-01-08T18:05:01.880000 CVE-2024-10952,0,0,edff8b29d26accda4a8e33f169e18ac16231b4d8b9445539c32344bf5f44c6f1,2024-12-04T03:15:04.593000 CVE-2024-10953,0,0,94ed881c1741c9a6db86af195e84904697442fcf31d986afec17a96f3fc5a311,2024-11-12T13:56:54.483000 -CVE-2024-10957,0,0,964548a9eedc46fb360cb39aa44c4f64670d84e4a05047fcfa8e2648b39d5482,2025-01-06T17:15:14.853000 +CVE-2024-10957,0,1,d1cb42f5761d863482eb30829593415e9d53941312c7ff44dbe5eee56f45c4c0,2025-01-06T17:15:14.853000 CVE-2024-10958,0,0,ef36e0bbdfdc2ca66f68ef0f42219502fb71c2dbb5344b8f90bed966330b4e84,2024-11-14T14:57:23.103000 CVE-2024-10959,0,0,fa8e8dfd4e8771ae8c76641a0e2a5e25525492fab6efcc641940a89152f76196,2024-12-10T11:15:05.913000 CVE-2024-1096,0,0,361a397f658718594f88eb8768eb59d67142285dd6bbccd93ad2ca45f5461047,2024-11-21T08:49:47.217000 @@ -244004,7 +244005,7 @@ CVE-2024-10962,0,0,01c3565bb569e73f17c44eff56e212818b4d6f0ce2501db43a4a28cdf597d CVE-2024-10963,0,0,3e61141d5828693cdce9d001c960b53c15a790c4b479fe9fdee66649acdf3afb,2024-11-11T18:15:14.487000 CVE-2024-10964,0,0,57b272f10f583f57ad350a67bc460132637ea8e73b01849caa65e88235230d16,2024-11-26T01:36:31.033000 CVE-2024-10965,0,0,7a48e746780c9b936f9156485d79a795eb32972691169d69dc596fa55046e4dd,2024-11-23T01:45:14.267000 -CVE-2024-10966,0,0,96d20283615ddcd72f8fb0ce7c3259f27d2b882522f620aa1673124372d6f3b3,2024-12-16T23:05:44.547000 +CVE-2024-10966,0,1,940a6aef958e50ed4b3a188f2229021d11978a0a59da9bcc6fcf59b346a356a0,2024-12-16T23:05:44.547000 CVE-2024-10967,0,0,7c3473c2b77a8d05803cf7f270943b5290b5d24c3b903af32185338840b213c3,2024-11-26T01:30:41.650000 CVE-2024-10968,0,0,a921b8902882d4801f626f2f4054af6a15bab4d0cf4468f9642e1f86377f1fd9,2024-12-10T21:10:06.700000 CVE-2024-10969,0,0,8114c2dfe952beb461c299d8bda61eb6b5ef295ee43d6de90e2c4aa8ea5fd65c,2024-12-10T21:10:24.593000 @@ -244036,7 +244037,7 @@ CVE-2024-1100,0,0,06d4324d0991a4d3753bde5966a9b264dffaf09b28ecc31d28a9b56fac7549 CVE-2024-11000,0,0,a38dc4ca4277a8132ad2903c6c182b631811d1505019b5b41baf3535595f105f,2024-11-13T01:05:49.643000 CVE-2024-11002,0,0,540046c3a7a5e2c208fbfda3876432629143ca7cdae67f847887a838d1bc9e67,2024-11-26T07:15:05.413000 CVE-2024-11003,0,0,a783ec5f16b410f220d004ec7b834ae4a4b65091c9d3bd08888ea586385d6942,2024-12-03T14:15:19.800000 -CVE-2024-11004,0,0,30fe68a257b05692750323b521c5f518985bf9c969788c60d49e72cf40cd29fa,2024-11-21T17:15:10.277000 +CVE-2024-11004,0,1,c86401c527ca6f5f0a9205cf0715437a3fafb64c5af6d4365f51aecef1d7677c,2024-11-21T17:15:10.277000 CVE-2024-11005,0,0,975391e22047d3945c6f3bb53e7adad1d72b5dc3bc794e99654eb1b89426f12f,2024-11-22T17:15:06.803000 CVE-2024-11006,0,0,0e93ac1b0efb24ee7d808883c78ff1d229849a32cacc57a86392940297a299c2,2024-11-22T17:15:06.913000 CVE-2024-11007,0,0,62a2e0757d628f20a5e5c0dd4a347b28f717af7d2afebfa5668d63b84e88b9e1,2024-11-22T17:15:07.010000 @@ -244162,7 +244163,7 @@ CVE-2024-11150,0,0,ee08facb687c71e0758a3f80ca5be44dd7cddce83b66eb6f473227f03ba90 CVE-2024-11154,0,0,1d007c9319ffd27da392e9be5bae93f9e0fe9120d11601f0387b6b03bc9f2945,2024-11-21T13:57:24.187000 CVE-2024-11155,0,0,530e524be04c0b7fe606872e87c893c102c89b7b134235dd71b8ab6980309d75,2024-12-06T19:15:10.730000 CVE-2024-11156,0,0,ad330dfa68e720fee623103f418eaa62314e3a272ded75cde56e9603a3ffe667,2024-12-17T15:52:01.670000 -CVE-2024-11157,0,0,68e8ea118c58fcbf675ea2955cc9dbdc7a86bf3fe379b059118774e196d4e0cf,2024-12-19T21:15:07.283000 +CVE-2024-11157,0,1,46fa8e84a9094cedbee3a638fb30c1363b4dd3f92c019e2375210fa5fb864092,2024-12-19T21:15:07.283000 CVE-2024-11158,0,0,f4277fb3bb3323487bacb0f214f68a39e123c47bf4125591e2d6d331c6396761,2024-12-06T17:15:07.970000 CVE-2024-11159,0,0,8afad29dc7b40793fcd69369c055be5c54db43acf2a2aa9e2c3ac35746277cd8,2024-12-06T20:15:23.937000 CVE-2024-1116,0,0,7d8d96f7c323e069e605409b474b2bd18744f4c3487afdd2599b3edaac1467cd,2024-11-21T08:49:50.050000 @@ -244218,7 +244219,7 @@ CVE-2024-11225,0,0,49e01dccad3ee4a4adc9a23405324c84c815ee3ae2fa63f77a3607812451f CVE-2024-11227,0,0,4429f46befcca636641488313efda0ce9e85d610d1a8222594e7b609e2557ec7,2024-11-23T10:15:04.083000 CVE-2024-11228,0,0,ea3ea506f494760971365e8cc08e4c50cc9e1b3e56f38ea31b32e4e82646f717,2024-11-23T12:15:18.577000 CVE-2024-11229,0,0,f216e4e055884628872bc9827bd59bcb71e0c27eff667134ca7f40729f0e7955,2024-11-23T12:15:18.983000 -CVE-2024-1123,0,0,8b17d130c61ae38981c31032a4e85450c1b0fc32b8189b46d005a999a3b68420,2024-11-21T08:49:51.077000 +CVE-2024-1123,0,1,32722ac37bf46fb652b70714ee1da3fd4c2e7c9665a6ed492d047550b454296e,2024-11-21T08:49:51.077000 CVE-2024-11230,0,0,a616c425830dab899eabf177b24f5555ccf0670a3cefb55f20054d7baa25cf22,2024-12-23T05:15:05.800000 CVE-2024-11231,0,0,1babaa8434f0dabb897e61577b0db39dc3dbee760a24a16a5980940fb44c99a3,2024-11-23T12:15:19.387000 CVE-2024-11233,0,0,f693569babb39b28690250bf399e234d5652aa087fc09c6fa53135c369c0e730,2024-11-26T18:26:37.783000 @@ -244227,7 +244228,7 @@ CVE-2024-11236,0,0,550d85bfafd1434d8d927c6d8dee8c7c226d05255dec5cf2f93f8237a1b74 CVE-2024-11237,0,0,1dfab8d857aa65c1da3cce61dfbf4297f61d66aac666c992d2b23a44599cc4b9,2024-11-19T19:04:14.987000 CVE-2024-11238,0,0,8ff90f478e5080e5784d0b48ba4f92cb68bcedebf032cd07ccd187e39fa89d52,2024-11-19T19:01:13.060000 CVE-2024-11239,0,0,4735abfe3fc47439a8f46c4628574fb109a45cfc8a7386b806072387724841e6,2024-11-19T19:00:43.230000 -CVE-2024-1124,0,0,7841bdf620a397e2817f7f6cc379ed22bc89b72d1908131fd70a6a872c2f4941,2024-11-21T08:49:51.203000 +CVE-2024-1124,0,1,93efde3c7a05038a0c6f9962639a748adcef7338f3620fa3d033ec605d3fbf17,2024-11-21T08:49:51.203000 CVE-2024-11240,0,0,6be2a91d528c3a4c7175bfb99e91b9f0e24a720ce79ef3e39c80f0d4b3343539,2024-11-20T15:09:05.640000 CVE-2024-11241,0,0,e6ec4021849264870c0f2e9dd96d3ad3cc92866011c3601b9dc89bba8584b101,2024-11-20T15:41:34.393000 CVE-2024-11242,0,0,8db1192e3fa3c4ab1fc7cc9a83a6088c96b5a038163c1366289c4697bbe4ad49,2024-11-18T17:11:56.587000 @@ -244237,7 +244238,7 @@ CVE-2024-11245,0,0,3868d85bee15596e18d90d743d189cb00c43805781b6a27dce308f812593e CVE-2024-11246,0,0,b59dcfa6da5d52729d620a8c054b6e313170600211d522d4440f6fdb2ab7ab9b,2024-11-20T14:35:51.070000 CVE-2024-11247,0,0,b596229e9a83fd7b97522e41140de97dbd27f0f6c2cfd461d0e494401274f19c,2024-11-19T21:55:35.283000 CVE-2024-11248,0,0,e949ca81c35849785cb57c05fa4cfa4c83e0d863fa1f747727d022cf62711013,2024-11-19T21:51:57.467000 -CVE-2024-1125,0,0,dc5b54d054e72b77ddaac01d062bdb38da667c754da803a72000bba0d9623cfc,2024-11-21T08:49:51.320000 +CVE-2024-1125,0,1,35f3eb4fdef5aeda8bc5c5a6f7eae5a72c329a418fbacbe3a79981620a5e60f4,2024-11-21T08:49:51.320000 CVE-2024-11250,0,0,30ad3d0d58cc914838a0c9f0ed52ca375c320917547ffc5deccabf737c546160,2024-12-10T17:22:10.547000 CVE-2024-11251,0,0,a5e300dd05d8f2142172ae8a0de73066b49d6ea2d842d19c278f24903bcb19d9,2024-11-18T17:11:56.587000 CVE-2024-11252,0,0,e3a49be80375d7d6eb07a5b8ea5fe1ead6b27bf2476ff0719e421b392fb0b61d,2024-11-30T06:15:17.580000 @@ -244246,29 +244247,29 @@ CVE-2024-11256,0,0,30f7d19719f67ba63c2030d41b8ecbc41608177c8376a62edfd9dc345be8a CVE-2024-11257,0,0,b96233e0d3ce67cf21f4e9f7807a6a1ab2c5647b6c783486e6d663acf9a8bbd9,2024-11-19T21:24:40.443000 CVE-2024-11258,0,0,b92dad8d1bb6f081dbd92f3c42d86d75296924d80ba167376d7d843bce1f48d5,2024-11-19T21:24:27.473000 CVE-2024-11259,0,0,9646b1c84e05b201fbae9644480c07a1fd89adc65f5074aa5e44f275cf69f9d3,2024-11-19T21:47:38.857000 -CVE-2024-1126,0,0,5f417c4414013d380baf6fc9425c424bd84884c0a95235e4400557be0bfc4467,2024-11-21T08:49:51.430000 +CVE-2024-1126,0,1,a503049dcf5704a09f5662f1a5d92ab77378ef698a2ec45424694c07a736924d,2024-11-21T08:49:51.430000 CVE-2024-11261,0,0,ebd0147e6a6ab1ab0e631a63b82775c203c78389943f8839aa447a17b71fca13,2024-11-21T23:21:32.573000 CVE-2024-11262,0,0,2fc2d8fe2ec6c0e4d2457bea194bb9fd27c0134f7b30d56376be41870a4428a7,2024-11-21T20:52:29.160000 CVE-2024-11263,0,0,cc23e994a38bc31df951aa6a58125fc0f0777c81e47c57f81b464948cdbf25e8,2024-11-18T17:11:17.393000 CVE-2024-11265,0,0,cd84e375ba34be8f1d8c0a95984eed473f1b4c14b99dc4b41ab53021d7d29454,2024-11-23T06:15:18.310000 CVE-2024-11268,0,0,65d234ad05896fe7713da8af2e2cfd7055c2e949b8bf81d6b5e68616c5bf2258,2024-12-09T18:15:22.120000 -CVE-2024-1127,0,0,156ab4f781dcbea8349dccaf03d8331b37e207b23f13868177d2fc6d72956211,2024-11-21T08:49:51.547000 -CVE-2024-11270,0,0,47015439a044c94deb2da0b274a280064e9d40db302e2ee440631fba0ef40f0b,2025-01-08T05:15:07.783000 -CVE-2024-11271,0,0,e32a44b08727ee63cfba76a1102837dc8cfecc53b46f96c891552d834ed12882,2025-01-08T05:15:09.273000 +CVE-2024-1127,0,1,69e6c7a75d6526ea0c9a9dde3b877413fcf63b80a0c8fbdeda62cef8a8cc3e66,2024-11-21T08:49:51.547000 +CVE-2024-11270,0,1,4880f0e03ce4ed8e63343b9fbb75a87b5815fec775ce61f6efcd7c346285c0e8,2025-01-08T05:15:07.783000 +CVE-2024-11271,0,1,df82b928f501614575842dbb1f37c773310143c2f5acafd4bc828372cd207efe,2025-01-08T05:15:09.273000 CVE-2024-11274,0,0,d1342831a6abeef5bb3515b5ff94eee0e3fe5805367e12756f20bd1f3e6994e5,2024-12-12T12:15:22.267000 CVE-2024-11275,0,0,d867fdb3089eb487aba710ee3a783df90afa48402af791b20254c6cf6b05da5e,2024-12-13T09:15:04.887000 CVE-2024-11276,0,0,812b69192092bc16930f9ab3876c16990ac594a09aff786923cf483c78cda3e7,2024-12-06T09:15:05.827000 CVE-2024-11277,0,0,70fa881c494ed4e8a3131fb313821feca0fce09e01d4dad197524b7869b481b5,2024-11-26T20:59:50.643000 CVE-2024-11278,0,0,3f323ea4c088ae11099db65ea7e4647c3e5f880422ea2bf5351a2656e281a2c7,2024-11-21T13:57:24.187000 CVE-2024-11279,0,0,b2556a8750e158a7be1dc7b8c7e9a28d5376397dde30d88838c627e7fc39e344,2024-12-12T04:15:04.970000 -CVE-2024-1128,0,0,b5697d53bd1cc8361103858a196325f5d64208a9e9a1888a08b3143838ba1702,2024-11-21T08:49:51.657000 +CVE-2024-1128,0,1,6fa36f6a8f49675b4b17fb0d7d51b01122cd706165ee11320ebc96a9ac689f6a,2024-11-21T08:49:51.657000 CVE-2024-11280,0,0,55a96727b2485e04cc5b6b8add864215b2cd1aa8bc4bdf75a3cee41a9da85d1e,2024-12-17T12:15:19.343000 CVE-2024-11281,0,0,90e2bd5c8205361ece3136c81be65d202c124421a44b94b51cee816a97580eff,2024-12-25T07:15:11.777000 -CVE-2024-11282,0,0,d390316ee4f3b1aab62fc176ffb20040e863a2c24d5a26f8047dfbffa5040f83,2025-01-07T07:15:25.293000 +CVE-2024-11282,0,1,d7544003139ef4914de1b710d30955127d71a03465256a078e5049afe1c984af,2025-01-07T07:15:25.293000 CVE-2024-11287,0,0,2b855907be08ce91eab121bf5a3c8cc1d79ede49cf458848842325e314d36b25,2024-12-21T07:15:08.053000 CVE-2024-11289,0,0,1d2443a1a9242c04e29818ad13875ac1c58e80e7866f1501dec4b2d1a8559f61,2024-12-06T10:15:05.450000 CVE-2024-1129,0,0,cbf5818dce2e4cd60590d30546d905436cb36b8ec16eeb56ee9382ffddfc0bc3,2024-11-21T08:49:51.773000 -CVE-2024-11290,0,0,e7ad334eff31d82a070c36355409378c2a340aba72b63bc5936a92701d2b3571,2025-01-07T05:15:11.117000 +CVE-2024-11290,0,1,ab57176650cc50c586193b71c3243e9600beb71b8fde58a74d5423838f5c5c16,2025-01-07T05:15:11.117000 CVE-2024-11291,0,0,537e55bae46f427a177aa5b81903c72ee380b93be35511ba50b6e055b27fd914,2024-12-18T12:15:08.710000 CVE-2024-11292,0,0,44d76ae9b7e309446be6c076fee918f16faf12f6eba1bd4aed88a2108eee73db,2024-12-06T09:15:05.993000 CVE-2024-11293,0,0,963e5cd86fd8964150efb764dabf7f60f1898cb3eb1113839b414494aefc5068,2024-12-04T08:15:06.343000 @@ -244302,30 +244303,30 @@ CVE-2024-11324,0,0,55d7ccc413e27e03ca55705c584d56ff127a26670d0ff07867577116e2157 CVE-2024-11325,0,0,96d539af849f72e86bc30d45c134273d928f773df65fa65b9a7fb4618c89893e,2024-12-03T10:15:05.067000 CVE-2024-11326,0,0,9d10d6c9af70a4b37660df9be6daba459c823e11b8e9209053dea842d431fc47,2024-12-03T11:15:04.867000 CVE-2024-11327,0,0,3f903aa63f72de12c04dae7a5629f37dac1638d0896ccc6ba942e61804baa2ca,2025-01-11T03:15:19.990000 -CVE-2024-11328,0,0,0bd1c3ce5dca1f2a86ef0622d98e37cfd0511ee02971591ae8d409fd39fbf623,2025-01-09T11:15:08.717000 +CVE-2024-11328,0,1,202569351be32327a1f5002fac66254b9ab3028c9c177053c56cc43c9b28512b,2025-01-09T11:15:08.717000 CVE-2024-11329,0,0,b8078055ea1294f92cc83861c7101c3b3e6c5146a8621a33052ed2acc467efe1,2024-12-07T02:15:17.707000 -CVE-2024-1133,0,0,4ebc6a2651d5348692c359f9763049862ae951f3b0834af00edeaa957870768c,2024-11-21T08:49:52.210000 +CVE-2024-1133,0,1,cd2652f40bae5216f7c77668207c668c4a0e231807b992320ee45133cb135b32,2024-11-21T08:49:52.210000 CVE-2024-11330,0,0,18ebd923deefc9a9bb5d0708c49f6927dd28806fb2a49775faee5c7db402775d,2024-11-23T07:15:03.737000 CVE-2024-11331,0,0,687d03f55922d90d247fc3f94ca3f96e9c39bed85fd707b3c5cab0e8ddca950a,2024-12-20T07:15:10.007000 CVE-2024-11332,0,0,36669df4e93715465b64ec1799e55f470058053e193a811269619d8d50b4e0c9,2024-11-23T05:15:06.520000 CVE-2024-11333,0,0,00c71a7929b275d875b9539b6f0a2f4cc66b516eced93f3c2cfad9bb181a4a5b,2024-11-28T09:15:04.170000 CVE-2024-11334,0,0,f7fc893b8a37cca506fd20fe68edd8509ed855f99666ff9db346702f3632cf66,2024-11-26T17:33:49.477000 CVE-2024-11336,0,0,f6d676d5a427fada73f852223dfd1f8d78278266b2c8c37478ab18b05a16f6ad,2024-12-06T09:15:06.323000 -CVE-2024-11337,0,0,d6c57a7b2a87a73b03ef11ff0046f61e713fa6cfa164ff233529c7c3a7cb7a83,2025-01-07T05:15:11.320000 -CVE-2024-11338,0,0,ec8204656cc22ec13151c9e49136d87eb07f40b422d082cfeec81e80190914f2,2025-01-07T05:15:11.520000 +CVE-2024-11337,0,1,b01b2d91cb611a25f6f6c6a23755d6fd83423220b4845fa1731e3136f57cb3af,2025-01-07T05:15:11.320000 +CVE-2024-11338,0,1,16b8e4df470f18ecee94a466e04ad75959cffb7412dbd289584a85008e652ba5,2025-01-07T05:15:11.520000 CVE-2024-11339,0,0,79f980d1c213f37a017402750a78ab5a89012c4a7d884549e17aee2fe1c2fbb1,2024-12-06T09:15:06.497000 CVE-2024-1134,0,0,3b9e316f9f09adef1cfd4f6b3383505dbc9180172570e63197eb1d9f1f72ee08,2024-11-21T08:49:52.330000 CVE-2024-11341,0,0,fe8cd85d684fa85647e91e6c807d0d3948596661a708a57f08c30a79715842f3,2024-12-05T10:31:39.520000 CVE-2024-11342,0,0,e5c7c30c6a212e83bae351facc5b11e3c8030751d949156ac2c5ae223532d502,2024-11-26T04:15:04.030000 CVE-2024-11349,0,0,3a64113bc68757a74fb5a818e6ed9b7f5872b000d4a6ffe30b5a9251cc55ef53,2024-12-21T05:15:07.017000 CVE-2024-1135,0,0,3aff273363b92899a6e2ea5d9bfb0816a0d4bc7746e2c028bcee049e0905b123,2024-12-20T07:15:12.590000 -CVE-2024-11350,0,0,453755b4e4ea8984fdf64954627711fcba0b9ff9088b0c4e2f67767710c583cd,2025-01-08T09:15:06.460000 +CVE-2024-11350,0,1,8bb38c60aa0db48736d4dedc1ca25ec56ff9a53397f36b2b728e85c0405da224,2025-01-08T09:15:06.460000 CVE-2024-11351,0,0,bc05ae182e8cb110bde703a3706bb1fc3289062cde7a0dbafe7f85cee2bc2c16,2024-12-11T13:15:06.350000 CVE-2024-11352,0,0,de3582e15d7397e011d69382c9fedc502b246facf9b57003a974bb327fc47480,2024-12-06T09:15:06.650000 CVE-2024-11353,0,0,9cdabea534e964700c7cde9ffd2f1a82245a0291b01694ff89cf8e86136ee6b3,2024-12-07T02:15:17.850000 CVE-2024-11354,0,0,87986c107f2d598ec9b5e54e0419b4149d63b452699e5d17cc10ffbc61f46d56,2024-11-26T17:34:55.767000 CVE-2024-11355,0,0,bcd06b7aaf6858bb0e6c5d2b1c10c8ea5c66a082156d2df4f7c406b73d08ca66,2024-11-22T06:15:19.450000 -CVE-2024-11356,0,0,e7a629179db8f92c458758e96025db6a9f4ab7e98f0d179ea3a98a7bb8b5cb81,2025-01-06T14:15:07.233000 +CVE-2024-11356,0,1,055bf672f604dcdc8d6666a8d1ab8977bef4c45ecbf5b807b0a3571f26f3deba,2025-01-06T14:15:07.233000 CVE-2024-11357,0,0,c9242aa772722c211ce775905a0ef680d219236224c3a3aff0231e5f2c6bec72,2025-01-06T21:15:13.853000 CVE-2024-11358,0,0,47cd4959cf6059d3ce512e4a70aacad449e0c8fa7c946c06b27cb8a531be2885,2024-12-16T17:15:07.543000 CVE-2024-11359,0,0,df4c05f348228b2c2882e44a6e533849bb9a56f9c6073e32478ef7ab197c57b9,2024-12-12T06:15:21.157000 @@ -244333,26 +244334,26 @@ CVE-2024-1136,0,0,f1cac8b5fbb038c0eb6351f127c8e971963556b8c2146fbf8d7dfc6a2c8abb CVE-2024-11360,0,0,659b24fc81e4938ca0374fdfc531183f0da8359af24c60f66cd39ca705cc7b8c,2024-11-26T17:36:08.113000 CVE-2024-11361,0,0,a258bcb3f99fb669d7603f67eec83a19db748f78307acdbf1ea168f7db1a2de0,2024-11-23T05:15:06.673000 CVE-2024-11362,0,0,600c443b489e86c090d64bcffdb5d5e1bea467b36951abaa22635fe3a3274b4a,2024-11-23T04:15:08.617000 -CVE-2024-11363,0,0,bfb0dfdef7c6d3b282356c80e7d6779e97ec88abc92f394a4b4005dd8db6fff7,2025-01-07T05:15:11.713000 -CVE-2024-11364,0,0,0396ae45ab0b0575c4ca72d73e097c290e7be2140385b973fdc69f4be12bf72f,2024-12-19T21:15:07.427000 +CVE-2024-11363,0,1,3d278edca29c5b7190896835b6870c778a4e33238dce13474ce4c1f942cd43b4,2025-01-07T05:15:11.713000 +CVE-2024-11364,0,1,dc477e6c6fd74924ff7002cc7e1782c5476882ab2d6781af76ec761843ba5175,2024-12-19T21:15:07.427000 CVE-2024-11365,0,0,0e66126dac632663f20d3d9475ab7eeeaaf1783cab23902c99ae23613a9ecef6,2024-11-26T17:43:23.240000 CVE-2024-11366,0,0,eac89358fd6d61e1ab632fc5133430774b50e5a3fa0dd5cf3b695ea3fcce5bce,2024-11-28T09:15:04.313000 CVE-2024-11367,0,0,eea02b3c7a7e23b6b50200379882a96782686712f1c754d90239651a5f9c3034,2024-12-07T10:15:05.453000 CVE-2024-11368,0,0,bf7c67e11e8f973c6ac3bae21678c3dfeb626f80e34696e9e29adffce5777903,2024-12-06T09:15:06.810000 -CVE-2024-11369,0,0,cc028b0b8654e597f7a1137244a46d41015f40f300b7c16ffb6a086d7c1bc1ba,2025-01-07T06:15:14.233000 +CVE-2024-11369,0,1,f67f71afde5d9d2bf5e3a429864e22574535537898015cd20376d252ff3649b6,2025-01-07T06:15:14.233000 CVE-2024-1137,0,0,9367f9a1347684403f58a1a7490fd736dd1a246a1ba5d989931872114e882ed8,2024-11-21T08:49:52.723000 CVE-2024-11370,0,0,dd87b64b129f6809c8edd7b234994b231659964606722e4f84f6ae489936a5a5,2024-11-26T17:53:22.707000 CVE-2024-11371,0,0,940d4acb1660319dcaf9e79be7b51b02d713b6710d41c4a41d256d4b90485073,2024-12-16T15:53:39.657000 CVE-2024-11374,0,0,a5a1e58c0241313798d5870304d6ab4fd613b7c8d39f72ddd8edd6b514e2a94b,2024-12-07T10:15:05.643000 -CVE-2024-11375,0,0,e93fe4d3fb55901ffef81f61cf6ce0920f198810a19e9d79d72540eb82944d98,2025-01-07T05:15:11.907000 -CVE-2024-11377,0,0,c378228a7068075a7054247c60c32355d91968a7950f45c90e033cea36544b34,2025-01-07T05:15:12.083000 -CVE-2024-11378,0,0,18095b8d5c21fe9a8c8cff6f50477871c4e9fef3253129a500baad5debeb9de5,2025-01-07T05:15:12.270000 +CVE-2024-11375,0,1,09113c9c4c16e936568b412fc506dc02ef629e8e628c654e3f6f629cd5e5088f,2025-01-07T05:15:11.907000 +CVE-2024-11377,0,1,7c2553183c73f79520591c880309a16f7b34fb51c625dbcc41841afeb50b2cc9,2025-01-07T05:15:12.083000 +CVE-2024-11378,0,1,b38085a589e7c1c3c829e70c4c335030fed608a8aaf3232abbfcaba2499cd265,2025-01-07T05:15:12.270000 CVE-2024-11379,0,0,9fd00eb3fec3062cfc458a7971d09425d25dcca0c806b20326864d85b70adea6,2024-12-06T05:15:05.813000 CVE-2024-1138,0,0,786863f5efe71d0a9eaa305ef044215c6743ec975f6d66476179ca38c53c9996,2024-11-21T08:49:52.860000 CVE-2024-11380,0,0,52c94407ad753b2016f621791a7f1633d66f164c5a8dac9de6950cc921a3f13d,2024-12-07T12:15:17.897000 CVE-2024-11381,0,0,a7d4461ea9ceab9b31844e38e2e81774bc12f8098e9baabb5b46b5f6a98e8fc8,2024-11-22T06:15:19.643000 -CVE-2024-11382,0,0,df85d7e3403a61740b0f7988e30b29460f9aa19d1c808298873a699eef4bb356,2025-01-07T05:15:12.457000 -CVE-2024-11383,0,0,0bd752b29e1d721279f3a057a12cad20bb26b751fe22cdc457a198866064150b,2025-01-07T05:15:12.650000 +CVE-2024-11382,0,1,338f84529186c0c55097e3ca4cc330ed2271d6bee576a475398215de89947f1b,2025-01-07T05:15:12.457000 +CVE-2024-11383,0,1,54a2aabbc1770151cf1e72561dcb20677b19643d9c9b36bb42e62589c719cf63,2025-01-07T05:15:12.650000 CVE-2024-11384,0,0,bd09d80eb823d8832deb7b6d31dd08e4639583550e7acd4a531e328e5f289803,2024-12-12T05:15:07.527000 CVE-2024-11385,0,0,b8c574c75cf2cea00a757d377dc474503f06328c73f6861f0cd8dff47b3ce271,2024-11-26T18:04:49.077000 CVE-2024-11386,0,0,458e90cc10d5ea7966014cc93ebe3e8ec2358207a7341c32907eb034b035dd6c,2025-01-11T08:15:23.613000 @@ -244389,7 +244390,7 @@ CVE-2024-11419,0,0,e5014d0a20f8da57d3c2f2e9aca265f8c88437545b7df01014bb52b3f903d CVE-2024-1142,0,0,e15d337f366ba06849b1f848d8db9c587e5c183aee7e98313d369c15ae012a6d,2024-11-21T08:49:53.680000 CVE-2024-11420,0,0,1711c7ba1ba8c097f09567c5d53d049cbf7bb1bf6f7b471b4caaac9c33673bbc,2024-12-05T10:31:39.750000 CVE-2024-11422,0,0,208170e182c3d2142ba69174b9f95e68a4bb28d469a940741629daad460705a0,2024-12-17T16:15:23.557000 -CVE-2024-11423,0,0,f71d3e2c9c96f230ab622cc9b5ea4ccb0093a6aa95366926b897cb07826dcc51,2025-01-08T11:15:06.003000 +CVE-2024-11423,0,1,5fd92d7acac7c9d9434b04e44769038fcd9ed45fc5418a964960dfeca17d19b3,2025-01-08T11:15:06.003000 CVE-2024-11424,0,0,d50ad6baffad28053a50f50d0d95ca3de9adf87a3fb1a59a3e023fabb9b6d399,2024-11-21T13:57:24.187000 CVE-2024-11426,0,0,b92664b1e686c3f02127b23b083fb58b958de57166c1605ab7455364a1793bde,2024-11-23T05:15:07.153000 CVE-2024-11427,0,0,c3fcf7998beeb6a903337e5ecaceaa89f8054cbdaaa765548243de887ca3fc67,2024-12-12T04:15:05.637000 @@ -244400,10 +244401,10 @@ CVE-2024-11430,0,0,b0bcffc10889655fe8c165f80a3f8fb6f3146129ea2141fee920ee16fca85 CVE-2024-11431,0,0,feb39bbdcc42acee380b1ac31c5228441eddfd07fcd54b90d4e5cb1d376f9671,2024-11-28T09:15:04.470000 CVE-2024-11432,0,0,23ac14594d755e6c7a831370f44441d1aa2fbce3d7125bf0c721d30eaec68d84,2024-11-21T13:57:24.187000 CVE-2024-11433,0,0,d7d2b17ecf1f1820c7a169038fcd2102a16fa9aa18d9b8e0d8b10a268cadf048,2024-12-12T04:15:05.990000 -CVE-2024-11434,0,0,a4e08407abbf2939073244c3877ebd9c63018f78cc8086c2579f03e753ee837f,2025-01-07T05:15:12.873000 +CVE-2024-11434,0,1,c8dbcb40df18ba90462270f9767f1eadde22ce4c0a3d0d4428d2d0d492c70cd9,2025-01-07T05:15:12.873000 CVE-2024-11435,0,0,1380b27cd2035f7566d8c3a22d2255debbb483bdbc16e31011480f4da4fce733,2024-11-21T13:57:24.187000 CVE-2024-11436,0,0,d9ba482fa12f5a77f1e6d71752538b4ac13c80723176e1f973fa002876475cf9,2024-12-07T02:15:17.980000 -CVE-2024-11437,0,0,3b0251b583011184b79fa07b5e9f572dc3fbc9ec947d6b93edcf5e5a1fd4c171,2025-01-07T04:15:06.150000 +CVE-2024-11437,0,1,c4827455e3883ba458a132c9f03b474907aeac27bcae63687ee92259b5488ffe,2025-01-07T04:15:06.150000 CVE-2024-11438,0,0,f8be712e8ca0c6e2e4ec7ab8e5edf4587d3042f01694165651aa92a3bd58aa58,2024-11-21T13:57:24.187000 CVE-2024-11439,0,0,14a4773754279132bb32a6fa7230c5939b3fc3419bb20a864a23b6dac394549c,2024-12-18T03:15:24.583000 CVE-2024-1144,0,0,abce3af1982b67316bbd44c97fc519435f8a2ffe156205161918695ae799390d,2024-11-21T08:49:53.953000 @@ -244411,7 +244412,7 @@ CVE-2024-11440,0,0,f7fa3eb74eeaf205f9272a5dd5c90b4e40423e1f48cb0e4f0c2b5ed6bd678 CVE-2024-11442,0,0,3be9d0f63b7eda8d31b9090ec24b06639190cf0bc4f30335348dc6f41a62dbe4,2024-12-12T04:15:06.157000 CVE-2024-11443,0,0,b1e1426998d283f5f97b1a941caf6cbb78096874880f807e7ae5caada1ad2ae1,2024-12-12T04:15:06.327000 CVE-2024-11444,0,0,18f08a8b9d89a6b1657bb8fc8be414487944593dc8b5fd0eb0cfac993932f20a,2024-12-06T09:15:06.977000 -CVE-2024-11445,0,0,b7699ebb298dc958148576bbd05af7dee25f44254cb4a80a299d911c54c1606e,2025-01-07T05:15:13.077000 +CVE-2024-11445,0,1,a347cf67205be52aae36bfe92cb5dd9743dcadfa446beae76cc8e5f6e3835ca7,2025-01-07T05:15:13.077000 CVE-2024-11446,0,0,9324a77eacac49b9db503ff17f0de8de50ddb46f09871e23b3695c4980427c7d,2024-11-23T07:15:04.820000 CVE-2024-11447,0,0,bd53c50380b55196efb74cff3fad5c24687f184135cfde8b6a52ffe6934cf7cf,2024-11-21T13:57:24.187000 CVE-2024-1145,0,0,71ba2561916ff383446b1b9365376abadae467a3a4b7425691a59ca4e4176804,2024-11-21T08:49:54.097000 @@ -244430,7 +244431,7 @@ CVE-2024-11461,0,0,e598452d44c671acacd0d9bb3b2f7ceb59d795e3e0bc7e2684d3f27a73f6a CVE-2024-11462,0,0,aafe3276077f02d24fea97371a1b232043adea60a1125c651c2eb01e801d85ea,2024-12-14T05:15:06.560000 CVE-2024-11463,0,0,ad17f3fab6bfb40a789d68c4383c6c0e1f14efa77f86cc521d310c195559f395,2024-11-23T04:15:08.893000 CVE-2024-11464,0,0,5828db9c008addcaa10da0b57e51f0230f10838dab3e51e60f8d2fcb9d133719,2024-12-07T12:15:19.567000 -CVE-2024-11465,0,0,a7833ead3ce05afbec7f42c6ab0288abc60f4b5def9fdb7cc868ee53cc9a959b,2025-01-07T05:15:13.287000 +CVE-2024-11465,0,1,0028662c24c58537e31fc6c5ac2f25bde09edc01df058369957c93345fce2c39,2025-01-07T05:15:13.287000 CVE-2024-11466,0,0,36ba29a0e83960f183cdc1bb8910604befb538a9ed8bdd074a88ef8b7f706e46,2024-12-04T08:15:06.523000 CVE-2024-1147,0,0,7c585dad4e071b38d649d847ff37c79a25a5d07f7a32720dda50f90a08541bc4,2024-11-21T08:49:54.360000 CVE-2024-11477,0,0,3e8ae99590c1aecc53c52bff36b8f44bed9b32563a126fb58a5303ed844daede,2024-12-11T19:23:36.800000 @@ -244452,7 +244453,7 @@ CVE-2024-11492,0,0,7c533f23fa1db5a769500a8b417234e977cff0ed0689b5e9b1d4408fa39bc CVE-2024-11493,0,0,d49eb92c8c562ba2101f389cdd764449ac518734f087aed95f5fe12a18b9ad3a,2024-11-22T18:07:31.973000 CVE-2024-11494,0,0,120185b1f5452b090fd317862ca91721f9197720b68abdbed625f37e80933fbd,2024-11-22T00:16:41.223000 CVE-2024-11495,0,0,9c4e4a6f33e735c288ef4e55e53a3e0727ff8f6642201545ed0c9f418349e2e2,2024-11-21T13:57:24.187000 -CVE-2024-11496,0,0,671b48e7ae89f914c749666b0ef4666f0000e18a3aaa7a05669aeee7d89ddf7e,2025-01-07T05:15:13.480000 +CVE-2024-11496,0,1,43ea7dbd5a3dc8b24d5b87bfdc0e0bfa9c873f8eb1655750b06676344c313b9a,2025-01-07T05:15:13.480000 CVE-2024-11498,0,0,7272009b792fcdecf70fc17a50bede0518cbaf4c2694bef021eda391707cdede,2024-11-25T14:15:06.607000 CVE-2024-1150,0,0,1edff0fc21d5f22172836448fdcc7da772ab8a792f462f53ba0bc1c0fbae9271,2024-11-21T08:49:54.780000 CVE-2024-11501,0,0,6aa155b5e971a466b4f7473002330671c6add4e056433a95089c7dc638a9cf0a,2024-12-07T12:15:19.783000 @@ -244463,7 +244464,7 @@ CVE-2024-11509,0,0,fe419f20de116fed461bb1e4d95063f890287edc4dfd7b8180aebb81b0a3d CVE-2024-1151,0,0,cbc2bdbe079d8af108866d902449e4a5967535b9183853d2fe331e19000fb255,2024-11-21T08:49:54.940000 CVE-2024-11510,0,0,596396071c53590540f966b33e7623527b4fd0b6d26f60c4e6d26f13515b04a0,2024-12-18T18:48:36.623000 CVE-2024-11511,0,0,740c5709c4c4165f9942865e67f6449960e70bb2efc41ac5bd4a3b6150a76b24,2024-12-18T18:48:18.443000 -CVE-2024-11512,0,0,607022769b9329b04ea24d29f12b7b9f0a51d8d17fd3a70600fac161d6afb799,2024-12-18T18:47:32.497000 +CVE-2024-11512,0,1,13b2b07050d8d3878352910762ff9812cbdd4eb2c07e7839d3b73c6ffb4b0b20,2024-12-18T18:47:32.497000 CVE-2024-11513,0,0,14f06b4f2fd0d07fa5fce6bc4c97d49cb8100b62d4d5dabeb2438ab779c82bf6,2024-11-26T11:26:57.597000 CVE-2024-11514,0,0,0a812266c3567eaa97357b9ecd8882fb96d351a129b7817213a3dbb4046603cb,2024-11-25T18:57:28.103000 CVE-2024-11515,0,0,d9a0c3d9a84b675fa71a0cff71ed86cadd8696aa36f278e6a7ee00f86325e764,2024-11-25T18:57:23.373000 @@ -244532,12 +244533,12 @@ CVE-2024-11573,0,0,a217cd6a5d2c1b9c15a058174aaf74db4c998e67a229e5d62add9fed37c84 CVE-2024-11574,0,0,c0c507d43857d57ee99aa16b84b597bf67d6a714c3740721e43431423a9700d2,2024-11-25T18:53:09.717000 CVE-2024-11575,0,0,5e1acfdb2c1dcb5dcda0fe7dfbf70613b34f2e92ce4befb7a1e3c62571d21e54,2024-11-25T18:52:56.080000 CVE-2024-11576,0,0,a8e0825213ef4c9c0f1c6d5ae79fb6ce1feb72964e892a902e8877ef0fbe759e,2024-12-20T17:36:12.133000 -CVE-2024-11577,0,0,030cc7ceccd9c1f1c0576f6eef9270acaa630d083b3c15257887f33704fc9630,2024-12-20T17:36:00.887000 +CVE-2024-11577,0,1,efb2567cb5c51db073457c6007c99b46c942618b2803d597011c7d051ef31b73,2024-12-20T17:36:00.887000 CVE-2024-11578,0,0,3949bbadfcf8e803d9af59cc77849a55a262b9e95c93b371e5299de46c360cc1,2025-01-03T17:42:27.113000 -CVE-2024-11579,0,0,a092ff7ef536e96be080e898d8d872006835463f8afc1ac75354cd0671a55eda,2024-12-20T17:35:51.253000 +CVE-2024-11579,0,1,a0e8ebe7e9d438299b2b08bfdc182fcceaa66df7c647d83ef69f75c20555837a,2024-12-20T17:35:51.253000 CVE-2024-1158,0,0,cc758ded81eb4716575c03ddb54fc317f50917a2b43ee2a36cb438fc8fb74732,2024-11-21T08:49:55.723000 CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000 -CVE-2024-11581,0,0,268ccec9c70d91613657530fc8ca66f464b1a739ebb371f3baadda44241001cf,2024-12-20T17:32:03.967000 +CVE-2024-11581,0,1,54519437e00f96c23a8c70641ca6b3fe6fa4bcc79e1443a9a5c2a0ca7b114449,2024-12-20T17:32:03.967000 CVE-2024-11585,0,0,d73bc146050e187d4f7b957a4961cb8470ba9ebdf69a5843cdfa9e686c284b8e,2024-12-06T06:15:22.723000 CVE-2024-11586,0,0,acbb89c7a73edeb9af616fbe1a7bbf2dff72a4d1c23f19e17196df7c7df36053,2024-11-25T18:15:10.123000 CVE-2024-11587,0,0,81baaf77887a06e025fa560b05def938c80026d91eed087e0a42822793b3fe0a,2024-11-22T21:15:27.747000 @@ -244555,12 +244556,12 @@ CVE-2024-11599,0,0,a26c993827526d1af73bfe90f868b9bfb9a722b6b2267b567215827aef919 CVE-2024-1160,0,0,12b04de1fea0a3119efc89b33ba5d2f3d172880f1becfa13297009e56b4efb45,2024-11-21T08:49:55.987000 CVE-2024-11601,0,0,51a555e6d26623f2054da12f000d146e4e1662608f2c3f75f4d4bafe7cada303,2024-11-22T06:15:19.830000 CVE-2024-11605,0,0,60d00021c065e6f38e758db8986f6f41c042a104c692f051aa09c9422ba7d5c1,2024-12-27T19:15:07.253000 -CVE-2024-11606,0,0,240bff9d1ed22851171a3934ba81047b46b452a8dbf38cad6a6ba260d59793c6,2025-01-07T17:15:18.253000 +CVE-2024-11606,0,1,cec53aed2aa35dc5dcc09928013265f08303f051378a3304152c040cdd6a4f8b,2025-01-07T17:15:18.253000 CVE-2024-11607,0,0,64db1cb50de786964ba95a2d2de30c3c373b3627734b2fcf18c662efd5d3b19e,2024-12-27T15:15:09.637000 CVE-2024-11608,0,0,8ddbc230a8730b76ffe6955779ba3c4d90ea8f23edd3f564c2db516009c0d0dc,2024-12-09T18:15:22.580000 CVE-2024-1161,0,0,68cc61ca71a85d6059ad02181ec1fb4a89655dbd3db8900d271e7a26ec14fb67,2024-11-21T08:49:56.127000 CVE-2024-11612,0,0,bb444eed2bab8dc9d7d3d2707a19c782bc9311cf8cab3a2875a904169993bb7a,2024-11-22T21:15:17.387000 -CVE-2024-11613,0,0,3746b018d4d1f1fb0e968320de63f963db0e724636c6c2189025fbf55f5bc984,2025-01-08T07:15:26.407000 +CVE-2024-11613,0,1,7e86a7b71c3d95aae4dbcb0c03692293907b720ebfe581d24518da2d412862bf,2025-01-08T07:15:26.407000 CVE-2024-11614,0,0,7fc209ca70347672f57de5cba21effe4e1d493165b83e201eaf5da4b6f065fbc,2025-01-09T19:15:17.283000 CVE-2024-11616,0,0,5cf2247f3b5e7ef2cbc9a5a8f08413199c8203f7939f04113ffefbe510dd1f2f,2024-12-19T10:15:13.323000 CVE-2024-11618,0,0,faa524e213716321f8f8b440fa9593fea7194f824084fdf0ccb0ec4689ef9c66,2024-11-22T19:15:05.437000 @@ -244569,19 +244570,19 @@ CVE-2024-1162,0,0,3088f9ddfe31234409eeca0c6733f6625e00a303f5f7e9ffe94fe1a6782630 CVE-2024-11620,0,0,ead70690aa114308aae0c5f2f4d204a542be8af8676c2ad1b4207bb367ac689c,2024-11-28T11:15:48.533000 CVE-2024-11622,0,0,28607ca43edf19c5b150264789340f2f339c16fe9934fd58cd66cc9c45bc71df,2024-12-12T19:52:24.527000 CVE-2024-11624,0,0,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153970,2025-01-03T23:15:06.157000 -CVE-2024-11625,0,0,68cf79a54f3e4f0c646567605ae0759bceb8120ef2fb6b3ee07291aeb85b1df4,2025-01-07T09:15:06.560000 -CVE-2024-11626,0,0,c705e444dfcef14aa92dcbc52fbd5d78b61056f9e74c6883c659c916e8a56210,2025-01-07T09:15:07.533000 -CVE-2024-11627,0,0,7fb031f44b4246cafcebf80341155b1da0744ba2ecd87aaea3c1fc7835af75eb,2025-01-07T09:15:07.633000 +CVE-2024-11625,0,1,c71612eff4dbfdfd57dcd77786b9f90aeda1003c787b3baa9b3e022b7aa38e14,2025-01-07T09:15:06.560000 +CVE-2024-11626,0,1,e05f68563d0cfe4fcf37166c88856797ec0301944e16df5d7b6760557f29956d,2025-01-07T09:15:07.533000 +CVE-2024-11627,0,1,9ff1a8df860daf1368acfa4151c0612097655e3c1d986846213632a0d4bd06d7,2025-01-07T09:15:07.633000 CVE-2024-1163,0,0,3534cb0564ba7e08015dfddf52a975a19f7b672cf09e3f78e469f84e669f2cea,2024-11-21T08:49:56.403000 CVE-2024-11630,0,0,602de6590967350fd7f3827b1a11ce4a1c578a1994d3c132149d73cf61dca0eb,2024-11-22T22:15:13.637000 CVE-2024-11631,0,0,ec063b412cc8e1fc69f64e54e806f8de997f3af353f8bd5c4b78d65e3cccfe32,2024-11-25T16:54:46.333000 CVE-2024-11632,0,0,de73f7ca209ed3887af097dcd8d60cda4bdd27816f354a861b8ba50b3a9bc56a,2024-11-25T16:50:43.257000 -CVE-2024-11633,0,0,a9d20014e3d27993c11ace933ac556846fd531565e17146502da93b7e86371df,2024-12-10T19:15:19.443000 -CVE-2024-11634,0,0,0e2d7b37ec82ce83fed6bdfe701bc5f2686fac239cb6656f7c455143c516f3bc,2024-12-10T19:15:19.570000 -CVE-2024-11635,0,0,79551e3678bb1b6e8af2e6c56ac6d09d40e00e1be731bce08075cc39984c1b57,2025-01-08T08:15:24.117000 +CVE-2024-11633,0,1,ec2ee5d42526708d0c247f1efcfef18b7ca46f7d0173b75ddfcc1ac75afc9e99,2024-12-10T19:15:19.443000 +CVE-2024-11634,0,1,e0423804dbaae41000eefac776623fcebb674fb7c1dc8b9d22b613f3f40aa1e7,2024-12-10T19:15:19.570000 +CVE-2024-11635,0,1,ffacee27dce2a3419b3aa106b350e83d5585d5dcfe645774b0023dac2c389ee8,2025-01-08T08:15:24.117000 CVE-2024-11639,0,0,0210e46589d8e363ac9b295eb4432d5b1bb6755405d9d65212946ea82705ab83,2024-12-10T19:15:19.690000 CVE-2024-1164,0,0,ea75a9ac84fb05bc5899ed5764c236687fb5121f662769fb6e46971a20a2f34a,2024-11-21T08:49:56.530000 -CVE-2024-11642,0,0,81515b64b1b61c37dba72524ff38246072ba416173946fc68a33149b2c54bd39,2025-01-09T11:15:10.187000 +CVE-2024-11642,0,1,e083dfd7b8388b09206f810c50ef0061b39601a9804b6746591b0dd89f756ab4,2025-01-09T11:15:10.187000 CVE-2024-11643,0,0,ae78ce4f54b48c77ffb4df12d001ddabc5e672affe5a377c6c988d0deb6a52af,2024-12-04T16:15:24.177000 CVE-2024-11644,0,0,38b2c694eddaad1da45e24d2b7150693eba2499ddb691622394ace7d3593825d,2024-12-27T19:15:07.400000 CVE-2024-11645,0,0,c608ae27d81e6acc05944526d79b8330c84a4e23791c7ed889680dd0f094154a,2024-12-27T19:15:07.557000 @@ -244623,17 +244624,17 @@ CVE-2024-11677,0,0,87a6177c5b391fe3e3720d37e67024bea5a041e744a962c7b6d3c8e2d9ea8 CVE-2024-11678,0,0,fce9fb7e025c917df93cde2de1c865701af156abefa3010e32d19624bfee04c2,2024-12-04T20:39:07.400000 CVE-2024-1168,0,0,361fc3dacab1a6af3309993965ec9d946bde5b152da006d3137d0cea2c78645f,2024-11-21T08:49:57.020000 CVE-2024-11680,0,0,413293c09da5679a3e6b3bb9a6bdd26dd9245aca40b801761cabf7d2cf810aa4,2024-12-06T18:42:17.390000 -CVE-2024-11681,0,0,d3f9f5399f018a89696b7dd5177496fdcee19e93f2567f6159786f1fbca01bb6,2025-01-07T16:15:32.097000 +CVE-2024-11681,0,1,ef2e9655fab33c8c3fa98721c2f6ccab491379449fb3f534179c0123262550a9,2025-01-07T16:15:32.097000 CVE-2024-11682,0,0,560590a5be0c603e71436f75adade57eb313e8dad3069a7dc031cb3c6f8d4225,2024-12-21T07:15:08.260000 CVE-2024-11683,0,0,c5c34a549f676b6e4bfb5a3fd3e5626bf20a1dd88602d5be54893cdf8cd9f992,2024-12-12T04:15:06.490000 CVE-2024-11684,0,0,12cb277c9205905669ffa100f303ceaebc405f85837f54097728fa8f404b4d50,2024-11-28T09:15:04.793000 CVE-2024-11685,0,0,ac2887e3bedadf93f8263266da035f2c90903ee2e66a4074483ee4f2d7f8e8dd,2024-11-28T09:15:04.950000 -CVE-2024-11686,0,0,b948abf534061d8c2aa9e6f64a60c2e0f0c926071d1f7532ea68af0b03379fa7,2025-01-09T11:15:10.447000 +CVE-2024-11686,0,1,396188aaf0b830451d3485fe79803d21d1114c49c3e6a130b6504b9b2066319b,2025-01-09T11:15:10.447000 CVE-2024-11687,0,0,5e77fbcd46b583a4f084d8bcc3492702fbc8999eee40cfff605d5263f17d5ba6,2024-12-06T09:15:07.303000 CVE-2024-11688,0,0,8d8a43b07b745617ea451bc11d9802776a561f6818ffe3d6e83d98ef6a879a1d,2024-12-21T10:15:06.733000 CVE-2024-11689,0,0,083793777007e12786b393e59e70bbd36f5df589b4b26e2949eb5844a08ab45f,2024-12-12T04:15:06.657000 CVE-2024-1169,0,0,7d005e1e32dcb786dc145e0dc1f4f8a0f524691319a7051d5e1a67ddcb23a460,2024-11-21T08:49:57.153000 -CVE-2024-11690,0,0,64d108b29567f27e54fa807da12df37326bc2cd355da96d7ac4d20d7fa8e41b1,2025-01-07T05:15:13.677000 +CVE-2024-11690,0,1,36f949c7291ee937d7c462de6404610bf5fd12a14d132776feceaec4091ad912,2025-01-07T05:15:13.677000 CVE-2024-11691,0,0,36fe8b3d1feccd057ef27ddd17979a52004da0a9606d16fdfdb44bd6d5656bc4,2025-01-06T18:15:18.373000 CVE-2024-11692,0,0,9269d1047de5ccf3bbe848f7300e55c4147a58cfd139cb6b7f723bc7b81e3d4c,2024-11-27T16:15:12.530000 CVE-2024-11693,0,0,e0fdce984dc3054eba0934c78141d5d7d4f14af64b3544f5156b2322b39ad19d,2024-11-27T16:15:12.753000 @@ -244669,7 +244670,7 @@ CVE-2024-11721,0,0,476bad2ae1181a71ee1e909e9b2944d8737010e4d5a814100bd6b1844c536 CVE-2024-11722,0,0,40864411129bd70df76bf7827eb0e751b5dd144fb3c982ea787e070835d4fa8e,2024-12-21T10:15:07.367000 CVE-2024-11723,0,0,d555056e56adae6d2817421636f03f202df11e8bc291dc8225ccc2e718d1c709,2024-12-12T05:15:09.247000 CVE-2024-11724,0,0,05e5e5fa479e9093ec1673d131b2e00f2d4111914ddf22019f00bb0b00e67aae,2024-12-12T07:15:08.600000 -CVE-2024-11725,0,0,449a937d063062cffd21ad1e02ae8024ffd73cedc6e84a08de804e2c8aa4a533,2025-01-07T07:15:26.713000 +CVE-2024-11725,0,1,dec3d3c0070d6d1ccffe355c1996c8560667b27d7522f1f61f250fde74f0ad47,2025-01-07T07:15:26.713000 CVE-2024-11726,0,0,52ec257cc912e0d76c02566a0817a6d6c56aec1da71b6fef622266b2f652163c,2024-12-24T11:15:07.443000 CVE-2024-11727,0,0,74ce7fa8cdfe22d5e7361f3d2dc50d23f9504f53bdcf31e2233dafec5ae3422b,2024-12-12T07:15:09.107000 CVE-2024-11728,0,0,6b4bed5fd27460e210abe0c2b9d4d46303cd8332bea3bc720df94689692e5ca9,2024-12-06T10:15:05.853000 @@ -244677,7 +244678,7 @@ CVE-2024-11729,0,0,efdcf50f70e4aaed57e8feef0a7a962846d2881b2d7c26550ce5bf699f2f4 CVE-2024-1173,0,0,c4d4cdf7c6a3868eb9e98cb8ff74e2d000c2d6f84447d896138ac8342670c9eb,2024-11-21T08:49:57.650000 CVE-2024-11730,0,0,8b97f2620613ee8f1fad8f89fdaf2fb138dbc90ea591ed763e6c771986c201aa,2024-12-06T11:15:08.033000 CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000 -CVE-2024-11733,0,0,5fbecc5531d69a0d2ffc426edbd6573fb38d88d5bfbaa1a7120ba352ee22cf2b,2025-01-03T23:15:06.313000 +CVE-2024-11733,0,1,95cac917a7c172e334d8c411bd7e32914cf640694af4ffd3d3de8eaf57fddbb7,2025-01-03T23:15:06.313000 CVE-2024-11737,0,0,82b4de15247bbd822a2abb2f56467686fd4a6957a6b87fe1370247ce71679d0b,2024-12-11T10:15:06.677000 CVE-2024-11738,0,0,f587c97dbd4b1ce8e0f6a611dd679c71e26fa6d4305ce8c0e3ca3797b0619379,2024-12-06T15:15:07.723000 CVE-2024-1174,0,0,6b46be4d722ab187c094170b7547b36656d9ec8ed90fcec0cd49c5c30bebda75,2024-11-21T08:49:57.790000 @@ -244688,14 +244689,14 @@ CVE-2024-11744,0,0,d39b5f592014fd4a2278c647fc2411f75d3865150415b86b86bc4d90ea41f CVE-2024-11745,0,0,96069305de6ef8812783ef245e2f61d86d985db42c36cad22c8d389adbd7e8c1,2024-12-03T15:25:28.847000 CVE-2024-11747,0,0,3759ff4fc6bacdbc93b41c30e49e712686d53794386a1c516e9d37a83c4db995,2024-12-04T03:15:04.933000 CVE-2024-11748,0,0,e7645e460b472de84c1c6d90ad8d3f118aede3a0d553d462a4edccc0cf16cb19,2024-12-18T03:15:25.943000 -CVE-2024-11749,0,0,a34162dc3441bb7233fb0884b31b8ff8fbbb03f89d39bb90fd94d6fefe6b50b2,2025-01-07T06:15:14.713000 +CVE-2024-11749,0,1,412b5ccfe042bb9b7fe2980bccc2ed3ddba78fe36c90d8d8dcbef6203be2391d,2025-01-07T06:15:14.713000 CVE-2024-1175,0,0,f997875411f4ee3836569f05e6ded063f5984d7986ed98f909a5423e1a302ce0,2024-11-21T08:49:58 CVE-2024-11750,0,0,7ad8eba5e612b45089b0006a10c8f5004dc37025f0797564ad303213ba0cd10f,2024-12-12T05:15:09.577000 CVE-2024-11751,0,0,cbc44290cddf15ae35c92a8e4b75351046563158eb1fedf91f48e5c8b200a32b,2024-12-14T05:15:06.923000 CVE-2024-11752,0,0,c48a168f2b3a172a5086d93afa4f6d610d49141a00f07210bee49dcaa523a5b5,2024-12-14T06:15:19.210000 CVE-2024-11754,0,0,115157a8a0f024c3ba84de7edd359cbde1e25041eace45096f12b0e339d7e447,2024-12-13T09:15:05.630000 CVE-2024-11755,0,0,c883abaefa6170cee64d3b62a0d846726e75234488258495594582792094520e,2024-12-14T05:15:07.100000 -CVE-2024-11756,0,0,61a3f10bbfe20c57d2a9ef3bbe71f843c6e92a6387f10cd46d5720b2e61f0cf5,2025-01-07T06:15:14.943000 +CVE-2024-11756,0,1,1b15032d5138c63a9bc74c14a17064d85dfaaa7feb6ae78db162c60925186a36,2025-01-07T06:15:14.943000 CVE-2024-11757,0,0,1bc7aae07622ccc6a4b7076dd363e7b8ecfc55de5a0f36b46f6f6ac7ac916966,2024-12-12T06:15:21.367000 CVE-2024-11758,0,0,ca726f10359ea7a86c76a4ce25cc4fb51d404c0b02b8352f33945ac7a0f2c12b,2025-01-11T08:15:24.020000 CVE-2024-11759,0,0,721c2f6fdff65f13ac54d162c1b8bb0f862a88123dec2155aa18c28dd98f712d,2024-12-14T05:15:07.287000 @@ -244703,7 +244704,7 @@ CVE-2024-1176,0,0,ade3cc69c20caab05c727481cc0ec5f568a186d8a0d855f0f768d9d6ccfee8 CVE-2024-11760,0,0,72a8fc65de07cdadf0a0f6ed904fea74fd9bb6ba4b9fc9e5c352d9cc3a548975,2024-12-12T09:15:05.040000 CVE-2024-11761,0,0,d23dfba4fec168c27495db29e782d019068846a5ade59e5c067fdb06c9bbac7b,2024-11-28T09:15:05.090000 CVE-2024-11763,0,0,2cabae83986b97ccbbb010b476c687fe71b13b47af24d4118c20dad8b77c1714,2024-12-14T05:15:07.457000 -CVE-2024-11764,0,0,b0cb013a2ac2bdf2513356f63b8c22202931612f4c5b98b59fe1efd5b510d46f,2025-01-07T07:15:26.927000 +CVE-2024-11764,0,1,a95eda8f94695230511213f37b0f60fd0124ea92dbd709e2b85d6745785d41ee,2025-01-07T07:15:26.927000 CVE-2024-11765,0,0,7ca3665c3c821fbe55ce7d0837aed80052a89fb5c5a0acd85f5778bdcb7cc52c,2024-12-12T06:15:21.570000 CVE-2024-11766,0,0,ece6a23c84d85f85ec62e1b775f625e9ee6e819290e6f88bd3f3e210a2634e2f,2024-12-12T06:15:21.757000 CVE-2024-11767,0,0,27b1bb05f924b0778af68bdc2e081cf79c91f7af32c3aed079cfafa7d5bfee0c,2024-12-13T05:15:05.843000 @@ -244716,7 +244717,7 @@ CVE-2024-11773,0,0,8f508701342909bb3125bf0e1fc423b8efe31d0b55b4e2a3bdbbc0d7a1ff1 CVE-2024-11774,0,0,2f351d61aa038a49c773ab74e882e8cd2203f9cf3f3df13c0faa462f8ee3a46b,2024-12-20T07:15:10.393000 CVE-2024-11775,0,0,0be2b5775aa12c2634dedea0534264de5c8544551afcfc7760cb6a86958e9dd8,2024-12-20T07:15:10.597000 CVE-2024-11776,0,0,db96a767ae984aa946e97339afd57034a67d2d93961a6fe48dad1a311ebfe8b3,2024-12-20T03:15:06.420000 -CVE-2024-11777,0,0,3f98ebf065259973e17593034b9da476d62f4f3a8b02a7ab11c065a411f92301,2025-01-07T04:15:07.200000 +CVE-2024-11777,0,1,e460b779a976f9c561c46b6e58a92b7a7419f3751a2cd77a73598001765e2023,2025-01-07T04:15:07.200000 CVE-2024-11779,0,0,66ab9533cf27509ff85b54c7dc6f857efc44402b9c1a2b7fc4f1c1fbd8a0b4e7,2024-12-05T10:31:39.980000 CVE-2024-1178,0,0,eed4631b540eb17cf77594707bc1561876f243beb66555c5572ec77e14862460,2025-01-08T17:16:27.800000 CVE-2024-11781,0,0,c0e6be58a4f2f20ed752d41934ec31e6ef434c9b40a727cf73a45e49f6a0c1d4,2024-12-12T06:15:21.940000 @@ -244751,24 +244752,24 @@ CVE-2024-11807,0,0,5b0564826b05464c314eefc84d6d7fdc2dbd57c9a7cdeff75f8e6a6bda0d8 CVE-2024-11808,0,0,75f519afc7bb5c87c20928e7143a36463cbcdb95ed65cf999a2b84cb633366dd,2024-12-21T09:15:06.037000 CVE-2024-11809,0,0,1f74a5fd4084e6ffe9713972c542683f1719819d3bb81586e87aada1d25da361,2024-12-13T05:15:07.127000 CVE-2024-1181,0,0,75e84367823a14869b96be5d2a44185a42194134ed6d728c2cc873c3b47fce46,2024-11-21T08:49:58.703000 -CVE-2024-11810,0,0,775a4e17b3ca89ee87e40ba7b3f55729ab9fad21bf924c3b2c39e4cfdaa24581,2025-01-07T05:15:13.883000 +CVE-2024-11810,0,1,400641ac6087ee0558cc69c33aaa1017a57a8625fe18e9d983daab4a3ad426f0,2025-01-07T05:15:13.883000 CVE-2024-11811,0,0,de10a3ae4822973dd993404053b9029fe9aac56c38d9c3c2b8c2699bef5d0ac0,2024-12-20T23:15:05.590000 CVE-2024-11812,0,0,df32cc25c5bb5c5dcc725bf487d9704dded6625df8d19e9336934b5d64e1e261,2024-12-20T07:15:11.373000 CVE-2024-11813,0,0,47a3a35561cd3c4cfbe2425cc2aa9f8596afbe4dae47aa0811b6748805370891,2024-12-04T03:15:05.227000 CVE-2024-11814,0,0,2a13f9fe8be8eabbe1cb3354ac6af91e2a65c049708e435975b8ce27567d551d,2024-12-04T10:15:05.007000 -CVE-2024-11815,0,0,1c338dc05d62597f50fb04d3312b75ba17f9f73e3b5391315d3e569ff151c072,2025-01-09T11:15:10.770000 -CVE-2024-11816,0,0,44a8365b70415c54e1c2796c79be1d73f9ddd09db3f5e6b7378fefb8ad6935db,2025-01-08T04:15:06.380000 +CVE-2024-11815,0,1,69d47446f06da0442c4119d1d5b0771fdfaa9c1fcc2c009fd2bb7f3fcd33e23a,2025-01-09T11:15:10.770000 +CVE-2024-11816,0,1,bd04a084d9a1ee9573d15dbef4dd143313f8967005d7c71d6252765c4e37fa56,2025-01-08T04:15:06.380000 CVE-2024-11817,0,0,9a66a0fca3306ba25f6938738b8c35626d89b0596c6acf3b5c6bd12c17a8843e,2024-12-03T15:15:41.753000 CVE-2024-11818,0,0,03353c8ea92f63bcb93155865a1eb5dbe1fed70391bddfd4d8cf954b882838c4,2024-12-03T15:06:10.997000 CVE-2024-11819,0,0,4ad555b58c0b6ae087a0e197e14f318c0818cf9ebf662c2c2b44a9340719cc17,2024-12-03T15:00:58.693000 CVE-2024-1182,0,0,3f29301d892b117e83ef161f22ec91ec635f3f594205a460782ee4e3d4d8572d,2024-11-21T08:49:58.813000 CVE-2024-11820,0,0,851b7a45884f50f3792038cee6a0dd94b1414d7c7c3cad4aa15d26efb61c7827,2024-12-03T14:54:20.297000 CVE-2024-11823,0,0,c06b322c55c56e39da841e24dcfc245d4bbf700dd82f0350363e4100fb063133,2024-12-06T09:15:07.463000 -CVE-2024-11826,0,0,978742b568a878385fd8a9b641ea4d38722fc9aee92a4048f75713c88b655976,2025-01-07T12:15:23.200000 +CVE-2024-11826,0,1,fdc4af07f6e7b5ee0b73f4d7d8a1219ddc213ce8e610dc5dd959d6ea49e4b678,2025-01-07T12:15:23.200000 CVE-2024-11827,0,0,56fd4585b95b5b001b477bafaf482165d34a68f8e4c23484879244ef8898da04,2024-12-13T12:15:19.050000 CVE-2024-11828,0,0,2182fcc94d5c2924b387611eabcc64629aff0d6ea201e85bc92b19a7228cc503,2024-12-12T21:07:04.270000 CVE-2024-1183,0,0,65ecfa5c3d2b221c19281f6b798c6cc7087d171223e10f3dd191314d09620aec,2024-11-21T08:49:58.950000 -CVE-2024-11830,0,0,33dbd9201bda66f52f1b70839df73f33223bfaae4e608bbf9543f356ad7868e6,2025-01-08T11:15:06.443000 +CVE-2024-11830,0,1,2b9bcbcc6b8510fbe3715609ebd917cba06af0eebf5118baa1afa85039e0b1f0,2025-01-08T11:15:06.443000 CVE-2024-11832,0,0,7a6414b8a97e02ea73c05598b642d3e1c0cc9c0557b16b568dca85c729ab2498,2025-01-07T18:12:54.040000 CVE-2024-11833,0,0,2f00371e995b5b3574e742c8a1281cd097aa61871ee6812330dd6292e5403d49,2024-12-13T06:15:25.233000 CVE-2024-11834,0,0,124fbdacb7bd4bad593c6266594bab85739315b08458d1106e21c16eada45fb6,2024-12-16T18:15:08.243000 @@ -244783,7 +244784,7 @@ CVE-2024-11841,0,0,29b2d8ff488587d8a4e1b1dd2198cfdea87c7a6a53f626f6147622127a803 CVE-2024-11842,0,0,b468b59966d33ed9e284180ae3d4b6da56e7697d6ed23bc6f677a3b17c040944,2024-12-27T19:15:07.700000 CVE-2024-11844,0,0,04412f8d1e89e121c8013622c692022d4f804bc36ac5e0beee05cf8987e8ae7f,2024-12-03T09:15:04.473000 CVE-2024-11846,0,0,6d979cf66f6dd3ee37d22418790e77ab7d59d601391d04e5f4d4d86dc19d9a82,2025-01-02T18:15:15.860000 -CVE-2024-11849,0,0,8473aa8dbb39ffe86675b3f129e111bbce6418b17bab8f378a854d3fb16c0c29,2025-01-06T14:15:07.883000 +CVE-2024-11849,0,1,fb65e5751887cf6f925710b520da76940b8a448761cc265aabd26f7c6635383f,2025-01-06T14:15:07.883000 CVE-2024-1185,0,0,4ecd1740115bf103fbc8dca69b2cfbb42ac9a6d23eecf86cdd29f9e498ced7fa,2024-11-21T08:49:59.223000 CVE-2024-11852,0,0,fcae6a31251538fa21922d7f8a34f94ee6c6390a3a29cfb5a4e8903a4faa77f7,2024-12-22T02:15:16.510000 CVE-2024-11853,0,0,34e99eba0841fa956ba4d7c4a308f8505540f1a8e5d486ec7f2fdd3d46494b2f,2024-12-03T08:15:06.710000 @@ -244797,7 +244798,7 @@ CVE-2024-11862,0,0,7712aab25e9f815f730578195e7a4831741702c7ef40dfbc871d5c94d5212 CVE-2024-11865,0,0,42a8c32e42c8481cd421b33152335a9be7ed2d851fbfbce47808d03a397b663a,2024-12-14T05:15:08.150000 CVE-2024-11866,0,0,f98849df3d1b11c4a74b976ef8b2271c79a4b31b45f414582e51d5b7f2d3bff7,2024-12-03T09:15:05.487000 CVE-2024-11867,0,0,f6acb417b5c25ca0787745f2bd6aa4f31f6cfd5553556db6c5bd027949960f0f,2024-12-14T05:15:08.343000 -CVE-2024-11868,0,0,9d400447f563af0d1e5208bdc3ea3590dfa587ee7b12fac138eb35e27ad2899e,2024-12-10T13:15:15.973000 +CVE-2024-11868,0,1,e4cba310162af574b1b70d6362a32134ededff5447affe56d67cd79553b2214e,2024-12-10T13:15:15.973000 CVE-2024-11869,0,0,a3baa31d4416f73c33dff88cf9049afe2222269653dc692e0c231b411ae31126,2024-12-14T05:15:08.533000 CVE-2024-1187,0,0,34bfab1d2868a509e17e58177c8ef1072428b9ace11ecd550f1c0daa57f2d37c,2024-11-21T08:49:59.543000 CVE-2024-11871,0,0,36cc57375a53657e02bd7a0a87b9e1475ef36a9df08a07761721bf952ae1c645,2024-12-12T06:15:22.327000 @@ -244816,7 +244817,7 @@ CVE-2024-11882,0,0,c14c2af9493e334fe3da2508e7ca83b6d319f8d382e00a76baaf2e7e94429 CVE-2024-11883,0,0,3efb818468ee15a4b72e48a1c8061e4502ee7a82e825630c64edf1ae726709d5,2024-12-14T05:15:09.440000 CVE-2024-11884,0,0,cc9f4dc6cbe1c2166ce740e309ba0401705b8efb2b8ab841325213a1f1dfb2c1,2024-12-14T05:15:09.640000 CVE-2024-11885,0,0,04f2670653faa6c8c44289cb974ffa09eb74041d205c6bf3342ab059c2818d96,2024-12-24T06:15:32.093000 -CVE-2024-11887,0,0,8b88650a2741ab60c92c9d798a57f51f935fc2d2aabb3493ceafeb16c58ef1d6,2025-01-07T06:15:15.147000 +CVE-2024-11887,0,1,80f81ee5482294a9d428701089d311162ead8be6f57af34e5bb35113293ce607,2025-01-07T06:15:15.147000 CVE-2024-11888,0,0,8a06477d55991ecfcdfbbbe13cfc5cc7673a7932d3eb8f15153aab2ef7344e32,2024-12-14T05:15:09.837000 CVE-2024-11889,0,0,c40f4924de6b0709ad2ac4ea75e730ab583fde8e75b7967e6c96aa9146701117,2024-12-14T05:15:10.030000 CVE-2024-1189,0,0,3e2c1a3fc9f24eb6eaedd5adba4b6f521645b93b8971a5e9477fe83a4ee5ef97,2024-11-21T08:49:59.850000 @@ -244827,7 +244828,7 @@ CVE-2024-11894,0,0,9e31b28fa56a41e12b82fdf98576d9a13777f5eed7b6c3fc1f71a85af109e CVE-2024-11896,0,0,34f349ccc91bcf6d6c27bb81a454efc17924954cfa878d33ee370546a785a3f4,2024-12-24T09:15:05.663000 CVE-2024-11897,0,0,63c2369fafd5da048dd57864988be95602290ce10df0f51d423ab54c866c15e0,2024-12-04T03:15:05.380000 CVE-2024-11898,0,0,e843212abf00805a20f8b4b65b36c01f75cc2096cf65f2d0e7899f11eb517a82,2024-12-03T08:15:06.857000 -CVE-2024-11899,0,0,2d9622bde30df58f2b333ce412c343551a1059bea7bd567b64028a464b5ac3e7,2025-01-07T04:15:07.350000 +CVE-2024-11899,0,1,5d13f312c32a92aa6341f1bb7b66fa2f7ec47b859ffdf36ce88c4618587da220,2025-01-07T04:15:07.350000 CVE-2024-1190,0,0,234a49a5e7705658abf0b6e88d111180ae34b962c9b1fcba39bd09bd939fee39,2024-11-21T08:49:59.993000 CVE-2024-11900,0,0,907cc46cf6ec9c4d3d9c16ef3063c98e3f05e3d3fbaf96bdac5c807705a3d6e6,2024-12-17T00:15:04.917000 CVE-2024-11901,0,0,b4f47b708bd6950d29700a0fa25685f0a500c1152f87b15c0f3253f7e0b084c7,2024-12-12T04:15:06.817000 @@ -244836,28 +244837,28 @@ CVE-2024-11903,0,0,1fb664847ae87ab093a142384297236893b764bd45b68ea230b1dd002c36e CVE-2024-11904,0,0,cfe02e1e018fdb745163b14d85560843145fb371b7c3a3b355230dde5ae64d47,2024-12-07T02:15:18.263000 CVE-2024-11905,0,0,89d6ac7c0a69a770b8b688d45d6603a876edf464b165240c1b0f17863d68bf47,2024-12-17T00:15:06.073000 CVE-2024-11906,0,0,03234e0c61cd2ad73ce555c614f3ac9a8664ab2fc7213639ae1c28053e931f89,2024-12-17T00:15:06.217000 -CVE-2024-11907,0,0,032f983aa134921859b6bb3383d5475112b21b6fbf03021f2aeb154fd0431262,2025-01-09T11:15:11.240000 -CVE-2024-1191,0,0,ef0e46725fd632855b77f99b24f8a76187525aa45f002df92acf431759b3a65c,2025-01-02T15:09:32.670000 +CVE-2024-11907,0,1,ca683d37bc5a4d20afe3b5fbc1d6a90f23806b08849e658d9568212c1c4fa30e,2025-01-09T11:15:11.240000 +CVE-2024-1191,0,1,52c745dba0545bd32cfed56be99d144b4d9a393ab55ee6cd469c74d0a91573c8,2025-01-02T15:09:32.670000 CVE-2024-11910,0,0,7cdc56d220bb226d66f2e09af7dfa09212676d67ef40d93704c67462fa98d7df,2024-12-13T09:15:06.543000 CVE-2024-11911,0,0,caa0b453641ff9f186639ae770eb52db38531714654a626a4eab9e32db68000f,2024-12-13T09:15:07.083000 CVE-2024-11912,0,0,0aaa3071f593c52d1aa93372da39c5543ab6e6ea5c65e9bf469d02aec4ea5907,2024-12-18T12:15:08.950000 CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000 CVE-2024-11915,0,0,dc3ca0c1970f54dc4a5ca94d3cc15a32b71532a500815bf83b22c0157a62de2b,2025-01-11T08:15:24.680000 -CVE-2024-11916,0,0,ebf505af531198d809ed1e93c1d8be8e129094835bb0f050a7490a11374346ee,2025-01-08T04:15:06.537000 +CVE-2024-11916,0,1,464e041559dfa83d60b8bdd31a3964bc317579f730015b29aed3837eb5e98df4,2025-01-08T04:15:06.537000 CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000 CVE-2024-1192,0,0,4521fc6ae268791ebd6da2ad80ce9552b7ae38c5833cb5098776b1906357f9a0,2025-01-08T14:35:22.633000 CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000 CVE-2024-11925,0,0,77043a2dc07077ec38aa584033543217cc9fb39ce00751159aa83ba0aa54cc6b,2024-11-28T07:15:05.267000 CVE-2024-11926,0,0,12ad1d9fc49995c8eb92feee3b52ec9fafd14557b209a764d700401682560722,2024-12-18T12:15:09.107000 CVE-2024-11928,0,0,4eb81c3b991253e17b093831750d2f60d8030675796e16e7e29cc29429037a0b,2024-12-10T11:15:07.220000 -CVE-2024-11929,0,0,8deaa721c21e8d2ea81f795c01ca49300230626a98edc172bb677bbd08c1e1f8,2025-01-09T11:15:11.447000 +CVE-2024-11929,0,1,66064f3187dd0089c2014740486de1ebf4355d01734d9e211585842b939a7710,2025-01-09T11:15:11.447000 CVE-2024-1193,0,0,dfff57fc9ce7a1dbebe4335de503e2f3e62619c8f53eebdea960e5ff40a71456,2024-11-21T08:50:00.427000 -CVE-2024-11930,0,0,3d6f16686fbf2f10ff523adfd2c8cbb605e12592056b32937532511e03efa5aa,2025-01-04T09:15:05.880000 +CVE-2024-11930,0,1,b88c23e4935b7f2e83397c155514381d560f1027e29cea30bba30e9bb3837da0,2025-01-04T09:15:05.880000 CVE-2024-11933,0,0,ff719b80c8b04b1955877df42e564ce90eac2c09e4f59c20e785f18a1e8804d6,2024-12-03T16:04:10.350000 -CVE-2024-11934,0,0,df49356b7407c6592fac7ee78248ff2dfb17d24355b0e22b8f9a7697c9ad6729,2025-01-07T04:15:07.520000 +CVE-2024-11934,0,1,744a72b875229eda9af00bf8cde59d77110b18803c7442665bf58299c9e4d643,2025-01-07T04:15:07.520000 CVE-2024-11935,0,0,f2a8d43d6f9999d38415d9b41f66ab77f7c4f7c94de5d0bc77beeed93d88f487,2024-12-04T13:15:05.910000 CVE-2024-11938,0,0,6867b7d1c50742be481431f973c83467fcdb9442488abece06649b31c7a1e61f,2024-12-21T07:15:08.453000 -CVE-2024-11939,0,0,b95eed38aa7cabea890717532ed8c1cb47c078e37c559b6590476c8922b1b508,2025-01-08T09:15:06.630000 +CVE-2024-11939,0,1,6345ccf177226852fd504f0bbd480483116e863a5c5b707e8b4952ffc0b3c45f,2025-01-08T09:15:06.630000 CVE-2024-1194,0,0,2ad6fa2abb4bb109947132f87b19e7c09219cf51535c19102f3cbbfcba6ba405,2024-11-21T08:50:00.573000 CVE-2024-11940,0,0,01a3f490196796516894d51522c528bc6c3ce1fe45bff9fda5a3ce37bc326c56,2024-12-10T09:15:04.870000 CVE-2024-11941,0,0,45c946faed9eb1ec18b9452e07479f063cfb793c63899cab9a102bedb1be5328,2024-12-05T16:15:23.893000 @@ -244889,7 +244890,7 @@ CVE-2024-11970,0,0,1a849bf68450bf6823e4c6c28effecbfa7f1d9d228ab32bedb6122aff4f17 CVE-2024-11971,0,0,3a422b96c75e64944718f4261ea83fbe383ac9a8c822f0cea915713588b2fd46,2024-12-03T20:04:46.493000 CVE-2024-11972,0,0,424587fa039b828712cb1884c1163244d01256a0bdacac0a3ceb996cedd795f8,2024-12-31T19:15:07.720000 CVE-2024-11973,0,0,09d34ca9011760fd34330c9c7e372ea8a465e3a408c53b2a4fa8f77978915f63,2024-12-10T10:15:06.123000 -CVE-2024-11974,0,0,cf49fc044947103110121ee3446c84a5c15bc5b04a70d0069f506f104fe1f42a,2025-01-04T08:15:05.950000 +CVE-2024-11974,0,1,e9d099e9d9c957fb0b6621d5143a605d3fdbb7db76288b052e730e7c33c69f6b,2025-01-04T08:15:05.950000 CVE-2024-11975,0,0,84cad561d2ec5c4dedd114d83278d4ca351957794503794e490beae7d9c6d982,2024-12-21T07:15:08.657000 CVE-2024-11977,0,0,af26de0ab40c66a5abd33edf8cb265762cba41d602bcbe3508dca43ee46ada56,2024-12-21T06:15:21.830000 CVE-2024-11978,0,0,ee6613517c5b5a8efee7de187c6205cef62cfcd4704997164fc2a04147cb6c76,2024-11-29T03:15:14.700000 @@ -244924,24 +244925,24 @@ CVE-2024-12014,0,0,d63bd7a401a8fb5ede49d9de357706a50a82cd2bae6c930cf8555bf9a9cab CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000 CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000 CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000 -CVE-2024-12022,0,0,08c553a81c76cd8c361877e5f844a3ca91d6fad54d361a7829130df17ee98a64,2025-01-07T04:15:07.677000 +CVE-2024-12022,0,1,8ddb6cca3fbeae75228ec6bf3688dd732e1771ac09aec57ec3253b8f7ff26581,2025-01-07T04:15:07.677000 CVE-2024-12024,0,0,a8f5c653a0f41818f117c378be0858d1b5c96c482668ecfb6f6099471186e39b,2025-01-10T17:56:30.330000 CVE-2024-12025,0,0,48a6a81843ce463d9a84b144c8201ecb34a901e35178968cb10c7b2b1d7242fe,2024-12-18T04:15:07.347000 CVE-2024-12026,0,0,cbdee4f4d341b218f2a9910c9db7c968e1470cd32e93684865d3bd2934d626d1,2024-12-07T02:15:18.520000 CVE-2024-12027,0,0,37ec4b44c0b83690aba6eca2d38a4a49f2c2ce6081a618c323d63a584206d2b7,2024-12-06T09:15:07.803000 CVE-2024-12028,0,0,1e73c6e2445828811f3920b16dca38e7a1768853994affcbd716568d4e1eb5f0,2024-12-06T09:15:07.957000 CVE-2024-1203,0,0,d1f896c2674b7d8b8ac7ccf181e7d9a7e598afaaabec693045eb0f85d52368c5,2024-11-21T08:50:01.913000 -CVE-2024-12030,0,0,4c9be3d3c771a2a84deb95e4ca1d8f81b8f40a5951ad9016519f0f2d8a48c521,2025-01-08T05:15:09.510000 +CVE-2024-12030,0,1,ab03bb849d6b0ac5fee4be199a6829464d936641a4ff08f4885974ca9f654ae5,2025-01-08T05:15:09.510000 CVE-2024-12031,0,0,d30b745c703c186af9776c88e8d0d222bab220bbc78efc5ddb772b6e524ac88f,2024-12-24T10:15:05.580000 CVE-2024-12032,0,0,d28549d87ab7a1da8c8e60b219695b8c0bac78074e1f07aa186ddc87bdbbdb60,2024-12-25T04:15:05.497000 -CVE-2024-12033,0,0,54825cf5b8066f27193c477b2f79dabfe72cf6e17be404638cb6d9b3454d4164,2025-01-07T12:15:23.900000 +CVE-2024-12033,0,1,e927f07a2b56ed9559feecac9475721158968fcd0a3607e8c3de6dc754c6f0be,2025-01-07T12:15:23.900000 CVE-2024-12034,0,0,9c507f78158cc030dfd314ae6dde1db490ceaf3d6dfd0f8120e54566524e4e3e,2024-12-24T06:15:32.553000 CVE-2024-1204,0,0,52c83c0f4289636bc1afd18cb37875b782729e90167239cc1a53f532e5633e12,2024-11-21T08:50:02.033000 CVE-2024-12040,0,0,82ff661fdb988bbdc555297e0b0d4a5a42a6c3fde3cb51373bdf40b4e4dd0633,2024-12-12T06:15:22.947000 CVE-2024-12042,0,0,b4111492e93c9126d488ebee36a5b9ed9603a0917a66407440ec106154a8d6d8,2024-12-13T09:15:07.370000 -CVE-2024-12045,0,0,ad54b682dce24c393ea27c2928416acab23666a9d2e518f72a3a5a322336cafa,2025-01-08T08:15:24.683000 -CVE-2024-12047,0,0,b519fe3aa5ce2a0ef1dc7a25def83e3d7d75fdf22001ebe45f82c1494b6008ec,2025-01-04T08:15:06.157000 -CVE-2024-12049,0,0,1681f5b0744998dc98b0ac8383ab3f305ba3143c966050706a7a972316fca8e2,2025-01-07T05:15:14.147000 +CVE-2024-12045,0,1,129733e1a8172f1173193ada9167ebfa92abcbaf9c1c22ab7b433d2b7a56ea29,2025-01-08T08:15:24.683000 +CVE-2024-12047,0,1,8440f971596bd55cff74a4ca413c1e3de197b2701820ea36a0544bdffdfe4e47,2025-01-04T08:15:06.157000 +CVE-2024-12049,0,1,42e54420720f33c4562344743dcb6a33224d938ded42006d07df2fa0d0a23306,2025-01-07T05:15:14.147000 CVE-2024-1205,0,0,7a555763b4ee56426377ab020ddc9dc79c7bd15b9be6f5edc39ecd5779b4ad33,2024-11-21T08:50:02.210000 CVE-2024-12053,0,0,bc2b289301180bd6933809c4de004e58bcafd2b88fa0501ccb1750c43496ee92,2025-01-02T17:47:20.023000 CVE-2024-12056,0,0,d7fbaa89c201679c30b80d6484a6860abf01d1ecc41424a8e0b08b504062cb8c,2024-12-04T15:15:09.700000 @@ -244953,11 +244954,11 @@ CVE-2024-12061,0,0,e705f6d208be0412d9e4e1ed849702d7bdef1edc0803b726bf0fe97bd2731 CVE-2024-12062,0,0,72735736917491b453ec9a8b66f16471859e8308b17c93b657198e604c611c2f,2024-12-03T10:15:05.493000 CVE-2024-12064,0,0,5bbffd5016c2c66c65f1cad07469a2c9304ddde32e6765225186e453c653a401,2024-12-05T22:15:20.080000 CVE-2024-12066,0,0,b8b74ff74daf8006195a72a7866cbbcaf66d537ba02c482e9dfaf1c6e82963a9,2024-12-21T07:15:08.907000 -CVE-2024-12067,0,0,6a03fcf12bf72536cea254282433d0797e729d3e25197c51a24b4806379b69aa,2025-01-09T11:15:11.647000 +CVE-2024-12067,0,1,1e92db34fdb6070fa741c6f0fc31b2e9eacb1c54540470e816605dc679b61bb9,2025-01-09T11:15:11.647000 CVE-2024-1207,0,0,7ca2a33c54192dfcfa7fe7f99bed16fbfa1215b4ac8ba5de485b890ce26af06c,2024-11-21T08:50:02.457000 CVE-2024-12072,0,0,a174c14ab62255e805373ea4d76cdd13bc3d9cbde3ba4a3927979f9e7d419d41,2024-12-12T06:15:23.383000 -CVE-2024-12073,0,0,475cbc36cb5ae8f88984192a7bf4a297e0f4afe77d63eaa7029ef51bd04b08b1,2025-01-07T06:15:15.367000 -CVE-2024-12077,0,0,900783299b8578808c41fc7dff21c3950c6eb66f68d3d53d4274028220f5674e,2025-01-07T08:15:24.927000 +CVE-2024-12073,0,1,d6db2f0c4889187ac33654deef83fc5d0350b2e32b900f5fdab17885bff03ab5,2025-01-07T06:15:15.367000 +CVE-2024-12077,0,1,fc51d2e5a9f19fe3fbf82780f8b1560f161bbef921778ce0625a7b0a0068014e,2025-01-07T08:15:24.927000 CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669a9,2024-11-21T08:50:02.590000 CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000 CVE-2024-12089,0,0,e4693d0f49f7bcd8f49a3c46cbf99b45117c9aeb9696a4344a79bacac3eaba78,2024-12-16T15:15:06.250000 @@ -244967,7 +244968,7 @@ CVE-2024-12091,0,0,35c9100407a2a2f03cc09233dbdc35208e548ffdd088d484bb9b374c740b5 CVE-2024-12092,0,0,6cedbb52bdc4fd872b35781acb98ac9a9b54d520c5d29f314ba42350997260f9,2024-12-16T15:15:06.677000 CVE-2024-12094,0,0,918109c0341953bed354c9dc0c1e3bf994d002b139d0d147a6756e1d0b4180c2,2024-12-05T13:15:05.923000 CVE-2024-12096,0,0,a0b37dcc639d983cbff8481184c987ae3b7851e6c867f94b52bee5fdf38bc784,2024-12-24T17:15:07.497000 -CVE-2024-12098,0,0,b63726c5152f425567a10a211b5f28fbcff6e537525be9d0cac5349c5e9b327f,2025-01-07T04:15:07.837000 +CVE-2024-12098,0,1,cfa03906537e6957dc74f6fb1d7564d835cb1a36c16bba952c18f41c644686c9,2025-01-07T04:15:07.837000 CVE-2024-12099,0,0,82c97da21165b875b9d77b9a11ed031ee03fad8a14b90d2e80c74afeac6e262d,2024-12-04T04:15:04.287000 CVE-2024-1210,0,0,f5a9389cac94cbfcfa3f0d961d1ea27115bf7afa331ce2988db15dbaf2efdf76,2024-11-21T08:50:02.867000 CVE-2024-12100,0,0,5d9bee140d619efc5bcb5724e98abb1747cc29824dfdae10a66de74940256d24,2024-12-24T06:15:32.830000 @@ -244979,36 +244980,36 @@ CVE-2024-12107,0,0,7da8659dc821ee4f071df4b42d3ae5a3881cc2b8cc55779739dc797df4a30 CVE-2024-12108,0,0,a851d0a44f06acd627e09429b72e15713bd7cb0608174f612b61d76d8c8e9845,2025-01-06T16:51:11.320000 CVE-2024-12110,0,0,f266935beaa447960f1dea8d3421db64eefadfd0613c53fd8d2543de02327a47,2024-12-06T09:15:08.270000 CVE-2024-12111,0,0,94cbde89c1eb7b342ad5b2e1b90e676e3d9dc7b09262fa3ba8de5cb41e47a11b,2024-12-19T20:15:06.950000 -CVE-2024-12112,0,0,cb0f7873248fd4a1fa61695f98ef1eefe20e324e4ad567998bdfa3d468a39f02,2025-01-08T04:15:06.683000 +CVE-2024-12112,0,1,675887d484c30a489c839813de06f4a2c0e83ee331233fc3bb15be475c6237ea,2025-01-08T04:15:06.683000 CVE-2024-12115,0,0,e6944683813361fa4999b92dbfb5849d2d0c20bc3f6186b671317bdf2839435d,2024-12-07T02:15:18.653000 CVE-2024-12116,0,0,869ce525ce7e781c5f6c67db9c3c06f2e95fa2c0db4e986ac99d9fc5b5f2ce69,2025-01-11T08:15:24.867000 CVE-2024-1212,0,0,c6c0d98b39fe69ac963e13ef16e93aec1a62abd1466de44e7788f638a4921cfa,2024-11-21T08:50:03.010000 CVE-2024-12121,0,0,03702b315699ac0a86731f33a73d0aefd1ecc16bf8d72dc7730c1bb362033b62,2024-12-19T02:15:22.610000 -CVE-2024-12122,0,0,cd1f78c8c596258a19e9ed3e4a0459f757b23ea59e2546cc9293883a9975ed13,2025-01-09T11:15:11.860000 +CVE-2024-12122,0,1,2085a2ad9176305a3af7546ac3413558f58015df8bc020f0278e8be2ceaa6a06,2025-01-09T11:15:11.860000 CVE-2024-12123,0,0,3314f70340307f7968d2c224d2753ec462f128bd5dd04a8f7d840d35f281e69e,2024-12-04T04:15:04.430000 -CVE-2024-12124,0,0,0fd98c73daa8d1ce9959268c0475817b20b4d7ca8ce2793643bde29f6970a1fc,2025-01-07T05:15:14.340000 -CVE-2024-12126,0,0,b0f00c4bf0b4302d6115af0d6af3b97db152c00b497d912443ec3c39ea9a8c54,2025-01-07T05:15:14.533000 +CVE-2024-12124,0,1,546dc01e2004b604a5fc415ca243f058dc4bcf606929b3949091b081b3f7e353,2025-01-07T05:15:14.340000 +CVE-2024-12126,0,1,f0dba97c4b38b793141b5ed36f9c91b3565cc2f54b35bc6ac8e4ea605c3201a9,2025-01-07T05:15:14.533000 CVE-2024-12127,0,0,5a71954d556e5e4eca59c6ef18b25e4cca9d5062e24f45d25c54cd9cd408718b,2024-12-17T10:15:05.830000 CVE-2024-12128,0,0,c4db33033b659bed09aac37afde730f735bf98fa121412b3aa3432fe49f39a39,2024-12-07T10:15:05.843000 CVE-2024-1213,0,0,71ef51029e532fbd05d5ffce04ca88ce9c1183a8c328c139d7f9dd3d163c9edb,2024-11-21T08:50:03.180000 CVE-2024-12130,0,0,05811205e7cf6b9d5db685121cc1c0a1d80fffaab6e459b31891b300ff7dfa2c,2024-12-17T15:52:01.670000 -CVE-2024-12131,0,0,b50dc8141efb54545f53e53503958a7d227de839d3f1683a10114224d869f79a,2025-01-07T13:15:06.440000 +CVE-2024-12131,0,1,13f02a71aaa32136e25257b1d5a02357f3bae8da21875c47830a0a64cb341eb0,2025-01-07T13:15:06.440000 CVE-2024-12132,0,0,80a7c8d496b1886913eb9109e260df5ae2c0aa6f78d2c4d5ff0aee7f1f0cf7f0,2025-01-03T09:15:05.983000 CVE-2024-12138,0,0,8d975d6d21268c978bf38e4ecd10070b486d972f9cb2bde16883c51e239ae6fa,2024-12-04T14:15:19.413000 CVE-2024-1214,0,0,006edfeb44add0513d6df0049d407da5a783feee7b6e41af090a449d9f26b334,2024-11-21T08:50:03.383000 -CVE-2024-12140,0,0,84cf86e00b498546176b727137ac2a768edc827afd618f9d2c61ff836fb1f63c,2025-01-07T05:15:14.730000 +CVE-2024-12140,0,1,c2add199266b1c986c32a034700db286963405079b6f69910eeedd64a6ce0f35,2025-01-07T05:15:14.730000 CVE-2024-12147,0,0,0ebd2d9e73219a39fb6777c8b0dc3255058db7114ec6ee0c20c337fec7f9520f,2024-12-04T18:15:11.803000 CVE-2024-12148,0,0,2d82ecdcd1ae8b06b2bbc4387f4ec8d5588d3a1672ec54422fedc0a9fcb34bf5,2024-12-05T19:15:07.473000 CVE-2024-12149,0,0,6cea541fb8390eb73924fcce3986b6c54a0134049e02ebc343dd9227319eb6b2,2024-12-05T19:15:07.627000 CVE-2024-1215,0,0,4329416f300d2c475797311e08de13347ae9dc69f951944050207e3d4abf36b5,2024-11-21T08:50:03.560000 CVE-2024-12151,0,0,958cd3e076f1ea17ca0ad827def723dfad6dc87ee6b3f8172337cf6f1994be20,2024-12-05T19:15:07.773000 -CVE-2024-12152,0,0,1dc4d714d933a7ec7cbc53e21622c2f5d4baa2b340656239841d653772077f96,2025-01-07T10:15:06.577000 -CVE-2024-12153,0,0,22e2967fc47cf53b1f6950bbe994a9df52e94c829c300fca48f8d4054f6ee1bf,2025-01-07T05:15:14.927000 +CVE-2024-12152,0,1,5a1d4d7f0aa379bbbfc5c795af6f48efa7d2c7af7b58f75617e710a6121e79b8,2025-01-07T10:15:06.577000 +CVE-2024-12153,0,1,ee8fdb07044f47e63da8bef3775a8e8b6e3c5cfbf491a775b0902d77fe82a75e,2025-01-07T05:15:14.927000 CVE-2024-12155,0,0,a9bad28298e0ff298ba13b998a693d2b1a968d7ec52abbb9a976f5fdc4810431,2024-12-06T09:15:08.417000 CVE-2024-12156,0,0,2e2ae1d329cdc90aba56d374ee329c37f84e6225dfe0fbd4afb09b6a3021715e,2024-12-12T05:15:11.163000 -CVE-2024-12157,0,0,a19dadfc4fb54967c2955b5bead8bafcc01853ab1ae25fb93fbec84bd54e4d60,2025-01-07T05:15:15.133000 -CVE-2024-12158,0,0,25ed1c3814406cad8f35b5c4879838e5e610bcc4431220e1731829bc6b113176,2025-01-07T05:15:15.323000 -CVE-2024-12159,0,0,64e61826ab5c5975d420658cde528c10f1d1f6efa904e496d8ad1f5937e1f6fc,2025-01-07T05:15:15.527000 +CVE-2024-12157,0,1,535c4b97dd646214b1864f0d0ebab20f2e392c855a6fe1522de166d3b249925c,2025-01-07T05:15:15.133000 +CVE-2024-12158,0,1,c3d423fceff151cd3f8b582ce622275aaed4d2efba7de40bfd0900d8f163d75d,2025-01-07T05:15:15.323000 +CVE-2024-12159,0,1,a32ab90e71369424b90b3e2689249267ea99ad1f074ba09875b9ba6ba23f180b,2025-01-07T05:15:15.527000 CVE-2024-1216,0,0,2ac4284b62a708a705b7ab9ac6ff4ec2f3952b584d951b1f83e5c9b3524c781f,2024-03-21T02:51:38.760000 CVE-2024-12160,0,0,2c6191a6a825b29c030b8d3eb20fe09ec5c665c03e8080de9d738d6bc79c2538,2024-12-12T09:15:05.220000 CVE-2024-12162,0,0,74000f06bf15c8250a3d3772859e4a16bab71460bbdb53ca978f73d57f64b12c,2024-12-12T05:15:11.750000 @@ -245016,11 +245017,11 @@ CVE-2024-12165,0,0,565f6113f161726a36dcd8f87106f931ffa1dad23df770638714143fb4529 CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bfc3e,2024-12-07T02:15:18.923000 CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000 CVE-2024-1217,0,0,3de4593a5f9b417a5fbd6236f528d532a8a6dfb588724578487cd5ad8c5d1072,2024-11-21T08:50:03.817000 -CVE-2024-12170,0,0,7d6479dc0709ea7976092a5192eec7c92ddc670f347c515df955cd001fdcfaa2,2025-01-07T05:15:15.713000 +CVE-2024-12170,0,1,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000 CVE-2024-12172,0,0,71dcf4ad1517a839187dba7f34de208b20f0af666e791340d3555b8bf199e319,2024-12-12T06:15:23.587000 CVE-2024-12174,0,0,d557284551bec104067ec802c1680b85a8fd3b4f89f1ebaca3a04bd8bacf5eb2,2024-12-09T22:15:22.237000 CVE-2024-12175,0,0,d343e9c859734ac59607cdd69472323b5b2b24ca1f02ce9797a72fd283ae52a1,2025-01-10T21:26:56.183000 -CVE-2024-12176,0,0,f3a72da294d6ed072e2856bd39515dbd185e3dc49192b20d3a26e3837057e448,2025-01-07T05:15:15.900000 +CVE-2024-12176,0,1,c0f27faa92b2096f6d155f1bdd3b84e12e907e1e8188f65eb3c16d954de1037d,2025-01-07T05:15:15.900000 CVE-2024-12178,0,0,85097aaa964ca63d98736b6294a6f2c33aab0e7c117a2f19277506f724b552a8,2024-12-17T16:15:23.687000 CVE-2024-12179,0,0,a0a65d195e49bd7b826852d9b69fa37a100c8cceb44f5eceb7a4713ebca18c3a,2024-12-17T16:15:23.870000 CVE-2024-1218,0,0,ae65e02be37dbc9babfa45210656ff360cc199b16c8680945f92dd585fedfbc3,2024-11-21T08:50:04 @@ -245038,7 +245039,7 @@ CVE-2024-12191,0,0,1e8bd8b2f07b3fe146f4b61013f2b06e2a8540311589dff28519979e9314f CVE-2024-12192,0,0,834144ca9fc9b2f489354c4c77819ed4316907b7c59c9cd340994d34c3340476,2024-12-17T16:15:24.130000 CVE-2024-12193,0,0,10ce2992a46aa457016dda8b80435b1cc3164a5282166d2cf793af020fd1e4f2,2024-12-17T16:15:24.247000 CVE-2024-12194,0,0,0e20cc1461477ab11889597d984f84204a7b805ad5300cb09bfa539588353be0,2024-12-17T16:15:24.370000 -CVE-2024-12195,0,0,73ca58f0e099117114caa56ab58ab900ae81f0d95755208245f9eca55423290a,2025-01-04T12:15:22.953000 +CVE-2024-12195,0,1,e985241cbbd47b77ff97bca07a3098d31b4bc940156c2dcf53fbc49c29a86d11,2025-01-04T12:15:22.953000 CVE-2024-12196,0,0,9fa580adf43e9cbf06e25fc8b96bbf2ae78be5e0921b9598efca40b2ec0f8630,2024-12-04T21:15:21.090000 CVE-2024-12197,0,0,dedd56b6ad9e63809150ef147450d70c9b3fa5f2f9c5fcfc5fb76bd61ec18f37,2024-12-17T16:15:24.493000 CVE-2024-12198,0,0,1ae05c6d195d1fa95932ba78f37c94c53257b7fbac2ea052346fcb00c2f64367,2024-12-17T16:15:24.617000 @@ -245046,23 +245047,23 @@ CVE-2024-12199,0,0,c4a94d94cf3a0ec0f1a10765eb1371db0ca63357c63383a89961385697ea9 CVE-2024-1220,0,0,9554836c8027e0b7a98d02c469b0640f37340ff8518df5c7c53c1851829f880c,2024-11-21T08:50:04.733000 CVE-2024-12200,0,0,23413f89ab73dcfe4f53913520af84d44004f8074e56a4f24db9e34101f9d57a,2024-12-17T16:15:24.897000 CVE-2024-12201,0,0,24aea21415169e4ceff164eedb7fa32646ef24d523e6e014144846720c08c29c,2024-12-12T07:15:09.607000 -CVE-2024-12202,0,0,de392d017a2cde554eddfd34575adabf2f2bb89cd4dcf190c1f3aa8d5126404e,2025-01-07T08:15:25.090000 +CVE-2024-12202,0,1,f8e879b581e6948b8611c91e34e77898ab31ee3bd4fed08e5a23f457acda7001,2025-01-07T08:15:25.090000 CVE-2024-12204,0,0,dd2419f837ae2e8153f295f52cb2a01f412a1909c214527d0037cf9f21b9c1a9,2025-01-11T03:15:20.997000 -CVE-2024-12205,0,0,047d79feb29ebf288479cef73d13ee19472dab8c826e2da0e7c21592d5e5973e,2025-01-08T05:15:09.667000 -CVE-2024-12206,0,0,3e46952e21139ddfb31587b140482f6dad3077922fdd1dff103fd72547e4dedc,2025-01-09T11:15:12.070000 -CVE-2024-12207,0,0,76c8fa95f11590dc49aa5b062e9bb5af48aaa9477d134f7c1609580bb8e1c8b2,2025-01-07T05:15:16.080000 -CVE-2024-12208,0,0,e03ecc3884be8ef44ef5a077ba53c4a05754ec74a94b603c1e749a21b3975365,2025-01-07T05:15:16.270000 +CVE-2024-12205,0,1,3f132fb045992282c7f82c5a064b4363ee95bb769165d08b8391a552ea18c9e1,2025-01-08T05:15:09.667000 +CVE-2024-12206,0,1,2d268b18f02f4bd906dad5a4345fbb5bf68ec20740bfded288226575e3fdc866,2025-01-09T11:15:12.070000 +CVE-2024-12207,0,1,4215076d4c349db5508fc90ade02423810084b601173785e651a4489dedc1db2,2025-01-07T05:15:16.080000 +CVE-2024-12208,0,1,853007bc09d49f6c092cb33c65061bfc51c7e3b97e6ede52f3abfcbb921361cd,2025-01-07T05:15:16.270000 CVE-2024-12209,0,0,965d45920161ad8379a478313464ecb572a2b8b8ed1bf056a1646168e0b8105f,2024-12-08T06:15:04.823000 CVE-2024-1221,0,0,c833d2d1840e5e81b3c325295532e3c4cac8ba514abb434d638a7c419bdc43e8,2024-11-21T08:50:04.920000 CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000 CVE-2024-12212,0,0,4068a90166bc858f8bfa4c7fe1dbc180f7e4e033930f31a1b74471c9abd7763b,2024-12-13T01:15:05.810000 -CVE-2024-12214,0,0,e5bb0332e0fe01f5cc924fbc7ed5aea720d65c55a0e9216597df8548b18bb334,2025-01-07T05:15:16.470000 -CVE-2024-12218,0,0,809d0382d9b5aef64cfa79e748563ce0ac486797007d9144ac5f2a54d1521c12,2025-01-09T11:15:12.280000 +CVE-2024-12214,0,1,145b7db175966477886a9ffd7c811efe626794ad8e1d70413662bfa5c01eb691,2025-01-07T05:15:16.470000 +CVE-2024-12218,0,1,c54e0970e9fa3f5da91494a744c33c1884c0ee1f4d82830e251b56e753e1af4a,2025-01-09T11:15:12.280000 CVE-2024-12219,0,0,30a275e193bbba91aa16bdcd2e01caf0ae8c253910825d417094094009d7c6a9,2024-12-17T08:15:05.010000 CVE-2024-1222,0,0,ff0f67607974451388d42ae6b90b2e9690717b801a6493a4e7aa508a94c6883e,2024-11-21T08:50:05.110000 CVE-2024-12220,0,0,5a9af5863bd9968393d1012c1c5f5fb4875db98205155149f405e76579a2b19e,2024-12-17T08:15:05.393000 -CVE-2024-12221,0,0,8fad08691cce151fb30093e1018ac5dece558333693419a9442736a1f5767a8b,2025-01-04T10:15:06.410000 -CVE-2024-12222,0,0,6f911132db72679ec1b57ef45db6f2fd945a8358f5cbfadf2f176b9557b4ca82,2025-01-09T11:15:12.490000 +CVE-2024-12221,0,1,a87846a9ea687f0610603fb61d7ca73e4beeed151fc32a3afc0c338aec17e851,2025-01-04T10:15:06.410000 +CVE-2024-12222,0,1,0124c6cfdc91b4979955e2191dd7c13c0eb40d8384f002a9efb114a750f8d213,2025-01-09T11:15:12.490000 CVE-2024-12227,0,0,c353a784c73b22c93b545f7e3c07e2ff77771e5d977f7464354ff7113388628f,2024-12-05T14:15:19.400000 CVE-2024-12228,0,0,cba3b66c66f8b74b7da0219a0273d1dd0c005a65d0aca4a38c9a6589b54985c9,2024-12-10T23:19:04.773000 CVE-2024-12229,0,0,aa44844c8d830c107b3760370b58cb504158d7d7c510be09891b02a376b9c9ac,2024-12-10T23:19:31.487000 @@ -245074,28 +245075,28 @@ CVE-2024-12233,0,0,d89c9263a4f22f201b1dce8be51578aec307181a11a72f57d5d6a093a5589 CVE-2024-12234,0,0,25d3aa7d45ccf0539b66121de3bcd155bbef1f8925f8aad4f69521eed8a998f2,2024-12-10T23:25:36.387000 CVE-2024-12235,0,0,92689efaa37165c78224efb1efe409523be7fb3f3558d4576511504eb96aac91,2024-12-05T18:15:21.660000 CVE-2024-12236,0,0,390d11985338138a2913d618c1818ae388b2b2c32249174c40691687eabfe343,2024-12-10T15:15:07.147000 -CVE-2024-12237,0,0,f56cec9b9a8561960e0bd6e6b1543c245e67760db1999f8a3bac457cc9192e98,2025-01-03T23:15:06.473000 +CVE-2024-12237,0,1,bc9c0d4c537bace6ba73f5084a4978adc8d5b928619c3c4d0e52cb7bef9d5351,2025-01-03T23:15:06.473000 CVE-2024-12238,0,0,0b2506120279c72470fe6ced119aba981e066d08bdac68bd9b96e39e9d942dde,2024-12-29T06:15:05.487000 CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d141,2024-12-17T03:15:06.710000 CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000 CVE-2024-12247,0,0,ad117a7da5529073984608210b9ebf0c8357341e47d0f7a47c01f4275cf4ac25,2024-12-05T16:15:25.243000 -CVE-2024-12249,0,0,e41070fc4bf83345dc6d2dc8cee93585cb3e872e74f6c9c591576d93f6051cce,2025-01-09T11:15:12.683000 +CVE-2024-12249,0,1,e2547863ff0e51895fdd9ac079296565876947375b7269d971dfde5e35972170,2025-01-09T11:15:12.683000 CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000 CVE-2024-12250,0,0,e5f748db33ee246e1110b31eaf24b071ff8e9ad960657a91bc37454c3187e14e,2024-12-18T04:15:07.657000 -CVE-2024-12252,0,0,d2a36d6f8519946aa283013662310c3484c591468bc446e63c62515e57b10fb1,2025-01-07T05:15:16.660000 +CVE-2024-12252,0,1,f0cb19f49810803840f5ee985f8df8513974df82162830a7e3c14eaee14d9385,2025-01-07T05:15:16.660000 CVE-2024-12253,0,0,ddc85ae180bc30a65db67a43f7fe8d6c4299882333782166c00f6946fb3a98d4,2024-12-07T10:15:06.030000 CVE-2024-12254,0,0,6372ca23e9b475efcbc80401e5929ada552ac002068d1a3c23d690a8cfd8b99c,2025-01-06T18:15:18.713000 CVE-2024-12255,0,0,3e6ee7ef8ecf957b3c9750bb4e9452362942858fad7f6d35e3c4d339eaa5898b,2024-12-12T15:15:09.967000 -CVE-2024-12256,0,0,91c1dfa0d3f9166fdc561fc70b740d210ee69feddbaebc652f41556e6e501ed5,2025-01-07T05:15:16.857000 +CVE-2024-12256,0,1,c941079a381520ece27502570cadaf7ad5874ae769a71d660938dc9b1a958440,2025-01-07T05:15:16.857000 CVE-2024-12257,0,0,51052901a7cca4cc3e08f8db1db23715b8800d7e5a86753505efbff635c332e0,2024-12-07T02:15:19.187000 CVE-2024-12258,0,0,3eb19625a1330fc72081e9c0b05d899d6c52aedf5334c3f98a645064595ca085,2024-12-12T04:15:07.160000 CVE-2024-12259,0,0,e9a04546160f01ff787a627ab63ead177a9297f047c69a037836e7bcca93e425,2024-12-18T04:15:07.803000 CVE-2024-1226,0,0,b8e723228c95f73a75e74922943d4c7b5983bd824925379e4a1dadf0498e92dc,2024-11-21T08:50:05.893000 CVE-2024-12260,0,0,6279b3003f5c04cde3aca10d6cb551198f7d4f49319583b742575d1bffcdfccd,2024-12-12T04:15:07.330000 -CVE-2024-12261,0,0,34eef7a15fa985b49a3130adeab4cc38db0c9ba3b02933fa45bb90b598ada31a,2025-01-07T06:15:15.593000 +CVE-2024-12261,0,1,1281828c3b4834384a5810ba11c490725c61bc660d75ae807210041ba017e6ed,2025-01-07T06:15:15.593000 CVE-2024-12262,0,0,fa3931ee556920568b7665df357fd87a96e303a16aae692eb53618f8bcee485f,2024-12-21T07:15:09.163000 CVE-2024-12263,0,0,183574df079ffbee27d57051711c108d812463b16a94004cdf52784fa08d4f65,2024-12-12T06:15:23.960000 -CVE-2024-12264,0,0,ac07b413924d52c19722b6b39f9a97f1b1b6f0599f1ea1cddba029abd74d6a9f,2025-01-07T05:15:17.047000 +CVE-2024-12264,0,1,e129c73367ffc6e13d3dd51e083cadc63c28a6ddf76a9744461af75a10c38dd6,2025-01-07T05:15:17.047000 CVE-2024-12265,0,0,4ecaf6258b9c646985803002f662a35d37ddc850eb892429f8568423d5e8ff62,2024-12-12T06:15:24.143000 CVE-2024-12266,0,0,909ac121710013990590ae1f8a6d6364fd581e2e3e734e8055f1296c676eb281,2024-12-24T05:15:06.433000 CVE-2024-12268,0,0,57b1dbc34c4fad3378e18637f11a9af5fae95800fe2a5a30ffdcb7012568a613,2024-12-24T11:15:07.623000 @@ -245103,49 +245104,49 @@ CVE-2024-1227,0,0,2b74966c63acb4b53db9100814c0ea98b900c2b18de594c13a326b21bfb265 CVE-2024-12270,0,0,a59b36ad08a62409fa966fc5cef53e6796ba20371cadd9c7e001162bc2771bae,2024-12-07T10:15:06.200000 CVE-2024-12271,0,0,e756524ee3996486f46fc9dfb0848744c8a90daec55e50296545ffd31d194dcb,2024-12-12T13:15:07.570000 CVE-2024-12272,0,0,cbbb238a5fc49c4ada4f96dbd5ec3bf6a1bab33a6ad37ef5b0235e516631a83b,2024-12-25T04:15:06.457000 -CVE-2024-12279,0,0,9733fcc263294614cb14c679edb202184bedb7555bf9f6fd2b2bb344049bfd1a,2025-01-04T12:15:24.453000 +CVE-2024-12279,0,1,28f926ab6f57c2b10bee59d6914cc0152fa6a23fa0d172ad6d11e3d9d407b5c2,2025-01-04T12:15:24.453000 CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000 CVE-2024-12283,0,0,27e00fa0bc574ce5113c52cfd02ee2100414eb1f36a7d99001797949356bf37d,2024-12-11T09:15:05.697000 -CVE-2024-12285,0,0,dde19ea03fdaebfbd1b6e3d3f9ceea86db4ad162960843ba0e822816f5844c7b,2025-01-09T11:15:12.883000 +CVE-2024-12285,0,1,a4a2b41992c880fc476ecd11de1a7b15521385b3ddf2ced01c35545193640e43,2025-01-09T11:15:12.883000 CVE-2024-12286,0,0,a2cf97a2f897256d80732f72cb83c0245f2eb4e867cc795bfeda6550048be20a,2024-12-10T18:15:27.150000 CVE-2024-12287,0,0,3bd2321de0e3063fd87782574573766f363076382fc77605ade9039fc3997618,2024-12-18T07:15:07.040000 -CVE-2024-12288,0,0,2b34fc8eb4709b34f9e1bbef958cf604197d6b5c8258b4549867810433c5a64e,2025-01-07T05:15:17.243000 +CVE-2024-12288,0,1,1e4a76e70bff72892abd84c6767b11251efabd91657eb6afa8d47a0425b49724,2025-01-07T05:15:17.243000 CVE-2024-12289,0,0,13ceaf41c63ab9df769c06a97eb1837bd3475cf420d82b37c196bad01ff19ec0,2024-12-12T23:15:10.500000 CVE-2024-1229,0,0,8ad8bfe76844e757ec6d08a1bad2f097b99b608e965943a6e4928e217dfee4df,2024-11-21T08:50:06.520000 -CVE-2024-12290,0,0,dd03ccb632ea5a012e06ec58307bf2deeeaadb86701f4e653ec52c31682a07e9,2025-01-07T05:15:17.440000 -CVE-2024-12291,0,0,d1cef006451deb4726152dc84511fb1b2859c23efc3b6f16d98831e1cfaa0314,2025-01-07T05:15:17.633000 +CVE-2024-12290,0,1,7da6a4571a2cfa234ff5c3d64031a04b8bd36533db86b5391fc1ed74cae938e9,2025-01-07T05:15:17.440000 +CVE-2024-12291,0,1,92bd6430c2e668a17bac8eff58d5c2110f868302e763b561cafc4430915284bc,2025-01-07T05:15:17.633000 CVE-2024-12292,0,0,9c2e3f4715c47523d2f1e1d813aca821c280ab211aff2eeed6650ad59c376aa9,2024-12-12T12:15:22.470000 CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192ecb7,2024-12-17T09:15:05.347000 CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000 CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000 CVE-2024-12300,0,0,0328248a8fb43f00ec541ab5455f8917a3d5219f0a666c2cc7f8e41b776c4b36,2024-12-13T04:15:05.073000 -CVE-2024-12302,0,0,be2d24e288379ff4969bb6910d8961bf9165ff36f8ee6388f83c4a36b8b6f159,2025-01-06T14:15:08.023000 +CVE-2024-12302,0,1,2e7f53c232830ebe1e41c432ae300655d2811aa163d5fbfa007adf0b96c594e5,2025-01-06T14:15:08.023000 CVE-2024-12304,0,0,ab993de83de0df2c74e2c128cd9b38543eaca4a797c56929aa726e307f2b9725,2025-01-11T04:15:06.113000 CVE-2024-12305,0,0,273e297c2c3404dceb5aa9b15a9613cb372f4eca60a3a417a7d24dc0972d8e0a,2024-12-09T09:15:04.970000 CVE-2024-12306,0,0,902fb51a4dbdd5670cb1cf5559cf247f9b3ba9c72034fe5330e7316e326e07b4,2024-12-09T09:15:05.293000 CVE-2024-12307,0,0,dd08ec1d0c570e2dfd8ff10541807fa47db4494718b1c9efb61df634a03bf8fd,2024-12-09T09:15:05.433000 CVE-2024-12309,0,0,16d03882c6009566e79b9c8c2443055d4427c7f1e57279e0146963b711b56a47,2024-12-13T09:15:07.810000 CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654fdc,2024-11-21T08:50:06.870000 -CVE-2024-12311,0,0,815e3491f6c1f7b3abc4a4d287cec4a5fe89f53db46c7d87ecfb8135e71ecf12,2025-01-06T14:15:08.153000 +CVE-2024-12311,0,1,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000 CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000 -CVE-2024-12313,0,0,f95ad1b7ee5c9c8b1e6156101adb575b7211cb88ceaf5c60bae6d522015943ba,2025-01-07T05:15:17.853000 -CVE-2024-12316,0,0,cbec86e916287ea4351d5d169721a153ddf032af635bffa2f7ccbd542a7bbd96,2025-01-07T12:15:24.040000 +CVE-2024-12313,0,1,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000 +CVE-2024-12316,0,1,bd94f89d24fe6cce24830f008f192f3c2ffcc6ab0e6191b96024b5a41dc8139c,2025-01-07T12:15:24.040000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 -CVE-2024-12322,0,0,d1d1ba99e3248373db00660e43bd83c74463e7aba267c41381ae292bf15ed01a,2025-01-07T05:15:18.063000 +CVE-2024-12322,0,1,84247a031ea6a724314932d42a7460599ae4e2c971abe58241a0cfedf89e325e,2025-01-07T05:15:18.063000 CVE-2024-12323,0,0,06bea100acdfcead34fe4d931dfd21a64a280c25bd363945a1e09f063078f508,2024-12-10T15:15:07.300000 -CVE-2024-12324,0,0,b690feec26da2984b756e7477c2a892da17cdcb52876c2b06d7ebd8d5f2c678f,2025-01-07T05:15:18.267000 +CVE-2024-12324,0,1,6830cc1a3ef0ca57459dc571e7789d8a61e3029bcc4a1783bed9fd0b020fb5a4,2025-01-07T05:15:18.267000 CVE-2024-12325,0,0,46c6dbf8ab48a9529900a473106f832e082cd9f7d718e64a5c9e5edd2c3d133d,2024-12-11T12:15:19.200000 CVE-2024-12326,0,0,6214bd8c3b6441929fb143e430a818a70c0eda117c1da1c1d4092fdb062e916b,2024-12-06T21:15:05.957000 -CVE-2024-12327,0,0,33b53efc3ce56f726d317632e9f42265ea308a0bd5237c993a51a1f8709d6c07,2025-01-07T05:15:18.470000 -CVE-2024-12328,0,0,944a330a612f4e13424878c3385e8e468ce4bce8a42713319a6ece116278bf79,2025-01-08T09:15:06.780000 +CVE-2024-12327,0,1,e8e81366bd93f2cbafbb479a06376db44215f2cd9c6251c0ebac4883f30daea1,2025-01-07T05:15:18.470000 +CVE-2024-12328,0,1,34661052bfc4345d9d8ebac2e6c28c5ef38cb920ac58fb144c97623104a72269,2025-01-08T09:15:06.780000 CVE-2024-12329,0,0,66dd2e3f2af8b0b1aca8274acaafc22644d93ff908c884984769d59605f22905,2024-12-12T07:15:10.607000 CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000 -CVE-2024-12330,0,0,6eab4a4395916f5dad5a9e40a1992449475768589a16984ede0554ee6f2c5c26,2025-01-09T11:15:13.090000 +CVE-2024-12330,0,1,dd38f32a8fe1201123bcdc5b82b5d883712c2acc7974b9580df0e29bb65620cf,2025-01-09T11:15:13.090000 CVE-2024-12331,0,0,1854f15311a9fd512bedfae9559249a253ffa3b6afc48825c570d85f65b5b458,2024-12-19T12:15:05.330000 -CVE-2024-12332,0,0,9ade021f05f8b6e21164a241020abeabd975e39004cb00e9e2b83269848afc43,2025-01-07T05:15:18.687000 +CVE-2024-12332,0,1,f0bf328e81e8dc6e6391061dc5bf4110c5e0a30cef25e410954b9a99df4dbf02,2025-01-07T05:15:18.687000 CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5515,2024-12-12T09:15:05.390000 CVE-2024-12335,0,0,811e1f31fde162cfb07e19f2dc625fd9888bd35150e2bacee10a476425d11394,2024-12-25T07:15:11.980000 -CVE-2024-12337,0,0,3cfbed7de87f9b5b76e5f389d6cc944d712464374f2a9ba15d49e91dcec2766e,2025-01-08T11:15:06.613000 +CVE-2024-12337,0,1,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000 CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000 CVE-2024-1234,0,0,6b4d1ae0b8159c98fb379447cf95a21f71a7514cfa9af5f48616ab89e3a52cca,2024-11-21T08:50:07.567000 CVE-2024-12340,0,0,e64d9154ce721e0cef963ec962023bf662e8b1885905905ffc386c61964f035d,2024-12-18T10:15:07.827000 @@ -245180,16 +245181,16 @@ CVE-2024-12373,0,0,83b846beefe400aa9231cc84fd600de52fbf3fd7f422b967ec41c6b980048 CVE-2024-1238,0,0,61e2d99ce6e3dfa86afb8331abcc236f68b5fa34f245659f4f6216db5239b32e,2024-11-21T08:50:08.053000 CVE-2024-12381,0,0,68b33f6b694aa45ef73ff06945e737e58ccb7b1c7ea2cfeb4d826136c48b3d1f,2024-12-13T19:25:33.143000 CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2e87,2024-12-13T19:24:25.137000 -CVE-2024-12383,0,0,cef6b512c28673e57747095580f46f3d1a23cd2ac5dd948f3ffe8185e568c272,2025-01-07T06:15:15.790000 -CVE-2024-12384,0,0,cd7118b6e6ac25f91cd1e0a0d2656f02763a1bb4ed18e9935c8cccb732d09818,2025-01-07T06:15:15.983000 +CVE-2024-12383,0,1,19d74999b8b2bcff68543eb20d97d9dc601a395c1ae1c74bde3b1e01160ff201,2025-01-07T06:15:15.790000 +CVE-2024-12384,0,1,f1312e19de6c9643af9162852b5499e7f57a4620a6ff1aef3fac1b374cc11e84,2025-01-07T06:15:15.983000 CVE-2024-1239,0,0,a515a367dab4b48d00e7f390a15c0d107266b53b28358b9f5ebf3476b0a625f5,2024-11-21T08:50:08.180000 CVE-2024-12393,0,0,f3d3d4aeb55dacdbdda4d3e84dd9efd2b47893e24f5c1cd3a62a5960b9b718f2,2024-12-11T17:15:14.657000 -CVE-2024-12394,0,0,3c16ea6482aefa41bfcc98b24ea81521e985224b77c50f31eb90829703f7737f,2025-01-09T11:15:13.310000 +CVE-2024-12394,0,1,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000 CVE-2024-12395,0,0,75ff5ef98722c35fb11d383db877ddbb73a300c7cb334e918191d763e24090f0,2024-12-17T12:15:20.377000 CVE-2024-12397,0,0,661288be67552f431f0a0bf144bed2d313b12b592e50cdc78451d7c1272f6fb5,2024-12-12T09:15:05.570000 CVE-2024-1240,0,0,28733ede53b96385ee0de4a7c5187b3db0d925b1e4ab6e977522dc277dee75de,2024-11-19T19:04:53.913000 CVE-2024-12401,0,0,ba741c7b51198b95eba245807f65253a1c54ea777ddd918337cd97bd144396fe,2024-12-12T09:15:05.790000 -CVE-2024-12402,0,0,8e35cfc4cf7a344abb45fa7331224e766525626c55ea5686a3d8b4838a76c51f,2025-01-07T04:15:07.990000 +CVE-2024-12402,0,1,36e3ce185be6b6d4714b97d0b9e949abc75eb52a2fa273901aa2b4c0f962b168,2025-01-07T04:15:07.990000 CVE-2024-12404,0,0,0ae799af50bc1f8f81ca73c24e0c487e6cb95e7dbb212bb43b7dafb4f227c072,2025-01-11T03:15:21.140000 CVE-2024-12405,0,0,631a04fc890c6ac2fbe1fd822df1e67f289f1ef7b029b11f0950a96d4993c03b,2024-12-24T06:15:33.123000 CVE-2024-12406,0,0,3a24bd925fcaee835bc0ee30f7ad38b16626ae1e5c8470fedd28227d3dd60123,2024-12-12T05:15:12.210000 @@ -245200,53 +245201,53 @@ CVE-2024-12411,0,0,fca8eab422ceda64b215d958b150a7f03625a9aa9df8afa22fe2b27e73430 CVE-2024-12412,0,0,a36f11976e1e41ee78fe97d1e70577f9d00cafdfe398e32080cffa4b8eeaa8f0,2025-01-11T08:15:25.320000 CVE-2024-12413,0,0,fdd057a05387c9ace72d4ba4316c6065bf29813d0f1c7f4a169e0a5a81de204b,2024-12-25T04:15:06.607000 CVE-2024-12414,0,0,ecf25a2c3f536085b4d44f95471b078e2b7cb6ad454e7c12c9e7d103ff4fa2bb,2024-12-13T09:15:08.070000 -CVE-2024-12416,0,0,435759be4e4ba56188ea7f6720fc32442a546d90f18b812fdb1df1c91242e1f0,2025-01-07T04:15:08.143000 +CVE-2024-12416,0,1,133a91588ad725ea1676e171a1de9f146794e8ea11542e637f25e6fdb4eea6e8,2025-01-07T04:15:08.143000 CVE-2024-12417,0,0,bd175c91ae947c344e10a61ee40da01cd87015ebf65316b1689d31a703a65c78,2024-12-13T09:15:08.353000 -CVE-2024-12419,0,0,1650645ff6c9400ef0ef895584325bbd55288f83ea55cd87214a983e3f37109a,2025-01-07T04:15:08.337000 -CVE-2024-1242,0,0,5889b9ece9144c5504da39af2a5164931916afac4092f39fcc8067473a14c7fe,2025-01-08T18:36:55.487000 +CVE-2024-12419,0,1,7f21353d0e082b12ae89c9faf26ba33e60d1cfa14523601ab098bdfff89a786a,2025-01-07T04:15:08.337000 +CVE-2024-1242,0,1,8257984bba04d3b8d9819d4344dfe11cb91111c964df741c73e350923121da04,2025-01-08T18:36:55.487000 CVE-2024-12420,0,0,ae8d110f5efef295dc5d542d71461638a083f9c010e00a24758178ab1b247bfd,2024-12-13T09:15:08.627000 CVE-2024-12421,0,0,d0800edd844bf37ccee00fc76da3ec64bb2b51e717430e725122892ee39e78eb,2024-12-13T09:15:08.870000 CVE-2024-12422,0,0,27a2b7b5579aea6b626e898353e29adaf77dce7f7392fa2cdcdfb4f6d55292dc,2024-12-14T06:15:19.357000 -CVE-2024-12425,0,0,eea15e7971a0067182f0f87cd0809df360664c0ea5db3b792659192d954300c4,2025-01-07T12:15:24.183000 -CVE-2024-12426,0,0,b1768326240a0dd8a6e52437c59b87b6647b9ea2add19ab16c01c997897bb793,2025-01-07T13:15:07.210000 +CVE-2024-12425,0,1,d885296390121d087e04ef42b8491b76f893200d98a386f95c4a72f26f9f2359,2025-01-07T12:15:24.183000 +CVE-2024-12426,0,1,172dd3632cc915a80121d55ee02d9001ce95b069ca8a1e5b844628b1eeffffb6,2025-01-07T13:15:07.210000 CVE-2024-12428,0,0,0dc42c82097510dcd67ba200f4a63250bd059d1ff61bcff7d39f7b5f34a5af10,2024-12-25T05:15:06.920000 -CVE-2024-12429,0,0,99de63e9af0ae88e6e217f344e187dc7b14d0fe0ccd82d65454e97b04105efab,2025-01-07T17:15:20.527000 -CVE-2024-12430,0,0,d4276ccf8ce8cf1fc6449eee29ff956f270f606dae1ca6365bb2571c495303e4,2025-01-07T17:15:20.703000 -CVE-2024-12431,0,0,da304ead6ced274b9ff4f680c28a5ec526c901ffbf7544fee95d4ff47213effc,2025-01-08T21:15:11.760000 +CVE-2024-12429,0,1,e6d5ff5cfceb2f61c0ef11c8f30168015114d1365dea8b766c339e4109cab13c,2025-01-07T17:15:20.527000 +CVE-2024-12430,0,1,0c8a563bb6bc403b10276a981acccd2883fb8e64f72cd343170d116fbae88cc4,2025-01-07T17:15:20.703000 +CVE-2024-12431,0,1,5644edd69c348df2239cdc93e705cfed1755dba38cc5e3639c6fa22724a9f624,2025-01-08T21:15:11.760000 CVE-2024-12432,0,0,3d67b932349f6253a91fa970f1501aba586896a462aba17731bbe90a2499433d,2024-12-18T04:15:07.947000 -CVE-2024-12435,0,0,0b924907debc21d874056d540a36b4cd28d4a499f8792c113a5d9122f40bd903,2025-01-07T05:15:18.887000 -CVE-2024-12437,0,0,6e24f2f4b2ec72fb52a0e054617c7907aded8c9b581797c18ca0d91453127b86,2025-01-07T07:15:27.127000 -CVE-2024-12438,0,0,c9ef02addc6910fa2706e6be2c335f22d8f54b28a122931dc35a45fba8c72f96,2025-01-07T06:15:16.183000 -CVE-2024-12439,0,0,55eb62afc9e2c987f37d9a895563de0caf2db1a105c514b897f15c77e7e1c9e2,2025-01-07T06:15:16.430000 -CVE-2024-12440,0,0,0736cca2507be95826bc828631fe95b2052cff97e97230bd61b7c954f9609103,2025-01-07T06:15:16.630000 +CVE-2024-12435,0,1,65c9febfd7a98604817f1773ea0e55d32e0aa4a74e94909e5aac719a650b91da,2025-01-07T05:15:18.887000 +CVE-2024-12437,0,1,eee25a62335cf81a7c9a591afa711efa0cfca8bc43291f7331a8326f931a6036,2025-01-07T07:15:27.127000 +CVE-2024-12438,0,1,4b77ccb0533c5ed87a6d598bb0daf15b07da9a8e043e091d8369445fa75dc83a,2025-01-07T06:15:16.183000 +CVE-2024-12439,0,1,420a25774a9855a1359464fcce67f5e77708758c4ce4e8a4cf01d7827cdef6e0,2025-01-07T06:15:16.430000 +CVE-2024-12440,0,1,cb3f3cdeb28ee128f4e377a1e88fe0d5d8a12f8b5075dc54d11bdf744b0def01,2025-01-07T06:15:16.630000 CVE-2024-12441,0,0,60177bfa0d9dcd79729d5ab6a51352067dd3b55deb7861fd956eb7f2cdfb3058,2024-12-12T05:15:12.703000 CVE-2024-12443,0,0,f07c0805b285e00ba917c2d7fc7d6d01900a808064fd2463aaf6cc786dd6eda1,2024-12-16T23:15:06.097000 -CVE-2024-12445,0,0,9511fa1142d96631857d0b2e66eb9af0e099f14a7b2400b88b1643052a5ba957,2025-01-07T05:15:19.083000 +CVE-2024-12445,0,1,abd0886eb5f566604f350ee11c44534aacbf58aeda080732befada13d508b61f,2025-01-07T05:15:19.083000 CVE-2024-12446,0,0,b02d1d791b4cf7afeb09eb0c21565790a25f436f0af246a7f2fa3fcff09dc38c,2024-12-14T07:15:07.040000 CVE-2024-12447,0,0,5037bc53ba4fa77c34e124f2cad2eb5580f0278ba0adbdec7fe60ff9c399f942,2024-12-14T05:15:10.670000 CVE-2024-12448,0,0,4923580d5a5f99d530db30df1f25529a66e5faa8f94f1d2c65ae42b9f669a340,2024-12-14T05:15:10.873000 CVE-2024-12449,0,0,5fcc22f14406311e0fc83130f321673a9681bcd45ccd4b15a7e6df2428ef10f4,2024-12-18T04:15:08.103000 CVE-2024-1245,0,0,95e8542ba13fb11ab7fe96b21acceb5168a3d85655e46eadbf4243e255ea26c4,2024-11-21T08:50:08.740000 -CVE-2024-12453,0,0,90bc8e9fa2cbca0591ac8c6d43563da6ce82cc131b5bb9f5968c2db02be70150,2025-01-07T05:15:19.260000 +CVE-2024-12453,0,1,76ad3f9c42446921081688745051c38b136a07ee1614804cd400b083fd2b395b,2025-01-07T05:15:19.260000 CVE-2024-12454,0,0,8d73661dfeacd698ba1638817b062fe681bc6bd2d9cfe150642a15e6ed3c799a,2024-12-18T10:15:08.117000 -CVE-2024-12457,0,0,db204227c2f84d575524d235110aa5b07f19e67d61178d0039868898bda6c1a2,2025-01-07T05:15:19.453000 +CVE-2024-12457,0,1,8b6dcd10765fdf34de144f9bc8c49e92cdcb9e82bb357349c5178d12bb4f5cd7,2025-01-07T05:15:19.453000 CVE-2024-12458,0,0,2c85dc279316bc1b4e93538e44ceb8987e74dd6cb51bbc5d16cad08865fed65b,2024-12-14T05:15:11.060000 CVE-2024-12459,0,0,83621c8a2cdeade953c2057764b3830fb57d2e52944bed7c2b576b695b57b999,2024-12-14T06:15:19.487000 CVE-2024-1246,0,0,1f374a88e5f240286cc1247b0f1cf35c16b35bebd909ebb6b31cd5f41f473567,2024-11-21T08:50:08.877000 CVE-2024-12461,0,0,f7bab5c2b1e2764e06dde5d0575615b7d6c222c7cf9c0439423d8ffeaa327299,2024-12-12T04:15:07.820000 -CVE-2024-12462,0,0,822939e7a31cb5c516e488647a1655c7767f9105510a5811471dac40183f2d40,2025-01-07T05:15:19.640000 +CVE-2024-12462,0,1,cab939d75095835b9cd7c3974182ba9f75ca922feb4b5a49ec456a8c518ba71b,2025-01-07T05:15:19.640000 CVE-2024-12463,0,0,bf2ad951357546047d42b0aefb8a66347583691f5449e603983c94f9bac4eadf,2024-12-12T05:15:13.197000 -CVE-2024-12464,0,0,fe64471b11df1c8aea2831428c22f4efdf9f68fdc40ab12fb9fcffe071303852,2025-01-07T06:15:16.823000 +CVE-2024-12464,0,1,ffa0068749df08a838ed800b533933f2488b98e069e2e1b69fda93eb15a6a6a0,2025-01-07T06:15:16.823000 CVE-2024-12465,0,0,71cf8d099f9bc4306dd9d21cf13805ebee4cfad62908f99a6e3f6ef7ca285117,2024-12-13T09:15:09.060000 CVE-2024-12468,0,0,20d3be8a82fb7f9b6094ff27e59754b2c2151696c1841d3d96ac080fb2a03b3f,2024-12-24T09:15:06.227000 CVE-2024-12469,0,0,871c3c1e000bdae5610f745ffefecdbdcd7d22ba906daf923687641c197ab750,2024-12-17T10:15:05.997000 CVE-2024-1247,0,0,87dd54613b1838220658d2242080e8fb0b79934df6e5afef144b61ee319c0ba1,2024-11-21T08:50:09.013000 -CVE-2024-12470,0,0,f5e5a45ffe482cca25de285855a4a74b00f4883aeec6c92dee418c81be8d8bf8,2025-01-07T05:15:19.823000 -CVE-2024-12471,0,0,b5a121f6718d68ea784fc6742836a638f28d467feadf0e8b69507e5dc6176835,2025-01-07T06:15:17.027000 +CVE-2024-12470,0,1,60796dff41be247f7bb9299485bec457d98db6e75b28fda87283280a225afdb1,2025-01-07T05:15:19.823000 +CVE-2024-12471,0,1,a7a928bed88b4ba06c2a65b15490a326ae6a9c787dc31c2c179fc029202d53b8,2025-01-07T06:15:17.027000 CVE-2024-12472,0,0,013d43dc4a3d5efd4111c39ad69495f245cd45b07cd96990fce217b14e23c379,2025-01-11T03:15:21.283000 -CVE-2024-12473,0,0,f41ff0a93ae3889e8f9cecd2dabb1dc9716fb7e52ded6f7e330e4233841f43b3,2025-01-10T04:15:18.623000 +CVE-2024-12473,0,1,689b1037bf2be3b6c18837d1a5884011766b273a34f635be024ca16a6702e2df,2025-01-10T04:15:18.623000 CVE-2024-12474,0,0,2858a766a8bcbd6035c2be4131a605cddb7bb17f787cc233f6060efa0069c36f,2024-12-14T06:15:19.627000 -CVE-2024-12475,0,0,f15ae25929cc8f0bd288861c59cbb63f77614f57516a7a95543988715ffc6cd3,2025-01-04T12:15:24.650000 +CVE-2024-12475,0,1,ef161022c17bfffe57f2c972fe120be00d3d8c013647d5e0ab15260b6747ad0b,2025-01-04T12:15:24.650000 CVE-2024-12478,0,0,9740cd4243776bc4b985718131b1bfcc5e0a94370bd612144af92e9b380848b7,2024-12-16T11:15:04.890000 CVE-2024-12479,0,0,71e9962db709a4fb365c50c76ea2678c0c0be3cc10bb9fad5f99b55609975bac,2024-12-13T17:10:45.860000 CVE-2024-12480,0,0,278aebffcfd2515ae9c7caddd55ce9bc13fc09babf1329c96da477d94bc16635,2024-12-13T17:11:08.800000 @@ -245261,13 +245262,13 @@ CVE-2024-12488,0,0,e61763695faa4ad98c5d9271fdbb8c43d58c48ce22137674ec8ef0c993695 CVE-2024-12489,0,0,34e8581bdf334a189a2ffc1badc0f4ef832f78206f67eec3963135fc8b168dac,2024-12-12T17:38:15.650000 CVE-2024-1249,0,0,9c5a57e06c52f317cf27f7cc2217e068f960e2413695cebf0a7e0dc21397817d,2024-11-21T08:50:09.153000 CVE-2024-12490,0,0,1555e4125b1bbd18e44ad154504a390e80c730aff0638a2c04280c85da66dcf1,2024-12-12T17:15:09.233000 -CVE-2024-12491,0,0,f4a6cd5ae8cd15ec93ddff9954fa785b5160288fa3e58ecfe39ed76df766f4c6,2025-01-09T11:15:13.520000 +CVE-2024-12491,0,1,d9590e8254ca45b54a5272db38ba7d701c7bc7244fa53f0252652da7575fb348,2025-01-09T11:15:13.520000 CVE-2024-12492,0,0,d916ae3db37806ef5451c78588e17d1a804f7c9a228c6c5f62bb3eeb89f366ac,2024-12-13T17:12:51.283000 -CVE-2024-12493,0,0,efe052c720ad59502974aa45ccae295f4bb8cf8efaa1119d98ac2f35388481ce,2025-01-09T11:15:13.727000 -CVE-2024-12495,0,0,9154f8226ee53936cd846cde00b2209b4fce5f48828264320b815ca9724f0f08,2025-01-07T07:15:27.370000 -CVE-2024-12496,0,0,f2addd62db7137bd6763564fec0c8bc7565bd52bce1366d93a5b3e1eb199a497,2025-01-09T11:15:13.937000 +CVE-2024-12493,0,1,6a46a6d759741902a525239333dcb837d21dd46b0a90d6c339d060007873320f,2025-01-09T11:15:13.727000 +CVE-2024-12495,0,1,14e632d2f81b312f37c9f019da64618a5fbe236ebe3efc373365c304ad48e27e,2025-01-07T07:15:27.370000 +CVE-2024-12496,0,1,de7fd0f09c73ed509f4dfab83295b7a82e4ffb5b6ab1606f0959c5f84e1f552c,2025-01-09T11:15:13.937000 CVE-2024-12497,0,0,2fa5c57c56d5261d14e7efca34ea444e21df46aee84c2eede506aff4e7856847,2024-12-13T17:13:18.457000 -CVE-2024-12499,0,0,ebf971fda2646d8a484d4f57e044f8d010f0e527c3a9209865656c9f745545db,2025-01-07T07:15:27.570000 +CVE-2024-12499,0,1,951077a353319a7088c9629c7199917c80e899a78987f10277e514e4e14f5e24,2025-01-07T07:15:27.570000 CVE-2024-1250,0,0,c54b18c5c3077dc882ddb080c03b243e2860ef906533ea0af6c558156b694109,2024-11-21T08:50:09.347000 CVE-2024-12500,0,0,a1bbc31d033f1807389d74301e364594f87125fc476a6f494352a12352507c25,2024-12-18T03:15:26.257000 CVE-2024-12501,0,0,099422e2bb99df2bd932e80161b3557d59136d70f204462f7c72270d679f0b8b,2024-12-14T06:15:19.770000 @@ -245279,42 +245280,42 @@ CVE-2024-12507,0,0,f098eff6e3ef53742e66474a6ac17418c00af6d9e6800445130b20da01af7 CVE-2024-12509,0,0,8448cb7b981b452e7bee8263b7d56776b70a911630dc0596718dc3941caa2300,2024-12-20T07:15:12.177000 CVE-2024-1251,0,0,8c0214d9f05a1f50e84514dc27e8bafe56d249b59ef6b0b677b5e947e572faed,2024-11-21T08:50:09.497000 CVE-2024-12513,0,0,6393dedffea01c8a6ef2142d1a8a9d6ba57b27f731b145d36f16e844db01eb62,2024-12-18T03:15:26.427000 -CVE-2024-12514,0,0,2548af16b7c91a222b8384bb3ca53727a0b945f9424a3eb93ee4bfa911f184de,2025-01-09T11:15:14.137000 -CVE-2024-12515,0,0,09dd4a0c49aa32e74192a256344ff33ed3a3398ea0769ff4f67849bb3b5cbe4b,2025-01-09T11:15:14.343000 -CVE-2024-12516,0,0,e41b8f7326a1ff9d5fbcf49901d9bff7bf07cbba6980171c82a8cc823c6f0a6e,2025-01-07T08:15:25.290000 +CVE-2024-12514,0,1,f43a5430cb383b14a2cf8b8af6c6293e976c61736ad57e2dfa43a4cdef30e051,2025-01-09T11:15:14.137000 +CVE-2024-12515,0,1,8c631cd3a275f3c01ae86ddf0d5593ffa408e3783d26380f8b46d3a793192bb4,2025-01-09T11:15:14.343000 +CVE-2024-12516,0,1,c0f1317fbddc4b686db82724b2e724627f669a3275680bc6d4a47d577638d4a6,2025-01-07T08:15:25.290000 CVE-2024-12517,0,0,4d330b1d19e40313cc9a81f9b8784c01c801f44b6fb4859786e4a9a0d1f904a4,2024-12-14T05:15:11.453000 CVE-2024-12518,0,0,e836e2bda2de8df1c322fb96b28c258a6308fb3f7a0cbb3b5a146ac83d3fa431,2024-12-24T05:15:06.827000 CVE-2024-12519,0,0,6450c33307c9449b6013ea08667cefb1a5486038517ffb39b882eb5aad6e21fa,2025-01-11T08:15:25.530000 CVE-2024-1252,0,0,d03beb126367df5b21be601ec7e2ecf5f48cece91d0754af14f589827736f3cf,2024-11-21T08:50:09.700000 CVE-2024-12520,0,0,3f1b14d7dffeae4c90b0f9206c631144937a48e23d81ccf571b144329c30ab26,2025-01-11T08:15:25.720000 -CVE-2024-12521,0,0,2dfc767456ed3b436c8094393a38b7cdd77f0a32468d17a99274b9a7d3db5dce,2025-01-08T04:15:06.827000 +CVE-2024-12521,0,1,5ef3982f9bbd97c224cda76723fce3c98e248e5aec737e88bf0802be4e43c585,2025-01-08T04:15:06.827000 CVE-2024-12523,0,0,185a41d328f0e130d8ed17ada12f64a855433449910369cbbb025fff8ce0f4d8,2024-12-14T05:15:11.640000 CVE-2024-12526,0,0,b192d6e45212a3c6d09a8a6cd2198d071bb3ba4da94a4e2bf151be7ad2c18324,2024-12-12T05:15:13.577000 CVE-2024-12527,0,0,2eded19676c81f6420ec9daeb3ce62a1cabb4a11728f06c8deff94df9b3fcae8,2025-01-11T08:15:25.913000 -CVE-2024-12528,0,0,b542d57e01c0c48ad9564b0890e0d12d29edb2156a8c53246e86bf7139add551,2025-01-07T04:15:08.543000 +CVE-2024-12528,0,1,f4af9cf65ffcc6bdde0559258762f791c056b91239412bbfffbf03d13aedbfde,2025-01-07T04:15:08.543000 CVE-2024-1253,0,0,a598e10fa6d530af6148de164d99995412d597f7142ead42d62b85e905a98949,2024-11-21T08:50:09.843000 -CVE-2024-12532,0,0,9ca157cc408917cff34071ccec5f6a565d9704ba7df388f3088985d6d80c9ea4,2025-01-07T12:15:24.363000 -CVE-2024-12535,0,0,b0034002c69bb854c515c85f47eb566bda639381994e791864e14498ccfc66d2,2025-01-07T06:15:17.220000 +CVE-2024-12532,0,1,199fed046db6fc1b5b34521e2b9548b73238ea6ea9f77361d16a8dbec2a817f0,2025-01-07T12:15:24.363000 +CVE-2024-12535,0,1,783cbd5e17eda49b126d7013b7661e75fb62741f3c668d86577a16b9b9c20d52,2025-01-07T06:15:17.220000 CVE-2024-12536,0,0,a925f1a48eff74b537962fd623796390384e9d276d37e7a9cb0d9ba10f9464b0,2024-12-13T17:14:44.007000 -CVE-2024-12538,0,0,b01ad61b9334acc7635ec3132a042fbc3171b4976dc799538cae1899a313c7bf,2025-01-07T04:15:08.720000 +CVE-2024-12538,0,1,09768d3293edcfe78eeb71291a6d043c617de31a086c72fbf20722cd5259fcb2,2025-01-07T04:15:08.720000 CVE-2024-12539,0,0,bf2bc8684b4967ec9692452689aaa296f660969c9ab0dd0ec9b638e64908ab0d,2024-12-17T21:15:07.183000 CVE-2024-1254,0,0,44df8e919ae544d26fc82110d33f6e7af1fff88011a3bcb100ca7209bc278c91,2024-11-21T08:50:09.993000 -CVE-2024-12540,0,0,adba74440c12054a2b4aeaae92390c7293233c635a45305f713e588bc7755fb5,2025-01-07T04:15:08.917000 -CVE-2024-12541,0,0,95de6c00a67fad2bff3a8f0a88abf7af44dc43fdcd8e0d9d6ce67499f6d10f94,2025-01-07T04:15:09.083000 -CVE-2024-12542,0,0,1b5e410a01b2b0740ac7510602b06694fb755dcb9bfac836e50106821a16986c,2025-01-09T11:15:14.550000 -CVE-2024-12545,0,0,5409af2cc867f9cbfaa0048cd65660c930731d490c0e60928807d15814cab2e6,2025-01-04T08:15:06.363000 +CVE-2024-12540,0,1,e5d4dce4760b17e4b41f398ec25e8f7eaa8cdf3185b056e79b164244a895d465,2025-01-07T04:15:08.917000 +CVE-2024-12541,0,1,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da450,2025-01-07T04:15:09.083000 +CVE-2024-12542,0,1,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000 +CVE-2024-12545,0,1,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000 CVE-2024-1255,0,0,5935182eb4eb024c7cf7e3cda464e0c74472c4e58bc0030bb090a2a8f708b72f,2024-11-21T08:50:10.150000 CVE-2024-12552,0,0,8443c6d0851e2c1de6fc0e2780c54c711d712f43dce29b5a9fc2e07cff55adf4,2024-12-13T23:15:05.553000 CVE-2024-12553,0,0,cd61f311646d40093b2eea8b09f233e945a3d877e60c1a1abbe43e2cfcd9ea6a,2024-12-13T23:15:06.310000 CVE-2024-12554,0,0,03325541f88792da1f6e44f52ff0851958b98ec9e3aa0b4c7708f85287495a8a,2024-12-18T10:15:08.493000 CVE-2024-12555,0,0,2e017ff0ee33b0c8a472113c693bd6d33089424aa43829233098413c47eb605b,2024-12-14T05:15:11.827000 -CVE-2024-12557,0,0,c9c6d6d60fa1e63d0c31dc33ceb551ab46ad22cb114705bc0dfb08def0caa40b,2025-01-07T04:15:09.260000 +CVE-2024-12557,0,1,37daa206cffaab362fd4ef4709da159d811d551245b9c0c84b85613a0d36d6a7,2025-01-07T04:15:09.260000 CVE-2024-12558,0,0,ff1dd3178bf5e061322cf2e1a359f721c0d270a183cd44116b64f362a8103982,2024-12-21T10:15:08.600000 -CVE-2024-12559,0,0,f54cf3f9991327e38603b9f68b85ad1beb15e578526394c2a7bc1915ca2539bc,2025-01-07T04:15:09.433000 +CVE-2024-12559,0,1,57ab0e0bbf049179f4bb043a31125569183e3823c6e0814b5b25df137c49ef14,2025-01-07T04:15:09.433000 CVE-2024-1256,0,0,ea8829298a5ced036094d7fead955f33827bc36bbc0a7f87a81ee1f95b95b282,2024-11-21T08:50:10.293000 CVE-2024-12560,0,0,d33290fc3e54f51dd78cb0afaf9a18e8538f72db9dd0f598ab5a68b55bfe89a1,2024-12-19T07:15:13.507000 CVE-2024-12564,0,0,0abcb221861e5fc99f1edf43c59fea9ce50a3b4bd68b4b9a5961d76741772172,2024-12-12T15:15:12.097000 -CVE-2024-12569,0,0,67ea80dfc8a7f09d76679f52a4f2989d2d078497f3a52d4649742fe2554674aa,2025-01-07T10:15:06.757000 +CVE-2024-12569,0,1,f75ddc9e99d18c4cfddc5b909f2c374e6db9e2363680671699b7fc90362d5ccd,2025-01-07T10:15:06.757000 CVE-2024-1257,0,0,7cc030c8f0ebfb33a80da788a5513945114551aaaa2999db4fa614a5f6b08a9b,2024-11-21T08:50:10.443000 CVE-2024-12570,0,0,be94920192af405ec932f38181a462713be2ef7292a21e90f93bf4238cc63d84,2024-12-12T12:15:22.660000 CVE-2024-12571,0,0,4f61ab2b24612e0b1a75d43cf9d9be2b77f4416d126de6e970d9338abb76a3be,2024-12-20T07:15:12.380000 @@ -245325,37 +245326,37 @@ CVE-2024-12579,0,0,6b066a632ed42755872bfe12897131044e41b00627589546ab36be31d813b CVE-2024-1258,0,0,36d421eec5fc7cce6382fad9fd3a9a8780da80fcb6e09fc8e5e480709b2e6caa,2024-11-21T08:50:10.573000 CVE-2024-12581,0,0,899275a869b7c967a158446f680d5b1e6ee7fb8c13fa325a1164dc54186bea7f,2024-12-13T06:15:26.433000 CVE-2024-12582,0,0,bbfe1aae814f308a85392c13709691d46da248e6458c80cb519b63fa483aa592,2024-12-24T04:15:05.137000 -CVE-2024-12583,0,0,6c1f345fbc3f1cc53302e61a1dfbebbfcc1b6c1ee5d98cc4a9e3c7ebaa7ceed3,2025-01-04T09:15:06.090000 -CVE-2024-12584,0,0,816f60d6132b2347c9aa70129bc858e7047e308acf27028a30827ba4bb7b6af3,2025-01-08T07:15:26.833000 -CVE-2024-12585,0,0,ead992288f92d4be283e03018b341d11a9b47641e24068b49fe654a049e91e84,2025-01-08T16:15:34.130000 +CVE-2024-12583,0,1,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a08fa,2025-01-04T09:15:06.090000 +CVE-2024-12584,0,1,adcd511bb3f4eac61fabd0c77513e0f49514ba8fec705794080ba1b5bd973bc5,2025-01-08T07:15:26.833000 +CVE-2024-12585,0,1,5da3be9bc678e425dc481c70b7523d18c5d89e9715457ba9168db2468bb42cc7,2025-01-08T16:15:34.130000 CVE-2024-12587,0,0,fa0892d68b7bb4f6804fea8fc811eca021bdbb7440a414a14dfb72694409d2c4,2025-01-11T06:15:25.070000 CVE-2024-12588,0,0,9ef4dd85f085f6ba612688cc14a2c49d05248e20e75bd2d7bdd4aff39b5ac0f2,2024-12-21T09:15:06.233000 CVE-2024-1259,0,0,1c6bb100fc9cba505c4d696801bfd3102c508e530bb2e36c86a6685675278bd7,2024-11-21T08:50:10.730000 -CVE-2024-12590,0,0,78caf08663857a2f888f89c4842ba777750ad04068c078583ff87671d3a13c4e,2025-01-07T04:15:09.607000 +CVE-2024-12590,0,1,217ef4dab25f45d20c71439c17fd49c4f82558ccd785c0d0a569568075f7d918,2025-01-07T04:15:09.607000 CVE-2024-12591,0,0,ab3753b6008fbe3e6034e40f9f857196cd212596c7c67b4ab270eba30c140899,2024-12-21T10:15:09.177000 -CVE-2024-12592,0,0,f7078feab8fa5eead0a6efa9f90d4e3b58439abfb00aa0f348c4b0049b74503e,2025-01-07T04:15:09.783000 +CVE-2024-12592,0,1,138962a75cfdc3c83ee816d4268752d65e3f8b81d264b25dbcea90b78c661e78,2025-01-07T04:15:09.783000 CVE-2024-12594,0,0,594b37b561926a174996b6f220ac2c193da316e698a771fbe44cfee2e4625e76,2024-12-24T06:15:33.297000 CVE-2024-12595,0,0,d10767ce84f7e81d5a6ad487503289a59f4d01b86cd7eb0b224ee74e49237f41,2025-01-06T21:15:14.003000 CVE-2024-12596,0,0,5fc66f30988060a8b7bb1a593c82bd6c3fc2c995268e617c35d93ef410dc9a09,2024-12-18T04:15:08.253000 CVE-2024-1260,0,0,237fdcd6650ec6f817190c6cbe0c450181ce5f478e263f9f314859cdec5f8244,2024-11-21T08:50:10.880000 CVE-2024-12601,0,0,f9b91f2d20d6914a3b5ca3c9af2a431f615ff9e20926a30171bf1c35967a6eba,2024-12-17T12:15:20.543000 CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000 -CVE-2024-12605,0,0,8a8c58874160061e08ecb18707aaa292a96cf368b219a0f8d84a0cbc9ee9b0b9,2025-01-09T15:15:14.150000 -CVE-2024-12606,0,0,3d6be29e05f1d1d12b587e2cbd3d3b10d0c8a48eeaaf4856c8cd65a1d1abbed9,2025-01-10T04:15:19.667000 +CVE-2024-12605,0,1,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000 +CVE-2024-12606,0,1,22dbeb9ccb7de3748ffcb5a9742ed9efae0d34cb977177faf680cf3e4f662ce5,2025-01-10T04:15:19.667000 CVE-2024-1261,0,0,7451d11c24f2ac390a05020abbe5be1a7d1e877de58a9c0842a513a0e1790005,2024-11-21T08:50:11.030000 -CVE-2024-12616,0,0,12117fcf52b11bd06f0b2df3a48b15a3d855d5a677e047656ff1ff12b92b9905,2025-01-09T11:15:14.970000 +CVE-2024-12616,0,1,77a54d2c4fc323087210e2a6a22bc6796e40cd4e337b416a96bae19b39d4476a,2025-01-09T11:15:14.970000 CVE-2024-12617,0,0,fa783f9d7a3d972025357eb9fc5c4fe83a667f5b392e03f824f0f0bb531ed431,2024-12-24T05:15:07.013000 -CVE-2024-12618,0,0,b478a453538536543bd730a64ae602daa7473e6b349f6190223b5fc78b8cb9f5,2025-01-09T11:15:15.193000 +CVE-2024-12618,0,1,9a78b540470b044696728715f2dbde7ff3f05b2e5efee894087a680363f0dace,2025-01-09T11:15:15.193000 CVE-2024-1262,0,0,b26d9641a8cbc2c5642fa36dfff4a6fef92b6772e7113385af431217d75dfe5b,2024-11-21T08:50:11.167000 -CVE-2024-12621,0,0,0ddaf419150cd8fdc2837c3a9faac9cadc9db887558cc641f9d053a7c959dd70,2025-01-09T11:15:15.417000 +CVE-2024-12621,0,1,c2adae066a86c184a771a0d948073e2bc06ef58867852e158c90f4e2e54ac114,2025-01-09T11:15:15.417000 CVE-2024-12622,0,0,44dabce1b6e9706e1913dedf06e830c5e84e3b2aacb10e32270b16def1e102ad,2024-12-24T06:15:33.433000 -CVE-2024-12624,0,0,c77e80fce8bb7cfbd6622ffb693e19a17da83ef3696c2a0a7c37bae9a130d383,2025-01-07T07:15:27.747000 +CVE-2024-12624,0,1,607fd046821512cc38ba7b71abb5daef23523205632ac77d22471643a0913eae,2025-01-07T07:15:27.747000 CVE-2024-12626,0,0,dc01f58442ef4eb4425488c755c4a1d0852a1ed618c4541c829e9e2584781b84,2024-12-19T12:15:06.160000 CVE-2024-12627,0,0,230444a02f062d22870ea23f281bd0815473ee87a6c21e91ed136026b3cd9ec7,2025-01-11T03:15:21.587000 CVE-2024-12628,0,0,f48463b1ecdc4a2ff76d188b8ae44a2e0e32ef1e929dc806ea33e24839d1432f,2024-12-14T07:15:07.213000 CVE-2024-1263,0,0,1ded99eb7dd7c25043d30fb557b1a5799a79150045deb56dc782cc48f4b0c898,2024-11-21T08:50:11.303000 CVE-2024-12632,0,0,b2981d9ae0d79f88557270498f7d8919df56f26fc08631dba371165f9d0f4233,2024-12-13T21:15:09.317000 -CVE-2024-12633,0,0,ac69292f6a12c945fd607e3ad86b3344f43286244c6390a44a1c51cf13345366,2025-01-07T06:15:17.417000 +CVE-2024-12633,0,1,aa2de65b34cad526fad2ad4462ad560794d8e7fd2121b7b4323cbcbfceffb766,2025-01-07T06:15:17.417000 CVE-2024-12635,0,0,3c7aa75fcbe7aad344d7ab6a29830b91315b8c91a45f35c3746137d636be222e,2024-12-21T07:15:09.380000 CVE-2024-12636,0,0,42a82168ce07b7a4b358fd4a7a39c0f3a390399d55754f2ae0215aa2892ce194,2024-12-25T05:15:08.067000 CVE-2024-1264,0,0,0a400b50d7c5417af4540851d66c40fe9607cfb1bbd030ca37354551feca3778,2024-11-21T08:50:11.460000 @@ -245401,27 +245402,27 @@ CVE-2024-12694,0,0,9800fbc5ca389434bdda7fa0de83799fcd1088c52cf84f2bdcf95dc149b6c CVE-2024-12695,0,0,c12cc3a1c005ac4ce33f9efb358fc8de53ca6da21a9008edd22e7d591fcee580,2025-01-06T15:15:10.753000 CVE-2024-12697,0,0,2459466c74ec5bec9acd976593eaf1864bd447490d29e2029863b77f5d045147,2024-12-21T07:15:09.587000 CVE-2024-12698,0,0,3d9cdcbe538ab50d5f6959e4225d81bf3f0e9f88aa4025e53f307853d2e0961c,2024-12-18T05:15:07.840000 -CVE-2024-12699,0,0,5774e482bd57d5f0f13ef8ed6e7359c67875b728e81561c5eb79fe6c92f6ed3b,2025-01-07T10:15:07.143000 +CVE-2024-12699,0,1,f1f15e132ae79e83fce4e52614f661803aa78c84f19a0d2adbe2c9bee934bb41,2025-01-07T10:15:07.143000 CVE-2024-12700,0,0,c161ba4e53ce97164ad141dae69781306c514830255596765fa43a667338faaa,2024-12-19T23:15:05.860000 -CVE-2024-12701,0,0,093eca66809c85a1226724feb10b7be584059ad49ddb4511295af9293417b489,2025-01-04T08:15:06.670000 +CVE-2024-12701,0,1,cd6b08f28311d78389b2479a22ff0ce00f8e2d386b94e3b072290f303be9f2ff,2025-01-04T08:15:06.670000 CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000 CVE-2024-12710,0,0,47453914e1b74979b7cb104fe22d1ae9255e40512305ca5e5237f17f98821657,2024-12-24T05:15:07.193000 -CVE-2024-12711,0,0,af63df0fc664529f876fb1b7e42d9f7f11e38264d63e374c64c561e006838c50,2025-01-07T12:15:24.503000 -CVE-2024-12712,0,0,984c619ebdcbfd1e3e1dca93b7658387a748ef9201a06bcad981abce7c3ba06f,2025-01-08T10:15:06.660000 -CVE-2024-12713,0,0,e6c175f4b410ded191dec5f6f687c64efe390496ffa1b50119935b0d26dfb4ad,2025-01-08T04:15:06.967000 -CVE-2024-12714,0,0,ea3c0b8148048a81afdd79de2b4911210677f00a008864451e807764bf4f22e2,2025-01-09T16:15:36.200000 -CVE-2024-12715,0,0,5f3eb147c52388a3fd1d9b94572ca79798f64b780f80c291c18ee0e0d7773717,2025-01-09T16:15:36.360000 -CVE-2024-12717,0,0,dc87f3e814dbdbf42528ec2ee5e8db114bcd113c684e4f914eb9ed63e22a8b11,2025-01-09T15:15:14.493000 -CVE-2024-12719,0,0,f1c1e2dd855d248bd97d2bae5f7baeccac20810feec3cd62c70cf667fd59aed5,2025-01-07T10:15:07.323000 +CVE-2024-12711,0,1,9b677fb642029180fdaa553160a64c71aa90c9b6592fc5efc1139f03e5c4de5f,2025-01-07T12:15:24.503000 +CVE-2024-12712,0,1,9554afe0660aaeb94d322c68f376b4049a1c78b9e06148cca4a5ca650e9431ff,2025-01-08T10:15:06.660000 +CVE-2024-12713,0,1,1dd49dc5e03b350467b5dcea4c6874a20628cdfedb6c7a59c15e947cc9533d45,2025-01-08T04:15:06.967000 +CVE-2024-12714,0,1,7148cdec6f8b212fef9fce024e81921849f016f20d04016c2915f69292998cb6,2025-01-09T16:15:36.200000 +CVE-2024-12715,0,1,c108391047bdc5cb3a30ab729c489c01e29510a155fea37302079b85e271c130,2025-01-09T16:15:36.360000 +CVE-2024-12717,0,1,6474accd48577f4efdbde77f72937b508282b403c332108a28e333766275acd1,2025-01-09T15:15:14.493000 +CVE-2024-12719,0,1,6e113e19479495992fd0f698aec2463ab1e0a34cf6f80cb6f4fc67b14c63b540,2025-01-07T10:15:07.323000 CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000 CVE-2024-12721,0,0,602b63fd821f3e12d745be832faac963714770e5a5cf419d7f91dc50f0276cf3,2024-12-21T07:15:09.793000 CVE-2024-12727,0,0,b783145694badccf248249bee0c82f1aff0f923b8a3e56851318776364e6e057,2024-12-19T21:15:07.740000 CVE-2024-12728,0,0,917e9cd9de621c11266a9c64ec7f57ccf5bdf0122fd22a40a0ec7d20acff7a35,2024-12-19T21:15:07.863000 CVE-2024-12729,0,0,48b3a23ce4e01eb74edff0cd115d9897f3f81428607bbc5ad97846c1af686c7b,2024-12-19T22:15:05.087000 CVE-2024-1273,0,0,e8464b176bd39036e0f45e4b49d8110f84d3d3960c826bc9710c36200b4f5e6c,2024-11-21T08:50:12.557000 -CVE-2024-12731,0,0,54ffc20cc243aeb989caa9a92eb0970db4b69a2d13c34e42d169f7c7a20d8cbe,2025-01-09T16:15:36.527000 -CVE-2024-12736,0,0,8c600c7fd532f1c330f00b0c64b0cdfeba7b17914bc8469dc5aa854aced939bc,2025-01-09T16:15:36.680000 -CVE-2024-12738,0,0,62b9ca699b87e6b4afa6aacb7bdfd82cc9a3781e94484aea8f243a786784d89c,2025-01-07T13:15:07.357000 +CVE-2024-12731,0,1,9ead76fed676036ea4435e20b944f4e5fd453782f229b14d9e0b35b47567c8dd,2025-01-09T16:15:36.527000 +CVE-2024-12736,0,1,27dc2dca8ca80ab2c2f7728100c1c2ef462b0b1d9d1f7583591ae4131d8f4fb2,2025-01-09T16:15:36.680000 +CVE-2024-12738,0,1,0cee8c1793928a32af812059d0c46039bd10d2c94f791e505cd74a43ef658897,2025-01-07T13:15:07.357000 CVE-2024-1274,0,0,8b1ee7c9f6e7817a23a525a715cd0c1ef18c567c26c711e49e1e872df04cda9a,2024-11-21T08:50:12.730000 CVE-2024-12741,0,0,c9f183fb88063863d511dd9a34a59e6fd50d2f3a53a8fd3b665d83eeabe6e5e3,2024-12-18T20:15:22.390000 CVE-2024-12744,0,0,db2cef6174f0f203336fd1a602951ac160bef125d0730a8230a23f49ec8a87b4,2024-12-26T15:15:06.290000 @@ -245436,7 +245437,7 @@ CVE-2024-1276,0,0,7fd672f8ab2d0313a55eef11978a3cbaaea942b78d4dfb1702b583b731b53a CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 CVE-2024-1278,0,0,304f88731c9c2e93f283a152f19a1ac852d3cf0fda0d38c9b82c242ac4604519,2024-11-21T08:50:13.287000 -CVE-2024-12781,0,0,e7dc3cf825eaf3fea7bf1497b99158acf638c9ba7ba7e13bf95338f597bd12e3,2025-01-07T07:15:27.937000 +CVE-2024-12781,0,1,c74d8fa49d4e1ce3b752d35981d8b052a93e3f1d0fb27ff932f88f085f9b3bc6,2025-01-07T07:15:27.937000 CVE-2024-12782,0,0,94615a91fb891a88498de75e4b825123bb157c448f26c71e3e4bd3ffdbda7e58,2024-12-27T08:15:04.917000 CVE-2024-12783,0,0,1cbf05ea91cf262fc7ff861feed31dbe6250d2c08bd8ebca814337722a82f119,2025-01-10T21:26:40.627000 CVE-2024-12784,0,0,d43f309a79afe506253b0858298bf53d7bd83e19d817fecf6daba2b82c8589e6,2024-12-19T14:15:05.943000 @@ -245445,7 +245446,7 @@ CVE-2024-12786,0,0,ed02c83a2054ebe0fc174790a6aaacbe309558015f322491db719158a6f37 CVE-2024-12787,0,0,14279a2f9574063a61ceb8ce2e1da7c6476af83dc7a21c055ac41cd47de3b19b,2025-01-10T21:27:13.777000 CVE-2024-12788,0,0,e5b23c8d19a7a1106a3c70ec6e222009af52dadc4f4a8ee9b1597c00d1ebc18e,2025-01-10T21:25:42.317000 CVE-2024-12789,0,0,8cc3fd907634072e855557d7614296827afc8435bc47d635336cc8e8e8d4c6f9,2025-01-10T21:42:42.847000 -CVE-2024-1279,0,0,748039c92f5ca569335554a7f38080e94b49a821a92d564d52fc8ec18dfbf14a,2024-11-21T08:50:13.410000 +CVE-2024-1279,0,1,61dff6f92ba57cc8ea1f514904df9d370c151e2c63a152fa3167fdcc4aa0ca69,2024-11-21T08:50:13.410000 CVE-2024-12790,0,0,3ab6d6fd8704afa118edf15528f1756bc2e775d9f0c2c7d3659c9da7eb84d83e,2024-12-19T17:15:08.650000 CVE-2024-12791,0,0,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7ae26,2025-01-06T16:42:09.837000 CVE-2024-12792,0,0,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000 @@ -245453,12 +245454,12 @@ CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72 CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000 CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000 CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000 -CVE-2024-12802,0,0,c6256d947670fd12880358f3327a0b462c9f571382d3a9eedac3119eb7bc5ac8,2025-01-09T15:15:14.683000 -CVE-2024-12803,0,0,b21222b09c6f8ae2c228a40a8137070d1d7549a26d3620f71de6631b2524cc7c,2025-01-09T15:15:14.877000 -CVE-2024-12805,0,0,8cb023efd7567284214df56cf99d8f77ae7a99dabd105b3dc8e0b3cb51ad9c6b,2025-01-09T15:15:15.060000 -CVE-2024-12806,0,0,1f16a96d7f6a4cf40ef0b339f98cd8cff2cb8d94e606d5b8a4f85f8c9e9e06d5,2025-01-09T21:15:24.797000 +CVE-2024-12802,0,1,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000 +CVE-2024-12803,0,1,71d62dec252a0f259b2c18f826038e36f57f9a647b87e6ff28541f3fd967bce4,2025-01-09T15:15:14.877000 +CVE-2024-12805,0,1,d6094291885dfb29bd5a5da62c0372feb6c8c3ca251ef60e837bbb54cbe9775b,2025-01-09T15:15:15.060000 +CVE-2024-12806,0,1,c45480b247444cb90e8e7a223e8acaf0bdfdffdda029f1c1e4cf3d9ef4282b4a,2025-01-09T21:15:24.797000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 -CVE-2024-12819,0,0,d2bcfc7e7b1d427da08a10d74e72152ade55c9e09e00d5003c319f78e194c4b8,2025-01-09T11:15:15.657000 +CVE-2024-12819,0,1,d67b85742967f9e166e23a2e5c4440d086b3b3988f6b73108d4bee255219b06d,2025-01-09T11:15:15.657000 CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000 CVE-2024-12828,0,0,a29f7d175d08af9e9a3e3b2d9a239843d4c47c7b84f9529c7b9ddf19ae5c7fea,2024-12-30T17:15:07.717000 CVE-2024-12829,0,0,b6def8373fb939ecec35d929ec57c311d0480519af7a0919a5038b5b832e9ed5,2025-01-03T17:46:48.507000 @@ -245480,15 +245481,15 @@ CVE-2024-12844,0,0,5c0e1e9f12ccd3e7b6409ec6f9fa62b1ac61e24d0cd9ed98d53a582ec95f3 CVE-2024-12845,0,0,a476f9ae604ca9ba196326844e481285fd755f33cc18c52bebc4a8c43fca5e80,2025-01-07T18:35:19.607000 CVE-2024-12846,0,0,b36aa9429c01b33f714298f498b85f545e5bd6d4097759ae2d16ede617c8acc2,2025-01-10T21:34:58.917000 CVE-2024-12847,0,0,d1d0f91854c634aa238021a769f82878b06bd9e08c30ca50139adfae2e04e485,2025-01-10T20:15:30.150000 -CVE-2024-12848,0,0,2d29b233ac5706cf0ebef89ef8e274a8d0b86e90355ee65e22b0956f32d44c16,2025-01-09T11:15:15.870000 -CVE-2024-12849,0,0,1ec1f74cc5622df60afc70cfedb69ebca5791587da5e6e97ed85991f051e26c4,2025-01-07T06:15:17.607000 +CVE-2024-12848,0,1,95ac60390486f7accc1a4c21b3c339a643ce34c81e0e6f7a88c7c7253bce51fe,2025-01-09T11:15:15.870000 +CVE-2024-12849,0,1,3437660a93e3ba43e7759c6102f16953543e1a3c3d091452a24c483dbd6bd5de,2025-01-07T06:15:17.607000 CVE-2024-1285,0,0,6f25c863c73c3b70a1777f6b7ea15f17f9158b6669df8af6e4411802154a74d9,2025-01-08T17:13:54.647000 CVE-2024-12850,0,0,075205b205303999a6a29790d3e10f6b915eaaea804fbc90dec0f08e9b7ce1f4,2024-12-24T10:15:06.033000 -CVE-2024-12851,0,0,1a1ed3a928b1f5351defaf2a6fd966f60d7691ce0326764d64f0130c2392eaf1,2025-01-08T07:15:27.027000 -CVE-2024-12852,0,0,313ac0877d12bdeba23cb1261f513c819e50243422b9728474fc9f22b61d3940,2025-01-08T07:15:27.250000 -CVE-2024-12853,0,0,f92164e22a5c1d9303426b34e46845f6450bf80d82209a475afb4d6839f12024,2025-01-08T10:15:06.903000 -CVE-2024-12854,0,0,0cf3aae47fc8b1e0c5aa7faa8765f943ebdcba0267edb516527bfecba5deba39,2025-01-08T10:15:07.120000 -CVE-2024-12855,0,0,0d0323ee3b1c1ce0cb334c5a86f2a2c5354ac887002b8ddead73ca560a70f4c6,2025-01-08T09:15:06.927000 +CVE-2024-12851,0,1,89fbf4947ea2a25bb6811f4e6924ae7d3e8813ec55aaf5fa121bafb025dd3fd9,2025-01-08T07:15:27.027000 +CVE-2024-12852,0,1,956342645c2c9c3b82a820b6a59451a9a24604b5dbbad73965c12b7f863032fc,2025-01-08T07:15:27.250000 +CVE-2024-12853,0,1,41257905fe1b8024a4b0abaa09fe8324bc7a9ba4b9ffaf1cfe293b8b9bbd7a08,2025-01-08T10:15:06.903000 +CVE-2024-12854,0,1,69236f9eafc0f2c7414eefa82874add13ee2f0264bbd1b7a7471ee6aa8d8128f,2025-01-08T10:15:07.120000 +CVE-2024-12855,0,1,a46d762f03387b8afb1e9185d9de027ca31f0ae538ce006a6a77ed552320cc05,2025-01-08T09:15:06.927000 CVE-2024-12856,0,0,9babd12091bd3794c40f556b84241a138bc1e45b107552b0272431ce40e98129,2024-12-27T18:15:23.677000 CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000 CVE-2024-12867,0,0,732c7583e9efa2618fe2f4098930414e7eb5e8b8eea2432950087191a298a004,2024-12-20T20:15:22.740000 @@ -245568,7 +245569,7 @@ CVE-2024-12967,0,0,373940667d19816c3418d961d099af60d3af6231ff28cd91d7af64f003be3 CVE-2024-12968,0,0,473738ee0e0f6b6f86e9a3a8b8a283681eba25a6f3d6076d3cb1c2aa54667b10,2024-12-27T17:15:07.867000 CVE-2024-12969,0,0,bfc800521737ced79f0fdf84fea2951556653a7bc3ba525e5b81eb87e6e86ab2,2024-12-27T17:15:07.993000 CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5bfd,2024-12-31T14:28:27.090000 -CVE-2024-12970,0,0,ce16370907cf3d7d7ff5c5aa38fbc190de4af1a2f94a3c047e8f9929c4425823,2025-01-06T12:15:06.573000 +CVE-2024-12970,0,1,268b1d4c941e5f6dcc50831164f6567c6c310551116a8aea4012d7694acc0deb,2025-01-06T12:15:06.573000 CVE-2024-12976,0,0,43a9acc7b69e46736fdd09ae24588944ab6f6c791f8fe6b3bbe2688255c67125,2024-12-27T19:15:08 CVE-2024-12977,0,0,9458814f2ac9e7493633a6831104d1d77636f0bfc645e189a28897428c96b0b7,2024-12-27T19:15:08.130000 CVE-2024-12978,0,0,04a59dc4b363139238466108de9e8a94b7678b4462324185368dbf91da408f7c,2024-12-27T04:15:05.603000 @@ -245635,7 +245636,7 @@ CVE-2024-13038,0,0,07021c3f3e4e5ad8d59084daa2472f76a36a62f583200e4e988b2985299ac CVE-2024-13039,0,0,2ff048e2898a94c89e2fe46d15a6b69b7d24fd911b280e248c70b61bbb5acce0,2024-12-30T17:15:08.597000 CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000 CVE-2024-13040,0,0,48eac60daed7d09b05d10239614a9afabab092e37582ba3e02178f3736c64fc0,2024-12-31T02:15:06.303000 -CVE-2024-13041,0,0,49054a6a33743c1e6ab55e3ca334f47a3844e5906bbaad1d3a49a9cb1e9a2e09,2025-01-09T07:15:26.497000 +CVE-2024-13041,0,1,b8a3b56ca8da54078f58fb9baf0092d63bbfb03cd3871368c1c2eecde48c11b0,2025-01-09T07:15:26.497000 CVE-2024-13042,0,0,1f81fc2eec05a9223456735091886113e5fb919c6582ca39f0497333c1ba2b59,2025-01-04T13:15:06.483000 CVE-2024-13043,0,0,d417b605205dbe84f83258ea316ba45f837391250bcff3253069ffacb1fd1864,2025-01-03T20:56:34.317000 CVE-2024-13044,0,0,2a60dae76075d731a7a10d4f5dd3f064d1a9a7527f55b8c35dfff24662fef8aa,2025-01-03T17:38:23.907000 @@ -245654,21 +245655,21 @@ CVE-2024-13062,0,0,bfb1ffc886a0949d9ed69f7e0da80e7f91792af21c2e02f1c9f10695e7c5c CVE-2024-13067,0,0,e69189bee5d0a11c81cab03a930cdfe0d459ce5c2a6c85a3bede740d1ccebc78,2024-12-31T16:15:25.280000 CVE-2024-13069,0,0,f58ddca809cd35e7f1c0a7c3657ea5bb3a8b81c189f375a7a849a794e92f1650,2024-12-31T16:15:25.580000 CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000 -CVE-2024-13070,0,0,2bcea116957c968caaf0f2b2dd670ac9a0f612c50f9d2c5bf3eb2ee627a8ffe6,2024-12-31T15:15:07.853000 -CVE-2024-13072,0,0,8a5332c9e37c8ac688b46b2ac18d6747c9c9f75f917ef94831d54e03ea21064c,2025-01-06T15:19:09.547000 -CVE-2024-13074,0,0,82c625761bcc4faebb78f7834747785ec87ab3107c377244ca37e3cdc15a076b,2024-12-31T18:15:25.917000 +CVE-2024-13070,0,1,6d8634454294d40b59a35ab33a6b8c72e8f9d1f2360fa543b9245c62ec19ce61,2024-12-31T15:15:07.853000 +CVE-2024-13072,0,1,ba07a7d470d80263d79341c42b3e337f60c59459fa2de50c8dc4284106df2759,2025-01-06T15:19:09.547000 +CVE-2024-13074,0,1,861361285225f8369a7463d38e12db12077661d14809fce4c77651a9c41bc0a1,2024-12-31T18:15:25.917000 CVE-2024-13075,0,0,2cb13cdf67fdca2c3fead054a5dd1db8b5aa80d267d1df554624c5bb7ed51b62,2025-01-06T14:57:56.690000 CVE-2024-13076,0,0,112637eaa000ca8ff065f2327ed83998dc721c9a700d6a6ae4ef32916cb3aa62,2025-01-06T14:51:54.247000 -CVE-2024-13077,0,0,82a1babf4a1d9b2dfecd283d6defb1aa61fff3ef99cf6e7f77d225aa53c1f8b4,2025-01-06T14:51:06.337000 +CVE-2024-13077,0,1,4314134bcfa0f2be7b405ef44a4f4883fe0bce2ca98d9e0bf7e434dd66e97813,2025-01-06T14:51:06.337000 CVE-2024-13078,0,0,7291acf56374c3eeeb64f060b0d1e69876872ca8b8e88146f012144173c5de42,2025-01-06T14:49:59.017000 CVE-2024-13079,0,0,5a9c0171e2f4848774c3795fcb192cd8b9cdcae0b524a0addadfe416efdd2391,2025-01-06T14:49:38.193000 CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000 -CVE-2024-13080,0,0,376a4cec2510e9bb91b8ac99ea37fa1922ddf304eac6d60768b73e6454a579a4,2025-01-06T14:47:35.650000 -CVE-2024-13081,0,0,4cde7e3fef0cb67973c6747bc854a5c0b024537a6b5407b8f72176e7ffcef06f,2025-01-06T14:47:13.503000 -CVE-2024-13082,0,0,821d00f62f130737f4fa2a0cfd42770dd159019d16c467ec665c8a0a558b33ea,2025-01-06T14:46:40.910000 -CVE-2024-13083,0,0,1a2720ef5e2b0f78c5a184d63cc5277e40fc2350e65508e227550bab7801181c,2025-01-06T14:45:40.307000 -CVE-2024-13084,0,0,adf9bed155b1bdff6036c9a3cc3b5be77cff7d25fd108fae5917224d01f6d618,2025-01-06T14:44:57.910000 -CVE-2024-13085,0,0,b364989b605ebd3cb7a9fd89ba82a0e74186880c8e21583fb8d42e57634e17d7,2025-01-06T14:43:13.437000 +CVE-2024-13080,0,1,92702739a700b9bf1677d77b5fc7d09edb5fed19e80a1bed8d232452bcd5d95c,2025-01-06T14:47:35.650000 +CVE-2024-13081,0,1,83b92f1e09be2d886fd046f793244e1e8d17742b469663267f2673e4780fdd0a,2025-01-06T14:47:13.503000 +CVE-2024-13082,0,1,fedcc09fa3f831f658a23c96d4b36b4d02908aef6d6966698de314adf2d5b451,2025-01-06T14:46:40.910000 +CVE-2024-13083,0,1,a00551ba6e0cadbeb1b3f766f7f6ef5748853bc6fcbf1ce2f64d620d72471150,2025-01-06T14:45:40.307000 +CVE-2024-13084,0,1,d00934445b6245a2d7a1c922e54582011935a722283aea79975605354cc8b9da,2025-01-06T14:44:57.910000 +CVE-2024-13085,0,1,d0eb71970e4340c9d521cd6295f0e2badb4028ac6e8c3353ab1951da5ac33a1b,2025-01-06T14:43:13.437000 CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000 CVE-2024-13092,0,0,8a150593dbe1f180e29b1c2e3ea75cd720a3d6f50bb74cd3f244a3b1730f66a4,2025-01-06T21:15:14.273000 CVE-2024-13093,0,0,efaf6e963b0d924999f6d8167a81917175f763e9f833fbf291aa1961a6ad2e71,2025-01-06T21:15:14.427000 @@ -245685,14 +245686,14 @@ CVE-2024-1311,0,0,01ebf083283fbdbf324aa4188b2056da81574dace6d1d37e23fa5b3fb17648 CVE-2024-13110,0,0,3af34e021045f1f321eb3e27d67d0cda816b86ed4d944ed6768c463b9396b88e,2025-01-02T14:15:06.240000 CVE-2024-13111,0,0,111a0995b810edb3a95164b3ad0483dc838f87262c9575afeeb4b85a996b26d6,2025-01-02T17:15:08.223000 CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000 -CVE-2024-13129,0,0,9ca6456491ec5676f6b1be848e2f99ae604ad63b1a6f5bc3973f8c9dea216d3e,2025-01-03T22:15:06.677000 +CVE-2024-13129,0,1,c8465ea9fafd80ae001698785c09dec31df42294cc4a62b87a1aaef854b51892,2025-01-03T22:15:06.677000 CVE-2024-1313,0,0,cad1078661641c2022e5f0188a431d9a70908db5ab4b61d98e0389abbba8b680,2024-11-21T08:50:18.207000 CVE-2024-13130,0,0,11faf417785d12b2b829d9b6bcccc37fdbc1730d9810cb9c4f93c832649c2012,2025-01-10T14:15:27.740000 CVE-2024-13131,0,0,b2e61750ac10a0f0335a98de23f2a0f4134c4b67b2d954e7edfaed8137694b3e,2025-01-10T14:15:28.793000 -CVE-2024-13132,0,0,21d2d0a056783edb04baa7102838e18985529312e228439b1f29de893d6c8fa8,2025-01-05T05:15:06.400000 -CVE-2024-13133,0,0,9785e69379d6a0c25057df0e85fe2b0fda922cd10a604d201c02ee6ff38b912f,2025-01-05T05:15:07.507000 -CVE-2024-13134,0,0,bf32841e8233339434384501225db38253b29750f711b67f74a58aecb9e0610e,2025-01-05T08:15:05.443000 -CVE-2024-13135,0,0,9a43452518638b8d25c8090b95d8a1fcf70738bb2886554ca1f52e4a4a6a3c1f,2025-01-05T09:15:05.240000 +CVE-2024-13132,0,1,594571502108d1bbe5e2eea9ba980d95a2fa434713b832f566b58ef0a91c4dfa,2025-01-05T05:15:06.400000 +CVE-2024-13133,0,1,e47f60b53979830f63f2a82ea9286fe0a882be09d003097342682dcb8cf9204a,2025-01-05T05:15:07.507000 +CVE-2024-13134,0,1,cfa8d5a9a0d9f46619da3acacfcfd078e2a961f271cc9aaaab38523ffadcc77f,2025-01-05T08:15:05.443000 +CVE-2024-13135,0,1,64c7b54133de3440e17155c52aa9212367fc3ce5e67260a123812af1462477f2,2025-01-05T09:15:05.240000 CVE-2024-13136,0,0,bb2b83fbad983dbdeeec303f308fd5130e09326e055f521f592cc47ea909269d,2025-01-10T21:01:43.337000 CVE-2024-13137,0,0,04bec9f7f5abb256ba215da037e63e22a20bec978a9336abf7c9a303fb71294b,2025-01-10T21:01:53.403000 CVE-2024-13138,0,0,cda50dafe5ec2c49c43e0f97420ace9c352a8c30c4198b4a5bacd16d7e33148d,2025-01-10T21:01:57.583000 @@ -245700,50 +245701,50 @@ CVE-2024-13139,0,0,aa7621227b78e0f3db13f8e8d9da1d3ecaf0b70ddda414db54c96117fa66d CVE-2024-13140,0,0,9fb39653d083b87da62251c5edb3b6fc15982852b32b9b2bdb1317b77f82bc92,2025-01-10T21:34:19.453000 CVE-2024-13141,0,0,e02630d89869a93282447e18ce780011ed83ee2cea269953c3ed99e9cff8fd6c,2025-01-10T21:39:47.827000 CVE-2024-13142,0,0,83e0842aea5b2cb3dd06404d668eb9948718605f09db4c9056bc023c82417987,2025-01-10T17:32:54.570000 -CVE-2024-13143,0,0,c2afc4876e46cd380fd1d10a980312da4d2e603db0d42920d20cd1d81d1bf391,2025-01-06T00:15:05.460000 -CVE-2024-13144,0,0,bc673dcb37833b727fc98157fce26807cef4c158cb3987428cbd5bd61bbe52b2,2025-01-06T00:15:05.633000 -CVE-2024-13145,0,0,5293851792dc3cb6491b0cda78aca9c898b2b603a3534d53245e0430e746e1ed,2025-01-06T01:15:06.253000 +CVE-2024-13143,0,1,5b98fd73f844e22877d6840bd4c9a6249f752b17b68060c8d46233d630dea32e,2025-01-06T00:15:05.460000 +CVE-2024-13144,0,1,421356c7c2f8738fb679788721a3f3f954ae7a1eb9d21a080e8a08af1c17c712,2025-01-06T00:15:05.633000 +CVE-2024-13145,0,1,d619d4a0aac8850d0c75f520a9103dfd5ad1c1ab851866f38b7082760726771a,2025-01-06T01:15:06.253000 CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000 -CVE-2024-13153,0,0,de78f1f4efaeeb4981941c568d7dd7c0ad017670abfea047339f3d3542b071c5,2025-01-09T09:15:07.243000 +CVE-2024-13153,0,1,e5372006a19c4f2229d5d82f2f00e097ecc1dd71c1df06bd0280614a58d1fbcf,2025-01-09T09:15:07.243000 CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000 -CVE-2024-1317,0,0,a1d296c91e245cb27c998bff4f84250fb1101a61ebac429b7ce35a2ceb239c73,2024-12-31T16:57:11.080000 -CVE-2024-13173,0,0,f1a33d2e3c9b2cf91c9a53b07743d77111624711ca1e4fa83f21d1b344cad8f0,2025-01-08T15:15:16.577000 -CVE-2024-1318,0,0,875ffbabaf295988fe72077a5574dbe20799a2a8618e7dc53ba31731145c671a,2024-12-31T16:56:50.763000 -CVE-2024-13183,0,0,c06710e484599292530472624034ea6f4353648e49c8ce38c9e19589a75e8e8d,2025-01-10T08:15:25.967000 -CVE-2024-13185,0,0,309623867cf2a365ccf0f9b8bad47d56d8813a4020c9e23dc24fdd83b6361ef7,2025-01-08T15:15:17.163000 -CVE-2024-13186,0,0,ab68464e9eb8c64ef77f66273b4531bf06ac11994ab182c60b128be5d808b9b1,2025-01-08T14:15:26.227000 -CVE-2024-13187,0,0,22a296a0fc204e7fb6d468d261ef96cb75ee85392fddddbfd453c9e83d5a5443,2025-01-08T21:15:11.973000 -CVE-2024-13188,0,0,cc95bf1d824c3b6096fc692ac535848a10cbc0f564544683f2277bd18e0fae2c,2025-01-08T19:15:30.840000 -CVE-2024-13189,0,0,03a8ad20b4285eaac39004c7eb28ba111ec68af46d0e0b846ef6e6119fec9713,2025-01-08T21:15:12.157000 +CVE-2024-1317,0,1,46323fe1da940bd13276c7c0326eb43d027e4f8b59610bf799203cd66f429443,2024-12-31T16:57:11.080000 +CVE-2024-13173,0,1,052d5e11a0e6d41f18ffe50cc98d7e8fa992f332fedcf8acc482d2ed982cfbb4,2025-01-08T15:15:16.577000 +CVE-2024-1318,0,1,8468ceebf6c6c9f41014d2f5941b790bd61167061813191d7b8edcc4ba43bbca,2024-12-31T16:56:50.763000 +CVE-2024-13183,0,1,028036178c7a3b1c41ddb9ba35fe40593192d7eedc859520e440e7f658afb3f8,2025-01-10T08:15:25.967000 +CVE-2024-13185,0,1,f40f11cf6008f79d177ff077a9dcbe69bd3026b99163ebcfc01129828e4cdf96,2025-01-08T15:15:17.163000 +CVE-2024-13186,0,1,5a307dfc747150abb54643d1b030b7f8a8c1cd824f720d341c7d1515ac2b46a9,2025-01-08T14:15:26.227000 +CVE-2024-13187,0,1,9325323ccfca6993238c07c9d3c36024cc87ae07ec0882520853d84e8818c20b,2025-01-08T21:15:11.973000 +CVE-2024-13188,0,1,2afe472276f25155b6aec0da26b81e06ea22daa9c2f099381ca0ef2cb0a7cc15,2025-01-08T19:15:30.840000 +CVE-2024-13189,0,1,fec9b6d5e4a5c429fa80f456a9f8d17ea13a35e331977e7cd21a4ea613ebf2e3,2025-01-08T21:15:12.157000 CVE-2024-1319,0,0,e6fca38f8817c3f0a93cd5d73a5a9417a178ac65495356d684dc26f204fa5765,2024-11-21T08:50:19.530000 -CVE-2024-13190,0,0,b6c3d265062c184bd417077d9b801b1b02f71d26f94736dd2a2e2e78d84e35b3,2025-01-08T21:15:12.303000 -CVE-2024-13191,0,0,acf48138d6f10b5ad792d98ea4234cf17f1a67d948d65a6cf617827e1a2497f6,2025-01-09T17:15:11.267000 -CVE-2024-13192,0,0,e60f95922c3aa1971207a21d39eaa051a48c816a3b8670f8f58232779772f9b7,2025-01-09T17:15:11.420000 -CVE-2024-13193,0,0,c717570d1de8a588005559d5f3413cb5d4e9b8ede95aff5f3aed1419254b9ed5,2025-01-09T17:15:11.553000 -CVE-2024-13194,0,0,11e2a2e8c4cc0ffb69f3c39f1fc80fb9211cf61f4ac8662c031e19a5df18a666,2025-01-09T17:15:11.690000 -CVE-2024-13195,0,0,edc056ffba3fa8234e3e803f085bac395a07db6dd9597d6a293bb2b8c96d2d0d,2025-01-09T17:15:11.827000 -CVE-2024-13196,0,0,1a221c779c5ec970f9284e25c7922a23733aa4e6f0efbd0d1f31eb314a0fbe2d,2025-01-09T17:15:11.957000 -CVE-2024-13197,0,0,9d5153b5ece20b4134fcd83d45bfb87bfa57926a52f471a54f4b78f71b505855,2025-01-09T00:15:25.973000 -CVE-2024-13198,0,0,fb551fc384ea0792648d5bb66449568fc33fc94e148fe1e77af2f5295ee93a0d,2025-01-09T01:15:07.970000 -CVE-2024-13199,0,0,74cca34a7d6812099d39c24587e1ca3fb7095e9d4c634b9fd2572aab9ae8a82e,2025-01-09T01:15:08.170000 -CVE-2024-1320,0,0,80370b3cf95d31a327dfcead0766151687bef5425baa11f9a4606b327981e1e5,2024-11-21T08:50:19.647000 -CVE-2024-13200,0,0,23aa3e94582350485df0ae1018ff31c7a2c62819baa08903df7e716f12383814,2025-01-09T03:15:23.820000 -CVE-2024-13201,0,0,98f9e9029ecdad1b3085258c9d21a620f38d90ac00edbfea61330f3072ab29fb,2025-01-09T03:15:24.020000 -CVE-2024-13202,0,0,669843cd2767e1362c6888d90dc9775472fa50b6493947d53887c22e9cf3d3bf,2025-01-09T17:15:12.110000 -CVE-2024-13203,0,0,c75812e8b13f4399ae4b97d3cdeab90eed4085ec212b5b871ccc90cb2595bb55,2025-01-09T17:15:12.280000 -CVE-2024-13204,0,0,29b356ed8e68b4bf4c454a187403ce827799c9b4a8c71e1fb3c28ca6727e9acb,2025-01-09T03:15:24.603000 -CVE-2024-13205,0,0,9464f2ec9efe376869968fe98439f4ee92c2be5d685bfc791c3582f593a3a139,2025-01-10T13:15:09.097000 -CVE-2024-13206,0,0,3592680ac4f9d21850041d74074be88a605be70d439b1229b27538d812be260a,2025-01-09T04:15:10.990000 -CVE-2024-13209,0,0,ba59362766f93c6d18b5a8987b5e8a847432c789f656b7315b541fc0de12a958,2025-01-09T04:15:11.683000 -CVE-2024-1321,0,0,64c53fddfcf700442bf3bc09eea0aa8fb2f1c68b08bca44e74ca22c8291fb906,2024-11-21T08:50:19.770000 -CVE-2024-13210,0,0,9c2837491698d24f5000afb3d19abcc16178fc7ed798d9056bbf57ed270987f3,2025-01-09T04:15:11.890000 -CVE-2024-13211,0,0,b1a0c32a461a305b01a40862066c26a2707cb98e558725b9d5012e71185e54b1,2025-01-09T04:15:12.077000 -CVE-2024-13212,0,0,ff0beb27cac65c4a6f3cc8b1da05d950e23c9771e58602d6b2e6c2e39adc6fef,2025-01-09T04:15:12.277000 -CVE-2024-13213,0,0,016ccce3890e239ab31550e74b6985f8dec7be64ed2f65e683828d651c08f2a3,2025-01-09T04:15:12.453000 +CVE-2024-13190,0,1,891ca518917855a8ccf0a73bac0e444c43e54b45470df7ce3d944a8db603eb74,2025-01-08T21:15:12.303000 +CVE-2024-13191,0,1,8487291ebce2a923fd2bd9d4d41e7dc244873fcfecc6547c12aa4df12e12d853,2025-01-09T17:15:11.267000 +CVE-2024-13192,0,1,f37d36e0cec3807fd52a8346f62add1a0f406d4e7ac3f2d989be2e8464bc1ddf,2025-01-09T17:15:11.420000 +CVE-2024-13193,0,1,92127dbd002cba2d2f48cdd167f034f491934ea87f13949dba89186916610f8b,2025-01-09T17:15:11.553000 +CVE-2024-13194,0,1,7d8df0d492863ba8183a5024d143ec53ed5689b04c8c787313d6e8d0bb09a61f,2025-01-09T17:15:11.690000 +CVE-2024-13195,0,1,5d1eb4d8f42c0bed07528e4fb5e542880d78f13348f9311532d849acdb222963,2025-01-09T17:15:11.827000 +CVE-2024-13196,0,1,5dd7421e2de00a0fa2b4567f99035d33f92e8ffa54d83b03cc9fee45488e27f2,2025-01-09T17:15:11.957000 +CVE-2024-13197,0,1,d428182213fac4cc8b40fd7e33b4d20effb06542e944df56397e4ff16985515a,2025-01-09T00:15:25.973000 +CVE-2024-13198,0,1,7e9bc253359d2ad851b64677d9cdcc0bbdb5a58a67156c16438da86863bb5cdf,2025-01-09T01:15:07.970000 +CVE-2024-13199,0,1,e7aeb9d5683ec76f2b52e306a899af630c26a8d44dd2afcef123fab78e01b09b,2025-01-09T01:15:08.170000 +CVE-2024-1320,0,1,38fea25fedd71b495f8390b27fa63616d1b38682e55e5d1d6ad88b3a7d6c2436,2024-11-21T08:50:19.647000 +CVE-2024-13200,0,1,deea54311c8ffd3251ff905e09fd0b29a82de9065f77209914269bd56eadd82b,2025-01-09T03:15:23.820000 +CVE-2024-13201,0,1,f3be9d5ff1c407cd25b4d9118bb72306e8d3f63ff7193d9f98e54adda8fe5339,2025-01-09T03:15:24.020000 +CVE-2024-13202,0,1,d52b238cdd2b81346aa8cea3f6247e194c74bac78f2cc293d53ec4fda2a0709b,2025-01-09T17:15:12.110000 +CVE-2024-13203,0,1,185596fd55da2cd2b39bf258cd979d62bae493829dc274cf47040e63f44d1f94,2025-01-09T17:15:12.280000 +CVE-2024-13204,0,1,2077568adc3d1587266daf90f54daa05715b1fd3b8ad1ca02bbf94d99d7b0f77,2025-01-09T03:15:24.603000 +CVE-2024-13205,0,1,a2c24bfcb6dabf141ebfc05101bd5868750a3f91da2d75e38e38d8f789252bb5,2025-01-10T13:15:09.097000 +CVE-2024-13206,0,1,2ac2a8a2c5e17df449daefc0b8deb33d1fbcb984155fe913a475753b12e53f67,2025-01-09T04:15:10.990000 +CVE-2024-13209,0,1,14bbd70ee1fa73e35942ca670bb7c13c7db5eae6860ff3be2b6ad90a0b86296f,2025-01-09T04:15:11.683000 +CVE-2024-1321,0,1,6d84d3c02534b0eca3f563a03af9370608679327f3010af17a6c6ffa557ddb13,2024-11-21T08:50:19.770000 +CVE-2024-13210,0,1,127e3de5b01fd275f14befb3eb9083d2caebd6f189a1117ba2466bb322bd39c0,2025-01-09T04:15:11.890000 +CVE-2024-13211,0,1,ce07bd4dec4e71ee51c53bd7e26b1aa6c9e58b64ba82b1ae528c62444e9a6f63,2025-01-09T04:15:12.077000 +CVE-2024-13212,0,1,5d3d9340b90adc02a73b2a397cbc7b9a824f5e41958bbb77ca0e0a733f439b87,2025-01-09T04:15:12.277000 +CVE-2024-13213,0,1,3077bf102e80b6ad26d9de82b06cecbfeedc1b0a01c454e5ec2b3b19555a517b,2025-01-09T04:15:12.453000 CVE-2024-1322,0,0,a87df03aa9d8a817a942ae8ebad8afc3111ac175155d7ee73a384181ec986bff,2024-11-21T08:50:19.883000 CVE-2024-1323,0,0,63ac2cb10ca4755662ac35d59563526e26b5fa0e58c6b5db1bc1601423d748c8,2024-11-21T08:50:20.007000 -CVE-2024-13237,0,0,0e099d9880d92c49b3ca1970bd176209d386547a17aee4575c917a38f869cc92,2025-01-09T21:15:24.977000 -CVE-2024-13238,0,0,ec64fcce16e7166de52cafcfa87e31ea208084b826367a559eb7714c72efebce,2025-01-09T21:15:25.130000 +CVE-2024-13237,0,1,757f6068109954aeb708ce365b1ff5e5adf5204baad7d55d37a565a85d7816ad,2025-01-09T21:15:24.977000 +CVE-2024-13238,0,1,e97946c1ed27832515b261c210f4ad897caef0bf1252b79ed355ec42751c24a5,2025-01-09T21:15:25.130000 CVE-2024-13239,0,0,91e163b85b63de6da134a1efa6398bca19ed0ada57bcebfc51e085d959e0fa81,2025-01-10T18:15:19.477000 CVE-2024-1324,0,0,0549bb3be448975952143ae81e24b0d5f65c09ae2158391af7244cb59e87fadb,2024-11-21T08:50:20.130000 CVE-2024-13240,0,0,c23731c67b8394a5b77048a719fcbab9774235baeeec0bfabd61d2c2693390c5,2025-01-10T18:15:19.667000 @@ -245751,15 +245752,15 @@ CVE-2024-13241,0,0,241f36388dd9d0250782f9bbacaa7fd16a2c4f4654829f32ef4c1e6808165 CVE-2024-13242,0,0,8f249d15dceab60189340113b908f384910e8461c1ed251c9d454eb2b8a7e3ac,2025-01-10T18:15:20.073000 CVE-2024-13243,0,0,60c55b04921631948b3cf5c78c7dffd9be61de5cf988596a827026772767e93d,2025-01-10T17:15:12.363000 CVE-2024-13244,0,0,66fd20dc397360f37d57d76ebaf133806c99cec9caccc62145a83ee9f5035e07,2025-01-10T17:15:12.520000 -CVE-2024-13245,0,0,d73b38db1a6e938d1add334925cbbc645030d06058575160af2253d1b1de4317,2025-01-09T21:15:25.280000 +CVE-2024-13245,0,1,350332bfd11c85f88507cf4bb80ed1290c646ec4436a99b4afd163886fe812aa,2025-01-09T21:15:25.280000 CVE-2024-13246,0,0,58d679d9e0ab9ea0fb993c766c5018b221ce1888b921782a4d5c3bd503be8c04,2025-01-10T20:15:30.297000 -CVE-2024-13247,0,0,c0ff6610f664eed69c51e30504f5f89f90f8f4f5e85373c63971ad77cff043e4,2025-01-09T21:15:25.443000 +CVE-2024-13247,0,1,fe01fad4129cb5b0a892894550afef00957652a9656b5901fd344d5a8b65f361,2025-01-09T21:15:25.443000 CVE-2024-13248,0,0,c68feac7282b16b96cc9684af1066c93316e4357e09556c6e3e807bba9895e89,2025-01-10T22:15:25.360000 CVE-2024-13249,0,0,12415da8f25bcdd5d149d2550827a4cdd78f62bd131a49dc084a8ab273a828be,2025-01-10T22:15:25.497000 CVE-2024-1325,0,0,e675927cccf3d0d372acef6efb2eaf04f606a1c54fca901ae4401eb5c8b04d53,2024-11-21T08:50:20.267000 CVE-2024-13250,0,0,4a3a787bce97fbef0fee2240fe1737e95ce63d7c481f33b188732c20f9facef9,2025-01-10T17:15:12.680000 CVE-2024-13251,0,0,2ce4cd4c13367ac35e33c8bfdbb93208bb9cb24365cd64462a1736260eaba687,2025-01-10T17:15:12.840000 -CVE-2024-13252,0,0,4c6bfbfba0bb5b3df9ab9b3692f9d67cbe918b9aa4bc194815f1357bd5b897cc,2025-01-09T21:15:25.620000 +CVE-2024-13252,0,1,6faa700c3210374495f8c9950f151461ad6a6db96bdf05ad671c6c5bb628069c,2025-01-09T21:15:25.620000 CVE-2024-13253,0,0,b9d20fe9028c6c48e4c6898ede79dbd65089fbea639f7f0c702430fbf518d90d,2025-01-10T17:15:13 CVE-2024-13254,0,0,1d6c171c68716f707b2017147c89cd554b84f4fb5a8144fae804f0cf11ac53f2,2025-01-10T17:15:13.160000 CVE-2024-13255,0,0,30d122e7a99a3aefea6099ce4303df5e29d39d7856ee105f4406b33d80c163e3,2025-01-10T17:15:13.323000 @@ -245767,24 +245768,24 @@ CVE-2024-13256,0,0,6fa72d5df9d1562b690eb521042892ce862092a53db4aa5455aa3193da45b CVE-2024-13257,0,0,f213223ee324695263f2da2f35b3d3266b83d94665c713d57755e790212db9fe,2025-01-10T17:15:13.633000 CVE-2024-13258,0,0,56002163111d5a6eada8d3adf75cf02a508e57137bf382caabb3f8d8fbe14cc3,2025-01-10T17:15:13.790000 CVE-2024-13259,0,0,09acf9e9d265ee8ff060666b321687331606d14797196e5d6a4356dc1d20e03c,2025-01-10T17:15:13.960000 -CVE-2024-1326,0,0,9e67bbc50998f668a02ee8ba73768b06fa72128aa10aae00eb85bacb556748d9,2024-11-21T08:50:20.387000 +CVE-2024-1326,0,1,59e0762e7c3a69265ed2a95de7a01da8705152f41a930f6b7556faed8887e5ac,2024-11-21T08:50:20.387000 CVE-2024-13260,0,0,a08570a47e7fc6221ee9017c2c7eafe7ec30aaf25ea9687520aeb0d0a1edb998,2025-01-10T17:15:14.107000 CVE-2024-13261,0,0,0488246e685df60a2baadd57883ded78a9960a9ca422cf33e3dc1d175f157ed2,2025-01-10T22:15:25.630000 -CVE-2024-13262,0,0,bbf4e12feb87f81ab61e618d8867053139ed023bfcab6db02c45794dc8abc981,2025-01-09T21:15:25.770000 +CVE-2024-13262,0,1,f42826f99a2294f60b944bbc35c89c4f533e668555c364894ff8f776cb4c2767,2025-01-09T21:15:25.770000 CVE-2024-13263,0,0,f968351445fc99f6e3dfb4be31349a8b3501084c33ee668176ecd38c499f373f,2025-01-10T22:15:25.777000 CVE-2024-13264,0,0,72767e334e10182c4bb28a6003147a945a39cf58526f8d69414b9da4598861b1,2025-01-10T17:15:14.260000 -CVE-2024-13265,0,0,bf6f079404ad0ed392522dc17a402693c8dc8d810372186a8024b0a4292d56f8,2025-01-09T20:15:35.230000 -CVE-2024-13266,0,0,ba5beeab2e67c03a8848d4422a4fd0281b9c914a1dc1059649a689da4986a13e,2025-01-09T20:15:35.350000 -CVE-2024-13267,0,0,c8127bf5e682d56d8ed00729b3a5392b89ea0f2055cd6e9bbee155897879978d,2025-01-09T20:15:35.470000 -CVE-2024-13268,0,0,66228e6e5d080c7d02cdf91f4bc75fad89affc1f44d946b51498d1c5fa96d646,2025-01-09T20:15:35.577000 -CVE-2024-13269,0,0,89173d50481dd9c3dd00c4964571dbf5b50e8e809227bc275980470140b3e566,2025-01-09T20:15:35.687000 -CVE-2024-1327,0,0,789dd020d2c87c02ae62114f801c74a34e4f582ed93f04eba3cce875a8422c5c,2024-11-21T08:50:20.510000 -CVE-2024-13270,0,0,4b9b0295f26291dc920513ba3dbec13cbd91323e9001242235ae0bed9fb76fba,2025-01-09T20:15:35.790000 -CVE-2024-13271,0,0,2921eb8aac132e58862c628ed5acfbafef3a82347e771fcb5982fdfb2f7554b6,2025-01-09T20:15:35.910000 -CVE-2024-13272,0,0,eca1c7019c61eba57716a5cd50e8f38a7181975831b73a749c4eebf76b773a12,2025-01-09T20:15:36.027000 -CVE-2024-13273,0,0,caffb3778165af7adb9ae0b9235c1b66cd2135c03f3833cef35b7696bfb56a1e,2025-01-09T21:15:25.913000 -CVE-2024-13274,0,0,5420aafd6bfcc7ec45fcd790cc0f73a5dd29cd822148e4edabe96351c390666b,2025-01-09T20:15:36.250000 -CVE-2024-13275,0,0,5c4b70690589a7d741db839da087a9bbf696363c71999877417181d7b29c9874,2025-01-09T20:15:36.367000 +CVE-2024-13265,0,1,0e2d723bac4a4f5d4b5c3539fcf70e35dd4d42f38053971bc188e137e934d0c2,2025-01-09T20:15:35.230000 +CVE-2024-13266,0,1,27d74af77e375049129349d03669cec48b133ed47311b3f61bf67d19dfa400c5,2025-01-09T20:15:35.350000 +CVE-2024-13267,0,1,51810463305b3fac0198969c25b36d264b59e9a4a6d8d298a313426aa2934a56,2025-01-09T20:15:35.470000 +CVE-2024-13268,0,1,ab2ca4df69353c6af407bf3f87301555d4bd9eb6134717d5cb44ff3bc0de1ef5,2025-01-09T20:15:35.577000 +CVE-2024-13269,0,1,15b723abdab3cac8f057c2a93357bfc122f6550e17e83fbff1dade6d5652d0de,2025-01-09T20:15:35.687000 +CVE-2024-1327,0,1,91e280205b973346de36e668a18dbfc6f9f0b5bacae37b352f08cea87679b23a,2024-11-21T08:50:20.510000 +CVE-2024-13270,0,1,e87c63bda0333ee4a66f449c899d74f2e08b74af6a5ebb363e5ef4b3e3167359,2025-01-09T20:15:35.790000 +CVE-2024-13271,0,1,59799f40be37f28c79189be8aa28d2139d3ba52e710292e27d885484c5ab45c0,2025-01-09T20:15:35.910000 +CVE-2024-13272,0,1,a02aa7fea252eaeb3288b9af1a7be3c73123128ae4135a7fcb002957c5fe8799,2025-01-09T20:15:36.027000 +CVE-2024-13273,0,1,3d789176ad67fbff32b39a088eba0c643d952760d0221233a5ede099c2704fd6,2025-01-09T21:15:25.913000 +CVE-2024-13274,0,1,1d670f0929e2c933712ce5834cc861a4022e0a979179a0505fb94a43b3c64947,2025-01-09T20:15:36.250000 +CVE-2024-13275,0,1,b4ff8e5b0b826edd77ca46966fa70ec9e0e67babbec914db5e1bed8b50a37ad1,2025-01-09T20:15:36.367000 CVE-2024-13276,0,0,f99a6c5d99b3671a462f8c3f04dbe0f625d6c84f42576b8a1482c46e470c52b0,2025-01-10T17:15:14.403000 CVE-2024-13277,0,0,170fbddb1ea2aa934abc3e7c872de3cc667f574cb81e8842dbb2a343a94ba8e8,2025-01-10T17:15:14.577000 CVE-2024-13278,0,0,0b3d43093387ff4627c543ab3ac357256926c3ac015d649b1456862d09636927,2025-01-10T17:15:14.737000 @@ -245793,15 +245794,15 @@ CVE-2024-1328,0,0,dbb4237e73752ffcf9cde870b857e7149465a2d39bacb143022da362e68b59 CVE-2024-13280,0,0,351dca9cbe0ccbc63d4ced9879229357f8a1564fb701ddbfcb70ef7565a78857,2025-01-10T17:15:15.060000 CVE-2024-13281,0,0,d840549d43ab48d140beff120ef51396bd81a61f4a66d199a3740093dc10014e,2025-01-10T17:15:15.227000 CVE-2024-13282,0,0,2b56dec5e84a2c4a5d703ecd6088891c27a687a8ef49a6f98b79f241b6aae1bd,2025-01-10T17:15:15.380000 -CVE-2024-13283,0,0,06d6a590278d437dd2cd7098913a2ae8e46aac79294db7b19b5c022447cdc2e3,2025-01-09T21:15:26.073000 +CVE-2024-13283,0,1,10d6f3772c75a231f70afea3d547030e5e2042b24f6a961723b9b93bb4d662fb,2025-01-09T21:15:26.073000 CVE-2024-13284,0,0,97b8a5b7154d2b506acfc792980d1829ce3c9c801ab0a36524dc57ec4793c07b,2025-01-10T17:15:15.543000 CVE-2024-13285,0,0,f6690c37a9aabf9b9e0444136dd20b405a9d26d8e874326a6914b71e0e29dc1f,2025-01-10T17:15:15.693000 CVE-2024-13286,0,0,24535b4b32049b09779997a8f17f27d0ddbb826124427eb90038f54f41f872d7,2025-01-10T17:15:15.843000 CVE-2024-13287,0,0,a422e9c8a313c66aea818cd227c6f71318b1ecfa1656648b495055abe00902a7,2025-01-10T17:15:16.007000 -CVE-2024-13288,0,0,484b285fe67627f0a3814c7f4cb93516543dbe556954b79bc457882560b64019,2025-01-10T15:15:14.787000 +CVE-2024-13288,0,1,a1c5f13d1975e5a8c891525b824f055f34504b9d7a5c4191859afb9a2083e9cd,2025-01-10T15:15:14.787000 CVE-2024-13289,0,0,425e4cd5f317f1cf21ba29b52ee7d542a3c4d7e08b5cc52adb780fbfc0d212ef,2025-01-10T17:15:16.160000 CVE-2024-1329,0,0,81b4a64d5bb53c5c7897dd1baf274bad80194678ff3074e25c9eae4cebc9cdd9,2024-11-21T08:50:20.753000 -CVE-2024-13290,0,0,4ee56e82e95c0dc9b1b1f342245311de34c2e667cc820779f982a033cf27cc79,2025-01-09T21:15:26.447000 +CVE-2024-13290,0,1,1ac2d210fefb5da35e308b541e8b713cca96ab648fa64315fee4a43716c5c476,2025-01-09T21:15:26.447000 CVE-2024-13291,0,0,742177c2c7dc3335558976578690980d71b2ba1582900e51d7587bab2c5c8ba9,2025-01-10T19:15:37.227000 CVE-2024-13292,0,0,392e872ef2cef3b46276b9a0b2a93369f33267269c5b3f3ec7db5013aae41d2a,2025-01-10T17:15:16.307000 CVE-2024-13293,0,0,a8e454a8fc93c78bceb0b28a07b44f1e82cb1fc54bc7c6d678bc043cdf41b2fa,2025-01-10T19:15:37.360000 @@ -245810,29 +245811,29 @@ CVE-2024-13295,0,0,5a7349a6a80001f32563a82c77e39b0087fc39b47aaff1b4bd4d433dc2d23 CVE-2024-13296,0,0,1b6640fa6043fe53509fd611f1c4896b899d7aad4b72095bafb0a68eeb5175b1,2025-01-10T18:15:20.280000 CVE-2024-13297,0,0,4fea26d15e784a4c8c4f5e15e7ad1bfc2bcc736da1ceafc2bbae01c6cab25991,2025-01-10T18:15:20.500000 CVE-2024-13298,0,0,fd2a5a5b58ff548774ba61311bd60a816d2517a7af73a3006b6e7870ae463ba4,2025-01-10T17:15:16.477000 -CVE-2024-13299,0,0,50c41313deded40ba88de84c3e507ee124f2fa8a616b7ab05f8c3a84fd615e53,2025-01-09T21:15:27.460000 +CVE-2024-13299,0,1,ae12832db5dd061ebb012a2c7da5747955945e4690f79cbe8a0c7ce391ae4560,2025-01-09T21:15:27.460000 CVE-2024-1330,0,0,502ca86aa36ef0d9cec38bb132d44e809a7c14b6c55791005f8847665ecf9895,2024-11-21T08:50:20.897000 -CVE-2024-13300,0,0,9f519245cb46757ace3a88091b45661010ebbc2ee791ecd61d9197748b03101a,2025-01-09T21:15:27.563000 +CVE-2024-13300,0,1,79b1e3d063d26cbdb0c1fb824da2a89a4f6c234b85e6215a76ecc26847032c7b,2025-01-09T21:15:27.563000 CVE-2024-13301,0,0,4852fef3af76fba9cda513a22382a138500a4ab36b2401978bcf75a90962b6ff,2025-01-10T17:15:16.647000 CVE-2024-13302,0,0,c2e2f829e272ce3710b30cde276e1b51b430dd27cc63cc0d3e8565746bc825c3,2025-01-10T18:15:20.703000 CVE-2024-13303,0,0,45400694ac4670f48d80d8a7e39a4bc849293c35e8276e2742f48056b9fcfa36,2025-01-10T18:15:20.910000 CVE-2024-13304,0,0,24b1a36018af16d753703a5b5b1bb932f9f36c2f21a7231aac95060bf05434cb,2025-01-10T18:15:21.263000 CVE-2024-13305,0,0,3a4cf301307578a6e63a4f0538c798b9e10f6efb81525d14d4ca11f02d0c6cd6,2025-01-10T17:15:16.820000 -CVE-2024-13308,0,0,0ad91599b9d9699b01577762f6ab068e6321202ae0dde909ce86cf998f30c3ea,2025-01-09T21:15:28.623000 -CVE-2024-13309,0,0,79d74704243a1b49fa1107db97a45fba34cf6540b1f86cd837ae3cd793bddf9f,2025-01-09T21:15:28.740000 +CVE-2024-13308,0,1,628dfc7afada6f39009e3075b904110e0898bfe72715ceaf39a1a966cfc45777,2025-01-09T21:15:28.623000 +CVE-2024-13309,0,1,7804e59975687c811f41086ccb055124503b48f1f5cb86a86be5d217498799ec,2025-01-09T21:15:28.740000 CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1fdc,2024-11-21T08:50:21.027000 -CVE-2024-13310,0,0,828595479473c57046eae2d88e9bebe5779d22e1ddcc647a3202516ea6a2fd94,2025-01-09T21:15:28.867000 -CVE-2024-13311,0,0,5da93e28a2521be5f63a8dbbc23284ef7a19ffd55e0f6504c5157fe570c5e04a,2025-01-09T21:15:28.970000 -CVE-2024-13312,0,0,1bd9e55909ab519ba7f4fe1fa840585567d93c745790513daa4387247d8a931f,2025-01-09T21:15:29.077000 -CVE-2024-13318,0,0,2d22b5226ac3ff62b5ca8e6b40ee6cf0bfbbb39ed5cd8f63c78d6f4839a7b126,2025-01-10T12:15:24.257000 +CVE-2024-13310,0,1,34b833dc43272c485330d8f4a3479ba2fe514cfb2fea7226b333743fa866e9aa,2025-01-09T21:15:28.867000 +CVE-2024-13311,0,1,043082a8dd739b5eb445323387334add04ddcec723a1cf1ae43347104de3b9ea,2025-01-09T21:15:28.970000 +CVE-2024-13312,0,1,1596f306a61a66773ca721f46a9f359accd6e8bc761ac287ef2d071eacd93640,2025-01-09T21:15:29.077000 +CVE-2024-13318,0,1,bd9b3dd8797a6a8e50fbc0881ed502b3d6c9d2df54bdf8f89c7bd4c9f15cb658,2025-01-10T12:15:24.257000 CVE-2024-1332,0,0,43a2cb0465d1ed7fa77b51d32b9ef650ccc5cd8e8f972f53915014a8e37bc428,2024-11-21T08:50:21.220000 CVE-2024-1333,0,0,7e67218d34e52c77cd12091eb7bec4820751f8a3faacd15e7977a33b9d658d65,2024-11-21T08:50:21.337000 -CVE-2024-1334,0,0,8823bf53da4897f18ca7daefd05e524ce4cfc11c398467ab7dbcaff8bf5ff61a,2024-12-31T16:48:40.290000 -CVE-2024-1335,0,0,ea54176718e6f94079a9e0779ed189aee51a9a9a11d01cd222ee449cf90ad29f,2024-12-31T16:50:11.167000 -CVE-2024-1336,0,0,e5af9edfda730c68424d9af5f33f1559bbd76b64d2169dc5b805af38e3d13bae,2024-12-31T16:51:04.857000 +CVE-2024-1334,0,1,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000 +CVE-2024-1335,0,1,82fb69da532892baa7a81804ae338bd46e69a8bbbad77be8c22b678b91bcc8f9,2024-12-31T16:50:11.167000 +CVE-2024-1336,0,1,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0fa,2024-11-21T08:50:21.857000 -CVE-2024-1338,0,0,ab4982baab3aa45d716862f735c7d62f5694d660c186b3fec0b7b79ca0d36280,2024-12-31T16:51:41.113000 -CVE-2024-1339,0,0,d43b3428c44a61ce6aa9affeac8c926c01429483d88c5e02ec9790aec2a3254f,2024-12-31T16:52:24.407000 +CVE-2024-1338,0,1,dc2761903a1c29795472be9ec50c80e554c7222ddc44792707b7eb37ea2462f8,2024-12-31T16:51:41.113000 +CVE-2024-1339,0,1,a64c4c68c8a9a926adb37b05ad26ad3fdfdc4a14ba534fc12b29b0c3bcb239b6,2024-12-31T16:52:24.407000 CVE-2024-1340,0,0,779cbb4786989b99b13d0df5bfadd47a6bb17fb76227d8a826f245b565dc9020,2024-11-21T08:50:22.180000 CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000 CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000 @@ -245854,8 +245855,8 @@ CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996 CVE-2024-1358,0,0,58b91750f832fa3181d981272fd291a1e6524bd3abeabae70b95e0f12e08731a,2024-11-21T08:50:24.403000 CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000 CVE-2024-1360,0,0,a87675d91847a9b72ed5368695c7c67c099276d1667e5e94dc544f268946892c,2024-11-21T08:50:24.707000 -CVE-2024-1361,0,0,ca706174649462c6a39f94963a3bd32d88e881b030f93fe3ba41873e1a84795e,2024-11-21T08:50:24.830000 -CVE-2024-1362,0,0,f040608d8c88b35d1afc5ddb2f1e81b507f9ac1293e908ddfb2e77912f230459,2024-11-21T08:50:24.963000 +CVE-2024-1361,0,1,e15f182b8a4e9268f7e71b9d19ebdf74537a6773e637ec4fcb89a578d3f1b95a,2024-11-21T08:50:24.830000 +CVE-2024-1362,0,1,c3aa6a2d55274e6e5331c43a9ac00cdf91e4708df0b3920c2c0da1c4b217b49c,2024-11-21T08:50:24.963000 CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000 CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000 CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92ab,2024-11-21T08:50:25.350000 @@ -245900,11 +245901,11 @@ CVE-2024-1403,0,0,1223a155bc2b0b18ea1cc50606869346a4a36515ddf5edc887de58b206c628 CVE-2024-1404,0,0,72e7bfa50d663f6618ea5cb7b36bb28904508f29cf1e05b2cbe5def310af3816,2024-11-21T08:50:30.790000 CVE-2024-1405,0,0,f1f20b7fcf6fcb7016c5464ac9de09f0711e13473f6f7d4ae7139e675dbe1403,2024-11-21T08:50:30.937000 CVE-2024-1406,0,0,6b28f10833aa0266c21bf391a699e38b0fbc18d07df506bf50ade27d766794c5,2024-11-21T08:50:31.093000 -CVE-2024-1407,0,0,9d3ad23d5665b56b8a0dc98e603c8cef78aa941866422f1fe7d356781b6aceed,2024-11-21T08:50:31.263000 +CVE-2024-1407,0,1,f210006f46d4d92fb3eb56df038539a129e62ee10849cb5b6490a07efbfd27c9,2024-11-21T08:50:31.263000 CVE-2024-1408,0,0,6ef60a72951d16c0b9e728b84742a4d35c67925763670f067b8c3c5941c31590,2024-11-21T08:50:31.397000 CVE-2024-1409,0,0,7962f407df3c3ae50439b2eca79b45057e814b108e0e2b019b6d191d89933849,2024-11-21T08:50:31.520000 CVE-2024-1410,0,0,5e6f7cca224df908329417aec1336b7ff4ef9e141a0c106289cba50bfd976a14,2024-11-21T08:50:31.643000 -CVE-2024-1411,0,0,e7a1c2c58112f6d2281198602ce9c8af956b99d93b7abf35ff41846b80b51047,2024-11-21T08:50:31.793000 +CVE-2024-1411,0,1,82c8315d496904b5f0cb196f4411ee9b7be36f22edef3381394ba801c5e04492,2024-11-21T08:50:31.793000 CVE-2024-1412,0,0,488aaea4090fd0bfbd6439d19bc44e277648de8ce1e7b471395f315b7b1d9749,2024-11-21T08:50:31.930000 CVE-2024-1413,0,0,c64e3388d47b8c2054b600040f62c6fe2a89043f752eb146d13f9d8d6058f8df,2024-11-21T08:50:32.080000 CVE-2024-1414,0,0,927457b22588fcc937c91bf95f654970922ca0703529397ddf9bc7012135f490,2024-11-21T08:50:32.210000 @@ -245991,8 +245992,8 @@ CVE-2024-1498,0,0,9cbd92d0f33965fc6126a633cc19db346c78e615eab4dbf18c292d9646196f CVE-2024-1499,0,0,2fa895202673064cbd35a54445b99c9cb0cf65d5e0d54bc253de6d34157152db,2024-11-21T08:50:42.720000 CVE-2024-1500,0,0,1a2689bd4dcc7fdb3935a898039d25a11719c226152d0787db6d49bd67e84aeb,2025-01-08T18:34:33.033000 CVE-2024-1501,0,0,7278cf3016d6e749f83586c857f319c6893ef852e37caa5b00a791eeb8409c93,2024-11-21T08:50:42.983000 -CVE-2024-1502,0,0,321ade08663ef4c52de698551c83e1933eff98b10674b67784c71cebf1a6bb75,2024-11-21T08:50:43.110000 -CVE-2024-1503,0,0,dc20017c9fb5e4e443c308e7aac4d1055cdc0e51b3045e8b6f5474cdaa32a336,2024-11-21T08:50:43.240000 +CVE-2024-1502,0,1,845c6146ab4898148b075ff41402cc70e8fc456b777fc26039f99251aecf8c91,2024-11-21T08:50:43.110000 +CVE-2024-1503,0,1,e6a770b1e3e27079ea6b75f572c214eadbba0cddcadadd07e541ca89142fa539,2024-11-21T08:50:43.240000 CVE-2024-1504,0,0,d581c9656f5131563cedb677e916eb2d390674aea901c47070200915ed1b024e,2024-11-21T08:50:43.387000 CVE-2024-1505,0,0,1f5bce476861c3fd41baf5f0962bbbf5c85fbeb63ffd3e0d5a89be700845b36f,2024-11-21T08:50:43.523000 CVE-2024-1506,0,0,cfaef76da624d09cf2ce420799d37ab9d157d8737e507b08d86edfab7cbc719c,2024-11-21T08:50:43.653000 @@ -246000,7 +246001,7 @@ CVE-2024-1507,0,0,b442cc7027613cdaf88f2abd5fa3484f988fd6301d680f4dda4a2b1c9d2671 CVE-2024-1508,0,0,7d5a8f9b21d3cbed56499fe8af26db3f07d342dad25b4c46d2468afcf9c84853,2024-11-21T08:50:43.913000 CVE-2024-1510,0,0,c76f27d463e131a290976dcdb39e753c0c1cc63cd998480dfc45ef7b6e61c01e,2024-11-21T08:50:44.030000 CVE-2024-1511,0,0,b11b362f2acbc196f43a92e45bae6b3316a9a34999d9162dab309d4eea0f751a,2024-11-21T08:50:44.160000 -CVE-2024-1512,0,0,7b0ffc2fbe9122de007f9c3f2efafa96bc52d0d36a437bc664512b5133f9ea3b,2024-12-18T17:23:15.360000 +CVE-2024-1512,0,1,26a89e8ea4daeb69acb8ef0a5290d443e1fbb4f0997b4751a3c4b63986c14001,2024-12-18T17:23:15.360000 CVE-2024-1514,0,0,065a08306127871145f34727c9c34814a36355420c30f0cb2ae4276b319437fa,2024-11-21T08:50:44.403000 CVE-2024-1515,0,0,a3add1da137a72880095a1615a74b53662a1751b21dec935a7c4b7d184dd4113,2024-02-16T18:15:07.820000 CVE-2024-1516,0,0,ae0dda1e388fbe9bb68c26e49d1e55447c78bca551e4128fdafd45f882514681,2024-11-21T08:50:44.537000 @@ -246114,7 +246115,7 @@ CVE-2024-1640,0,0,5a1a433d9c4fff99641db26e31a901ba05b22ce24bea862e61bd65501e5ebe CVE-2024-1641,0,0,b0df7adf6fe0b4743c932c7cebd3b80c6d328f692d983d1d9ad69f21762a38a0,2024-11-21T08:50:59.157000 CVE-2024-1642,0,0,212f14be7d8459e9a508bd3a70180152c6bcf203731c8036b94fea507b9fac7b,2024-11-21T08:50:59.280000 CVE-2024-1643,0,0,23a51e500cbbb14eb0edb6213fdbe45992476107d29301a7ac00c541a3990120,2024-11-21T08:50:59.403000 -CVE-2024-1644,0,0,ca5626d9cf912b2ce4bee93299ee7b5c513887bff992bcfcb23fbacc3bb135ea,2024-12-31T14:30:42.993000 +CVE-2024-1644,0,1,2a0c9bedb7077c42744b0cff4622252c578909ba72cfa38faa02c26586371ff9,2024-12-31T14:30:42.993000 CVE-2024-1645,0,0,fc2db15dc582e529d4e2d85af443e9dede47328e7ae86a8af4f691034414bd50,2024-11-21T08:50:59.670000 CVE-2024-1646,0,0,5059540515ce7eb8ae68b15c4eec4ff01ea4b884936486b4b6938c6175d66543,2024-11-21T08:50:59.783000 CVE-2024-1647,0,0,61673824377e23ed6345f1ce2d3e2dfdab70aa35a8f57fa1b19d6f80febcb2a6,2024-11-21T08:50:59.913000 @@ -246148,7 +246149,7 @@ CVE-2024-1676,0,0,7e55cb96a33844ddc82c1544ec024ca7ca7115da046671ebe1c08d520f2d01 CVE-2024-1677,0,0,f63085ae699930c2a7bccf4f5b27074bf865db350d11c7c74e303c37a2dc3c91,2024-11-21T08:51:03.970000 CVE-2024-1678,0,0,75019f724e358fb97543b3b015f8efae7da5666221e51f1dce3b747cd7025b61,2024-11-21T08:51:04.100000 CVE-2024-1679,0,0,85bedae9061b3720a8aac04bdfd64edd595c8634af6e409f360e6e8a3c24160d,2024-11-21T08:51:04.217000 -CVE-2024-1680,0,0,3ac51cd7304436f07ecc65d43338c40d4998fe903834d37e13aa499dddc437fb,2024-11-21T08:51:04.343000 +CVE-2024-1680,0,1,8dbf40e879fad021b7a7443b9f10f435d28b9568de371d2ca8aec06e14da1e84,2024-11-21T08:51:04.343000 CVE-2024-1681,0,0,87722b864de2c195c5e141db9746ee2505b642ee819b5f7b75e697a2bdf59a4e,2024-11-21T08:51:04.453000 CVE-2024-1682,0,0,0e11607cf529dec133ea113ba87fcf066536c068f0b68436a61501901b8952ec,2024-11-18T21:35:03.980000 CVE-2024-1683,0,0,40ff1170327873e06408d050c303bd1e9091b35ce3f19779d85a3b2dc46d6863,2024-12-17T17:10:15.347000 @@ -246214,10 +246215,10 @@ CVE-2024-1744,0,0,e57e89c1c38c1b4f16fac07cd4c094af44c29de3b59f0a0effddbbf171558f CVE-2024-1745,0,0,abd8adfe6df8d51ddd96937437915d89e70976d02fbf70da9c7aba7a8dc30da2,2024-11-21T08:51:13.010000 CVE-2024-1746,0,0,d737ae6f99df6e75b9f9e494f5de9d239aa5dc5be6bc3fd9000ad7db33bb4a0d,2024-11-21T08:51:13.197000 CVE-2024-1747,0,0,27286aec8fdbaab5a8f39768113911219c8413c899f355e1ed4f720cbf58b487,2024-08-01T15:35:05.150000 -CVE-2024-1748,0,0,74d4cea0e1c1e4a98588fa2c5afc3a34ad68ccf8b3cd99bacd857379be149895,2024-12-31T14:50:15.207000 -CVE-2024-1749,0,0,07e2a36d9ad03d4437e74380edf301acc801a649896e27c665ad7589dcbb493c,2024-12-31T15:00:58.700000 -CVE-2024-1750,0,0,fef6cbfaa97593c57d704c7e0fa8c0ee9d4eefb72692ba6adb5d415e3678f776,2024-12-31T15:08:18 -CVE-2024-1751,0,0,ab01569a5cf06f449728e9489242c171643dba40d6c01524f77775fddd5807fc,2024-11-21T08:51:13.987000 +CVE-2024-1748,0,1,c591b783a4b5cd3e060ea70c6dca8f8480983a2179a773086d5810d5a0c737bf,2024-12-31T14:50:15.207000 +CVE-2024-1749,0,1,0a4b74d75bab64e6d75be29ebac80b54d9b09f5f2762ad2041ad2066b092939e,2024-12-31T15:00:58.700000 +CVE-2024-1750,0,1,17e9a38a384e56565446cfc819c2a44e2ad796c010b24e9825282256895886c6,2024-12-31T15:08:18 +CVE-2024-1751,0,1,f7582d478d76d3d8b059f4ced80c615b9b566c06627625d841dd865b1af8a27c,2024-11-21T08:51:13.987000 CVE-2024-1752,0,0,899790f65b6ea36fdaaec55cf9cba5c9e8120dada21d406f68487a9d2bb0a9d3,2024-11-21T08:51:14.110000 CVE-2024-1753,0,0,97eb25eefdb4797c38bcadc3519b75967ef4d30f53fb9cc57a3b33325f64503d,2024-11-26T20:15:26.237000 CVE-2024-1754,0,0,1a62e04cfc963db540100c68219b255ef7962cf0c80d59371fd17c6fd5a6366b,2024-11-29T18:15:06.763000 @@ -246234,7 +246235,7 @@ CVE-2024-1765,0,0,59c91913d171a81fb5475f94729055825298c4825c2c1c89296f006dcdad04 CVE-2024-1766,0,0,d8ff872b7c733da8ac7e1c2957ad11b4600ff77b669728faaac2462853b27909,2024-11-21T08:51:15.920000 CVE-2024-1767,0,0,46a39479a9b591bf1071f7fd4913fbaba087307dcc1a4d130d8d5b3ad9292185,2024-11-21T08:51:16.067000 CVE-2024-1768,0,0,084ea6e85b6e0db23c5de56c4e455942100ac7c25c4612406b0ed1fa01484f30,2024-11-21T08:51:16.190000 -CVE-2024-1769,0,0,1d07fe7a6dd9724d02efef1fa7eb34e17103f527a04bd0edda805ea3713fda60,2024-12-23T17:21:56.777000 +CVE-2024-1769,0,1,ff77fc668bdbec6d05987f2f81bab9ea4e80c812689056057cde0b607f3fa566,2024-12-23T17:21:56.777000 CVE-2024-1770,0,0,be7f84c853421e443cf5ae22747f87bd5c1fa8ecada9be24081bdcc6cc4bfe2f,2024-11-21T08:51:16.457000 CVE-2024-1771,0,0,dfc64cd2d5902446d25294ce0163ab293276e26453b42c802ea6af4493302727,2024-11-21T08:51:16.577000 CVE-2024-1772,0,0,f99b113d86a69f6dc327bee2933c94ef07e01bd499efa53690214e4c00dd4e45,2024-11-21T08:51:16.703000 @@ -246251,7 +246252,7 @@ CVE-2024-1782,0,0,15bc4a01eecf562070055e67a3b5b6d087e6b8c48666a5dcecf70ea0752100 CVE-2024-1783,0,0,594da34a49bb55c82ff9fc17102c6a156816bdf59c95a1d9d5e8a48feb45d1d5,2024-11-21T08:51:18.077000 CVE-2024-1784,0,0,04cca439e6113763bf6a59c7d618f5b9b01eabe35d7dccb243485ba20a56ec50,2024-11-21T08:51:18.223000 CVE-2024-1785,0,0,d5071643d4460d30b810ad9c3b3d9dbd3daf0edfd77acea7798a44fd4c3311c3,2024-11-21T08:51:18.363000 -CVE-2024-1786,0,0,d187e4beb52da65e677d82ca2f86089a61e5fc366b3cd32ffdf0fae3fbc6c5a9,2024-12-17T19:45:01.027000 +CVE-2024-1786,0,1,d75952858ae428cb176bd890b5446832af799bc5f956c8150d189a15b538c288,2024-12-17T19:45:01.027000 CVE-2024-1787,0,0,a020a5c2a4ab7ad70ca3624e6b182fcbe5b860cbd5df83fa706e200dfd1c4f00,2024-11-21T08:51:18.633000 CVE-2024-1788,0,0,944b68ae7c4fef863b1d252fdfc9f6e4803358c1ba216ca2f540fdf15cd93ec6,2024-03-04T13:15:44.523000 CVE-2024-1789,0,0,2d072fd3e0a14c223d8c9fc1d03732a6e2b678d1507f636486db4f8121dced31,2024-11-21T08:51:18.780000 @@ -246282,7 +246283,7 @@ CVE-2024-1813,0,0,af9f2bb3eb6bc51b4a215435f235cab2662f97c1f121ca2b9815918d864a5a CVE-2024-1814,0,0,b1f72ce435b20bd0e1ee07d579e48d7d435132109273eb1e21a4ad380ff59e20,2024-11-21T08:51:22.743000 CVE-2024-1815,0,0,7f45c65a4288b28c557236a804803550ac7f7bfe0122910ba9eed9d92210e1ba,2024-11-21T08:51:22.880000 CVE-2024-1816,0,0,fb2c71310049ea08362fe36bfa86864d1e43f918274976e175d670be0bdeca77,2024-11-21T08:51:22.990000 -CVE-2024-1817,0,0,6fd65a38160f3dfbc347c314959454e3959baad25383bc975c8b745ddb2b836c,2024-12-17T19:45:27.853000 +CVE-2024-1817,0,1,b846cc3d483410c6f9b9ecd288f163aefcc251e624cd1906b907e5c84749f4cc,2024-12-17T19:45:27.853000 CVE-2024-1818,0,0,bfbfe80311cff9b01cdd17c41e1c3a4ad858b7fcefa88e3f19dfb6f5c27a9529,2024-12-07T02:39:27.403000 CVE-2024-1819,0,0,a71adddd570d5e42fe28c30c6a69ad186a8afd28be10e95ff6db19766a51106d,2024-12-07T02:45:14.367000 CVE-2024-1820,0,0,b3bc22ef3086ec4bc296b04d8443bee8f6e639dc6431d631328b6ff9e7110c1e,2024-12-07T02:48:35.260000 @@ -246296,7 +246297,7 @@ CVE-2024-1827,0,0,d97862548deab21778f1c1b9d53d23ada7e732d252397f0f2072f5b4b9307f CVE-2024-1828,0,0,b760ebd2ae313180c5c111a9ac7a316c5b9d8de2437a27c7372259752cdd990a,2024-12-06T16:22:23.323000 CVE-2024-1829,0,0,634338941c91cc090704fdeb495f9134b13230d52cb66c3e2ac7c4389fa934b9,2024-12-06T16:20:39.807000 CVE-2024-1830,0,0,6148977243dff6823944555b57332bea031dfbf211e468b224b330e17ff6d713,2024-12-06T16:15:12.410000 -CVE-2024-1831,0,0,024ca512f66ce3af79edaf489ed2ac57961cb8deb2e3a796ee8d3c192cdf6721,2024-12-17T19:46:52.420000 +CVE-2024-1831,0,1,6fd85e7529a63e00bc5f2636a1e1deaabe646bf27f29cb7695129aadef74eb57,2024-12-17T19:46:52.420000 CVE-2024-1832,0,0,5402cb172702ed493fb8e9ab5cbf84e70a8430b6c8176c5bf7ebbb7532c23b94,2024-12-11T19:57:16.060000 CVE-2024-1833,0,0,73c6db13a6bf6bebcbe761f8ce5ab9b72646ae195c4842aef1aaacd389ae2c18,2024-12-11T19:57:54.520000 CVE-2024-1834,0,0,df78284299f4955a3f571f357aa7c4cd0f01492e2184d3e43b9bc4b22c9d9804,2024-12-06T19:59:24.463000 @@ -246328,8 +246329,8 @@ CVE-2024-1863,0,0,2458870e577036f8a527ffe6fedc1f5705014e9e40ac75930eea1e073fcc83 CVE-2024-1864,0,0,7540eb10c79c4178ff1d3d38ada50b4803bad985e5def6b198e727bc83e258b4,2024-02-27T22:15:14.807000 CVE-2024-1865,0,0,f956c1fb13f7d8ccb79f0523d8afbbb427264aa98fd91d26d435a4ac5b2b57df,2024-02-27T22:15:14.847000 CVE-2024-1866,0,0,b664e93f02eb3409a7f947b52c90652e506a03ffc3ea2701191144838f6db8e6,2024-02-27T22:15:14.887000 -CVE-2024-1867,0,0,d984156e3a7f0459fdbbda503365d5f7b0c320270f1fd30089d6ff85383de9cb,2025-01-03T20:47:30.137000 -CVE-2024-1868,0,0,e0dafdec2bc4abc8301723b83fc4c123e01040f233ac59814398289789f9b74e,2025-01-03T20:47:05.937000 +CVE-2024-1867,0,1,4e12d0852b28f992e23427cfbaa926d6a44817b7dffab20633169a35f375d8e6,2025-01-03T20:47:30.137000 +CVE-2024-1868,0,1,83c67024374f71918a9df0f8b29be6dc72b544ec466a440d982e855d227963c9,2025-01-03T20:47:05.937000 CVE-2024-1869,0,0,f8c69f612e814c4bd9b0f3c1664eca33f449de845c31ce2038b5c1d00298a8db,2024-11-21T08:51:29.133000 CVE-2024-1870,0,0,6d6d6ee7f5ab5452814e8c5a0d8fcee96177fee451cf6d8baa8b58ec9c14573d,2024-11-21T08:51:29.330000 CVE-2024-1871,0,0,ee81c97983aa7443f5b5c8df7b73a58bc5b442ad6448ba9043e72031ddc435ff,2024-12-23T16:33:20.680000 @@ -246377,16 +246378,16 @@ CVE-2024-1914,0,0,30750cee7fb9af8a8c78aeda235409e04b7b88f956515fccee3d8e6101709c CVE-2024-1915,0,0,9862df3021c814b182ef6710e4f9e07e6599de16c8b204aed7dbde87bb21e91d,2024-11-21T08:51:35.263000 CVE-2024-1916,0,0,5e5d2173954ee2a1abc7c09aeb053417aa7d5bd6990291fd461a9af8203dd01e,2024-11-21T08:51:35.413000 CVE-2024-1917,0,0,a107dd4adc7cc6e6626fc79b2e7dbe7823b2cbd752501ce11fe74e8cd6d72042,2024-11-21T08:51:35.613000 -CVE-2024-1918,0,0,020f40dcee5f33168adc82fe125a4de32f2cc558ebb6cf32523d43fc8e62a0fa,2024-12-17T19:56:59.327000 -CVE-2024-1919,0,0,b60265df9f13769479005ced4cd9e45b0c059b23acfbc13fe46f5d845859a955,2024-12-18T17:59:13.393000 -CVE-2024-1920,0,0,e8c13d9f503b120aae156cca11702a7cef0e0201025fc150d3e4744a3349774b,2024-12-18T18:16:07.710000 -CVE-2024-1921,0,0,3ef5ce892105c8ae36dbb040710134b6749fb6b3064b908da568c9339d6d32c8,2024-12-18T18:21:45.907000 -CVE-2024-1922,0,0,f549e3dc4d7de460e2a77755b3c9be8e671ee589dc15a0f5f6a512819a8a986b,2024-12-18T17:59:47.130000 +CVE-2024-1918,0,1,af67abdb1e738f38ba734aa7c84e5d8bdc86cc613f908a999c358c261d5632c4,2024-12-17T19:56:59.327000 +CVE-2024-1919,0,1,0233799b2402884fa1a25cdaca928514f41136cc8ee77410f36ac767a351fd0a,2024-12-18T17:59:13.393000 +CVE-2024-1920,0,1,696f907ff32f4a689781d0926b9b67bc4cfd1df5785a834476889412dc474cb3,2024-12-18T18:16:07.710000 +CVE-2024-1921,0,1,d773d4f04903c25103c2c286f17afe0674af3c464bfe771fa37631dbcd2ed9df,2024-12-18T18:21:45.907000 +CVE-2024-1922,0,1,c8bf21435af28e2b3082658ec068de7764e10a36435800bad2d059eb480d45ab,2024-12-18T17:59:47.130000 CVE-2024-1923,0,0,030ed1e2492afe1ff620622346eb8cec47818e774e7d7feb6010b9652afded3a,2024-12-06T20:00:46.283000 -CVE-2024-1924,0,0,ac47c54793938833d6a81522d6ba168620330169ad79dfd94957991d1d3a3f33,2024-12-18T17:55:15.300000 -CVE-2024-1925,0,0,19dd073006db7900c9c0882352bbf40b6ed760d5e23f952241860b6383282b7d,2024-12-18T17:38:45.143000 -CVE-2024-1926,0,0,a040ef9e4d58bf9f3d0401af3ea5f7f61524ebc9037185e4f0fb6d9dd14352d4,2024-12-18T17:15:43.550000 -CVE-2024-1927,0,0,219544ffbc5f18a66bea2b799f8e4938331a04204ce41a1334fbd9a42e86c34c,2024-12-18T17:08:08.010000 +CVE-2024-1924,0,1,b486556146e6e51f23939bcd2f902347e7f044540dbfed5bb3ec3fd5a3b01e51,2024-12-18T17:55:15.300000 +CVE-2024-1925,0,1,8b87f3435fb90089839e215a7ec1d6d0b41dcbbf4f537d957a927b5b12363810,2024-12-18T17:38:45.143000 +CVE-2024-1926,0,1,a01a45a57c35a56351dd7f6735bd14d92b8dc78d0560e9a3669b8fcc6f25151f,2024-12-18T17:15:43.550000 +CVE-2024-1927,0,1,77d79d9a092e022e4b0c69547cd10ee4395b1293c65d09ad0a717c846616c86f,2024-12-18T17:08:08.010000 CVE-2024-1928,0,0,831df8a037e58b0dc6307f13520381be26c994d0bf2071b8173aeb591ebee898,2024-12-18T17:14:29.463000 CVE-2024-1929,0,0,66be880166e4ec1807686bf782b92499d984f95d0cb3506835484b1d8d6dd831,2024-11-21T08:51:37.297000 CVE-2024-1930,0,0,4e0ea797e3bcfbe6df93f1e664d676ae5be49ce3d01faca149c7e20b46d8fb7c,2024-11-21T08:51:37.427000 @@ -246425,8 +246426,8 @@ CVE-2024-1963,0,0,74e8066dc22099b18322451017e30aabb844984a83e4dc8be065df7b23ed28 CVE-2024-1965,0,0,626da3be9688d22eb1830e01d84bf88b6012980e56ac1f409fd07b757d1975aa,2024-11-21T08:51:41.903000 CVE-2024-1968,0,0,2a9b0ace8391fc3e0c25b1e41dff1a4b4b80300cc75b29c526b48915b4b73b3a,2024-11-21T08:51:42.033000 CVE-2024-1969,0,0,becd052632ced38bcf77712277a59b4bba3e152c66d5bb8e636e5fa64bab4508,2024-11-21T08:51:42.163000 -CVE-2024-1970,0,0,2c96a36fdbfe0a0a4f6f09dc233dfba77a6d583c88271d04012685e10c46bcb6,2024-12-18T17:04:53.240000 -CVE-2024-1971,0,0,86ffa8a556fe29aeda081d0fbfb2b3c292367e1ed8eeaddd70b1efb01239f20c,2024-12-17T22:08:13.060000 +CVE-2024-1970,0,1,1e68c292fef725944fbb9e7172936f1df0740cc26f68e5a4d50f99195a966247,2024-12-18T17:04:53.240000 +CVE-2024-1971,0,1,4b24a31643e2e814171ed8081cde83b5f7a9321b19bbb1a976723bca6278ad5b,2024-12-17T22:08:13.060000 CVE-2024-1972,0,0,0cc508917c2a729c9424480608443d75bc2e0685066a841069988bd5d702f994,2024-12-10T19:53:51.173000 CVE-2024-1973,0,0,bdcc19c6cd3463ae97ce819fbb0ae7d75ae93c2f8b01f9a3134154723cf24538,2024-11-21T08:51:42.740000 CVE-2024-1974,0,0,ddf10b2e07b26483d69810a06ba5463d244f8930001a2db1397a922f561c064f,2024-11-21T08:51:42.867000 @@ -246564,7 +246565,7 @@ CVE-2024-20101,0,0,1b0fb6e30099544a0610e30130e11f942644076950411627a0f652b03e31c CVE-2024-20102,0,0,b14add8569cfdfeb4728ddac4e0e984ab758a4a9669d75ca24872fa709a753de,2024-10-10T18:20:31.820000 CVE-2024-20103,0,0,b3d4791efc226cea589196d5aa87bb175b0cd70d652f826dda4aaaf08c792fe4,2024-10-07T19:36:43.530000 CVE-2024-20104,0,0,279f9fe03a80621edf85d2b9a94aa3e729ef63f418ac218ae57c55ba1b018348,2024-11-04T18:50:05.607000 -CVE-2024-20105,0,0,bb3eb3f6be8275273e0e48baa75106a44702a241c1e10193c8e41b24e73a632c,2025-01-06T15:15:11.433000 +CVE-2024-20105,0,1,d463a519bd7b9192d6e709e1e39e5053e12262dbcab2859f97d9e98f21aa26ce,2025-01-06T15:15:11.433000 CVE-2024-20106,0,0,9ed0edd0d93f818e255d40207e291113a66f7f07a64b246dc551c45e71818d67,2024-11-04T18:50:05.607000 CVE-2024-20107,0,0,d68c82e7ac5cc57e7b2ad3153d74aa648615bf6a91a48360aabd997b2db586b8,2024-11-04T18:50:05.607000 CVE-2024-20108,0,0,1396ac71b05c962e52132dffa47ef1234f2c2dca3e32a1fef4c04be9e6eb1fb6,2024-11-04T18:50:05.607000 @@ -246602,19 +246603,19 @@ CVE-2024-20137,0,0,53377c7194035f3c7335cd23304ae7e34fb32383669eff1b9c9a22598ab07 CVE-2024-20138,0,0,1264e7fcc71f95b0ae39f37ee36146e7c465bf599e4b07c736bd426b81382a8a,2024-12-02T16:15:08.603000 CVE-2024-20139,0,0,434bf1878b4edcc6ee42c87512888b556d261e46d1cb8ef2e233401120fa701b,2024-12-02T16:15:08.770000 CVE-2024-2014,0,0,9c6b7427d7e4ecbb91bf5ac0c5393a05c9efb2a90a5cef1334b8ef37b43c6713,2024-11-21T09:08:48.813000 -CVE-2024-20140,0,0,b7e714113a77e7268367ee0bacacf836859526222ccf9d56e62f2de38eb7010e,2025-01-06T15:15:11.600000 -CVE-2024-20143,0,0,5491159151fc435252113ef74205dd6a1df8014ef3a8f9c2513235ad58c7fb4a,2025-01-06T15:15:11.753000 -CVE-2024-20144,0,0,09252cf883019e73487a0bbd0007148580d5c9efbc4e46daab58c1320ce6b9e3,2025-01-06T15:15:11.917000 -CVE-2024-20145,0,0,292ed72aab68212a7490eb2e78eda2b2452fb3493049403b3190805671e7bb9f,2025-01-06T15:15:12.077000 -CVE-2024-20146,0,0,5e8ad810c0d25e0e1553aed5ccb532aee860831855fd14c1e591cb9ca9d4b7e5,2025-01-06T15:15:12.223000 -CVE-2024-20148,0,0,ae19424b74cec88ba764144dd07ed8232d55f8475522e350fa8ab3349becfaa1,2025-01-06T15:15:12.387000 -CVE-2024-20149,0,0,db5ca4cf6fb6d87c9cef13ef72bcfae3f6287ad2ae95c9ea79d2fe4d24e8b9ac,2025-01-06T15:15:12.523000 +CVE-2024-20140,0,1,abdefdf55af9c04b39505134bb76fe7fc2020967809a7e6f1b53a61d701fa68a,2025-01-06T15:15:11.600000 +CVE-2024-20143,0,1,72741489c266087fa52a215cdc5a63a1e8e5c05ba33b72063739424e15100b6a,2025-01-06T15:15:11.753000 +CVE-2024-20144,0,1,dd0bde2dc33084db00dc8205beac10e41605c84cd3041697ffc83cea5ab50ed6,2025-01-06T15:15:11.917000 +CVE-2024-20145,0,1,7ec4c6219266146d3df0e44b77fa0208be1311c4948f11f0e37de5fe2f21e90f,2025-01-06T15:15:12.077000 +CVE-2024-20146,0,1,b6bb48c380b3b8b9d3cfd85bd440a87f185fae663e0c8193340e8b9dd92f1503,2025-01-06T15:15:12.223000 +CVE-2024-20148,0,1,020b2cd09e91f8beac0c9caedb7ae42dc4f322034d76d3f8252025922b8dcaa2,2025-01-06T15:15:12.387000 +CVE-2024-20149,0,1,568ee02819888360cfcfe668f6e33aef2b41d5b7206273582d0fafdca3736f77,2025-01-06T15:15:12.523000 CVE-2024-2015,0,0,4b2b7166fa9575a7c1050901ca90dd43f109899611c303f2828bf2e2cf52681a,2024-11-21T09:08:48.950000 -CVE-2024-20150,0,0,6f211a955950f4d512ae9ba12eda36305799dde6b9e5333ae1bd37c3b96f0e8e,2025-01-06T15:15:12.707000 -CVE-2024-20151,0,0,538607f46c34ba909762bfb143279ecd62cebcb88388b3e08583b77f9b7b7151,2025-01-06T15:15:12.857000 -CVE-2024-20152,0,0,2677bb7d5fc39cd40a7d294dd1a01974333cfcfdb279fc058fd786559aec7a60,2025-01-06T15:15:13.023000 -CVE-2024-20153,0,0,ff78d00e9b1c56457b86168ff741571f2a113fb5be8b1dca66a0018df69331ad,2025-01-06T15:15:13.173000 -CVE-2024-20154,0,0,bc131748ed6c780a99eef0854972fdaeede2cb00dc4e511cd6ceb166235c4703,2025-01-06T15:15:13.343000 +CVE-2024-20150,0,1,019897895214741b7ee34daf20bc8579076cc9f1ae352d10ac2c45b1594317b1,2025-01-06T15:15:12.707000 +CVE-2024-20151,0,1,0b723186a5e29e6f2a4eb284ddb28411c30388dd48c0580fa4f4c7a77f40a94d,2025-01-06T15:15:12.857000 +CVE-2024-20152,0,1,3b90b5a8ce0f90f04ded09538680d110d2eee1bb1e9c9a7d6feb3649e3bf37e2,2025-01-06T15:15:13.023000 +CVE-2024-20153,0,1,e167e5a4f372d1993cd50bcde2902a5a41097ebede83c7cb6f8dc0db1653bbd9,2025-01-06T15:15:13.173000 +CVE-2024-20154,0,1,84fa7592f528b0fbeafd784633abdf1205542c3bd45b4f3f4f0d20bcbb68b2d2,2025-01-06T15:15:13.343000 CVE-2024-2016,0,0,0a76e7b2522ebfe55ed8955c44da83c1e8d58430e6a8d9e2f2e7fd6c0d9d0b3c,2024-11-21T09:08:49.083000 CVE-2024-2017,0,0,236856e0dda8caa97c3fd2d0292540757fbfb28961569fc651286f391f5350fe,2024-11-21T09:08:49.250000 CVE-2024-2018,0,0,6e829569b26c1c6d9562c5c1edf6c63df592bace683bac56acb5cd3f3ac34712,2024-11-21T09:08:49.413000 @@ -246939,63 +246940,63 @@ CVE-2024-2061,0,0,953ef44ba2e78a508dfb2043c52a233e2c29dd93ee9040c3736ff288014194 CVE-2024-2062,0,0,2e7fca8fec09f1d803f68097a506ca62fcad8d6736942129a787ceee6ecdf58b,2024-12-12T14:51:50.387000 CVE-2024-2063,0,0,8ed668eba70f116b7eeb56ca04c952c84b92fe92bf36043cbcb2156d2e4090aa,2024-12-12T14:52:44.657000 CVE-2024-2064,0,0,80d211793ef5b8211896bd7bdeff65975308592e5fc70f558f7f45c0b9f74c79,2024-12-12T14:55:04.297000 -CVE-2024-2065,0,0,f34f317b77f293b0092406b3495882cafb1eac69a04888080d6ac0480102e208,2024-12-17T20:22:18.960000 -CVE-2024-20652,0,0,c770ab149688a7f7fd11f37371d60210187bf10e57cc60afba2804798afaa20b,2024-11-21T08:52:50.477000 -CVE-2024-20653,0,0,e86d158d550cba7d55ac5b80d0d9405ce30caa36c55abc38a62da946e783980c,2024-11-21T08:52:50.663000 -CVE-2024-20654,0,0,f47f19059d678b722753dda6cf52bf35fb90da475092f92d5f34e0840e1d51c2,2024-11-21T08:52:50.827000 -CVE-2024-20655,0,0,2e96939f7096b6bf97cd3cc6db38fcc5b32adc9c020b471d109239588553e1c7,2024-11-21T08:52:51.007000 -CVE-2024-20656,0,0,99437998cdb6b7af888da30de953a81e60594e6ff8cbd6599cc93767d14a7396,2024-11-21T08:52:51.190000 -CVE-2024-20657,0,0,89fb5cb0c3c9a565f02e075a0587c96b4a2faee8569c837121c5ebec25a20faa,2024-11-21T08:52:51.330000 -CVE-2024-20658,0,0,b39cfdc9da88331f6e350618d7e638c8c88b8d4aee601fe478f7bc234f70e050,2024-11-21T08:52:51.487000 +CVE-2024-2065,0,1,e3873786799159751016f7277efd867f6d380dfb0bb87e773218e693b819e8f5,2024-12-17T20:22:18.960000 +CVE-2024-20652,0,1,0c8f02a3e1821b5da5ebcb9143d8efb2bf923d87af3d4955d19f16d3a1cd64be,2024-11-21T08:52:50.477000 +CVE-2024-20653,0,1,1490a2533670cff7c4699493600e894af921fc46cc87168ccab2b53e4ddcf6ce,2024-11-21T08:52:50.663000 +CVE-2024-20654,0,1,e9712b8bcae90f5dddf0cb96d5c0d3a7d3035cd7978ab584704a5e0e0909bc5d,2024-11-21T08:52:50.827000 +CVE-2024-20655,0,1,875ae978ecf1243186460701764ce4727eb751374cfc4b831b9f660675c4f812,2024-11-21T08:52:51.007000 +CVE-2024-20656,0,1,9e4070bff373f6e14817f11dcc67ee546646042fdd3f16b3256a3b300c64d4ae,2024-11-21T08:52:51.190000 +CVE-2024-20657,0,1,c7a5f226b93600d89c1af8d69e3fba97fedfd0c98a862c9cabf942438e45396f,2024-11-21T08:52:51.330000 +CVE-2024-20658,0,1,35ab55669bab7dd44e2b34f9f432fd62282f4252b5c9478b5dcfd8c7ab659fac,2024-11-21T08:52:51.487000 CVE-2024-20659,0,0,fd402873858ccf6dfab4223947612c92241be23bf7b09a1215d709be9f7f5424,2025-01-10T15:26:59.787000 -CVE-2024-2066,0,0,037c499f3e012a9997068e72fc08d1a93e6383033f9bd4e4f09138fe51a30e00,2024-12-17T20:22:01.370000 -CVE-2024-20660,0,0,62eab3f0977cb409429db0b6d382c512aaf0086ae7a71cc738b9cb3e4da3c6d0,2024-11-21T08:52:51.727000 -CVE-2024-20661,0,0,30e543c400437abc7f96e3109a6c30132015ba4b260c75c12935ac357f961878,2024-12-31T19:15:09.523000 -CVE-2024-20662,0,0,917a258648c4a51eaadafb0946b162ba9ad319c776312b2d34e4c3912032ae0e,2024-11-21T08:52:52.070000 -CVE-2024-20663,0,0,98d0ecc071c6881aa086233a4f49226ea03fe88e6a42e7eb2818b7b99ad13c35,2024-11-21T08:52:52.223000 -CVE-2024-20664,0,0,d2eb4face0f8f0d0f0a4a04f47040d17c1c6026a1869b44738d228cbc7d850db,2024-11-21T08:52:52.380000 +CVE-2024-2066,0,1,746dbe6f63e3ef4fe841a5d1bd69c80b7df24884f4c0971c6b98006328c729b3,2024-12-17T20:22:01.370000 +CVE-2024-20660,0,1,0e6147d98823afb608faff02543e46d24413695ef479c2a06065c8dcbb6e9f78,2024-11-21T08:52:51.727000 +CVE-2024-20661,0,1,d8ffa12cb0f578b4034d74600cbae6b37f76d01db6d9581ae783bc373cb6443f,2024-12-31T19:15:09.523000 +CVE-2024-20662,0,1,207e17d8a35a68c27a685de3e57410ab4eb1ee1d508d64eda31f4acaea318c2b,2024-11-21T08:52:52.070000 +CVE-2024-20663,0,1,5993f9b9106f8ad4c2043295f80787274e8ca3131b51878011334de50be9b170,2024-11-21T08:52:52.223000 +CVE-2024-20664,0,1,9ddef8fa5b9b4de3038f903b18811de952da0cd4b49b417a49e5c3b9f9f01922,2024-11-21T08:52:52.380000 CVE-2024-20665,0,0,ddba14178d893bcbb52fd3cb7ea26310f3edddc497c01a887ad1e2b25a06d853,2025-01-06T14:33:29.733000 -CVE-2024-20666,0,0,64613b17d7a3102d1325ccd3f27245ab53ccbff3b654c38bebeb520779d319e8,2024-11-21T08:52:52.700000 -CVE-2024-20667,0,0,74b7eaeab6adad7a8d6a11e3aa398b5c550729fc518babae280c377b7f0458cb,2024-11-21T08:52:52.857000 +CVE-2024-20666,0,1,5fc5defe7ea5ed37dbb04ef70b308da94142d9b828b1c97a7c7c58d6c5644a0a,2024-11-21T08:52:52.700000 +CVE-2024-20667,0,1,b678aead35cd90bdce74bb201586d83e744fc76fb87aad979b53d128d11437ac,2024-11-21T08:52:52.857000 CVE-2024-20669,0,0,f4a40fdc3a370f7bbda0460be50624f293e8c893b4fd0fc378a2b6c4544343bb,2025-01-08T16:38:53.370000 -CVE-2024-2067,0,0,6c90938e3ddfc84e2e5c47b777802d653de65b0becbd6daa161f22512c6cc446,2024-12-17T22:01:09.097000 +CVE-2024-2067,0,1,a8dd550ece8b530902e09df7b88d39ff1486ad5078a91ac1575702e5d89e4adb,2024-12-17T22:01:09.097000 CVE-2024-20670,0,0,d92a7d7252658b538d5c3c642e72ed7ca328199b0a37b14292b01a122c435bc7,2025-01-08T16:39:28.907000 -CVE-2024-20671,0,0,6b0a7f41059b2984fe800d80092f13f75ad163ac7e615b02ff43563d05f345cb,2024-11-29T20:40:08.810000 -CVE-2024-20672,0,0,5db276fe350cecf3e33fc8e55331d61fd60f5bf88098f91cb579efd578b7d9bf,2024-11-21T08:52:53.400000 -CVE-2024-20673,0,0,61b7b122969a362009d29db767a9bd07d6c29d0460fa20e02a1216c0791a1a66,2024-11-21T08:52:53.537000 -CVE-2024-20674,0,0,c245ce24079f62f86adee0ca5cf5a89acfab423e98816304a6438639037e2eeb,2024-11-21T08:52:53.683000 -CVE-2024-20675,0,0,107c9cb23560bd9b584d87a1dbae0fc9df91a56cf024d1e33df7b9f82a5134db,2024-11-21T08:52:53.853000 -CVE-2024-20676,0,0,7bfdff026f047a27053b8fb5a547f77af04e4a4c70894208feb9d0cd93775f9f,2024-11-21T08:52:53.990000 -CVE-2024-20677,0,0,563b37431807f27e08c293a4556c04e8b5204c7d233439ce26df7c5d4cda9d00,2024-11-21T08:52:54.120000 +CVE-2024-20671,0,1,05842bec816e55e8fba59dc3be4b73e3fddc9d445a481c66095c6d4ca70ce591,2024-11-29T20:40:08.810000 +CVE-2024-20672,0,1,b42d47318baedd22eca2ae203d33888d0d8e37dc0227cbd8b4ac4691899ee26f,2024-11-21T08:52:53.400000 +CVE-2024-20673,0,1,fb73b13062c5207c25f7e883414ec699f189c49690bc7cdc168f811729cd8889,2024-11-21T08:52:53.537000 +CVE-2024-20674,0,1,f8ff37061fb270c4cbded711edeb5d64081234a2635d28ed6828a4c60f65c5c9,2024-11-21T08:52:53.683000 +CVE-2024-20675,0,1,d93607b8445df9ad9ce9cea41429312530fbb5a444732bf71a2474f624533a9a,2024-11-21T08:52:53.853000 +CVE-2024-20676,0,1,b1d72b1e0c34eb8840ecfadf344e03f0ab72dd595b00efc5e3a3428e05ca519e,2024-11-21T08:52:53.990000 +CVE-2024-20677,0,1,3d35756f83b3bd3569d6c4d92e8e304dc88f9a4396f25a7424848a0ea986e861,2024-11-21T08:52:54.120000 CVE-2024-20678,0,0,af61731891979dfe144bebdc4c590eb55ceb08c543bc4524b4bba37da14362bd,2025-01-08T16:39:53.293000 CVE-2024-20679,0,0,0d18febc18bea22d77b5234d7bde767752df8d1fb3ab38d7d78e4ae119653896,2024-11-21T08:52:54.410000 -CVE-2024-2068,0,0,7bee0d6515428803efa5aeadd27bc360f1f191fab2135e7e59904b024174595e,2024-12-17T21:49:34.503000 -CVE-2024-20680,0,0,60c11f06e599b6bafac603d229fc98b1d6cb26ec45e76a99b7bb7da1df3db64d,2024-11-21T08:52:54.540000 -CVE-2024-20681,0,0,5723601005dcebbe9dc590f7e9e98358f5811c9b0570a8ff0762691e53ac6648,2024-11-21T08:52:54.693000 -CVE-2024-20682,0,0,152747128cf3542439257ca216340fd94b2e56a02ba3849305cf9c5ca658a356,2024-11-21T08:52:54.830000 -CVE-2024-20683,0,0,7a1e7f8f6d873cec6a31811b652c06c3ea5d34bd6c7aba6419a911ef6fdadfc0,2024-11-21T08:52:54.977000 -CVE-2024-20684,0,0,cc297d537be0cc10e0c91d4ce453c09384704a87f681132096bcaa58b8d6334d,2024-11-21T08:52:55.123000 +CVE-2024-2068,0,1,95884d8456449d70c894e0517192b620202b22280b4492f1900c97bab2d927d9,2024-12-17T21:49:34.503000 +CVE-2024-20680,0,1,df317f7059d75aec3439ab844723982bfc6d6f8c2fc7d0fa9517a5eb7d8d2b63,2024-11-21T08:52:54.540000 +CVE-2024-20681,0,1,2b5f23e5bcebb93c4a9ec434568b3d354b713133559bea0a9b5c2c5e12c9a0e4,2024-11-21T08:52:54.693000 +CVE-2024-20682,0,1,98c055198b08b7ecfb61c4d0e6fc250d4b63de03abaf4e68d7941bc192c958cd,2024-11-21T08:52:54.830000 +CVE-2024-20683,0,1,c15e1baf5633333a57558ac214c43fb4ca2c31f484b97de35802e6ba04b7fe39,2024-11-21T08:52:54.977000 +CVE-2024-20684,0,1,97520c17a83ec2157384b8e8d37b82e4b4e324c95acaefe128dffcf9007556ec,2024-11-21T08:52:55.123000 CVE-2024-20685,0,0,f944a9f6524e49e7f5476bc9191f07ed84952555db92a559894139a94a5960f7,2025-01-08T16:40:10.677000 -CVE-2024-20686,0,0,858d331d834613f70aec2d758404ed2350f5abbfb31b9711b8d4e4cbe94324b6,2024-11-21T08:52:55.383000 -CVE-2024-20687,0,0,7c52f1e1bed817209b53280114ffbd4bc497611dfb3771a3b2a104709800f271,2024-11-21T08:52:55.517000 +CVE-2024-20686,0,1,f680534f972e9c64f541e406a27cdc54fd308ef2dbddaecfb0266970ea6afb1b,2024-11-21T08:52:55.383000 +CVE-2024-20687,0,1,38244da2d62510ff635b86fff09c3dfb4ca298a382b519cddc3904390508fd2d,2024-11-21T08:52:55.517000 CVE-2024-20688,0,0,f2be42fa09d8ac43b17d3c91935d25ec18e8c24b04d2b46e0c9ab620978c25d0,2025-01-08T16:40:30.807000 CVE-2024-20689,0,0,9e97f612d714ae3d0ed24837eda9596669099bf84a1506a7656877f1d1d7069b,2025-01-08T16:41:13.190000 -CVE-2024-2069,0,0,9436a6f870785051c85de178936b151e115fec61706bf25c68450bcd758d8c1c,2024-12-17T21:47:11.063000 -CVE-2024-20690,0,0,71f3dc7f067d2d072f88aed564765399e0a2561c6d51eebbc9fbd5fe33f5ed8a,2024-11-21T08:52:55.923000 -CVE-2024-20691,0,0,99137b3a21a4550a10fd5f2752d2158fbcd6b23847f68512359e6832002d2f94,2024-11-21T08:52:56.063000 +CVE-2024-2069,0,1,129ecb13724cc9f0e3117749c8a44d50627c990f4439ac0a0c59574eb53afa62,2024-12-17T21:47:11.063000 +CVE-2024-20690,0,1,e9f93cbaca76b066edd6671dd0e09cc82fbef54adfa1efd56d72706fad3414b3,2024-11-21T08:52:55.923000 +CVE-2024-20691,0,1,e377a682a3ac71b153020fd638943ec15c328ad271f8603aa9a4403f8cc5e9c5,2024-11-21T08:52:56.063000 CVE-2024-20692,0,0,074cb7d14c5010da3a5afcd2d6b9d56d25ab7168d6be9932d226f2a7af7dbd43,2024-11-21T08:52:56.220000 CVE-2024-20693,0,0,2c5f6d952db6c0fa836b5956074a04971ad1d54da53cd13c15bc16aceeb429a2,2025-01-08T16:41:23.463000 -CVE-2024-20694,0,0,87eab08d83193f70b50b2a89923c7eb7a80a75e57c93609bdc5366778e87999c,2024-11-21T08:52:56.557000 -CVE-2024-20695,0,0,42cbea82efdf000be2a7e7ccfffa7d38cf01ecbf84eb55789967a343b2341fb0,2024-11-21T08:52:56.703000 -CVE-2024-20696,0,0,7538e8e62f6755e4d1197f10d140eb08d68fb12ba8bf321e3b3e60536c7567a3,2024-11-21T08:52:56.870000 -CVE-2024-20697,0,0,c75476c1f01980c179d3ca4ae4d8e48b3fd7751f950c18468edb149ae491e9cd,2024-11-21T08:52:57.043000 -CVE-2024-20698,0,0,e1cc920c220de9a3e5f82dcd6b1c1839e265d86a697cb701d365e0b0640f9574,2024-11-21T08:52:57.190000 -CVE-2024-20699,0,0,9689b6d65d60a3607ff8b5a5b711c7dc234d9e2ca882657eab048dd8f9bfb06c,2024-11-21T08:52:57.720000 -CVE-2024-2070,0,0,973bab77934f89fe09d0fbc0680908961bf9367c926895b64fd662be409dd8a4,2024-12-17T21:28:59.773000 -CVE-2024-20700,0,0,2cd064de2668cb0c508476765da90154801f8c4c5e9d9b7b3f2f6b3c2b1783d0,2024-11-21T08:52:57.907000 +CVE-2024-20694,0,1,4f3982c53c579ab23799008de0a95eb3f73025e38bc0f5828e2514adce7ff8ff,2024-11-21T08:52:56.557000 +CVE-2024-20695,0,1,c0dc9f3e9ecc328c5db42ffd2f9c202d92de15df78b9f3915002f3065461c460,2024-11-21T08:52:56.703000 +CVE-2024-20696,0,1,ae1a33b01f6a331ac349bcaeebfaa2e61124cf65e29c2ac5c9568073c1bd6d0b,2024-11-21T08:52:56.870000 +CVE-2024-20697,0,1,69cf01dcea7c36cbe15e9dec2d014b551d36a6bb55410ed83d3c0183a21c7103,2024-11-21T08:52:57.043000 +CVE-2024-20698,0,1,45caf80f0e7a5ae337e0ffab2416b5b7142a263bfa60c24452a5f4f83ee90d11,2024-11-21T08:52:57.190000 +CVE-2024-20699,0,1,bbbbc352bbd6f812bf08c3004655c683f4d1d63b8a150202d90e29601422ea2a,2024-11-21T08:52:57.720000 +CVE-2024-2070,0,1,ae7943e4627d51d900c71c1db956adbf114b316b988c9332a12340049ec1b0a4,2024-12-17T21:28:59.773000 +CVE-2024-20700,0,1,43924b390aac81a50c420ce1bbf6e9926186569cffcc76ed3751aa0e65d2eca0,2024-11-21T08:52:57.907000 CVE-2024-20701,0,0,fbf09da53863d41a1163f0b2f772b0407deff04eb3cd49483e137989ab71886d,2024-11-21T08:52:58.047000 CVE-2024-20709,0,0,8003d6923eeadabf8d154ec6bc60d083be31a81796cf119f5e298e094f31a556,2024-11-21T08:52:58.200000 -CVE-2024-2071,0,0,d2e81b6daa072281f02d71a1f4e91f1d783d897884617c065d19f0e2785413e1,2024-12-31T17:42:36.123000 +CVE-2024-2071,0,1,5bbbfcc9c595ac50cedc880f5a9f4a78e61fd9434b69c0bf22b154f53b3946df,2024-12-31T17:42:36.123000 CVE-2024-20710,0,0,630125cac97e21a974b58660b2efbd06c7fba308901057847968ac6dffc093b8,2024-11-21T08:52:58.347000 CVE-2024-20711,0,0,02bf0467c5cc4a5a559a1c296691813669992f69d4a7d69bbcdf0e99cc19ba3f,2024-11-21T08:52:58.473000 CVE-2024-20712,0,0,67acf508f9a49575031f0ba2a5b562a6cc4bcf63b0932008151cc4bc441c23f1,2024-11-21T08:52:58.597000 @@ -247006,7 +247007,7 @@ CVE-2024-20716,0,0,6726bdf454e1e4d180b6979a42b77b5ba45ea9b500e3773b075e6a2b1c087 CVE-2024-20717,0,0,e56cb45a33894c72dc5a203c8f0581f8e587bb3283d10ba1c33a69c8e9312e38,2024-11-21T08:52:59.233000 CVE-2024-20718,0,0,7eaabb11910435b32dcc3bc9462b5c72e64144a3902b651ae425d2bba4e8eb45,2024-11-21T08:53:00.647000 CVE-2024-20719,0,0,33639d48c3cf1584152568e09ec9ed9ddc3c229c5d088a7777726028f3d6b97f,2024-11-21T08:53:00.843000 -CVE-2024-2072,0,0,b13d35842c8f061f81e4e4ccb544ccde6b26d41f051adb312bd6d9c05dabcc34,2025-01-02T20:21:25.530000 +CVE-2024-2072,0,1,aa3d6fdf5f5175da7bd67fb18004f5dde832006efb4875a33e27831c40812456,2025-01-02T20:21:25.530000 CVE-2024-20720,0,0,c4e9a89d8460af13148244d9954e48b710a3e501d58cc00f93dedb7df3a0acb8,2024-11-21T08:53:01 CVE-2024-20721,0,0,0f31c36c71ba89fd57bd54eb97929bd4f850425e6d4b965c4cf751e7fa42e0a6,2024-11-21T08:53:01.130000 CVE-2024-20722,0,0,deefd55ced083836ffc59eb6cf8683d8000e9faa86307cdd5eded987b7df806c,2024-11-21T08:53:01.267000 @@ -247017,7 +247018,7 @@ CVE-2024-20726,0,0,c4a047acfc7d3ce5ced1b9cfe9f700e7508da7f6564366ad39bddfaaa12e2 CVE-2024-20727,0,0,2a0b4117fa3d1b3a7151c7e4d72f3ccd5b5b8c98420f7c4e2d6c06b4d2e9c132,2024-11-21T08:53:02.007000 CVE-2024-20728,0,0,62d338a5a60a6babd7654f76f4b058dd92d3739bfc4ff88d0ceb9721256cef1f,2024-11-21T08:53:02.143000 CVE-2024-20729,0,0,50764511588ee93a6328cec92b42905c05d2d0458306c46595d929d36f86e8a0,2024-11-21T08:53:02.290000 -CVE-2024-2073,0,0,12c1150ef6af8be5265fc46c368d31d4e23e69a2d638b6b33edd1de36b8a1759,2025-01-02T20:16:45.603000 +CVE-2024-2073,0,1,1aac33112421ea503c8b6815a845b7cb9bdd0469e9e7fb05f5ddef144265c30a,2025-01-02T20:16:45.603000 CVE-2024-20730,0,0,32e25018376718c490b7f124c95aee38f32b578bef41c0b58378dfcecd44be8a,2024-11-21T08:53:02.427000 CVE-2024-20731,0,0,5b3be0063bac45b08c6832139ad4fc3f7550e683b416b99aa7bbdc7b329594d5,2024-11-21T08:53:02.570000 CVE-2024-20733,0,0,db26768c91b6974e0795b3d5809327cf4469a10e665d1530d12d368769dc18fb,2024-11-21T08:53:02.730000 @@ -247042,19 +247043,19 @@ CVE-2024-2075,0,0,084cbb927584a2c79b7ad1b2bf6fb8ec565bb152daad2ab276238586beb5b9 CVE-2024-20750,0,0,3313e0a01bd48c6ebf41345d579945502b95260a49b033a4e1473b2ca078771f,2024-12-06T14:51:42.167000 CVE-2024-20752,0,0,81cca113a5b8ecc5e1f74945d436ce2b35327753e3347c1af9edf24696f5c4a7,2024-12-04T22:05:25.983000 CVE-2024-20753,0,0,a767e66c288c97aa6908199e8febf4cca8728b5e227e62ee67778330d1c57c90,2024-11-21T08:53:05.230000 -CVE-2024-20754,0,0,1aca02d82a36780e5caf7369e7c591061282d4d4aedcd3ee48c14f216cafeb89,2024-12-12T21:14:48.620000 +CVE-2024-20754,0,1,18a40b97a52d735b5da032eab724115a4840d0e03865c929461230cada638f1a,2024-12-12T21:14:48.620000 CVE-2024-20755,0,0,920a6b3f37d4759f6db46481065ba65287689237043749cc0750e377e9694f38,2024-12-04T22:04:31.123000 CVE-2024-20756,0,0,6efbeea44b8e72ff9551faa96056df66f22cf7201afdfa98aa799fe2fc5adbc0,2024-12-04T22:03:16.873000 CVE-2024-20757,0,0,31499a0cefe4d683f975a8e85d63bba7fdf7b13121463a7a9519d654a7445df9,2024-12-04T21:56:40.727000 -CVE-2024-20758,0,0,321f7baf54755668c93e70f069330a3f7a4ab8c5eecf1dad123634c8736d6570,2024-11-21T08:53:05.827000 -CVE-2024-20759,0,0,118981f65f825c3f168b3e3c7a1b877d171400f8ed13478c7f661887359da7b1,2024-11-21T08:53:05.953000 +CVE-2024-20758,0,1,9c952c8da28fcb7a163baf9dc1ffe211412dece08fc2532b3cf9ef36839ec721,2024-11-21T08:53:05.827000 +CVE-2024-20759,0,1,e5bd80813d82fa9edde29bc9a169f2293ba0dde22eaed8a4a6d1bc61a349ddae,2024-11-21T08:53:05.953000 CVE-2024-2076,0,0,27bbba2fd6f8339cd6b249ab6b8527cd40d934cd6a8900bdee937f9d1803adf9,2024-11-21T09:08:59.600000 CVE-2024-20760,0,0,ebfb538cacd80dacbec778521dfe778af7968b1b2639082991c371b9536e53e0,2024-12-03T16:24:49.360000 CVE-2024-20761,0,0,0968b5cde6c7df12492afc4d370440f3ace95ba9a6b515cc51adcb28c4e294b8,2024-12-04T15:16:10.297000 CVE-2024-20762,0,0,cfa3ed8678ff1af2b13e93516da0c84241143e158bfa410eb5db63c7d0e3b6fb,2024-12-04T15:15:52.700000 CVE-2024-20763,0,0,85e3d365bd8f70bb83e697510efbc0c1af98cc029e70ebe9045e9cb8471b8ce1,2024-12-04T15:15:36.200000 CVE-2024-20764,0,0,a080d634ce17b8cdbb85357fca6cda5d794fe7d9539aa4c5f46ce35e5c1cac27,2024-12-04T15:15:25.463000 -CVE-2024-20765,0,0,40964bb8beca999330ba180c774b93466f325f8731cc914b7b9cd58d9c2d050c,2024-11-21T08:53:06.653000 +CVE-2024-20765,0,1,e99d70ba618ed0f64f2db1f0346e3fbb69c8a7e30e1bdd48d6662cd940f297ea,2024-11-21T08:53:06.653000 CVE-2024-20766,0,0,95ac04a20504881d574a50944d27c002096349013c0a37ca7842a8653794b342,2024-12-05T15:18:04.873000 CVE-2024-20767,0,0,ae66121e62e6acd691604b5a21c1e50b45baacd384bdb97fe32d5d6340bf6c84,2024-12-17T02:00:02.077000 CVE-2024-20768,0,0,5cfbec6f58ac0ddaff40efa6f7a3cd9811b930452273e0862a7b84351ebbd04e,2024-12-03T21:46:08.623000 @@ -247595,201 +247596,201 @@ CVE-2024-21286,0,0,23f960553de8d34e69d2eac1c509849233da3d5190d5796e4c6dbf827df8e CVE-2024-21287,0,0,3fa403c22f24e1ef1d9572ad7971727eefad394ffd6de14f7fc63427216eda73,2024-11-29T15:26:04.440000 CVE-2024-2129,0,0,a509909e962b0a004c57f16a80a0e5a663b6e3e1d05a0b8f67f5ebb215b9d700,2024-11-21T09:09:05.487000 CVE-2024-2130,0,0,a40e32341ff9d744560f317f62f7484171db3446e7c2005613d3799a1189f89a,2024-11-21T09:09:05.613000 -CVE-2024-21302,0,0,6d64f4a98d100f2cfe15974000095b07e1f75e96088238f4fd9e76d66f823ace,2024-09-18T00:15:03.243000 +CVE-2024-21302,0,1,99170d4461509b4476f68009296eec1eecf35f205102a78f57ed67fe24f3518b,2024-09-18T00:15:03.243000 CVE-2024-21303,0,0,c2b97f22277fd7f2adc61a9f320c0092bc77d5664c2c382fa7ef4bfdcac581c9,2024-11-21T08:54:03.757000 -CVE-2024-21304,0,0,2124a921fa3eb4b0003e2d3ac045e10ee74d860ed683562fc46264d367381eb4,2024-11-21T08:54:03.903000 -CVE-2024-21305,0,0,a3be748c3751689928a0721aadfd5cb6fa976471fd801b1d7888ba90940c292d,2024-11-21T08:54:04.037000 -CVE-2024-21306,0,0,8913e3544643eebd5804fdfb5cb00013e271b627e99ee7323559985be3ad795c,2024-11-21T08:54:04.170000 -CVE-2024-21307,0,0,a9cb1a2845547787ac8f38411c421fe528a79d7ed9dbd862ca14e71de14e7b19,2024-11-21T08:54:04.307000 +CVE-2024-21304,0,1,607ca2506e8d6e07e5506f7ccdc160849bc37d9535ae11f25cc67878336998fa,2024-11-21T08:54:03.903000 +CVE-2024-21305,0,1,1c0a22df63f7a023df3dd8e98c5b53578ded66a13c05227ab9bc9ac270ddff1e,2024-11-21T08:54:04.037000 +CVE-2024-21306,0,1,2a370a0aee5d92bbbe454d1fdf5ed058cd5c6c363a0e02cdc4a816823a09f0ea,2024-11-21T08:54:04.170000 +CVE-2024-21307,0,1,6dc2710569e776546cc4f624cada8ba22376217566b47669f18adc9d69851b4e,2024-11-21T08:54:04.307000 CVE-2024-21308,0,0,417c54a6e17303716bc218d15e4b4276cac26a79cd55a736b1828faf5e1da01c,2024-11-21T08:54:04.457000 -CVE-2024-21309,0,0,3bc49ba48fd2a13ffc4e257de1fa3b8775a7c6fafa54c69b7fbe1e07fc7d781c,2024-11-21T08:54:04.583000 +CVE-2024-21309,0,1,b3bb2afb81b8de5377de8c6125fbd52c99c699ccbea021f8b9db6bc7ca4cde8c,2024-11-21T08:54:04.583000 CVE-2024-2131,0,0,a5c199c67a29a51a3f196eff09fe5f3259839ee406319c0cd2f55c4089afd920,2024-11-21T09:09:05.730000 -CVE-2024-21310,0,0,f0b2771f07810898eb37f6b791cc0538544cfaa7bbe406235d9def3b5cd0edd5,2024-11-21T08:54:04.720000 -CVE-2024-21311,0,0,c1bc93288482a76a1601b2c4f22736b42f898d5e65b7a11b7e1103c87528bf4b,2024-11-21T08:54:04.860000 -CVE-2024-21312,0,0,894f5527d4a9dd009740f0783df6b845ac3087cc5bd321f854916aa5ffb9a145,2024-11-21T08:54:05.020000 -CVE-2024-21313,0,0,f994a33fb6b1a43ccf08c28d2c30526aa8697d3e69652aa6595c742e3facbe9f,2024-11-21T08:54:05.190000 -CVE-2024-21314,0,0,a93bd7eca97239632fd37936fff7791c94b46d077d2f11b051ceaed6400a5c70,2024-11-21T08:54:05.350000 +CVE-2024-21310,0,1,07e8f724d65a59640e46d5cde5e1148b80be9e027bb9661a3d8d6a1b12f33d89,2024-11-21T08:54:04.720000 +CVE-2024-21311,0,1,4d6ad1816d0e66f3c61e7cdb92c11956c9e3c55be6ee8b7971fca359d0bb88cd,2024-11-21T08:54:04.860000 +CVE-2024-21312,0,1,6bf7a111a639274be7bd1d96a6200472536c850ea46f2604e81064d0b20c2d44,2024-11-21T08:54:05.020000 +CVE-2024-21313,0,1,d011ae4aff53b99394f69ff7eaf39d367af31ed6865af317ed53aef480fa051c,2024-11-21T08:54:05.190000 +CVE-2024-21314,0,1,c01ca57498aed35c9dc331d5de44c2c31169d2f22151eab27756fa28d4cbf1d9,2024-11-21T08:54:05.350000 CVE-2024-21315,0,0,632e226320c765b22c96ee6da18e0c5749242f81146a597cb246634d685ed66b,2024-11-21T08:54:05.510000 -CVE-2024-21316,0,0,7d0aecf1c292bbc1347e5d2548e0c0af3957503268497cdab9dc2311f26e3478,2024-11-21T08:54:05.693000 +CVE-2024-21316,0,1,3a0b2cd4117e2701a72794c6fe2d8fc78eb5d6a6aee47085737c4cfbf8338497,2024-11-21T08:54:05.693000 CVE-2024-21317,0,0,697a3422f6ebf1396b16e274c988c155440041cd5e1553f2d5cbdf11f7e166c8,2024-11-21T08:54:05.833000 -CVE-2024-21318,0,0,5efe00360e8626d0bc61ad004c29796727202ca8055cac65723e122099c0e26b,2024-11-21T08:54:05.963000 -CVE-2024-21319,0,0,4d35417be91dbf2142f68055c1186adda586f5a66a639550d539d603c50b9369,2024-11-21T08:54:06.097000 -CVE-2024-2132,0,0,33ddfe53ad8c5120059c6aba0dcf646b8e216db0fa282899110dbf5fb8abfe99,2024-11-21T09:09:05.843000 +CVE-2024-21318,0,1,ca767d7aa803d3841f62c6c1923d52a1ac5a9730e72db4cb3f0afba14c47ccc2,2024-11-21T08:54:05.963000 +CVE-2024-21319,0,1,0594fdd8042dc2dc4f649e60a59dfcff74723526db3edc0bd3e2c82ca19c9334,2024-11-21T08:54:06.097000 +CVE-2024-2132,0,1,03ae46eec006a567dffcb6ac3958cefa1fb4fef628735e8dff8ed6ca1e733bd3,2024-11-21T09:09:05.843000 CVE-2024-21320,0,0,5029772b66e19b583d9275cd6dae44a817b417c1aff438f7be50ffc655493024,2024-11-21T08:54:06.237000 -CVE-2024-21322,0,0,5254384463ea6d7e4749402c9f42ec0fd459cafdffcc14849d240d03b7b3dda4,2024-12-05T19:48:40.407000 -CVE-2024-21323,0,0,cd1610bfd15abe5aa854eb73e7a271fb8e4d96650c20f96afa4706af3e7ed1f1,2024-12-05T19:46:34.170000 -CVE-2024-21324,0,0,616e9b3113e7731624a941bbb7b546ee644a41f570a842c5b2c06ef6ac54179b,2024-12-05T19:40:30.007000 -CVE-2024-21325,0,0,aa2aa51a53b2df35bd002cc68b37a33be32f50ffd0dc3479c73c24acc2e1881c,2024-11-21T08:54:06.743000 -CVE-2024-21326,0,0,51bc5311c072eb80a7778b4c67c9cd346ced352e0bac60d49fcd1b74466ba2cd,2024-11-21T08:54:06.863000 -CVE-2024-21327,0,0,14b2b0d5d1e3319aaf7c726d726df15439a85eb231713e733db08d3484669fb5,2024-11-21T08:54:06.980000 -CVE-2024-21328,0,0,a4a1e969150b998e1e8ce07ed0e3391e7c5facff38d33877d784ab468f7a7c4f,2024-11-21T08:54:07.103000 -CVE-2024-21329,0,0,cabd43b5baf10ee098a52f0c52759034b9ee156ce1fb4ad13baf6e49988a8c0d,2024-11-21T08:54:07.230000 +CVE-2024-21322,0,1,588ea94ab32fb08a5e5bde0bca5522a9fdd608c3d3c7ce069bb882076ee31c76,2024-12-05T19:48:40.407000 +CVE-2024-21323,0,1,e2a4dc10a2e4f7b59b0d09c2d7a6f538c2f39a50bf358b33687d331ab1ecb73a,2024-12-05T19:46:34.170000 +CVE-2024-21324,0,1,e775a7d746085cd43d451d65c8d34ff1349bdb71c9da0d6e725eb1bf1ee3f6e6,2024-12-05T19:40:30.007000 +CVE-2024-21325,0,1,1450b6aff71e6c5e1ac55431011eae2ac07ebb66ea534b3ea5376f9886c8fcbd,2024-11-21T08:54:06.743000 +CVE-2024-21326,0,1,adaf9de849118adb64ca0e00f051212458a989f7331cc02453eb4231b0ac486f,2024-11-21T08:54:06.863000 +CVE-2024-21327,0,1,78df8f616d5a0719663acf63377b3cb2237affa1983ded7607586777d7190294,2024-11-21T08:54:06.980000 +CVE-2024-21328,0,1,4725266cf9fa4f8f933fcbe5e3762adcaf89327ba04176d8846d6f8cae95b4b4,2024-11-21T08:54:07.103000 +CVE-2024-21329,0,1,fd1b970c05b7ad7d6f140f728a636693c3e75004b6efec797ca1339929404b2a,2024-11-21T08:54:07.230000 CVE-2024-2133,0,0,deee6a988f84f078fab44ee176845a849d08bac2ca04e15a44bb3be0c740bce8,2024-11-21T09:09:05.960000 -CVE-2024-21330,0,0,42fedb55a85ba962c1e3dea36d1667357d5e639c3c2d81565f040f398fb55546,2024-12-27T17:07:41.530000 +CVE-2024-21330,0,1,ee2512964df2f427bca4cbf3a3349cb10cf202fbca176cdd5adca71c963f4e02,2024-12-27T17:07:41.530000 CVE-2024-21331,0,0,3ac6f620da8a1a55e12bbe6e32b80d5938ed90f55215d36f2497a9b2078277c7,2024-11-21T08:54:07.490000 CVE-2024-21332,0,0,3ea68a814fdc0df7f7b1e5f02a10b1f5625545cab98e7cb9e338cf1eb80f4767,2024-11-21T08:54:07.610000 CVE-2024-21333,0,0,9b20d500a57055bb25c08789a1e7346e48d36c3ccd7ac4a27e2a5d6fcd244804,2024-11-21T08:54:07.733000 -CVE-2024-21334,0,0,a2fadb28958f4c873cb0666784d6c1f11fe970b44d08bbb31b67617f0dfb3d6a,2024-11-29T20:52:35.697000 +CVE-2024-21334,0,1,ffcd2589ece44d3aa482792f3b25b435ac329b8110b846b65c2c20dd22148932,2024-11-29T20:52:35.697000 CVE-2024-21335,0,0,92d5f20fcfa20e7033524cab867905b9f07dcb5a555662e422a100dba5163a25,2024-11-21T08:54:07.997000 -CVE-2024-21336,0,0,0b98da97913ebf90bf8c5a35bc778359f9f622e5cffed46aa60c5fbbfe6acb3b,2024-11-21T08:54:08.120000 -CVE-2024-21337,0,0,38e7ad2142d17bc449d3b62267fa6fd2ee238db110dd10481786cdeb6efa13c9,2024-11-21T08:54:08.243000 -CVE-2024-21338,0,0,8655cbd90bc258de70dddac479ae65b5c4bd5b0079bd0591624f7635efe256c9,2024-11-29T15:27:05.917000 -CVE-2024-21339,0,0,590af29a9634c6b696f6c61a29f10715d67204dda40abae2ace4fa81a17f10ce,2024-11-21T08:54:08.533000 +CVE-2024-21336,0,1,f065666e443fdecdabd36ea1b143f43c28391c6a8196d5a56dfe1d5991980728,2024-11-21T08:54:08.120000 +CVE-2024-21337,0,1,52873b8661b47b4e8d8c7451fd3e1fb72e87537a402891bb2daa31f46807400c,2024-11-21T08:54:08.243000 +CVE-2024-21338,0,1,541e73946090ef29d4fa1a7bbce6dde2ac104f71ed24880c04429f64f7ee24f6,2024-11-29T15:27:05.917000 +CVE-2024-21339,0,1,4f122b922399f206ab442a08bb0524085704d6b611e156b5c7933c9cb3fc5ed6,2024-11-21T08:54:08.533000 CVE-2024-2134,0,0,0e3fec2818e716b0630a135d55ad392865bbc58682aa4c36f30003fcdc192356,2024-11-21T09:09:06.110000 -CVE-2024-21340,0,0,d8a213409cb51fd601d0129799cf1d93f7c41040d1c7a2c7e9055ed72376c294,2024-11-21T08:54:08.670000 -CVE-2024-21341,0,0,c2274a0e6e56fc8e23590fc75d797db4d97ab58e6065d869fbdb7e7b1f5e97b1,2024-11-21T08:54:08.827000 -CVE-2024-21342,0,0,88e14090c2518d7a7ac2771864b7574c991499ff26d05e32be91b6069e196b2f,2024-11-21T08:54:08.963000 +CVE-2024-21340,0,1,38cddbdf6a5ac4c04ccb6c63a065d2e54478671d2bdf13f41305b466ae3a4b07,2024-11-21T08:54:08.670000 +CVE-2024-21341,0,1,206af055531556305a3c099095b84645653ba8b4ad78eb068b16d6ed7aa6a8a0,2024-11-21T08:54:08.827000 +CVE-2024-21342,0,1,df4c96b9043813f4c77ce3bdaeb17742a2feb992c456fce6134b5f8de87534a8,2024-11-21T08:54:08.963000 CVE-2024-21343,0,0,101ffc1d6403fde8e4df6437bcdccb4dcb43c2d6330535bed1d788f3031cb823,2024-11-21T08:54:09.107000 -CVE-2024-21344,0,0,5bdc9e0d6a3aff940c26df3e91024cebe3f15a67123f783158f8cfcb28ba78b6,2024-11-21T08:54:09.257000 -CVE-2024-21345,0,0,870103055696ecfcca43f3067e205a5b9c3180549e76db4037f73c86b9b22e8d,2024-11-21T08:54:09.407000 -CVE-2024-21346,0,0,48f8d23a51af843beebd6cdb53f1ac970cfc45dc29711205e705095007ae2ec2,2024-11-21T08:54:09.523000 -CVE-2024-21347,0,0,08312d1fee607744746a236809a624dcff1b0aa6a02b3eaaca74dea5b4472bba,2024-11-21T08:54:09.647000 -CVE-2024-21348,0,0,c7fa99c987c9dff5acdd956487df65942c606cd006dc660fff1823d42cdb8d47,2024-11-21T08:54:09.810000 -CVE-2024-21349,0,0,bb3e3a292d365f8adfcce48b062d940f19249c748248a9ed7029a625a2053da9,2024-11-21T08:54:09.963000 +CVE-2024-21344,0,1,a922ccca568e4ee16c3c48cd4bd7fc42c6e5098aa9575f32804657b79f9e039f,2024-11-21T08:54:09.257000 +CVE-2024-21345,0,1,1b5fede831fcf7919ab24c266eb38cce421b5698262ffdeeec4724ab8453949b,2024-11-21T08:54:09.407000 +CVE-2024-21346,0,1,dc0e5d41aeec6f175d65c9d43faf7bf2cf58b80663b439b9424aa657c72c3c06,2024-11-21T08:54:09.523000 +CVE-2024-21347,0,1,7d8f534433353b6ddd4a887a535c81534ab84ddff4d095035a853b4c623cd980,2024-11-21T08:54:09.647000 +CVE-2024-21348,0,1,eccd5aa059f4fb84acc9bcd167fe9fd1e8264ff471576a85f8839ea044791c53,2024-11-21T08:54:09.810000 +CVE-2024-21349,0,1,71374696967d230a717132aaaf1e253167fc9fc971ef10f974ac7fe08899c262,2024-11-21T08:54:09.963000 CVE-2024-2135,0,0,339da5d503fe5b28722d84fc545c94ebd8bd6a80ad28dd4c3af72af61fc286e3,2024-11-21T09:09:06.257000 -CVE-2024-21350,0,0,7965b32ecb23ea622622ea23ffd490dc95371211de14726aa129f38e30efbc6b,2024-11-21T08:54:10.110000 -CVE-2024-21351,0,0,38ac782f46c416a945d3146062642937d409d55a678722f7e23334e451fafa52,2024-11-29T15:27:41.817000 -CVE-2024-21352,0,0,8acfe94f5b52d9fea153ed69fab7e9876b679136256cab9c3dfdc342ebd91277,2024-11-21T08:54:10.400000 -CVE-2024-21353,0,0,4e29497e567695c904da1cba00facb5c2de349bae4151da270075677dcbba10f,2024-11-21T08:54:10.560000 -CVE-2024-21354,0,0,7e8b4025a348722edafd51341ea9e07f22afe3f1a9a0c24ac1d5d2e4920baad7,2024-11-21T08:54:10.680000 -CVE-2024-21355,0,0,d91bca835d66aab0c90beb95c0292c91af4d6926c7f0d1f561072d6e669d8e71,2024-11-21T08:54:10.837000 -CVE-2024-21356,0,0,8b1aff357dce0d80885fa0f37fad4579d46a4cdf02e25cbebfd083442bebb5a9,2024-11-21T08:54:10.980000 -CVE-2024-21357,0,0,3aee6ab5da9463678f7ea997a89607f04a699b5337a367a8a1fb7647e13a7784,2024-11-21T08:54:11.150000 -CVE-2024-21358,0,0,0e0d2fba37c0fa0a0d23cbe8c916fbd40592902ecc2b8fc4b1e1887250c2ac81,2024-11-21T08:54:11.310000 -CVE-2024-21359,0,0,0b72d5355bfadb4c6de9091296b5dfcd8d70448a0c445c2491ac88c7b441bc51,2024-11-21T08:54:11.467000 +CVE-2024-21350,0,1,cfa8119d3578a7cd041fa29622909109154c52f32b1df463af18eee19d954dd5,2024-11-21T08:54:10.110000 +CVE-2024-21351,0,1,f4d3c3412a2c7b4a81fc42c7a4742b27abbbde3bbb4a5e30f0323e31338d1300,2024-11-29T15:27:41.817000 +CVE-2024-21352,0,1,a111f409289152638861df8934828a8d2f3887407503c4caa16847a28fc7c977,2024-11-21T08:54:10.400000 +CVE-2024-21353,0,1,bafe48a77187f5e41ee7638d8dabb13c754f178bdfbb9a00f927ace1de5f6918,2024-11-21T08:54:10.560000 +CVE-2024-21354,0,1,2e166373ca21df56c303852547abae2b30f85ca0839b553670c9326ea248b198,2024-11-21T08:54:10.680000 +CVE-2024-21355,0,1,29c3829a083d97499e3260177aca9cbf9669ffef86802b0db5a681ddfd33cbcc,2024-11-21T08:54:10.837000 +CVE-2024-21356,0,1,5b48982114a60da4f75f6bd1f75f7770814e8aac6326653cf23d5fa99993a8d8,2024-11-21T08:54:10.980000 +CVE-2024-21357,0,1,f6bc63ebe6d01af69735ab9f58ef6808c268f130bcf00bafa37cfc4362402c88,2024-11-21T08:54:11.150000 +CVE-2024-21358,0,1,f4f46a6963c93708340d341dbfe178245cceb1490892e5e827fa2701c633c994,2024-11-21T08:54:11.310000 +CVE-2024-21359,0,1,5f3a764f74fbe421a6085582e61e1fb1d7aa71674c2de2ea06a2df45081d2608,2024-11-21T08:54:11.467000 CVE-2024-2136,0,0,1771dc5553937203611e165ff1b5be1056adc7e4595813b1c67495188a24ee75,2024-11-21T09:09:06.403000 -CVE-2024-21360,0,0,828064d9f510ec59ffab6ef5f50e13a833ee61d1cce5bbff0939fab94c282bc2,2024-11-21T08:54:11.620000 -CVE-2024-21361,0,0,06d08a79812fba9f2a47e046f51623effa8945a782c12a7ec5b6717c1a6cf0ea,2024-11-21T08:54:11.773000 -CVE-2024-21362,0,0,4240ea43538c35afdc289f39f42a65055508939b458974f806ed607be71e29de,2024-11-21T08:54:11.920000 +CVE-2024-21360,0,1,9e56be8f50ddda836b4607151c85ff73cd3ee51c31e2b5f16e9651d5ab99f385,2024-11-21T08:54:11.620000 +CVE-2024-21361,0,1,b7ec2e0cd243ba7f60a8d2877bad443baeb7f8c0f11dbb59ab73ebf007e531b5,2024-11-21T08:54:11.773000 +CVE-2024-21362,0,1,3e9c9c5ab0de90e700165e1c41847866222be11ce6ef11f0fd3c2853cb3dc3e8,2024-11-21T08:54:11.920000 CVE-2024-21363,0,0,d03bc53e03fb025c05fbccc6df215acaaa016a9392442642f14223488965456c,2024-11-21T08:54:12.067000 -CVE-2024-21364,0,0,30dfe96ea976213f8037ad54cd2dc3a5e60e3fc586ab23665ed12bc98c7607c2,2024-11-21T08:54:12.223000 -CVE-2024-21365,0,0,bc9a96916746f4ac682ebc53de2193f253ef887cb6f4eff3b12ba747c5549ab4,2024-11-21T08:54:12.357000 -CVE-2024-21366,0,0,243a2b84fce857daf06d9fc783b68512eda6e5fb456d44cb94bba46d943dc64e,2024-11-21T08:54:12.507000 -CVE-2024-21367,0,0,b8d2dd3845f65ccedcfb9951fb2b886fea491f575287d1ec78a2f6dd610561c6,2024-11-21T08:54:12.693000 -CVE-2024-21368,0,0,b2ed582bbcbe1d6a7dd2f8df3da1dfbf41871bb607f848f88a4a2b7ae2de984b,2024-11-21T08:54:12.843000 -CVE-2024-21369,0,0,32b3a24ac223480c218d06519cfb79a407bb9b4a758ed97872eb89668a430273,2024-11-21T08:54:13.023000 +CVE-2024-21364,0,1,9b7660a6657ecb5045c7ab37b8299de7826987005a5312f79ebb11cf80bc53e0,2024-11-21T08:54:12.223000 +CVE-2024-21365,0,1,95984aee275b3ce6616ca00c83b6e386bee5ae50f92ef519e049e8cf04d65208,2024-11-21T08:54:12.357000 +CVE-2024-21366,0,1,ccac692c534c7a2c2adee37976d8ff4017b5d6f29ed30ff31277024073e29735,2024-11-21T08:54:12.507000 +CVE-2024-21367,0,1,f35c4e5401e1af949b9a15ddd27fadffbb28ec2b7a59c8588a81549a5392170e,2024-11-21T08:54:12.693000 +CVE-2024-21368,0,1,272dcc70745e37e59c98f1aecc36e24c304ab1950f01e5aa276df3009456b628,2024-11-21T08:54:12.843000 +CVE-2024-21369,0,1,4e41e3b9c0b8af32a496db7bd8f73dfd60fffdeea20a0932ec94dfe1a80c374c,2024-11-21T08:54:13.023000 CVE-2024-2137,0,0,251fb0612b25441e52eb38eaefb727bbfd8da974406ed133e727cdc915150ced,2024-11-21T09:09:06.527000 -CVE-2024-21370,0,0,0fd885df3a4a6bf3a7fd5c6b21af9179830c65ccac71a8f27016c6a5ec92bba8,2024-11-21T08:54:13.170000 -CVE-2024-21371,0,0,b2ea6a9a022b5c82a9a936622eaa54ec1a2edda30c17f4e7e206363650448cb5,2024-11-21T08:54:13.323000 -CVE-2024-21372,0,0,36f7864e5bbb7be298d9d04a87e7af1d7b967f329b0bb2716f98c4004c79f893,2024-11-21T08:54:13.470000 +CVE-2024-21370,0,1,3d7c4dd05a16bd938e38514b5badbaf55dc1b0c4db7f452b9e33bfdf0c6d09e6,2024-11-21T08:54:13.170000 +CVE-2024-21371,0,1,5b15c89f5820daa171eade2e3f31abdccd363068fac83c9a46a8941f67ae2b99,2024-11-21T08:54:13.323000 +CVE-2024-21372,0,1,ba4d9bf85cfc38863e13b8c3371551762e5f9cead88275b92a0db40eb1a28212,2024-11-21T08:54:13.470000 CVE-2024-21373,0,0,0aa8881b74dbf983cf1981c6597d3de4dc8f39e38553f6ca68598c19fd4baba6,2024-11-21T08:54:13.623000 -CVE-2024-21374,0,0,a784e46be34815c00a73ec9bf211e09d96e48dea06e88c168a1d9987a9f65f81,2024-11-21T08:54:13.743000 -CVE-2024-21375,0,0,2a8a6f61e1bb50044141dccc521c6dd7f9502b5711e29e08542332ae897eaa2c,2024-11-21T08:54:13.873000 -CVE-2024-21376,0,0,b20575e320684cef059aac5957fa62aa5cdcb0459ac50edf91cae8f5d35317d4,2024-11-21T08:54:14.027000 -CVE-2024-21377,0,0,6acb4796f65bec948126f882666d223e698f1946c859992f388074f7b49eacc0,2024-11-21T08:54:14.150000 -CVE-2024-21378,0,0,f27c16596f44281e40bded3ded450468d4c308a2932b0d2dbb7b337f5785678f,2024-11-21T08:54:14.297000 -CVE-2024-21379,0,0,dec2710e21107705d6ac5d6d9ef0ad9c0ddb8cea446bc9484be128f23dc1ce6c,2024-11-21T08:54:14.427000 +CVE-2024-21374,0,1,37e5f3cbf075003dde5710e9de8f5859549e2bbf8ee981c9d4e1fa89f225577e,2024-11-21T08:54:13.743000 +CVE-2024-21375,0,1,ac00767c4731bb688325743be07caa10ebbc952d5911816645a8b7e28c495412,2024-11-21T08:54:13.873000 +CVE-2024-21376,0,1,74365a6fe1ea03cb8bcca4b647804df584cc285554299561038c8bdb0cda11e1,2024-11-21T08:54:14.027000 +CVE-2024-21377,0,1,d777e0faea661bcf5ad05a74be4dac22794aecdf9241895dff2da6d2b6b8afbc,2024-11-21T08:54:14.150000 +CVE-2024-21378,0,1,08b6806b1a75a618830a2c8c05eb7191537ab5daf1f38ff5164da8dafcfd538f,2024-11-21T08:54:14.297000 +CVE-2024-21379,0,1,4c561e0350e5a6bbd259a4e8babfa51198fef4e207ca5d304ab64c1cd9a5b834,2024-11-21T08:54:14.427000 CVE-2024-2138,0,0,52a89346692b6636cd1668ae09391cf23923b189594fe541767af029c016c566,2024-11-21T09:09:06.643000 -CVE-2024-21380,0,0,3589be0a8cd6b0011781ea5d4366cdc8933f22e1d0568b3e3d494261e982ed38,2024-11-21T08:54:14.550000 -CVE-2024-21381,0,0,f245b7c33c361c043a86f94c48350b9cfcd2e59edbfd00533ad570988010ea57,2024-11-21T08:54:14.680000 -CVE-2024-21382,0,0,b2e4015f379921ee20757771c28af1b1f94ab2d9f836a94ea35914201baad9e8,2024-11-21T08:54:14.803000 -CVE-2024-21383,0,0,e7dec72d8d70e4ee970afca20674c152f032e9d48f74d42bde415d85ea54256b,2024-11-21T08:54:14.923000 -CVE-2024-21384,0,0,a40a7d8824694645acf7079e950b7d82bd73e7b9ad4b792be0402329eda1324b,2024-11-21T08:54:15.043000 -CVE-2024-21385,0,0,c17c5e8860b3604964db9876d8955e4bad7bf81685c076ef9b580f8fdbcf0846,2024-11-21T08:54:15.150000 -CVE-2024-21386,0,0,d3bbdc5201abe735515b6005948a5118b79a0d8520792efc8b806ee70fa21a8f,2024-11-21T08:54:15.270000 -CVE-2024-21387,0,0,76778d2b0ffae99b6fcec862b8e4bee06aa6d643150d4bcd798467c82798e042,2024-11-21T08:54:15.393000 -CVE-2024-21388,0,0,11e733fe43dbba3b9a26784f0d53bb1cd0500c05382d6073499608dfc71b14e1,2024-11-21T08:54:15.523000 -CVE-2024-21389,0,0,a687af06987c499f27e0423a0d6a217ec899587313e464eafd60b6c76ff2c60a,2024-11-21T08:54:15.643000 +CVE-2024-21380,0,1,8da7eb3474cc099e42a759c029636cf81b2ddbff1e455ba3cd9a50aa2a07a211,2024-11-21T08:54:14.550000 +CVE-2024-21381,0,1,d64ef6d978ecd563782354548f7f42add57e373ee4cd2a62663f79fa7dfca2c9,2024-11-21T08:54:14.680000 +CVE-2024-21382,0,1,11ff97c23512fc49419b724e3c797aadd6cbe0714e2907f834de69f472993c08,2024-11-21T08:54:14.803000 +CVE-2024-21383,0,1,d7b1f1d5d421534f924afa399cac97ead3745fb519c5baeae6245f6fe90d47e8,2024-11-21T08:54:14.923000 +CVE-2024-21384,0,1,38d7bea8d56408b5907ff57c93520ac42b06fe96c02baa155e8a24bc121fee06,2024-11-21T08:54:15.043000 +CVE-2024-21385,0,1,2d4e655baebf5851edbb533e6fb925e128d3c25e5e4362fe4c0b77789e506d64,2024-11-21T08:54:15.150000 +CVE-2024-21386,0,1,eee79b8341607bedacf91830f98e4d64d25fef67a94fd024489dd6b6dd762181,2024-11-21T08:54:15.270000 +CVE-2024-21387,0,1,90a38bc91324a0c4880a21b6b5b4b93910ef49cd5f95d39193e84c0c2b1973e3,2024-11-21T08:54:15.393000 +CVE-2024-21388,0,1,c067a17177c7600714a83673ef800bf5f9e218ecffe79bb5e4529d6d2f807d9f,2024-11-21T08:54:15.523000 +CVE-2024-21389,0,1,66346b5dd34932fd47b098540a659ffee9af1224ddeca02865b34d3619c10e3d,2024-11-21T08:54:15.643000 CVE-2024-2139,0,0,bb00e09e82b7eca83540db09e99978b8e124451b01e4b3b3bf83fe94e92d5867,2024-11-21T09:09:06.763000 -CVE-2024-21390,0,0,946f3aa13a7b103e116ccde0abaa9eb44f4ae0c34baeb8125a51356b1b69288b,2024-11-21T08:54:15.763000 -CVE-2024-21391,0,0,5a1fd8098a9c11bccdcadf03e83bb57bfd506895f5c4f9957fb801d45a1d63cb,2024-11-21T08:54:15.893000 -CVE-2024-21392,0,0,f456f49aab1a6749cce2eb5b590eaeaa8b7133a2c686945470441f78eb54e1bb,2024-11-29T20:52:32.870000 -CVE-2024-21393,0,0,3d59cd95f645546ea3de1f6708be9fe594f9eba3c0b97be9e63939c555a40dbe,2024-11-21T08:54:16.163000 -CVE-2024-21394,0,0,16c131ce4674c1f6be4cbe1d142dccae376245c2fbeb336bda944e0985cee70b,2024-11-21T08:54:16.287000 -CVE-2024-21395,0,0,3cc9c07838c3ad293b6aa7003b5637615ed6784c9d4c0a7779a781ba9747464e,2024-11-21T08:54:16.410000 -CVE-2024-21396,0,0,79152e77a1659d5e25f76f44389c074b73e94183a28e455d64165c371100ad1d,2024-11-21T08:54:16.527000 -CVE-2024-21397,0,0,ebfff8dcbed6e700fe527fe098316547710954cd84ea4028b8d7e826d2d73c1d,2024-11-21T08:54:16.640000 +CVE-2024-21390,0,1,a5074eedd13a3365a29cac23272e831776e56651731246287bb462c43630f117,2024-11-21T08:54:15.763000 +CVE-2024-21391,0,1,312bd39d59508ef1ca59592577f992c0665dd2a98faf802735d1d704cbd948a5,2024-11-21T08:54:15.893000 +CVE-2024-21392,0,1,598fd112e75abba3c6c252ea490de4c6a8e36349ae35cf809de012c4cd6c1364,2024-11-29T20:52:32.870000 +CVE-2024-21393,0,1,faedd2077f01bcb7b9895f5c5982011047baf2e2e22716b7a11dfc45467b6822,2024-11-21T08:54:16.163000 +CVE-2024-21394,0,1,4eb9ccb2b6c339aeaf2bf7b599d563812248c000b8bbe83c44e26075dae74faf,2024-11-21T08:54:16.287000 +CVE-2024-21395,0,1,f73ec177413ed822d3a3b95116e04de4620bb28debd03777928b9cd72a78f4f7,2024-11-21T08:54:16.410000 +CVE-2024-21396,0,1,727d9383842f94260c8a93654a0b746b928a433f4efb51060705e1103b866301,2024-11-21T08:54:16.527000 +CVE-2024-21397,0,1,40e279eaf9f3416f16ba8fc80d0f531b4bfb03d96c9778e1fa620adced6a8b53,2024-11-21T08:54:16.640000 CVE-2024-21398,0,0,0456b4fb4c2735aecca79f972eec8e7b32996f7143773af70f9fb141d58ceb44,2024-11-21T08:54:16.760000 -CVE-2024-21399,0,0,a0f5681f8196f53d3c2b402cdef1d5261451a286bd64d00d3d27007e2470f555,2024-11-21T08:54:16.870000 +CVE-2024-21399,0,1,2dffa4cd262da40a519e66ca454cd27c52f2f7a64b9e59220d76cb819a2492a3,2024-11-21T08:54:16.870000 CVE-2024-2140,0,0,e04d8580c30dec7817045bce899d8636377de80a0de3c339751faf63ec687f4f,2024-11-21T09:09:06.883000 -CVE-2024-21400,0,0,2de01f4dbeb37da40535fdb046ba8fe35fb67bd6f8108c5aa79d114487cbb998,2024-11-29T20:52:31.103000 -CVE-2024-21401,0,0,174ee3463e07e9e960eac0f1689d36cb2b42697c9801b6d97fdba36235d33390,2024-11-21T08:54:17.110000 -CVE-2024-21402,0,0,075faa52c76dba492e06eeb1a9fbb0ce88094ede8e52e5cbb280de0898cab7f1,2024-11-21T08:54:17.230000 -CVE-2024-21403,0,0,df0d08227646c621de4e5fa7ddc76e60a6353db3fa6c5cc1ad50dfab42849758,2024-11-21T08:54:17.347000 -CVE-2024-21404,0,0,a6866f3cb485edb47da7b52561141c96fd1585bfe5085421a0f9a9db6ae3fb47,2024-11-21T08:54:17.470000 -CVE-2024-21405,0,0,0fffca5c7742e4fc8e5114da2d6ac42f99491b82ac5a3bc3cf8e5c527d59c52e,2024-11-21T08:54:17.597000 -CVE-2024-21406,0,0,7d85838affa212c651678b9fb8ef594a841d8333ffff139aee401b4bbd991664,2024-11-21T08:54:17.750000 -CVE-2024-21407,0,0,55c5603d483df486768f0c569e8a21ed6755ed009c8e36e38e2da52e021ab2a1,2024-11-21T08:54:17.900000 -CVE-2024-21408,0,0,1e186c25fb155b4cac913f7f35efd6e10f70dc789ac5ec0658a18dd1cfa1fa03,2024-11-21T08:54:18.060000 +CVE-2024-21400,0,1,a872873b0bfdbefda2cec5094d48212a53bd41a16367483affa57e5731e64d1b,2024-11-29T20:52:31.103000 +CVE-2024-21401,0,1,97de1eccda66d8a475a753375f0cd8717f46b6500cfb869172b1239d32eab1ed,2024-11-21T08:54:17.110000 +CVE-2024-21402,0,1,1912d6bac77f538eeca0523ea2d091d6eff59c0ca3736c8afe1a3aa82c7d68eb,2024-11-21T08:54:17.230000 +CVE-2024-21403,0,1,75952120070bb073311167a7bc53f3007ccd5eba592e7c42b462aa88bde5cbfd,2024-11-21T08:54:17.347000 +CVE-2024-21404,0,1,f7a5807c18b61134625a99a7940c974bdcbc5014c17c7ccbb1efe4e603c37938,2024-11-21T08:54:17.470000 +CVE-2024-21405,0,1,3e6dea45078ef40ec2e5cc252eeb8e66344281f8f13d2c5561347a4506294b25,2024-11-21T08:54:17.597000 +CVE-2024-21406,0,1,c3c5e6f5abd31ba504c5e779a20922c9520fef7dad2cf137662a3736daac3074,2024-11-21T08:54:17.750000 +CVE-2024-21407,0,1,61ca144d76c93aa5467e49bd9c2efd72d906e8b334691cc56a48356a7e8e1044,2024-11-21T08:54:17.900000 +CVE-2024-21408,0,1,a6229327b01f5c72f23988c3a60a0a48d9605f36b6855597610f5db381fdcfcb,2024-11-21T08:54:18.060000 CVE-2024-21409,0,0,dc819e596a0f67d5242bf6de7a3b8f4db0925ef94638783abfb15349530108bb,2025-01-08T16:41:34.453000 CVE-2024-2141,0,0,e25edc3e366c33121ab88f864948d943b2cc55f959cde5bf1ebbabb3fc09fbe8,2024-11-21T09:09:07.003000 -CVE-2024-21410,0,0,cff9ec17f7c98dd2a10dfde7d5847d7f80f14e8f69eab3ffc175bf54ec78e14c,2024-11-29T15:28:11.497000 -CVE-2024-21411,0,0,1ae6015480b938b5cbbe1f91956803cc87debb183467930ca481b97d111ba498,2024-12-27T17:07:01.770000 -CVE-2024-21412,0,0,cd5f81d0bb26393d2beeaf99973518c2a2ed4697bcfe091a6f357d6ed694ebfb,2024-11-29T15:25:25.097000 -CVE-2024-21413,0,0,051fa5fa403ad64d765690e772850e40e4058c9b6d5ab4d4cbdd72429d6f60b3,2024-11-21T08:54:18.730000 +CVE-2024-21410,0,1,95d0b95a5f0063806998bacddd7789744542e29655fa4a9d4c4406647d1610d4,2024-11-29T15:28:11.497000 +CVE-2024-21411,0,1,014096b872a3129a023c532a8b0c270957fa0df4578b38d594339a889b601731,2024-12-27T17:07:01.770000 +CVE-2024-21412,0,1,fe6d0090a3119f8d25267196b6a07a7c56807e1de815457f2dcf42a8c64f6c87,2024-11-29T15:25:25.097000 +CVE-2024-21413,0,1,d835c10b8d96a916c89f5e3ecedc3ec638f083c020433a615e84937da0dcf125,2024-11-21T08:54:18.730000 CVE-2024-21414,0,0,047bdfa4f1706a1c49b1aa320349fb7b5e22e3901463e1a78a80234d539dfb2e,2024-11-21T08:54:18.853000 CVE-2024-21415,0,0,0dd239ce11010263b2251985737137fcdee870dd85da049b265c564484ba73de,2024-11-21T08:54:18.973000 CVE-2024-21416,0,0,93f002464d825de469964fa8d43a5472864f4628746c95028532cc0c5cfb11df,2024-09-20T18:55:14.573000 CVE-2024-21417,0,0,b241f9d83014e4a156b41d2c2f0ed30e2be20a18f3cb27885bff56d4c78a5183,2025-01-09T13:59:37.857000 -CVE-2024-21418,0,0,5064eb4aa48688e0ef159552ea9757db1acca345b54d6d378cfba7a024649f1a,2024-12-27T18:05:13.933000 +CVE-2024-21418,0,1,f32851cbbca0a03afdc0a119babc5fa51c261b1380e1a035fd467fecb985d1cb,2024-12-27T18:05:13.933000 CVE-2024-21419,0,0,3cb3fdb5be67b19326a793bdd9f0d7cc48c79a6f3fd2ccef4d9014d402593d28,2024-11-29T20:52:29.267000 CVE-2024-2142,0,0,c318dba0209d3ec013e13acbf3bb96f3ae1d78956d6f11ffc31b2eb03a294c49,2024-11-21T09:09:07.130000 -CVE-2024-21420,0,0,df46f449fc3e701aee95b1e30bd20d24c2e7d48e4a861f3e3fa692518d0c5ea1,2024-11-21T08:54:19.540000 -CVE-2024-21421,0,0,7ebaa57c4b9f49640ba80e90c6b54f95b3d9c928a138d063e19319565b4f1441,2024-12-27T18:25:29.033000 -CVE-2024-21423,0,0,f9af7e37fa4ac00db3d27c63c91f6cab8fd61fd4e0cd58b29bafe7da8fbc1bbb,2024-11-29T20:42:08.630000 +CVE-2024-21420,0,1,a004a088ff4068dab42258a5056ff38772eed2377a2d08b691f3a79d4ff39e33,2024-11-21T08:54:19.540000 +CVE-2024-21421,0,1,ed338fff59f35749ce3716067c14685623c753eb75dba216ba03a5b62655ebda,2024-12-27T18:25:29.033000 +CVE-2024-21423,0,1,bbea988a7d7bfb2f2ac99b02f22f42892d890b4d73ce38691772d73165b4186d,2024-11-29T20:42:08.630000 CVE-2024-21424,0,0,69268fa4d05c7c72753f06ddfafde0ba7d45361da9176b7add3cda4916845692,2025-01-08T16:41:51.853000 CVE-2024-21425,0,0,9b22fd2f2bbafa6b412c65d40da0f708a935ea72443779d442de89f7be54cbd3,2024-11-21T08:54:20.160000 -CVE-2024-21426,0,0,28cc51db69ba03e1e83cb7f3a9f5914be340ff48d83ec7285f47ab6e4a1893d0,2024-11-29T20:50:09.910000 -CVE-2024-21427,0,0,c8fca909f1ebd3caf8e518589319c47ad8bb6383ef7d8dedc9738dca072eb2c7,2024-11-29T20:49:42.757000 +CVE-2024-21426,0,1,50edf6306cb1ce5b303e08364d4006ec275603628e75970c0fb1acf0db53bfd5,2024-11-29T20:50:09.910000 +CVE-2024-21427,0,1,a17e3791f8438ee030d81372ddcf2e380b43f955c75cddb04d75263db9989f15,2024-11-29T20:49:42.757000 CVE-2024-21428,0,0,ca1e4865036ff57a6fdec55bc0203da5ed208936e50e4419f961369c47f6d45f,2024-11-21T08:54:20.517000 -CVE-2024-21429,0,0,79bf9da0c0c440cacc8d7c59a249e2fecfe91cb5928203b47289aa3010fba9f8,2024-11-29T20:43:50.370000 +CVE-2024-21429,0,1,6ceebfbd2f821b5be335f2f5c5cc08e1d66066dc65ad7b0f02fd03874ac1f2be,2024-11-29T20:43:50.370000 CVE-2024-2143,0,0,3f8800ab3ee439af10c3f3686e880417f53a8822e9ac1646c1e898d83a40b724,2024-11-21T09:09:07.330000 CVE-2024-21430,0,0,0c82706eb5221197af87e1f265a82dd4b412c443a76d8a68cabb9de79ab86d7a,2024-11-29T20:44:32.717000 CVE-2024-21431,0,0,adb271f7c07729890dc0e6600645b6eea17bdcd896aadfcebe92e54de18d6777,2024-11-29T20:44:56.373000 -CVE-2024-21432,0,0,b26b06b5af97e258df7fe189dd0fd737f77add3019eecc5409fe9334ce5a5d02,2024-11-29T20:47:25.987000 -CVE-2024-21433,0,0,100deeaf7e9386a87e131a946114df15ff214b00b65b78941702d176f64f5d82,2024-11-29T20:47:35.220000 -CVE-2024-21434,0,0,02c3f631f3f68f254b123b85a31471dfa3f9595f96204ecdef5f442eefba8034,2024-12-05T03:25:12.337000 -CVE-2024-21435,0,0,9b847769f608643faefb42952963eb317bb85a298f6b0a2e3188b2a392078dde,2024-12-27T18:25:39.827000 -CVE-2024-21436,0,0,f1cad3bc66542d56fee0c6a5c8d8e167fd12d03ebef4421607efcc51688f9277,2024-12-27T16:25:32.740000 -CVE-2024-21437,0,0,c206570d26c74f5181ce56fd619ca7170b513d8e0093040084ab3b9ee4f160e9,2024-12-27T18:25:57.807000 -CVE-2024-21438,0,0,8e8bc0e231eae099706565597bcad2d302b11da17a75677f8a81dec1cd59dfe8,2024-12-05T03:25:34.603000 -CVE-2024-21439,0,0,b4de77c1b44ae433db50d72eb6467ad113a52ff535c478fb00b6733aa8d8ce5f,2024-12-27T18:26:02.907000 +CVE-2024-21432,0,1,383166da4d90f1ee1cfef67e6d182aa84566741c3c0e128fe9520b1f9369cb02,2024-11-29T20:47:25.987000 +CVE-2024-21433,0,1,169ebb9226bd055e2a2df774f914a6a576daf1057c3747303761a709907325f6,2024-11-29T20:47:35.220000 +CVE-2024-21434,0,1,5a97cc40126e2511c956fde2238e338b85f5e0308bceaa3dc349de3f8e6e5909,2024-12-05T03:25:12.337000 +CVE-2024-21435,0,1,e4a7c1a2cb014638e154cf8ab3b0afc1e353be00b071c9bcece6a0abb2adfc16,2024-12-27T18:25:39.827000 +CVE-2024-21436,0,1,5eed3e6af9847f92e1b36108240fcc8a30d91a03697ae2b0fdc413088ef0b593,2024-12-27T16:25:32.740000 +CVE-2024-21437,0,1,622e7d75d7c7f7a80a23c7264df5282bdd22befa79257665765ec77214ad0cde,2024-12-27T18:25:57.807000 +CVE-2024-21438,0,1,a304c7403d7aa6a0a77fd43806349c8dea20cced63446529948d3e95a30dc3db,2024-12-05T03:25:34.603000 +CVE-2024-21439,0,1,9320239109a42b88071c25ce9913b2b37fbc0d8847236f5446fd193b2f3753ea,2024-12-27T18:26:02.907000 CVE-2024-2144,0,0,bd55c3e242215167621c383bf5dd406306578bd4f4401f4b644791f5fe39f163,2024-11-21T09:09:07.537000 -CVE-2024-21440,0,0,1259e2b506f536c13fe55e40d7ba60f51486a69462fae5526e6743dbca1db03d,2024-12-05T03:25:52.233000 -CVE-2024-21441,0,0,0a4dc823b20e791363ed6237d2233d35d039061038cc40d1dd049cedef8731f8,2024-12-05T03:15:20.800000 +CVE-2024-21440,0,1,b962607bd47829e7db36fec7ce783c1b45bc4d93670f7045bf73725a43f545b1,2024-12-05T03:25:52.233000 +CVE-2024-21441,0,1,49a659cad7252864e7256a5aa7d62f80cd4df957e3e9d7a812d4a8e134a3be0e,2024-12-05T03:15:20.800000 CVE-2024-21442,0,0,e33f04825343ab789d0034882ebb9e4ece99f0ebb7e7b69c95eec54b9d9a6ddb,2025-01-07T21:18:53.787000 -CVE-2024-21443,0,0,c2e6ed54d01619298231829fdf2a396f626a40f55cf63ef5452fea36519eb2dd,2024-12-27T17:51:02.103000 -CVE-2024-21444,0,0,a8c6c6274226dbd29fa0d9ac33fdf9a2b6daef7a6f57066d1b02a7561d909a58,2024-12-05T03:18:50.527000 -CVE-2024-21445,0,0,82395e1bf965267a108ae6c83941355d531d61dc0cf2e64a73b3ce95db8a8b88,2024-12-27T17:51:59.413000 -CVE-2024-21446,0,0,d59dcd1f78e2a4b4fd1b2405e3dab411029f5d5d412cc3be05b96a52f38dae26,2024-12-27T17:52:12.337000 +CVE-2024-21443,0,1,950d3fd6f599d22f0c3844a70d58d3bb54478601ebf5ba7fb93aa39c20eb0f5f,2024-12-27T17:51:02.103000 +CVE-2024-21444,0,1,ecbca5d38f7a2a4e90f591207735140302d117940036ac0bc0038f621a280246,2024-12-05T03:18:50.527000 +CVE-2024-21445,0,1,105460f48ffa4e9f76e7b406eff77aa1c76c9608a3ca7f0f0dc02cf1445c5ad0,2024-12-27T17:51:59.413000 +CVE-2024-21446,0,1,1d25b1a54af05f55312301bd56b496026ee3090541c3b748cb8719e5486424c1,2024-12-27T17:52:12.337000 CVE-2024-21447,0,0,03878755a7137e57d44381458ba7463ba89a936c41440b1f79aa6976691dc2d4,2025-01-08T16:43:32.287000 -CVE-2024-21448,0,0,c996f0b534b3ac1fa41f31656478310b178c17dadb7c6ed03fa7e6cc9f999d5d,2024-12-05T03:19:21.767000 +CVE-2024-21448,0,1,662a8d78dc95444dfa75b79f55ad6daf690c1b6637524a2d1f68b4c8d4242c98,2024-12-05T03:19:21.767000 CVE-2024-21449,0,0,7896fc6d2aa5851cb5662df05cdedd5d1007bba8cae9edda90e1131ebd165eec,2024-11-21T08:54:23.507000 CVE-2024-2145,0,0,cd8a4d5dbfc9265ce43625b1c7d94fa09f2df8f9d2bedbc3c7c2e4a17f147f9d,2024-11-21T09:09:07.667000 -CVE-2024-21450,0,0,f0a59d43934884427929c09c7f63e0e4c95c6897cf36f4d7453ea519900780ea,2024-12-05T03:19:41.673000 -CVE-2024-21451,0,0,c20f96721db68a100bffd827cf1d9357aa52b67030e54c756043a7a911552d0b,2024-12-05T03:19:51.647000 -CVE-2024-21452,0,0,f107dbc97ccb56836cfcce0ba2613a366eda9e8a715169fa981f9045474eb324,2024-11-21T08:54:23.940000 -CVE-2024-21453,0,0,025050403eb8ca883e120f4b6ec1181135c335786890adeacd762d5f4751d4f6,2024-11-21T08:54:24.077000 -CVE-2024-21454,0,0,65852227d174590f37c811ea0eab310089f62ee9d6bb658c37a296aaac7d6c0e,2024-11-21T08:54:24.210000 +CVE-2024-21450,0,1,1e33831596949857b3614d5486ea0f7c5609506ceba2cf233faabaeab7a8e21e,2024-12-05T03:19:41.673000 +CVE-2024-21451,0,1,10656af4bcd9bdb5f04e34a9c848c1f5888a156ccf937276d3b30e7a5ae48e37,2024-12-05T03:19:51.647000 +CVE-2024-21452,0,1,c741246011b433951395c0118c7b2e06572876431deae4f44e0f72ab2a2ab789,2024-11-21T08:54:23.940000 +CVE-2024-21453,0,1,183ba5f798b6ee244fd203e99a0d0ba324faeda95424ef5c93dc73f16ca5b93f,2024-11-21T08:54:24.077000 +CVE-2024-21454,0,1,585d62b6d81854e7faff8ef232c57267a6032650835cc8da185136cffeb41122,2024-11-21T08:54:24.210000 CVE-2024-21455,0,0,e0083e50df1b63ca6d8ff7e54516dc1ea68c1e3800acf94b7bff06dc4f21b6ac,2024-10-16T20:30:53.093000 CVE-2024-21456,0,0,2e3c4dcfd14eeb2f63e676acc678d841ead7728e5f46d735922f201810dec87f,2024-11-21T08:54:24.507000 CVE-2024-21457,0,0,800f81fb2142503c59c991e96a4b9b5ed20bd15b2aee416fe7ec03a225a731db,2024-11-21T08:54:24.753000 CVE-2024-21458,0,0,3481c1646a5f6e9a7035b2ac245db8e552fc8d0c4b05d6206d9fc7003b58a2e6,2024-11-21T08:54:25.117000 CVE-2024-21459,0,0,960d067989e0b4f209117a58970a72a67c866dd213283a69280b49195d98543a,2024-11-26T14:23:08.273000 -CVE-2024-2146,0,0,6f2c6ad8bb9e17ea41669ac64ba2340fd9fc617f149b5e5911d622e886ccfcf0,2024-12-20T14:37:34.637000 +CVE-2024-2146,0,1,24356dbb98ac83fa4a2deb66cb6e8916defd6ea5318101e6fc0117e177f1d7f9,2024-12-20T14:37:34.637000 CVE-2024-21460,0,0,bbc35bb85743b24cb381a6829c5bdcd665ae90fe45617113a38e351e4de91dc9,2024-11-21T08:54:25.690000 CVE-2024-21461,0,0,b8ed00e9f935c14f7c8ff589a6c471c291b3eab36d44de52ee6255ffad25fecf,2024-11-21T08:54:25.873000 CVE-2024-21462,0,0,bcbc82ba53d1866480b8fd482c19e43e0b78dde416cc6a766bb3446d7bac28c9,2024-11-21T08:54:26.687000 -CVE-2024-21463,0,0,a1851904124a020600ad4c9445d48b896f0d4532a9c867b668e208a6b9bdcbba,2024-11-21T08:54:27.220000 +CVE-2024-21463,0,1,4cf8dd1e2400479480a0c8e9c6e6d806a866cea39bda91cc5ddb21f068f33c41,2024-11-21T08:54:27.220000 CVE-2024-21464,0,0,381819e136efad97355a92178898540891e3e4d2059a39cf40837a4e60be3d4e,2025-01-10T17:22:21.040000 CVE-2024-21465,0,0,f28128125b5e1a84044a749ab740f960fd012337488e5de839191b04efcf90ad,2024-11-21T08:54:27.423000 CVE-2024-21466,0,0,df004bc4c4677aba92f60dd08ca0577dd1ffc9a32b586a3bd8893ce9e4ad210b,2024-11-21T08:54:27.980000 CVE-2024-21467,0,0,63521bb6f92e531d4bfcb6b0eed69a9688a59d6e337966a6b7682d8bc9335a39,2024-11-26T15:46:26.137000 -CVE-2024-21468,0,0,5e4626d731dfc5b66aaec8dc4466a73e6b5d03c8ef03dc778fe34b5c194e2f21,2024-11-21T08:54:28.523000 +CVE-2024-21468,0,1,a061f216d5fd9672429827d0e5bc033a14b0068891f671f024adbcb2b9f03328,2024-11-21T08:54:28.523000 CVE-2024-21469,0,0,52bc7c51a4d7a1c6ed3db1e7bd4fc5486c5af4c114f59ac4b0108a76f84810c1,2024-11-21T08:54:28.830000 -CVE-2024-2147,0,0,c3318004643078078c7a1caa68f414e2a2ce1909b815ad673e110d2d84372eb9,2025-01-02T20:16:00.083000 -CVE-2024-21470,0,0,da967a9d24bc1a60ea30f79f887c386120e8cd3dbdfadbd0a824b703f4036ad2,2024-11-21T08:54:29.310000 -CVE-2024-21471,0,0,0a0514ba03bccb34ab4e39be4a446d460c356541186c439529720f2206980055,2024-11-21T08:54:29.457000 -CVE-2024-21472,0,0,7950206c8d0dd1a1fd81016593ee950307d783e1ba4332c1ca9c98513cb61530,2024-11-21T08:54:29.653000 -CVE-2024-21473,0,0,8775d99a8ecb7f9d219aa4773e8d22faecdd6fc68c381f1c4ed02a34b2d2c359,2024-11-21T08:54:29.803000 -CVE-2024-21474,0,0,8c90b57abd1bcbecff26f0509c94ea98c110ad3e43258e77bf786cfb461147f2,2024-11-21T08:54:30.007000 -CVE-2024-21475,0,0,82a99c7c7a6be64cbdcc922a7216be3f1296d1ec16a266fe6056c40f3bdf95de,2024-11-21T08:54:30.147000 -CVE-2024-21476,0,0,99875725ffa5940ead4e2605fd9fa4d02cb760bb97aafa1c1a433906f86af57a,2024-11-21T08:54:30.310000 -CVE-2024-21477,0,0,6ef991243a50a831f44780c39bd500bbc7bb166b4aecf09f4670440bc6e4affd,2024-11-21T08:54:30.467000 -CVE-2024-21478,0,0,7c16f83710294926e8234adf5749453ffadc56c3e854cfecb8fc954c24349210,2024-11-21T08:54:30.713000 +CVE-2024-2147,0,1,6e954568c8310616af8a304695f5d42392bbf1b59503944cf4f6d0128d30a4cf,2025-01-02T20:16:00.083000 +CVE-2024-21470,0,1,c0bc03633fbca7b201ae9fb82ec165fc6d844d3fb2691776adb931f2a94d3d77,2024-11-21T08:54:29.310000 +CVE-2024-21471,0,1,374ab2b5f8d8831993a46e4b7b857f66ca3405a069b1558ad871f512485f32d0,2024-11-21T08:54:29.457000 +CVE-2024-21472,0,1,627a8948d007330d6cc7b9f9f71dbe1bb6acbfd257c4702bf8b2cfbde1029fe5,2024-11-21T08:54:29.653000 +CVE-2024-21473,0,1,f3c62a6f13163600492e9843c5c0199aa424723c09974d3d93dda1912d579c69,2024-11-21T08:54:29.803000 +CVE-2024-21474,0,1,3bae64e8d82d7943c05dab1e00d3059ffef1b2d2513d1f74397a5eacec826924,2024-11-21T08:54:30.007000 +CVE-2024-21475,0,1,8ca03e9dc9623fbdf3dd0ce41c1a49e66e451e78436f30775a672c4ddb3286ef,2024-11-21T08:54:30.147000 +CVE-2024-21476,0,1,ef4871c470d8cb79729526971104288593e14444f09245c710fc488bb6ce5fa4,2024-11-21T08:54:30.310000 +CVE-2024-21477,0,1,611603daa950192d4457c9cb4fcca495432ccc8bf0c22846b7cce36e018274e9,2024-11-21T08:54:30.467000 +CVE-2024-21478,0,1,a8652e332d82c93fca77d4a10fb19864ab4c85990635f7e7d1f01e3098407881,2024-11-21T08:54:30.713000 CVE-2024-21479,0,0,7917a657bcc25ab15a194a0d5e758d5fcfd48d3848dcabd8e19234546501acfb,2024-11-26T15:47:07.733000 -CVE-2024-2148,0,0,2a19ce7695cb1c2abc5aad25a44274f11fdc078f7185fbb528f0f6011a623c82,2025-01-02T20:15:02.697000 -CVE-2024-21480,0,0,039aa237f7c6c046e5ccd36b41033433e4e139a67ddcfaad8e2e93c4428a8676,2024-11-21T08:54:31.030000 +CVE-2024-2148,0,1,7c6d9ed06ebe7f3ac05f0329e7ecbe181d9dfb173742a354ca3facf292345f55,2025-01-02T20:15:02.697000 +CVE-2024-21480,0,1,077e3524ca226d02496ba182052758d13b2b5abb8d10eff7757b3ab53c2f1e35,2024-11-21T08:54:31.030000 CVE-2024-21481,0,0,76a01d2f162c05d46ef14eeddaccd3d20332b0fe6fa63f472b41fe3cb370b542,2024-11-26T14:48:00.253000 CVE-2024-21482,0,0,4e1f1644181669b2f4edae4177ca286083aa7058fb52bd83f5c9303f26199ebe,2024-11-21T08:54:31.427000 CVE-2024-21483,0,0,35e343e7235664a18bd2ba99f9cb43bfe6fbc5dd6eeecb50970c9f345175f650,2024-11-21T08:54:31.670000 @@ -247819,7 +247820,7 @@ CVE-2024-21506,0,0,0501aa9e15543c672d3de96d3e8d3d0c1c21afb2e19e663e8d9159c8a48b6 CVE-2024-21507,0,0,978c787aed4f5f5cae3323e00374e35cb6b8afb2c65f7cd7cd3f90660aaf7935,2024-11-21T08:54:34.667000 CVE-2024-21508,0,0,65f59405ac5ea54eeb2611ecfe7a75a7000de244101642174ff20762bc442840,2024-11-21T08:54:34.803000 CVE-2024-21509,0,0,d585b74e0e844576b4e2b9f73925f27db9cb493c849100e2d3e4822b3b63d438,2024-11-21T08:54:34.940000 -CVE-2024-2151,0,0,3d8197a9b2f89570eca9a5f5dcba43511b744b8a6e371ac18f768f3fab2065f2,2024-12-20T19:36:52.080000 +CVE-2024-2151,0,1,d0784fd2eba6eaf48ca19ddde87b31b1f4ec5d391ec7305fc87d45a5be1642b5,2024-12-20T19:36:52.080000 CVE-2024-21510,0,0,afbc6b2997a2bb573983b14779163d0f3e06e22acc0fbdaaa9ed684a5c819890,2024-11-01T12:57:03.417000 CVE-2024-21511,0,0,182f091c4ed017525e9e580dfda09fcbda72791994ada1f748c50419ad3b52c0,2024-11-21T08:54:35.180000 CVE-2024-21512,0,0,884928f820e984986c4127419b96993a9631f2fdda5161c1e82bb275aa893955,2024-11-21T08:54:35.300000 @@ -247830,7 +247831,7 @@ CVE-2024-21516,0,0,714e9699c666c291731df489c4a4d4b5a6b1153ab3e24d5aaedb2f6409f5c CVE-2024-21517,0,0,71e12b43226e2a3b487e6ff6fb65bd8c154254848a0a34c039dd34c5fa8f3cd6,2024-11-21T08:54:36.063000 CVE-2024-21518,0,0,d147bbbdb00d33e9919b4e00455fd4d118ef1b58e469f947369c25e12ebd2500,2024-11-21T08:54:36.223000 CVE-2024-21519,0,0,847e1cd4eb3a390981cb70fcaa8a9f794d31a430107ae76bd7b814306d528c12,2024-11-21T08:54:36.377000 -CVE-2024-2152,0,0,c1376433b3da8765c2809fe086daca92323bdf8c0d0c7833abccd0e9fbc0df64,2024-12-20T19:37:50.807000 +CVE-2024-2152,0,1,e8a2cbe474c799d1ca6885b226177083c38d3ff66e0631ed27e9d47c93e17477,2024-12-20T19:37:50.807000 CVE-2024-21520,0,0,5e547b18267dcaae317db1ad1de87bfb370e8f29e785a6fe54608475471cda4e,2024-12-31T10:15:06.317000 CVE-2024-21521,0,0,dd4dbc6b6caa697a204d1f25a03cccd69d475e8249033ed79cb42c5ca4571633,2024-11-21T08:54:36.637000 CVE-2024-21522,0,0,ab99178ca7bf4d5693b2b017e36fa9c863c7d75c2a02fd0b4b775f31c0f098fa,2024-11-21T08:54:36.760000 @@ -247841,7 +247842,7 @@ CVE-2024-21526,0,0,21c2ec001b71fa277e9eb77378baa42c2688d6d406b47f453a8e4edf65c8c CVE-2024-21527,0,0,8c123627e79cd2e2e9c8cce28b6d17781236242b4098253caa26ce444d603dd9,2024-11-21T08:54:37.400000 CVE-2024-21528,0,0,3d6b20c2a05b5f6afbec19530737344fe4089fa4bd5ec5946a4edf1d9335ec4c,2024-09-10T12:09:50.377000 CVE-2024-21529,0,0,bdba9e510ad0e18a82d6f89d0f259223b0ff5ec36279ac998538b0498afe71f6,2024-09-11T16:26:11.920000 -CVE-2024-2153,0,0,bff967ff4e88f97661d81b3bd943764a60d58db01f8cc9879a383d66d7159ecd,2024-12-20T19:38:05.173000 +CVE-2024-2153,0,1,25407359fc1477d7ae22f40549638164cd702a475439b7d8fa7ed3e98b4d504d,2024-12-20T19:38:05.173000 CVE-2024-21530,0,0,f8ea428c28eeeae44d4bc6f743e1f0c04e37e674d56062c3013deca22778d7bb,2024-10-04T13:50:43.727000 CVE-2024-21531,0,0,71028a5a06f08946d6f1b6d8bea821fdd76bca5a3c17f701ef9bccf4a7c20197,2024-10-04T13:51:25.567000 CVE-2024-21532,0,0,452ed27d306a0c99dd7fa216d9ad7fae4f5558d1c04d9331bb1115f5b8589d50,2024-10-10T12:57:21.987000 @@ -247852,7 +247853,7 @@ CVE-2024-21536,0,0,12c83b03efaaa3cc2890c754edcace2dd7ffc8b3d03f735b6e31c62550b02 CVE-2024-21537,0,0,434d7d2766b91e13cca78a0a8ea1a46a74136bc67ef591981914fba4f50ec56c,2024-11-01T12:57:03.417000 CVE-2024-21538,0,0,e897068d7d66099bb41c1a146301a4231ffaf8598a00a9e9d72bd661eae781eb,2024-11-19T14:15:17.627000 CVE-2024-21539,0,0,5b71b48f136ea0a133f42f5e9ff41239f19728230b6ea876d025e715b63e91d7,2024-11-19T21:57:32.967000 -CVE-2024-2154,0,0,f33d955d821642b9f394fc3308cb7a81ead5da205cdf1cb16dd1ebe4fd874a70,2024-12-20T19:38:32.983000 +CVE-2024-2154,0,1,ffeeac95960a7865d135456d7433827b762c9eee41da0ca2ab259c73402ce4ce,2024-12-20T19:38:32.983000 CVE-2024-21540,0,0,ca361900c1eaa9a3b1242a94b8aed82eaba7c8170c10a4efa35cbfaad6b1984c,2024-11-17T09:15:11.853000 CVE-2024-21541,0,0,5334d81827b035e812e898c211255fb4104fa0827d052caba8f8153293e7f7ad,2024-11-19T16:20:37.887000 CVE-2024-21542,0,0,e36314e0d3629ecf9734bb5ba8a685163900633286b99b2fd1cecc21e5922d77,2024-12-10T05:15:07.567000 @@ -247866,7 +247867,7 @@ CVE-2024-21549,0,0,8f4cb02307903c6bf1e01a95a2138f188757fcec6cd395d3364f8b42ba605 CVE-2024-2155,0,0,c4046476de717845ad993f72042c777e8830cb00c2720514d4f4bc09d623807e,2024-11-21T09:09:09.070000 CVE-2024-21550,0,0,6b574e14ae55a92be9fd93a1bb9ebb56cb79876aa6e47f41fbbb48bbd5163e82,2024-08-13T17:33:13.537000 CVE-2024-21552,0,0,3511199af539fa92e1c2d7637f006a31f2e0de3850c5a9391f1377c23517a9d0,2024-11-21T08:54:39.323000 -CVE-2024-2156,0,0,e3584aaf82ae046dd7e76bc4a1f4b79435b1587fed1060f0fa4d23a3a9dc9726,2024-12-23T15:14:55.947000 +CVE-2024-2156,0,1,73e2279c5d0173c5c9856369522b6959041cfa28f4050cfccd6081ca9cb05e53,2024-12-23T15:14:55.947000 CVE-2024-21571,0,0,00f71271d471c0ccef3da52590a9bd5876dfd266723612726b696796600a80a5,2024-12-06T14:15:19.997000 CVE-2024-21574,0,0,09d0db1e832017fc15494a2f7b663b7c4c2c33a08a33893dcb0b0934017eb733,2024-12-12T09:15:06.037000 CVE-2024-21575,0,0,939b39e67e18130b834072c5b0a599611378cdd9a5f40b5edb07f0b5f31a6c1b,2024-12-12T15:15:12.733000 @@ -248043,8 +248044,8 @@ CVE-2024-21751,0,0,37727b39c87b6c1a9e9b1b8c4a5a7fcb8c766a4a78fd465a68a305c6b49c5 CVE-2024-21752,0,0,5087325061f0baa2c18bc685e2fb3da31689dde4699ec8f5182350f3815fbecd,2024-11-21T08:54:56.687000 CVE-2024-21753,0,0,45b065c6167769cb16d64a10ec6f37b04b38c9a33361a88b58e0222b96c5fb44,2024-09-25T18:36:45.307000 CVE-2024-21754,0,0,6726148c9c00979954f8e0e43980573889b19508b76c8b84b92cd601e38d1fce,2024-11-21T08:54:56.877000 -CVE-2024-21755,0,0,11a81bc114170594875134f56b35189ac0b3bd393b769cf20f145ba5ef665b63,2024-12-23T14:58:10.797000 -CVE-2024-21756,0,0,d97e19b3b174c9f06187b573e4aa20f1c2950b5a801d60d9d611ab0d6752b42b,2024-12-23T15:02:00.357000 +CVE-2024-21755,0,1,3db688cacd77dd473c848be3e1117c1b29b56eeefd4b3b05f3fefc4fcada771b,2024-12-23T14:58:10.797000 +CVE-2024-21756,0,1,55671466161da604c39db4e12f80a3997fbb2c1ad8da690a7c82c7bcf4da8114,2024-12-23T15:02:00.357000 CVE-2024-21757,0,0,2977bcabeb1633cac10a5d2b68ce6f1b718f97760675ba593569c66c881c2f72,2024-08-22T14:34:54.550000 CVE-2024-21759,0,0,c7b87faa73119d13eeff29f1fcc441192710ec05905507e64f7a792b951b9ab6,2024-11-21T08:54:57.347000 CVE-2024-2176,0,0,1aeee7ae52b7f70f1b987c126ac25fd385f727623c97d4e6f5fec3aa0f1aa936,2024-12-19T20:23:37.707000 @@ -248071,7 +248072,7 @@ CVE-2024-21782,0,0,6c531c415b293b846940d9e1a482ffa12bf25baae4ff90ca3d8bed86a3300 CVE-2024-21783,0,0,9cba49c73f8dcc0af2561160a017ccd14b4646aa0c3f61abaa34a051f2714ac3,2024-11-15T14:00:09.720000 CVE-2024-21784,0,0,271e66d21546e397c2fae271ef065731034c6a3dc48722d555b9bd3eaefcc535,2024-08-14T17:49:14.177000 CVE-2024-21785,0,0,9a6462e1a4ec679c404234f546462fc2ccedea4788076efb9e4346caa9449e05,2024-11-21T08:55:00.023000 -CVE-2024-21786,0,0,1c8979bc86a7e3ed407bcaafd8b21ea0a529ad50c98bba45d8284b04eb31515f,2024-12-18T15:06:28.230000 +CVE-2024-21786,0,1,039443c05be587e2aee9be6d7e79e0ba6731ca972b370ba09a7ba630a00d5c5b,2024-12-18T15:06:28.230000 CVE-2024-21787,0,0,02b845fa11d30ef4d6b5248b543c263f9946579e27a5baee61af2daa73424f03,2024-08-14T17:49:14.177000 CVE-2024-21788,0,0,f9a4599f6e3684f11960e4f6592dc9aa65a582c5ca6406a9d40efd4597155390,2024-11-21T08:55:00.303000 CVE-2024-21789,0,0,c34cd9f442e6303402470c0476d59eb25b078e9a77c0361ee2b35106ce4e225f,2024-12-12T19:11:30.663000 @@ -248097,7 +248098,7 @@ CVE-2024-2181,0,0,bc2ca43c87e79a2ce51f96614a32ea2ecec3c3ecdc0cc0dd84d4621bf4f6ed CVE-2024-21810,0,0,4ec81a42073da00ef760857683f4253a4873020979c4273351a33968fe90eb90,2024-08-14T17:49:14.177000 CVE-2024-21812,0,0,9bd251e219bdd80ec43de87b0d9c078ead05f7995c400e0007210d917d930bdb,2024-11-21T08:55:02.837000 CVE-2024-21813,0,0,b1fc9b3e97ad72485455a9afd1ff849eaab839871473b3dbd01f9dd0eb9be42d,2024-11-21T08:55:02.970000 -CVE-2024-21814,0,0,b1e2549efd9875b91491bd1661f5691fb0472ad8e7c2a32aa72970a9fb715fba,2024-11-21T08:55:03.127000 +CVE-2024-21814,0,1,0f439292a2ee399cc31c21556c517ef28da039d9f2e4a057353b6c580d43abe0,2024-11-21T08:55:03.127000 CVE-2024-21815,0,0,6eff960e1f541f7cf6bcb270c61969ce74c3ff8a38acc23b5eb922fcde8f2832,2024-11-21T08:55:03.257000 CVE-2024-21816,0,0,00e0d4daeacd1d3fd9f793d2784b325bb5c289ba9a07a2898d50d384b4599340,2024-12-16T20:03:26.960000 CVE-2024-21818,0,0,b1e856eb827784a1939e1134bc57b77b239e4d10e05f897aba399bcfdc19b54d,2024-11-21T08:55:03.570000 @@ -248134,7 +248135,7 @@ CVE-2024-21850,0,0,3f4996285ba8f36af13beac4e19f7f6eaac6b7c930044e4f18b3bcd24f607 CVE-2024-21851,0,0,357d45614df90945550287893cfbeb32cbb4c927c6c52e5c9529544fa122fec4,2024-11-21T08:55:07.400000 CVE-2024-21852,0,0,74a89e8ad5e242dcaa69632c98166ec72cd5d0a1eabe8107cc899068b6ea0ada,2024-11-21T08:55:07.547000 CVE-2024-21853,0,0,03873964bacd463823aea35d75df2179a268a9ee8ab035ecc0200603d0f2ddea,2024-11-15T14:00:09.720000 -CVE-2024-21855,0,0,cd01486a1dbc0a9a886ff2827620764e44df4ea15f59879419eb00eb59af385d,2024-12-20T17:05:24.753000 +CVE-2024-21855,0,1,b5c9a274a6224ddacae3da8acd4d32ac5bd000acaa7f8868ebcff0034ce6f2f5,2024-12-20T17:05:24.753000 CVE-2024-21857,0,0,c575350fcef843725e7ef275d0f3a96677c72165608cfb91eba4d11094a1a3f8,2024-08-14T17:49:14.177000 CVE-2024-2186,0,0,e7b9bc33689c26748efbb2d9800c342e319e02f8dc6c3d554b2a80d535cba19e,2025-01-07T20:42:22.523000 CVE-2024-21860,0,0,c33a33edbd83b6963f5e370eb0c3bd18861faf04570d72f488d2420923622b3b,2024-11-21T08:55:07.907000 @@ -248558,8 +248559,8 @@ CVE-2024-2235,0,0,a0829bcbdbed86a72a56dd6769abd8e7854afa08a7fcab0364845431cf5bcc CVE-2024-22352,0,0,903d5c6f0448bdc0bf08006216f6899a3c5646dd96e9c8f6bb1e8c750ccd821c,2024-11-21T08:56:06.007000 CVE-2024-22353,0,0,0ea4428102047b2faffc31e2ac25c47aff142899beade323ab31892621a6fc1f,2024-11-21T08:56:06.147000 CVE-2024-22354,0,0,36f7376c3e5da5bc5ebfbf6d09dfb90cb4ef7e55cdcf69f513547ace7e0b27a3,2024-11-21T08:56:06.303000 -CVE-2024-22355,0,0,8fe8ccf1d9c0f6603436166db4be4eb85258f1efecc342a0cecad81e7aae33b3,2024-12-23T18:01:08.250000 -CVE-2024-22356,0,0,3d629d15109c8adc44f4eecec6831a51fa629f815f74de17c5c062f072fd4d29,2024-11-21T08:56:06.580000 +CVE-2024-22355,0,1,26ed86c646b6a6b7eb9c356ba84e79063a2db5147bda7948a2078523655c8623,2024-12-23T18:01:08.250000 +CVE-2024-22356,0,1,446a362a6a9716134385fbb5a7bfe21f3461318977815c7a07a9a73453398881,2024-11-21T08:56:06.580000 CVE-2024-22357,0,0,192cb22e74dbc037b857b15528d854633c03a12cf462a0d18eadc196dd9a0ccc,2024-11-21T08:56:06.710000 CVE-2024-22358,0,0,6157f99a7878956c21bf5fdc02860c4e99702f3939ef3bcb021a336848c09424,2024-11-21T08:56:06.843000 CVE-2024-22359,0,0,45f87f321a83ef51f76917d53714e9a7b93f437f8b2b9fa127f418c3e22f7b6b,2024-11-21T08:56:06.980000 @@ -249161,10 +249162,10 @@ CVE-2024-23348,0,0,a129e6b3747159f86ada3699e7ce730a1fff4c4aa879c6338bc74b8e570fd CVE-2024-23349,0,0,60608975bdfc900d88a148aa98b399014f8d1a3c05f6a13e7f3ce7b241a12bd8,2024-12-11T14:22:19.183000 CVE-2024-2335,0,0,ed64babb31900629e88691a28bf293e48139716a308e0dcea2c4d5bc974613c1,2024-11-21T09:09:31.907000 CVE-2024-23350,0,0,5f24dc72d1da57a6e027b3cdcfdeaa6240d983b7026d1eff51f3ba1623d386bd,2024-11-26T15:48:05.817000 -CVE-2024-23351,0,0,8649c4833ba8351b45556d140a13f7a21d02c862e3d1f89c33bba0b7ac42ae62,2024-11-21T08:57:34.173000 +CVE-2024-23351,0,1,d739b764b1213c492054b1a450c111ac5517de9e31bda9f8d328edad70a0b55b,2024-11-21T08:57:34.173000 CVE-2024-23352,0,0,6aec08c0d489e6dbb6b1cf6cff748b7db3d2dee7f68ed5da611e107c61bb3125,2024-11-26T15:49:05.217000 CVE-2024-23353,0,0,bd24de7fae7b2868ae98d4ec7730e798d8e97b95fb7a3419abf48324075e5565,2024-11-26T15:41:43.347000 -CVE-2024-23354,0,0,da1f9c2571349b18e45696925fa14c841009f68fea5f24eda5576bc99b262405,2024-11-21T08:57:34.897000 +CVE-2024-23354,0,1,e0118b612192813463ab8ca83b049d1a54240e480a570a652d6d5d409f5d5272,2024-11-21T08:57:34.897000 CVE-2024-23355,0,0,11a2a53195a2f52ed319928bc12e4949cea9d4420999bc8ff304106eea813dad,2024-11-26T15:32:38.257000 CVE-2024-23356,0,0,81e6a4a7a9150955e811070388e989498bd62e4b85d5f6623ff691809ffd6fab,2024-11-26T16:40:40.420000 CVE-2024-23357,0,0,7d13406e7bb16b814b5864a8bbb0c5ed5aa78465efd92aec71e114de21d420b2,2024-11-25T13:28:29.360000 @@ -249347,7 +249348,7 @@ CVE-2024-23526,0,0,4305395dc5826f07bea7b7378fb8ce0efb6a5d427a42a91a1b6ee30ebf9a8 CVE-2024-23527,0,0,284206a5d33f28b5a87cb46fb1a9bacb429433d17c2f54e297d7ee3c11560e71,2024-11-21T08:57:53.717000 CVE-2024-23528,0,0,4ba28d53fc3284f3436ec7bd7c325913ceaf1b21e8308fe5042fc86dcc7b3689,2024-11-21T08:57:53.837000 CVE-2024-23529,0,0,9c2cccfd923383e8c7a964ee79fac999b351989d3178014a815d0f98420026c3,2024-11-21T08:57:53.967000 -CVE-2024-2353,0,0,95bdce6fcd6db1a061b315b6ce55d64774b6240a4374b84886120dd80ffdb11e,2024-12-16T22:57:06.437000 +CVE-2024-2353,0,1,5d48eec88f738145b723921bbb3f4593e49916d1491b1900eb4de3b1d8b6de78,2024-12-16T22:57:06.437000 CVE-2024-23530,0,0,aa6df258570429dac99ad02d39eb8fe694453eee48bfd29b8fb0c420e2090544,2024-11-21T08:57:54.100000 CVE-2024-23531,0,0,b002899f8147c0c8ad75afcad582132d16f4a3775c01f972bad16d552806e3a5,2024-11-21T08:57:54.233000 CVE-2024-23532,0,0,7c8e275e0ba36c77ebba1d3abe33906a058bad73311f0066c91339433928a141,2024-11-21T08:57:54.370000 @@ -249462,7 +249463,7 @@ CVE-2024-23667,0,0,68282659dadf8421bf999f7e5b6411f97973ed884f7fb45d2dd6b12f64ffb CVE-2024-23668,0,0,99bbe4b94140b9d101bb1590de5b0cc79587c2f19d27a805e40ca7dbd516eb82,2024-12-17T16:38:42.387000 CVE-2024-23669,0,0,b88515905b95c6021928badd7e75375eff2a9c40d8137d95c199c0ac0de087e8,2024-11-21T08:58:07.910000 CVE-2024-23670,0,0,7ea838294d59355957913c30bbefb71fd4094d7e119f5cfa4518f51e05a3f33f,2024-12-17T16:35:25.233000 -CVE-2024-23671,0,0,9734477cacf88891b3affe5bb06fce7bd080e9c08b1d37c0b12c2fe6187b3590,2024-12-23T15:04:06.610000 +CVE-2024-23671,0,1,3123256bc228fdbe2098bdbac7d06880cd03b82500d8520ba54d73e99ed45fdc,2024-12-23T15:04:06.610000 CVE-2024-23672,0,0,d3712bfc14f4b9b6ce9894f5bdb5d3a1e4e089b0453cb6f78f1161e243ea834c,2024-11-21T08:58:08.340000 CVE-2024-23673,0,0,5d461731855b43c0d221afdce212ef5524691ccf548305743a6bb2f8273e06b7,2024-11-21T08:58:08.560000 CVE-2024-23674,0,0,74719974ebae8daf6322ad16e476cafd08fada32ca57c6d84bf17c5b5580eee0,2024-11-21T08:58:08.697000 @@ -250134,7 +250135,7 @@ CVE-2024-24774,0,0,f6081191014f835b364f01c2d06774fe804398159465de16dc62a59398430 CVE-2024-24775,0,0,5fbf4068aee5b4a63d5bc8c27165baed12b61ed8648f8952c732695b9d7ee9dd,2024-11-21T08:59:40.720000 CVE-2024-24776,0,0,a2f3ec067717ca04fbf18f3a449f632e7089db64e0a17c019f843c8598b0286f,2024-11-21T08:59:40.850000 CVE-2024-24777,0,0,c46e7117281fbe7f2ffae8cc271867d3ae614f1ea7039937a5b87028aa4a092b,2024-11-21T08:59:41.007000 -CVE-2024-24779,0,0,f7bc46f29c0a12895669fc7cc6a9283783810500702236b348f45b5c02f935f9,2024-12-31T16:26:31.327000 +CVE-2024-24779,0,1,ec198cae623b4e6d5aec06eee0755bb1fd858c19bafc33c00af47d84202d8cb7,2024-12-31T16:26:31.327000 CVE-2024-2478,0,0,e85196d894b10e02f1a421f833798ced2a47eb5d6f2dba4c90c6c4ecef4da3bf,2024-11-21T09:09:50.483000 CVE-2024-24781,0,0,056ec447dbcc83fc2a310224e9277e0a17bd56759c2d803ede35170578118e80,2024-11-21T08:59:41.280000 CVE-2024-24782,0,0,80499092009d98ba529bfca673a7ac4275b61ad8394a4890122e575a7c7e8097,2024-11-21T08:59:41.467000 @@ -250210,7 +250211,7 @@ CVE-2024-24846,0,0,8e09b0d4e87b4ab674e3cab3f1fd3f1a0e6018f52fa1ffc37c4a7429b2801 CVE-2024-24847,0,0,187b8702f2b10db7a5c7514eafeeec4cc516b015c9fb46d9e036dcf3c805bf12,2024-11-21T08:59:50.630000 CVE-2024-24848,0,0,4c111a7b3bda17b2f7f0cb61fe7135433ebc8ceeb9bdbd4e678bce0337cec064,2024-11-21T08:59:50.760000 CVE-2024-24849,0,0,d6fa97d34a9f8ee5cd27ec0b205f20369d7c9f2e74bdce13f8ada0b878beff1f,2024-11-21T08:59:50.900000 -CVE-2024-2485,0,0,b1d992733e86d8ba0fd4f4c55ddca0490c57aa443b05a8e516386e1883a335ce,2024-11-21T09:09:51.443000 +CVE-2024-2485,0,1,3e2d6fbc97e0a17cfd1b9d50979d51e10de79a21415009aaaa638f1fda836104,2024-11-21T09:09:51.443000 CVE-2024-24850,0,0,358a48632f493dca7103f0e0c7ddd1ca29e6043f56e8ec4ac8435732328792c6,2024-11-21T08:59:51.027000 CVE-2024-24851,0,0,0af01cccd5009edcfbf596bc6c7612cbe1de8955aa2312b9f4aaa3ac5422299b,2024-11-21T08:59:51.157000 CVE-2024-24853,0,0,cabcc981e6fa2d934ba79408b0a2d2dcaaaa86c51cc576fd027cf73ab1548003,2024-08-14T17:49:14.177000 @@ -250219,7 +250220,7 @@ CVE-2024-24856,0,0,edb9e16ab701f1d81ac7cd6a8857e1142fec8ecd54bd3157273d221937841 CVE-2024-24857,0,0,ef47c5f5558ff084cb8087e4d93135a32d10f333947a4de9037dd780395b3fa7,2024-11-21T08:59:51.670000 CVE-2024-24858,0,0,af566980bf0ecd38a8d5b28d1adf2ef8e3da7cb8c836e604fbf690efad6653cc,2024-11-21T08:59:51.810000 CVE-2024-24859,0,0,1e9af0a415a84c2f4d791281793ccaa6011f306402167f817da3af157684475d,2024-11-21T08:59:51.947000 -CVE-2024-2486,0,0,2547ce6761a52aa429ead22028062e8c33cd3f8c6fe960a199cdcd032b72a4ab,2024-11-21T09:09:51.597000 +CVE-2024-2486,0,1,1a461dfcd6b020e235d8f26338b20bb67524cf5c0d8aa0098d643fcd5179806b,2024-11-21T09:09:51.597000 CVE-2024-24860,0,0,dd3c032445f4389b0045aa1ee467e41aeed0bbef238a713eb674ebc0aa5b1898,2024-11-21T08:59:52.080000 CVE-2024-24861,0,0,f3598f0408131efb7df790b9be54f9316078fdf7f9a6e56682050e6edbe248b5,2024-11-21T08:59:52.240000 CVE-2024-24862,0,0,e56398e3a3ecf5f26dc4fa7cb493c94ed33c0c48462f01ea123df4af5b4239c1,2024-05-29T07:15:09.833000 @@ -250230,7 +250231,7 @@ CVE-2024-24866,0,0,ca01e7ab9182f580c2df3cc16f43bce2d9101083ab37c189e1385bceb76e0 CVE-2024-24867,0,0,2136bd180ed9150e28edf92d8ce43c9eab9735ea7a9b491ddec9dbdb8f9cdb06,2024-11-21T08:59:52.850000 CVE-2024-24868,0,0,6630d4d84ad17a02844ec3eafb441b11da6816c82cb6acb3d931eae3bfaadf8f,2024-11-21T08:59:52.977000 CVE-2024-24869,0,0,eaa1bccf1ddb288cf6ae98ff79cb753c80b1b38e0069bd3f25d738e7d525e442,2024-11-21T08:59:53.090000 -CVE-2024-2487,0,0,950064ecff5fedea496a6c7edee6320e6d397324bc583406d0eaeec7d6a26543,2024-11-21T09:09:51.740000 +CVE-2024-2487,0,1,00f8b53fc7ee7ac43aa4b56b8f40eee9c2f8e6ca32613ad22fcfdef3c9745ab0,2024-11-21T09:09:51.740000 CVE-2024-24870,0,0,6aa9e51d9448a0e10a1161f66474e51dfb7b958ca3b6f9bbc2044595a50090d8,2024-11-21T08:59:53.213000 CVE-2024-24871,0,0,10a64fbec5c39b0fe60d41521cb5a5c7525c224e4742990634498c547792976d,2024-11-21T08:59:53.353000 CVE-2024-24872,0,0,5eb23895cc0a3efd75a161fdba891e609e2554942029ccf84b21a479da36cde3,2024-11-21T08:59:53.510000 @@ -250241,7 +250242,7 @@ CVE-2024-24876,0,0,b4cc689217be0913df85ace8ef2dce4edceec868c0a4e064f6ab6b906c2ce CVE-2024-24877,0,0,020320bddf22a166bf4902f79b2de0f1c33fc009a62f8b0268a0db20cce05dcc,2024-11-21T08:59:54.143000 CVE-2024-24878,0,0,feefb2fb71103213bbba377f384ced3a8d01e1e0925a847d8eff83b785f30ced,2024-11-21T08:59:54.270000 CVE-2024-24879,0,0,8564f9acde2c49fa0cfd2de95355fb728bf3a5f011e79099b5edd5c370f10699,2024-11-21T08:59:54.403000 -CVE-2024-2488,0,0,217ddb14552c6bb002e62536e827da7c4ea7b40d546f1bb7a745394595fa24d0,2024-11-21T09:09:51.887000 +CVE-2024-2488,0,1,bb1c105e52d5bd9746368e796374edf760499fe29da14ae6450575f0d9e4833a,2024-11-21T09:09:51.887000 CVE-2024-24880,0,0,96bc89f1fba79f1fdddecaf1e1cd346f97031121371976a42ead08e50a5eb5b8,2024-11-21T08:59:54.553000 CVE-2024-24881,0,0,6b29b0d601aad3a71f0ec42e4cb2ba9ad631c4bb3c927ef052b57be513b5c34c,2024-12-17T18:23:06.743000 CVE-2024-24882,0,0,d3567095647660c297f7bb4babbc6ac4003730aa3d5d37f35f1f04da4b3c038d,2024-11-21T08:59:54.853000 @@ -250252,14 +250253,14 @@ CVE-2024-24886,0,0,b0db70fd0a338ab12530dd8d023692df21d6cc456ece3e57deae8443aaef1 CVE-2024-24887,0,0,a16db6f2102f215d5636929f5706f649d57fa5bfcfcf4988ca0c5ae66109e727,2024-11-21T08:59:55.527000 CVE-2024-24888,0,0,382077e3e8aa06cdd0c664ed792c056f738c8efea2809555775cc441ff8d8534,2024-11-21T08:59:55.653000 CVE-2024-24889,0,0,2b809a1703a250adab49b7d5100aea29cf5463c8aab713132f83b8c0bf6139ca,2024-11-21T08:59:55.777000 -CVE-2024-2489,0,0,82401b26a93bed4b139c07f97f3f5d0cd370b75175aaac12b18eda6a44b90011,2024-11-21T09:09:52.023000 +CVE-2024-2489,0,1,0dc211f2e4d7936f9452d977edf401d4021494842db8432ca3a65723f9f2d327,2024-11-21T09:09:52.023000 CVE-2024-24890,0,0,2426ebfe449444097c4abecf716d686cf2c1cffaf74c557463d9d51aa164726a,2024-11-21T08:59:55.927000 CVE-2024-24891,0,0,88742c0fda1362cff01b020c18e578f620750212b6aa03bca1f52821b7bab871,2024-11-21T08:59:56.067000 CVE-2024-24892,0,0,f022c7ba6e83f01404be21c9b65ab23525d61297a1070e893817b3ed16614ebc,2024-11-21T08:59:56.213000 CVE-2024-24897,0,0,1713706b09f0ab0adfa96cb643d966894245be71bd70db923b97afcc70d2f636,2024-11-21T08:59:56.357000 CVE-2024-24898,0,0,c2aeb0b2ae2f782f2dc66bdade7c7d1a93fc15cf5d6489a9f48c316ac3bf035d,2024-11-21T08:59:56.490000 CVE-2024-24899,0,0,2bc91dcd7ae04ef9b7ce8699e0547facdca6bac3dccb8b3215f6cc8ec7bb7104,2024-11-21T08:59:56.620000 -CVE-2024-2490,0,0,a65eb1b03e3ccb77b9452872014ef202736a2123ff92feca9ecf560217bfcbee,2024-11-21T09:09:52.163000 +CVE-2024-2490,0,1,d49c68917aafcd937ed78cde517745f20a735816cff5526569b221ed32746dfd,2024-11-21T09:09:52.163000 CVE-2024-24900,0,0,d5304f8431348447d6c427e55f3d4ca1cb09c058bcac6836ca3d23f9d77a4f59,2024-12-04T17:57:20.727000 CVE-2024-24901,0,0,90f43cff66c2d3472fc27e388657195ab3c16dada990167848ae27558cad40b9,2025-01-08T15:38:23.727000 CVE-2024-24902,0,0,bc5b9cdf96c129a42228207a374692a23fabe93823cd024f4399b30a0562660f,2024-12-13T15:15:26.810000 @@ -250269,7 +250270,7 @@ CVE-2024-24905,0,0,e2273c6b44ecfcd7cad48c4025037d34dbb46e6d15f70467bbb2992d0057e CVE-2024-24906,0,0,f553bc515ac11444637fbc0cf473c175e08c8bab304d7209731f614aff8528da,2024-12-04T18:16:04.087000 CVE-2024-24907,0,0,a4ea414f343ecf7afc1b453c69047fa5e86e608436cc607d44bd97223fa35c82,2024-12-05T16:47:32.350000 CVE-2024-24908,0,0,06530c2cd512333eb5b38bf6ed8e3f78381e7830b1ea331f76fcc7b9cd910f37,2024-11-21T08:59:57.640000 -CVE-2024-2491,0,0,5fcc42e28e73d23836823b20fa57c5dc0508371e72ba40292766313bdc2bc39a,2024-11-21T09:09:52.307000 +CVE-2024-2491,0,1,3c7e2d205641f0a1a5ea8de7778bbc7fcc9c887221f5597414a3e5d7dd4d3cd5,2024-11-21T09:09:52.307000 CVE-2024-24910,0,0,6b331799a881a5d956a87c006abe5e882f01b24bf255742ad3b49c624db6b57b,2024-11-21T08:59:57.760000 CVE-2024-24912,0,0,7e4db9efaf9ed4fd90c3653c0c141095d6d30e8a8ae2098e663586572a626f62,2024-11-21T08:59:57.947000 CVE-2024-24914,0,0,6a184fa1912b50a75a0f68f12ef7de42e993a65d0e5eee8a5ac41cb6b37ddf0c,2024-11-08T19:01:03.880000 @@ -250322,7 +250323,7 @@ CVE-2024-24970,0,0,d539881e528c227f4316b7df6b7900424bfa37663985a5801663f38c22e74 CVE-2024-24972,0,0,e18f9379a0dfb442df63b89873a662475ca57c06be8d72f3283fa5108a6ba772,2024-09-11T16:26:11.920000 CVE-2024-24973,0,0,a4aeec4bb514a0aea566dd993a3799ef12bc8985c1156c75b231bc8ad8f37ba3,2024-08-31T03:39:37.043000 CVE-2024-24974,0,0,120a72d1892734f8f80848d93fee3cc1ac0dd1eb6bf320d4911e845780d163e2,2024-11-21T09:00:04.127000 -CVE-2024-24975,0,0,dc9c5952eec625b446b4d1aa0ff7e37900e275faa967b9fd64755e8d268e5c77,2024-11-21T09:00:04.333000 +CVE-2024-24975,0,1,e5663839eaf00677116283cb3150c94dfbc8dcb7630a1b441c283e42fb5d4dfc,2024-11-21T09:00:04.333000 CVE-2024-24976,0,0,61b572c96ba780f8c37b67352f816181b4581a37ca5fd5a69a16f93decba5a86,2024-11-21T09:00:04.457000 CVE-2024-24977,0,0,2cc67a2afbadfefa2eae3087514056f4e29f0e06405ab427028ecbac21be9013,2024-09-12T18:45:58.803000 CVE-2024-24978,0,0,d6b62ab3fdc2ce4245d32186e03af1b316f2c7d5f1c9cee569ee4c6a1e52a576,2024-11-21T09:00:04.717000 @@ -250372,7 +250373,7 @@ CVE-2024-25030,0,0,3bf7cf36ab25986b6901ce978418ca57d6fa819b3639e450fc36c96ac4859 CVE-2024-25031,0,0,336ae1209bec97edf2f576f0dbcab4e5fecb1cf28a1e1d867216b37694f08f50,2024-11-21T09:00:09.263000 CVE-2024-25035,0,0,b7214df75690f8a2c0cde375218fa064c6af31099cab5de418b369cfbfb53d96,2024-12-11T03:36:11.700000 CVE-2024-25036,0,0,a0130984c78d987e616d5d6732535de3078a91e4d686daa4bfe8d88a169b88cd,2024-12-11T03:35:51.663000 -CVE-2024-25037,0,0,63f6c4cdef62c3fb13494c2a3686a2ddfee00836b96ea06cdbf9ada167ef68b7,2025-01-07T16:15:32.937000 +CVE-2024-25037,0,1,406a4670a9668946e91205c5e64e1ad1fa02a4e9c65ab719dde554f47a137fd7,2025-01-07T16:15:32.937000 CVE-2024-2504,0,0,f5ba71a497b867559bd1b6db67d9796fbd7c70d2c928d6cdcb40ce2b13ffc17e,2024-11-21T09:09:53.917000 CVE-2024-25041,0,0,c2ef0b11a47c5fcb85869011d777be135ff05637ba0b82b517f0e1a3d01142a3,2024-11-21T09:00:09.433000 CVE-2024-25042,0,0,e80197f616e9fc7028a38b26e43b05d859fe7534b854846d6b61625c0e95d8c2,2025-01-10T19:31:43.540000 @@ -250447,7 +250448,7 @@ CVE-2024-25129,0,0,2604b0d083aa6b811ce626d5e0d68fa8a4d20df83b064e942d8925d782144 CVE-2024-2513,0,0,36a2204c3fd6b7b0d5979029682413ad27d7399117bcab08af84ed0f3129ba46,2024-11-21T09:09:54.893000 CVE-2024-25130,0,0,857561f7163809aaab52302af2067a400725f38d7068fc40b7911a37097dbdc8,2024-11-21T09:00:19.023000 CVE-2024-25131,0,0,ceb8f79a596f7dfcc1a6c1d7239611c1edcfd90538f3aabea1606b25009f15f3,2024-12-19T15:15:07.070000 -CVE-2024-25133,0,0,07e9636788d84e914aae16b7456af1b36144d75f66a51fb1fafeabd8c9af7047,2024-12-31T15:15:08.283000 +CVE-2024-25133,0,1,8415a5d9f4f13a2d003feb2eec32d9bc1f85654c6ef0f0fcd8ac9a2259a169f2,2024-12-31T15:15:08.283000 CVE-2024-25136,0,0,fd3e659838fe8e60e31caed167fe0a2ee44d58da08a3516e05cbf377e2acecc5,2024-11-21T09:00:19.150000 CVE-2024-25137,0,0,551f3b541fbbc9dcd6b47f5c71c8a46148d1a721582998d20fa87f2cf6578d35,2024-11-21T09:00:19.287000 CVE-2024-25138,0,0,1698c5f2bc9a0b670f8c6e4fc5e4345882415f9bfce2ea6fa639d6363cc0ad04,2024-11-21T09:00:19.407000 @@ -250656,7 +250657,7 @@ CVE-2024-25468,0,0,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab5 CVE-2024-25469,0,0,c24aa4c966b6f8ca1870c018453e0f40a0fa553e95decb3ca542d17e0f12dd8b,2024-11-21T09:00:51.693000 CVE-2024-2547,0,0,d51d6810aa146e933146766a166169fe2343ecf22475f64c42ecbdb23ae82c57,2024-11-21T09:09:59.170000 CVE-2024-2548,0,0,57d303fa99f890e95aa96c9d5878480469012160c102ad27f1353b533c559154,2024-11-21T09:09:59.307000 -CVE-2024-2550,0,0,6926ecb681ca48cd0fb9480d5cd45e5800d39bff251b87c779f09714a72638ce,2024-11-15T13:58:08.913000 +CVE-2024-2550,0,1,2d2df85bf011e59207527946e6d118ad16cdeb5fbed94fcf3f161a8c84ebbefd,2024-11-15T13:58:08.913000 CVE-2024-25501,0,0,39a441609204709047cecad828c175f01310d82b43dc4ea230772a5942f74b33,2024-11-21T09:00:51.913000 CVE-2024-25502,0,0,307ee5d9dbe09c1fb27075518c1665746aaca342b4f56014c6a6529979fd95f3,2024-11-21T09:00:52.117000 CVE-2024-25503,0,0,889bc4d1c9a45aa9bb9b859681955c4aaa1d9acb88f2328fb5f6d57fdc289c41,2024-11-21T09:00:52.333000 @@ -250664,7 +250665,7 @@ CVE-2024-25506,0,0,99ccba7c267fe812ca9bb7b28c69f180daff3656f6e44ea9e8ba74241c00e CVE-2024-25507,0,0,9fb695733a659130193b6dffa9945f8a8ed837feb8d0501e96411ebc99ee0c9b,2024-11-21T09:00:52.790000 CVE-2024-25508,0,0,92100c80cbaf3affd555a0268d09dfe8052603ae7230d3e82684e82ae3278479,2024-11-21T09:00:53.027000 CVE-2024-25509,0,0,42166eaef9b6e11f6e136286cd09ec43584b64bdc7ebb8394c0e539c7275369d,2024-11-21T09:00:53.257000 -CVE-2024-2551,0,0,81abe58277446e2e41b4b4267b0c80991ad512e6967722cae6973117f1adee60,2024-11-15T13:58:08.913000 +CVE-2024-2551,0,1,1da0e8511bbc6ea1ce21f6529f525c05cc67939e806bd7e1b6c4195cf79043f4,2024-11-15T13:58:08.913000 CVE-2024-25510,0,0,ca023eb62a1f2d2a8dd2eb69618a6578d9837cb201f68ac0878463bdd7e27af3,2024-11-21T09:00:53.473000 CVE-2024-25511,0,0,89fd33cc6ec57359271fc422a4771012156ebcebdb7a3eea44ebed0d5ba8b4c7,2024-11-21T09:00:53.693000 CVE-2024-25512,0,0,277e44ad57d9c06ac5cb7ec6742b1e6099c94bdafef27e62796fbd5ad12758bb,2024-11-21T09:00:53.923000 @@ -250674,7 +250675,7 @@ CVE-2024-25515,0,0,68d38ba96813124a972695601e0dbed999c1c927ad3b2b72d0939a042cbb3 CVE-2024-25517,0,0,7b2cb83aafad7b6071344c5946ae488491fb26c2ebef9e68b6df4f0888ce2420,2024-11-21T09:00:54.813000 CVE-2024-25518,0,0,4cb317decfcfaf4255d5f51287437d15cd0df33ab197dad7a3fbf21ce3f3bd38,2024-11-21T09:00:55.037000 CVE-2024-25519,0,0,0a91b08bad19e0fdbaaa75835b391d59df452a42edd620ce62fa3db0b15f6e6f,2024-11-21T09:00:55.263000 -CVE-2024-2552,0,0,2dd6eeedc4b9b4ecf214676e52b5fb0603d5e26e382c9bb0929a2c050eaf05a4,2024-11-15T13:58:08.913000 +CVE-2024-2552,0,1,427c8f824b1d947429c06943f2077049a254bbaca0ca059e13559bf5d00683af,2024-11-15T13:58:08.913000 CVE-2024-25520,0,0,a042afc7146d2009d90a801983c0709f5132afaabcb5d2ca82f1fb2a77ed3c12,2024-11-21T09:00:55.510000 CVE-2024-25521,0,0,083c1f1eb4798ffdb4595c966aa895d7396995d2d4ba0cc9823f1dd5e3910e90,2024-11-21T09:00:55.743000 CVE-2024-25522,0,0,7e799b51e7c62296447ba9d773094e12c4d4d2ce84aff929f4a3c4d9a1ead2cf,2024-11-21T09:00:55.970000 @@ -251050,7 +251051,7 @@ CVE-2024-26007,0,0,5566a1952f2701dd4149a375a6c93e3c6434006ebc54211b6a50bcacb2b01 CVE-2024-26010,0,0,aa94400b6d9b88521b847077f70baf8416af93283c6afed0d9452bca0e3c5cd0,2024-12-11T19:54:35.323000 CVE-2024-26011,0,0,c11541fdad772e94b22af8e91bceb09116d56319f79d2943860d22ca66673a67,2024-12-12T19:33:58.833000 CVE-2024-26015,0,0,61e1ee285e159a140490fe9bac1615210ace2b02df5e5f1a9d7b48836125a67e,2024-11-21T09:01:45.940000 -CVE-2024-26016,0,0,dd632393ecfda7bcefa8170ded33d72e8e2f0339866b8ccf741d814fe6f9ab75,2024-12-31T16:27:58.487000 +CVE-2024-26016,0,1,2610bd296695018d3e38024798d9b1b7a39a4da11d75be17fe8b8abc7a84b7e3,2024-12-31T16:27:58.487000 CVE-2024-26017,0,0,11d040a25f5c2d5c2e1e2401973b3159ea6e8ba153c9a2238d873c2f164fc160,2024-11-15T14:00:09.720000 CVE-2024-26018,0,0,2ce937190f1a3d6a5b32ac3dc44844a76544d21abc3c13edb30e7e9f1ae3e868,2024-11-21T09:01:46.343000 CVE-2024-26019,0,0,47740102c6ff96f7cdf82a61ec34d114a985da5f23a4590422c0d7ffc1d08c5f,2024-11-25T19:15:08.683000 @@ -251086,8 +251087,8 @@ CVE-2024-26046,0,0,d88454ed091811ca8e81a9364f715fbfe7fd5f6cb75c6c10ddb232314d7cb CVE-2024-26047,0,0,c06108f67d72cd848041c484d12c425c4b1cd215ea29b5375c85d9545591bfb8,2024-12-03T22:22:25.890000 CVE-2024-26049,0,0,64ea4be7eda83cdbe64070fdb11264af3724006bccca26625966dc4b662f41b5,2024-11-21T09:01:50.167000 CVE-2024-2605,0,0,784aec07cbefc12316cad480753cda8fd3973b176f13575456f92752429aedda,2024-11-21T09:10:06.350000 -CVE-2024-26050,0,0,5f7235a82d12929e670c1465ff039d059cfd8a18dbcd329570c1f0ed9ec43be0,2024-12-12T21:13:12.177000 -CVE-2024-26051,0,0,0f7e542807ee4f5aa69270802762307f7b75103065ffc579a845dd3585406188,2024-12-12T21:15:22.647000 +CVE-2024-26050,0,1,414b985c5d618ca580b5e359ea66ad745d57b52c02b063a1d250a09fd76bf316,2024-12-12T21:13:12.177000 +CVE-2024-26051,0,1,ecc460e9a9794457af8cd918fd88ea0aba725a44c7aef7636dfc26ecf1ae1259,2024-12-12T21:15:22.647000 CVE-2024-26052,0,0,689ed1ce1cb916029e63bad6b8499066564f50c09cfbcbe8d6a4d92fc9748f2e,2024-12-03T16:25:48.917000 CVE-2024-26053,0,0,6df7d904fb27c1e3189adfe491730fe58222aec9fb269468b46d5b1954d6bc6d,2024-11-21T09:01:50.673000 CVE-2024-26054,0,0,43b1dfac511e14fa6ff2fc5143fd384dd37d20ca87a3db1d42c8ddb0cee3f91b,2024-11-21T09:01:50.803000 @@ -251174,7 +251175,7 @@ CVE-2024-26131,0,0,5c8faf51f9ca570157c419a7436117ec2134b688a4a3d15d5026f55b0af40 CVE-2024-26132,0,0,276f956129ff17889c7494d0dab8cf40bce32133285459c625bfc72a90dade70,2024-11-21T09:02:00.017000 CVE-2024-26133,0,0,414e865b4d71c6e97782d5b5ae0b162d8235dd6d767b1d33bac291a9dbd931b9,2024-11-21T09:02:00.150000 CVE-2024-26134,0,0,4b0383f16deb8444e0ffe32a9ced439fcf2df8e070f9714cd8b9bac5583f2c2d,2025-01-02T14:18:48.553000 -CVE-2024-26135,0,0,4b53b0e12fb3c7865f674fe18beaa11c4ccea849727c12b1c8dfd19fcc00e75a,2024-11-21T09:02:00.410000 +CVE-2024-26135,0,1,970acaf21438df1f9187c3be15d03ed7ce7dd8a5f98c4d95d3f1dea6045024e6,2024-11-21T09:02:00.410000 CVE-2024-26136,0,0,78c4ea448beb9cf3c6ef8342e477ea2790594fc079dbed58994d56834e580c2e,2024-11-21T09:02:00.540000 CVE-2024-26138,0,0,10f267c4d549b45918b8c4c0ec8306e620c8fc245861cd94369601b1edb19ed5,2024-11-21T09:02:00.660000 CVE-2024-26139,0,0,ffc8a35c7d6ef55a8d6cab5ce0546eacb4822ef0570208b878cfcfdc9f776772,2024-11-21T09:02:00.783000 @@ -251193,67 +251194,67 @@ CVE-2024-2615,0,0,52dd24226966af2d36ba382439ed9857bee488a41878b8821cda0b5db9bfb8 CVE-2024-26150,0,0,760c01f2b0f4e8d4df72d58246936122b365d4d76ec3a16d18feb7c7ba59ab64,2024-11-21T09:02:02.207000 CVE-2024-26151,0,0,d276b8c1a24abc1e1732baa2c78d7170250cc1d720b3056de0124851234c0d6a,2024-11-21T09:02:02.330000 CVE-2024-26152,0,0,1dc6dc3291bda60bcd1869d37f2cb2c8de669324c74d8c14c98db460ad6f3160,2024-11-21T09:02:02.457000 -CVE-2024-26158,0,0,bb699382dd6add8b1ffa424dc9def1213e75d3424ea850b8560917a60113c6de,2024-12-06T15:40:50.143000 -CVE-2024-26159,0,0,74a66efe68adbec642f5d04cf56c7ff71c274a7e0567a329cd0963c884afdcf0,2024-12-05T03:06:07.380000 +CVE-2024-26158,0,1,09fc1d75121ad09ea3a275f9cccd32b38ff46d4cb1778bb89e6ac29161fd0e25,2024-12-06T15:40:50.143000 +CVE-2024-26159,0,1,1b48fef43c59f3ec54fb486cca3f3676b117339286d3339609cb0579c3d1ce4c,2024-12-05T03:06:07.380000 CVE-2024-2616,0,0,3c1888c11eeab37d5acfcf6bb075f78798d2b23b1d25b092860d7147320c3bea,2024-11-21T09:10:08.330000 -CVE-2024-26160,0,0,5d92cfc3266053d64013fcd5c6759d6df3fca83d735e3a5c736455cf6c2eae50,2024-12-27T17:52:38.267000 -CVE-2024-26161,0,0,89563409800fbffebcb197091c745615b33e6199d314ab3dd15f0aac42b18b88,2024-12-05T03:13:28.823000 -CVE-2024-26162,0,0,6db79e02ea9ccfbdf9b6ec43f0dee2ca0f4b40a961c561698caa8afa95c0a1fd,2024-12-05T23:02:38.947000 -CVE-2024-26163,0,0,405b000a902f7606f462f563c77578b3e445eae4791cda5ed9ca3a1e544aaf2f,2024-11-21T09:02:03.330000 -CVE-2024-26164,0,0,955f43c621335a0915ed0ccd09771b1791419f5f5b5d2b4566de2ffe6ff42e0d,2024-12-06T17:14:53.333000 -CVE-2024-26165,0,0,323d735601fce5550052f5beda02dd0e7629a06390bb099382338fcea909aba4,2024-12-27T17:52:57.313000 -CVE-2024-26166,0,0,e18f80ad40f8bc6f793bad005879d5e5b9993daac689d33724d3bc73a70a370a,2024-12-06T17:13:11.063000 -CVE-2024-26167,0,0,8855bcc7e86d2bfb321c97571f709e8374a60be9ce3b496dc4c11c762f54238c,2024-11-29T20:40:52.990000 +CVE-2024-26160,0,1,2bac9e2f92e69a7ccf234b4144bc3814e23923b231ebd2292e83d569bbec326c,2024-12-27T17:52:38.267000 +CVE-2024-26161,0,1,96d5b9e1a5955f2c073c7a8189e9dd9a7f3c7ef8b93c6983c436713e224abd04,2024-12-05T03:13:28.823000 +CVE-2024-26162,0,1,a7bb551f7da1b0319dc37a60d88886e465e635a90384da6dd6c8cee8c848460a,2024-12-05T23:02:38.947000 +CVE-2024-26163,0,1,42441098c274dc2e72bdbec1e1cfe209ed2ce68cfa17118a11f5330f0c168c5c,2024-11-21T09:02:03.330000 +CVE-2024-26164,0,1,1ea76679e73beab8e8f92dcaf9ffc6c21f0e6d24066752ed1e6d8c3ba1a22317,2024-12-06T17:14:53.333000 +CVE-2024-26165,0,1,43273774b222ed309d56f0cb772a8c6ecc5d570ea920a1e3a8f6f1be28161c85,2024-12-27T17:52:57.313000 +CVE-2024-26166,0,1,2b7797b790c4e6ea8990eab43880441d57071faf9d2573a478232196fa5a190b,2024-12-06T17:13:11.063000 +CVE-2024-26167,0,1,6eb0c140def4f9a6e9fb9fd2f693a073de0b0d1299d65db710f73121233af732,2024-11-29T20:40:52.990000 CVE-2024-26168,0,0,62c8ee0c240ff65b4fb97e0fc41592a55b6e7336a7af67a393725b04f7586eb5,2025-01-08T16:43:41.883000 -CVE-2024-26169,0,0,1019f2fc447e0f9753156720ba4d1d39073dcb9223b8501955c81cf0a85bd6ec,2024-11-29T16:24:31.767000 +CVE-2024-26169,0,1,5c99b3cc41f28b23c3419a9409040bf5b00ac20beef1c24160c09c4aabe7505b,2024-11-29T16:24:31.767000 CVE-2024-2617,0,0,df50cc3304e28fac26946c783498321b1d7826e081bad204a1f2dac326819b7c,2024-11-21T09:10:08.513000 -CVE-2024-26170,0,0,b55f72374c7063386941814ba0bdf0898d32da11ed22d12b938ae885cc41c8b6,2024-12-27T17:54:12.860000 +CVE-2024-26170,0,1,dff499d41eced2f62340ae06681cd85f9cd5e4a69bee4614e4f0a18e29892c8b,2024-12-27T17:54:12.860000 CVE-2024-26171,0,0,ce31895ba62f0f8d87fe0351cfeeef5b2cfa003f2d57425422746f778461a3f3,2025-01-08T16:43:51.780000 CVE-2024-26172,0,0,0d5d66be6ac629f822c789f4ac6b1e80e6bdf21ad9b47e369b552a319a0a5ce8,2025-01-08T16:44:30.350000 -CVE-2024-26173,0,0,c6d08fd3f223b0b539800fe98fcf9d8d17f7c436982164c8e7a6699f533aa1cb,2024-12-27T17:27:57.820000 -CVE-2024-26174,0,0,7da91917d8122e6dc23fc9e8b6ab7bbf3617faddc3c5402d9df094b37745890d,2024-12-27T17:28:23.807000 +CVE-2024-26173,0,1,8bfa7b214d5be2960259cedbfc2efcd0efd4edb3fc123fe20fb752a4ed727561,2024-12-27T17:27:57.820000 +CVE-2024-26174,0,1,404eff0b96c24fad4c41c1f4f8d5d624271ee6b8595afaab498e46c1b4b74b14,2024-12-27T17:28:23.807000 CVE-2024-26175,0,0,81e82933e9a6ac39990645b00898a4d88fa07ad1b9c0a199240db1fcbe947200,2025-01-08T16:44:43.310000 -CVE-2024-26176,0,0,3fa7c590ca078e2dc9788a850bf058f23adcc943db1bda7dd6d51d0426888fac,2024-12-27T17:48:16.630000 -CVE-2024-26177,0,0,140c61605091974d5f7c9b823f5c9fad32b4393d01a2f9fb7dca92d2451fc583,2024-12-27T17:48:45.967000 -CVE-2024-26178,0,0,77a13c16eb092c06a4b9efc112f2c6310896b9c693f815128487ef8b2e740ba4,2024-12-27T17:12:57.623000 +CVE-2024-26176,0,1,cf9c765e30156837e92e999ed17c7d3a994e0a7e258535fa40bc99e58e1e88f3,2024-12-27T17:48:16.630000 +CVE-2024-26177,0,1,ffbf79a1da6c609757b76db372365670601e4f798481140f83dcccdf54929f29,2024-12-27T17:48:45.967000 +CVE-2024-26178,0,1,8bec023c3072076a474834e9d0876e8c8177fd992cfef702eaf7616593be59ff,2024-12-27T17:12:57.623000 CVE-2024-26179,0,0,5e959c3dc59a642d86611c4f2fc63baea95247dcbf24cf0d54636cfab9a1c16c,2025-01-08T16:44:57.670000 CVE-2024-2618,0,0,b476fc0bedf83014aa48a984c6371e33ad232b973d35d0c9b9acc50c28ee23dd,2024-11-21T09:10:08.630000 CVE-2024-26180,0,0,2d7983b542e422c616db5498c3e51f052f2bebc5b7387ccc79eaa507b34f1493,2025-01-08T16:13:27.780000 -CVE-2024-26181,0,0,bb21cc2354e89b2223370f46966d5bd78361e859d5124ce037ee99f38492bf50,2024-12-27T17:13:10.520000 -CVE-2024-26182,0,0,14e7459827ebe4f5b4e619965ba9914b121235c5bb72dfe561ec5ef874dc387d,2024-12-27T17:13:24.903000 +CVE-2024-26181,0,1,7aceb198fba1c51198cf6d5bf87a52904880c7e8054e57ac4b3b21f414ab9ab4,2024-12-27T17:13:10.520000 +CVE-2024-26182,0,1,c034fb719b511dbe4f226ca30976b20cdcf01246ab0306674f299504c7de1262,2024-12-27T17:13:24.903000 CVE-2024-26183,0,0,e4c2105e6ca0f0e1cf6946a63e67eb64c1c0e33a848d37ce72c5f906a70e3a26,2025-01-08T16:13:44.660000 -CVE-2024-26184,0,0,1c16dcc7c54a331432bf60e07ad47ea98087ec260c1a0a58b3b6ac2c53861298,2024-11-21T09:02:06.237000 -CVE-2024-26185,0,0,8d258551a03f6d853387332213ed65690b50d09b7ce58f79f04f923ece3e688b,2024-12-27T17:14:05.590000 -CVE-2024-26186,0,0,951ceba60b890e2d798c51d8118f7a3180cdf931f1ef9f336e5ad2dc5a46d885,2024-09-23T16:48:36.993000 -CVE-2024-26188,0,0,dc54c4d9a5d848ec0b1e8b8383a55a611364acd7c047ade8b5f14981ef4b7578,2024-11-29T20:41:53.547000 +CVE-2024-26184,0,1,8aa7391fe148b3f3c30ae8028a4827166f081713570b60b4d2980a242dfffcc6,2024-11-21T09:02:06.237000 +CVE-2024-26185,0,1,8e857220041b0123173945dedccb438a3b4788d3d569143c1a201ebe3a4a2812,2024-12-27T17:14:05.590000 +CVE-2024-26186,0,1,ace9026172c60f84985daa37b1b83a28c52a234521f5e53d8a04c9c65d74c0a5,2024-09-23T16:48:36.993000 +CVE-2024-26188,0,1,4fa0ef0f63f35fcd394a629137e9959f24528fd9f698f1fbfdece529256b50e7,2024-11-29T20:41:53.547000 CVE-2024-26189,0,0,707c143c0adf422e6ae15318ded6112bddd6e1c6886b075864e1b625b7806a3b,2025-01-08T16:13:57.177000 CVE-2024-2619,0,0,f13555722e45f2cc192805496a6b4cf1a80d2448e7cefd54b5e79e390f0f935e,2024-11-21T09:10:08.750000 -CVE-2024-26190,0,0,cd3063d65b7cfa0d6d76f32a5e4d79ea614249f1437ce0653ea13fbafbff442b,2024-12-27T17:14:18.263000 -CVE-2024-26191,0,0,2b55f500e1886402c0bfacf8bfeae1423eaad9f386f2b496b231785464ebaea7,2024-09-23T16:51:43.927000 -CVE-2024-26192,0,0,902591bef94f52ba914c3fcd6fecc2d37a089b0a8650f5c905e8f55fef155ff1,2024-11-29T20:41:36.453000 +CVE-2024-26190,0,1,9aa996cbd37438ba00bae59ee41a8039997c9c815f24a15de95b6d66c0cc8f2d,2024-12-27T17:14:18.263000 +CVE-2024-26191,0,1,e852fff2788cc796f1bea267458b7c45da1bfe02b071f0c7e26ad0152aadc614,2024-09-23T16:51:43.927000 +CVE-2024-26192,0,1,249d76abe78bb6ebc4596026cd3ea364f257197c4284746e208e420e13926786,2024-11-29T20:41:36.453000 CVE-2024-26193,0,0,5b2846dfe3ab7b2789020ebcf6378a67c3efa5316ed507233a139056db8ffdb1,2025-01-08T16:14:25.807000 CVE-2024-26194,0,0,896c1b3244af1aab0410c0e336846f4c15f4927bd98e15fce9942eb2533ea244,2025-01-08T16:14:44.903000 CVE-2024-26195,0,0,ff23d974d5c3725b3c026b5695bba3d1982a35590366b917117a509b5e84cadf,2025-01-08T16:15:12.980000 -CVE-2024-26196,0,0,a307bc6f11b80dbe1dace8a44cd97db91996f1d88f45980bd5d679d6ff6fbf85,2024-11-21T09:02:07.560000 -CVE-2024-26197,0,0,b4d347eb956c125e9f4823292b403ccb4b3a782f997ecaec3a18ff58a2965b27,2024-12-27T17:14:36.480000 -CVE-2024-26198,0,0,e84246f9a50ce130b577ac09bbb53f0b839bbe0b88ca56ac36c78356e6403593,2024-12-06T17:12:07.640000 -CVE-2024-26199,0,0,de92fa6956c0375e1cc6cc07bb193dcb58ea6bd7f5ca90a22b99af62ae11f509,2024-12-06T17:12:27.343000 +CVE-2024-26196,0,1,e4d7a04850d3fdeb71f41fa36d9a917d6af78a46ebfbb3b179f2df3c5b9e7703,2024-11-21T09:02:07.560000 +CVE-2024-26197,0,1,10da3044eebaa8f8d3b3bcd8a3033f49b89667594e57e38d51752cea57c2c7cc,2024-12-27T17:14:36.480000 +CVE-2024-26198,0,1,6c110729cde07e6bc332aefcc9d3c08efcf40d31ba3499c41171089f193acc75,2024-12-06T17:12:07.640000 +CVE-2024-26199,0,1,a8976b549ae97dc174e7efa413b2139166830c103d9d3848e55018dde845b16f,2024-12-06T17:12:27.343000 CVE-2024-2620,0,0,081a1eae077b060a0a5f62f01f683964d107b0ba2c8573d730f1e778e44e6357,2024-11-21T09:10:08.880000 CVE-2024-26200,0,0,66f85cad798699634751b0fcb92fdf5471e0e65f99f92173c000c05bcf9fe3aa,2025-01-08T16:15:36.940000 -CVE-2024-26201,0,0,b695a22668f344c6a5009b94534cd93f805e4d96d32a3c9c05b50b0be3b8117d,2024-12-06T17:02:30.493000 +CVE-2024-26201,0,1,5de975f626c8f47c7255ce118e81781117b3eae3371fab60bfa445317d223ed3,2024-12-06T17:02:30.493000 CVE-2024-26202,0,0,fb896d556747ecbd467716f65321b40ede1c339e758a187990fdafc6277ff7db,2025-01-08T16:15:53.347000 CVE-2024-26203,0,0,dbdd1aaa2777015a30f68c81ec3fada100c571487f1431e6b15ff78ddd79dc32,2024-11-21T09:02:08.417000 CVE-2024-26204,0,0,173dffbee7468ba10d3f77a732bbaa0d8cc93b033b7bb04bd90621e6b81e39ef,2024-11-21T09:02:08.533000 CVE-2024-26205,0,0,de27bf31ab69d42497235f18c71db07132fcbd4955345188ba5775b04377d495,2025-01-08T16:16:05.497000 CVE-2024-26207,0,0,2a618295e04311fdcd807eed2b213dee150e20d395059e0b5bb1e948d10c9de8,2025-01-08T16:16:18.420000 -CVE-2024-26208,0,0,c546b7ba6fe9738cfb1a6d5077c2f4c407e24a16222e2a17068cdcf4f76a6419,2024-12-06T15:39:42.890000 -CVE-2024-26209,0,0,079303da558aa9eef55bdbe0038fa18e334cab0e7233447eb24a997dfebe5593,2024-12-06T15:37:15.937000 +CVE-2024-26208,0,1,67dd5efc6d369d17c59569d101f31edad1df106118efd5376783c637686aae58,2024-12-06T15:39:42.890000 +CVE-2024-26209,0,1,2bbce2643a43b63a11e42fcdb9a853be4678b53524c23cf955a0a5bff6798159,2024-12-06T15:37:15.937000 CVE-2024-2621,0,0,1ab5d8c7854e54144e35f8b5017b4000f6b180fcf0bb9fd27b47a711005a7a9c,2024-11-21T09:10:09.033000 -CVE-2024-26210,0,0,80668a0088efda63c0156312b85125604fcb808022ff6ecf79973436c0b409ba,2024-12-06T14:42:44.433000 +CVE-2024-26210,0,1,11c6431e52401c541d08b6fba66683ebb31d75a18ad9628294d1891122253016,2024-12-06T14:42:44.433000 CVE-2024-26211,0,0,f2b833be96e158ebdfc2549fb79e6559abdc270ddbbd8a3e76c757b1a950eca2,2025-01-08T16:16:41.933000 CVE-2024-26212,0,0,4a2e9a73279a50f170dccd0e0908f4a6122a55fe39b7b69d81a75693627e03a9,2025-01-08T16:16:58.303000 -CVE-2024-26213,0,0,5a2a2da6d81a01672bc99c3e79b917c0c1e54771e696947d704edfaa4d0f49b6,2024-12-06T14:41:46.023000 -CVE-2024-26214,0,0,8866865b72676a3d79c514af72de9a6fb00238adfc940346c8215eeec13cf909,2024-12-06T14:41:12.913000 +CVE-2024-26213,0,1,c7734177dadca4f56cf835dd8bdd269217fcf8e4b2e396db4cedc59ff869d146,2024-12-06T14:41:46.023000 +CVE-2024-26214,0,1,3798f56fe0a59b875c8c0a99be80c05ff1220c7883358d150b3df45e30f8b623,2024-12-06T14:41:12.913000 CVE-2024-26215,0,0,d7554d957374e469a59aad1e8c053b078f5f3c41dbc5306210a065348173bbab,2025-01-08T16:17:13.453000 CVE-2024-26216,0,0,6bc6c747968e33954d7068f7679564ccef439234ef8758a13b6ae97631056074,2025-01-08T15:22:26.050000 CVE-2024-26217,0,0,698d5e9a5bdaffb142a4e11b792e1e07292f2d5a0f3b598dd3353de156063094,2025-01-08T15:07:45.367000 @@ -251272,7 +251273,7 @@ CVE-2024-26229,0,0,553aad4240827e067db49fe129df0c528dd2b5cb7c8699a5a51f37123c987 CVE-2024-2623,0,0,ad6ff4830c0fded63885ae0db2a00cbeed8247716bba8c3596a4bb3cdabc545f,2025-01-08T20:15:47.823000 CVE-2024-26230,0,0,69377b64970d710af9e251debe1b54da41351ea80d23b5be64d65d9ef5099bf1,2025-01-08T16:32:41.670000 CVE-2024-26231,0,0,b932e0c89a81d839ec530889e3bba74a55df396ef61aac39c031a3add1c31c60,2025-01-08T16:33:08.860000 -CVE-2024-26232,0,0,3b717e9ae005d4734140ff5837bde84cda000758a327ccc4b5664a77a5b55004,2024-12-06T14:39:54.630000 +CVE-2024-26232,0,1,c7436bbb2e8a1160dfa54a94fa50ff97f7650d97feab4c7b93dc2b159847d1af,2024-12-06T14:39:54.630000 CVE-2024-26233,0,0,ebcf3f7a7aa4a056365d2c0e5f0419facb47a5848f533fb7aff0f34ffed252bf,2025-01-08T16:37:21.217000 CVE-2024-26234,0,0,db16ed64dcc4ff6911d4071294d440768cb4877bc16f8ef07a35071524aaacc1,2025-01-08T16:37:17.700000 CVE-2024-26235,0,0,90a9c7d5280b779a052ee32ef689e7a17b6061525d8f54b0760b3b681a266608,2025-01-08T16:37:39.897000 @@ -251285,20 +251286,20 @@ CVE-2024-26240,0,0,44d4125112f72e7d129139dc15aefa83ffc03a8b60a0d690ad9a3c8a89cec CVE-2024-26241,0,0,6028c5be189cfe07b2b1595562467d1357458b7d64c5b20e5e1a788670b37969,2025-01-08T15:59:42.057000 CVE-2024-26242,0,0,28ff3319e70f121c7ed20001152362f2c1e8ac6837bf9689b9742203569373ac,2025-01-08T15:57:08.793000 CVE-2024-26243,0,0,724094315d8d7076955b62a9c7bf38765b55cd32433052a6bacb2d50a6cff2d6,2025-01-08T15:58:34.267000 -CVE-2024-26244,0,0,7541ec5473155fdc897929ec7500413844789371b750f5769ea582fc80ab0c6d,2024-12-06T14:33:58.663000 +CVE-2024-26244,0,1,84a72b584f990343f9aa65ea7136ea8a41505d9f0dcabdfd08a4b40f8e23df72,2024-12-06T14:33:58.663000 CVE-2024-26245,0,0,06d4d30f6e191180c494f7d8ab5ef516f537abb83f2f912849288d3af33b73e6,2025-01-08T15:58:55.043000 CVE-2024-26246,0,0,60d13b377c10db048dc34b21ac5deb53732a4d8b2008d8c6f30c7c41df8ffd55,2024-11-21T09:02:13.780000 -CVE-2024-26247,0,0,cea52640ed81546887a0689389d64bc644e12ba6fa979c3acd81ad91d9206a6f,2024-11-21T09:02:13.900000 +CVE-2024-26247,0,1,55a35406de5cee0eb7e12c42c6586214107caa93b488986bd72c70b0e94548bd,2024-11-21T09:02:13.900000 CVE-2024-26248,0,0,40233588a9cfcd917326e1614c2aea1e7c8ff0d83506c41e426b42e4b7986909,2025-01-08T15:59:13.603000 CVE-2024-2625,0,0,06c7a7c95e1e00aea3236f4c8bba83849b4481616872e476ce05bb47111d63e5,2024-11-21T09:10:09.553000 CVE-2024-26250,0,0,27335d2dae1d4ef8ff1daf34ff99a16b2c5759eb5b950a3bb4cbd3859ea8e0d7,2025-01-08T15:59:38.290000 CVE-2024-26251,0,0,bd1db17ac5da21ecd817685a80204e8aed337c915553f24e49042f322f98a6a5,2024-12-05T19:29:12.660000 CVE-2024-26252,0,0,32222337ba86a09cbf6a7c5c00e27d16b0157c696742d27eeac7edfe711bd89e,2025-01-08T16:00:05.467000 CVE-2024-26253,0,0,4febcc3e9d1b8e957022765ee0df2f5e64595be8ddeb5bea7d7a16a047f728e5,2025-01-08T16:00:24.463000 -CVE-2024-26254,0,0,d25b1273b9feb301eab47fad4ae85e4ab128d1c06978252fade60d032721b613,2024-12-05T19:14:00.320000 +CVE-2024-26254,0,1,e1ed79f7082b022def15150b5a9b00e30283171f1ddbe7c8a3fa43beb7fefae6,2024-12-05T19:14:00.320000 CVE-2024-26255,0,0,dfdfc865ed065a338ae831df725f6adf057e80f7bd35c83886a017feecaf0e64,2025-01-08T16:02:21.560000 CVE-2024-26256,0,0,6c688574d1f3e9f7a8263907c5232ac256d7e74b6e437de7598b14f43b4cfb40,2025-01-08T16:03:05.373000 -CVE-2024-26257,0,0,b8bb637c848aeb610a87bae7128adefa902fe8fdc7bf11c9377e5065cc3416fa,2024-12-05T19:11:37.323000 +CVE-2024-26257,0,1,6bbf32f20548cfee7b6fe08b29c1830e10505a149e346718bf1ab9c7e655ca39,2024-12-05T19:11:37.323000 CVE-2024-26258,0,0,f44dbe4ece2a696fe76796e8cdd34f69e383db4a2848f8680d1714e4770f70a5,2024-11-26T08:15:04.673000 CVE-2024-2626,0,0,187238078dced3a6eb09a09edaeaa9bf7f43988c2088701468fb3aeaed9e9f87,2024-11-21T09:10:09.767000 CVE-2024-26260,0,0,10c52b310b4ce26ba15bdeb8b719ff91cc2e0da6bda96c0df2a9dd8f26e79b60,2024-11-21T09:02:15.367000 @@ -251487,7 +251488,7 @@ CVE-2024-26618,0,0,3be46d8e494c76778ce26f489ff9887dc160c7e4937984d288af7894c48c4 CVE-2024-26619,0,0,47ef9d76f9826a5a5e8ba4e9250a722df14dc33a348ae160fc1d23110278689d,2024-12-12T15:19:41.967000 CVE-2024-2662,0,0,1c2424fe7ba1293a1a8d258761d5193dbd4dbf056c7fc12b13f4e9af64b90758,2024-11-21T09:10:14.287000 CVE-2024-26620,0,0,5c124f9203e78c511ecea4b65d08b8416fe0d09aedbc7125a2416556c4b83f7a,2024-11-21T09:02:42.407000 -CVE-2024-26621,0,0,f287c9063032a301fe385469e2711a2664244dd0593a1fc0cc0e696517e3974d,2024-11-21T09:02:42.520000 +CVE-2024-26621,0,1,871b933bd86aaa850cbd9679bfa09340802051ea6b410b9ff526d9aacdbc9dc6,2024-11-21T09:02:42.520000 CVE-2024-26622,0,0,44771474d96e6a32e262a8e82c8d605514616358779ded6b7654a20fc0c2a12a,2024-12-11T17:36:15.267000 CVE-2024-26623,0,0,0559021091993fe9db37214ef7cd77c9efff423028df4dd92763f3af84de83b6,2024-11-21T09:02:42.767000 CVE-2024-26624,0,0,dfec722c86cb19deabe85be0fdccacdcf71bc34ee8cead4ebe6ca2d88e75d73c,2024-03-27T14:15:10.163000 @@ -251522,7 +251523,7 @@ CVE-2024-2665,0,0,7d353e3768885e4e4ccec25142dfea412a0d57b9ef35aaee4fe4d95b6836fe CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000 CVE-2024-26651,0,0,898711d0c00a026cf190f460e3b24d2751f2699fd4b1b6a25eb50a9711c0c7b9,2024-11-21T09:02:46.027000 CVE-2024-26652,0,0,105744a3326cfd97769655231f5141eceba4e2c7ae5c2e6279ca9167a71c0f9b,2024-11-21T09:02:46.153000 -CVE-2024-26653,0,0,db98f320cff58271fe6aaf7bf6b15792fa97acb1234731d2ecea6f7465086264,2024-11-21T09:02:46.333000 +CVE-2024-26653,0,1,4d75bfa90a538160528cf05cc891ba32fd6fa58ea9b84f1176273b0b06b99565,2024-11-21T09:02:46.333000 CVE-2024-26654,0,0,073ea408c21c8db50fd749dfd7c5e328ccbb2cec2bdba16431e35630b902ea58,2024-11-21T09:02:46.457000 CVE-2024-26655,0,0,44c6fc1f60aa28c9bb65a03278297b88c473f78c7cccc5d35bc94149a1733e48,2025-01-07T17:19:13.987000 CVE-2024-26656,0,0,87294d191c345c70a4c471a87fe66eabdaba9c1d9c21608ca348166e40c96d44,2024-11-21T09:02:46.717000 @@ -251561,7 +251562,7 @@ CVE-2024-26685,0,0,d788863551b13aca79bd9e91f7defc379df7538a66da57b8c8f0d772600cb CVE-2024-26686,0,0,c1cdfdf069774f9f1a258f3fcde20f093223b3fed9526d89f0a4d95e2acb3a5a,2024-12-09T13:10:00.537000 CVE-2024-26687,0,0,55d2e164366a53f2463770b85dedb6b40cdbd484c5c1068cd2bbd41cd0d1cb60,2024-11-21T09:02:50.820000 CVE-2024-26688,0,0,a0933753ecf706512391da968c1bf6e01179d03229619ccebb51447535c3b458,2025-01-07T21:12:29.727000 -CVE-2024-26689,0,0,3990e6568ef2171cfa776ff7d235c6bb3e88f3ec5aa2c29b003efb5d71ec2178,2024-11-21T09:02:51.073000 +CVE-2024-26689,0,1,4ed3a561454257390bb78f95038cc93f9906f09f5e32e9c2cf404ed0d1681252,2024-11-21T09:02:51.073000 CVE-2024-2669,0,0,c588913dfaa588cf78efc07ab4d9bf054643db6c53a4f3ed9269092984658c62,2024-11-21T09:10:15.140000 CVE-2024-26690,0,0,2c7b24fb82937969d4004e2fcf893dbb69bba8a0a64d7e77bdd23c96decb3399,2024-11-21T09:02:51.193000 CVE-2024-26691,0,0,7878b9be6d1b840ce81b6b9ba5d2bb037a477b0ec0114b4a6fa216b7702e37ca,2024-11-21T09:02:51.377000 @@ -251578,7 +251579,7 @@ CVE-2024-26700,0,0,d340b64f76c76c9e47b3fd93523ba35bc98d09d990c5461e898e1d4216e03 CVE-2024-26701,0,0,b03e1ce32248050afb32bc7948ab24791df0affca83332817771b6e5cd8267b8,2024-04-03T17:15:50.720000 CVE-2024-26702,0,0,b5af06f31671bccc450c0989ef4ab99a946595a7c4a168f34f6c9ec495d6a954,2024-11-21T09:02:52.640000 CVE-2024-26703,0,0,8e81605caebe413a04ffd15d9f1628a42c2dec0efcddf166b5d3f822f05e79e7,2024-11-21T09:02:52.843000 -CVE-2024-26704,0,0,528c5b9032c2a84224c12f5bee9bf6079c6aa2903540b7e4295975fb5d573f2a,2024-11-21T09:02:52.960000 +CVE-2024-26704,0,1,823b450601f9317f69d533128b8d97d590e753733ff1a0dc508fcc61b3f64939,2024-11-21T09:02:52.960000 CVE-2024-26705,0,0,a308adda031f2eda9cd983e43cb1e8f1e80f61b260a2234635f0d97047565cc3,2024-11-21T09:02:53.087000 CVE-2024-26706,0,0,b6e079a708d094b83bb5d7417439ddccf1c4f1876e5690709f65a274752091a0,2024-11-21T09:02:53.200000 CVE-2024-26707,0,0,1806350bbacbb6f76de5db409398dc8a7b1e6f15c7084d9e746c55e2adf05efe,2024-11-21T09:02:53.313000 @@ -251611,7 +251612,7 @@ CVE-2024-26730,0,0,4282f275af7b9ab810034661a7d2fe758e353eb17c2f903213e76a01d8248 CVE-2024-26731,0,0,93df8098dbc8b35339297c34d2cc186ab96abe59edc56773a7bed56c8ef330b4,2024-11-21T09:02:56.323000 CVE-2024-26732,0,0,003cd86bc54b6d234b263b16629e7ef74b70106d83dacab9f88db9f494fc6a67,2024-11-21T09:02:56.510000 CVE-2024-26733,0,0,da33e07722e15d2f0a18149ad788ee6ccfc0a2e4bd4d72b5d551c09bc1b88e06,2024-11-21T09:02:56.620000 -CVE-2024-26734,0,0,d8df93e379db9f8ef23f0da2e3b3ff375dd783ed41c8881d3342919ab9533b91,2024-11-21T09:02:56.750000 +CVE-2024-26734,0,1,6ab80d297526edf0a5f7da1eb0838ba1cd12b2226c806c2e2718d84a48969abd,2024-11-21T09:02:56.750000 CVE-2024-26735,0,0,23416017cb42c35b17ab61282110d884834e0c54e876d15ce4bdaf6d667bf541,2024-11-21T09:02:56.883000 CVE-2024-26736,0,0,b29129ddb5d3afb3852cff1b0fe131c66351f86286513d203d1c2dae3f9ca5da,2024-11-21T09:02:57.090000 CVE-2024-26737,0,0,03a6f3a24bd6f11bc15a839c4e708d9160bb2b3e53fb885adad418a2aca958d6,2024-11-21T09:02:57.210000 @@ -251626,8 +251627,8 @@ CVE-2024-26744,0,0,726af10ee1f156ef71f781f51f99bc1a73a1bd929743db54f0e9c55c799e2 CVE-2024-26745,0,0,b947ea109848474d6dfda2fbe16d216499111dccdd8dcd26899f1b894b9ea211,2024-11-21T09:02:58.403000 CVE-2024-26746,0,0,86aa0528dca44c4fb5b6b5072954273d7d042341aa7f2115eafd32b46402ba28,2024-11-21T09:02:58.613000 CVE-2024-26747,0,0,323d7942a2bf93956c96ff7aa8e4bf36497c276d5a0d7fc71fdc942c53c206ca,2024-11-21T09:02:58.743000 -CVE-2024-26748,0,0,d652ceabee7eab5f0fb0372cd4d6d79fe3d46b2b998980cfe5ac831b2cb3b97b,2024-11-21T09:02:58.950000 -CVE-2024-26749,0,0,4d7cd115e08996ef98a89e554cf835d0e41003f829fc2e71f85f2c3f3a45601b,2024-11-21T09:02:59.073000 +CVE-2024-26748,0,1,f0b831fa46373e199241b51e11fbe15b3f24cb6595cccb4a8bb59c03060d76d1,2024-11-21T09:02:58.950000 +CVE-2024-26749,0,1,daf2010feebeda07ddb8f39fab26627aff8ca73f4bad451fc73ca8017de137d2,2024-11-21T09:02:59.073000 CVE-2024-2675,0,0,d0b8d303ec050738f9100bc1bb074607a2308630ba87a44f70995ffd76e0964e,2024-11-21T09:10:15.980000 CVE-2024-26750,0,0,94dd61c3c28ff5b4b8be06dbb38fde205c5b9d50e1d14542fa5032faf9ddf704,2024-11-21T09:02:59.203000 CVE-2024-26751,0,0,1e619e8fe0318e1c48482a9e82bff0725291c1d0b69bffec38f5e08d3f2af80b,2024-11-21T09:02:59.333000 @@ -251785,10 +251786,10 @@ CVE-2024-26889,0,0,0a87ef24881e5a1013b327bce78ea618038475fe9f273fcf03f83972360f5 CVE-2024-2689,0,0,efd9c698169d4dc6b507d633d5c5bca5635fd88f4fbab04c5f54592266ffc962,2024-11-21T09:10:17.947000 CVE-2024-26890,0,0,d28148780134fe9d4fd26b89472d475a8cd9fd94507e1d0beb5192c2d01a8c30,2024-11-21T09:03:18.677000 CVE-2024-26891,0,0,18ef1231e3dab94fd46bd51769a57b4742af39b60702f0ac393cf1e3791be7b3,2024-11-21T09:03:18.877000 -CVE-2024-26892,0,0,ce4cb82c10aeec82ebc736f786045305536a78476059b38234d44a3e281c34fb,2024-11-21T09:03:19.010000 +CVE-2024-26892,0,1,18746dd475c481f144c90b8e68299886bc74ab8ea3983a4031def8377fe6186d,2024-11-21T09:03:19.010000 CVE-2024-26893,0,0,d7693c4e9fe752b465cf2d288069a1e2bf4fb0527edf72a830b5a88405414f0a,2024-11-21T09:03:19.143000 CVE-2024-26894,0,0,a0a3505846084c5b38d2ae3c10f78c77094fefe62fef76a336ba2b60789b1f16,2024-11-21T09:03:19.273000 -CVE-2024-26895,0,0,1d8f0d76fcfb465e296c9090ddb547144ec98f4667d402b72b119d5e430320ac,2024-11-21T09:03:19.490000 +CVE-2024-26895,0,1,862c3c7e2fb467307ac5e9f6bee5fe1363e7b613c415b8df9d329e026c699616,2024-11-21T09:03:19.490000 CVE-2024-26896,0,0,c6e43fd686585240ffa18e62a933c3ad899a2ecd05bffcaba7c10cff96b5c484,2024-11-21T09:03:19.633000 CVE-2024-26897,0,0,99a4a65c4d2cf2952c1beef32b5c14c24ca683dfde6ce0996f5012d6d08130fd,2024-11-21T09:03:19.780000 CVE-2024-26898,0,0,59064cab5402bdde52c986a7bd49e55f19dd21c4edcf6601694e90d218d8ee73,2024-11-21T09:03:19.907000 @@ -251839,10 +251840,10 @@ CVE-2024-26938,0,0,0c70fb2feb140bdbececb331d09112c041df234a19fd4b8b218a2ac066b95 CVE-2024-26939,0,0,c3fb2db696e04ae1904b668515e0031ce50a5de2baf1f29a140797ebf4ff5018,2024-11-21T09:03:26.017000 CVE-2024-2694,0,0,4d728e1d04ebd874b9753d4251373dca1c8d4686a42dcbe990217886910977cf,2024-09-03T15:10:54.557000 CVE-2024-26940,0,0,d30d92f81d3759151961c208b8359740afa7da7c58e7ddc1f671b87559059ac7,2024-11-21T09:03:26.170000 -CVE-2024-26941,0,0,1d6efd695f66d511daa0d8eaec054d7444d38fe4b5707d7300cea3a0a43abd28,2024-11-21T09:03:26.373000 +CVE-2024-26941,0,1,cadeff2a3df91773dcc45aea1b6f150892f0797adf8c2ee27d0d75f1e01c5223,2024-11-21T09:03:26.373000 CVE-2024-26942,0,0,39f881a4e4cb31695225028db7c03542160cc9b05d12914f25d1ff64ba466f9e,2024-11-21T09:03:26.500000 CVE-2024-26943,0,0,16dd90efed42e45678ccacbd406baa89e1f909d5f0edf94ce4fd707ce6158956,2024-11-21T09:03:26.737000 -CVE-2024-26944,0,0,1a71bfc02d4dfe61d26bbceef3e349004de0be4e018f310ecc896164d8e0121a,2024-11-21T09:03:26.850000 +CVE-2024-26944,0,1,4e6fdbbe0d24c6263dd198ce6f2bbfb3a16d01dd7d2b8da581c1cc336233dbb5,2024-11-21T09:03:26.850000 CVE-2024-26945,0,0,ae6f96764324a673726732b05b955bd355f5976653ec8b043463e0baff11019d,2024-11-21T09:03:26.990000 CVE-2024-26946,0,0,42cd5cabd74c9173279dd3289adfb70a8262c89e7ffe80862a160dea1859eae9,2024-11-21T09:03:27.650000 CVE-2024-26947,0,0,bf0732699f635e430480999388946ed3c52fc60cc1e2e21486bd1b152f39863a,2024-11-21T09:03:27.780000 @@ -251966,7 +251967,7 @@ CVE-2024-27055,0,0,567532cde91599899067f455d5c7b87fb6bd7d422556d36a861d5078f328e CVE-2024-27056,0,0,0c46f13676f36e598862e1367000c5f83b6f006bf4cfa76fa723d92a467f92b1,2024-11-21T09:03:45.980000 CVE-2024-27057,0,0,59020acf3ab82c0eef52cab6667be5665e673c02ff7c385265b72e8eb5c4ebf2,2024-11-21T09:03:46.097000 CVE-2024-27058,0,0,e8e18c8efb56c2ad87995b6dc7ebbe8c01bb5c8a51c8ae719afbfa612893fc4d,2024-11-21T09:03:46.217000 -CVE-2024-27059,0,0,908c2afe474cf2b7a4af9f85eb1e71ea5c6edb7664e5a06d4976d064fbcaaf54,2024-11-21T09:03:46.410000 +CVE-2024-27059,0,1,12162d50eed4060c0ec19988202d1d5d7cefce6ae46d436b40a3dec4c213dafb,2024-11-21T09:03:46.410000 CVE-2024-2706,0,0,ec4b783f22cb2952cae8bff1153eed6be7a282f6f994a45b7c4840589cd8711c,2024-12-12T17:27:56.637000 CVE-2024-27060,0,0,22bda1115b48ba58b7256e3896819cc9078fb8284ee48e35606dd5d9241e5131,2024-12-23T14:22:29.173000 CVE-2024-27061,0,0,36106eed528d548d97b156ede779488bb9a7ed8362c8cd75e4e522528c004492,2024-11-21T09:03:46.663000 @@ -252162,7 +252163,7 @@ CVE-2024-27244,0,0,3ea43f42d5905c8f2e1abb3facdcea93d942c7980488e9ccc833afa0c3630 CVE-2024-27247,0,0,80b2c738afb7fd372a582a5de229fc1b8561eb2e037fe8418073b03a3ca01917,2024-11-21T09:04:11.573000 CVE-2024-2725,0,0,b1b1eca530920ff690dfb0fd89719f48c747479f1615873b2e02b96009cc4c1e,2024-11-21T09:10:22.883000 CVE-2024-27254,0,0,12b735938e92147b71e9b36ac9a59ad706596e2b0d7f3009adfcc8f330eb86b2,2024-11-21T09:04:11.710000 -CVE-2024-27255,0,0,e6a550e0d0cf47ef40d74fbe3f602e64b9f39121e108586b209c927b96a53b4f,2024-12-23T17:32:58.470000 +CVE-2024-27255,0,1,020719b04fc3be92fab5ca4f611d61c95e87ea030f34dc99fa55e1be11bc830e,2024-12-23T17:32:58.470000 CVE-2024-27257,0,0,691c5dc8e8ee6dc8cf4d467dc5d3cecba3bf33df4b5a8f7cf103f192a777dc97,2024-09-16T14:26:15.400000 CVE-2024-2726,0,0,7bf287b1ed61a27957754b43bb3eb83ce224f5526d7a8605b12bacbec8912e82,2024-11-21T09:10:23 CVE-2024-27260,0,0,d8abf1871a989c63042ef17773af437c6f9012fbd4c3caf016f954fa2e26ad04,2024-11-21T09:04:12.017000 @@ -252218,7 +252219,7 @@ CVE-2024-27311,0,0,0c755bcc622ed9c321ec0b34f3a1b0b3952780668adba0a01799036912b6a CVE-2024-27312,0,0,950a896b01dadefd880d8932f3955c9f66315651b266e13635b82b30b52a3a82,2024-11-25T15:14:53.217000 CVE-2024-27313,0,0,35d4fc5dcf7fd82874d8066658bb141d6133e1d7a3505f1ab33a062d023280f6,2024-11-27T16:24:25.567000 CVE-2024-27314,0,0,c7800ff43b3dde4e64855ff4c8e9e09054f2d9523de2c8225fcf94e9bdda5465,2024-11-21T09:04:18.717000 -CVE-2024-27315,0,0,69876f0445be2a257463a9ba8aea4c576cbe92cff0d007bfe9a7f96610752dec,2024-12-31T16:16:15.510000 +CVE-2024-27315,0,1,d76b0fcdba6f7b4b207cb9b903ce70dcff45e546dcd16fd74a8323c6a63e3929,2024-12-31T16:16:15.510000 CVE-2024-27316,0,0,24fdf0f9b0ad852f5d9fcb01da998781549ca6c0b793197d9e2355018b079f16,2024-11-21T09:04:18.993000 CVE-2024-27317,0,0,b8cb397c1dd25df8528d924f4a62d807beeea4e76cb88f463ebe43293b5fadac,2024-11-21T09:04:19.237000 CVE-2024-27318,0,0,a39bb4bb6ceefb9dab21937c537b420423d8cb9a6ce6d647023eb496b3d6b5b8,2024-11-21T09:04:19.373000 @@ -252302,8 +252303,8 @@ CVE-2024-27391,0,0,74e7ba782a652174d6e44269cc22f7e3eae02e2f8b1404503a1469482e17c CVE-2024-27392,0,0,51788877a716c0011203ead65a89d91afe3ce071b5d9cd963e34730d678899ad,2024-12-26T20:32:43.923000 CVE-2024-27393,0,0,7acb0ea1cd19fda4e5e2f41152272208ba891fcce16f238ba8adfdf815157c77,2024-11-21T09:04:31.160000 CVE-2024-27394,0,0,b26d808a796a57c43a2737a6a589c18d606c49ce4d9b02ac0d6935ec64645293,2024-11-21T09:04:31.353000 -CVE-2024-27395,0,0,382be4ce57e2928f9f423404c862ffb55eb3f199b7e3281c1e7eeeb44425697a,2024-11-21T09:04:31.553000 -CVE-2024-27396,0,0,a67ff74b150313d92729b543e1c3f2ff1c3e0cfa4b48638e3d43a8835950144e,2024-11-21T09:04:31.693000 +CVE-2024-27395,0,1,6842fb42e53d51c3654f6b6ebd209a39716d73e38e54d6de2b29fab32ebd174b,2024-11-21T09:04:31.553000 +CVE-2024-27396,0,1,5eeae45667d4aab8e300e0bd0600148308ee4abb6b0f330c9d893b5a5d2ec620,2024-11-21T09:04:31.693000 CVE-2024-27397,0,0,aa595a4f1af133353403fbda30ee2eba1c22c43a6d923ec09fbe34a915bc914a,2024-11-21T09:04:31.830000 CVE-2024-27398,0,0,5d668964db5f8581f993f825ac2b92d8b5b4a6d169822c73d205cf76d493b5f2,2024-11-30T08:15:05.417000 CVE-2024-27399,0,0,2441bead541c7f566e35edcc3bc5bc55c9b6f47a2e4593c9316c027e34d9505e,2024-11-21T09:04:32.110000 @@ -252714,7 +252715,7 @@ CVE-2024-27976,0,0,822a5af21c1e2c8fd675938b70649904f7b60e8d1b30e50919271624e829e CVE-2024-27977,0,0,32c3ab10b4aaf757c630e2f8e271f8b8b7bdb65e5c29242ffffe4966a9401d4d,2024-11-21T09:05:33.017000 CVE-2024-27978,0,0,fcf4a7e5ff185d237258fd9843b63a3870e8188564ad41e6f5398b29b01f25a9,2024-11-21T09:05:33.160000 CVE-2024-2798,0,0,42a688477c03d28333b835d649074031b849af5a5f40c37d893c1ff6d5f5c00d,2025-01-10T21:34:59.457000 -CVE-2024-27980,0,0,70cbd7895b2057f0d532c3684b93369dd043ca53d2019925dd8b1d073c9f8950,2025-01-09T22:15:27.777000 +CVE-2024-27980,0,1,e3f5f1d6ab8508e8ed6376e74d4da33550261128169fc4a605343d449112340d,2025-01-09T22:15:27.777000 CVE-2024-27981,0,0,5ad287609e78a5c57ad9f50892c9f3767ac8a9a55b04be511b8a794f3a0d6265,2024-11-21T09:05:33.330000 CVE-2024-27982,0,0,3b4edd38916d4b70e6bd265fb1fcaa37369c9af685bd7f99d27c1bbef3d48182,2024-11-21T09:05:33.463000 CVE-2024-27983,0,0,b2589cbbb580d16047bd9ecbfda79c782676d32c5fdcf965b61589244d8bb50d,2024-11-21T09:05:33.613000 @@ -252916,7 +252917,7 @@ CVE-2024-28186,0,0,dbe644f0d73db6e0c226eafd6a70e1fbbab0d471fc2640cee55ffd8ab6efd CVE-2024-28187,0,0,0a3450f5073be1d4240c0ef0f2f407d6b15b5cea6d54b8a4ffe80e8263924365,2024-11-21T09:05:59.240000 CVE-2024-28188,0,0,e75215c635ecc7d09582fbef46324329d57c09d369f24af90d98772bf8f316aa,2024-11-21T09:05:59.380000 CVE-2024-28189,0,0,60ed687c41a6d075b26b2f0112d4217df779ccc45bc9e63ca6d0ed32ad3da9b1,2024-11-21T09:05:59.537000 -CVE-2024-2819,0,0,43ca16899541da9fbb5eb9de1dc4bdf6097c65e2e29e2a4a28867bd5f830e0bc,2024-11-21T09:10:36.070000 +CVE-2024-2819,0,1,6daecd2bbfb467d8a24e5dcfb2faf4c02588ef96e9150250558dcd9fe5f2ba9b,2024-11-21T09:10:36.070000 CVE-2024-28190,0,0,64d767f22b54a8c9829905152c1dacb62aa7a3ac07ced83ef3dfd226a336afb0,2024-11-21T09:05:59.677000 CVE-2024-28191,0,0,3c951e3228d562f8d7ca690d2b0ff43bd081b803248dafa6446513391a31dff4,2024-11-21T09:05:59.800000 CVE-2024-28192,0,0,7710241b372f15cd48783ff863776a66f46b4b3cd57ca39601c199ddf835e1a2,2024-11-21T09:05:59.927000 @@ -252927,7 +252928,7 @@ CVE-2024-28196,0,0,5935adc603506f91db2ad215ee3616bfe048394ec93eefd8b8d42fb8dd299 CVE-2024-28197,0,0,1ae2047ecd0c4043e0bdc00ceaccfcd5a2d21148692c0ff8a3261be8b479f2bf,2025-01-07T15:54:40.987000 CVE-2024-28198,0,0,761cba225c385d498bdd6fba40bd3dda8cd3d08c2183e5b794fada4afb002ea1,2024-11-21T09:06:00.677000 CVE-2024-28199,0,0,ce7b5d92a4f57c9e2aa64edecef6ee8520d5af49c8b77489080d765a812d8d41,2024-11-21T09:06:00.800000 -CVE-2024-2820,0,0,4d0e26921d742b5d6f7e0ce43a1d980380526277b25e57c51d6b025d6bf05566,2024-11-21T09:10:36.203000 +CVE-2024-2820,0,1,10125a83ec654c7d52c13bc3601186a4bd5649ffb2952f1b9f8e8420ae0de5ff,2024-11-21T09:10:36.203000 CVE-2024-28200,0,0,0263772c352f3b54dec3441087735e67380564a41516129e2d57456ae7e8b152,2024-11-21T09:06:00.940000 CVE-2024-2821,0,0,013e485c62278e9803d4e03b9cc054306cb2815aa9d9510591986d84cdeecfa8,2024-11-21T09:10:36.347000 CVE-2024-28211,0,0,274465e9b1b289ed4f1d51360f8322899ef1882a0d864c3fac9bb8e180a0b55d,2024-11-21T09:06:01.113000 @@ -252943,7 +252944,7 @@ CVE-2024-28224,0,0,4dc495d1b5391a5805b35b2cccf549718cba127cbcdb7a2bab566e35ee980 CVE-2024-28226,0,0,a04adc45d47426d327f332ffc617a958172e7494aece288fc40840e9be086147,2024-11-21T09:06:02.767000 CVE-2024-28228,0,0,4c70949e6df8bcf2882fac2da178d0d5c63a3ff277dc66365cbdd98196ca17b4,2024-12-16T15:06:31.563000 CVE-2024-28229,0,0,91f2c6bf4f4cd9f37b886899d3e16c101d8f0aeb77afc57f338cfea95f7a2e46,2024-12-16T15:06:00.407000 -CVE-2024-2823,0,0,616fd3f02b6fbcafbe8ddb74810cbccaf8c5a31f6fdd4cffc69174176dca38cf,2024-11-21T09:10:36.770000 +CVE-2024-2823,0,1,b2bb5c95e2b4847d5ca04e437a16145f1ab4bb384138948552c46c7d798e0d18,2024-11-21T09:10:36.770000 CVE-2024-28230,0,0,6ee006a554d642707dd81d0df925d8a02a1d248529abab0f06a8e2dc084c1b89,2024-12-16T15:05:43.290000 CVE-2024-28231,0,0,879955e0d3b6b3f4d0d07366e36d2b8c1d2a204b3e9eb4c9d2fa328320c752b1,2024-11-21T09:06:03.257000 CVE-2024-28232,0,0,4016560842e5dbe0556f8c825e8c7f66803aa1fc46a7caeb391820502d6b268b,2024-11-21T09:06:03.400000 @@ -253207,7 +253208,7 @@ CVE-2024-28767,0,0,3dcbbe23de561638ccf8a9738544653a62b61fe75d19cdbb00efaaf18a467 CVE-2024-2877,0,0,e8536f3b9a8db8cfb1a01dc3baa76bd8616106f111c0e4e2021b78fa36854ec8,2024-11-21T09:10:44.020000 CVE-2024-28772,0,0,78e1b65ccd01d2b2cb5151ac2638f146b229ea64b2c3771ff8b54d177679ec5a,2024-11-21T09:06:55.327000 CVE-2024-28775,0,0,6a2db0e9a4b51ca58dc1a2ce04ae9f65cde9a99b61684111bcbdf3398dd02cad,2024-11-21T09:06:55.493000 -CVE-2024-28778,0,0,895e2a4d65da3d78cd823f5e1437f8049521f3de18986a05a966b6187269bac0,2025-01-07T16:15:33.113000 +CVE-2024-28778,0,1,ec5802dfee3b138bf2f66b9c23844fcaeb53806b2668ca7c9490ad6fae2b4a1f,2025-01-07T16:15:33.113000 CVE-2024-28781,0,0,86f3b30ca9d39b2bf52a47caeda684702c3ae5f69d11221a2c8e7af407228220,2024-11-21T09:06:55.643000 CVE-2024-28782,0,0,3827c4b953b1c26f26179fc828e8b34b71d580a39e37d458a5957d5222c3b151,2024-11-21T09:06:55.783000 CVE-2024-28784,0,0,31a16452abfdc2ff65c4b937882456f9364f61d12d2099ccb8cc285baa43f061,2024-11-21T09:06:55.913000 @@ -253259,8 +253260,8 @@ CVE-2024-28849,0,0,fce8d96d043a84934194a3ea53c2248ddb15ea8ac57d38977bd2580a60fca CVE-2024-2885,0,0,633a142213b8958e55f192b95da07bd5bb8c23d90b6f6af638f09073f41aa90e,2024-12-19T16:04:04.557000 CVE-2024-28850,0,0,a37a4283ca549b0be7779ab2ea5db14c7133dfb0bbc8866eaa8e09216cd2a001,2024-11-21T09:07:02.667000 CVE-2024-28851,0,0,64684c9808bba072162a30e9b68edda03449afeb907ef399bbfbbb2b88661563,2024-11-21T09:07:02.793000 -CVE-2024-28852,0,0,0fa34d2996926049a3853f8cfbd3cfe829b2800bca87371526216e20f7c662c0,2024-11-21T09:07:02.927000 -CVE-2024-28853,0,0,c6b3d8ca5dc60e19f977b74c1f3c7e65504369ba6c0c2c39097a04ce40648b26,2024-11-21T09:07:03.070000 +CVE-2024-28852,0,1,63482546fa2b3f28b65933b87aa8cc404ac72bdea85082870561c418ddbb0330,2024-11-21T09:07:02.927000 +CVE-2024-28853,0,1,d801ce6659bef5a0c2aa76673da5f593d407fe31857dc4db7a9c5794128f3322,2024-11-21T09:07:03.070000 CVE-2024-28854,0,0,fc72a1af9a4423f23eb1c2bfab5673b3cdf91d9369b066233da617e99e87a321,2024-11-21T09:07:03.207000 CVE-2024-28855,0,0,acb3d3e157cc68dbbea7f5c0e503c2de3d780f240741901169138f093e88a38c,2025-01-08T18:14:28.137000 CVE-2024-28859,0,0,6f026de9f6ccdab17442bfff936b54d3f18997dbcded841f5c04513f5212d2c9,2024-11-21T09:07:03.500000 @@ -253296,23 +253297,23 @@ CVE-2024-28889,0,0,56e4da21fbc62908e65bc9d6315a2b989ea164aaccf23dde236dcd94fbd50 CVE-2024-2889,0,0,1885c0f2ecfe4bdb417129f70852e4157a6de85584ef6ee4549701263ae39757,2024-11-21T09:10:45.900000 CVE-2024-28890,0,0,3bbdab4f532fab507ef698fd11be91e1ccfe6d2327e03eb3fd78e1be839e0795,2024-11-21T09:07:07.400000 CVE-2024-28891,0,0,89149026c6e5f7e226ede146241710be24ae96a683eeb359126523d37dd3135e,2024-11-21T09:07:07.617000 -CVE-2024-28892,0,0,0675780aff3c9ab12c12dfa28834b58fee94e67a571b3eca76e1a2ca00b4044d,2024-12-20T17:05:48.707000 +CVE-2024-28892,0,1,2e191531e41f7891094b87fe8cebe43719428c7eea4b56c908156d0a86b2616d,2024-12-20T17:05:48.707000 CVE-2024-28893,0,0,db742559f8c06478e8575a7b0b3efd5fffbc67fba44a19cb78f8e38f79742eca,2024-11-21T09:07:07.740000 CVE-2024-28894,0,0,b9faf34ec909306221ab162d492936e7fd18d2418e4f829a4af1d6fc9a632145,2024-11-21T09:07:07.920000 CVE-2024-28895,0,0,d2dda34349233b4529d0456a907510ce0ea82c958aeef35d6f0b65b75c4f7cc9,2024-11-21T09:07:08.117000 CVE-2024-28896,0,0,ae4e1fa0c54824c05f5525000ca636e3351a07ac2127029e362ec0604e9092af,2025-01-08T16:03:33.820000 CVE-2024-28897,0,0,d0e73fd43d40821340a5903ce2161c10e498e76051406a60607624983841c4ec,2025-01-08T16:04:12.530000 CVE-2024-28898,0,0,cf7b0db691b94909b3952f81306d1d22d84a5b2895c23f3d57a6cd7ba0c5195c,2025-01-08T16:04:27.403000 -CVE-2024-28899,0,0,377801cb4fca6674152ad4df3b5fe2a269d017643767d42c77cc19fddc753671,2024-11-21T09:07:08.733000 +CVE-2024-28899,0,1,00d222a3244d6c68d5186a1ff75bf7d608083514538ed1a5316dbc77109a2a90,2024-11-21T09:07:08.733000 CVE-2024-2890,0,0,9f3de28a2d200668c10961a2e062abf955c96d77921e4e0222aeb6258f112722,2024-11-21T09:10:46.020000 CVE-2024-28900,0,0,3f8eb169cde4546b974edc798acdfc0e3a675b69a0c3a20605a7bcedd118fa17,2025-01-08T16:04:41.253000 CVE-2024-28901,0,0,bd7a483ebfff353be5ff1bb2987efcaf79e51d5757af04796119fa56168ed344,2025-01-08T16:10:06.617000 CVE-2024-28902,0,0,8cbc34727ef15998be762183f071f5194164e6931d25fce10389f0f8220e23d4,2025-01-08T16:10:20.793000 CVE-2024-28903,0,0,76d888947943a37b1ce2fc9a7134078c439854dac24e603e98e8dc5730fdb99d,2025-01-08T16:11:00.583000 -CVE-2024-28904,0,0,9f007588993cf4a4ddcca27129a47e2feae065c5111b453c43fc38b2aff0f7f2,2024-12-05T18:54:13.320000 -CVE-2024-28905,0,0,a08eee1382a1bc3a2ad1eab03718f1c1af09a74713904c7f3a9b3b8a590e95d7,2024-12-05T18:50:21.030000 +CVE-2024-28904,0,1,753e369689861bbd8c5ad513fce24c0989fd9510498deec2318cd64eec6d218e,2024-12-05T18:54:13.320000 +CVE-2024-28905,0,1,bd6cc73ace4ca64a4aba1d2929e978761108b1f5196e5463a2a7496495af90a2,2024-12-05T18:50:21.030000 CVE-2024-28906,0,0,2d31615044f057a4577ab855bd3b743067a2cccf8fb6a4a0761ba8b0e41a1734,2025-01-07T20:30:25.303000 -CVE-2024-28907,0,0,6962329ba7e3ae2352f1b9ea34d824ac8e100aa431c0de37f35c4650a2e18f3d,2024-12-05T18:28:21.740000 +CVE-2024-28907,0,1,0a0e9df28d068123203d200496d461a9f5a85cf195778c93d73b68574a7b0ece,2024-12-05T18:28:21.740000 CVE-2024-28908,0,0,e189c552850b13ca5d7cf421de7fdb33bf42d073e18ceb4a8a422b1f433b922d,2025-01-07T20:22:56.653000 CVE-2024-28909,0,0,2869f3da223760286387aba0b464ef4c8875977e0881d377c9525fc6f7881df0,2025-01-07T20:20:43.007000 CVE-2024-2891,0,0,1ff34ae211a25afff02de381688fd5a4684ffa990ce2b6494a9492549a569d38,2024-11-21T09:10:46.173000 @@ -253381,8 +253382,8 @@ CVE-2024-28971,0,0,60c1b7cea147deb90a66336e84867f097cd9c3f3d33da0bd555b1b0b9c115 CVE-2024-28972,0,0,12c7e7efe1195c680c17aa2603704c5c29d6e9fd7636c8c8b733f1d9d5598f42,2024-08-23T16:59:11.070000 CVE-2024-28973,0,0,d31cfbb397638c8a8a10806a5a83781d1474ca76b0c011b42f63c11f6c78eb89,2024-11-21T09:07:18.133000 CVE-2024-28974,0,0,4ceb2d25702587fb6884aff9c95126481230ded3ebeaf86afd58b9714e74c059,2024-11-21T09:07:18.270000 -CVE-2024-28976,0,0,c1ae1be07ec5a31baced881a6305c4e1e293441b0326298bff6917dd839e287c,2024-11-21T09:07:18.410000 -CVE-2024-28977,0,0,d9f09ada903f727b19744b933adaab2112384c4119c793735237736fa2a8ba7a,2024-11-21T09:07:18.537000 +CVE-2024-28976,0,1,c180718ace7ac1e06f9c278b90960f13d8902577afe7806f2edb96f44e295965,2024-11-21T09:07:18.410000 +CVE-2024-28977,0,1,a45310b3049fcdccac896f6a0f9b61331f72d96638faa47cc648f7e6234927bb,2024-11-21T09:07:18.537000 CVE-2024-28978,0,0,da799c0a16393f900a300a366c8e866774ce711453c2c4b1160779dba68ae01b,2024-11-21T09:07:18.667000 CVE-2024-28979,0,0,99a7aab3884e5ebe09de299942c15bf9528d835168880a8bb57f8c808495f0e1,2024-11-21T09:07:18.823000 CVE-2024-2898,0,0,4cb3a6a6d199e8b1603a25e1b35c5463f39d5e3e68ae0a40c243a189156071d3,2024-11-21T09:10:47.180000 @@ -253454,17 +253455,17 @@ CVE-2024-29048,0,0,bcd996b30c051d1b44387ac2961bd1e653077a1995d072b0c0d4b1f423767 CVE-2024-29049,0,0,b4de33718e2a66f5e65d4713457675b539c089be4fac657ccc0a19e7d6ed6465,2025-01-06T18:37:14.790000 CVE-2024-2905,0,0,475c26f278f0caf02a3d877ee86a9d24c3c71da9cf1b51cbc9b4dbccdbf9aab6,2024-11-21T09:10:48.187000 CVE-2024-29050,0,0,44f58c2f1cf521bf680200ab8a0b4bb5be8ceae4f46643b1fbd737900e35d15c,2024-11-21T09:07:27.143000 -CVE-2024-29052,0,0,e2a6654a30b44b3e0686810533cb0247e9e21bb6a5368478f09f6ab182ad942c,2024-11-21T09:07:27.290000 -CVE-2024-29053,0,0,b77ed59231b9c116cc7e530ad8af486867e90af1799e4cf7df2b7a0a9199a9fe,2024-11-21T09:07:27.517000 -CVE-2024-29054,0,0,1e866fb4a6512987938aa9eb4a6ebd0720c280be55ed1e0df32cddebb5ef275d,2024-11-21T09:07:27.667000 -CVE-2024-29055,0,0,34b4bb1a3acd3066744a91cecdfe941450337a606e849fb76b0a879a9aacd457,2024-11-21T09:07:27.810000 -CVE-2024-29056,0,0,9e607943f1430c66c22b61255cfe8e261fc175de9249a1c578594b29cd1b824e,2024-11-21T09:07:27.943000 +CVE-2024-29052,0,1,058430489297e2287c9c708ab61c1a8052dcd6fe648fb5a78044990b3e87d1aa,2024-11-21T09:07:27.290000 +CVE-2024-29053,0,1,92488bef950a567a39b779dbf835ed5aff89176a7e49723ab585362f4d64c028,2024-11-21T09:07:27.517000 +CVE-2024-29054,0,1,ca067f10dbd952f549de490b8a143c5a74d49758923d6326376ec876a34a7b96,2024-11-21T09:07:27.667000 +CVE-2024-29055,0,1,a04fe25ba883ccb44f78366a38aa31576d1a4456a77504bb73087df877c40a47,2024-11-21T09:07:27.810000 +CVE-2024-29056,0,1,af2d4852194edc6cf7527ac504763a06fb815f736d4d1949ca388fe427539418,2024-11-21T09:07:27.943000 CVE-2024-29057,0,0,3deaebdc7af567eb027e3b4630e3d0b2f66daac347366af604fd2bccf7d6f841,2024-11-21T09:07:28.087000 CVE-2024-29059,0,0,044a6984feb8642a951af040c98024cedfb7a63fd2dcd127eff738d3575cbc8b,2025-01-08T18:33:02.303000 CVE-2024-2906,0,0,e78fa1cdb9d009f1e1f59fe20ffafc00d26c9427eeacf6bf57bd9ccb61ba19e2,2024-11-21T09:10:48.327000 -CVE-2024-29060,0,0,af396cbe0064d82e679fb903757b48ee4457b3c97de8af5053371646760bdc49,2024-11-21T09:07:28.380000 -CVE-2024-29061,0,0,52a54c8f53a5af43122eb6a24e6ea10a22f7c7472b299c9e051c0cc4fdcf255c,2024-11-21T09:07:28.530000 -CVE-2024-29062,0,0,39e1cab6c8328a692eb82a137cb5c67b395cc1ce03130a831897468d092aac95,2024-11-21T09:07:28.673000 +CVE-2024-29060,0,1,2d9ad229edcbd026ed72ca28f505019f3a24ccfb94a95ee3aaf358451d2c435c,2024-11-21T09:07:28.380000 +CVE-2024-29061,0,1,7c8701c84f59f89a131d2c90ff8025ec8c1c9a0e30cbf5684bfc2e3a344ea597,2024-11-21T09:07:28.530000 +CVE-2024-29062,0,1,f03a9ee39df1ce87f9f6593d2f68853161a112707f9cad62012855f66733f7d0,2024-11-21T09:07:28.673000 CVE-2024-29063,0,0,bee72f729de29698a3cc7f9ebeb6810ff1d339244d675dc69a9fb16a7c6edfed,2025-01-09T13:36:49.257000 CVE-2024-29064,0,0,f1047475407f41b4a4278520caea13262ff3a01b6b5d085e76d4429789491252,2025-01-09T13:41:45.830000 CVE-2024-29066,0,0,53d8c2d9a72b252868c9617a516caa10bae8ffeb0d381b0a73d178e0d7a811ff,2024-11-21T09:07:29.083000 @@ -253501,12 +253502,12 @@ CVE-2024-29098,0,0,9b1008b83cbe94703d043bfdf5904f8bef4f3123ac6a8137d811039c2b1c4 CVE-2024-29099,0,0,57f43cd8f74c6e6cf95b7da1e8708cfbdd3bc617c2558dc4505d3cb2cde59023,2024-11-21T09:07:33.100000 CVE-2024-2910,0,0,bbc5651269bc757d63b4a047fd6f50531f9ae2606d9c89885eef5674cb9b94c0,2024-11-21T09:10:48.977000 CVE-2024-29100,0,0,4b4ea50e8b1a5f3add3c62cc09873ccb1c0bad3dcfd266a73de4fe697a412abf,2024-11-21T09:07:33.233000 -CVE-2024-29101,0,0,466a7c13b7dc97a9c11fb9778cfdfb4c29f0e5c98241bb7bc8b77363958e8a70,2024-11-21T09:07:33.363000 +CVE-2024-29101,0,1,4c53f37d823edfb3c9fd2b1e626679ebce47a1566475ce9408f13527f7202b51,2024-11-21T09:07:33.363000 CVE-2024-29102,0,0,ed935bbc4f82c0c84be43e4d1a7b61d5ebce7f3fd54cf950c79feff7a35ac46f,2024-11-21T09:07:33.500000 CVE-2024-29103,0,0,d41735cb9da95e849a5b45306d53d28ce564494ecee17e60023a3cbe91f78521,2024-11-21T09:07:33.623000 CVE-2024-29104,0,0,f1f189a63b7a01d1d49f3a6b0cae20a47961d88101d8514d2c423c4ec2f149ef,2024-11-21T09:07:33.760000 CVE-2024-29105,0,0,c66a7fda0a5c9f8df47a07bbce9c424c595eafc32fe89bcf2c583a37e4654e1f,2024-11-21T09:07:33.893000 -CVE-2024-29106,0,0,e43ca02781df97eb9a42c68cd071bbc76bda4a8d7d18edf1496174b796e85aec,2024-11-21T09:07:34.030000 +CVE-2024-29106,0,1,5358d902cefa6be44c0ee6c2d2f511319af57f2f7012640f44e3f1013fa1cdc1,2024-11-21T09:07:34.030000 CVE-2024-29107,0,0,7d19dc574278cf1683013d8ff659c1411a9735a9ace582b1cdb650f880b70eef,2024-11-21T09:07:34.160000 CVE-2024-29108,0,0,0ae5c87de818ee6d85336d44fecde11bf0ad3f784ce5bb54a4b6c764bf7af8c3,2025-01-08T16:30:17.263000 CVE-2024-29109,0,0,4d51f8f3341e8657e6c8c880f4f2d73bd95482441c6ac3a26d0a8cd436b3b41c,2024-11-21T09:07:34.440000 @@ -253625,7 +253626,7 @@ CVE-2024-29219,0,0,6cb3862cf8e230d62963f8de8034eafbf8d60054c65832a91b376f342bd42 CVE-2024-2922,0,0,83a5afc25d53992abc547c7cb27befd6cb6f77e10eac60e242613cf364f65aa9,2024-11-21T09:10:50.853000 CVE-2024-29220,0,0,d56b29bab759f632fe7a8d7605fc23ec1fd1d59c76310b000cb1d69498dd3c7f,2024-11-26T18:15:19.007000 CVE-2024-29221,0,0,719f02c93cb7da40e2b1e83286b78d24631abaf4b186686cd86793f230a27b56,2024-12-13T16:21:08.447000 -CVE-2024-29224,0,0,990a05ee5fa32c33005aab42168313f02b39123ee53556eb4ab784fc1af0273b,2024-12-17T22:20:34.167000 +CVE-2024-29224,0,1,51a97a451d23c0ecf1555d53913f72b7a59110c340a56174e31f0dd604a53a88,2024-12-17T22:20:34.167000 CVE-2024-29225,0,0,987e1bbdbd14475e79c4662d58c64e48774254cfe2bcd4f86e976712c6a388f6,2024-11-21T09:07:51.173000 CVE-2024-29227,0,0,501e8aa87ae697aadab23bc89e443ad6a70b792cda079e07372f39834b8b4974,2024-11-21T09:07:51.290000 CVE-2024-29228,0,0,d3b21f65a7d386f34c45113f6552dd78416f4a705e1e0f7878f25e083826adb3,2024-11-21T09:07:51.440000 @@ -254065,7 +254066,7 @@ CVE-2024-29984,0,0,f8fb919a83fa3c44cbab4d023096f64990d1d2fa8128e3c1036db0426984e CVE-2024-29985,0,0,7ec0abc8ff72d24bf28ea3d6fd9e2cdcb83944427e886b1848059dce25c1d9db,2024-11-21T09:08:44.857000 CVE-2024-29986,0,0,6b79630c4fe76b8f26a75938c4d4e1e90c4fdf4ae6de5522c549b488e3e47194,2024-11-21T09:08:44.993000 CVE-2024-29987,0,0,21dff12d8dbb2ffd877166db2079414da3420ece1c691a3088d54c77e1a4c9bd,2024-11-21T09:08:45.117000 -CVE-2024-29988,0,0,23b0a749208660a6ff0dfc654162a52b649398e53f68d880ee3c39b2cbfea104,2024-11-29T16:28:51.757000 +CVE-2024-29988,0,1,fdcc2acd38f912b5ac21e5fcea047a785698bc825da3363822d605015d6209b0,2024-11-29T16:28:51.757000 CVE-2024-29989,0,0,56c8da873d916d5205300f56ed402933d12560adf2d90e379890eed42730b04d,2025-01-09T13:56:22.663000 CVE-2024-2999,0,0,2ad67e6bafa77ccafcc440f8e6b2fdd38c9778d3b6a3320578b33ffe57141c4d,2024-11-21T09:11:01.453000 CVE-2024-29990,0,0,09bb0ef28e55e7dacd2c0d3199d83d74de19808b3493191cd8e55fd6c96d3414,2025-01-09T13:52:27.430000 @@ -254073,18 +254074,18 @@ CVE-2024-29991,0,0,e6c92de831c5b9397fb58d42a78c8f9297134d243589c2e28af7e0ae14338 CVE-2024-29992,0,0,644115a5ada5fd5eaed583dff910388cd7f6edd044c415d410798c64ac367a76,2025-01-09T14:45:52.750000 CVE-2024-29993,0,0,8ee39683bcc6bbc416a9ae96b7bc55ff379fb32e28c9270e9552fcd426131466,2025-01-09T14:37:56.660000 CVE-2024-29994,0,0,401b2ebea5b3655b89d58ef2168f6ee03930364a1f8ad10ecebfc36b02ec974a,2024-11-21T09:08:46.013000 -CVE-2024-29995,0,0,0cc0381ce765bef974a2136f14172bf999258cd3343224eb0ef48067b064c16c,2024-08-16T20:53:34.700000 +CVE-2024-29995,0,1,8c6caf00e8855cb82db52fa0529294735cfd59d615ffc63ca1450ffb28deeb66,2024-08-16T20:53:34.700000 CVE-2024-29996,0,0,f680c02315187d999d2bc09cf762d4c0ca8a5fbad4f13e5797afcd28e3b12f8a,2024-11-21T09:08:46.253000 -CVE-2024-29997,0,0,17eaa6a79e9fcb8362b4f7cba1faa170b0917b37069ba93ccdc35ee982fb7c2c,2024-11-21T09:08:46.403000 -CVE-2024-29998,0,0,12f0e8f84a15fad0b9e9546d505881885c1223343931cb4e726d946ea74c45fe,2024-11-21T09:08:46.563000 -CVE-2024-29999,0,0,d9618dadf7201d863d104a0403888266bc8b56cffb33e96b301c9cee81a35f8b,2024-11-21T09:08:46.707000 +CVE-2024-29997,0,1,defc107fe9ea79a2bf62f30d8bbcdf35032a204044383d9980ebbc63f162afd6,2024-11-21T09:08:46.403000 +CVE-2024-29998,0,1,74ca6e6a372674194fc55eebd9ffe24e2f18418426acd322a32804210dfc6c92,2024-11-21T09:08:46.563000 +CVE-2024-29999,0,1,5c8c7491630bf34216341268eafef470fe4da64c699a4ab247cf5eb902826f10,2024-11-21T09:08:46.707000 CVE-2024-3000,0,0,2512f042eaa626effd9cd0bdd2a9e568f794fe3135c096093c64137bf0a32558,2024-11-21T09:28:38.813000 -CVE-2024-30000,0,0,470a97a98fc80044f4888cc467763b89efbefafd63b6c4199468b6a34d1c4802,2024-11-21T09:11:01.630000 -CVE-2024-30001,0,0,4a0a12b9052388d570c3ae11975cd9b0142a271b215e7965421f2d144a0462ae,2024-11-21T09:11:01.807000 -CVE-2024-30002,0,0,21badd8f5e29fe8c845f8be2625696348ca7bcd4f3b79cf4f7e504d7ca1c743d,2024-11-21T09:11:01.967000 -CVE-2024-30003,0,0,6581baa36b302398a60fb570c9ac6e67b93a315cec0ddf03bad3d322e1904b3d,2024-11-21T09:11:02.120000 -CVE-2024-30004,0,0,4aa683442f31d42ed9933cfbdd315dcdf0b4724f637355fbfa08f5b4e09fa87c,2024-11-21T09:11:02.273000 -CVE-2024-30005,0,0,ee663d8cb1283c689a0ac24fed17d2aac5e5010a9c857f1722e6691f67c1e165,2024-11-21T09:11:02.417000 +CVE-2024-30000,0,1,bc48f4f724a68341c0c2b613e02c70592db3b94e4e26527614dec6e3b21a1528,2024-11-21T09:11:01.630000 +CVE-2024-30001,0,1,0656676b145a170361adf24d7a4e039fadccba7f294588687bdbb30dd8bf8b55,2024-11-21T09:11:01.807000 +CVE-2024-30002,0,1,04a245cfdbcd8929c9c179da6d63caa062cc9d38a4646e1f4f755002c517fcce,2024-11-21T09:11:01.967000 +CVE-2024-30003,0,1,18b4414a3e4687540f233a0d504cc4edc3848c3dfef670a70c2ecf55587df1a6,2024-11-21T09:11:02.120000 +CVE-2024-30004,0,1,86639d07d442387ec5141c768cce25d28a112072bf64785fad0cced44a4a50fb,2024-11-21T09:11:02.273000 +CVE-2024-30005,0,1,a10e8ce70ef8a2b18593cc46b35c1b417b2b182de2da7749dc4d14423999aa66,2024-11-21T09:11:02.417000 CVE-2024-30006,0,0,cfdddefa45a9103491137329d91abccf9c66904b7162829f1249f9386f80b83e,2024-11-21T09:11:02.567000 CVE-2024-30007,0,0,81e8a9d80acb0fd4b4d2e28f1473ce582950380596c9f3bd4ac01f0b63c783f0,2024-11-21T09:11:02.717000 CVE-2024-30008,0,0,73164509e0d550004dfc26ecd32fcb0af01f43487cc022cd53e562266e54016b,2024-11-21T09:11:02.853000 @@ -254093,7 +254094,7 @@ CVE-2024-3001,0,0,a7374e476d7442a06066a14e1bd58098fcf6ff210b0ec172c2e3dfeb580cd5 CVE-2024-30010,0,0,3b57dded1365346a40ef9d907acf2a62b1045574e11d0dc8d1e83f92596365c8,2025-01-08T15:40:07.350000 CVE-2024-30011,0,0,656da07e190efbff9361ca41e3b1ba9c4f70c5c9e619a121ad703b0c703533ed,2025-01-08T15:45:48.600000 CVE-2024-30012,0,0,3cfcd5e62f53a2fbf8d6797d2013b52f1fcef1f665bb139337dcf3b0adecd4c4,2025-01-08T15:40:37.453000 -CVE-2024-30013,0,0,c68eb3354c7c99066d2eda818df8b6f3ed32924c738e48ac0d29222d12e2e15f,2024-11-21T09:11:03.577000 +CVE-2024-30013,0,1,b465d3238612a54eaf750a7ed1e2690d066c175454197e462ef0402b89513b8f,2024-11-21T09:11:03.577000 CVE-2024-30014,0,0,29e6609974e54c3e1df07137e60b2d5eaf0f65e4f3ca96c74c8eb545ca718d6a,2025-01-08T15:44:31.357000 CVE-2024-30015,0,0,52aa651dde0ea6bf84bb00419c07634297d067ef9334197e11876d2d34a70478,2025-01-08T15:45:00.623000 CVE-2024-30016,0,0,5b295ec99e9b88a24423f588f50ea49d5754b5759903d2d073a3d6bf2cf7fa7a,2025-01-08T15:45:16.347000 @@ -254122,7 +254123,7 @@ CVE-2024-30037,0,0,f73d6ad5114cbe6a80525e62afbba48e677b916d63cf3e605483de0567bba CVE-2024-30038,0,0,a110458651a9eccf20a20127267985311cd4020527c39bb7fe92fbd8245e1a43,2024-11-21T09:11:07.077000 CVE-2024-30039,0,0,6d4c2a358502acece6d39ccda69e9264f55f52a713bb5953f79ee8082ca9b1ab,2024-11-21T09:11:07.213000 CVE-2024-3004,0,0,090e547619a006fd8749e79d0e05f6b17fb4b3abcde3d586f7d775d03c5b12a4,2024-11-21T09:28:39.437000 -CVE-2024-30040,0,0,53137381cad4836b484aca2921dfa740d0639018920e030d4cd815e000aa758f,2024-11-29T15:41:55.210000 +CVE-2024-30040,0,1,86ea64696090a4f19b501789fbf7af1284c9d5bce3667303606a9d36752672d8,2024-11-29T15:41:55.210000 CVE-2024-30041,0,0,f6cb8df06dbdd5b3577bae4b6d27fc00b9774de77840fba8ad7bf05a429e4a96,2025-01-08T19:13:10.127000 CVE-2024-30042,0,0,2ddeae73b8180fcd7b495ee7af2110afd4caf7ffe153ba2c55cd9ba91b6ad034,2025-01-08T18:59:45.373000 CVE-2024-30043,0,0,4238deb754843aa8d72d31430a10f30c6667ebbbec7c44850b6d8f05dd2eceee,2025-01-08T18:56:55.587000 @@ -254134,65 +254135,65 @@ CVE-2024-30048,0,0,099990b86f32938d07a24f79abe3b0f64fc529f35a28e500ad48180ad1918 CVE-2024-30049,0,0,ca3dedc01de3a12b156f862bbd9ab8cbcab4bda2bb67d6ff66927cad9d798dea,2025-01-08T18:18:56.370000 CVE-2024-3005,0,0,ddf6cfb62d5ace4e5fe68c31f35584424789893f5e7edb1a7c030a0cf407ac97,2024-11-21T09:28:39.580000 CVE-2024-30050,0,0,950049f3ba6b13d34cf1d35f34fac3f6307d087b3c14dd922cbd0f1b558c23dc,2025-01-08T18:13:48.903000 -CVE-2024-30051,0,0,f3d7e31338c8088a249f8ce59310ac1cfeceb64ac3766a9e058b1303d7825f6c,2024-11-29T16:31:39.730000 -CVE-2024-30052,0,0,feb05ec8d13faa8a370fe0b1fe28c0e714784156b747323ede30cca425a95fcd,2024-11-21T09:11:08.930000 +CVE-2024-30051,0,1,5ec7db5e17e429ad755582fa5375a88e7eac6c3de3113f00754fbbb45b33cfc4,2024-11-29T16:31:39.730000 +CVE-2024-30052,0,1,0c318c74f7faa87993deeda3866261297ec0ddb2746c0eda81dbb9b59e40e3d0,2024-11-21T09:11:08.930000 CVE-2024-30053,0,0,65fd346c7990f2cdd0711ae82d91c16e78b5a16baa5880e2cffcb953ec779622,2025-01-08T18:09:06.970000 CVE-2024-30054,0,0,208fd51c6e44baf0d897570f55f50e9e26e7f0682cb01924b044db6a064f4934,2025-01-08T17:57:54.547000 CVE-2024-30055,0,0,d40900a82e156b5f78aede24cf5411e3dbd4c61b795d8cc3395f093438a333c8,2024-11-21T09:11:09.297000 CVE-2024-30056,0,0,347fe50793d58ce0b74c4538ee1704257557dffe94bc7f90d6a7514a4e57a2be,2025-01-08T20:20:05.590000 -CVE-2024-30057,0,0,b9793e2532dfdaebb4194bb6e92ee863caeee414e13d6455dbf08c10146ae17d,2024-11-21T09:11:09.533000 +CVE-2024-30057,0,1,ba33c9985864f7902ef361ee4e4e325819ac2bc85f178562cda86ff59e397ce3,2024-11-21T09:11:09.533000 CVE-2024-30058,0,0,20262ca43dabc2c08aa015c0c48b80c60a8e2b5adb6e58d04501640e7acc003a,2024-11-21T09:11:09.667000 CVE-2024-30059,0,0,3163a987284d43fc0ffca06b376cb917d6abd4a21ba6d05abf0a3e3c9f35694b,2025-01-08T17:33:36.930000 CVE-2024-3006,0,0,55404a107dd535d649375a9d24002b858b505059cc836f79e268ba7574b65f64,2024-11-21T09:28:39.720000 CVE-2024-30060,0,0,0b3e0fbc176260205ffa4a1c23582ac78ea1a8545baf3ae2da80191d1128bfd0,2024-11-21T09:11:09.907000 CVE-2024-30061,0,0,80f55abf3454e8925c1a0a0022584e693e992f5f50f9897113a65aa23914353f,2024-11-21T09:11:10.027000 -CVE-2024-30062,0,0,99d6cfc28318ae09f8d7a55c3328d5c8330d88a2462f044fc1d89c0e92a4c1f1,2024-11-21T09:11:10.160000 -CVE-2024-30063,0,0,d2b1e5d6add4233fba90aefd9783c57655457a35c5cd9774122987749cca9e01,2024-11-21T09:11:10.307000 -CVE-2024-30064,0,0,eab5b3c1c3dee95e6d011138a8a1f6edc60fd14aab36214ee6dc01ae1b2be0f6,2024-11-21T09:11:10.473000 -CVE-2024-30065,0,0,4e1c4faf3648f62ebdea761e039111a570a5ccd274ff1b093277222c7ef3a0d4,2024-11-21T09:11:10.630000 -CVE-2024-30066,0,0,3e8df712601d045d8740f3d09a502a6118e2846d6528951f6e0fbcc7ace99725,2024-11-21T09:11:10.817000 -CVE-2024-30067,0,0,78308ee8bc78dd194adc01e1c4ba75f368ef2e4c0d5acdb132b1a88d6fad2aff,2024-11-21T09:11:10.970000 -CVE-2024-30068,0,0,4dda5621fe0ecd5fc6e4942452de07ec6795d144c7d6e636c5487c018c186de4,2024-11-21T09:11:11.143000 -CVE-2024-30069,0,0,eeb2d20572e4a514788d527bd13b3ee1ccefd5f5c24684bbbbf302a8659b3324,2024-11-21T09:11:11.310000 +CVE-2024-30062,0,1,58754f25fbe860476e22156d5d50537e00c8fc64bb3b08fd67d48cc0e4a99f41,2024-11-21T09:11:10.160000 +CVE-2024-30063,0,1,f436c4ee5f44b66d2d1ded3cbeecbef11ce75178ee709e12d1916bd0ac75b789,2024-11-21T09:11:10.307000 +CVE-2024-30064,0,1,1a98dc2b0040dfbd4ff93d4a35e314effa6254f25450c0fe1f2ed91bd9263ee4,2024-11-21T09:11:10.473000 +CVE-2024-30065,0,1,42c86acb9a0a688bf2ca7b6df56e74892961f89d360c0b94099c0ffc781857c8,2024-11-21T09:11:10.630000 +CVE-2024-30066,0,1,d2e3a6f1d3d45ab2116cdfee330bdeab8214591286dc3c5167db1e6da76dbaec,2024-11-21T09:11:10.817000 +CVE-2024-30067,0,1,2d8d597bc51cc73d0188fcdfec4c8bbca422ecc91684df5097a4d2732928e5f6,2024-11-21T09:11:10.970000 +CVE-2024-30068,0,1,7246697eb5addacd50b70f353236dea4357635852307fadb18ea035fead3488e,2024-11-21T09:11:11.143000 +CVE-2024-30069,0,1,95977f91cf3e855fa08ff35306f1a049ac99972fb2c0a3ae32961cc82f04089d,2024-11-21T09:11:11.310000 CVE-2024-3007,0,0,be00e1b01672c9a9e3aa6b3f5d8a456c02f996722548811c3377c59d21584833,2024-11-21T09:28:39.863000 -CVE-2024-30070,0,0,f4634e8dd2092267550d4717364879a2204ab29188a8e1f684563e7d1aa0cc43,2024-11-21T09:11:11.463000 -CVE-2024-30071,0,0,695b96e6100fae1c7893e7a711be01c6617ac627dcff652d287c6446a174c0ce,2024-11-21T09:11:11.630000 -CVE-2024-30072,0,0,361c02033dbce0e12511861603e78a45e5ae0b5c616c4869be65caf3788fb685,2024-11-21T09:11:11.800000 -CVE-2024-30073,0,0,72d618fee2ab6af803e9f58935ae1ab7e736994b9b6211f03da5a02a1e6f3f85,2024-09-23T15:08:43.363000 -CVE-2024-30074,0,0,3a6ea578ae68f1c21877d0fc31ee9d0f83f91679143cf851b4351754ac8c7679,2024-11-21T09:11:12.067000 -CVE-2024-30075,0,0,d908bc7ebadcac19ff5beafa3714795e65e660fb67366294e087a3581f4b1f8c,2024-11-21T09:11:12.220000 -CVE-2024-30076,0,0,b9877ebb02a4eb1e36f22b64141827987fe16782fd22adf45772ab9848b9bbc2,2024-11-21T09:11:12.363000 -CVE-2024-30077,0,0,fd84d04ab7e02501cc9865234fe7ba4629103e2eb2d98eff4038104ee2f83de7,2024-11-21T09:11:12.517000 -CVE-2024-30078,0,0,f55125dd11bb5399c5c3e27aa276b5fa42d25a8d93b2fb5cec1179aff11e827c,2024-11-21T09:11:12.680000 -CVE-2024-30079,0,0,f8c7ffef445c3886cefeaddb39cfacad7b827997b3bbc724253485a963a34aea,2024-11-21T09:11:12.853000 +CVE-2024-30070,0,1,26b459a4edc6f60c1fb6ea11d9d43cdb5d8cf3c15977a31c4351e2f4f67c54ff,2024-11-21T09:11:11.463000 +CVE-2024-30071,0,1,ca83cbbe22b32daabcedd7bb5f31571959e8dc30c3a0e961b534b79b1b925f14,2024-11-21T09:11:11.630000 +CVE-2024-30072,0,1,7b6c8095c631a1d825a47a1c8644dbea8c1126d2246edad93551b7a36db19752,2024-11-21T09:11:11.800000 +CVE-2024-30073,0,1,50be816694fb2b0c6b563b401ab42ee3965ea7c1cced4aba9f454983a74ba12c,2024-09-23T15:08:43.363000 +CVE-2024-30074,0,1,e6175506c8828e2f0a673bf39238d6f5a1b8cb3279746f9438804c6e2a4d7457,2024-11-21T09:11:12.067000 +CVE-2024-30075,0,1,c5f4f92cf4ac3c3a801df335c0ea34ba2545d6cd0a9dc46b38dd87337abd1d55,2024-11-21T09:11:12.220000 +CVE-2024-30076,0,1,875ba9dbd5c12a46849f65d749ae8bfcbfb21ebe0a56498f34a37b5086522afd,2024-11-21T09:11:12.363000 +CVE-2024-30077,0,1,7ea1a3919837fe9cc374930e7af703b8ce9ecac62e495a6259d57e5d934c5d54,2024-11-21T09:11:12.517000 +CVE-2024-30078,0,1,d87bb357c60ad344477795d1e8f86a38590c30e7720389305fb5dc864c8aa67a,2024-11-21T09:11:12.680000 +CVE-2024-30079,0,1,3a950ca6f4241e23105b56062b6dfb807b7fc61810bdef5f24533aa7b3f96519,2024-11-21T09:11:12.853000 CVE-2024-3008,0,0,4d1f5f26df100df117449e8d2872a46502e19ae9d3011fb7b29ab1ef705d755b,2024-11-21T09:28:40 -CVE-2024-30080,0,0,57431f0b2c85716a731b408a105cbdbf56f441b2740c1c5eb2c38876a20f10c3,2024-11-21T09:11:13.007000 -CVE-2024-30081,0,0,e88bc0e17700746c8b3826b97b12c55d0749d8ef78bb587bff88b142cdb1f89b,2024-11-21T09:11:13.173000 -CVE-2024-30082,0,0,62e9c347132b67479dedf4d710c2dc990393839bb4ad2467254ec2a54bc9391f,2024-11-21T09:11:13.337000 -CVE-2024-30083,0,0,063461178dcb1b095bcaa66a37b16b60cde58e2dac9c197a57f6ab4a8b0a7a95,2024-11-21T09:11:13.493000 -CVE-2024-30084,0,0,47ca3fad18e209fab28dd986c5ef03205b364f895b2877bf8500d46400036e6c,2024-11-21T09:11:13.643000 -CVE-2024-30085,0,0,64086dd72b7b4964e26ea0442fceba4fdce2917a9546705c8f75f986f5f1d660,2024-11-21T09:11:13.807000 -CVE-2024-30086,0,0,37fd8bb12471d2a642b55a451c695e11f9659656db154bab67715acaad6e29a2,2024-11-21T09:11:13.957000 -CVE-2024-30087,0,0,720a9a872214a31c0e284529af899bd12aef6c15d240aedafb1b2ba4dceb57e1,2024-11-21T09:11:14.123000 -CVE-2024-30088,0,0,1dab43093b5072901da9066acd27eca8d351db0c5ffbd1285c5130761a385550,2024-11-29T15:44:17.180000 -CVE-2024-30089,0,0,df39b47ac758d568fc39f205f46b5582f7b3a3e6793b2c8ae50dda60747f54df,2024-11-21T09:11:14.460000 +CVE-2024-30080,0,1,149b0cb94498dc66d30a30994709fcab89af6ce3e660e2352ee2b12faa0a101a,2024-11-21T09:11:13.007000 +CVE-2024-30081,0,1,df1816d95b92eaedfb31c48eaab29e06e439fa5e1827c404b256d13f7900908d,2024-11-21T09:11:13.173000 +CVE-2024-30082,0,1,d54579160f5fab460414a99a2b0ef3572eef4938e36c68238cf7c173b6e23db2,2024-11-21T09:11:13.337000 +CVE-2024-30083,0,1,c2d0e9aae1d332a6fb3421ca5906ed8526f6eb24ce7174282af65ea33878252a,2024-11-21T09:11:13.493000 +CVE-2024-30084,0,1,7e9c877a482259eaf57488b2011aa067884ae4c99a6ea42a2a313743f1b88fd6,2024-11-21T09:11:13.643000 +CVE-2024-30085,0,1,e10f8deda8d296a83d6b0f7746ac9bfd1eb26e691ef0e39364df8f9d161027d4,2024-11-21T09:11:13.807000 +CVE-2024-30086,0,1,cdc59e490e6400ee2152b007a7186dbb356f1f529be2930c22f5e027be70fba2,2024-11-21T09:11:13.957000 +CVE-2024-30087,0,1,ff0e06bb52ef9814b438dfaa2ba227d1c4dacb9819f43a48bba04eedb1b7a74a,2024-11-21T09:11:14.123000 +CVE-2024-30088,0,1,b2beeaf37ec9f08b25b6bc7f6adc731dd886d7e9b75938e8e6b5ed447c674cf9,2024-11-29T15:44:17.180000 +CVE-2024-30089,0,1,61ef51607ca95b8e54c8841325caa5600273747ce4d820c7e2760235210ae216,2024-11-21T09:11:14.460000 CVE-2024-3009,0,0,0f23fa38cd3191090e42a61ddd71dd843c4e5519806a72880bf73cfc944c509a,2024-11-21T09:28:40.150000 -CVE-2024-30090,0,0,1a438b6683135c5d5936ba9f8ae1910116ade7a49c0196448f2e2521e486cfc3,2024-11-21T09:11:14.603000 -CVE-2024-30091,0,0,8018d9b9b4f1bb12fc1908369f01eba5691d488aac9f67806789ed99b6457617,2024-11-21T09:11:14.757000 +CVE-2024-30090,0,1,604a3fe9527aee4d4255ddba507d72cb0dd45ce58f4ab085a8a649fef4fe3ac2,2024-11-21T09:11:14.603000 +CVE-2024-30091,0,1,1fa70755919e6668bba96b225670ba3e5d7475a344dc11a38fa86fe230aaeacb,2024-11-21T09:11:14.757000 CVE-2024-30092,0,0,3fe3e4798d3a5ff9f34c92f69a4683da6aab7136aa94c378cac5231a24f485ef,2025-01-10T15:24:32.377000 -CVE-2024-30093,0,0,4327ccf40494724e2d65bcc23049518066e89626afdc825354ab14354891e92b,2024-11-21T09:11:15.003000 -CVE-2024-30094,0,0,f0bd6b759be29dbd3e0837577f419891032336b1fde726d2f8a867367a3754d2,2024-11-21T09:11:15.153000 -CVE-2024-30095,0,0,189963df6ca6958ce9c0454cf6367e649d4f5b9d1cc7840f7da6d6a2d71caeb3,2024-11-21T09:11:15.307000 -CVE-2024-30096,0,0,99456c1e9496df81ca2752afb9823853886b05da769208496742103438f9ac9b,2024-11-21T09:11:15.470000 -CVE-2024-30097,0,0,abadddae018432de64522a3a33c5456685f46cef7950e2e6f944602866708bd1,2024-11-21T09:11:15.610000 -CVE-2024-30098,0,0,2070626a6fa37f78b094f5f0c5fbc8f0e7d0b07d8211123a4e46c190be27256d,2024-11-21T09:11:15.800000 -CVE-2024-30099,0,0,b11c6fd66fb43823e00dbd080b1a5099db4361250b8fb3f3cce2c4462c314019,2024-11-21T09:11:15.950000 +CVE-2024-30093,0,1,285db3fa5035386f295ce7de75e65a71d053608272c3f8b3eb4d73e96aeb88ac,2024-11-21T09:11:15.003000 +CVE-2024-30094,0,1,e193b42edb326b37c83e3537622aa6ea61512c0e5a9213e5fc9b5d4bf867c59d,2024-11-21T09:11:15.153000 +CVE-2024-30095,0,1,ec6c0eee2d188d481d8f1e69c96726b1c4b8f09e52a2bc105cabd8b2f2595515,2024-11-21T09:11:15.307000 +CVE-2024-30096,0,1,cda7c28af656052354fda24be03a2bb97880fc2de7788863e1c6342c80590d88,2024-11-21T09:11:15.470000 +CVE-2024-30097,0,1,51af303bf72295bb26b35037fc6855810575f912625a6f3c320c997db70344fa,2024-11-21T09:11:15.610000 +CVE-2024-30098,0,1,cd58733f95509c0d3e6df771d729cde9f9850803575a53aed38e10b71205a8e0,2024-11-21T09:11:15.800000 +CVE-2024-30099,0,1,d836bf0eb9d2b6bf21c9344147e14b6dc1db3596f79a3bb3b087bc69679390fe,2024-11-21T09:11:15.950000 CVE-2024-3010,0,0,a6700deac74e91f97329b8556e47955b782d1be4ea2f812a60e6de717d928aa5,2024-11-21T09:28:40.293000 -CVE-2024-30100,0,0,a3fcef49c38cefd0db7e3f3d9aea4f07851f4926d2989dad72eec4081948e10f,2024-11-21T09:11:16.097000 -CVE-2024-30101,0,0,2b031c24f2bbb526881d31f8106464a97b0b153673e2c8566ee1d35f79dacafb,2024-11-21T09:11:16.230000 -CVE-2024-30102,0,0,e161ac7eeab06069e4b7afdf932005f970e8c86bf8071f9c4a011f1ec37253a4,2024-11-21T09:11:16.383000 -CVE-2024-30103,0,0,89d52f3e95d7acab38a119d1780814a73defb6a02ed1ea450b0a1571c411e306,2024-11-21T09:11:16.510000 -CVE-2024-30104,0,0,8e70536506406d4953c5002be7239f2aff7b84fb6c550b5b865b07f7a8e58e7a,2024-11-21T09:11:16.640000 +CVE-2024-30100,0,1,f7ec750ab49fa0d514a9e1464b6bf5d906575ab099a7c5cc82f2539abff2b886,2024-11-21T09:11:16.097000 +CVE-2024-30101,0,1,6ab463a4f9cb443887212ed0598cac93feb15c85ead4746f2d723bfb481dab51,2024-11-21T09:11:16.230000 +CVE-2024-30102,0,1,1f04bc7f1d83dcb2181b3087e266caf132a3121db250b21002175cdc1f855c67,2024-11-21T09:11:16.383000 +CVE-2024-30103,0,1,9eadf25dfda19c4382049aa6a134476d1f80cc053afda31a143f4f648af940f3,2024-11-21T09:11:16.510000 +CVE-2024-30104,0,1,6864271525f1c454713c043328a3448eed2a347405ac0189934757832e4a9401,2024-11-21T09:11:16.640000 CVE-2024-30105,0,0,6cd15233a1786ee47ff66e6d3d70e4b7421ec3ac51e1c84db4bb6be02b7b83ff,2024-11-21T09:11:16.770000 CVE-2024-30106,0,0,e1d67f90af3c17b3c13c4cee8b9496ca977bae4b74d1f15e705be967015b71d1,2024-11-08T15:43:44.423000 CVE-2024-30107,0,0,ce40ee5d8e3a94018bca6aa3b8741f55886495c9725f2e50b340fc3140f7fb1f,2024-11-21T09:11:17 @@ -254329,8 +254330,8 @@ CVE-2024-30254,0,0,35546b7409e4119ccffeb76af2517fdc522bbad8073913d5b4579ec29c98c CVE-2024-30255,0,0,78b182f0b7f2b08d83e6ce349e002956760de0eeeb0dd012f4a2379fb98daaa1,2024-11-21T09:11:33.297000 CVE-2024-30256,0,0,8642d5a4ce4d5d68a9754f13f7ba74215b6e90771f5838567192e595626d6804,2024-11-21T09:11:33.873000 CVE-2024-30257,0,0,ecc8eb870bc55046bd95c67876b58a85991bc2d927265d0f23a8918e37b3a4c9,2024-11-21T09:11:34.003000 -CVE-2024-30258,0,0,5d41fe638150253711c0c1dce414405181e65295ba37694507008b9be7ccef98,2024-11-21T09:11:34.120000 -CVE-2024-30259,0,0,e42f82650b326544824a7942dea3e4f1bca864483558e162f4766cf418ecbaa7,2024-11-21T09:11:34.253000 +CVE-2024-30258,0,1,0a317de5c8420e8a053cab731415bebf9af9b81fe82dff8810dae8b3c25eea2d,2024-11-21T09:11:34.120000 +CVE-2024-30259,0,1,61b3e76432fa205e4fa2bf7d942a50ac1159511614825e1680b334d0b05d74a1,2024-11-21T09:11:34.253000 CVE-2024-3026,0,0,0265c65c29e3faf9e14ce421339b75d0c49c5a9b120df592e573d13166cf7114,2024-11-21T09:28:42.743000 CVE-2024-30260,0,0,cc9a5cb035977000add1b98317d4f5265395260876a998a92778c07dd57d0ebc,2024-12-18T19:19:52.700000 CVE-2024-30261,0,0,53f3e7a25054b613c460b461d895e55f8582a30f659005a13e118177da8af8f7,2024-12-18T19:21:11.997000 @@ -254451,7 +254452,7 @@ CVE-2024-30373,0,0,9aa804b663226d2c5c0255450ac5233ace75b175ef0ffbf44c9face8120c6 CVE-2024-30374,0,0,5750c84f0dfce3e388704bb4ab938fe04de20050b059190da07191e8eeb9bf3e,2024-11-21T09:11:48.220000 CVE-2024-30375,0,0,cb0368348c49f86546e5f7857b0c0a61bb5922fbcf3db6a88e5f77172355ae24,2024-11-21T09:11:48.357000 CVE-2024-30376,0,0,2248943ee02f5c871a122c8a9507747e520818300358783dbb175412597e8e17,2025-01-09T16:08:38.383000 -CVE-2024-30377,0,0,c1637b0bb9b02bf842bc41c511caa3392e14bbac51b8d2b26a6fe7be7336a1d3,2025-01-03T20:46:41.177000 +CVE-2024-30377,0,1,5fedfa7ad2f481f3b5188ccaa34065076e4b733235d8435732180716c5e929f4,2025-01-03T20:46:41.177000 CVE-2024-30378,0,0,d71d4638dbc6eba8bae8051ca94bfce66728e9312382c0209d27d8a1be3871f7,2024-11-21T09:11:48.497000 CVE-2024-30380,0,0,2611db369fb1a4933375909a458b47d2fdc6172e2784489f3b06efa4c4c70424,2024-11-21T09:11:48.667000 CVE-2024-30381,0,0,16af65d0f620fa329a4ee8e3a262a00f313455370e8bb1cae2f8a98e8cb8cb80,2024-11-21T09:11:48.810000 @@ -254559,7 +254560,7 @@ CVE-2024-30486,0,0,db339813265f7f192452ae8556c302d856de22ce698a7c033d0d3ae4afc3b CVE-2024-30487,0,0,13c822a8441701ee3630da48c50d2dc223efd2258557628d24a181401b62a6e2,2024-11-21T09:12:01.317000 CVE-2024-30488,0,0,d56b2685374c31f5ece7f9fcbf9d4144f7d2785e3b1a5299872a3d43c2a53a85,2024-11-21T09:12:01.450000 CVE-2024-30489,0,0,746eb42c1d4701f5dab7993ae5fc87612143a868b6199455ec72c55bae79c78e,2024-11-21T09:12:01.587000 -CVE-2024-3049,0,0,69e7bfbfef26db4e3d3a51aba83795862f7448aceb6e3efc5bff438eba047663,2024-11-21T09:28:45.870000 +CVE-2024-3049,0,1,20f7e76b72edf5855d588d0316ed10874b8207f2f3b8002bded49efc30fa22c0,2024-11-21T09:28:45.870000 CVE-2024-30490,0,0,118a4c0291c1a505fd2e0230d8e308e7f6813bdd396e6d80c7f5fb11a1bde34a,2024-11-21T09:12:01.740000 CVE-2024-30491,0,0,6cd6113af2be24a269649aa793dc969098e71041cc691bdf9c9952d9cd4be7e6,2024-11-21T09:12:01.897000 CVE-2024-30492,0,0,944b6e4f4861258dbb795ac5398cdeb34f608f275efd240e733c219ffb14ec03,2024-11-21T09:12:02.030000 @@ -254634,7 +254635,7 @@ CVE-2024-30556,0,0,8394748f811bbbbbc5f018da98bc56eaa890d296c422a1ec18748a9acffb5 CVE-2024-30557,0,0,73719cff1ffe9366cfd217ccf85949ff49e1ba941dc4dcc225869ca71b030df0,2024-11-21T09:12:10.367000 CVE-2024-30558,0,0,4bb241e7c9ba6e4c41288966623f3f4e6bce41e40adda6c3545d328dffee22be,2024-11-21T09:12:10.493000 CVE-2024-30559,0,0,619283ace15f1b905d526a616ba5ff133b0ac08af72ee96d9e7e1858b01606b7,2024-11-21T09:12:10.620000 -CVE-2024-3056,0,0,098948e02adb6fef2c90c331cb02bb99822b3f63a60e571b278c499abbabb9bb,2024-12-27T16:15:24.437000 +CVE-2024-3056,0,1,156a3ff16ef1e7c0a07171966ca2163c4735c8d33004ad66e5a8927f3659dcdd,2024-12-27T16:15:24.437000 CVE-2024-30560,0,0,b59125ce2223ca2880fb89db3a3f3dfd059a1d0d73b4049fe43e1fd24daf2c54,2024-11-21T09:12:10.740000 CVE-2024-30561,0,0,ac7e0304f31638e780a2d720d189c314381f988fd2e6f5eb3ed2071500f77264,2024-11-21T09:12:10.877000 CVE-2024-30564,0,0,b20ff337c9f1037b2e952029ea8bdf19426b12dd02e41f2275aa126ef8bb1798,2024-11-21T09:12:11.007000 @@ -255275,13 +255276,13 @@ CVE-2024-31426,0,0,f687f9622b58624f7fc5938bc1ed73a0632af06ee187fe78c7f9d0436bb9e CVE-2024-31427,0,0,ad268fa99a0941ace78e8128abf741e7f938fdf306910f7762ebe4b7b2d8f805,2024-11-21T09:13:30.700000 CVE-2024-31428,0,0,a726cc92bc07f0a774a63ba46fc893ad7c89af045ee491f0690cfb0e4f2e8b9b,2024-11-21T09:13:30.813000 CVE-2024-31429,0,0,a6dabb50c1e1d8b88ea6053790334b103a9718f0f71e786c66c4c87b040f5f2e,2024-11-21T09:13:30.917000 -CVE-2024-3143,0,0,989c02d1edb5298b2623c1db513b01e7252a4fbcf0046cafca24f3b65cbcf8e0,2024-11-21T09:28:59.510000 +CVE-2024-3143,0,1,10b59f8a83885af6ce7643d0ec8d9db9adad103f3e58fff4ed63152463972442,2024-11-21T09:28:59.510000 CVE-2024-31430,0,0,03cdaf445057cc74b4df5c0c3c5dc690b87b410b068fced0cc1b3c09411e8e0e,2024-11-21T09:13:31.027000 CVE-2024-31431,0,0,defc0541dfd193ddc4c262b254aba42cd6c4b32302ce9c71d042e49da0c843f1,2024-11-21T09:13:31.150000 CVE-2024-31432,0,0,91f30ef1f01f1ba5ad4b4c23ebf50ae7a312901ed673962deaeb8bc3f1b8b8c7,2024-11-21T09:13:31.267000 CVE-2024-31433,0,0,56354ddbc3946f08210223d9849d97b25234f8c66e0b3fe31c53a6ade37caa22,2024-11-21T09:13:31.393000 CVE-2024-31434,0,0,36f1f7fc92a838f9f9df4b218ee3ebdf0b30403fbbc6059e9836dc7372d2e4ea,2024-11-21T09:13:31.510000 -CVE-2024-3144,0,0,000ba96107529d46063c21334fca6216df429bd3df1f0e3bd398ef924259014e,2024-11-21T09:28:59.643000 +CVE-2024-3144,0,1,265dfb998678c3a03531f4d8af73ddf9de8da88482ed4133ee93971213171b50,2024-11-21T09:28:59.643000 CVE-2024-31441,0,0,0efb076f52101157f6b2acd7d4e2f2bd8d89d1ccb4f094aecc9b4ca0e3ae8da9,2024-11-21T09:13:31.627000 CVE-2024-31442,0,0,f41750395dbe71510e4a19583ae309e3ceab138b882aadf845293962b4aadc3a,2024-11-21T09:13:31.740000 CVE-2024-31443,0,0,68aa4b623192258d5faafb05ed3e7b2481e219e907399fce61d9717e57c362f6,2024-12-18T18:28:19.237000 @@ -255291,7 +255292,7 @@ CVE-2024-31446,0,0,8efcd7d0a3d33aeeaee339cc0965ac51eb3cc21e1541143335520766d2c7c CVE-2024-31447,0,0,fad46bd3273a29709be968a3ea1f5b3a14a0d0dd19fe219fc3cd0e55559749c1,2024-11-21T09:13:32.320000 CVE-2024-31448,0,0,f3f14bd747448c982d397efb3536f35979df935ac4e7ecf8c391b07bce10f08f,2024-11-06T14:31:08.877000 CVE-2024-31449,0,0,2e02ca3e71d05fdb6c5f3599695fd0bb3be2e1beed747cfb7d882fe624eddccd,2024-10-10T12:57:21.987000 -CVE-2024-3145,0,0,7be3ec43b02d0bebaaf85b77ba7611bf3deff63f3cca3ef23b482aafbb3303c0,2024-11-21T09:28:59.780000 +CVE-2024-3145,0,1,b5a9291ff0357248f3194936d403c710e7ade51877e0ce30ec0fcbd7edea1a9f,2024-11-21T09:28:59.780000 CVE-2024-31450,0,0,6856527c0ff40fb08558b387a922cc68e2569cc482affc0e9d61fcaffafddcf9,2024-11-21T09:13:32.687000 CVE-2024-31451,0,0,229e36f27ebf23ab1e445252bae9bf8c459b0b6e269059a1a1d0c4aea70188f8,2024-11-21T09:13:32.813000 CVE-2024-31452,0,0,5cdafef5c78e09ffca3c98f889487c5ec92d0c08a681ca2ac3a4058828c1540a,2024-11-21T09:13:32.933000 @@ -255302,7 +255303,7 @@ CVE-2024-31456,0,0,cc0ebc549412cae09a060830a9cb2cf999f8a86a823dbb12d2b962b4a6203 CVE-2024-31457,0,0,7496b235da2a8f649f51f4c05bcb0a1fc7ccf63d38289c9f137e2e2c5f70e2a3,2024-11-21T09:13:33.593000 CVE-2024-31458,0,0,f1203e2c3a46f7be642b13c51e7dd5168879adfb2fe09654c2cb338e1e72a5b8,2024-12-18T20:47:06.343000 CVE-2024-31459,0,0,1536d88df9c977acdfaeb9e560565850a2e9d806cdd7736d9c16cf9832c335ff,2024-12-18T20:49:57.357000 -CVE-2024-3146,0,0,858322bc0ac9d72da3cfa9cf9af22eb19ee6ae2136616be5e2297b41988b9790,2024-11-21T09:28:59.920000 +CVE-2024-3146,0,1,921bbe17f89d038c28d344b6d4facbd9f53d919539b17013c6908c1e76e63b65,2024-11-21T09:28:59.920000 CVE-2024-31460,0,0,b9934b072ac66945304827f83f7b2bda8dee0da8dd2c2b6a6c3bae4ec565a83b,2024-12-18T20:38:39.747000 CVE-2024-31461,0,0,28f7ac7b0f0a2b34006cae07511455110ed8191241b65d0b128bf1e4dfe31b2b,2024-11-21T09:13:34.140000 CVE-2024-31462,0,0,bbdaea048a51f3c126c667e1d3e5774acc38646198fa6cb8c22f9abc61955e58,2024-11-21T09:13:34.613000 @@ -255313,7 +255314,7 @@ CVE-2024-31466,0,0,e8e32a4dffc665a7e100b67cd977c3da98af3bd419dc5108da353bf9e71c6 CVE-2024-31467,0,0,da0fcb2a3bb49b071fbd85d5a7933c2aff565de443665d021699aebb5a4cc6e3,2024-11-21T09:13:35.267000 CVE-2024-31468,0,0,706573435a2db5cec48062ff22358d5ae94484507b7ce4a604910cd19d71a945,2024-11-21T09:13:35.400000 CVE-2024-31469,0,0,ab2dc44e2a5adae20b9c667ac7c62f4581d19de7da18afa25710c41f3fdc1a48,2024-11-21T09:13:35.523000 -CVE-2024-3147,0,0,2aa8db4f59a5409eeb5c0ee68846ff71e4d5555431d8c97a8ccae67085a20879,2024-11-21T09:29:00.070000 +CVE-2024-3147,0,1,1d2b6adad46eda65ef06550eb5986c14098a5e799c2c62577d3143fd373783e2,2024-11-21T09:29:00.070000 CVE-2024-31470,0,0,a5b493fc790eaa80a5844f7bf135a4820751e22c1b8d1a6a865c6a53741d06bb,2024-11-21T09:13:35.643000 CVE-2024-31471,0,0,ddc5f505185cc9f3d38ee766f056a03751f02a1f0e068ea4aef99402a696975f,2024-11-21T09:13:35.767000 CVE-2024-31472,0,0,2772ab1cae5cbec40dbe9b163aaffea03242e7217f84794f0985e6343065883c,2024-11-21T09:13:35.897000 @@ -255324,7 +255325,7 @@ CVE-2024-31476,0,0,6f66ac9ddd300b7bbd1a1a5bce581818284c29daa8754803b3cf06745314f CVE-2024-31477,0,0,c628a9282fb6b3a840981048b8de8ce12c2ede6c3f7bd8dd5f8173a5dbbb4f04,2024-11-21T09:13:36.560000 CVE-2024-31478,0,0,40eda353f28e021ce657a03cf9805572b39445e4521e7a7afabdf1204460c99b,2024-11-21T09:13:36.693000 CVE-2024-31479,0,0,1f47edcbdece714eb5e95387e966b7a7e05daaa0e9c65bd1f9c3ab39200c3455,2024-11-21T09:13:36.830000 -CVE-2024-3148,0,0,7970d411d8e942c346697ba07b4f14752d074352fff4067f5be9ea32137e2e27,2024-11-21T09:29:00.220000 +CVE-2024-3148,0,1,64954d661647e6fb430bf616dbe55a71dbadd4a6992c715a7053dc47de7bd280,2024-11-21T09:29:00.220000 CVE-2024-31480,0,0,86eae1899c29080b8ed9262e063b261d3b66aab2a748eb8aa02b2816e3b66195,2024-11-21T09:13:36.960000 CVE-2024-31481,0,0,d4660e018790786592ad288c3866a8a65d6ecc323047c4920f84308d535b0e5f,2024-11-21T09:13:37.090000 CVE-2024-31482,0,0,36e6d5115015616cf3a4713c4d76ea70c4e037b3fd5456a38befda60d1e11e54,2024-11-21T09:13:37.217000 @@ -255332,7 +255333,7 @@ CVE-2024-31483,0,0,d53a955cd46cf0469a03bb7988134984af15fbd0c29957e3452d9e061e4b5 CVE-2024-31484,0,0,659d2e969344deede1af2ac26a238cb0f51c82aeb2ea05f6e3ba4fe2a034a834,2024-11-27T21:15:07.400000 CVE-2024-31485,0,0,0d3fcb0ecb575c370349f9926a7edd62c66e8e79b393d1a37185c578f719a038,2024-11-21T09:13:37.617000 CVE-2024-31486,0,0,7b6afc57284e2eca1d2c55c22eae9408be3513e75dc9f259985e31d4ec232706,2024-11-21T09:13:37.750000 -CVE-2024-31487,0,0,790a9c7bf706aa4d66a2e050662d97916f6e747ec7c1c7e884813a7be9d9c314,2024-12-23T15:05:45.840000 +CVE-2024-31487,0,1,08fcc8ef6576c44ad67020aa3b90aa1c65c8d0ece85b73ec4ba9fe63beac1c86,2024-12-23T15:05:45.840000 CVE-2024-31488,0,0,cfcf599019007e4943692b70a719c6cb37a35d714337963740462890b05d2346,2024-11-21T09:13:38.013000 CVE-2024-31489,0,0,3c09d689ae4b29e24aa7a9b618ee52fdfa1da44cc707200d5479123d988742c4,2024-09-20T19:41:19.447000 CVE-2024-3149,0,0,8a78140490bcf701e13d0c05549610bd9a1157605ed7c6cf66c461a13a6097ff,2024-11-21T09:29:00.367000 @@ -255340,7 +255341,7 @@ CVE-2024-31490,0,0,fd601ecb6ce1c2bf33547fbbfd274f52c7252a32d9509a829d05990a5e592 CVE-2024-31491,0,0,eb8e9073235bb77415aa2949bd8dca7f0e2f76c335a1621addfa760485c0fdcc,2025-01-02T18:35:20.503000 CVE-2024-31492,0,0,209860fc2b164f15f96abc0fb7ba6df99e9fd427b67254fd5c861805767efa72,2024-11-21T09:13:38.490000 CVE-2024-31493,0,0,9418664761e0b780d111161059e98ef3fd056c9e2ef27d90db3cbacd9d17d9ea,2024-11-21T09:13:38.620000 -CVE-2024-31495,0,0,77b3ad08513a942796daba4d151982a74f28806a6e9424900a4faa30b1652f35,2025-01-02T18:27:26.153000 +CVE-2024-31495,0,1,157a56de21c06532d9c8d19bbc8fe71f35ccfa7d686350a57acfb733a26fa532,2025-01-02T18:27:26.153000 CVE-2024-31496,0,0,441349407eb47d7b15e75063141ce6cbfde8947a3ce6aa9eb5ef39471053a480,2024-11-13T17:01:16.850000 CVE-2024-31497,0,0,6de0a6e1630b9edbedd1fe7b42e0312690a0515831e8093c3ae9b84fca91dc04,2024-11-21T09:13:38.997000 CVE-2024-31498,0,0,b2e6276a70232623190c44e8fb464ed6a164bd12de239edf2266e9b650ae46d0,2024-11-21T09:13:39.247000 @@ -255382,7 +255383,7 @@ CVE-2024-3159,0,0,9ad64a7e8e8b198934b72a1295500c693ba9441f53eef8df46db67ac5cdd20 CVE-2024-3160,0,0,849ad0357856c42e6ffd8656d38bd88af464b4f26c01b1e7dd0dd2944051d988,2024-11-21T09:29:02.200000 CVE-2024-31601,0,0,0ae15c6eb9db3be1b4ba800e8bc2a16c717b63405317f7527b673949d63acaaf,2024-11-21T09:13:44.693000 CVE-2024-31609,0,0,d615c1b0f062c484fa8888ca3e2163e385a1a8409020bec473097550275335c9,2024-11-21T09:13:44.927000 -CVE-2024-3161,0,0,46ac97d9d6cd4ce81bbca28c98c83252b22d30be44c99e4f3abc1c882894a1bc,2024-11-21T09:29:02.347000 +CVE-2024-3161,0,1,f6eeb37a875fe777b7cbbe6744e9b49172cd0f052a80665d392f9663da133f99,2024-11-21T09:29:02.347000 CVE-2024-31610,0,0,e15c2dbc3a8b4a068407039b605acd7cb1ec21247790a4f17866a6bb6fc0a1be,2024-11-21T09:13:45.137000 CVE-2024-31611,0,0,3108af41e5de59d5136e39e4973a5dbf7fc3275d6db82e5313e613f1153df77b,2024-11-21T09:13:45.347000 CVE-2024-31612,0,0,e21e87a0350dc1dc4c0062c07acc797b1f129606b80779537140509864823f0b,2024-11-21T09:13:45.513000 @@ -255390,7 +255391,7 @@ CVE-2024-31613,0,0,8529aaba53cef39837e08da4d416a9a7517ff6599fa9309021dc8bc85d085 CVE-2024-31615,0,0,3579ea7e7dbe9425d9a9674e6d5b00255b2fec3cd199ddc48a9b731fa46b5a61,2024-11-21T09:13:45.953000 CVE-2024-31616,0,0,ce5060690e6e6c38f4b42fed4bd764ea68b08181e44c5a8e5340e1acdf22588b,2024-11-21T09:13:46.163000 CVE-2024-31617,0,0,06653c96774d2107f451435060c2441d39c921d03592211e37177212d37410ad,2024-11-21T09:13:46.370000 -CVE-2024-3162,0,0,4463bd8fe011dacfb183bbfdbf4fc8ebd90b61e5982cdf31365d5c629322438c,2024-11-21T09:29:02.493000 +CVE-2024-3162,0,1,b545337a2bdd95ad98d7ba237ee0ca33a4391837c67ce3a3cec2d7fcec158c5f,2024-11-21T09:29:02.493000 CVE-2024-31621,0,0,81463ee88df86d7eb05f1c43320a183d95d42812c9df62f5ebec43deb478660d,2024-11-21T09:13:46.577000 CVE-2024-31622,0,0,82a150679cb2e6aa18ce1c93441bf5438a3fa3ecf8dcd9f9d21f44c6655c4d69,2024-06-05T17:15:12.400000 CVE-2024-31623,0,0,2a7b23b063ff92a0f5ba44b11b8dd92d49aa1e1d3ce6dc0ea729e6c096ae1393,2024-06-05T17:15:12.510000 @@ -255548,8 +255549,8 @@ CVE-2024-31907,0,0,56360f441ba18f82366ed4eb471a5c96a8260a64fefc6012f99306629a9a9 CVE-2024-31908,0,0,74d2a41f6e31ae19807e7a04173849b90024608a485a3ca2443e9547826e8735,2025-01-08T17:02:59.363000 CVE-2024-3191,0,0,26fefd7ee9b00b194a72c3556380217e011fbb35712e009d8c207a4a175b109d,2024-11-21T09:29:06.920000 CVE-2024-31912,0,0,e94e3df1ade121bddb59b6e335d1c107f2b94a6c777e07a2785aa6e9b40b0354,2024-11-21T09:14:07.060000 -CVE-2024-31913,0,0,0c60ce902f9bc425cc4ff385203bdf252b467675164b8e2fd4f6e5f8d5356ab0,2025-01-06T16:15:28.163000 -CVE-2024-31914,0,0,70e99edb39aeea0caee114a13940c24d81a0a9c0aaf5fd6eb2a830c021010164,2025-01-06T17:15:36.653000 +CVE-2024-31913,0,1,5c36ad85f1ab857c5b7b02eabe3481adc26d7100e41968a173964db7473a3773,2025-01-06T16:15:28.163000 +CVE-2024-31914,0,1,8f54d3c1595f40be32f6003c7ad9aa18159bb689ccb3242d3444b6ed3c0064e9,2025-01-06T17:15:36.653000 CVE-2024-31916,0,0,6fc3d0c53ff2a376147d1c083325963708c8d7a8627c56aff3166ae76e3bdfce,2024-11-21T09:14:07.203000 CVE-2024-31919,0,0,04cd44631dd35d8a93968eae8f42bcf1ee19cf844b815e3cd3b25950416741a4,2024-11-21T09:14:07.353000 CVE-2024-3192,0,0,3e0dbc4df2d1dbda6e08dc3e198a80d103ada553c6f6862741827e4baf1467f2,2024-11-21T09:29:07.070000 @@ -255616,13 +255617,13 @@ CVE-2024-31978,0,0,00e1ff7fa59abdd561a07d5509c0e6d15512000f18511411e0ca8f10df181 CVE-2024-31979,0,0,5a2db70ea0c880e7739f7ec401184435c024484eab9cf5ba7bd3fc3c38bef23c,2024-11-21T09:14:16.167000 CVE-2024-3198,0,0,5a36ff4378c726d4e49073d9c740478334184c1289212117b3659c67070d3095,2024-11-21T09:29:07.950000 CVE-2024-31980,0,0,d0d4049c48afccf07afb61cd89ca21424c5770ee08926cbe3bd84570eccf25a9,2024-11-21T09:14:16.363000 -CVE-2024-31981,0,0,1411ad1727dad76bd24062b92c5867437a11c9465f3d4308e930aa45ea47f8ef,2024-11-21T09:14:16.483000 -CVE-2024-31982,0,0,75b9f13a22c1529a194c101e13c3a49c39fe41d80e361cf95f6fe1d7c22545d1,2024-11-21T09:14:16.600000 -CVE-2024-31983,0,0,4818600cb94818e238d7bb4949b5c37fcc578ad7d37653b3deacc4efb2b73993,2024-11-21T09:14:16.737000 -CVE-2024-31984,0,0,b4bce1cccec417df8c488a6c8ea406f24f03544b0961f6f609e32071b454410e,2024-11-21T09:14:16.870000 -CVE-2024-31985,0,0,10e30f55960ede6bbacbe03ee0c88306214bebaea3201825e6868c6625029fe3,2024-11-21T09:14:17.007000 -CVE-2024-31986,0,0,1b2d2f1f4cbe5034b9e36e52f0f7d71b37d4498b2ce5c76d82bf880e08c5e2f5,2024-11-21T09:14:17.133000 -CVE-2024-31987,0,0,abe9dd8f42bb86acd3cf6dee2fdd2a5b29c54d5566717eab7f11f7cd41a46abb,2024-11-21T09:14:17.267000 +CVE-2024-31981,0,1,a6ae04ed6979783b9f6bb6aa6797aa47ba0dbd69cd147a00ae08d0502bffe86c,2024-11-21T09:14:16.483000 +CVE-2024-31982,0,1,56c0d40fd49b26ebec8522b15307a62340b7c0cb3da6c94324328b776e2b88f2,2024-11-21T09:14:16.600000 +CVE-2024-31983,0,1,a7248343ae3385492f3afae7327384e1b8b6afe42722bf7d1b0375beab7b4087,2024-11-21T09:14:16.737000 +CVE-2024-31984,0,1,e5c83157aac2d1da43c1fd40faf8441cdb1ff523564e41f49d4054bb0757e308,2024-11-21T09:14:16.870000 +CVE-2024-31985,0,1,8b597daf49963cd356a85fd42e5c6ab425eeedc4823ea342fc391379c03b5951,2024-11-21T09:14:17.007000 +CVE-2024-31986,0,1,b5cedc45e879ef6685f89351e24eab1c892f41db1b4998dbcb052f3033425451,2024-11-21T09:14:17.133000 +CVE-2024-31987,0,1,9b0f8dde623b28428ea272e5cf88697a7093bc6e90820dc2079387179a984250,2024-11-21T09:14:17.267000 CVE-2024-31988,0,0,e1f6fe0e57c15ec80e26442fc27a73e4d01b1cd5c9eee218db1d87a564cae068,2025-01-09T18:54:53.390000 CVE-2024-31989,0,0,36cdf7afb424d91302a92c3464338da9f6357aa9b905adc4be0eba8e4665664b,2025-01-09T16:56:47.220000 CVE-2024-3199,0,0,f1dcc8fa9251a13b6d2329d451b94b037b8df3eb36a8c0ed1aff5360e1397f65,2024-11-21T09:29:08.080000 @@ -255733,7 +255734,7 @@ CVE-2024-32109,0,0,c9a7cac737476956b9fbf72c1e5d6a8a50bb5a1742710bddb0f71999ccd9d CVE-2024-3211,0,0,98aac495f2a7a17ab7cb4a24950a45aa52e6a13f3e3a0c46ae3956f9c49aadf2,2024-11-21T09:29:09.530000 CVE-2024-32111,0,0,121bcf9e03eb2023e507e49bca0f378abedab19bac9b9cac33fc8d7c3f599a80,2024-11-21T09:14:29.573000 CVE-2024-32112,0,0,3cc0cdd2e390858089e1a98f8ecf0a04851da7cfb00b76da57093ec0ffbb5739,2024-11-21T09:14:29.720000 -CVE-2024-32113,0,0,758bc627df310f7de0704ae877061bf72b342caa11ef83c397db20df8b50d04e,2024-12-20T16:51:57.577000 +CVE-2024-32113,0,1,b0416d14f21fbcfcb8bd0e4b14fa8754bf0dc777f677edb1f6cc939227329fa6,2024-12-20T16:51:57.577000 CVE-2024-32114,0,0,ec761db7a5ad46df257b60e3bffba3183bd48091e424b77fbddb80d44570b8c2,2024-11-21T09:14:30.127000 CVE-2024-32116,0,0,f10f3c24dc00a2826d06434dd27b29c41c2c38d776ae02f6706b238c0f312734,2024-11-13T17:01:16.850000 CVE-2024-32117,0,0,6ced7b5df85b7cf270709040a6c78ad7915ac1694cdc1063e73cbc492ca11ee8,2024-11-13T17:01:16.850000 @@ -255765,7 +255766,7 @@ CVE-2024-32146,0,0,d7252d00cb33a5d498332bf97ef76d87efb5a38467744dde48f75adf29561 CVE-2024-32147,0,0,0015a72344f3020594d938609bf1336e585f7e37db5d3978f4116a4c5b174873,2024-11-21T09:14:33.310000 CVE-2024-32148,0,0,bcbcb84cdf067050c2de05f2b2117ff412680d783b9484863f82a8a6e2a92a10,2024-11-21T09:14:33.430000 CVE-2024-32149,0,0,e0c6e240bf305db98fa85abfaf803a0c1cbaf878c7d8f6ce0402b338521663c9,2024-11-21T09:14:33.557000 -CVE-2024-3215,0,0,01621d63ab961fc2c33bfadfc7b5d436352b830f7786dfdc30adb9f4eb709f69,2024-11-21T09:29:09.883000 +CVE-2024-3215,0,1,4b54cccbc0dd92a6d61346ad7fcb75997b04c0b2ec312622cedf056353e63133,2024-11-21T09:29:09.883000 CVE-2024-32151,0,0,6ef8771c34640d7f13180ea9ea6a01f89209f8312db5eeac2c929f25738557d1,2024-11-26T11:21:59.167000 CVE-2024-32152,0,0,17251408a63ed517f0bdd7cd945d039fc818a169725454c1d9b534ef050e436b,2024-11-21T09:14:33.683000 CVE-2024-3216,0,0,6e9522f1c7c9e9a3f76fb9a1485b608987693fafdd4c6cd3272aed28685da99b,2024-11-21T09:29:10.010000 @@ -256182,7 +256183,7 @@ CVE-2024-32718,0,0,be0620dc537ac0370bf66f57bd5be346f127423856b03dc2d49178c19ad3b CVE-2024-32719,0,0,6f2789ec54efc8ddedf42f68a45f9c75732887c1be2e19d4aad66b6559ded744,2024-11-21T09:15:33.620000 CVE-2024-3272,0,0,8755f31ebd5bed47a497c43058ee97d33270a67431045a7b7ba96fcc6233b0df,2024-11-29T16:45:43.063000 CVE-2024-32720,0,0,d0e3ba56f6f4a8089cade475b59bd6d70c2bbbfb7f07a0721792e0f5d0ff2be0,2024-11-21T09:15:33.770000 -CVE-2024-32721,0,0,ed077dbc56632c5598368741b8afb10b2de55aac67ebde3ce47c6ab66f2f8814,2024-11-21T09:15:33.913000 +CVE-2024-32721,0,1,cbdcf998cd70bd6c9cff6906ff76e5ccb74ee73c2d4a0256e99182fcee4c25c6,2024-11-21T09:15:33.913000 CVE-2024-32722,0,0,a324ca17819bc3a9c9f97e1b5e578ce2dcd2378504688ecda21bb506c29df6c6,2024-11-21T09:15:34.077000 CVE-2024-32723,0,0,a84bdd001a2b45a7d4affd6762b0b97ad99b52f40ea77644ea8d23955339e682,2024-11-21T09:15:34.230000 CVE-2024-32724,0,0,51ca452f7a7b623b01514c46eff68ae49828f4685443618d277391905bbc3f13,2024-11-21T09:15:34.377000 @@ -256251,10 +256252,10 @@ CVE-2024-32788,0,0,46dee0cff203cabca907a85961b57d3c514fb3ea5062d5eec2e98fe5b0dd1 CVE-2024-32789,0,0,2defdcdd4734555fa465a0c5c0c0c509caa5aa6faa13ca6c19bcf982f4f524bd,2024-11-21T09:15:43.520000 CVE-2024-3279,0,0,3931cbd4a5e701d4e1e0cef0ea4f1c9a08b10874fa9a677b543cd8a7fbd12480,2024-08-12T13:41:36.517000 CVE-2024-32790,0,0,e9256f14fe881a37e99212e8d1aad2ff7d79d79bd33dcd818c1d32a6631f1777,2024-11-21T09:15:43.643000 -CVE-2024-32791,0,0,1d75b08ca4d5fcd9392f293c2eae38ec8a9390849748686383f1f81582482a6a,2024-11-21T09:15:43.777000 +CVE-2024-32791,0,1,3c83e4e6bdc3bd9e2bc146df948348d8c7b709a3fa18cc94f49ff17f6200f643,2024-11-21T09:15:43.777000 CVE-2024-32792,0,0,5c3e810254268cd8d1009586f0d3beaa09807399a499ce961caa0903b8199d26,2024-11-21T09:15:43.910000 -CVE-2024-32793,0,0,41085b14085f3aa346cd0f23635cdd7186e311bbc6d387c984b2b5e4a9f101e9,2024-11-21T09:15:44.033000 -CVE-2024-32794,0,0,b13d39cf98ef9735ebf9ac4bf4c0521aa2acbb53f79b00b419cee23759195702,2024-11-21T09:15:44.157000 +CVE-2024-32793,0,1,fa9fd9d861822fec2f2998581ca2b671eb021c6ed3bdc80973193b7c71abde83,2024-11-21T09:15:44.033000 +CVE-2024-32794,0,1,e43ec9b6f44b7a22b3ff2c85b1ee29f529aebfbce508a99ca5ea1a8b5fd976ba,2024-11-21T09:15:44.157000 CVE-2024-32795,0,0,fdfe798dbd74407bc911a1475ae57f4d59eec3d8f83eeb0bf9cfdc097931c631,2024-11-21T09:15:44.283000 CVE-2024-32796,0,0,3c13d57420299f06b0c04faec16c8cc0dcf69d3a31f7429ad926f51ca4392368,2024-11-21T09:15:44.413000 CVE-2024-32797,0,0,a034c0aeac18f60b3720fcd260799e2d6973e2274f86c902b1d05567f350442e,2024-11-21T09:15:44.547000 @@ -256980,21 +256981,21 @@ CVE-2024-33809,0,0,5f800f5285ff2bfc0ecc751acd21c04b6bc87ec606c35f99e2cfc9f62ed3b CVE-2024-3381,0,0,54f1490359f84b37b9085d1c2a64f460d8cc1a4d213b5755f1dd6de7bae13285,2024-05-27T13:15:08.490000 CVE-2024-33818,0,0,8ed01d3814fe01ef937bdf9ed38c458a5713855afe9ef1068e8930fb56f7619a,2024-11-21T09:17:32.723000 CVE-2024-33819,0,0,7e61d4c0dd3553f64a2e5fef11b92143383472dd77b567ea2aea59f5055dae94,2024-11-21T09:17:32.847000 -CVE-2024-3382,0,0,f5abef8d44feae23c037dffc747cc145e724ed75f4ae5a88a1320b7b1ba70a66,2024-11-21T09:29:30.253000 +CVE-2024-3382,0,1,d3e95e0895dbe2bff75fc41f3bd892dcb46b975969b2f7c43869f8d6a79fe7ec,2024-11-21T09:29:30.253000 CVE-2024-33820,0,0,cfee89ad7ad37aa0a23734591a3b5cbc350282c1f511c40effb3edcabf5bfacf,2024-11-21T09:17:33.030000 CVE-2024-33829,0,0,29c77d19540accb450598443b67b5c2e3910197757a370c151dd370ee4356fa7,2024-11-21T09:17:33.210000 -CVE-2024-3383,0,0,5b0c4da5577ae4f7dd5bc94194a28cfd08d9011e565cf1a639f236a26746dfb5,2024-11-21T09:29:30.393000 +CVE-2024-3383,0,1,430b0d8561d28c308c86f02f1afeb4736d70095c27a3c26603f2024bafec2629,2024-11-21T09:29:30.393000 CVE-2024-33830,0,0,f1012ab730edcfd864a0644722071cb6ff41ee64e585601d191df590a20be372,2024-11-21T09:17:33.390000 CVE-2024-33831,0,0,f91f34cdd2bcb6e6adcab72045795af979a1b6ad2c28fa652db7625dedd4f35d,2024-11-21T09:17:33.660000 CVE-2024-33832,0,0,4a7de24f1ee6133b608740a244d388457220575de4659dfa0b317191ab265879,2024-11-21T09:17:33.847000 CVE-2024-33835,0,0,3e192c85c2f13a4a00101e791f822c9888ae665f140c80028c35765adbfb6897,2024-11-21T09:17:34.033000 CVE-2024-33836,0,0,e9fdefa6cfdfda12401c899a902faeb54477882eb31bdafd3c99df2e5bfe597c,2024-11-21T09:17:34.227000 -CVE-2024-3384,0,0,c5600a586bb681c52f39895515a2b322e4227febd6b8245b8f7ff12a971c830c,2024-11-21T09:29:30.517000 +CVE-2024-3384,0,1,facad86ff4605d4f56372449d88ec5ad1f5418a72a35ff65698fd79fc0bebc3a,2024-11-21T09:29:30.517000 CVE-2024-33844,0,0,35a52a8744d0fcdfd12df4f953c97083a2e6c4facdb84d82a049304cd05dc966,2024-11-21T09:17:34.417000 CVE-2024-33847,0,0,0e33780554413dd547d01d3bde95dd663b7322b2900748aca98a0a4892461080,2024-11-21T09:17:34.583000 CVE-2024-33848,0,0,02c22cad364477c78ca36f2128f6569adfb33ef435429cacb39caed0aa330e57,2024-09-23T14:43:46.237000 CVE-2024-33849,0,0,780116ff508c226f1ec4e1d18c7cd90231176db688bd866197c7b6a90bb43e99,2024-11-21T09:17:34.747000 -CVE-2024-3385,0,0,58ddaa4be9654953309e5afeb6af2789f10a29237555778c1b076bbd09b8d34f,2024-11-21T09:29:30.643000 +CVE-2024-3385,0,1,f45b1d8ff11b8bd7cda34573a8a36a2428782efa8c12930c8732d992e8eb5e80,2024-11-21T09:29:30.643000 CVE-2024-33850,0,0,d09f2897d6295f52c3c2bcac5bbc4ea50c81fb3650ae3bf505c5df1d1445b584,2024-11-21T20:15:40.613000 CVE-2024-33851,0,0,71d753e61b781c59c22b9dcc54d2b5b30979e95171405bf3f58ea335895d1b3f,2024-11-21T09:17:35.070000 CVE-2024-33852,0,0,507aa966348da8ffb990bc6335d57ea0b339c67384a70120be46bd5c3cf932c1,2024-08-23T18:46:51.787000 @@ -257004,7 +257005,7 @@ CVE-2024-33856,0,0,4f23026493aa3877de0959a38f0b86bb379d7d08470341d0e7ad0ace3b563 CVE-2024-33857,0,0,77d01ceb40c93381f5acf7785a3b669a32af207819ec7333304ce5c0e7a2e411,2024-11-21T09:17:36.067000 CVE-2024-33858,0,0,9114223c43a141912be3f128bc3c8cb62d8a96efd25edc1ab707d8e062b8eb25,2024-11-21T20:15:41.053000 CVE-2024-33859,0,0,dc5b9c20e404e47a5cfff66ccd56d92eacfeafd390052398162be12ecbafe303,2024-11-21T09:17:36.450000 -CVE-2024-3386,0,0,49f662ca5c10eeb78beda50d7be60f301581dec96b88b4d4b643a13ebc73eef7,2024-11-21T09:29:30.777000 +CVE-2024-3386,0,1,3126fc52eb8f63afc2ddac0716c7f12903a1d94fc28aaaf96513941bc4faa375,2024-11-21T09:29:30.777000 CVE-2024-33860,0,0,95d43169914403ddcee8d89556509183f9c1c43beb33a9c60855306e26cd6805,2024-11-21T09:17:36.627000 CVE-2024-33862,0,0,bdf330956f292e5af5ddd4f626be2d578dc200b215e50ea65f571e34b29e7064,2024-11-21T09:17:36.807000 CVE-2024-33863,0,0,8463f6379dae00b0b06c14f4b48691e4c00a201a624d971dc6b59809a30da84a,2024-11-21T09:17:37.030000 @@ -257025,7 +257026,7 @@ CVE-2024-33876,0,0,b28633b24e587cf6186cb32ca1f492f3221dfc1bf43fa8aa10c129f615def CVE-2024-33877,0,0,8b1243ef0c134393a090955101488ff5279f60f5bc7848f732464fde40e97709,2024-11-21T09:17:39.600000 CVE-2024-33878,0,0,feb8ae1feff70622d1e1a8722fc435816940bd9a5d61c3251757968e032c5925,2024-05-14T15:38:10.657000 CVE-2024-33879,0,0,6af65bc1296155ce6dcbc637906c4c848f8f160031b78a70bd743f7c6e9a6239,2024-11-21T09:17:39.790000 -CVE-2024-3388,0,0,e6af73b84540f1ad87e99ede1969c4343538e7e21dc2f5755f750a824c4bc0d3,2024-11-21T09:29:31.047000 +CVE-2024-3388,0,1,462a6a3a21154dbcb7ca0dd9b230b2154edbc097a288baa6c71bdd30d43c81c5,2024-11-21T09:29:31.047000 CVE-2024-33880,0,0,e592b0fcc1945574e62b07791cd81dcd61e6efd0a8817280337b8ece817c4469,2024-11-21T09:17:39.983000 CVE-2024-33881,0,0,c1b886fc16abf7aae010d3cd0b6df126ac4a7dacff52bac3f012a72388bd5eb6,2024-11-21T09:17:40.110000 CVE-2024-33883,0,0,a60b6dbe01d0df4525fad217549abc289e2dc3142ec07f81c8d9b45c0506b159,2024-11-21T09:17:40.303000 @@ -257065,7 +257066,7 @@ CVE-2024-33926,0,0,ba3b0b5d452557f451f073e7051635f20935a7d4b0bf1e31891232c3b0d24 CVE-2024-33927,0,0,47a33c5c8d9c813c7e0792969b9d2c7f5a02e1e804addbde5e0fd6efc0070e34,2024-11-21T09:17:45.063000 CVE-2024-33928,0,0,5485d29b9f1f54b48807c0a7fab77f8660a3f6f005966e3d555ef2b3d42ff3b8,2024-11-21T09:17:45.170000 CVE-2024-33929,0,0,9250b6acc401d14df60daf091a118dd6e90efe6072ae5814267d257083c00a7c,2024-11-21T09:17:45.277000 -CVE-2024-3393,0,0,82cdef2f436f428aba3983cae5ad6f97d68af7fb27faba094e0b6f6eebad4246,2025-01-04T02:00:01.597000 +CVE-2024-3393,0,1,20ab9bbb5df9db7006038c660ac8d0cea3929091898b85e1acfbc8a99564c46c,2025-01-04T02:00:01.597000 CVE-2024-33930,0,0,352e81bce8bffcdd250f3e4cc8b8032938f93f842babfe72361bc9938c4c9ff9,2024-11-21T09:17:45.387000 CVE-2024-33931,0,0,02797798e9c898cf0c4c463d6fab582aa710f3a0cf7c63a98df878120217d686,2024-11-21T09:17:45.490000 CVE-2024-33932,0,0,a959ef4dc107f5a5fd9667e1036684cdb3d2d4571d8d1f2cc49022d8aa2387fc,2024-11-21T09:17:45.610000 @@ -258062,24 +258063,24 @@ CVE-2024-35244,0,0,cbd208ecca55630dd2a1d4862e946bcbd061feebf24e87ee37a34c745a2dd CVE-2024-35245,0,0,574f436fd107b499b1a8b1a46c1845c58ea1e806916483b13195bc2deb9a39e1,2024-11-15T14:00:09.720000 CVE-2024-35246,0,0,f5cd38c8228a273507f8ed025c6445f4fe653b79fbcb96f80f0f271ece411ac8,2024-11-21T09:20:00.693000 CVE-2024-35247,0,0,dda0cd3411fcd13059f9606bedd08c571900aa945b233a955dbeca9ed9ce9feb,2024-11-21T09:20:00.830000 -CVE-2024-35248,0,0,ac9a2dc6e0dd8a5abe7fbef99e578829d565ee58a7fec8ea1845560af74b14f0,2024-11-21T09:20:00.980000 -CVE-2024-35249,0,0,337b4dad701672d3487ec362dcfed9e064098a253fcfc090945957fec6d3256a,2024-11-21T09:20:01.130000 +CVE-2024-35248,0,1,7c3ed5cb016eeae24ebeb7d52be404adf38788725c5e83b5d27391e0dc1d9bf7,2024-11-21T09:20:00.980000 +CVE-2024-35249,0,1,302b7c8906e51cdc971703773787e3153a88d65789ad0641a56c6ae0bd42570d,2024-11-21T09:20:01.130000 CVE-2024-3525,0,0,8b2c6a8c265bd120a4ae62349e50b9dc4f071348306abdc8eba422a9675a5ff1,2024-11-21T09:29:46.930000 -CVE-2024-35250,0,0,316b0be38744112bf07c0b78ea46e25fd033782e3f849f4a2c8f79ca622b39b0,2024-12-17T02:00:02.077000 -CVE-2024-35252,0,0,dc153c0bb056da8343161f5a1e249e659e7950bd6ee4567005f9d335c447fcd4,2024-11-21T09:20:01.453000 -CVE-2024-35253,0,0,6d7a1cb30a293ddff8190198f3e106a81e47c0754b430f944094f1f8c622255c,2024-11-21T09:20:01.607000 -CVE-2024-35254,0,0,3c9714c8356e77fa2270fe0dd2d859b65410451e7631d74ea307079ccde37e66,2024-11-21T09:20:01.750000 -CVE-2024-35255,0,0,3cf0bdd220d21fd39330163295642050df8a2787502ce535a89d0506445c05a7,2024-11-21T09:20:01.923000 +CVE-2024-35250,0,1,ce6a53f3c0a8dfa3764b939943deaf8e7659c0859ad9a03dafbf3ef57b7b7d43,2024-12-17T02:00:02.077000 +CVE-2024-35252,0,1,0f8cf4ca91d191378f3442941d01f34b6bf05c200f0024f0bb3474e02f2e50d7,2024-11-21T09:20:01.453000 +CVE-2024-35253,0,1,bee685c773d8375872a8fd41de235ce0377b714b15d51115236139dd0a8b700c,2024-11-21T09:20:01.607000 +CVE-2024-35254,0,1,0973352a78955e1008d161d71b8515ce181d81658087521aabcddd672b8cbfcc,2024-11-21T09:20:01.750000 +CVE-2024-35255,0,1,581f31b36f75ac6f46c2d37b76c568a4621a453c4676f680bee3fd5ee48a9960,2024-11-21T09:20:01.923000 CVE-2024-35256,0,0,fdf58bc15c9e5829b008eba0447eb31c7908d245ff677b68e36e7a51e7c32591,2024-11-21T09:20:02.097000 CVE-2024-3526,0,0,00aba66344c4ad9a98adc51159299f69d8d607e96cdf6c69f58bf49990693859,2024-11-21T09:29:47.070000 CVE-2024-35260,0,0,1197c85121ceac774d2666d680d224fce30d275cdec513f755e3a03db8f67451,2024-12-28T00:15:29.727000 CVE-2024-35261,0,0,853243ae96986895a452e742ac88fbd64f946a14c2dfa4fbfbe67cdf2d85f617,2024-11-21T09:20:02.430000 -CVE-2024-35263,0,0,709f9d515b6ed271b14f9348546634e6bf383eb6b6587d24bc6970bbdd3738db,2024-11-21T09:20:02.580000 -CVE-2024-35264,0,0,7590087789b92079ec60aecde12a27a02365293c132f52a5ac5f839ce7a6612f,2024-11-21T09:20:02.723000 -CVE-2024-35265,0,0,af29f960f70842d15010330eedf5598fc8fb58cd87578c2641b5da497a4b5e81,2024-11-21T09:20:02.880000 +CVE-2024-35263,0,1,951083709f373b75c0d1b8dc0a3ecfb5290e69be2b6665942bcb07c45a716bd1,2024-11-21T09:20:02.580000 +CVE-2024-35264,0,1,b9590d3542cd7e753efff643842f5350608ad1d01a3bc98f08d12314503ba03c,2024-11-21T09:20:02.723000 +CVE-2024-35265,0,1,ca65493f3e7adb995d503d9765c0195e1c17f9416eac1ffb70d30f1d58f0a4dc,2024-11-21T09:20:02.880000 CVE-2024-35266,0,0,5d5d5d28395bb0c72177f235feda52be9dfefead09ff314b0da00986f8bfd88b,2024-11-21T09:20:03.053000 CVE-2024-35267,0,0,9ddea27617f038237b3128d4e75fc5102d056540871869cdbf937fd02f76ab71,2024-11-21T09:20:03.217000 -CVE-2024-35270,0,0,b6c1853f5c6a3d40a933928980c77d68f8d028ba890604c86f492f70b0fb4f14,2024-11-21T09:20:03.357000 +CVE-2024-35270,0,1,54fc0aef882c68b0af36e2a2e87ea567a3f0433770da6d3701c29cb540de6659,2024-11-21T09:20:03.357000 CVE-2024-35271,0,0,53435ea3e84efa467a9bdfc22250170e3299e5610ce3c91fa1af50680f120201,2024-11-21T09:20:03.527000 CVE-2024-35272,0,0,7c25fd9425a5925ce7b680ae430dc4c99441fca7143b7504eaba903c26bfba9b,2024-11-21T09:20:03.667000 CVE-2024-35274,0,0,9a6beae4bfe35b0b8aee9a3d653759bf728b408106a661c475615a0bb6353472,2024-11-13T17:01:16.850000 @@ -258148,7 +258149,7 @@ CVE-2024-35359,0,0,ebd79174dfb7ac257fb41388eea21839910657d0184b40fdf6359090d4089 CVE-2024-3536,0,0,f61f758feff8e86a26533bd96329f276bdabc00164a17283a9ca7edca8ea810e,2024-11-21T09:29:48.253000 CVE-2024-35361,0,0,ba078c8fe5aa2f3cfaede9b86bade7ec878c218d84d169b517462fabd4369970,2024-11-21T09:20:13.143000 CVE-2024-35362,0,0,c9ceca7447b8a557451b5967fa218d930b5f59694547d29930113b4859836719,2024-11-21T09:20:13.357000 -CVE-2024-35365,0,0,a26045c87b4e71a6df02377717030d5e23552eab779f5a833cbd0688a2eb325e,2025-01-03T21:15:12.940000 +CVE-2024-35365,0,1,1c05bee1a7dabfe40acb221d1e4fd3b9c4ef93fda79ae1a0f764cfd1249a7a38,2025-01-03T21:15:12.940000 CVE-2024-35366,0,0,cce3847e362944647524f42f8c96161fb821767a34a431ba81a662d8d164730d,2024-12-03T14:15:20.107000 CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000 CVE-2024-35368,0,0,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000 @@ -258225,8 +258226,8 @@ CVE-2024-35520,0,0,7a7140eb6223b1e15a30b238cf928c4beb91633fbb52e20d4cf0ea71e9a80 CVE-2024-35522,0,0,2626616769563e7a96297f39345d530eb58b02f356a18fe02e8e08a2db8a5fc1,2024-11-08T21:25:44.667000 CVE-2024-35526,0,0,de3a832d01072d880b0e7f865e64ed7d95d3fed5f854bbcc2e5b8cb7231ebca2,2024-11-21T09:20:23.833000 CVE-2024-35527,0,0,d802d5954ff7f9b39a6b2dc0af26915bbf794a29707ccef9cebcfa3c1be1edad,2024-11-21T09:20:24.040000 -CVE-2024-3553,0,0,c997e76340d2569cee154991e02a7ad2e13c17e9507753eb8dd6bd1059f541e8,2024-11-21T09:29:51.813000 -CVE-2024-35532,0,0,d5dce768c0b30ed331525ad1922860096f653a705b5e81a17d6f30025af1dd0c,2025-01-08T15:15:17.793000 +CVE-2024-3553,0,1,e04524050e183210c272d251be7e161d30ed7f2c27cad402660d244ef5ac80b0,2024-11-21T09:29:51.813000 +CVE-2024-35532,0,1,feed18e3e5768cea1f19bf7390d6eac06db80fa1667c8f051e007dd8daab0194,2025-01-08T15:15:17.793000 CVE-2024-35537,0,0,21d93b44cce1e0ea0c269b874880ed5b770c1a2fdf35d7de97a57a169f267fd1,2024-11-21T09:20:24.273000 CVE-2024-35538,0,0,1466111acec37e4d2df7289bfbd264c0429fad437a46245bcd2bfb14bbd7c76d,2024-08-20T15:44:20.567000 CVE-2024-35539,0,0,4f279216ce5454db3adbdb46420f92fade8a007bf9e1d3c6bbc30aa69408e3de,2024-08-21T14:35:10.017000 @@ -258469,7 +258470,7 @@ CVE-2024-35808,0,0,8cd0348e85e84afc85516e9508e28b368a1738ec259235e1ee14afd348ff6 CVE-2024-35809,0,0,47f3bd95a8279da81b1989e0d15fc58339b73402682851154c2828a34e185e75,2024-11-21T09:20:56.760000 CVE-2024-3581,0,0,93a459cabeb85870643801d1bff717bb88967edd8693d080ac01eb4c99cae97c,2024-11-21T09:29:55.307000 CVE-2024-35810,0,0,958005a5f063c06af5e802039d86259896a68546043fceb83b344e24e9933223,2024-11-21T09:20:56.973000 -CVE-2024-35811,0,0,18e09acfe4bd5d2ab520c40861b1ac259c453a279f22f5e29a74cf23456bb0df,2024-11-21T09:20:57.097000 +CVE-2024-35811,0,1,ac3030b7c23805ed73df3674fc0746d1a11c0db7e84d07534653d2b5c5116776,2024-11-21T09:20:57.097000 CVE-2024-35812,0,0,88ab3c5388076701bc302df8ff295570e098a0e08ef335144c7c2c608124795d,2024-06-04T13:15:52.390000 CVE-2024-35813,0,0,d55ed165ea93f7a284698fda3dab49c6a62251de40b377ecee6122bd5051e8ff,2024-11-21T09:20:57.250000 CVE-2024-35814,0,0,ecfff0df086e37e64b9e59cc4d1488e80f1e052fe64ccbf325c70a844c28d260,2024-11-21T09:20:57.387000 @@ -258651,7 +258652,7 @@ CVE-2024-35975,0,0,9000c61923f32a42265c031d1b7f11ad9f431dee146ed1f0437c15b7f84c2 CVE-2024-35976,0,0,e54b83ebdae1b78b335c6669c6f07edba32fd678644b60a19e36075d50215875,2024-11-21T09:21:20.397000 CVE-2024-35977,0,0,123429e4d97cec1bf1813324968b35c8cc45aad0f17c69fdc01fbd294532471b,2024-11-21T09:21:20.613000 CVE-2024-35978,0,0,454b5f38fcf94da8a14587a7c8869850b14e624b1555e8c5359f80cfaf7c7c5c,2024-11-21T09:21:20.740000 -CVE-2024-35979,0,0,13f96c4d683b1bcb5a3397987190b01b6c6ca497822d8af239656a6bc63e2b1b,2024-11-21T09:21:20.893000 +CVE-2024-35979,0,1,33f6cf2d3aa08d98d0ab84c79aae9e0d70ad953c6ab48757a2c370e5fd69a9ad,2024-11-21T09:21:20.893000 CVE-2024-3598,0,0,119ef9f5041f661536a93962da8549d2898a293c6c446964f2fd4168e3c1d071,2025-01-08T17:26:13.300000 CVE-2024-35980,0,0,3111d7ffa21a44e22a4b11db583466d1a024bdb995edea69f44a4a219621a61a,2024-11-21T09:21:21.040000 CVE-2024-35981,0,0,2935e67e0c7016a6a5c1c59b500045dc906210d41e41d6245f89da6fa3127d2b,2024-11-21T09:21:21.163000 @@ -259159,7 +259160,7 @@ CVE-2024-3661,0,0,11a579560faa5cc1a7695ecebefa36af8b143192151784b4c1d37ba82796f9 CVE-2024-36610,0,0,086f8f5b46926c0d5b801e2f18812ba0aac4c04dd5f1ff997c802b3134a682c8,2024-12-24T21:15:18.280000 CVE-2024-36611,0,0,8ae1129d2c6d7f04820dc25a51b35eeb79c0ea9714d3891bb92ee90d865f9805,2024-12-03T21:15:06.783000 CVE-2024-36612,0,0,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000 -CVE-2024-36613,0,0,5e0f7ef111e3993750bd6438d4abc44d38bd901ae1fa2a88c7ea99f930b7978c,2025-01-03T21:15:13.140000 +CVE-2024-36613,0,1,b7baf4e09e8e2e390854f7637a801321e4cf8ede9da250ff01c3b59112fc41a0,2025-01-03T21:15:13.140000 CVE-2024-36615,0,0,c3893c90b5581100f420f26ee0ccf784458a2107b295d3c77defc3849a0f0672,2024-12-03T16:15:22.197000 CVE-2024-36616,0,0,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000 CVE-2024-36617,0,0,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000 @@ -259290,7 +259291,7 @@ CVE-2024-36895,0,0,684c00dde09907e927e44f9174b061ade7141ca3e354d57fc00b76215dcd9 CVE-2024-36896,0,0,e9448b3c9a8d753d7c630264e17459a93b42a163e84bb510cf47d3e529e0f6d1,2024-11-21T09:22:45.570000 CVE-2024-36897,0,0,91b89a1040a68416e730b82430cfe95d2d9678b0b1f6ecd96a2d3737af7efedf,2024-11-21T09:22:45.770000 CVE-2024-36898,0,0,5afbbf771ad045f799b4e01b09d8870e13c2f688743602e4f4080bfeece9a7d6,2024-11-21T09:22:45.997000 -CVE-2024-36899,0,0,81e74dc6b82503d5edf699854215b6c3a0834d29939049e6bd6ce0f40b4ae4ba,2024-11-21T09:22:46.107000 +CVE-2024-36899,0,1,7f83c8c3c40904da9c4321d3cb61cbf23a600675da876716c0aeee56e958e6b2,2024-11-21T09:22:46.107000 CVE-2024-3690,0,0,9715959ecb65e967f842de03373b14c2519a679bd79d2de726fadccbb548af5e,2024-11-21T09:30:11.180000 CVE-2024-36900,0,0,adf1ad016d33174b396780c06eeb1024f0ba5c3a8fbf42972cb4c5bcb9045803,2024-11-21T09:22:46.227000 CVE-2024-36901,0,0,237495fca14effca0ca8c8f3a6c5077fee1e52deb6908b6b28c6bd67288d8cfd,2024-11-21T09:22:46.347000 @@ -259663,7 +259664,7 @@ CVE-2024-37273,0,0,19aa6d304da1bd4a46159a727b6cd1e00f85560895b8810050128dc09a188 CVE-2024-37274,0,0,bea4b4f99916a1a84b897cc9ac81d665de60e3f1089864833b0f3d46bae05e8e,2025-01-02T12:15:18.857000 CVE-2024-37275,0,0,cd3274dcdadb7cfece3b7cc68a35fc8b7f02682cb36b503bd3d552d1bfd411e7,2024-11-21T09:23:31.230000 CVE-2024-37276,0,0,8fa601787078a7d94291da07862d06b98f1c8d76701e8d01e1801face58b737d,2024-11-01T20:24:53.730000 -CVE-2024-37277,0,0,6bef2521d0e634706c130550687638a5e0ab6b669a9a86df1df6f2836a4f4834,2024-11-01T20:24:53.730000 +CVE-2024-37277,0,1,9c3953ae2724e4487650be2a93e302666d83e5a2250210f791b372755de193f5,2024-11-01T20:24:53.730000 CVE-2024-37278,0,0,1436c2c246d028569aadd71e09653ad12932a70965aba38322d19c40d94fb1ce,2024-11-21T09:23:31.583000 CVE-2024-37279,0,0,abea7d170e037ff0e94eacd5a1d2641ca163a9b9cff50d73ada60b93d302eb74,2024-11-21T09:23:31.710000 CVE-2024-3728,0,0,2f47ba3b88b08d1c7f062871db579ad3a810495a3df2f8082be944b99e745aa1,2025-01-08T21:11:21.157000 @@ -259712,7 +259713,7 @@ CVE-2024-37321,0,0,3599724510d409972a2c369a40e20b7dee3441b45d237015c8ec006172fe2 CVE-2024-37322,0,0,9062728a31a0ed45209ba67b972edc92452e760ef80af533867bdb442750f6d7,2024-11-21T09:23:36.720000 CVE-2024-37323,0,0,972c7472887e858cb2317e34e1783ef8ecdcbbda05bf91ec72e5d6f96519e1a9,2024-11-21T09:23:36.863000 CVE-2024-37324,0,0,e83d72e65acbc8d307e6f42c4872af648a1a77b50935c2ab2e800c08f0bdb3ac,2024-11-21T09:23:37 -CVE-2024-37325,0,0,4300820455dcc7899115b3bc7bbb9ad04d603fff96b2cec59938daf358b13234,2024-11-21T09:23:37.147000 +CVE-2024-37325,0,1,6967530654709ca5c0fd6edb57cd3de091ef395aec269221a5fc51896155bc1f,2024-11-21T09:23:37.147000 CVE-2024-37326,0,0,cd3157c18295c239e95bbf51c79b5d38178464697be5d5def6d8cdaab2f98bb0,2024-11-21T09:23:37.280000 CVE-2024-37327,0,0,f79bdc1e689f4c684246d7c252cb22195dd5362a6e7d6bc101125faf27b2343d,2024-11-21T09:23:37.430000 CVE-2024-37328,0,0,78f60415f0bb43af159eab82171fedd8dc69058aa6d4614b6426836919d6e7f4,2024-11-21T09:23:37.573000 @@ -259723,13 +259724,13 @@ CVE-2024-37331,0,0,f8e95625387eb36c25d7cb3bb40e7c2945158e5b04cbbd1c2d254899d27b7 CVE-2024-37332,0,0,ec79415a44d0dac5f8e919de6ac6e498d30aee599c2bd6a2ebf91ddbc0893c85,2024-11-21T09:23:38.163000 CVE-2024-37333,0,0,84d8534bf40336bd39ffbecf715ce10ed38f38b3c5fff01bf72c22cb3acef918,2024-11-21T09:23:38.313000 CVE-2024-37334,0,0,1eaf34f937d0d87141cee22c0f4ef16f42ebefc9baf887ee1846443c124205b7,2024-11-21T09:23:38.457000 -CVE-2024-37335,0,0,8041722a47e568027ebf79d668bcf00fc79496d1ce20eef094f387c9eca944c2,2024-09-23T16:58:12.850000 +CVE-2024-37335,0,1,d5299cfd3bfdf9176e84b3dc7860a8e3800ed9ca0bdc6adfe0891a1f0ed6681f,2024-09-23T16:58:12.850000 CVE-2024-37336,0,0,686770d349e5f11f8015d9f45b38fa7b2a59ffd857a1730710a554dfc5dc53c6,2024-11-21T09:23:38.700000 CVE-2024-37337,0,0,e44515f6c9a726c5043feb804c8d20022331140b1a25bb19680492908bf0e456,2024-09-23T17:00:04.290000 -CVE-2024-37338,0,0,3135b387f57c00f6ac76b3ec86377140daa9829e16f398a285901f0ce6aa8556,2024-09-23T17:04:22.677000 -CVE-2024-37339,0,0,2285df08769dfab411500acb9f7d9b3a3232a877574d56fb97511d52845af7f8,2024-09-23T17:34:31.387000 +CVE-2024-37338,0,1,724e708b9699e78f9d2e31e4b7ac17f55f2924d7e1bfdd29227b8c5b07d14187,2024-09-23T17:04:22.677000 +CVE-2024-37339,0,1,31c5c18c403eb729e2aa7a8aa70f039e41ae3cc1c01961870628f81c5702f89d,2024-09-23T17:34:31.387000 CVE-2024-3734,0,0,e6d80259bb010172408201d5b2e03b2c4b5003d0b0dee9f52d233388432ce911,2024-11-21T09:30:16.367000 -CVE-2024-37340,0,0,e796453860cc362e3e7c75e2dbbf6660f2b0ff8a75196a38ef118fab72c2a309,2024-09-23T17:08:56.943000 +CVE-2024-37340,0,1,47e21c6762f4d6f176ede7efcacad96434ea77bf558ea01354bdf7301b12b095,2024-09-23T17:08:56.943000 CVE-2024-37341,0,0,a19b5270bfdddabfb714e06a6d05cba7ece016a14ff0fbd88fa37d6b7737d792,2024-09-23T16:38:24.953000 CVE-2024-37342,0,0,49f749aebee5ea2698c4707d9e2118c5d13bd25abd2a87c3784073d1ed26133f,2024-09-23T16:28:03.113000 CVE-2024-37343,0,0,cf3477d0c37a69dc830eebd022eff378cc6e3c3f7ffbec1f090787a70174598d,2024-11-21T09:23:41.180000 @@ -259755,7 +259756,7 @@ CVE-2024-37369,0,0,1e88eb5f5adf1276637dbaba0a7c52eb8dc9f408ec525268bf434428ef890 CVE-2024-3737,0,0,1e7e08e04e47caa48d640f74851eafaab438e97c9be949f434d488cc0d98f3aa,2024-11-21T09:30:16.790000 CVE-2024-37370,0,0,adda354b76b8fa58bd9731c96d1e30a3ccd5dbce3e4544cb7fb32e40dfeb9a83,2024-11-21T09:23:43.537000 CVE-2024-37371,0,0,d5bd17b13bbf8a5c0a4f444cac6792f0b0ada0b42f4cbb75fb993722f35ef31e,2024-11-21T09:23:43.740000 -CVE-2024-37372,0,0,ecdb86991ae96bba101e12ca3db9a135fad042f81eb311b3600efbd7434ae8da,2025-01-09T22:15:28.247000 +CVE-2024-37372,0,1,7a94c4a740e696ec712d604dbf685f52d8913fa3a37f4a5e5f0c2a9e491b2a2f,2025-01-09T22:15:28.247000 CVE-2024-37373,0,0,2847e99c027e210636b1d596d67704fa58348616cd3faf9bd4b3793a4d930cde,2024-08-15T17:31:32.407000 CVE-2024-37376,0,0,bc526bae202cd53fd7d437324fb7b06b20355a99aa96acae85cbee93a0566dd9,2024-11-13T17:01:16.850000 CVE-2024-37377,0,0,caef14ff514966e0f1ee38c7ff4edbc7bd09ca12f789eaaa3ae9e03a1f92295a,2024-12-12T15:15:13.500000 @@ -260123,7 +260124,7 @@ CVE-2024-37895,0,0,49f7277cde0a74ca705949355de498f7514e529633eb4ae1a1a5698e7ad51 CVE-2024-37896,0,0,7496bcb94686c1b20265c78118e271a3d1b71c6703352d6058c170f115cca1f2,2024-11-21T09:24:29.490000 CVE-2024-37897,0,0,395eb6e878dc08633c01647412c82e7154278b39adc62052dc129918deb2443f,2024-11-21T09:24:29.623000 CVE-2024-37898,0,0,ceb51e6817d849296a71d497367f9c03102417b6b660ee927a2bb10bd7f1cc00,2024-09-06T21:16:55.600000 -CVE-2024-37899,0,0,421fe35be82f59e75d7086a8e0bc77fd4a7d98143288181a21837e7eab4afda2,2024-11-21T09:24:29.807000 +CVE-2024-37899,0,1,76ed34664cfd604662208019562d28894ce05c8b43d573240d72e76b77f2272b,2024-11-21T09:24:29.807000 CVE-2024-3790,0,0,1683f69dce5f099820935ed3e085f418d40c3062d6a224e08a8b5ce3f61d7945,2024-11-21T09:30:24.420000 CVE-2024-37900,0,0,71db7ce42b670bcfc80f61eb84d259055a053561c3204238aa43a0ced619d3ae,2025-01-10T16:54:03.820000 CVE-2024-37901,0,0,878c4a6a346bdf9361411abb10af3cf8a835e99c7a497cde963a683f3319ac14,2024-09-06T20:54:20.857000 @@ -260138,7 +260139,7 @@ CVE-2024-37919,0,0,6b84d0d30daccc9c79cc1332a607796144e96d73003348dede97754aecdf1 CVE-2024-3792,0,0,b885b0ebd4c00697c19815d351a246eb633bc1b6a5ee7d6318add5363860affe,2024-11-21T09:30:24.667000 CVE-2024-37920,0,0,890f1847ce5a987963fcae06b45f60f0a4de775bdd560e6ade71ec616ab1bc5a,2024-11-21T09:24:31.070000 CVE-2024-37921,0,0,ecc4d5f20e1a693d04a769d55d4de6eb4e8069e6c6ea9b19862ad1137c1a6db3,2024-11-01T20:24:53.730000 -CVE-2024-37922,0,0,5ad60cad80a0fc8a8cef65176ce3047f2a500958fd3b15bc01bd52dbff0205f2,2024-11-21T09:24:31.313000 +CVE-2024-37922,0,1,01d6d710bdf7845b1c9997f9b6a2567941e550bfdcd02e66dd6bd290ed4447df,2024-11-21T09:24:31.313000 CVE-2024-37923,0,0,9ad0a7a92af560bd2e538ef23c9fde023973a73539ef264fe92ce722d08adefd,2024-11-21T09:24:31.437000 CVE-2024-37924,0,0,44f9caf324528b26da166b9bbbba3f96c36789838702536d0eb80a880ddeb8b3,2024-08-13T12:58:25.437000 CVE-2024-37925,0,0,c9a7b4d822b889c80846d3964803a0dc3ac41681f6200ab73a40fcfae82d184d,2025-01-02T14:15:07.177000 @@ -260164,7 +260165,7 @@ CVE-2024-37942,0,0,f8016f8b9c4cc6ae85181382835fbc9c193283fe069b149331bf141b42f1b CVE-2024-37943,0,0,4da0dc741a65f00768b6aac25c23ce6899d3ceea10ae6413de25260b7ca6955c,2024-11-21T09:24:33.560000 CVE-2024-37944,0,0,486be8fc5c72fbeb3a89b5504bbef52cdc993a223ed9379fb49c5a80e85ee642,2024-11-21T09:24:33.680000 CVE-2024-37946,0,0,00b1fbbfc0d2087522919de371a22b11c465fbd70bfb589657c6d22d25f9a830,2024-11-21T09:24:33.813000 -CVE-2024-37947,0,0,f81ce315c0197d1dfc4457fe769a174f33447d56c3c911e3168d490abefc18ca,2024-11-21T09:24:33.947000 +CVE-2024-37947,0,1,431d9e862c10c1dd0f96db27cab00f091183079486ab2e486a16dbe28d2f6bcf,2024-11-21T09:24:33.947000 CVE-2024-37948,0,0,5097955877ffd34efa17e2fa108c28030a0542d43b802cc7941430a1a937aa26,2024-11-21T09:24:34.080000 CVE-2024-37949,0,0,a1091a4c75e1bd8344a63600b92c0ac81f8e705d5157c70b2633385463ebc0b7,2024-11-21T09:24:34.213000 CVE-2024-3795,0,0,b87227fec74bc22a8370ab6cca33324b03e7eb8a4f54cc80b52f84e1d242420f,2024-11-21T09:30:25.043000 @@ -260184,30 +260185,30 @@ CVE-2024-37961,0,0,cf66c48c044de3bddb607a0cf3c90167369e2890a5e938294c10f20a360a5 CVE-2024-37962,0,0,db2675353f860399b9d6d1a0495bf62bb81eedede36ed49cbf58759c240cc39a,2024-12-19T12:15:06.737000 CVE-2024-37965,0,0,6babe1d0e2999b39cc0895ef2ca352332d264b85c5043751559162ff1c32b3d2,2024-09-10T17:43:14.410000 CVE-2024-37966,0,0,b958755a3490da731ed6e6cb6c62d6f7bcdc15cb21c727ca987e15acffcf6c1d,2024-09-10T17:43:14.410000 -CVE-2024-37968,0,0,8df0bd7ca8bd77162791c285d6cad1d7f7a0e345d7d33bbdeffac8fbdd9ffe9d,2024-08-16T20:54:18.347000 -CVE-2024-37969,0,0,c9061c5fe0f13796e1cb7726fe54673bfc4013b1f53e0581e370c75ebe3b7be2,2024-11-21T09:24:36.200000 +CVE-2024-37968,0,1,54c65ab38f96c984d47f26d7973e70fed12b5bc92a49f3dcf7903784570e6447,2024-08-16T20:54:18.347000 +CVE-2024-37969,0,1,3dcb4134c3158b14ca3242c535734c22f29e358125eadc3ea20366ebc7be9900,2024-11-21T09:24:36.200000 CVE-2024-3797,0,0,6feb8a9d021f23da482191570109c9d8b5e367059955d2ef051a467c83ae269a,2024-11-21T09:30:25.280000 -CVE-2024-37970,0,0,8bc5a56e25152e4f0540e5747898b564209ab5a5388f560476c5dff6605992d0,2024-11-21T09:24:36.357000 -CVE-2024-37971,0,0,74c929070d57f75e61ff245724a406796d5f97d2f2c2c6bb313f0f9a95780ba3,2024-11-21T09:24:36.503000 -CVE-2024-37972,0,0,e4bb12c7b7dfc889d2e4d752454a520288877ef89770fcf7b595c6879e021b23,2024-11-21T09:24:36.660000 -CVE-2024-37973,0,0,a13eb361b961c08928895cfbf6a6db8fa77ea924376aa18d8f35e88cfa29e4a1,2024-11-21T09:24:36.820000 -CVE-2024-37974,0,0,8ed6a4e8c35c333ed9d9e548c1aa0862859b2e12dc50c525bc7e4a48d0a10a1f,2024-11-21T09:24:36.977000 -CVE-2024-37975,0,0,4702af64ee70b0c4b38f4b0b71a69069c963c93aaccff33d26fec0d0dc30a7b2,2024-11-21T09:24:37.140000 -CVE-2024-37976,0,0,e332b8a3cf37554317d6c63fcc532c647dacf2eaf49155e2e818e752b590fe3a,2024-10-16T17:56:14.330000 -CVE-2024-37977,0,0,dee6bfe73c934bbb0e5b355698842fdf9fb96df5529c7a364cc3aa487c8528ca,2024-11-21T09:24:38.337000 -CVE-2024-37978,0,0,a35234845a6938a1abf05b052966acbc37f365d5f6c31d8ff3bc67e28719cfb1,2024-11-21T09:24:38.520000 +CVE-2024-37970,0,1,2db05cbdc70d3cc37bb277951d67ce06f8459c7ec2bc9cc4f26eb9d774564a56,2024-11-21T09:24:36.357000 +CVE-2024-37971,0,1,0edf66a62acd20e2a1449fcce3038f29e8512f64dfff8daff58b3c96a4960e2b,2024-11-21T09:24:36.503000 +CVE-2024-37972,0,1,4aaf39aaf50a5f990ba9d700691a3eddcfd1971749d71f3ef2856144a1eafe47,2024-11-21T09:24:36.660000 +CVE-2024-37973,0,1,267c0c30dca0b158fe251e5666b5d873557f6fb84cf046e53f5870ba4be74e7c,2024-11-21T09:24:36.820000 +CVE-2024-37974,0,1,bddb7fd8c14cb5eeaef8ca35ab157e9a50cd560cd4c6fd61e717ecaf7bbc89bd,2024-11-21T09:24:36.977000 +CVE-2024-37975,0,1,5aa7af75941f2e7ffc1d725ec8e05159bb8b07f7de88fa56bc261ddedee1e68b,2024-11-21T09:24:37.140000 +CVE-2024-37976,0,1,005c667fd199480a9b77203fe0bd8743c939d81e5fad82db2eb84d24c8d28043,2024-10-16T17:56:14.330000 +CVE-2024-37977,0,1,8524736a84ce843cf2fad3349008c89107ed6df0ac7a55ab6ff7bb0e9c4d7445,2024-11-21T09:24:38.337000 +CVE-2024-37978,0,1,b1369a967e887a9ef05a16cfdfb4c17130d7b0f802f45830c2ee04e8d63c5756,2024-11-21T09:24:38.520000 CVE-2024-37979,0,0,c6ba0ecb1eb3eefdfedd4ce069487bce354f57d4cdf194b460bb48440d5ec7e1,2024-10-16T17:41:30.850000 CVE-2024-3798,0,0,71a9dca43378fd449ccf2e81ed896c5ddeca8817f8c50de9c1c19dc1d01bef2f,2024-11-21T09:30:25.430000 CVE-2024-37980,0,0,23bddd4fdfcb08f8468751d9603ec49949acb5b7220390885beab62086789a42,2025-01-07T15:26:25.013000 -CVE-2024-37981,0,0,ab863615cd356d38ac272b7b13be943976e6ab71cd6287f89ca57cee781e26f4,2024-11-21T09:24:38.803000 +CVE-2024-37981,0,1,b42df8f19da5a5e8a8b977ffe791f4df888d6ab4d3d6954fbc7c1b60f54704b7,2024-11-21T09:24:38.803000 CVE-2024-37982,0,0,aefa2d8036944cda94dc3382341b2a96df015b5b111576af2963b53ef08c7486,2024-10-16T17:43:30.040000 CVE-2024-37983,0,0,0d39229f2985db21e2ab221fc92d1468add3c72c64bc910f5f703d961be44413,2024-10-16T13:15:20.690000 -CVE-2024-37984,0,0,cf5d123ea17f14a2665386ddfaea2d8a92918b751907cee0555f2f3d98a8a6e3,2024-11-21T09:24:39.107000 +CVE-2024-37984,0,1,e892ebc05fc2f5f310e9a372dcdf1e10c84533b7a258b736d690750fd27c0cbc,2024-11-21T09:24:39.107000 CVE-2024-37985,0,0,41ac8118297fdb426571fe92ec29c22254aff6967f50b9b81d6f7cbbc26cec44,2024-09-29T00:26:19.423000 -CVE-2024-37986,0,0,59dfc1c504701230f8e283b50ea5c50bac64200daacf2bec79011377e7e8f183,2024-11-21T09:24:39.320000 -CVE-2024-37987,0,0,faa5da8a091942a2b4947daba65b770c9236599f9de1167bdc066cd08681a712,2024-11-21T09:24:39.470000 -CVE-2024-37988,0,0,6c7deb221f32445aef152fdb3274849c5fc7c6cb0a6aff25670abb65f55156fb,2024-11-21T09:24:39.620000 -CVE-2024-37989,0,0,30a28fe00f856fa18ddcc917f3185a46d9c543e32a1f04b715cb706d45fdf68e,2024-11-21T09:24:39.767000 +CVE-2024-37986,0,1,a42acd27ea2f1c1a8a1d86e587f1a1720190f5446cb299c863d295b3da7fb36d,2024-11-21T09:24:39.320000 +CVE-2024-37987,0,1,d9a56dcaec1dbb081b174d0ee1af41ccee59416e3e1fd80df93c1911e9e37ddf,2024-11-21T09:24:39.470000 +CVE-2024-37988,0,1,541c40fdff02dd7e771fe77f3f7476981db93c1d88fc59cbeabe306295eaf7aa,2024-11-21T09:24:39.620000 +CVE-2024-37989,0,1,223e7ccf38f67954c9e541bfd6d48c80873a6a96685aba7f8cf28ad13a569d96,2024-11-21T09:24:39.767000 CVE-2024-3799,0,0,ba2dee5542d4ff1e7be44467c559281a3ec185264f7ed80605ae1fef438bda32,2024-11-21T09:30:25.563000 CVE-2024-37990,0,0,4948814315b89d1b8224fb9ec2e26b654555cd5cbe1a5fed60f098b970094cd1,2024-09-18T15:27:53.563000 CVE-2024-37991,0,0,315170a0eb22aea443c20683f4591f0fdcf4b33c1dfcb47d616130a64331f9ff,2024-09-18T15:29:44.390000 @@ -260222,270 +260223,270 @@ CVE-2024-37999,0,0,902faf7d67489217cd37d263849f71c3123d5265d393df6999a24ac65f304 CVE-2024-3800,0,0,dfab3c406824ce0d4eb335e80feb62aa951ff12b204f0958a043e16218a90fc2,2024-11-21T09:30:25.690000 CVE-2024-38002,0,0,0094626d4d749888df36614a8d2f1e1c8cae759add919cae9539858de17c7d9e,2024-12-10T21:06:57.970000 CVE-2024-3801,0,0,0f8bfa58ad160c9f71633ed43875c383317300520d9a57afb022ce5659399045,2024-11-21T09:30:25.820000 -CVE-2024-38010,0,0,5aa386184388bf51ffbea1adde5f2a64e593f38ae79e2b1a4ca8d2f220d5205f,2024-11-21T09:24:41.133000 -CVE-2024-38011,0,0,db1010343fc3acca57df70fcc9a8ec0c47525b43811ca65b9165a278b9709c2b,2024-11-21T09:24:41.290000 -CVE-2024-38013,0,0,dbc9b5f4543a9a0d5c6c1a55ecb096afdbec7cb8aef63e1ebdf2088b4a4557ec,2024-11-21T09:24:41.453000 -CVE-2024-38014,0,0,264dd5ce514923e5b0adf7ee88f5594a9a8262ee2a0c632959f0f68ecf9c8dd2,2024-11-21T09:24:42.923000 -CVE-2024-38015,0,0,a328941f4444a3afd1d97b9eccd11eabe38aec1fe69f1083bf803158376a72cc,2024-11-21T09:24:43.110000 -CVE-2024-38016,0,0,97c1d27512a719c47dd37e975dcc60345d6d721088e2b34883af9909525d5531,2024-09-24T11:11:06.247000 -CVE-2024-38017,0,0,ff293902c8041a56550e7867a386dce7c00957d852686aca49ca131737e0f80c,2024-11-21T09:24:43.327000 -CVE-2024-38018,0,0,433fde1b27b62faa78db9760aeb86c1401dcf442b8b3f05b7c1ba4031282cc68,2024-09-18T15:04:58.240000 -CVE-2024-38019,0,0,04d7b418c516e57911c005d49ff231b0d2fe9700eacb92e54796d2f8f6a743a5,2024-11-21T09:24:43.560000 +CVE-2024-38010,0,1,738538b21364387fdf533aba47443ed1eb58bd43ab96778d2e27a558178da55f,2024-11-21T09:24:41.133000 +CVE-2024-38011,0,1,36a42c1107d1e04c268b3d9879d9ba8cd10e71d7fb8849da71f609adece6ec99,2024-11-21T09:24:41.290000 +CVE-2024-38013,0,1,e2961e7b73e1033f6526920d45050502392cf1527875517a4edf6e1d87b63bc6,2024-11-21T09:24:41.453000 +CVE-2024-38014,0,1,838d04f0ea958c02373d428a2979e224cd61c80013501fda7dfe02ac805a17aa,2024-11-21T09:24:42.923000 +CVE-2024-38015,0,1,4006a9b5a4188527daa76d23cff5fcc23e630a70aa0217f1692c73c7b0c46d0e,2024-11-21T09:24:43.110000 +CVE-2024-38016,0,1,833b8679d0e7108def7db104f77c8729baf99e01b00b5bf558e9f32fe2215bc0,2024-09-24T11:11:06.247000 +CVE-2024-38017,0,1,a1291e504b6787dbfc473e5f1198d884626dae6afde471366db2534adb5e42b8,2024-11-21T09:24:43.327000 +CVE-2024-38018,0,1,bba820734bc4cc9d1a5626ccd8d726691d83e43e9ce94d15c4609f82c6bd7648,2024-09-18T15:04:58.240000 +CVE-2024-38019,0,1,69518b3b025020357b89b328457c4ce2e1dda4281dfce7b24956bfaea0ec5df3,2024-11-21T09:24:43.560000 CVE-2024-3802,0,0,1c8b217f2decaf0481a00e93032897e3d653a5edca1ed0ff18938471d432312f,2024-06-04T02:15:49.290000 CVE-2024-38020,0,0,225981c51ee9492a78cf5d527eb064007c7b8eadad9356f131d001fcb7e0a857,2024-11-21T09:24:43.703000 CVE-2024-38021,0,0,d514a247423f9325d5c668326a16474192fc0d13059309255a766b77f2e5008b,2024-11-21T09:24:43.837000 -CVE-2024-38022,0,0,baa8dfe292acd621f0a47bd1fab5b7b146f840fd28a5e30db74ad863c476e206,2024-11-21T09:24:43.973000 +CVE-2024-38022,0,1,269e4b46ac0cbc6e242a42c7fc2459602fb5d192d1cb5fc7567dc8c1503b0dde,2024-11-21T09:24:43.973000 CVE-2024-38023,0,0,88763ef6fe2299e903a13684e42db40fd41809af1e8ed241c01edd49da68720c,2024-11-21T09:24:44.117000 CVE-2024-38024,0,0,099bee5184ec85638c1d04a30c270c406d497ba076fc6d10a9b9a5c7fabebb78,2024-11-21T09:24:44.250000 -CVE-2024-38025,0,0,755cdff7e529e1c45c54055353c8390f2dc0ab17b611d4659e3703c55c63f428,2024-11-21T09:24:44.390000 -CVE-2024-38027,0,0,e90747ab8630421f7078d4393b4fcf69ce8dfd7e6965ae3095a14735b50518ff,2024-11-21T09:24:44.557000 -CVE-2024-38028,0,0,94a5c3032fad5b4b987bc75d797accbd55130150f8420692e766d6250c8f1c7c,2024-11-21T09:24:44.737000 -CVE-2024-38029,0,0,36226fbe1f8a3b7dd943ec3f3c65269cd9fc91ca05e7738e5ce9b7a983df4e6b,2024-10-16T19:27:25.183000 +CVE-2024-38025,0,1,7831ba0cce21d106e1bdebe858b688d33a2731eb89bb61685ba7936189663229,2024-11-21T09:24:44.390000 +CVE-2024-38027,0,1,6c7b17136bd002c950436c331a4365b0f75ee21a9d67f720d3f5f41d7bac738f,2024-11-21T09:24:44.557000 +CVE-2024-38028,0,1,bc46c94bcd4370bfa43e64ef832d3f98f8d0f3a88d3518eafc8c143902b0f2fa,2024-11-21T09:24:44.737000 +CVE-2024-38029,0,1,3c5dfa2e8ef62a583cf45805ad28967cf93fea9ce641f0493c3f037adf0e77c5,2024-10-16T19:27:25.183000 CVE-2024-3803,0,0,2e07137bb13430d5dc312ce092a53afa32d270c428ed0cd3c1013214828afbf6,2024-11-21T09:30:26.027000 -CVE-2024-38030,0,0,6158b536831ccaca1cf90f971ac094fc432a92249b04593cf75860c16c5f9e53,2024-11-21T09:24:44.967000 -CVE-2024-38031,0,0,8873a5db21db37242cd78e631368baa7f59c722f91af799aa8a5d56167fa8ace,2024-11-21T09:24:45.113000 -CVE-2024-38032,0,0,7425f0c5779049add8c0b3cfb5335a33026acf4731ecabf59b77a8c45e9bd726,2024-11-21T09:24:45.270000 -CVE-2024-38033,0,0,3e68c7e1d23dd045272352ad6fe61e503152569e99b4ff5a0f30daf24c5eb472,2024-11-21T09:24:45.410000 -CVE-2024-38034,0,0,4e9df00f72152fb555b90a5b98645c6eca16b2a0841feb76b08b2cf254fb139f,2024-11-21T09:24:45.563000 +CVE-2024-38030,0,1,38274d973a82558546a2c135acc21710af53f92dcdfe669bab0fd2f4c5ee8d14,2024-11-21T09:24:44.967000 +CVE-2024-38031,0,1,b955fa43fdae2a319e5e6fd6e04b116f0f50a725eb8c4a40ba8a418eb16a93cc,2024-11-21T09:24:45.113000 +CVE-2024-38032,0,1,8c13db2f98c8bb988c92b061497f12060551ce1bbdc0830defeff1bc4b9fc62d,2024-11-21T09:24:45.270000 +CVE-2024-38033,0,1,19cf97b265764e2c0bae8341555a4deba9c71a632e42bf8c6d434d1cd5f50809,2024-11-21T09:24:45.410000 +CVE-2024-38034,0,1,885205ac3b35254d7fc6d9c7deb4da17184b476ced42d567b30a06f872ed8241,2024-11-21T09:24:45.563000 CVE-2024-38036,0,0,03a39f005ebc360d4178063a3523b97f8eb4a02fea948714e9555cabab93700c,2024-12-03T18:15:13.710000 CVE-2024-38037,0,0,bc91f4ded1962475482300d45227439dde6faec366c3b95fbb0abf5cb5093f00,2024-10-15T14:34:22.820000 CVE-2024-38038,0,0,cf99793bcfe8c4a160a6f8d93f2fdb2229a74925a78f5eb97d6a51b8f277926b,2024-10-15T14:33:46.730000 CVE-2024-38039,0,0,f50bf0e9aa716b3b412b761d2ee60c5cb00214cc8084f0151e026f31b1beb56e,2024-10-15T14:34:00.893000 CVE-2024-3804,0,0,06b6e12cfa83fcc4daff61715c47354094a9599370a5f94c1895321fa41e92f5,2024-11-21T09:30:26.157000 CVE-2024-38040,0,0,d76853d0819423c148981caab277a3059d7c41328a486c3e427f6954ddfe7b97,2024-10-15T16:01:44.010000 -CVE-2024-38041,0,0,6f725e072e105747e14d206bf6797701830cc1f2247b7c104bfdbf13328330c1,2024-11-21T09:24:46.283000 -CVE-2024-38043,0,0,45eb1e3465acdb7424fe7e7f1f2bcdeb5f15c8dbe34f87a45b4650427277bb2b,2024-11-21T09:24:46.423000 -CVE-2024-38044,0,0,2748595cfd7607b3e3659abc88df95602a4f9bdcf0358de0325bc731ef1cf591,2024-11-21T09:24:46.567000 -CVE-2024-38045,0,0,9a9000aa09ff36799b88880960d2d162d2fd0d7cf762a474e8abf45bf264b475,2024-09-18T15:04:07.700000 -CVE-2024-38046,0,0,9e6cab99981d39ac8defffab68ad6ab82881d66eb9a9807b7bd8fd324758f2eb,2024-09-18T15:02:15.300000 -CVE-2024-38047,0,0,8884ef3c7f32080454e6358e8e4662c8d2380549baf9aed7da6ea23049a72be1,2024-11-21T09:24:46.887000 -CVE-2024-38048,0,0,2cfbfef166d83f9cc83a94dfab48ed05b85aa893d3ba72d3eca33d435997f054,2024-11-21T09:24:47.037000 +CVE-2024-38041,0,1,8cb122946fd740017ca61f3eed733da436e5364c9143e47a3b4882e1ffd3da74,2024-11-21T09:24:46.283000 +CVE-2024-38043,0,1,e02a69013f8c1ed3f518a0078ed99b8ad0f1fa55c3cf4d5680c7207e37740dd5,2024-11-21T09:24:46.423000 +CVE-2024-38044,0,1,d2e4b826c4b7378292a288c0ae4fa23210817448f86458c048234e50eafdb568,2024-11-21T09:24:46.567000 +CVE-2024-38045,0,1,5dfbb8431c30e4acea4155dcc046e917a111658f09414b462b1f158aea096dd0,2024-09-18T15:04:07.700000 +CVE-2024-38046,0,1,18b5f931540cc2444d3184dd55917dad3b8bb39526340920b318235f3261d3a2,2024-09-18T15:02:15.300000 +CVE-2024-38047,0,1,a696719e61609f132501d476f52f4aa4d7a6735253e3b637b3a58bba5e628f7b,2024-11-21T09:24:46.887000 +CVE-2024-38048,0,1,833183d3bb6e9e509369539dfe5d09fe497b521efd7ca3ade7100993461ba810,2024-11-21T09:24:47.037000 CVE-2024-38049,0,0,9024dd06d7742be5a1a308a7e24e67208f7e6f7cbb331246354b0f67fbdb093c,2024-11-21T09:24:47.197000 -CVE-2024-38050,0,0,c5418cdaacf4512bf94e4dc87d530a347b851a36d47ae8b6a54524874a82d0fb,2024-11-21T09:24:47.370000 -CVE-2024-38051,0,0,977edf05a441b1791d795636a1900b425729ffc5d994e7a0b8af928ca91aae01,2024-11-21T09:24:47.540000 -CVE-2024-38052,0,0,ecd3da626b7e7b88b91f051ca70a4a063e3e576d59b1e93a95f5b3b31826b5ec,2024-11-21T09:24:47.693000 -CVE-2024-38053,0,0,7f01d00f9dcab50a8f5e64a8e4678e1db43863089bd417a293fdf3bff582f8ec,2024-11-21T09:24:47.863000 -CVE-2024-38054,0,0,27c5dc2ef7f52ce2e4d93ab572e942706a7302dfa8a1076c3fcc036de8dbd861,2024-11-21T09:24:48.017000 -CVE-2024-38055,0,0,2ac4157c62af23593a91d27dbb878b598058616a7fa154ac647ae2c2193ec834,2024-11-21T09:24:48.177000 -CVE-2024-38056,0,0,3ab5dd7a023fca1c561f5f01920ea110ca8b822c30f51d6f114c3317d4afc529,2024-11-21T09:24:48.340000 -CVE-2024-38057,0,0,3a1a28796f00be91d81e06bafd5243b0f69f51edd33528ce946336145b103878,2024-11-21T09:24:48.493000 -CVE-2024-38058,0,0,6ffd6e3fe3afe56260405cf21c370dafc35e21bf74b6d480d72b8d6a2b44f9e6,2024-11-21T09:24:48.650000 -CVE-2024-38059,0,0,338de62995234e3f16c9831b87d719d678fa123e6a4e9163484a7c412b837ae0,2024-11-21T09:24:48.813000 +CVE-2024-38050,0,1,4483ed4f40ca138a47fec96393f18fc8ca2b8f2b769f52ed402c0dba20913d4d,2024-11-21T09:24:47.370000 +CVE-2024-38051,0,1,8fc27d3ad8a0bb95be3fa6a4215603ce904ad1e9cbfdcd589cf311fcd351a77e,2024-11-21T09:24:47.540000 +CVE-2024-38052,0,1,60da9e6cda62d0aae694133072d128adbe60957d89842505c532e0dfd36cc310,2024-11-21T09:24:47.693000 +CVE-2024-38053,0,1,7ff605ac19fd3c749e64aaeacbc908be79d163f309270714b3b3259520ccd1e1,2024-11-21T09:24:47.863000 +CVE-2024-38054,0,1,44e095a9db1b61218804e7b90c78792e91778a56a61cacff8350cec137a265b2,2024-11-21T09:24:48.017000 +CVE-2024-38055,0,1,7232544e1883a73e93cadfdd738294e27e4bef3fd26056c448bb350e4960256a,2024-11-21T09:24:48.177000 +CVE-2024-38056,0,1,56f3eeb9c1838975a70779be7187d906b02ec3937798e7f1b58c0427de2387eb,2024-11-21T09:24:48.340000 +CVE-2024-38057,0,1,7220fbb600e4a99b114f6934288af49d995e246d320830bf294cdb4f1c04b74b,2024-11-21T09:24:48.493000 +CVE-2024-38058,0,1,a704ba98c6c1db938a6eaa390b3651a20d909eaeb16feaa8f6dddac13449b0dc,2024-11-21T09:24:48.650000 +CVE-2024-38059,0,1,88c709aacc513b3b3bbaf74f6174b144e681179142a03dfdd50f2268399e78e3,2024-11-21T09:24:48.813000 CVE-2024-3806,0,0,99079e57169f41d2d49b9f7e004c275117c37b0b8ce3832e0364b21e0f27b82c,2024-11-21T09:30:26.280000 -CVE-2024-38060,0,0,1b6518e90cd64b6f3c3f6313fb557550a6de58873aeae0db61c2f13f37eeece3,2024-11-21T09:24:48.950000 -CVE-2024-38061,0,0,93760d6528485ff80eb8dc2a6d333d0dc9b7fe802773ea6660f1b5e3fcca9c0f,2024-11-21T09:24:49.110000 -CVE-2024-38062,0,0,dc4a502ff5ac78cf3f124c3a6b404e1cabffaff9fa36b2324edabdc0e6a9dab5,2024-11-21T09:24:49.270000 -CVE-2024-38063,0,0,003f6f1879b131f3a80ede083d399fc5fdd94ed57dcb969b35e855508b52a498,2024-08-16T20:54:12.043000 -CVE-2024-38064,0,0,12ae9e94e9beaa2cd7a028127386f163259dd35405f1cf9b92a09eeb5eedbb4a,2024-11-21T09:24:49.520000 -CVE-2024-38065,0,0,e758c003fd6c8b3c9475a0e46728a680537d44143af8d0532c16e52544fe5a58,2024-11-21T09:24:49.677000 -CVE-2024-38066,0,0,5867a5e93d9c06e71dd05531675afe9629d50f492db98576b1014ee3393132fd,2024-11-21T09:24:49.833000 -CVE-2024-38067,0,0,86f41c01099401b400cd909946444a7fa46d8e7395e8157faca450093d6c98d6,2024-11-21T09:24:49.987000 -CVE-2024-38068,0,0,ce7d685f2175e8a01b769cb4baf7d59826ad5c6cdecadef5766e52f6be75aa3f,2024-11-21T09:24:50.150000 -CVE-2024-38069,0,0,d499a1b95f4410eb5dbf8cdd6895d53a4d3afb78692b5412a639a8b71d0d70d1,2024-11-21T09:24:50.313000 +CVE-2024-38060,0,1,38df7a6a9e85b292ec5c3e6a7e4921776ea2c3d82bb4d0a39e9c4e5a20b91a07,2024-11-21T09:24:48.950000 +CVE-2024-38061,0,1,c971c7a8d36ba04faeed4c69f7a43b17bf303f7358861075eced14d27b5bde8d,2024-11-21T09:24:49.110000 +CVE-2024-38062,0,1,2bdb151d64ae36fc8226354462f14c86679920366d3d0d4046ed5d4c1a666b97,2024-11-21T09:24:49.270000 +CVE-2024-38063,0,1,962dfbabd132d4bcb501324cbd70d90209fe258b441bfc360440326566ebc141,2024-08-16T20:54:12.043000 +CVE-2024-38064,0,1,18c3282a6cab0074b85b7dc25bd619d8f2c01b18cf8abdcfe1da2789d89f7d54,2024-11-21T09:24:49.520000 +CVE-2024-38065,0,1,b91a614967c94d3fe7f5670af2d2b811b2afea2b64a8c694a887166c40445b4d,2024-11-21T09:24:49.677000 +CVE-2024-38066,0,1,eea015a8ebf538d14127b6e0356de16b913f3c9c7ba9a4f0818f8b4f5cb685c0,2024-11-21T09:24:49.833000 +CVE-2024-38067,0,1,3f53978f14da6bc8336ffbc13bf426bc83b52f7963fd2c11181a40c9daa199b8,2024-11-21T09:24:49.987000 +CVE-2024-38068,0,1,c99dca119bbd48cefd8f94dbebf2c0854b6901ba6cac2fa2c1b9f73e36aecfb2,2024-11-21T09:24:50.150000 +CVE-2024-38069,0,1,da7ef9ed336561db5c853f795d2a9ac90ffdefb7bc41c4c047ee1f799266262d,2024-11-21T09:24:50.313000 CVE-2024-3807,0,0,f9703189b7b376141be424bea62c25e83ed4848de518706655205c95b4dbc56a,2024-11-21T09:30:26.393000 -CVE-2024-38070,0,0,09875519e475da1be2627ffe5d86684ce1a89d8f02c032d07fa93b89c4339412,2024-11-21T09:24:50.480000 -CVE-2024-38071,0,0,caf196e1c588bbb128411ebf6b49472d316a89e34f7b5a52fdaffdaa09b2d4ec,2024-11-21T09:24:50.643000 -CVE-2024-38072,0,0,229b7e99a8eafd2ee9cde487d8efac66bdaa7dcc3c9ece59229e1ef80ed0f2bf,2024-11-21T09:24:50.800000 -CVE-2024-38073,0,0,fe868464c6515dfaf45deb917222de89938b7ef614ec0ee9639ad014ea89dbd7,2024-11-21T09:24:50.940000 -CVE-2024-38074,0,0,aa243d3ddf54e8d96771520de56d58334eb8c033b51ae045c0a198ac47f2e97d,2024-11-21T09:24:51.083000 -CVE-2024-38076,0,0,76a70364d8a6aa62627652ff9a3c876f2fe2310ae241d18f1447e7f5e8477389,2024-11-21T09:24:51.223000 -CVE-2024-38077,0,0,c5ec65b84a47d56a596e6c4744eee3f589895aebf388519270259205a29dd139,2024-11-21T09:24:51.367000 +CVE-2024-38070,0,1,73f62cc41ae8901778c018f0873053708b7655c36440652a8b6c90bc8a179811,2024-11-21T09:24:50.480000 +CVE-2024-38071,0,1,5f05330cb0010d10f975799f14fd7014fca73b98d079aef127f14226b7a0436a,2024-11-21T09:24:50.643000 +CVE-2024-38072,0,1,37438eca134de9c43f33a87cdb6f6b3ced119df424d3487f60b4c7665d67ea63,2024-11-21T09:24:50.800000 +CVE-2024-38073,0,1,2c73f798fbb15d47ccc1f13904061f0ee2297d6ca6661803b6b7496af873041f,2024-11-21T09:24:50.940000 +CVE-2024-38074,0,1,36fba89e27922abb5a99e34950a736b070d978917327d77ad6e179d3b6adfec5,2024-11-21T09:24:51.083000 +CVE-2024-38076,0,1,128b635ff7aee8c7c1506985d996166e9813f0650c3fbc6a267d0a5ad2588f8e,2024-11-21T09:24:51.223000 +CVE-2024-38077,0,1,77518772d0189599e1eb91a75f98dc94f6889b5fc7c06b3fe3c5bcb9dfea8d62,2024-11-21T09:24:51.367000 CVE-2024-38078,0,0,1a1d2c83bd847951d9f6b58b676e8e9ec7c6495b1b7552c30d869d07409c077f,2024-11-21T09:24:51.520000 -CVE-2024-38079,0,0,89d7c322be24810d331f89ded1cfbe02ac18698086b2238fb7fdacc74f6abe8e,2024-11-21T09:24:51.650000 +CVE-2024-38079,0,1,437c995000a20a279f2ad60a875252ba219e34ee7f9f883d9c57b37ef458df3d,2024-11-21T09:24:51.650000 CVE-2024-3808,0,0,d6eefe6b29ce8f99926803f447004725916066b1418a86714a9a0ee2cda0270d,2024-11-21T09:30:26.523000 -CVE-2024-38080,0,0,f0e11b51400fcd940f29642cfcdc44b9c4cac02b518ec2a38a533ae1a6cf24c1,2024-11-21T09:24:51.827000 -CVE-2024-38081,0,0,627364456f60918e2763421a18c908cea5aad6b3d8ce54006b9852235f4f6606,2024-11-21T09:24:51.970000 -CVE-2024-38082,0,0,a1b36ab3b1f211a3a58af4946368205009acb6986ba215354414406223d585e7,2024-11-21T09:24:52.167000 -CVE-2024-38083,0,0,754058ffcfe62c42a55cab7256421953062a0cf21d5cff2a6d5cc3ee333d3c99,2024-11-21T09:24:52.300000 -CVE-2024-38084,0,0,2a3041eeb0eacdbdffb47e28e74f4de31f2d40713d2f91aa109b6ee637461b82,2024-08-16T20:54:25.520000 -CVE-2024-38085,0,0,6c02bbb32324a275c83ad1ea6a73fc7e60bb026af2ebcb85625e1953c11d90b7,2024-11-21T09:24:52.513000 +CVE-2024-38080,0,1,8a7987e9c084908047eb22c3dd0517fbc3dd8120dac530c7b2ba2808f213dad5,2024-11-21T09:24:51.827000 +CVE-2024-38081,0,1,adecd67e96198ceb084323867562a624008ea4d3d50d2310b4c2c1c9881fcc3c,2024-11-21T09:24:51.970000 +CVE-2024-38082,0,1,5c39a835fdc447dd79343a2fe5eca324da4e41e683206fe001ef52c7d107ec3a,2024-11-21T09:24:52.167000 +CVE-2024-38083,0,1,f90f1f3167d84e1e359ab7b0827055ef27848b39572f59663c2deeac93d8de6e,2024-11-21T09:24:52.300000 +CVE-2024-38084,0,1,58c29209f756a6635e46ab7a4541249845b98ffb364925474bfa5bc9aacc2e35,2024-08-16T20:54:25.520000 +CVE-2024-38085,0,1,b0553e1fef15fa9cca6d267d3420097887ad2ec05364c45ba6154edb634ceed3,2024-11-21T09:24:52.513000 CVE-2024-38086,0,0,17e820d855a627c087039d6af08653b51610e3983bead40c9e73a3c71b891580,2024-11-21T09:24:52.670000 CVE-2024-38087,0,0,53b0831c7c26daddc7fbf6bb102f0578a2b56f46aca583d4d8d197c7dcc14b29,2024-11-21T09:24:52.817000 CVE-2024-38088,0,0,eb0b626493bea1d62015009f87b0c484615652b9d47075e9350a427827fc4280,2024-11-21T09:24:52.960000 CVE-2024-38089,0,0,8d24a2209ebbe39a3469ed4ed0f76b9bf02eaaed37671d2116e6a9191143c23f,2024-11-21T09:24:53.113000 CVE-2024-3809,0,0,61604afb35e5d625352c20258f59dd0bf56230cfadd8bc0e5bb10a9bdb7f4740,2024-11-21T09:30:26.640000 -CVE-2024-38091,0,0,c6a7c5c32c25f4f514013907e25575acabaf27b396fbe25062f1c0aa494158b9,2024-11-21T09:24:53.253000 +CVE-2024-38091,0,1,4405abe1115ba8e4252fdf2011d77cd2f56675ee2d685c72a6342131a6052333,2024-11-21T09:24:53.253000 CVE-2024-38092,0,0,e212b001ab8134723010f02469d16371b767b692b5b98bd423a5d8c064db8a48,2024-11-21T09:24:53.417000 -CVE-2024-38093,0,0,982956e695e350780b3702d44d2774b7a7c1d9632e664f3d133ca96e37ea5fa0,2024-11-21T09:24:53.580000 +CVE-2024-38093,0,1,564027640864cb6a66f81183c5a2e27716b51dce4cb9559bea31c9ae9c081fa5,2024-11-21T09:24:53.580000 CVE-2024-38094,0,0,237be7b093d2509a50e00c69139ab20c7c63aa5a30ec744be8602f1c7a86fc0c,2024-11-21T09:24:53.710000 CVE-2024-38095,0,0,14c2a5b9e85f2e8c3abb673f989749b979c7005633de0f754c238f3146dc6e41,2024-11-21T09:24:53.863000 CVE-2024-38097,0,0,1dab4a5649c68801be2bcbe030d31a0274dd59eff7ad7675eaff81f85377cf74,2024-10-16T19:28:08.227000 -CVE-2024-38098,0,0,f6fdd6ebb7625968eba8210a1d50730567f84719d8dd2ec6db072bd1ccbd49f1,2024-08-16T20:38:02.817000 -CVE-2024-38099,0,0,6a51655839c83428357fdeb7fc0fd814660e918369612c170018659ec5139b99,2024-11-21T09:24:54.143000 +CVE-2024-38098,0,1,814d6cca5c48da45586f2449700036657e6e3cdb87c6378b39024f2013c62fea,2024-08-16T20:38:02.817000 +CVE-2024-38099,0,1,4ebe0535d05077156a6f67a8c96a3a3937ff3bb68304ad18028fa862774d8c29,2024-11-21T09:24:54.143000 CVE-2024-3810,0,0,0da7c445b4faa734602b27ec0a1a676dcaedf7c2311033e7d931727a4ebd0c93,2024-11-21T09:30:26.757000 -CVE-2024-38100,0,0,223c18fb9316df6ae84ad03d3ce589cac1e90467946ea38cb8695616f11d23c9,2024-11-21T09:24:54.310000 -CVE-2024-38101,0,0,7b0ddd399b196f86aaf13c881e9d0e51a10588a75addd081ce79d53688959b1d,2024-11-21T09:24:54.457000 -CVE-2024-38102,0,0,32915199f12ce649202ed88971c9b28f9fe5e88af8fb9c1f8bc937e963acf1b5,2024-11-21T09:24:54.613000 +CVE-2024-38100,0,1,50c4024902cbae304cb9bf1c35eccab0305cc676f0904a1f2bd129ed64884cca,2024-11-21T09:24:54.310000 +CVE-2024-38101,0,1,c9fe3879a5e5e8334401de2fd61d38cbed8ea87f631e6ac7a3d762129f2da1d5,2024-11-21T09:24:54.457000 +CVE-2024-38102,0,1,de6c05cbaea9cda3b1150a3e02af34bb1c691c163a1aa3d9f8db410052a2795f,2024-11-21T09:24:54.613000 CVE-2024-38103,0,0,d525ffa69052e18c0d5a7e517c8a95af1820a074ca9b4b1c2a4b4a9018492026,2024-11-21T09:24:54.783000 -CVE-2024-38104,0,0,f721c29caa45624bb45d664bafa5b529273e4aa47a79cd38f03359b363ab8617,2024-11-21T09:24:54.933000 -CVE-2024-38105,0,0,176465735fd5bd5ee0be65747e7b470e762ec2f9ec91eee632775bb1101d8c03,2024-11-21T09:24:55.093000 -CVE-2024-38106,0,0,af87014e0a4e57abe69321de9e8b3e09d17a4738fc5c4319b5afbc6d6a9a04e0,2024-08-14T16:36:52.280000 -CVE-2024-38107,0,0,c2e130d3cd815cf46e3f0135d1407bbdbbce9360b263a44c5127c1b26dbd2bee,2024-08-14T16:29:43.833000 -CVE-2024-38108,0,0,ef399e13093de909add9bfb22f1c50785bb4701086a7f0a3696cf957c93052c7,2024-08-16T20:38:43.893000 -CVE-2024-38109,0,0,b5c40b7dd76381b406b1fd39caf9ee88640fcde7d4620874578950e67cbd3749,2024-08-16T20:37:34.397000 +CVE-2024-38104,0,1,0ac771490778200e59d218bcb92d9aa9dd875fa8f9856524ddf7c3baf2cffe22,2024-11-21T09:24:54.933000 +CVE-2024-38105,0,1,45d157cb93836848b5ccdb9f6a29b57508cd3dcc8eda2ceb14cc12b3ad697b58,2024-11-21T09:24:55.093000 +CVE-2024-38106,0,1,c5843b5c229fa435ff6deab59d50ad2824ddc86d081300f73a911bf0075c79f2,2024-08-14T16:36:52.280000 +CVE-2024-38107,0,1,942689cf5864a2282b5c2793aa6fe881bddbfdcaaa9edcedf578838489655d35,2024-08-14T16:29:43.833000 +CVE-2024-38108,0,1,7e553a19aa826d73478b21d9b1e009abc46deb4893e9a267a69d8e7b9e952e68,2024-08-16T20:38:43.893000 +CVE-2024-38109,0,1,955f6f6f55e17f0646d432fddd310222eaf31f01d66f47bc1e85b109c881efc7,2024-08-16T20:37:34.397000 CVE-2024-3811,0,0,aa70716b140370857be7fcc142657c91ac248f35d70aa6cc39278015ea435572,2024-11-21T09:30:26.880000 -CVE-2024-38112,0,0,c78f01162642a3f47e682df15c45e6e285a209a3fe5ac1e249d25e0285d1faf4,2024-11-21T09:24:55.587000 -CVE-2024-38114,0,0,78bc16afa768964d3c0e2a7f11aadd7d4e8ec6307b8401851fb9845ff355c430,2024-08-16T20:54:28.887000 -CVE-2024-38115,0,0,5f0a0e31296d53241957e0f4c1cb0ec07e9db4f3b45c295cfdfc893abe66ce89,2024-08-16T16:32:49.573000 -CVE-2024-38116,0,0,cca57a6f24491f53959ade84a4931162eccf8c8e70298f8f3e72e7a563a3a292,2024-08-16T16:36:12.337000 -CVE-2024-38117,0,0,2f448a8487826c37babacd726f5b9a0ccfd1cf97bc6718604fe2755f0f456bd7,2024-08-16T16:40:43.667000 -CVE-2024-38118,0,0,02ad425a1c50a45d3b791e15b17326b39cb3539dc52438a443ef321eea3e2c8d,2024-08-16T16:41:04.497000 -CVE-2024-38119,0,0,08f12ed5e543d7c9b66352bcd75aa539a3c3a201de1e03d5b00109ed858be5bc,2024-09-17T17:23:07.473000 +CVE-2024-38112,0,1,b9e63f106e4bd4434b0d69f38e4d217f70d065122f221442c9f24e7c97a95d87,2024-11-21T09:24:55.587000 +CVE-2024-38114,0,1,f1d311c98fd1a816525b73540e4ffe1f45ca5573144ddde0dabf4905e179bd3e,2024-08-16T20:54:28.887000 +CVE-2024-38115,0,1,64b72549499c09af8af041ee53568dfcbde837dd4c58a3eaf8778fc03e61a287,2024-08-16T16:32:49.573000 +CVE-2024-38116,0,1,21ba1bdb441dd51cde686035568432dfb32b554e22109c472e0d0545e357ff07,2024-08-16T16:36:12.337000 +CVE-2024-38117,0,1,34a4d1fbd76c7c7fa11e51ea75dd35573785d6bd0efaa39d373d6a3df2f23165,2024-08-16T16:40:43.667000 +CVE-2024-38118,0,1,7288a1f476fe8a96cf920a6a1727a90ef5476961036f4ec6f95e31b5e19d930f,2024-08-16T16:41:04.497000 +CVE-2024-38119,0,1,161b72e708a085656dedf0d9a44f7c3d8f2f0d84ed9e7ffbb888fac359ca9c01,2024-09-17T17:23:07.473000 CVE-2024-3812,0,0,0129e040e959450abf9dbd499f247d8e2fa6e3380fc9d9999f600732284c07e1,2024-11-21T09:30:26.990000 -CVE-2024-38120,0,0,9c8de8431f39bee6fcea32034f03ccb121aa20b91218f5db5d81070ccada2cca,2024-08-16T17:12:59.383000 -CVE-2024-38121,0,0,ffe5e5375151a1396d0ac2ce089cfc186b24909f20b2abbbda35a61014534326,2024-08-16T17:13:28.350000 -CVE-2024-38122,0,0,8b4e595de16facc020c4b0fad758498d1886def5b5f3b8085440a37321b6525a,2024-08-16T17:16:41.717000 -CVE-2024-38123,0,0,3df2403f04e3e3301093cb04947a1e720a13515f93d8972bff87f300559b11b0,2024-08-16T15:40:45.897000 -CVE-2024-38124,0,0,27e9112cb22a60e0ef5139e27a811867856490928b9cd6c5bdde2d0ce76ddc25,2024-10-22T13:35:01.663000 -CVE-2024-38125,0,0,669ab9a166d15d3e8cd795a6553374cad8bc8d129335e2a540a0c63a91f16e59,2024-08-16T15:41:26.523000 -CVE-2024-38126,0,0,6b8e1de6c68c3c9a4aa55a17e45cffd2e3f26c2ef014dce97c15a89cbc399cf4,2024-08-16T15:42:36.073000 -CVE-2024-38127,0,0,7569f2d9e41fa8d32c3e287afbd3042bd162488a2b5a4619a334ded54c36950e,2024-08-16T15:43:13.980000 -CVE-2024-38128,0,0,0a8a496c2c514bdcb5daa397190a86a1baf651fee4301f942429d6f48f9b729d,2024-08-16T15:31:29.327000 +CVE-2024-38120,0,1,a71badf1610bf02e9a43e95b26d1fb8cb6bd73265ef39ba61c665d13f7a391bc,2024-08-16T17:12:59.383000 +CVE-2024-38121,0,1,2f9295e8da9a74ba3d127917494551903050505c4a2bf0b6fbbc60b24d8a5db4,2024-08-16T17:13:28.350000 +CVE-2024-38122,0,1,3af2d64fba8c0d014a7012dae50be5627e4d20bf65272e0595c94367763d7507,2024-08-16T17:16:41.717000 +CVE-2024-38123,0,1,050e7c6244aa6f23932673cab74ff02819507b333bb13f3c78549e7e94305ae7,2024-08-16T15:40:45.897000 +CVE-2024-38124,0,1,10c6ae5e1b3f8cef5c52f1295ba3e8c595974efaa4ba61650b7688fecf602778,2024-10-22T13:35:01.663000 +CVE-2024-38125,0,1,404e30957fb2041f40aa09d8812c2c129770187a21e3b6beaaaa4f900acd943e,2024-08-16T15:41:26.523000 +CVE-2024-38126,0,1,2afcade11537b6125f26cc498f2c97f62942d977fe9bc76cb6dc873b66f9e2a9,2024-08-16T15:42:36.073000 +CVE-2024-38127,0,1,5ecb36b4af8292a21622424135046e1e28714ca6e005b65a904efb06b3cea8dd,2024-08-16T15:43:13.980000 +CVE-2024-38128,0,1,741e8a51a180264bca6f15de34cfa3bcc4b94be1bf491d767db5d128336d250d,2024-08-16T15:31:29.327000 CVE-2024-38129,0,0,99e1012515a45371cb8b88a98f2b85586cb252de4f491b45dcddbab541c99d6b,2024-10-22T13:05:05.777000 CVE-2024-3813,0,0,9c75b3108f28a1a23015107b14ba54cfb47fe8f0235edf3bf4b4886dc73c1da4,2024-11-21T09:30:27.120000 -CVE-2024-38130,0,0,71e8b1f01a4b094c8566f05f21f2099c573d4553d44e65c17cca3339e60d0f20,2024-08-16T15:31:59.127000 -CVE-2024-38131,0,0,c6a03c18e656a9628fa276b6bac538f28ecf7cf69c2352c3e1b92282f7d968dd,2024-08-16T15:32:31.797000 -CVE-2024-38132,0,0,b67b1365aa246da999649e45f71f9299d1f60090d30279e13e7313c31944eb4e,2024-08-16T15:33:07.097000 -CVE-2024-38133,0,0,bfe0a97859f174a3b2a754fc15d6b733d07844e83417e4052fb0996be50ac53f,2024-08-16T15:25:05.590000 -CVE-2024-38134,0,0,f901918b6c86b13c1c79a0a7277533110133ededdd8f9552ba2004446b080025,2024-08-15T17:43:41.003000 -CVE-2024-38135,0,0,bcb2a2489de7fd39142cd50b1a66cc76b541e4071ed41b74c321cb7abd409ab5,2024-08-16T13:32:49.503000 -CVE-2024-38136,0,0,4bf2cc6ccf5f0fbc57211668702ce801839d3b01faff57b3593e1dfc66011526,2024-08-16T15:26:24.433000 -CVE-2024-38137,0,0,575572086e50876eb077a86dbdc25c57f05dbc98eb3ecb3805523610463c7605,2024-08-16T15:27:09.137000 -CVE-2024-38138,0,0,6a556052283ede94b87cebeca3b9a3ef43c6aa6aa33eb9da80ff95330ba520ac,2024-08-16T20:54:32.440000 +CVE-2024-38130,0,1,d3a4444f3041a3a318a4fa31cf09eacb0271f213c6c36376011b182bc4cebd5f,2024-08-16T15:31:59.127000 +CVE-2024-38131,0,1,799778db41fe7ee9bcae8ea1ce350665b81430a1724f7efdbbaeacf0cb184cac,2024-08-16T15:32:31.797000 +CVE-2024-38132,0,1,a1a7ff6a138d742c6f9a0de514eeab3fbfc40ad0955f06e1a05ce74921d55eff,2024-08-16T15:33:07.097000 +CVE-2024-38133,0,1,b0122ada152a248c0cf01ee467aaa081e6ed6c17fe2a36677fc53e20e0cfda87,2024-08-16T15:25:05.590000 +CVE-2024-38134,0,1,cb5be4b56cdba8340d731399bddc56565a7d7088ac9323f1eb895ce6e5aefcfb,2024-08-15T17:43:41.003000 +CVE-2024-38135,0,1,a759abbc665df0d32dd07a6ba7a3c51fdb402e998b2f7f8f7b75f113d26c6578,2024-08-16T13:32:49.503000 +CVE-2024-38136,0,1,250b2524ab7a0a386b09cf4a1f80311140b91c7bae82d630146f8cd24c1d7234,2024-08-16T15:26:24.433000 +CVE-2024-38137,0,1,11f331091e28bcfaf7cd60fbf1718b0a2c50201b063f931b8dbf5415f747ca2d,2024-08-16T15:27:09.137000 +CVE-2024-38138,0,1,075af4b71c8ef9f761461ad53a2ca33e19238998bded8cee80d47ac603fd1e77,2024-08-16T20:54:32.440000 CVE-2024-38139,0,0,3c125c0583276770de2f708ab3afbb3a89df0a09cb9c30e129502bce094b8a82,2024-11-08T15:14:29.730000 CVE-2024-3814,0,0,ca3b76acd03628421bf2fa6e8049fba0d3b4c9171cdd829d956f37d1136ebde3,2024-11-21T09:30:27.250000 -CVE-2024-38140,0,0,be625fa1fe70bd162bcf12645f47e3b0c132ae97b7624d27ed1a69a3ab2f3cea,2024-11-21T09:24:58 -CVE-2024-38141,0,0,aa4442a1f8578218c9d4ba6bc90dbfad7eed57f0ff5d42bf65796f21bd125f5a,2024-08-16T20:54:40.860000 -CVE-2024-38142,0,0,75931b1a217fe45fdccb056a12f7318642f1497ffe46f0e7d489e6ce72112502,2024-08-16T20:54:44.550000 -CVE-2024-38143,0,0,fbb512bcdef4454e2b501ad423631a778e6c3c07c4d3056d8553d022ee589917,2024-08-16T20:54:47.933000 -CVE-2024-38144,0,0,6f76d3a960765d6b400714a345a85d3c1b7ef8264d0f908241bfe6ad2c903f69,2024-08-16T20:54:51.830000 -CVE-2024-38145,0,0,9011bce42bd6fa4a85a42c3be022220dcc830f90a248eaf7c20b10f790673d43,2024-08-16T20:54:55.890000 -CVE-2024-38146,0,0,af31d168f560d74d31d7da2735ee87f45807c87cf886cb0235e38a4ddafa918f,2024-08-16T20:54:59.903000 -CVE-2024-38147,0,0,8f9422a005e476e8a06fe08c4bd5d94039ffafe65442a2f47da086319404eda2,2024-08-16T20:55:03.907000 -CVE-2024-38148,0,0,2795572fd606f9f49503c4a819281dc66add99778525f08765e71df394547146,2024-08-16T20:55:08.653000 -CVE-2024-38149,0,0,5224633719972b6a5a773b5ff174571174893ddd2aa483178e50510fa6d5af39,2024-10-22T12:55:10.590000 +CVE-2024-38140,0,1,47dbd99c843856b7c08563677136ce13d2410d3390784d9b0b9b68e5ef642f6d,2024-11-21T09:24:58 +CVE-2024-38141,0,1,764db053af515dce261b3d064e7c3577ae5278ba7a6d455e4248fd3def660c6e,2024-08-16T20:54:40.860000 +CVE-2024-38142,0,1,4cf3609dd6935f4531dd22c27393b6ab27929a2aaf675fb80828abd8f1bbf548,2024-08-16T20:54:44.550000 +CVE-2024-38143,0,1,924d18de706f623b90c54c4b5fa4314be629e36b576633c8066d370c63ac3a0c,2024-08-16T20:54:47.933000 +CVE-2024-38144,0,1,824a814c734e662feeb9ba6d9fb137d46582dfbe95353671d39f91668125fc22,2024-08-16T20:54:51.830000 +CVE-2024-38145,0,1,5556ac265fb0e1611fbd08bc8a7f0dba3aba90a6f5b636b8238f7232e70e8ea2,2024-08-16T20:54:55.890000 +CVE-2024-38146,0,1,c03a0a2280d07ae15a2638457b2a2ee571e080dddf90ad8e27b382579f268f43,2024-08-16T20:54:59.903000 +CVE-2024-38147,0,1,0bbf1857c8cacc8233b9f0970b4a4a960f39fb8b30e3c54145274dbf36d0f542,2024-08-16T20:55:03.907000 +CVE-2024-38148,0,1,847b5dc5bf5f4ba984fc32bbc9e10ad55cf807ee838c72dd116ce3d278fcba03,2024-08-16T20:55:08.653000 +CVE-2024-38149,0,1,bdb03b86c76fd7d2e7fbdaf94b7244f85501119e8f6a3a2e75e293abdc73a16a,2024-10-22T12:55:10.590000 CVE-2024-3815,0,0,b9e2102cfe59e15570545d8428274b61db2eda3611818db23cf809cab20504c2,2024-11-21T09:30:27.377000 -CVE-2024-38150,0,0,28119deac54ae325e1fb17ee38827d5c3d14cbb225f84682d6589d0175decf61,2024-08-14T18:16:13.757000 -CVE-2024-38151,0,0,e1fc912ff0af54f25f4a428f8eca3647ef9afbde447077b95785149b2c17e951,2024-08-14T18:16:59.673000 -CVE-2024-38152,0,0,6b9bb7dd5094dd558a4acabc18d7d3ad5f2955ae1e50032eefe886e2916c293c,2024-08-14T18:17:42.207000 -CVE-2024-38153,0,0,4bff2ce8989cb48aea978b6d11a3e5e1cfded09686288a718d4307bb2fb6a6e3,2024-08-14T18:17:59.227000 -CVE-2024-38154,0,0,634834eb12d6922ddcf69817e7f664ff3ab50cf4a1b25ee99c75126743c19096,2024-08-16T20:55:12.320000 -CVE-2024-38155,0,0,6b4d8482023df7ff082df94d7cd84a66d1be758e9e385c278570a01da00c4cab,2024-08-16T20:39:26.020000 +CVE-2024-38150,0,1,10abcfa63d8a696e4c5f3c3096c1b21ad4f93707a73690323f8123af7733695c,2024-08-14T18:16:13.757000 +CVE-2024-38151,0,1,05defe105d5a18e825501b92710d25194e7c22357a84cde0b05d08d6ab543edd,2024-08-14T18:16:59.673000 +CVE-2024-38152,0,1,2281518e0d7e7f4e7334c6d4fcee254dcb68c30f167d4d88e5ad64c74002fa21,2024-08-14T18:17:42.207000 +CVE-2024-38153,0,1,be077ae0d919ea9ec716ee120605afd14e84f0353d0a351218778749ef462f0e,2024-08-14T18:17:59.227000 +CVE-2024-38154,0,1,e195e9a8f8fa4a9429ea93f7fd7db8ee836be9beefa98cb9ee2d863742f3cd77,2024-08-16T20:55:12.320000 +CVE-2024-38155,0,1,d5831bd15e26b2909b14fbb5f5215fee0a8fac663969a19373421016a8519476,2024-08-16T20:39:26.020000 CVE-2024-38156,0,0,c3fe2fdb21aac92c99405c1a1dece92232c399471ab7d02ccedccd1535064cc8,2024-11-21T09:24:59.440000 -CVE-2024-38157,0,0,536a9455b609503599991a52993dfc32462dab30b8f8740817a504a3f0b7e233,2024-08-16T20:39:57.740000 -CVE-2024-38158,0,0,b5f3e3317751039cb89bb8051d13e0cdd6e398123ecacc3a94fca5647b5dd2ec,2024-08-16T20:40:27.543000 -CVE-2024-38159,0,0,6472340d51124ebaf3d435c72515961d51693e6cf3262d6864c41e76e097fed3,2024-08-16T20:55:14.637000 +CVE-2024-38157,0,1,6b18645cf443bb9dc3fed06f33bbcf8a10b05f792cfe5c10958436a04bd20bdc,2024-08-16T20:39:57.740000 +CVE-2024-38158,0,1,75cb403d50d4da8043f0b569b86d7ff6f982126373d05e5ebbd69f627f3c120e,2024-08-16T20:40:27.543000 +CVE-2024-38159,0,1,9ac5e907b3ea0e9a04f56688cd4df123b9e503b9b2be84383c1e497f462fe919,2024-08-16T20:55:14.637000 CVE-2024-3816,0,0,f305e4acc2cd1025a1370918c442df78de339ee2ce9d1a87478975ea74b49b03,2024-11-21T09:30:27.513000 -CVE-2024-38160,0,0,8df8b30ae0ff6dd707e13b8e5bb4d0b988ec335d0e3195b45ecbbdd83fb5912a,2024-08-16T20:55:17.013000 -CVE-2024-38161,0,0,f142ae930f9c00d0046ea169748f3f89f8afc86cf3c0487dbd6a3bc3847d99c9,2024-08-16T20:55:20.973000 -CVE-2024-38162,0,0,51dd4436aeac7c5a6d44bc9fd4f765bf31f337219fe537874e32898d21453037,2024-08-16T20:41:43.583000 +CVE-2024-38160,0,1,19dde688e49446c8e9f8cd728471ec94c7e44aada9b9f413cf936590fe460ecc,2024-08-16T20:55:17.013000 +CVE-2024-38161,0,1,d5485837c15f53435d10f6b7b86524349c7e8e9461f0bce041d76d39923b87ba,2024-08-16T20:55:20.973000 +CVE-2024-38162,0,1,279f4dd28114392f04caa28459ba3dbef6d5a21818df6ee47696623578a6c54c,2024-08-16T20:41:43.583000 CVE-2024-38163,0,0,6ef6bba2339797ed2f361dec8fdb3656af6316aedb2e92a430f2179d6e8a96ca,2025-01-08T20:50:00.877000 CVE-2024-38164,0,0,0c0328b154209eee72c4c2b996e8e36b27e10dbabae46f853abf885606be6822,2024-11-21T09:25:00.093000 -CVE-2024-38165,0,0,fbb7382711fe4184f926dbc31fc126a2e43b1a1048a8e4bfd1ea151c19eb0685,2024-08-16T19:06:22.740000 -CVE-2024-38166,0,0,04cf30e3b63f293d3ec73e3105d8307baa08a61c7284be360a050ad5d3052ec0,2024-08-14T00:15:07.687000 -CVE-2024-38167,0,0,b91eecc752cd2b22b72b674eeb01367363f8597702506b49ca496f6076ce2534,2024-08-16T19:07:00.757000 -CVE-2024-38168,0,0,c9abaa3e3a19f38d1e31512313def3dd617ef5cb5f5db68f1b6bf7be41117e51,2024-08-16T19:10:52.113000 -CVE-2024-38169,0,0,e40a80e82b47092ac1a487e78eb96c9c30990fa43ba90c95eb1a255494ca2fd6,2024-08-16T19:11:41.047000 +CVE-2024-38165,0,1,049f68f4f83b9d4ff1e7e23e5e4e2a6e0e7582c19a220a03f08e139625bedce5,2024-08-16T19:06:22.740000 +CVE-2024-38166,0,1,38266fe88262da414ec9c344a3c2cb657f73d64152af5c9a0e51d5546d533b13,2024-08-14T00:15:07.687000 +CVE-2024-38167,0,1,91516c7e82997a135976c4b35471da47db991b4e51d8c11e55e269ba93971271,2024-08-16T19:07:00.757000 +CVE-2024-38168,0,1,cb6b6317d4ffb5bd206b0cc979673b9d5397449eaa30a5bb68cd3034b6e3077a,2024-08-16T19:10:52.113000 +CVE-2024-38169,0,1,d4dcb9f70e8ad8855b2d4e5eb29bfd010da989b105fa62f1eb99ee700b9394f2,2024-08-16T19:11:41.047000 CVE-2024-3817,0,0,dd027dd7e0886a3b82656e242a41d155e9a246760c47c93970631657a8de2d86,2024-11-21T09:30:27.713000 -CVE-2024-38170,0,0,5535d27b32c30989557082127be718d077202aa3be807975c15b6cdbcb208784,2024-08-16T19:15:46.443000 -CVE-2024-38171,0,0,675184298ae9dc5c248a1c62cfc48e6a6114d301212d7770058ff8e1b406441f,2024-08-16T19:16:23.683000 -CVE-2024-38172,0,0,c7a74b8a759125d2017dacd95dc3199eb44eeff1cb7d86a665b3aeea1e7fdd10,2024-08-16T19:18:06.187000 -CVE-2024-38173,0,0,d91213249c0113d8e5d5fb592c45a651f57dbd9bc09e223ea8fa83349dc5593a,2024-08-16T19:18:39.243000 +CVE-2024-38170,0,1,f6c3ecd54c98b563753e5cfb581a39945e34c2d53db0bfb25eea1d23631b86fe,2024-08-16T19:15:46.443000 +CVE-2024-38171,0,1,d713845db96ce6ccbd566162da42e7b8315e3986014c34070bf8057d762ca2ac,2024-08-16T19:16:23.683000 +CVE-2024-38172,0,1,f2fa71df243c274f4bd951c482452393c8520b5c4637f0edb31e5bc5bf2865c5,2024-08-16T19:18:06.187000 +CVE-2024-38173,0,1,e64486f8537eb5cce387c1f4438aef5a29425d1d7360217d83f4fe2f9a0942cb,2024-08-16T19:18:39.243000 CVE-2024-38175,0,0,edc1561e781314415c34e6b284e01ccee287be825b9aafac3aad917918d814b8,2024-08-21T12:30:33.697000 CVE-2024-38176,0,0,aa3a4f34af8469add62ce12d0158807f604374631c43c076d35245ad61d9b0bd,2024-11-21T09:25:00.997000 -CVE-2024-38177,0,0,e283b4b9f83fc63a7b6fc836dcc30fe5a92c4d550d8ffa63f5207b716268086d,2024-08-16T19:20:08.750000 -CVE-2024-38178,0,0,829695ca2f5f6f945a6d3078569a39880265f8104e95e17c838e3f5f685efa84,2024-08-14T16:34:46.337000 +CVE-2024-38177,0,1,757fe2eacba6da7bd617a3c2ff9c4cb5d47aaef5cc5f8a7f61acf18ec7b188b8,2024-08-16T19:20:08.750000 +CVE-2024-38178,0,1,8ff9e87483f3f9c5eebd0833a25976b9926409426eb8c59a572761d75cd8ad91,2024-08-14T16:34:46.337000 CVE-2024-38179,0,0,2c5a894d01e51edb16258b3bed8449de0a4d319183d8d4f8067eaf441dbf7fea,2024-10-22T12:54:12.633000 CVE-2024-3818,0,0,7d1d39e82ad91d5622119f4ea866721b9898edf8d4385d793aef1e9795c74157,2024-11-21T09:30:27.840000 -CVE-2024-38180,0,0,a6dec64e6de789e9b800b1526ade8a1dcd069f78672229cca40f4e8c4b02cf1e,2024-08-16T19:20:22.853000 +CVE-2024-38180,0,1,b07cf7c37e4cc39f3a323c4f8c6f585f439885bc86c6f986eeb8ebe4b7d133c5,2024-08-16T19:20:22.853000 CVE-2024-38182,0,0,f0d85f191f16f62f849a41585c38c60c8eb5e729222a055e8f875398240fa5bd,2025-01-08T21:35:17.920000 CVE-2024-38183,0,0,4fc4c4d894ca7a1786bcb11ba2aa9fdf5a300bd2ad84fc8d48e71857af9b39cf,2024-12-31T23:15:20.933000 -CVE-2024-38184,0,0,f3790a5c112e1dddd845eb925e9feb113ac28f72ae551cab2576dae91ee03932,2024-11-21T09:25:01.623000 -CVE-2024-38185,0,0,68c185b6e79f5dc2fc3a388ef6a6d9c7412b6d63a7b5f660cddf1001bee86662,2024-11-21T09:25:01.777000 -CVE-2024-38186,0,0,f80065179750a263119188003094e9dfc5026981b6d152b2004fa5def60757a3,2024-11-21T09:25:01.937000 -CVE-2024-38187,0,0,93aaeb1a77dc3ef8eb0b4097463622571a826aab078ca8cabb4b05d1f5161ab7,2024-11-21T09:25:02.100000 -CVE-2024-38188,0,0,d955e6373976b7b0fdd385473e41a641883f3c6bd189358309b3e57b52d8dbdf,2024-09-17T17:49:35.983000 -CVE-2024-38189,0,0,cdcde18665ce31ef15fe86f157b99b001fa85e10b0b545c4a172bf2e23d9fe53,2024-08-16T15:11:42.940000 -CVE-2024-3819,0,0,c8d628a9774cc52bbfaeb2c7b12bad2337cc9f934ac001cc1c83b029fbb0673c,2024-11-21T09:30:27.963000 +CVE-2024-38184,0,1,e536d97ad4fb34bc2f2c9893340299904dd26f224a76d18284f4334452dcf9ba,2024-11-21T09:25:01.623000 +CVE-2024-38185,0,1,633d0f3cf1e69ec4e82c422af13d8397043b63fdec59052b2af0c465af26da74,2024-11-21T09:25:01.777000 +CVE-2024-38186,0,1,c5f1ff057c9edc15d8e50473ef0bbcf2f5c96bc86872c5239aae142d97fe1959,2024-11-21T09:25:01.937000 +CVE-2024-38187,0,1,b44c2cf45191ed3c9303be27561aeeaebf2dfcb261ea8275123aa429466f7be6,2024-11-21T09:25:02.100000 +CVE-2024-38188,0,1,55d5f1d088006218a54f14bb7ecab847d2bb8cad454f2d0f346824adc167d610,2024-09-17T17:49:35.983000 +CVE-2024-38189,0,1,d69447384cd4d14803be742bca9d0a68eb9bdaa8536afc259b649873ce5dd72b,2024-08-16T15:11:42.940000 +CVE-2024-3819,0,1,7156938a4a713e7577e1a3070967a82ae5009a028d4e6bcaae7005ded27cc00b,2024-11-21T09:30:27.963000 CVE-2024-38190,0,0,bb25723df881804d72de3c9ddda1d01eb36cd23ca77d756e5795c721045b0d32,2024-11-08T15:34:50.167000 -CVE-2024-38191,0,0,7ba1ffb4cfab13c372e9aed42350e0d51516252e9d72372059247b4ca66bcc81,2024-08-15T20:58:12.813000 -CVE-2024-38193,0,0,f72812cd13871c45efa5f6b4443d636fc5bb59308ffbf6fef706e9fa5da5256a,2024-08-14T16:31:06.880000 +CVE-2024-38191,0,1,f2d80fe34cb0a3d9adb083e0164fdf04225b4d7745008bca94ab4101828d86bc,2024-08-15T20:58:12.813000 +CVE-2024-38193,0,1,17a2047b42157a043f53c6d8d42653465d6eefeb7662b37679036588eba7982e,2024-08-14T16:31:06.880000 CVE-2024-38194,0,0,09a2479de03c5e8cd2332552bd35aba1abc613461935bf8b08a2bffdb601143a,2024-09-17T17:02:40.553000 -CVE-2024-38195,0,0,9670395d6b7a51f7d6ab6449765044127ce134092433077e3e7b50f5cf9c6682,2024-08-15T20:56:25.100000 -CVE-2024-38196,0,0,0ae08eef8c8246a8f28c67d5f07eab7d13d46c4824f9a2e3b3902b8699956059,2024-08-15T20:54:50.510000 -CVE-2024-38197,0,0,5d9c49b12ebc4b4c668ffba791eab9507fe8124e867dc451dccf49571d64d3ca,2024-10-22T19:50:21.707000 -CVE-2024-38198,0,0,bd2cad0ec8019ff9b50eeef09ab1fb106e9955fab1c7ab1c67e425d09e5fd41a,2024-08-15T20:39:20.260000 -CVE-2024-38199,0,0,6edfafa946830457d1ec2a3d8265bb17d1d3a3a5134f770662e2c37c8241cc68,2024-08-15T20:32:42.193000 +CVE-2024-38195,0,1,a1864eec08d8c451cda6d4c257081220ae459d274cbfddc849293fc7637e1e6b,2024-08-15T20:56:25.100000 +CVE-2024-38196,0,1,c404791af0e63497039910e624bada54baa04688925c909342ed69f2050220b7,2024-08-15T20:54:50.510000 +CVE-2024-38197,0,1,2073b697d483c6a0df3b0a2f8b16d25e87dea38e733321844026dd120b3bc582,2024-10-22T19:50:21.707000 +CVE-2024-38198,0,1,baec2d98b2a1c3a85d4364dde16935b34f188323d8886419e54aff352605715d,2024-08-15T20:39:20.260000 +CVE-2024-38199,0,1,0dd948c0d630ffd11ef973d3897c89b05d0c484012d417092380257ce902c68d,2024-08-15T20:32:42.193000 CVE-2024-3820,0,0,ebb43d41dfb444865db3723891fb2477fb81707e0b52fb92a88385d51705deb7,2024-11-21T09:30:28.087000 -CVE-2024-38200,0,0,0ecd323511689a1f59815ccaffbd55cd9c11a7badf86e9372f7ce8fd22a1c871,2024-08-13T18:15:29.720000 -CVE-2024-38201,0,0,fd7dae88ad00f37b501e8db76be3005d1abfd1418c6037e2f7774635da7b849c,2024-08-15T20:30:00.737000 -CVE-2024-38202,0,0,195eb65287559210a264039da59817ffe0c72f680d46dd282a02c3e1dbfbdd08,2024-12-31T23:15:23.697000 +CVE-2024-38200,0,1,839a37329b9dc5b6fea2142ae18a060a3d261c6bbc97a2e041619e8b3f1ab4e1,2024-08-13T18:15:29.720000 +CVE-2024-38201,0,1,676fe655a4353a209bb0546add80c4c8c162df689ed132825ef07e4dd81037ee,2024-08-15T20:30:00.737000 +CVE-2024-38202,0,1,657fa73ab4af8dd92ea046250ae0e6bbd5f71d2fd15b44858a35176bdd768e2a,2024-12-31T23:15:23.697000 CVE-2024-38203,0,0,0eafcc1d547222e148bdef6371b2193d5291aa20762ad6a5cc37713079b5943c,2024-11-18T18:23:07.743000 CVE-2024-38204,0,0,96b18af43450c040d093b118115c7f80a048506b0d9e16a1107f93e550d18d32,2024-11-08T15:34:14.467000 -CVE-2024-38206,0,0,5203436601fcad65edc9934801c60245aa0f6c9694a02b0c74cfe2894d0f1771,2024-08-14T00:15:08.213000 +CVE-2024-38206,0,1,426aa1b7abf1f00203c4465aa29dea4cd44aa51806f280b7e455c8f749953a5f,2024-08-14T00:15:08.213000 CVE-2024-38207,0,0,9ef4af275fa1b639a4657e5634c32dd74151a8d2974ebe5536cb57ef040411c7,2024-09-19T22:15:05.710000 -CVE-2024-38208,0,0,021f68528df33863ec2a391c72ac3697c0becc4a8ca71df20dbd00d3edc623ab,2024-09-19T22:15:05.843000 -CVE-2024-38209,0,0,3684954d3abae013cb8ba6bf6be7cf9b1b2493c71bf8e29ef2a03be4aca869b7,2024-09-19T22:15:05.977000 +CVE-2024-38208,0,1,26c1cf946654be32a872b769490933b6ef8a224247b89f08230ff02fc5ad9fb8,2024-09-19T22:15:05.843000 +CVE-2024-38209,0,1,83225eef0479856c4bf685c17c18b1071c099f3f75499a41dc812f5615d3eba0,2024-09-19T22:15:05.977000 CVE-2024-3821,0,0,91e4bee8d872f3596da48c08de7a01abe0854a2a5d5549ea72c9b5783bea0f88,2024-11-21T09:30:28.210000 -CVE-2024-38210,0,0,7f148aa2bb77bf16ed0649abf46c8cc26cc28641dbebf85e4445a2a018b902ba,2024-09-19T22:15:06.083000 -CVE-2024-38211,0,0,f8563f07bebfb76a677df42c538868f956f0a1283f81fe044f35fda80a1bfc33,2024-08-15T20:29:19.557000 -CVE-2024-38212,0,0,c200bd1b45f333811a18735cfbe62764620fcbb3efc22f6aefe9dd90163c8403,2024-10-22T19:31:41.350000 -CVE-2024-38213,0,0,cfff1cc57fd9c9691ba47bc065666621a81ca6f322e325c977854be4769cd7a8,2024-08-14T14:55:49.887000 -CVE-2024-38214,0,0,c8a3fe534ac4e0e8bf788c36dd43983cd31bd5060c2468d1512da5b36d8c4298,2024-08-15T20:28:25.893000 -CVE-2024-38215,0,0,deb3c401dbb28a6d926f7ff657cf8d9f46c26096bbd4eabc027320dedbde5503,2024-08-16T19:02:41.517000 +CVE-2024-38210,0,1,120c63390059b5393cb1716f8c1b3c7d88d070b78f5196297d8a7a05917f375d,2024-09-19T22:15:06.083000 +CVE-2024-38211,0,1,fd64a191f4c2cd9f2cbc624905547292ee80e27b0ee298d51ea78b68c6d26490,2024-08-15T20:29:19.557000 +CVE-2024-38212,0,1,17229fdcfb5d2128ce5da6edb5e265ceec2d9c545539c6193f47a909dae2027e,2024-10-22T19:31:41.350000 +CVE-2024-38213,0,1,2dcfe75ba5929ae8ac2ccdb0032dafcc8a142d478b90513a05227545100773f0,2024-08-14T14:55:49.887000 +CVE-2024-38214,0,1,30f99573272bb70824618bb71ff5b70aaae21681681724afd1a359a954f6c56c,2024-08-15T20:28:25.893000 +CVE-2024-38215,0,1,6c70370c2e603e39444a7fb8ab8591e807ce4f98aeea791ca0b52508e27a2626,2024-08-16T19:02:41.517000 CVE-2024-38216,0,0,9b093a106d5fd0d02a2e9c94614cfe22ee0f0cfb522c3c7774659c5e003c6b62,2024-09-17T17:00:29.123000 -CVE-2024-38217,0,0,8d8f866ba3fe87021a870e6ab87dc022261c6d1d86fa7560c508caa11a925a58,2024-11-21T09:25:04.820000 +CVE-2024-38217,0,1,c772eeb7eb91ef799ed23410f431c2116c109cf376f079f1969c7146a9143a28,2024-11-21T09:25:04.820000 CVE-2024-38218,0,0,913e19eccc221b6d62bd3f004d9a23c4ecced5bf0793254c82e2e55052cab84b,2025-01-08T20:58:28.473000 CVE-2024-38219,0,0,1cb1c7d90c1b0adb344a54b96084a8d918de46bca695ac4e743598772e7ef545,2024-08-29T14:45:17.383000 CVE-2024-3822,0,0,779d52ad248a43b7f0b2350ab4f001c9b17cb4419f53eebc20cfa50e7d11cad4,2024-11-21T09:30:28.323000 -CVE-2024-38220,0,0,7a37fb6e0e0ac028694f1ea6a6ba861e1c9f6f01c7fcf480de64a061c04df8ad,2024-09-17T16:59:37.167000 -CVE-2024-38221,0,0,87fafe304bd6a7b1fdbb0f3ab8ba00bdf409115217a7f8d5d7f29b05e7bfd5dc,2024-09-23T17:33:29.137000 +CVE-2024-38220,0,1,97ddca46f9294247d3002eb4606a936d4d569c6e01d8abe944b13abe9b812e22,2024-09-17T16:59:37.167000 +CVE-2024-38221,0,1,bb83ad0be93030fce8f54b42129a35f39a5287db7c91494a631b23f71a68e162,2024-09-23T17:33:29.137000 CVE-2024-38222,0,0,2b1c259725362c47f600f6184e2f70c2f75d54118db7a40d322bb59707a5f017,2024-09-18T19:01:22.527000 -CVE-2024-38223,0,0,648948a189a18e9493a4310732eb28b89ddc5d07f7e45088c8cd8fa008e77ace,2024-08-15T20:18:28.240000 +CVE-2024-38223,0,1,d6637ad23ce1d694b9bd21c0cc008c32451d5652ea80748307c4cc57fc5ddb42,2024-08-15T20:18:28.240000 CVE-2024-38225,0,0,c1a01d4b464a6535df5902e771d809b6b8879f0806a0253e3e886357b523c0c4,2024-09-17T16:58:39.197000 -CVE-2024-38226,0,0,32d7260c093c48b6d036a1366395c99330703c4f8ee20a08e3e7c045736b2186,2024-09-12T01:00:01.133000 -CVE-2024-38227,0,0,ffde82cb76de7ae304e2baa4103b74a15888b8834aaa46d82ad7de4c6f175d38,2024-09-17T16:57:39.267000 -CVE-2024-38228,0,0,5b4e2a43780bebfc9ce6add79fb29b018fee3bda592f661df288cc7d7796e4f6,2024-09-17T16:57:54.950000 +CVE-2024-38226,0,1,c7695c6a6e3adfd32ab9d8e824ec9fa1bca55465436bea51c1858409e12f79bf,2024-09-12T01:00:01.133000 +CVE-2024-38227,0,1,ed444d1f838f77562d732188fe9b348de21aaf3ad19e321e63fddaeac3f01dcf,2024-09-17T16:57:39.267000 +CVE-2024-38228,0,1,feb9b32b0d8d9738fc74baeae4c5aec6462e15dea6f13d42f8eb897a16369095,2024-09-17T16:57:54.950000 CVE-2024-38229,0,0,a3f71208f7fb52ddac4363b01a6927139fd5a64df329b0a573ed936e4765b947,2024-10-16T15:36:38.317000 CVE-2024-3823,0,0,eb09e2f8ed709b5b125cdcdde26b66bf8b906b2eed98f88b8f606612f46a7fc0,2024-11-21T09:30:28.433000 CVE-2024-38230,0,0,fb10de1ce150c2c4fcf6604a5757dc3b828cfc0330155feed4de959e94bd9bed,2024-09-17T16:56:15.420000 CVE-2024-38231,0,0,0ce283246a7e9bb3941099800e9db7ae51856b83a3ad47eff4591f3a4b824711,2024-09-17T16:52:56.323000 -CVE-2024-38232,0,0,055fcd468ff03265129363e74b39fd10ca124ec17c315fa00f278b5a2e4df6ac,2024-09-17T16:52:05.267000 -CVE-2024-38233,0,0,b2203a8ac6871ae203abb74527e9a911f9abec358c620067fd38d19683269c10,2024-09-17T16:51:44.543000 -CVE-2024-38234,0,0,e3b114a872020c198b10d8aea959c9dd19afdda9083bce7b00f6ab978480bf62,2024-09-17T16:50:39.347000 -CVE-2024-38235,0,0,970f608caaa0ff18921959cc2e2f61e95c3cde55365009e4142fd18457bf3675,2024-09-17T16:43:33.167000 -CVE-2024-38236,0,0,3b6b70fb5e3561b436d6a98b90a05a1897361e7bf0fb3b77f1b478420056c295,2024-09-17T16:42:03.620000 -CVE-2024-38237,0,0,ffffa19cba7aa13a988c7ff619703db1fdc66b7d19ace77a3890269952417601,2024-09-17T16:41:28.360000 -CVE-2024-38238,0,0,56a29d58030e15db53d6b9a902522e95f239712167864c16d458a87790066c85,2024-09-17T16:40:55.423000 -CVE-2024-38239,0,0,446eeeb44be7409e190f8cd67262774de77db544d2f14b4feb3d8c4fb0445023,2024-09-17T16:40:22.847000 +CVE-2024-38232,0,1,d39d82a75ce0f68880e88ce015889e6d16457d28aa87fc8fb95597b61ce5fc91,2024-09-17T16:52:05.267000 +CVE-2024-38233,0,1,ddf21b241fe6c7fe55445308c7e7c14c6ed72f654924a5f529a76063452f9881,2024-09-17T16:51:44.543000 +CVE-2024-38234,0,1,66a89a8135ee85e7d0a9d62983c0a20a5b2d26da98aa09bc2c78829d52e5ca16,2024-09-17T16:50:39.347000 +CVE-2024-38235,0,1,ef3a9edfc07cc4ac37dfaadd35b685abaeb4542b7a575c88bf73b3d6a409263f,2024-09-17T16:43:33.167000 +CVE-2024-38236,0,1,5a402182cc78620fa058e082bcc95e421c1de77ed6278796a6e90fac3fb8ce07,2024-09-17T16:42:03.620000 +CVE-2024-38237,0,1,721f271f5d3ae5e71038a96ba27b85f619ae5e3dc863833bab830dca58de587f,2024-09-17T16:41:28.360000 +CVE-2024-38238,0,1,3c6700cf1a5bd146d80195dd9ea5b17232542da0d8143318eb0c03dbe54567fa,2024-09-17T16:40:55.423000 +CVE-2024-38239,0,1,67f60f2c6b173e388fe5032799f4ab50f05e6c13411733ed1ba763de3a1a3283,2024-09-17T16:40:22.847000 CVE-2024-3824,0,0,811850197767bad7238d342691add85bbd76e378e354453d546937be5c3ab47e,2024-11-21T09:30:28.540000 CVE-2024-38240,0,0,2d51b4cb20d6c4d3a2a000461fdd0acfb7f453ff74956193218b156cf246b064,2024-09-17T16:38:39.910000 -CVE-2024-38241,0,0,9833389dbf6edb8f0b4d48fd6813d9385d7aff2466bebb274b9bdf7578ebe621,2024-09-17T16:37:53 -CVE-2024-38242,0,0,448b8f5b50fe96c24e57452be3aa56754e2e48a0af8542163611c4e32c535576,2024-09-17T16:37:16.730000 -CVE-2024-38243,0,0,bba037f7586b41fb9cb376f9d686c07d89822952847383b366a9318b0cf50f60,2024-09-17T16:36:12.010000 -CVE-2024-38244,0,0,f63c1788b9ff494560643652d016ea4e37a09f24d890154ec72af1246909b273,2024-09-17T16:35:18.607000 -CVE-2024-38245,0,0,e961131cb71f253e0be3cf232afd4255f2c971a1730c08bcc144081169ec1d2a,2024-09-17T16:34:12.777000 -CVE-2024-38246,0,0,ba3579f111c6212a1253b624378faf66fc723fd885ff6969cfd1550a57461f40,2024-09-17T16:33:20.210000 -CVE-2024-38247,0,0,eba0a5b8eb62d03a1edfd2091313109a612ab485514304260eeb79bab9649032,2024-09-17T16:30:37.957000 -CVE-2024-38248,0,0,9fcd52159dfe011088c34a4303abbdbadab15a8cf5307294ffb10cba35b4fe51,2024-09-17T16:29:47.263000 -CVE-2024-38249,0,0,5b5602ba1452d1cb0d2d5cafb7e689fc8ec6ce2f305ef750763c3de8382e3bdc,2024-09-17T16:28:46.993000 +CVE-2024-38241,0,1,62bbccfc46b3dd2ec23e7d416b01181f84bebfa37d65f342f9f2661fad2b56be,2024-09-17T16:37:53 +CVE-2024-38242,0,1,c2eb5ace4ac48f536a3a8dac31a9c54f227ee44bb6a0a218087b469c5d4314e7,2024-09-17T16:37:16.730000 +CVE-2024-38243,0,1,bcb92c501d40a90eaf4e15c0691fed9d6d82128b686c38990585ae70953622ac,2024-09-17T16:36:12.010000 +CVE-2024-38244,0,1,5b0c460dcd5bb468df905ab0cb5d49a24d18f64b7561373d675b06ad2e63c62f,2024-09-17T16:35:18.607000 +CVE-2024-38245,0,1,baaf7f287b04505f864c939aa0a58e40d1d3d0535912755238746444e9fe88a4,2024-09-17T16:34:12.777000 +CVE-2024-38246,0,1,329ec008b30ff48ffc751b45badf7dc00c42e589cd362f37eecd77f8cb4bfce1,2024-09-17T16:33:20.210000 +CVE-2024-38247,0,1,4e2e98fa27ebe716a0f6f149ae8ab1dc8875c2532edc5446f38cfd0b47207836,2024-09-17T16:30:37.957000 +CVE-2024-38248,0,1,9926a0288516ea7bff40a1c976f56ee067cfd68f9a0fedeaf35f6f036abafa25,2024-09-17T16:29:47.263000 +CVE-2024-38249,0,1,ac118b5ef28e1ad1547056c0a1033acaa7383eaebbdf97e07bce90ecda19b3ed,2024-09-17T16:28:46.993000 CVE-2024-3825,0,0,1bca9a7178c34dcd43e2785df0d0c4b68ca952b3d31e8a40e868234242e53800,2024-11-21T09:30:28.650000 -CVE-2024-38250,0,0,43d066a1e8d7215537eb0ad04eddb2b9d229eb4f3cf6c7cb913143fb63768609,2024-09-17T16:27:12.593000 -CVE-2024-38252,0,0,ba75b31b7928fff6464a10ff745103b901d2c423672d81363535912f9a57c0e9,2024-09-13T15:23:18.010000 -CVE-2024-38253,0,0,c5d70b80dd84d61c77b695167b5c05d6719dce39224d6971d40cfc9bbc218866,2024-09-13T15:20:59.970000 +CVE-2024-38250,0,1,63a29fd966bdd7ad22e721a51350ddb7415f0949fffb69e067885853175cf1cb,2024-09-17T16:27:12.593000 +CVE-2024-38252,0,1,55e0b33c0be64ad23e36fb2759bea2d3cb3042fe7fb62184c35c8fe866bdaae7,2024-09-13T15:23:18.010000 +CVE-2024-38253,0,1,2ff7db139640ddcbc29bc6b1cdf2c4405321a0e0597710270fcd01b1843600a2,2024-09-13T15:20:59.970000 CVE-2024-38254,0,0,eb6cbe8a7bce3eb0e8b1cd5f0443b08f05f105d1692f875f54fd7662bf4f3c57,2024-09-13T15:16:48.427000 CVE-2024-38255,0,0,2843f2ddf71b5012e9aa2c3cede0b0a1c07fbcc24a52a30910801716b1dce982,2024-11-18T19:35:30.300000 -CVE-2024-38256,0,0,9be902ed208e910bd685bbc26f128043fe04fd11e64f8be878a3dfb5c7456935,2024-09-13T15:05:30.070000 -CVE-2024-38257,0,0,90163187f05359b11bea87deedd015081171a8e1cc9f68ca9018e1a9d8abe12f,2024-11-21T09:25:10.023000 +CVE-2024-38256,0,1,529a7a0d9b49ec7f59e2ccf885aa82e1328e6ab1fe60105fbb73015522724ce1,2024-09-13T15:05:30.070000 +CVE-2024-38257,0,1,649fd3084ad537d8aec53b83dea55231ba1b5d449bf4a5b5044d1fad2e667a4b,2024-11-21T09:25:10.023000 CVE-2024-38258,0,0,35bb97368db45750eb190551c6b51179a071e1f15f0848a955be12325381b39b,2024-09-13T15:00:54.153000 -CVE-2024-38259,0,0,9af35635d5743088b4fffc594fff561b904ea0dd8e3d949b3f4914b660127339,2024-10-10T14:02:28.917000 +CVE-2024-38259,0,1,511c0af936f1886ebd2dd41a6d76b199cb50c8f1a3e463d964188c0c7f689d46,2024-10-10T14:02:28.917000 CVE-2024-3826,0,0,1b63308b78e96e496a54022a6256c9ec61e586783425c51a7c3d52861e3b3fc3,2024-11-21T09:30:28.790000 -CVE-2024-38260,0,0,cd7712e1f5a3a9381e106537df60437d6e703f53bf63f9dc7e568fcd070f7ee8,2024-09-13T14:53:26.410000 -CVE-2024-38261,0,0,2fac65995d579ff3954a3bddd04b4fdf334c9bfb15a51023c6b6f8eb0b63ffcb,2024-10-22T19:33:29.160000 -CVE-2024-38262,0,0,c18c4122a33a376b035b732e73ddbc736ac172f80868aaa874dc1a3acf1abe7e,2024-10-22T12:54:48.080000 -CVE-2024-38263,0,0,ea6c7033eabe0d94a17b95c29a0b66dc45d1e641ccc9178240554d71f1023f6f,2024-09-13T14:55:01.400000 -CVE-2024-38264,0,0,a77997b8d03549e8122c044f225e0a08c056fafd72b6343f65e28e8f22116387,2024-11-19T20:52:32.727000 -CVE-2024-38265,0,0,7e6a4c2910209e678239362dc67215098e66e89e7e2b3131e866cb47983920cc,2024-10-22T19:33:43.260000 +CVE-2024-38260,0,1,55155bf2fda456cb7f499910ffe6c2eb3a6f4d46aec21021f19712290d3b8a15,2024-09-13T14:53:26.410000 +CVE-2024-38261,0,1,65fa7ef19d9f815dd4352240562fea68e5634787cc328bd6174a79c833cc09b4,2024-10-22T19:33:29.160000 +CVE-2024-38262,0,1,6bdeaf5f41cf849f004d6bc1800eee3b888d3ea26fafd106399dfd2d695557f1,2024-10-22T12:54:48.080000 +CVE-2024-38263,0,1,08c09bca8be0748ee609afbdc86995447afd4fc603f8c53991539f339963ff1d,2024-09-13T14:55:01.400000 +CVE-2024-38264,0,1,544aec0258efd2ef444e3b0f22cb1914d31b5f221162a747396cbd15d26901db,2024-11-19T20:52:32.727000 +CVE-2024-38265,0,1,34377c1ecac9e16586946781889111692995cac81b15c1f718c3ebd685f7fc23,2024-10-22T19:33:43.260000 CVE-2024-38266,0,0,9e43110f9f58ff12ecb0a0938d2f2d40edffe1ace6c44d38b558168490c8692d,2024-09-26T13:32:55.343000 CVE-2024-38267,0,0,2f2200bdf622493906326d5acab6e766450e36cf9e37a3aef0e32c2106f2c357,2024-09-30T15:52:52.787000 CVE-2024-38268,0,0,eab46e6b7e36a54bfbfac467119830961637a950b96b9b108bfef786c50054b7,2024-09-30T15:52:29.977000 @@ -260908,7 +260909,7 @@ CVE-2024-38716,0,0,ce66ae208dc81b08466b7a069e96264c814002e9fee9291323ce5df121c1b CVE-2024-38717,0,0,864f2dfa6d053c7c7420aea677a3e4e4f516d5edefd48370a2493148cebf304a,2024-11-21T09:26:41.470000 CVE-2024-38718,0,0,0d7814a8eb206773759a0d464b09dc76a76e2118d95078cfef1846e8360bcba2,2024-11-21T09:26:41.587000 CVE-2024-38719,0,0,33fae0dc844d26bd1b2bf8c08c4c8c6a62ad47a072a0605638f255222626eee1,2024-11-01T20:24:53.730000 -CVE-2024-3872,0,0,22715f4c03e188e89d12a09f0458764101dd671ed91addd01042a2c9386d4c5f,2024-11-21T09:30:36.187000 +CVE-2024-3872,0,1,34b861b058482d69bbf1030e99e4ddeb0cf25610fc326112788304934dbe26b8,2024-11-21T09:30:36.187000 CVE-2024-38720,0,0,eab2d8bf09a0dc4b0ca3d9fbdfbbebdd25cd6ed67df1c249d5ca83d281a9b894,2024-11-21T09:26:41.773000 CVE-2024-38721,0,0,fdfe5e2daa63135c91ea3f2622a84d18b9bc401b8a508ea10e1caaf9796c27fb,2024-11-01T20:24:53.730000 CVE-2024-38722,0,0,b9c2af08cbfbae27b7e0b60718880214c97bd229bb8a3ddaedec7ae131b9de3a,2024-11-21T09:26:41.963000 @@ -261021,8 +261022,8 @@ CVE-2024-38831,0,0,4e296297b435627a62910eef33560dffee11758af4014daf7dacfd30a3846 CVE-2024-38832,0,0,0493cf9f013d37851e0f742d469726bd8aa192c3712403ff0f7b7890bf101dc5,2024-12-06T20:15:25.977000 CVE-2024-38833,0,0,4362568a75fe4ff6f0b022eb6319bcf28879b08f368dc59d539bcf2b96b0e3c0,2024-12-06T20:15:26.097000 CVE-2024-38834,0,0,d1e4df2457be3688e7ecbb94c62f14ef708bf2a35a15ef98a11a7f707840deba,2024-12-06T20:15:26.207000 -CVE-2024-3885,0,0,d8203bf975259cc7c9b8096eb8aae188572edbc7f75dcaea8b5f71a9e139f772,2024-11-21T09:30:37.807000 -CVE-2024-38856,0,0,1179c7b2db8de0f6b621a0e591d1f9edf5c96f25bb4617d01659a6586ed94c66,2024-12-20T16:35:41.330000 +CVE-2024-3885,0,1,a9acc545c1bf5be6aaae6f761f98fd66d102eeb11c13b2dbbadc6bb56858c86b,2024-11-21T09:30:37.807000 +CVE-2024-38856,0,1,ae15d268fd1c224ec15618067f86e09b1d4b18085b69d60828f6d8c9ff9a80f7,2024-12-20T16:35:41.330000 CVE-2024-38857,0,0,392b260a009bcf153896a24b0ca2ef35f6f5d57e012aa080627851164a4da679,2024-12-04T15:37:16.290000 CVE-2024-38858,0,0,0905a6edb93734f4ba33225c6937d7fb9b4d2ff2a1ff03b7aa90c2c6088f27ac,2024-09-04T14:39:10.203000 CVE-2024-38859,0,0,d5cd9910194e7ede45677f9f5ea018635b199c144fa350166115cef667345577,2024-12-03T17:47:02.467000 @@ -261035,7 +261036,7 @@ CVE-2024-38864,0,0,af0e1f74f54ae930813fb89ea10848ac19874562be01e9608fe0085232309 CVE-2024-38867,0,0,99a6ceac214ee5f926f3536f5f9429a3f2ad1c8beb42ad2f5b0dde6e9884854d,2024-11-21T09:26:53.620000 CVE-2024-38868,0,0,f617565b943eecb1268c96959d081ed3b2d4ce7c428fb68cb30623b6faafb7c0,2024-09-04T19:13:29.983000 CVE-2024-38869,0,0,f770e86162bd7ed85445a4b54936e199dae2eea6001e0f8f44ad54b01ece9407,2024-08-30T18:15:07.150000 -CVE-2024-3887,0,0,bd4c51378aa49fd60a200852364ef921ab87c55e3611bf0a4b09670f29735757,2024-11-21T09:30:38.043000 +CVE-2024-3887,0,1,7a5870f20dc2b53cd4f2c8f549a4b956e5975b8e5d2cd64fe835e1280072fb75,2024-11-21T09:30:38.043000 CVE-2024-38870,0,0,3f480b5b39b4c5fdb388221560c42c981ef4953e4780035693d066dc838a4235,2024-11-21T09:26:54.037000 CVE-2024-38871,0,0,aaca5100a2da9e7b5d586a9692295acab5c9d0d91eda66f1860ebeb293e9087f,2024-11-21T09:26:54.183000 CVE-2024-38872,0,0,47ea80c2905b4fcc836b85526e852dd82f3dd2956ab3cfac662114764141134e,2024-11-21T09:26:54.350000 @@ -261802,7 +261803,7 @@ CVE-2024-39934,0,0,a040eeb58db8dc357074257c6548a542573771e14e58a5691af92614e3e7c CVE-2024-39935,0,0,20eb5709834fe3f6799e0bb92d1add201d649bc3b4e0f310eed715777bbe31c5,2024-11-21T09:28:36.707000 CVE-2024-39936,0,0,7cc05799fad54717d1ea9ab51b599841e252159a2830c99abe786e51cf64bc77,2024-11-21T09:28:36.910000 CVE-2024-39937,0,0,ae9ab5f050d906a5961bb72c56c15cedac541bb0393283d03c6542795d50285a,2024-11-21T09:28:37.077000 -CVE-2024-3994,0,0,3db1c0c9a22c71fc1a6eeb27d014aacf5ce4b579ad743f8ad911b488440cab46,2024-11-21T09:30:52.223000 +CVE-2024-3994,0,1,4377fcf1f2b0f2f2b6a98f2fd9fe5b5ba1929ae1975e35c916c3c7c1e2e3b89f,2024-11-21T09:30:52.223000 CVE-2024-39943,0,0,e5431389e4d2307b8204f37d169268294ec0b86f0f4886437657221b2334d1b1,2024-11-21T09:28:37.253000 CVE-2024-39944,0,0,6238186d16604774d362fee8abf4ab62ca133ccfedad2d13a370c4aca20df6a1,2024-08-19T16:12:22.810000 CVE-2024-39945,0,0,1688d6106111e1e32cb85d6131ead774769107adbb283829073c3abc0f53f17e,2024-08-19T16:17:06.653000 @@ -261819,7 +261820,7 @@ CVE-2024-3998,0,0,847c70ba4e0bee0ad4d10aec09ccd79489e9a61ce069c72f27125c4d62d523 CVE-2024-3999,0,0,76272a3e50a6a2e069e3213357753908084bb20422a13e0771c86e9014635714,2024-11-21T09:30:52.620000 CVE-2024-4000,0,0,2c18790a94b89f69cc0c10765e874069b5bdeedffcd83bbe3b247efb31ec6b9e,2024-11-21T09:42:00.543000 CVE-2024-4001,0,0,c58d7d3b708805e741234a4827158063eb837d163c3d6e7c2f809fb36308b42f,2024-11-21T09:42:00.690000 -CVE-2024-4003,0,0,a554a1e98589287488bd0d890f783a2c8efe79c176f8dacbef12da11d4237ca7,2024-11-21T09:42:00.840000 +CVE-2024-4003,0,1,12155b8549de99e197d48f530d4ae9becae1717c998d38b5b6c2606a64857859,2024-11-21T09:42:00.840000 CVE-2024-40034,0,0,a4e4bcaba65127a5d45e6602967a8ea019112b204fa50307b6e34c0f58b8b275,2024-11-21T09:30:52.807000 CVE-2024-40035,0,0,21ee6dc742b0f0e65f41da3ac9d2fb8d643f3b218012d7c2e47080e5a3ea08ef,2024-11-21T09:30:53.017000 CVE-2024-40036,0,0,c6c191d93172c307e867191f32426017b87dbab792966437cd5747f900ae3509,2024-11-21T09:30:53.223000 @@ -261915,7 +261916,7 @@ CVE-2024-4042,0,0,cecab8b1687d6be49a591036e1f884eeaaaac74f662dec1e0d521caf21f5dd CVE-2024-40420,0,0,2cc64060c56a9cd8ae43221cc949a39e78df1f9a724e5e5fe2d1f288499041f6,2024-12-18T20:15:22.773000 CVE-2024-40422,0,0,66694de383944722e2f25fc6c01858a58042d8c38d3705e14f9fc82648bd4ecd,2024-11-21T09:31:04.907000 CVE-2024-40425,0,0,57fa5f5d788296fbd065197156216c884c87febf9dc0d47016294cebb94993ba,2024-11-21T09:31:05.133000 -CVE-2024-40427,0,0,f6ae4b9565a1b165aec968eca0f69b1a73db818924dd66dd558467a4c9023363,2025-01-08T19:15:31.043000 +CVE-2024-40427,0,1,edb2ed6f04ab924988a6c43762419200f816f91f867e2f61b6ea78a526ec38ae,2025-01-08T19:15:31.043000 CVE-2024-4043,0,0,d4b5f95f306543d879cec12e990f7b6a12bdbc75a98caec12c24a6e719c63084,2024-11-21T09:42:05.460000 CVE-2024-40430,0,0,546dc110e07f45ee3ffd84e8af87c8ef8c5f6d93dcd27e587cb3a3c5233f7799,2024-09-13T21:15:10.357000 CVE-2024-40431,0,0,e23592fbcb9fa660acf205a0231389b077a5c59972c85ee664d839efe06b83e4,2024-10-25T12:56:07.750000 @@ -262066,7 +262067,7 @@ CVE-2024-40661,0,0,e9311a0488c8beb4857508062f47da62f4761ca246a30ea7974cdfed13174 CVE-2024-40662,0,0,f930fc5956328b9ceaccc04df86a895546984aaffbdfff03287ccf231f34c2aa,2024-12-17T19:07:42.750000 CVE-2024-4067,0,0,06cf73941215eebfb58b3f7712c48b8f71a364f025c4b7e91b6494998e5c5a95,2024-11-21T09:42:07.587000 CVE-2024-40671,0,0,4520d06fdb2a855ee77cf9a82325fd4ddc6fdfedc3ecf68cb89582eb0d5cc2c7,2024-12-17T19:30:29.457000 -CVE-2024-40679,0,0,7e2b7f16cea587d095fd718a563459c7a4d4b149876dc71826344826c1a87f3e,2025-01-08T01:15:06.953000 +CVE-2024-40679,0,1,1a4f43e2caee22490662a400e96b2c2bc6cc2720e0ab97475d03ecb065f8ddc1,2025-01-08T01:15:06.953000 CVE-2024-4068,0,0,6064b7191c4bfe6385dfb9559ff0d900f6a3c128ca3c30b46fda682863dc73a3,2024-11-21T09:42:07.710000 CVE-2024-40680,0,0,bd67df4a239df055ff0046ce7193fc2f150970ac8a25905d079ed701abf99ef9,2024-10-31T17:15:12.990000 CVE-2024-40681,0,0,2b5a5c013480bd5cc87a564fe6701f318e09e1cde3fb5250634972a9f9aebf6b,2024-10-31T17:15:13.143000 @@ -262077,7 +262078,7 @@ CVE-2024-40691,0,0,ac3d9a2c16ecf56eb2b1909a87f2673e6fa5961b82ba378fe17aa1da2a76b CVE-2024-40695,0,0,0d717382495ca983a078932b58ed2224b4fa40332fd067474a8fe684c9650d24,2024-12-20T14:15:24.063000 CVE-2024-40697,0,0,9675ffc87015078088b6658ddad78e8bbe317856a9033b7e633b65273e34d419,2024-08-22T13:27:20.743000 CVE-2024-4070,0,0,228e3a9486746eb131dc1faba8cea69af4b69cb949a0fc5caabe789181f2b9b7,2024-11-21T09:42:07.967000 -CVE-2024-40702,0,0,5239865371844f6925e15401b29df86d20860fe463a0a8fc0dd9b286a1223e68,2025-01-07T16:15:33.463000 +CVE-2024-40702,0,1,0010d40778f1fffdc1b0664781c513393e67c7620d1ff605f896e7ca8cbe8a85,2025-01-07T16:15:33.463000 CVE-2024-40703,0,0,e703b61d3f8dfe06de226d6f2873ad12453588e6ae0585ecf895673088efbbbb,2024-09-27T16:49:46.177000 CVE-2024-40704,0,0,f1eefecca06d931cc6fa5c315f3cff483d4ea73258582e293da29f36971e3c43,2024-08-15T20:03:13.530000 CVE-2024-40705,0,0,498d1b36f9941cc45abf0a56c450cafece4560bbcc29015fb60565ec3b88fad7,2024-08-15T19:57:34.780000 @@ -262122,18 +262123,18 @@ CVE-2024-40743,0,0,4fd30ab81bc561e1670c5d56491735c591320085c7d82d8aa63eaf16d1b2f CVE-2024-40744,0,0,500374d1b7dcc6ceb47ed346384bf42b0fa553630fa102e80407350b833ddf52,2024-12-05T17:15:11.570000 CVE-2024-40745,0,0,cd13ff95b3dae5558dba4f85299c61c29cfa0dd17dc355a880cf8c9b4262abba,2024-12-04T17:15:14.097000 CVE-2024-40746,0,0,28b5eac0696e1aa464ec2af9223be9793b0cfde2d3c3c98b18ce12186dc2b572,2024-10-29T15:34:22.100000 -CVE-2024-40747,0,0,4ac0d947ad350f4ce82e954feff0a48ad670b67ab2a398cf1268d1edafd92d56,2025-01-07T17:15:23.430000 -CVE-2024-40748,0,0,abf90c4a5f747b6ea6823573814ba0262b5d0894bdb2b8697e4dd39962589ed8,2025-01-08T15:15:18.110000 -CVE-2024-40749,0,0,c405cbf3b6c51507764336f24786cbc1b6ca573aa63846f0db1ff789b26cf01c,2025-01-08T15:15:18.400000 +CVE-2024-40747,0,1,34091d33a31a881c140241d77e2c51a289d54f6c7a21fc83133dfd637eb5d428,2025-01-07T17:15:23.430000 +CVE-2024-40748,0,1,e0ac7e4d0ecc5c823035a2f883e0bd5ed1005cbf94f0d981cdf7af18b477d98d,2025-01-08T15:15:18.110000 +CVE-2024-40749,0,1,150958834a05c0d7f6a0d67d6884c443bc293f6737ff979bf9f6b11eb6280ee4,2025-01-08T15:15:18.400000 CVE-2024-4075,0,0,6c653a7c78c4e11129adcbe0518ad6a07843b29f0e234c98fb05402925f6c893,2024-11-21T09:42:08.680000 CVE-2024-40750,0,0,c491090d917045d507fa28976c97558943f972457181ebb36c0ba9aa25c97d61,2024-11-22T19:15:07.113000 CVE-2024-40754,0,0,bd9d6903684af54e3d4f528bdae88b70db33043ddc74f4404f7d893dbc9cb397,2024-09-10T14:35:04.833000 CVE-2024-4076,0,0,6f41301410bb850ac724eb349beb08670550e5e1ae7ac3c04b8cf5e2d874d5bd,2024-11-21T09:42:08.807000 CVE-2024-40761,0,0,98df27f9ab08289b73f70adffa16577ee132bdfd9b5e346e5d494328018c9b31,2024-11-21T09:31:34.510000 -CVE-2024-40762,0,0,8a56af673927e464b8e82c3ce2395cd64e30d0026c7b26b3771e9d5e252d36b4,2025-01-09T15:15:15.370000 +CVE-2024-40762,0,1,7b7bd4831227bab0dfa105eba6a2c8e8e0f585aa810eae841a3b97060033834a,2025-01-09T15:15:15.370000 CVE-2024-40763,0,0,03a98910bacc7a91881ba5927386bf799784ceed39e50818d2356358d82576a8,2024-12-05T17:15:11.720000 CVE-2024-40764,0,0,716c9029e61b77a0d9603bd5e4ce9d607d5f6a696fe7c8edc6ff51f3b795b731,2024-11-21T09:31:34.703000 -CVE-2024-40765,0,0,28388782e8548bb50b4a4dfab0451398700b29af44485d3f5ef816850b1bf8a2,2025-01-09T15:15:15.560000 +CVE-2024-40765,0,1,2edaf666aea1a31f43f2729974605acef8176b31934f9e77b222d5617a1df174,2025-01-09T15:15:15.560000 CVE-2024-40766,0,0,245a65896d5e59cbc106ef8982774d28e0903e2f3e66c1e0224a1b4643d1a16a,2024-09-16T19:48:30.827000 CVE-2024-40767,0,0,d8daa36a05263c3ffe16e1b113badcb7ade4182a8a1be061cbdf839ea5fdacae,2024-11-21T09:31:35.113000 CVE-2024-4077,0,0,8de588b7fa8bc539a1390a30d26ffec16c49968012710ff1d0939c2fbeb8f325,2024-11-21T09:42:08.940000 @@ -262519,7 +262520,7 @@ CVE-2024-4116,0,0,fb13e9eda5d5b0f87b4a1a6faf2d47dd767a1cd80c123d34508608e977fd6f CVE-2024-41160,0,0,59352b379d517c3d21973bcf1f1dabfc101e56caaa086108874e9f5a5016dec8,2024-09-09T12:21:53.383000 CVE-2024-41161,0,0,c44c40c9181bdc0411297b718d634c69b4cc443072a4bbfc4be96011581fd659,2024-08-20T17:09:50.647000 CVE-2024-41162,0,0,977378981001bb41eb21ff3c8de57a2d971d0d349d42fb50bc854dc76c138759,2024-09-04T17:03:53.010000 -CVE-2024-41163,0,0,acd3d59e23a7c7b4b0c3e74d19b58377cdb81402be9adbd0a5cfe7a91ece1831,2024-12-18T15:15:10.730000 +CVE-2024-41163,0,1,a875db94bd67413b4697a424258164328dfe7ad33e562b13cbadb5e9474a22e6,2024-12-18T15:15:10.730000 CVE-2024-41164,0,0,4c4d4ed9c8462fe5c1beb69a1e440cbfd7fca4e0230442b39f4f5b80ba178ccd,2024-08-19T18:39:06.157000 CVE-2024-41165,0,0,f2cd16e63216ab00fb4b5715186a0a48b1a1a4c2af03934e45bd74947acb94eb,2024-12-18T23:15:08.300000 CVE-2024-41167,0,0,99a054e656d3c12a5ab4c6034e2dfe4d200da81fdf05058d692b86b939cfb420,2024-11-19T19:45:02.660000 @@ -262688,7 +262689,7 @@ CVE-2024-4154,0,0,fb34dd0c7d323df94eb060fde65c643aaa01888a9fd44b01b2bd79ea1e8468 CVE-2024-4155,0,0,9d1d3f06be4be4f0b611f0b92aa6b48510c05900efdf1b1c24851d7c9581a867,2024-06-11T10:15:13.260000 CVE-2024-41550,0,0,f550993cd5b5dc9cc85253f185c4436ed9356e5f718dbcaa508d382b497c985f,2024-11-21T09:32:45.557000 CVE-2024-41551,0,0,e1d018116726b59a859c54c726d033d68adc85dd274a77d026bca8345fe434d1,2024-11-21T09:32:45.760000 -CVE-2024-4156,0,0,16730545763a5139e156051b3bb62087725e585653005b3988cad85440e6a3f2,2024-11-21T09:42:17.790000 +CVE-2024-4156,0,1,b97eefce7b8eadc4a4a8a20a984921e75b4ec8e24a6d7a3393dbb07e3ec81bd3,2024-11-21T09:42:17.790000 CVE-2024-41564,0,0,24f60296f7995573baa861824a54d1622bd6248d719f1fa88e107bb7ee60a876,2024-09-19T14:40:32.270000 CVE-2024-41565,0,0,e90f9d0bec65bf131f69559e330499ee7d867ffa90ce21c920c44c5a44079338,2024-09-19T16:19:59.317000 CVE-2024-4157,0,0,3b4a953e70ebb437de1ad14041aea1d4ddb40efd03289f86d3c89dadae0ffc8c,2024-11-21T09:42:17.900000 @@ -262760,7 +262761,7 @@ CVE-2024-41661,0,0,8be49a95a9c023719c12155b6bed0ffae7501d3f32777c539056e8b618120 CVE-2024-41662,0,0,dc3e227528839622e3f52103be234a8b480e9e6cbb7ce29d523b189f23f32bce,2024-11-21T09:32:55.687000 CVE-2024-41663,0,0,4272efe11b637ca338f352a090a10e21c504674c8bd38289acc8c80d573bfd76,2024-11-21T09:32:55.830000 CVE-2024-41664,0,0,c6b2b3d8ebcb7bed9c21e6d6e3056aff15e6ffbc100af4d66d09f067c2129410,2024-11-21T09:32:55.953000 -CVE-2024-41665,0,0,e6f91f4f05c676fd24f905b82a0b17d1cfdbcffb309baae66be86134c57ec4f4,2024-11-21T09:32:56.073000 +CVE-2024-41665,0,1,d45defca8cbb1cc7c179ea92d3660a2d03a817945288adb82a64865ca964e26f,2024-11-21T09:32:56.073000 CVE-2024-41666,0,0,d1f92fab5beee45ff4388efe5ddd44e33f7a0f850b5bbacae429ee6a186a4dbe,2025-01-09T16:54:08.037000 CVE-2024-41667,0,0,1521e864f3422c9bb00179574d7279d1ebaa600c95bdd96efe9cb514a68f8910,2024-11-21T09:32:56.327000 CVE-2024-41668,0,0,dc859c8887bac12a38e68f1ba130799ac5f5864a2aafd455bb306c37815db92b,2024-11-21T09:32:56.450000 @@ -262847,11 +262848,11 @@ CVE-2024-41752,0,0,04e93d2aa0d5f5c09f5bd50535183c7216d854c9071e1cb65e129028f085f CVE-2024-4176,0,0,bbebb00d63b41a3619ef35d6461fab3b8fd8271367eb9c2415dbdbc268e57b15,2024-11-21T09:42:20.253000 CVE-2024-41761,0,0,183a2cec18f466d5717e002f6cd6d2700ac207cbdcd434bf78d86f226e394a03,2024-11-23T03:15:08.333000 CVE-2024-41762,0,0,4c983f99fd9207aedd2243856187958b4b9b76b67049382df79da756be6d51c0,2024-12-07T14:15:17.560000 -CVE-2024-41763,0,0,a2aeb57705e940031c03097b7d21a1553139eec42d8a79ef8b18d935a04ab05c,2025-01-04T15:15:06.017000 -CVE-2024-41765,0,0,ed29ce6a259ee4658e2b0d240f18830b9829fc67f22c8d4f15334826594a7360,2025-01-04T15:15:06.713000 -CVE-2024-41766,0,0,d5da4cddc175d2f04ad9578323cdce50ea1e36c50774ca8c885a735ae7177364,2025-01-04T15:15:06.850000 -CVE-2024-41767,0,0,cfd96b1763db7d812a00b5b58f162f02847c15a5642c481056dccd5e6017902d,2025-01-04T15:15:06.987000 -CVE-2024-41768,0,0,0e1a7c9e739801b41ff2a53ea44a79cda9f2a93ab19df4a6acc92c2656fdd3d7,2025-01-04T15:15:07.127000 +CVE-2024-41763,0,1,94c378f8474aa53dee22239e59e2b4c07cea8d922818f488d7813a8a5b926f47,2025-01-04T15:15:06.017000 +CVE-2024-41765,0,1,a5edb67fc0bbdbfcffc242d6ce09bf0b612dfde36ef90f9b346930996fefda53,2025-01-04T15:15:06.713000 +CVE-2024-41766,0,1,27a514791788a4bf30eb4a3bf81b83642a6793378dce75a5c9d762909251c634,2025-01-04T15:15:06.850000 +CVE-2024-41767,0,1,e172d29e714c5abc78a0eb3060db7132aed0e0deb2dd067ea8983ade3a6ffcf1,2025-01-04T15:15:06.987000 +CVE-2024-41768,0,1,62950a30cb25f26fc31df7352fdd7c6931a582431a6a1cb92e67af8ad7943776,2025-01-04T15:15:07.127000 CVE-2024-4177,0,0,b19cea7dfc04a16711a952f111997ccebc4378d3e2d6a3d68b2d48d03a2529dc,2024-11-21T09:42:20.397000 CVE-2024-41773,0,0,beaf4d8c312e85e3696081a024d02001bdac13d0a849a736ca19b73511b0958b,2024-08-26T18:33:07.997000 CVE-2024-41774,0,0,db82f7998f610ab2c3c2ae4d9e33bcab8463b004f8921670f73f55120becfa11,2024-08-24T11:15:05.670000 @@ -262859,11 +262860,11 @@ CVE-2024-41775,0,0,e5a5c3f0c9c2d797037bc42d58511f5d720ca3c68c1710b74d20237b76b1b CVE-2024-41776,0,0,645561281eaec0c17a46e435f182a12ad35f1dabfbd0f0ddaced797c0e2c28f4,2024-12-11T03:24:19.023000 CVE-2024-41777,0,0,cb9df48d95cae8457cf91a5abe10e277d5ade6df23da7cf8a2746d2d5ff22e8b,2024-12-11T03:22:46.490000 CVE-2024-41779,0,0,0cc2a488dd76e38c9c90720b0b2edfd5c9f34c5d2e2c40d451ec0bb49b764fc0,2024-11-22T12:15:18.987000 -CVE-2024-41780,0,0,34abdef12cb5a33c0dd374033cc2182a979effd2cc3e3f1e7badf9b47d6caf54,2025-01-03T15:15:10.367000 +CVE-2024-41780,0,1,f0bdb2eca8ebee85877f13f35a81fb91d5ea99c267cf6b461805356adb0fe55e,2025-01-03T15:15:10.367000 CVE-2024-41781,0,0,be645911c6dec68941643ffd681ea405f77903ad7fd076fcfc9ba888bf410899,2024-11-22T12:15:19.193000 CVE-2024-41784,0,0,834229de69197513aecb1da041f367a5c75a25616f354d789ef1d74c355b94ba,2024-11-20T14:35:10.117000 CVE-2024-41785,0,0,c467b2ed18d6a9ed7b192c7574b2e5d45ad6a298958e3a9159fbc19830c4ae2c,2024-11-18T17:11:56.587000 -CVE-2024-41787,0,0,9cf90da249efeaaeb053bd9e9416dae318cf78c2e1359394d164d3d72a2ee7d3,2025-01-10T14:15:28.947000 +CVE-2024-41787,0,1,2ce07b9a6b18d8a84c5d57c1b65be03ed592b20cf437d4d53fcd02adf4105c64,2025-01-10T14:15:28.947000 CVE-2024-41798,0,0,cc633ea407fdc391b71e57f24672a48cd6a94d6090c3348da6eb82d23699eb9f,2024-10-10T12:56:30.817000 CVE-2024-41799,0,0,57e0652da6088d2f7ef1d8a480b502117a7d15daea77cec2467e2ce23d41e466,2024-11-21T09:33:05.673000 CVE-2024-4180,0,0,64e0c8d8c66171063acccd720d31bd7075e5baef32bbca8d371983bbcc0987b5,2024-11-21T09:42:20.530000 @@ -262978,7 +262979,7 @@ CVE-2024-41915,0,0,74f4b30a3490769bd45dc3bb1c6e58da7fcab263c0eccbe09541d45260e0a CVE-2024-41916,0,0,e26bbdb30f3e12989e8ba751536faaac62be571602a0259fbe27bdf53bba951f,2024-11-21T09:33:16.797000 CVE-2024-41918,0,0,0025c02645b62e9a013f9a632cdf884d305e491a1529fcde2896b5f25d46b1f6,2024-08-30T16:05:23.737000 CVE-2024-4192,0,0,6f45d7ab3fa2e128e5ba0090b09e0efb99d62d4fa36ffa8103dd1a0f77ba887b,2024-11-21T09:42:21.737000 -CVE-2024-41922,0,0,c474233251e2cda687143852afe84ade383db4530aec836e5b393340d583500a,2024-12-18T15:15:11.163000 +CVE-2024-41922,0,1,7e03c992eccbc90ea51a8983e0cf91681fc1323d95ecf135ada02c68d1fe41ab,2024-12-18T15:15:11.163000 CVE-2024-41924,0,0,7f0f2dba0da77920bc169ff261d197e150c61a323fb8b37c94de1765d8092267,2024-11-21T09:33:17.350000 CVE-2024-41925,0,0,f0afe0eee06b0829945c8f8e62a978d9cd0bb35f1eeab69e0173fdfc98892541,2024-10-04T13:50:43.727000 CVE-2024-41926,0,0,bf6164bec763886028fa43df40afb1056b64cffb366d4c2dd3441f5245ffe1ae,2024-09-04T16:55:35.570000 @@ -263072,7 +263073,7 @@ CVE-2024-42025,0,0,d907e87667bcb1967fb111c3ad577747bdb87d9fd1dbb9786c4384a0b62a6 CVE-2024-42027,0,0,5638d7ec8811c9e8fbb2fefb870a279e420da027e505e80772449ff5a6a7d256,2024-10-07T19:37:18.967000 CVE-2024-42028,0,0,76962f5154259e05711dc364ad6590c7951c32228b9c6c9eee39eb61056f2b4a,2024-10-29T14:34:50.257000 CVE-2024-42029,0,0,c08e6acdd6ec3b8a3887e5db37a9c5165ef4383f0d70c9568de531513f77f6a1,2024-11-21T09:33:27.177000 -CVE-2024-4203,0,0,b8050a146f44d9e6a087ea7e848d8caa27a56185e38ab2c190d49653f983a982,2024-11-21T09:42:23.053000 +CVE-2024-4203,0,1,eaa8f4a68a94e6c5176b87a29c6341ff2dcd09f8cba10bae17127bdc091ae640,2024-11-21T09:42:23.053000 CVE-2024-42030,0,0,9d8e6836e09e06eef13879d259f0cdbc610c5d8e0aadde9396edacf5cdc9ea8d,2024-08-20T16:55:16.100000 CVE-2024-42031,0,0,e44b4d88045fce6be751467ba254c13d4fac3b9456fcbe9294f492fd0282250d,2024-08-20T16:57:48.923000 CVE-2024-42032,0,0,6c41eebaac1fc45c551db07d50d8a39d1b6ff8c85984db3ae19dcd161d76a5fc,2024-08-20T16:58:09.690000 @@ -263087,7 +263088,7 @@ CVE-2024-4204,0,0,39b44af6808931d3c0ad8a37453d39d3d318475b6dbf683b01325391566be9 CVE-2024-42040,0,0,f723e908d4963a04e411eee5ee0c21e2f52da2091d809ce0b104dc23f27019f0,2024-11-21T09:33:28.207000 CVE-2024-42041,0,0,6e5fc489a47aee8fc7f847c8d077287cc700dc42854f7a1f321948a8aa2086ae,2024-11-01T12:57:03.417000 CVE-2024-42049,0,0,2f2061195cf6b6e353b632fe7686cc3dd9d36632ef0acd4ff2b1ad609a60d0c7,2024-11-21T09:33:28.643000 -CVE-2024-4205,0,0,527be8f58411b762a71d1cc353d746510cafc7f2e232be5a04dc3758db42dd3a,2024-11-21T09:42:23.290000 +CVE-2024-4205,0,1,5d87a277ed1c0d562f07f9d7e4de0162a257cd5765d8b513c1c017e93123e1b8,2024-11-21T09:42:23.290000 CVE-2024-42050,0,0,6003ac0a89c7c840174fb1295d5ef8342ba916cc8f162b75a24b06a6577c836c,2024-11-21T09:33:28.860000 CVE-2024-42051,0,0,2730aae26f99ac5f7900b43db362b44d33bfe3433539fad97e27256323563208,2024-11-21T09:33:29.003000 CVE-2024-42052,0,0,048e7839e9c33ed87c5062dd18363e225f193d67d47be0a2ea415c5adeb1aa64,2024-11-21T09:33:29.153000 @@ -263235,7 +263236,7 @@ CVE-2024-42196,0,0,74165ceca6e8e10016e2eeb4a033a572e7a1426e3140b48f5bdc3f16162b9 CVE-2024-4220,0,0,c10e6b612d929680611c4be467944f24a66f27a0712499a1f349b6953213d81a,2024-11-21T09:42:24.913000 CVE-2024-42218,0,0,3bca921601eaa25faf0015687ed4f595ccacf0ae5ca15099cde7ba2db042877a,2024-08-12T18:27:54.660000 CVE-2024-42219,0,0,a97969401a201997f2184a96905a9ffb0133ef1ebb5bd9c9a8f1fdcbd582f6f4,2024-08-12T18:30:21.627000 -CVE-2024-4222,0,0,404604444d77dc73b57c36b8a95aa3dc38057a1a3ba659619f4989018835c2b9,2024-11-21T09:42:25.043000 +CVE-2024-4222,0,1,621723da9b7d63377c7efd4a0da29d219e60b2675c6f759d6ed9f3e633900466,2024-11-21T09:42:25.043000 CVE-2024-42220,0,0,d3e9a86c5ed2eb1e6b4e3f9ea5afc7f88bbfa6125b0132e25031f187bcda9b65,2024-12-19T17:15:09.243000 CVE-2024-42222,0,0,31d1ecceb29f6dc0a006287b8f36eb69950f688f623593894878e73f68b4744b,2024-11-21T09:33:45.030000 CVE-2024-42223,0,0,bfd3e9b2497c2cd4ce56cfc4b3f7c8c085d8282b329417cd9636c8478537873e,2024-11-21T09:33:45.160000 @@ -263245,7 +263246,7 @@ CVE-2024-42226,0,0,2d5e76969c1f0b438bed45c61874cec36b686b80128dcef7f9f95043b4a13 CVE-2024-42227,0,0,8f8280088a8c0ede77f59a0730412c09092742973c6824d19b85621f8ae00ec6,2024-11-21T09:33:45.603000 CVE-2024-42228,0,0,92788e39cba87c835c9cabe6851309d5340678792b1ac27b66afecf40c40bcaa,2024-11-21T09:33:45.750000 CVE-2024-42229,0,0,c1c650d90eaf3fa2ef9945c918f4dda3a135157b3aee095f9634b361e69f9fd9,2024-11-21T09:33:45.887000 -CVE-2024-4223,0,0,09df394cfe5fc3edaadbaa25e60c201e0d1e3f85b80cab0cef5d1565d5476e9b,2024-11-21T09:42:25.150000 +CVE-2024-4223,0,1,f239d638f1a1fa2f732889bbbc2bfa031f9f5e4bc1f2886895c6fa77c9fcf6d9,2024-11-21T09:42:25.150000 CVE-2024-42230,0,0,af18a5f3770b456af2935d52b15bbcd492e35d3cfa9de0f42d41a4d6820163d6,2024-11-21T09:33:46.033000 CVE-2024-42231,0,0,46d7e508d0762971c3dcb5dad30392c8ef5fbe6250f39349c1d5f7c8bf43d923,2024-11-21T09:33:46.177000 CVE-2024-42232,0,0,4b8ab3cb19ac6cb852312db2d77d9d89e0d1af7971d031fc08f420eb02008759,2024-08-08T15:02:09.750000 @@ -263655,7 +263656,7 @@ CVE-2024-42744,0,0,7f15e5a738af73d1b9f5abd12086a2ae97f6550f32718afa5377ae47fa8d2 CVE-2024-42745,0,0,bc117d04d647600c93d025f10dbe265e193cf052e7b8702db8cb7ea9e1fa73c9,2024-08-13T17:09:44.943000 CVE-2024-42747,0,0,f59067b7b75203646ca7844d3ba5b31935e1284e8d7bf5549828ff26fcbfcc9f,2024-08-13T17:35:04.540000 CVE-2024-42748,0,0,370403275371b17979bf2ffefd3ae6bd2c07e53c5a3ae657cd312f59f958f4fd,2024-08-13T17:08:53.510000 -CVE-2024-4275,0,0,2afb0a76ca67e45538d924e0ec8b74f82a508f2920a83e4e5d50aba22aba4738,2024-11-21T09:42:31.753000 +CVE-2024-4275,0,1,613cfec0861660e550c4ee39dbf50471ed1a101e1e28c22fc5063bd4d69e5483,2024-11-21T09:42:31.753000 CVE-2024-42756,0,0,c297a98c83690879b16b35b554c1718c0679dfdbdea17176babcbd84518f2e5c,2024-08-27T15:35:17.887000 CVE-2024-42757,0,0,6032327ba14ad6a7637331b6efb33482e59f2f43c1433ef362e51680e15d2811,2024-08-20T15:35:25.190000 CVE-2024-42758,0,0,a85749caa27b5e91a3099722c781dc5af033562f8713a324f6d350c0157c0314,2024-08-19T18:35:14.237000 @@ -263670,7 +263671,7 @@ CVE-2024-42766,0,0,c044c7210b5e219477b6218c03358ca12063954210a0fc1a3a8f2f786e990 CVE-2024-42767,0,0,bbae0c107ea9667d73dbf24e0790c03357dd977b73d1ccdc35691dcf595551e1,2024-08-23T16:18:28.547000 CVE-2024-42768,0,0,a84a00478695c2681a62ae1711afba522121806cd033cf89e8238a5746bb54f6,2024-08-23T16:18:28.547000 CVE-2024-42769,0,0,bf510f26e9fa7d660b74b95c3d6a9a1044b421ca5a3beb7a1454abd842b7b9c7,2024-08-23T16:18:28.547000 -CVE-2024-4277,0,0,3c026489564f50f1ed1d9ccc5ee17fadb2d2412aafb655ac7a12f6d298cd2eba,2024-11-21T09:42:31.870000 +CVE-2024-4277,0,1,c516311a5e1824912641e434e80f7e806f67b69cbd53cae6cab54908661cc45b,2024-11-21T09:42:31.870000 CVE-2024-42770,0,0,1378c572aa9f8a605520febb75fbb622bb9319f2fa7c942bed809ce987c3c6b2,2024-08-23T16:18:28.547000 CVE-2024-42771,0,0,15805c51f2ca62b992d3fa7bdd7676e940b2efd4b87aa2ce1b43779d62326fc7,2024-08-23T16:18:28.547000 CVE-2024-42772,0,0,cd685af22569d8eb6eb591c44d18ea5d8af762b0256d3c7de4dffa1d09bbcf6e,2024-08-23T16:18:28.547000 @@ -263692,7 +263693,7 @@ CVE-2024-42786,0,0,85b09a5221a9594253db9b9c3fd2feaef5f83a51f4ec409ed7a5ba9e257e8 CVE-2024-42787,0,0,45f3ed868cc942437c0852e8b40e0543958b0fc69835a95cf364d4a1d605228a,2024-08-26T16:35:12.107000 CVE-2024-42788,0,0,eba477bbf8d922176673502f714569bef804f50992bdb2fc80a6d0ebf1d9500e,2024-08-26T19:35:29.970000 CVE-2024-42789,0,0,c3abb16e8c30602e0f327e18fd3c7a168c3a85d869c1621845f272b05306d65e,2024-08-27T20:35:34.673000 -CVE-2024-4279,0,0,b0cead563f58f796058937df65d461d720cd9c51521b5d47cec43fb62f30d6c5,2024-11-21T09:42:32.043000 +CVE-2024-4279,0,1,3ee031c9aaac21d66b3a854911ccc3c116834aaaad04b75afa6cfbf601156373,2024-11-21T09:42:32.043000 CVE-2024-42790,0,0,539360a9beda973ab08fb912d592087f677c6fb9a6fff6589cd7f5b776b9bd5a,2024-09-05T18:36:04.237000 CVE-2024-42791,0,0,9ffda97a3c4e9d2b1bb65c6c60f82add6cc6a53f4f8ba5cf10604ce57358e9f9,2024-08-26T19:35:30.910000 CVE-2024-42792,0,0,d46d80558cda01ef420339b2588d51cdd59e10dffb1a2c4145461835bf0c2904,2024-09-05T18:35:24.220000 @@ -263820,7 +263821,7 @@ CVE-2024-43052,0,0,f688f09d75ea1280493efd246e06c860b66ffbaf35b8c8d551fb0708ef09b CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000 CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000 CVE-2024-43063,0,0,8753ed6cced2789acaf67947f81e20495a0bebb4d20a1a7648ba9c44702bfc30,2025-01-10T15:37:33.340000 -CVE-2024-43064,0,0,a66b7e3f07db805b059e4fc51b71eff2120fb28826686e53b5baccb1ae81e1f2,2025-01-06T11:15:09.073000 +CVE-2024-43064,0,1,0aea523a6bd9b91e16f1aecfc93269b5617cbfcb3154a05b85ef352f34c2f21b,2025-01-06T11:15:09.073000 CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000 CVE-2024-43077,0,0,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000 CVE-2024-4308,0,0,0e250664b04e28b54467b76d750ca3dcd8282c1064f64a7674928da95814f098,2024-11-21T09:42:35.590000 @@ -263911,9 +263912,9 @@ CVE-2024-43167,0,0,1f0299dd298e58ae7d0320a556b5cc8080d25729e8c4fc9c4051248a2f05c CVE-2024-43168,0,0,a00133049ed1a922ca0a7599f98603d24e2d8039ab92bf6ffa7a406368253241,2024-10-21T12:15:04.327000 CVE-2024-4317,0,0,5b5e9e74799ba1a2d6d19fd0e10c6f6a1617c77f3e3ad0fc8833212ed75eb508,2024-11-21T09:42:36.813000 CVE-2024-43173,0,0,d8d2ac885c1902e546063772016f5d0005860b114ffe9d7489140ac6cd8bfc67,2024-10-25T15:40:19.977000 -CVE-2024-43176,0,0,e634111fb95958c65ab4c650c2bc5f19d4f57284f67064d5081a279583a5a080,2025-01-09T15:15:15.737000 +CVE-2024-43176,0,1,67ef639d68302e5458cf789165bf8b534cafee061131b6437c0c7535ddbce0f4,2025-01-09T15:15:15.737000 CVE-2024-43177,0,0,0d4884cc3bb5ef316ac2268cbd50954452c99cbd34944a23e957f2b36af6ec01,2024-10-25T16:05:15.777000 -CVE-2024-4318,0,0,a12361d5cb010c311b3bf395a08dfcb81ce6f85546e2f7bb87325d1512cf68cc,2024-11-21T09:42:36.927000 +CVE-2024-4318,0,1,0db2ca16a90821eae8b7b8535a1668ac54b91665e1ea3e5a748f4f131a1b3ce0,2024-11-21T09:42:36.927000 CVE-2024-43180,0,0,6670a14096e07d80379b771c9a47c08fb6325e7824dc7bd81cd7b9a209c280c1,2024-09-20T17:28:06.617000 CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216c66,2024-09-29T00:24:49.103000 CVE-2024-43189,0,0,167da65acb79f1d31d6282e0f7371fa322d7e1ea30726b85e9e01b0a45ea77c4,2024-11-18T17:11:56.587000 @@ -263949,7 +263950,7 @@ CVE-2024-43227,0,0,7e0d8104e945a7d04ef027d6dc9ab1f2fe9c8222edf9efdc995f2921aea1f CVE-2024-43229,0,0,71f0d26458fcae845c32f72f14eaaf4b41b1ba28b770a73a2d91eff0f51eaa83,2024-11-01T20:24:53.730000 CVE-2024-4323,0,0,c4d185b04c9fc1f00ecec295c3dfa12499221ffbab0b4f5575bcd80deb66782a,2024-11-21T09:42:37.500000 CVE-2024-43230,0,0,3438c9ccfea127a956b5025f46fc0219f157584c782a74b31fb7851ceb9b96f3,2024-09-18T16:10:30.317000 -CVE-2024-43231,0,0,44c239b38fbd55455653753b3fd25fe2d8d919b27d08f15ee1b05fad9edf9d6b,2024-08-13T12:58:25.437000 +CVE-2024-43231,0,1,9d33b8fa2d5823152425d3e355b780b914ec71b0a0e29a6f62a4050c4ca3258a,2024-08-13T12:58:25.437000 CVE-2024-43232,0,0,52a1852c046c09034701352a38e8ac744730c5fd62b6924733c81dd9ea3e74f7,2024-08-19T18:36:07.297000 CVE-2024-43233,0,0,a3cb80d788fcdefbe82efd5cb7c46f3e83ae874c20df2ef7eb293b519d517ebb,2024-08-13T12:58:25.437000 CVE-2024-43234,0,0,a95bd08f590e3d189096afbaa43b4d3d437b094ea5a086eb51eec8bbe549450f,2024-12-20T13:15:21.197000 @@ -263962,7 +263963,7 @@ CVE-2024-4324,0,0,0867d2dc87ac41925909e9579e3f687280379bde75b7d9508bf2c182bb9292 CVE-2024-43240,0,0,f3755187b1079dddd9aa39a2d6d1353be078e947656c0be39217f4c14918c166,2024-09-06T16:57:58.130000 CVE-2024-43241,0,0,8b7ebfeaa0cfaa5a2780863f1bab1b606ddc09afa140e94cd2bc0f10d4850fd4,2024-08-19T12:59:59.177000 CVE-2024-43242,0,0,5158271e91371a51365371ec1823e76cd71c2739fb8c021ac2fef7a9066b0092,2024-09-06T16:57:46.497000 -CVE-2024-43243,0,0,75182b4823e6ba419cf53f3113ff046e04f7af9dfb5026fddc36109ffb04dc06,2025-01-07T11:15:06.023000 +CVE-2024-43243,0,1,dd95fc86cbc94685566d463be832f0079fe1075075ef43f8030532d38a5d299b,2025-01-07T11:15:06.023000 CVE-2024-43244,0,0,3e98cfb635eda3f4b8988337f238f5959caa7185154536861e79784e7a10cdb6,2024-08-19T12:59:59.177000 CVE-2024-43245,0,0,469b68939f3c87b1a0d6fb606b56eedd74ee37e5416adec04704d1a576f70460,2024-08-19T18:36:07.297000 CVE-2024-43246,0,0,da490659311d5f9529b46dd59c7241bb03b455ff3410df4a5c90861e305cded5,2024-08-19T12:59:59.177000 @@ -264005,7 +264006,7 @@ CVE-2024-43279,0,0,bea980874e12654465fd2968ae87e0ab8a5b348c3e4a761a50e804911b6cd CVE-2024-4328,0,0,6165e405bde6f83a11fa6220da74c8526ad170df1c9d2357e3fed8eecfae713a,2024-11-21T09:42:38.143000 CVE-2024-43280,0,0,792d70a88a88f5b593fd162864acb62122800cd660deb16836607308fda28ac4,2024-08-19T18:36:07.297000 CVE-2024-43281,0,0,4c6bfbeb70a97f7302e329238c13d854e9164bf9ff27f3fd43f589a9a4bfb99f,2024-08-19T18:36:07.297000 -CVE-2024-43282,0,0,5f9c3fc9b63bb4a195dd0da9cd3746cc81675f5943b93842ca5a62577f8ff172,2024-08-19T12:59:59.177000 +CVE-2024-43282,0,1,5cfa3b02a6266b84bd82f7cf9ff1c59a82d636bfe5e3eff7aedb701cf73fe09a,2024-08-19T12:59:59.177000 CVE-2024-43283,0,0,c2fa63f6807a51bde52a738b13a3ab7bd396d9c7d27376a4b1f74c069804fc95,2024-08-26T19:10:18.890000 CVE-2024-43284,0,0,6750e3410b47d0a62cf30e42a256afedf95cbc8eac307ad647642eb181dc62fa,2024-08-19T12:59:59.177000 CVE-2024-43285,0,0,fb373918e776d744404fd70c5a773fba11b22250707469d84d51c3f8bcda5aa0,2024-11-01T20:24:53.730000 @@ -264173,221 +264174,221 @@ CVE-2024-43441,0,0,b2a2fcced7ec802d9c2c415b3561a149a7f16b1a99243a010f30d3e8a4193 CVE-2024-43442,0,0,7cf6887173b63e3e2077127f17ebb1f8864349b85ded2485a70c9170e31ad69f,2024-08-26T16:35:12.860000 CVE-2024-43443,0,0,01387b83c9d3faae4be2489d643851ab28bd718e216da87fe7730786e406c157,2024-08-26T12:47:20.187000 CVE-2024-43444,0,0,01fa601f2d9572951dd3491c52e1bfaeb60836d6e72e0f6dc396e203847ee36c,2024-08-26T12:47:20.187000 -CVE-2024-43447,0,0,b01339b01203c41fff5e5c7adb1303659765f63ed4a6cd4c1b7320ec4f69878f,2024-11-19T20:52:55.763000 -CVE-2024-43449,0,0,5b5b51ca3445d44ded2e8a7f79c3a4d101883d24e2a8152f24cfd52f479bc7ee,2024-11-19T20:49:54.423000 +CVE-2024-43447,0,1,6c93151d376ac359ffdca2fc5153f812dff80de5033a35ed5fe40d85e83462cb,2024-11-19T20:52:55.763000 +CVE-2024-43449,0,1,cd18c4d3a852de18f379b955c117a3195bfde1ab69f553286f279c6be05e0a74,2024-11-19T20:49:54.423000 CVE-2024-4345,0,0,a6702330dfaa23034674ad71761fa3a24c24c5e8135b9de0c2ce234c41a43784,2024-11-21T09:42:40.130000 -CVE-2024-43450,0,0,cf6f1b8ba47c459c47784bf8361adb4b0726eb301091d8f1625e48aa9ebbe0e2,2024-11-19T20:49:26.017000 -CVE-2024-43451,0,0,6db409fbe8d972095ae8700228df5fe211447b09c2d88ddb01b5f0144add4b9a,2024-11-14T15:24:33.317000 -CVE-2024-43452,0,0,d69b16baadcc3150ead9a08abbb215cd8fdfd704bac0672312ab618e1c3b3a6b,2024-11-19T20:48:28.447000 -CVE-2024-43453,0,0,005ff02e3ff00a6b5c97fe1711e6cfb7982cd32d25114786f5122652ef937600,2024-10-22T19:29:44.997000 -CVE-2024-43454,0,0,2bb451c81b9050c5a1a28226272828b693fbc0a33b0e5df196794007e75b8bac,2024-09-13T14:52:28.570000 +CVE-2024-43450,0,1,c48e6409880a75fc94a4b0660ed715379652c47e7205de6b34036e7a92f07ad9,2024-11-19T20:49:26.017000 +CVE-2024-43451,0,1,49bff0434187d6b13c5aa0a3e121a7eda96354089b81f9ff6f0d42e6539a2156,2024-11-14T15:24:33.317000 +CVE-2024-43452,0,1,55d9e1472de215991b1cb71eaed0a02fe8b294e245c4d750a0f45b763b9121cb,2024-11-19T20:48:28.447000 +CVE-2024-43453,0,1,bafb249685501db93916c96a149e524aba0c579276b8b12870360e5941eb14f0,2024-10-22T19:29:44.997000 +CVE-2024-43454,0,1,b7e179fb5bd880682b86ee4b6670b55a22483a7e4288cd9df38d929b4af2d8e9,2024-09-13T14:52:28.570000 CVE-2024-43455,0,0,54b22065ccd28ae34cb9b067b146f151985fa190f05ca849b4cf529d2aa84b32,2024-09-13T14:50:02.390000 CVE-2024-43456,0,0,8c4c3f15c6af8fb171537946e21d630174fd4968dc843c4006ac87e0a6586c11,2024-10-21T21:28:15.323000 -CVE-2024-43457,0,0,a91e8d616989e285031d754ec415aa7a6ca2f123aedde0bf514f2f3dd3077bee,2024-09-17T16:25:03.037000 +CVE-2024-43457,0,1,882bde7ab3c5e2ee6cddb6c58e4933c0f05eed8606282350bc9978ddc064d8f3,2024-09-17T16:25:03.037000 CVE-2024-43458,0,0,956af47892a7ec52a2aa44b25a54d4d0327c2027d5d4d6c347bfa28b031d85e1,2024-09-17T16:24:06.837000 CVE-2024-43459,0,0,b3724036b27970f3aa7286ee0e012f3388aa3fbec6d45c1281f74a2951c4e6bd,2024-11-19T20:43:02.103000 CVE-2024-4346,0,0,dc319b039c9ab7f7d1e7e058763d3038bd371cb32a69de8ff04f25e9b1d5a4cd,2024-11-21T09:42:40.237000 CVE-2024-43460,0,0,f51dacc58d87626a249dd5d51797ab6ee5ee7c084865ca42c18549d641641383,2024-09-25T19:18:53.350000 -CVE-2024-43461,0,0,498886e070f464230011afe508d3ec905f25bfb7cde5eb2f700937785d4c991f,2024-09-17T11:17:22.597000 +CVE-2024-43461,0,1,ea1e13b28a5f8228059201148bc93cbc7a492a4d69bfb684c5a260d5fe9fc152,2024-09-17T11:17:22.597000 CVE-2024-43462,0,0,7fe137a3d64c2e74e504a0ca953b3385733d30943d37896256e36d40fbdb8628,2024-11-19T20:18:42.467000 CVE-2024-43463,0,0,2bd70214f83512a1e7b07ca4d40d4d98b1f92fd0560ea9b390bbb4b02db5f554,2024-09-17T16:08:58.350000 -CVE-2024-43464,0,0,e956921e38a84a5c847604fa2532b070d138ac8d4fc0f351cd86758d02e2c8b4,2024-09-13T14:48:05.247000 -CVE-2024-43465,0,0,7808daced93a4dc9e48f54bc21a107f7720867797c08a9472cd1dfd3709b11cd,2024-09-13T14:46:33.210000 +CVE-2024-43464,0,1,36b19d629db8c5def882652abf25286876849b1ae1273d9b3921c891eb56ddc0,2024-09-13T14:48:05.247000 +CVE-2024-43465,0,1,17d25d2cab5a80ca3a9b84e08ed815e5fbaf084eafaf9a98c2b056d8ba7e7bd2,2024-09-13T14:46:33.210000 CVE-2024-43466,0,0,4cbdd61898a1c0b3e67cf9a45330a014b585d18f3adbf14ff0b7e80d8da36454,2024-09-13T14:44:16.013000 -CVE-2024-43467,0,0,c1cb9837db2f61a7bbf7764ff56110657012205375047365cd0573b499e44886,2024-09-17T16:06:44.170000 +CVE-2024-43467,0,1,9aa980dabf5ff7f63c94f99609ee6191a1a3331eec8919101fa103731ecb98b0,2024-09-17T16:06:44.170000 CVE-2024-43468,0,0,4e2470d64435366aff0a61a5e68dc714e88ea3bc645d716962363d97f2857528,2025-01-10T15:07:46.353000 -CVE-2024-43469,0,0,75247ad0690e3ea6ea0a08b9d64faf2b2e5451a936ce8666801ac78b9855e921,2024-09-17T16:05:54.650000 +CVE-2024-43469,0,1,cca0ff4bc244751dcc555ad2ebd82a6f1dc1e2786bcc6d709de3792d523ecd87,2024-09-17T16:05:54.650000 CVE-2024-4347,0,0,914a1499327477b8f0d5c50c90bea6d9fba28df27349659abefe40d9866051aa,2024-11-21T09:42:40.347000 -CVE-2024-43470,0,0,9a76034ad627badcc26378fb10d49799f03d939aface9e6b118044400f64ff6e,2024-09-17T17:35:02.157000 +CVE-2024-43470,0,1,ba8b9d4c0318b105089adc28307cb70d4dfa144ac71526fd133c8263102f3f23,2024-09-17T17:35:02.157000 CVE-2024-43472,0,0,f8e3c9d6561ac8ce5ee6caae48e1fe73371e9553c9d00583bd608487f652ca9e,2024-08-28T19:13:21.393000 CVE-2024-43474,0,0,34d0a8030540bbfd63b455373b872bb8de8f8337d541fdec541bcbb4c7793dfc,2025-01-07T15:19:09.057000 -CVE-2024-43475,0,0,642843020638a34a7bc3bf72ec4bd21d750594153b5913cff49eb86ee294c022,2024-09-13T14:42:52.533000 +CVE-2024-43475,0,1,2d33677ace577039cbd96da19d3adf454164cf2978024d3721e0391b3fc51c0e,2024-09-13T14:42:52.533000 CVE-2024-43476,0,0,c09b8c55c9964dc9f155766a737473ad6c5f443b790981f8712ada0463e6fd6d,2024-09-13T14:39:20.693000 CVE-2024-43477,0,0,e6cc806f74b6683e07d5bd22159ff78489c4915a4a56167b18f8893a367f7d01,2024-09-10T18:15:13.970000 -CVE-2024-43479,0,0,461a865bb1ad77a87ff4b7b651e1e40b823910c4f951f8c8f95b350fc08786c0,2024-09-13T14:38:13.873000 +CVE-2024-43479,0,1,9fe2e8162ef04bb8ee5c87722775aab03fe924b310a0a05d7fec2799f41ca41f,2024-09-13T14:38:13.873000 CVE-2024-4348,0,0,b2bc52a40c1a3e0511f7a3278ad325bd75bb66c9f6badaf942d1b5905271a09a,2024-11-21T09:42:40.453000 CVE-2024-43480,0,0,2b8c7026769acc492cb135f3a902f5b8efd2fdfa0fc93d7a520b9c444afc664e,2024-10-17T21:14:20.777000 CVE-2024-43481,0,0,d15cfdba06a15c9666080e0bd42adbcd2af12dfa448c0c50a4e9ceaa264f4d30,2024-10-16T21:34:19.840000 -CVE-2024-43482,0,0,dc6f78aa04009afd8f0ec0e5aa621b6516c65972c0486d3f4b80aaeda37c9c91,2024-09-18T14:11:50.303000 -CVE-2024-43483,0,0,ef48f31ce07cff561611be9da1b6d64005fcabb45136e7fa951606dd18c65a42,2024-10-21T17:35:34.827000 -CVE-2024-43484,0,0,283db6dde5cc14af244b2c3fb4537ac8395172db7af932d0146e2150f783b5f2,2024-10-21T17:35:44.460000 +CVE-2024-43482,0,1,89903c68b36e49a6091c3e7a5777c860656178e35e49a4d00a3feccbed7e71eb,2024-09-18T14:11:50.303000 +CVE-2024-43483,0,1,5894fab1cc031d8ea06b78ea45889e81fae431abd9aa278d2ff49e57fe811037,2024-10-21T17:35:34.827000 +CVE-2024-43484,0,1,39a653762326643169601b95e3e894f19f4fa90fbcba8636a1563048542fd009,2024-10-21T17:35:44.460000 CVE-2024-43485,0,0,d337f08e2ac97c6c2247123acf322480c683dcae8b32e15558c2a5b46a074c53,2024-10-21T18:01:28.623000 -CVE-2024-43487,0,0,0543718afffa0963cb62b8af0a6eaf8fa0e563a468d9b30afec4a8ea7c1caf40,2024-09-18T14:10:20.320000 +CVE-2024-43487,0,1,a9a7f267c4a773e9412c8796bdc2a9677324c51e1b310739b73411f6cc12c2a7,2024-09-18T14:10:20.320000 CVE-2024-43488,0,0,b22dc2eda805ba4c390a3bcdecf7b116f03391446b1f75ee5351fa05c368a1fb,2024-10-21T21:05:53.340000 CVE-2024-43489,0,0,ecc866fa9e573f76a06f4b7981dc32d143a4e2ae7308bd5ccffc591823ff5051,2024-09-23T17:33:25.633000 CVE-2024-4349,0,0,1837953008ba57900daad77b856fb45e07cd6d91723c390c1e74fe77d1f76017,2024-11-21T09:42:40.587000 -CVE-2024-43491,0,0,b297047fe702503b078a327624ca5612c7e15ef5c59ef6fb61d0f1e48e5d91ec,2024-09-26T01:00:01.267000 -CVE-2024-43492,0,0,0ec1cb88f413871b31ef64cf3ecebf84e5c221932d10377f6835a64f2595f77f,2024-09-18T13:57:22.880000 -CVE-2024-43495,0,0,ee0b1dfdd641a0b638a0caa0670924267220833ceff173439fe8966d569afc50,2024-09-18T13:55:07.100000 +CVE-2024-43491,0,1,aed4c180769a10fbd61a5c5efe923762db187c6c6d16ef104ed1372d3a1877d8,2024-09-26T01:00:01.267000 +CVE-2024-43492,0,1,b183348d15b3a1ec22fed9fd161de7368e734660bba23b6836b42eab1e3467f6,2024-09-18T13:57:22.880000 +CVE-2024-43495,0,1,bc2f3bb7d54a3447e8bfc2d50ee3d646add91678321a163f5119e44603f926cc,2024-09-18T13:55:07.100000 CVE-2024-43496,0,0,0242182724a163d34b64c27570d48e74fec7fa3a5f31ed50af5812f9b730b757,2024-09-23T17:32:54.663000 CVE-2024-43497,0,0,4bdb08b5512720098aa53f39c82776e46a94d92f13bb4d00fa631640bfc3bf61,2024-10-17T21:15:30.827000 CVE-2024-43498,0,0,6823453d1785ee41df601df301c6e3cbcce61135bd27efcd9a921959505dcc3f,2024-11-19T20:01:04.877000 CVE-2024-43499,0,0,617c6fff156980c452bf6c4c76a89367a4c75ee7ac3fdaf302e79bd6407a3cbe,2024-11-19T19:59:24.387000 CVE-2024-4350,0,0,0ad31aad7d22cd728edc1e8327fa0c37f0d9e5f2114e3890806b3b638b4bd639,2024-08-30T18:18:37.130000 -CVE-2024-43500,0,0,566601645cfa50b84f1cc35c5cae5f49480c6c907d19d35966aa93bcf6b4611c,2024-10-17T21:01:08.067000 -CVE-2024-43501,0,0,6a06ebc987c11741ce0f3785179189911db3949d529812b24bc4194a3f3dc6ab,2024-10-17T21:06:07.377000 -CVE-2024-43502,0,0,a452677a054989760efcdae4bdc45908322b3ee36f8ddeecaffcb1fdcbbea7c7,2024-10-17T20:58:37.107000 +CVE-2024-43500,0,1,5e4bf5d707a97d7bfb742090bc769e9ddd0238eb88135f00a956546aaa90a719,2024-10-17T21:01:08.067000 +CVE-2024-43501,0,1,98f378daa7e7080e336d485a2f2ce640128c09b69b8e9cd5a55d4c6b948536cb,2024-10-17T21:06:07.377000 +CVE-2024-43502,0,1,a031736eda864dd857ef3d2503e2b864fcbd3df5434b6415a6233eaac1b922e7,2024-10-17T20:58:37.107000 CVE-2024-43503,0,0,fd66b83af0c76f028fa1282b323ba98aad797dd06829d47be0287dba78cdcc12,2024-10-17T20:19:17.793000 CVE-2024-43504,0,0,c83cd45b7e63fbecf8fa3e8a53fdbf2dd6c41e200a75d5e4b70b429db2b57454,2024-10-21T21:26:41.257000 CVE-2024-43505,0,0,fbc495ccd681183727f4b91b42933ffca66b81f95ea6fbca03decf5858a953ac,2024-10-17T18:16:50.360000 -CVE-2024-43506,0,0,91ef581b5f0d21d120ae01c4e7ccb3d8a80b9915ed2365bfe66ea7b5cf7384b3,2024-10-17T20:19:06.707000 -CVE-2024-43508,0,0,ac8ee7590ec0e0d8e34265f4164a769eb0eadb9cf379b76538bfd4847a487435,2024-10-17T20:18:55.517000 -CVE-2024-43509,0,0,10e93c8d7ae6cc8b0648b86045d0d159eaae8d954b07d5e9b3b506ff6c59dbae,2024-10-17T20:18:45.110000 -CVE-2024-4351,0,0,fb7e0c21da8e5b7f16919a0fe341d62f2eb1c907ae3a2159419533ae79df38e8,2024-11-21T09:42:40.787000 -CVE-2024-43511,0,0,73b24b7262101887ec44b45df33bba14899e3fb047025aa3b6f7ce3790062632,2024-10-17T20:18:33.103000 +CVE-2024-43506,0,1,45e1aa7a5af247b48caa79f629a2010ec598f373d403a748bed4408ee40110db,2024-10-17T20:19:06.707000 +CVE-2024-43508,0,1,a77c25e762e31f58a51af309fe2eb70916818bf667fb797bfc3c41d004f5379c,2024-10-17T20:18:55.517000 +CVE-2024-43509,0,1,703195e160708b0af67d5eb5c68e4b7879b746ecc041a0a43b6cf90a9f374ee3,2024-10-17T20:18:45.110000 +CVE-2024-4351,0,1,6bba0bfc4309b9eec326268b3f638e7988fc4402fd55650f05589acc6566222e,2024-11-21T09:42:40.787000 +CVE-2024-43511,0,1,3d02287c565a2090ab3ee7dfcfc8ca8fde9d5b425335519be8be2c2f020e26c2,2024-10-17T20:18:33.103000 CVE-2024-43512,0,0,3da4373663b1df4b93eb953bfd44dceb6bc6c04d436c2e21a62fdd92bdb06269,2024-10-17T20:05:03.257000 -CVE-2024-43513,0,0,27fea55052b8996f6838b3406cd27505020bcb1510bac8fb71b81a0254c06d3e,2024-10-17T20:04:08.917000 -CVE-2024-43514,0,0,cfc62cdef02a969c2a1e60d7e9cf59275f18c4b510660bdc1191f9e41fbfb947,2024-10-17T20:03:44.790000 -CVE-2024-43515,0,0,0d2b96239f869c79bb5d3dfdcbb3ae11c9744c1b452a992a7a0982bf624d88db,2024-10-17T20:02:28.623000 -CVE-2024-43516,0,0,333c0f80cd1c07ffb47842b0b2c96e39365e1162f896a0e6da286abcbf6c0950,2024-10-17T20:03:34.733000 -CVE-2024-43517,0,0,89edbe3e413d0e4b5779dbb5ffcd10cb4af8920194477f2ac1310eca3c15c7d6,2024-10-17T20:02:38.190000 -CVE-2024-43518,0,0,de1579e08505aa99b2d551da158ddf356dfe08aef166b7989141b203510f07b0,2024-10-17T18:55:19.963000 -CVE-2024-43519,0,0,4ae65e8a35abbcd7ac3fe6dc819889986071996dd94bece3b4a380015264fb3a,2024-10-17T18:53:48.217000 -CVE-2024-4352,0,0,d2e9604f5ddeb42454d62bd172fa975bbefe97fedc336cfb53c7a1624d5124fe,2024-11-21T09:42:40.890000 -CVE-2024-43520,0,0,a899444f650655d6634f79f8813521848bb1479b4acba4d1701acdf3b00f879f,2024-10-17T18:40:06.807000 -CVE-2024-43521,0,0,c54eb17f74f2306e280989068ad908caf46666606fd7a3fb5cc13ae5a3b790f5,2024-10-17T18:39:36.567000 -CVE-2024-43522,0,0,d26ca0c697a6bff24abf8e2464b05353a5149907d5a2520fd5125a1b0de36871,2024-10-17T18:38:51.557000 -CVE-2024-43523,0,0,accfb43e285728d227a327239af3f423fd2f81dac3b748e3a5e6bee1729ac783,2024-10-17T19:56:22.613000 -CVE-2024-43524,0,0,af4b380f62ecfa89d1ea92ac2572163d48bb729cd71eb78373a095d0100cad53,2024-10-17T19:55:58.963000 -CVE-2024-43525,0,0,cd769211386ec488d6d4ab998dc1594b73821252fc05075e91910b24c060f0c7,2024-10-17T18:37:25.370000 -CVE-2024-43526,0,0,dd05c6fc91cfee833105de01208e8b3351fac783654f67903b7bd0d90b047649,2024-10-17T18:36:17.460000 -CVE-2024-43527,0,0,e4a41226f3be416486ce0b053b75ea6eba851be7c17def3bbccbbe7f6be36f2d,2024-10-17T18:18:08.877000 -CVE-2024-43528,0,0,31672c0ce7cf414c685713b45853690ae5a69e47b8ed8cbadb523a9fc4c4817a,2024-10-16T21:47:05.543000 -CVE-2024-43529,0,0,c09e3100aafe5af8120f248585d1072a09c656a9f86c8f7dc9d47c5e91d48aaf,2024-10-16T21:48:07.683000 +CVE-2024-43513,0,1,85d727739869a2bea118e595d3a2591683d726d4eca3032eb3cdf0e3b9801662,2024-10-17T20:04:08.917000 +CVE-2024-43514,0,1,6d3584ce48046cf1ca69272b554bbf2f2be86927853b324184182ae42b2f42cb,2024-10-17T20:03:44.790000 +CVE-2024-43515,0,1,6a6f3c2bd4a779ca88ca3f8017ae311fa5c644d1f644fe19503fe0194b15a91e,2024-10-17T20:02:28.623000 +CVE-2024-43516,0,1,b62aabdf0fe3608c30853a86f006be8102f5b8fbf2de64f43d98287888478627,2024-10-17T20:03:34.733000 +CVE-2024-43517,0,1,ecc65d1061c4f22d357ff2d5f7a6705cb4146c9e1a752d049f225bc17223774f,2024-10-17T20:02:38.190000 +CVE-2024-43518,0,1,cc1707e95b4d237623dda37ffee1c9e370d180d0495706cfb38c4ca5b144a770,2024-10-17T18:55:19.963000 +CVE-2024-43519,0,1,143112ac05413bbf67cb50fe3ba31003c83c3b52bcbb854339ddab82189ba147,2024-10-17T18:53:48.217000 +CVE-2024-4352,0,1,ac5f6dc43b198c5fee8cc8e341f3b60cd827a60ac0c692b8ce3fa549be20b825,2024-11-21T09:42:40.890000 +CVE-2024-43520,0,1,14b3af449d0c342f092cf50dd0fdd884cfb273b720481f68d000f760a7774e89,2024-10-17T18:40:06.807000 +CVE-2024-43521,0,1,564a8df8e16b7da61336c004a84f8fd16312654196c6af9960132b9d00e07eb4,2024-10-17T18:39:36.567000 +CVE-2024-43522,0,1,683cafc7380bcfabc8111b404163e9cd8b46387f5818df74494622da78f6695b,2024-10-17T18:38:51.557000 +CVE-2024-43523,0,1,ce5a1615debe99c58a56ddc6a4e739a2121cd9c3655f3854af61d281b64138a3,2024-10-17T19:56:22.613000 +CVE-2024-43524,0,1,1e6e23021cc2a015f36ddae2c04a7fdb2f3f53e085da51c288fddec05e0029b0,2024-10-17T19:55:58.963000 +CVE-2024-43525,0,1,a9f3ae5f754b11e574f9d9db1f3554a449327529dd68537817148b730c756871,2024-10-17T18:37:25.370000 +CVE-2024-43526,0,1,d54f8d3df06e63578ea31a5b5f5a0499f3e25359a79ddf071f80ea9020ddf003,2024-10-17T18:36:17.460000 +CVE-2024-43527,0,1,cf43baa77e520ba66e08c4469fab788ecc2cd5afada491e82545c4ff70097831,2024-10-17T18:18:08.877000 +CVE-2024-43528,0,1,3b7ddee05c3362a1c6c17e49a12b4a951ee30686e6e392e28452d63584be2ccd,2024-10-16T21:47:05.543000 +CVE-2024-43529,0,1,31731c35d1f6f78789cb51bf5d48475173d7e19ca743804ee36963b47e9d807a,2024-10-16T21:48:07.683000 CVE-2024-4353,0,0,b5340d839919aa23c3d0c2526a7112ce3f0b7f2316cd4631ccb03ed28b08ea5b,2024-12-16T19:08:05.467000 -CVE-2024-43530,0,0,97353888e462a51c4450e4f3963f12ece6626233e43e1271489de7a7657ac318,2024-11-19T03:52:28.357000 -CVE-2024-43532,0,0,d45af3a9dfba6266b5090ae2769c80c0058f1404cc0392fecc8aa16d3f5946b9,2024-10-16T21:51:34.370000 -CVE-2024-43533,0,0,aac068d1ea4207e0d22b1a8e8df15b188df416abecc44c9a5a5fff6b7d441226,2024-10-16T21:48:30.067000 -CVE-2024-43534,0,0,7049425c61d206be8eb864da8e915127c5b9926c5cc12d8736d74019dfb795b0,2024-10-16T21:49:06.767000 -CVE-2024-43535,0,0,5cd647e1c63fda818f4c2cbb92055f574d4156435731fbf8e1f63f07bef60b67,2024-10-16T21:50:04.210000 -CVE-2024-43536,0,0,31a86be75cff5699ccf08476401e2c8aae731096773360ec82ca6c40cf328969,2024-10-16T21:50:39.247000 -CVE-2024-43537,0,0,844debae4c31241b59694bc849c69496b717cbb627db17812adf7b91f933de57,2024-10-16T21:51:05.800000 -CVE-2024-43538,0,0,b052b6b61d97e06939487ef2ae1c735038e3decc670c2995e00dad65814bb8cd,2024-10-17T18:33:52.197000 +CVE-2024-43530,0,1,35f67c50080a3f5ab2620813a784f901c8c482b8af17231e86829e6b0457ad79,2024-11-19T03:52:28.357000 +CVE-2024-43532,0,1,140eee66da6b8d85edd0f2673901f2a7c7e0bdac0ab41cbb82dcfca2e573c283,2024-10-16T21:51:34.370000 +CVE-2024-43533,0,1,14fdffec7e07d6529aba3d90037ad8500f7888787d7e8b9da221ae33348dc78d,2024-10-16T21:48:30.067000 +CVE-2024-43534,0,1,bb3249f9838f71e61c40a2596410c765f00d550cedab2d06e62ce6c4d675c604,2024-10-16T21:49:06.767000 +CVE-2024-43535,0,1,f1c53a08eba0aba48860b3c69a9f6d6a4076c3d7ce63cd9dabcd8695f7436d8e,2024-10-16T21:50:04.210000 +CVE-2024-43536,0,1,fc50c46386d89f5de9db1158749847c44f355e7c2ae6c00a32c92b10d521718b,2024-10-16T21:50:39.247000 +CVE-2024-43537,0,1,6df2266703a8505d2e3c55356a3f77acded9111da71acc90b0f3bdd52a255ed4,2024-10-16T21:51:05.800000 +CVE-2024-43538,0,1,0580565b912839d8d799038b9302d676553c406efdca7d48ba5324edb7869785,2024-10-17T18:33:52.197000 CVE-2024-4354,0,0,18c5858ffa8c470db895c7345981d954c644d464173ed9c372744afd6a8e35a2,2024-11-21T09:42:41.117000 -CVE-2024-43540,0,0,d3c11ef0e0f700b8e1b242d18a9ef40754943870317bd121393c22fb05c45e0b,2024-10-17T18:25:27.963000 -CVE-2024-43541,0,0,15da949aed43415573ce8c04da6201e14d9a067b0e08e5f39652fe3dfbb0cb48,2024-10-17T17:50:26.427000 -CVE-2024-43542,0,0,67cd21f1a818de59af3fc54e1c0956f98f3935645a0bfc111b34660d28b3ca03,2024-10-17T17:40:01.607000 -CVE-2024-43543,0,0,7a56406de20d0b9703ded25737e95b5fe33ce0cd48bf182bd06712c7fb2af8f4,2024-10-17T17:23:26.507000 -CVE-2024-43544,0,0,98221d4658bc658767ebc8c4210e83326f5b9efcbd8e4354f2759b7e9a28efce,2024-10-17T17:16:51.173000 -CVE-2024-43545,0,0,85f6e69a97474d926fd43c6671018cfe3e68239af52ff8ed848e3859c31cf303,2024-10-17T19:55:41.200000 -CVE-2024-43546,0,0,76fe80d8623c907e971d924fcfffc0c3bd2f17f3c666a8463eae0e98b034527c,2024-10-17T19:54:46.583000 +CVE-2024-43540,0,1,f174fc4a5b6eaea02e1995509bfc4640b8fd202faf04dff249d7a7bc16d0e2de,2024-10-17T18:25:27.963000 +CVE-2024-43541,0,1,790c0a5ee8d30e23bc5baaba078edd230855d5bd7c7004864c4d8169ddb9e199,2024-10-17T17:50:26.427000 +CVE-2024-43542,0,1,27f1227613ddcd0dce8edc0cb484eb6ae4bbcdb123f4c5a72e0a2424d8175025,2024-10-17T17:40:01.607000 +CVE-2024-43543,0,1,89319c54dcfc0bdaac35c550c47db1b127522ae6d628077c40fd2fac6822e407,2024-10-17T17:23:26.507000 +CVE-2024-43544,0,1,4bb811fe630c5a73a346448a9dd37d87be71c3c237b3647e6a093ae2aad8676f,2024-10-17T17:16:51.173000 +CVE-2024-43545,0,1,db14518abe658e28c627909d3dcb8ab5edbc63f143d0900d5c26277b3969eec1,2024-10-17T19:55:41.200000 +CVE-2024-43546,0,1,408fe9104945cac08ba10a95ffa73cffe86a0114097bbd181adba284eea1599a,2024-10-17T19:54:46.583000 CVE-2024-43547,0,0,f6e5b246056e89a9645f87395e3aefd3d26a245e130d9a0167abd7061cd7a180,2024-10-17T19:53:47.350000 -CVE-2024-43549,0,0,1ad9c856da7fac65dfdbca507628c5efb8c52bcd21ce3ce38b3a091280c19651,2024-10-17T19:51:04.483000 +CVE-2024-43549,0,1,a69ca2b5cad6a6c672d3108b5198dc572ddd3d9599dcd2a71bb774ffa0da9714,2024-10-17T19:51:04.483000 CVE-2024-4355,0,0,53983ba2df68620ce9baad17e85d5fb39db2effe764118757e88fcae456019d5,2024-11-21T09:42:41.240000 -CVE-2024-43550,0,0,57556cf58f97c6dce914af2b8867f4205a346b4be2f5cb72b8dcad2f4a849964,2024-10-17T19:49:48.423000 -CVE-2024-43551,0,0,2bae9709d7d36b1d7d129db90b49ea4527cba6dbacf9a8935e28e24ca00cd389,2024-10-17T19:48:47.157000 -CVE-2024-43552,0,0,70cbbeee17b28d4618bc2e8702159990b899f058c338aec2b747502abf4f6cac,2024-10-17T19:47:52.227000 +CVE-2024-43550,0,1,c3b9f9888ac8caaf7b9e2fac22f8a190c96b2941c7544641ae94e2aeaaeded60,2024-10-17T19:49:48.423000 +CVE-2024-43551,0,1,905aff19d56bcc23835dc8db93b5be8b799f57e5c5deacf6f574e80d8bcaf115,2024-10-17T19:48:47.157000 +CVE-2024-43552,0,1,b2c28ad5c0524d28b02b7fe30db0651bda9e2f65326ef94d0bf41728cdd71664,2024-10-17T19:47:52.227000 CVE-2024-43553,0,0,4a0cb027a3cb0a083c50645c1863384b895493c92f2aad485a480c7a517ed1a6,2024-10-17T19:47:19.113000 -CVE-2024-43554,0,0,3b3af87b80107093417882feb5b84c4aea8db6504a99307e03cdd6048ecd789a,2024-10-17T19:42:24.797000 -CVE-2024-43555,0,0,39f4c4b4faa69c1b4e9345505d5b3ff283c2bb3617bbfe7cba9e4fae1314cd5d,2024-10-17T19:41:24.990000 -CVE-2024-43556,0,0,abb9c792372a048b083cda389901b52c7b55f226ea479e3022c5ac95a5f61e4a,2024-10-17T19:40:11.860000 -CVE-2024-43557,0,0,168c791af2e06b4e59f5ff11b4cfb7e115398ecfe5bf5337f18ba91f75c8bc53,2024-10-17T13:31:54.217000 -CVE-2024-43558,0,0,4bc4ef04ce2b70f2cf14534631508f871b76aaeac6ca682189239e3470fb21a1,2024-10-17T13:31:55.977000 -CVE-2024-43559,0,0,0a1a644c743c8796b2a4ca302bd633ebc52afa4c2cf86f3f5bb079564df76595,2024-10-17T13:31:57.833000 +CVE-2024-43554,0,1,185e45e0ff4c07b9424806d05a37f9919801cbe154a1f775394b93eb91c4f4d5,2024-10-17T19:42:24.797000 +CVE-2024-43555,0,1,1f0853a1b95e042676bb760a83288b52dc52c467ac5eca012944b2b6502e05e4,2024-10-17T19:41:24.990000 +CVE-2024-43556,0,1,e66319c8ebbad9e0568934655ee3b7ae4f24fec74acca7d31d9e9046a0a7ca71,2024-10-17T19:40:11.860000 +CVE-2024-43557,0,1,f022e2312608efcee784619126b4c1729ea4e74bc6134b726403dc7220f51a3f,2024-10-17T13:31:54.217000 +CVE-2024-43558,0,1,be37a04e3e8d328890abfc8e5230d5fbc87ea71057cbce8516b8f08cf6cebcb7,2024-10-17T13:31:55.977000 +CVE-2024-43559,0,1,8b8e312203229fb2333016e135ee6ab3ef894fdd9ee85796fb304104b9d7485d,2024-10-17T13:31:57.833000 CVE-2024-4356,0,0,254002ab23696265c55ddbe3a9599b956df11c66cfc5167717ec80f6efa35c46,2024-11-21T09:42:41.373000 -CVE-2024-43560,0,0,28dee03e290d85eda2ce67c3212700a98ddb167264945bf2d6223e2666e0e6fc,2024-10-17T19:32:35.307000 -CVE-2024-43561,0,0,f17775eef11b4cf649a95fc692d5d1cbbcf5aeff3fb5b5e17bcb1858677d76bf,2024-10-17T19:04:13.587000 -CVE-2024-43562,0,0,d6123b173f9162cd9f72223328a0bda9144e89cd95022edabe4e459e3ab3c17f,2024-10-17T19:02:40.563000 -CVE-2024-43563,0,0,ff9cc4af9fcf0187567335d459c6581c37991bafdbc02656510a5888371b7aa2,2024-10-17T19:01:21.967000 -CVE-2024-43564,0,0,7a1a531f46420888e707a765f46fbd6065d69f1b39581c4728dda422cb70f37d,2024-10-17T19:00:23.577000 -CVE-2024-43565,0,0,d1c1dd6b24c2bbee8bdf82a69bef7fdb865e094a3f6b80ccfa338a56984cd130,2024-10-17T18:59:41.177000 +CVE-2024-43560,0,1,756747c9bbed6be829a50031ef65ecc707fbeef2e2ab35cf5530db3b4b9fd01d,2024-10-17T19:32:35.307000 +CVE-2024-43561,0,1,79e693734918728ccc9a5b7e951ec367f31f9e655df8163b5f97ef09ab510624,2024-10-17T19:04:13.587000 +CVE-2024-43562,0,1,76a9bd26fb6401a534cca517cb9ae58a093debc114f48e70ffbc23632148c0e3,2024-10-17T19:02:40.563000 +CVE-2024-43563,0,1,8aa34496a67725a40a6ef0ee38e3524153e1a88ab3ba481fa9456a55c77e1d20,2024-10-17T19:01:21.967000 +CVE-2024-43564,0,1,ce2169c0cd5849833d3bc1025d1096322c39a549050d4963e08f44d5a10ec619,2024-10-17T19:00:23.577000 +CVE-2024-43565,0,1,5eae782ca04bb81bde4fa6ad9dc0b591312be7ea54333cc8bcc462e09270216a,2024-10-17T18:59:41.177000 CVE-2024-43566,0,0,706f7bb3755d8c31033f9ee3165e2d501c2a0d69a3cac02877b5829b2d944a41,2024-10-18T16:49:47.340000 -CVE-2024-43567,0,0,ee28be1d10237e14edb442c0108dbabc7e288a51cfc4ee8a3d6e00ae5c53563b,2024-10-17T18:29:15.913000 +CVE-2024-43567,0,1,0826caf004afbbe883f59cd7499da6d2dce68be1426e7da70d2a82b2ac695f8c,2024-10-17T18:29:15.913000 CVE-2024-4357,0,0,e4cc98e5d16fecf81076a485a3e0ef30046d4abc66ac52a5860778fd6f03af1e,2024-11-21T09:42:41.480000 CVE-2024-43570,0,0,26ecef3e5b0cb6981f75600d9e4ee9e551a0992c8c8ae719cb4114f7aef0b066,2024-10-16T21:53:41.207000 CVE-2024-43571,0,0,fbc457e06743c7f03409ab222959c88835b5f5fd03f6b0ecd901a8e593bcec66,2024-10-16T21:53:47.887000 -CVE-2024-43572,0,0,55d0f086a7a8c2e690d05d3f69e365ca3205eeb3e6b982660afde6c106cb9541,2024-10-25T18:17:28.223000 +CVE-2024-43572,0,1,b53b07ee0ed22cb0630559e2fdeca02c92a59252eed4be7581154e05a6a8099d,2024-10-25T18:17:28.223000 CVE-2024-43573,0,0,ee49e709e695f77239a94a3a0e4087b726fb4bad2ae8d351b3c5083ef3073aa2,2024-10-25T18:17:35.217000 -CVE-2024-43574,0,0,b662ed90c3a35ede4ed2374ef29681dd4c1e072b3761f2224f3f3dce9c6e9035,2024-10-17T18:58:37.100000 -CVE-2024-43575,0,0,60c3e9995ec678490b587ee560de28a179546f8d9e870a9ab0dd969c53bba224,2024-10-16T21:53:59.407000 +CVE-2024-43574,0,1,6e627ec1d139e6cc6706d9ab5ed97a726260b89e791055045912190d1a5ebf50,2024-10-17T18:58:37.100000 +CVE-2024-43575,0,1,88b9975343bba435c6108a42115e5e1d0b56514426571729e1c10a5ecc97baa6,2024-10-16T21:53:59.407000 CVE-2024-43576,0,0,226ed8f442f81adac9fde327d8e05ef6b12943509a4e7657f1f66a4231834666,2024-10-16T21:54:24.047000 CVE-2024-43577,0,0,efd0b7f12f1a1e0a2dc8940b892f4cdee42da314932618cf607507c408e2efe1,2025-01-07T17:14:49.983000 CVE-2024-43578,0,0,68de9c2fcd1167d879fdbd4c652aac964c08875cc8742eafc4500af2fb1b4aca,2024-10-18T16:59:29.557000 CVE-2024-43579,0,0,2ce859cd52dc4a97ac81cddf07dd72a9a5c901d7a0d24c1dba0fa40bea4cdd93,2024-10-18T16:54:06.810000 CVE-2024-4358,0,0,d375da0ccda66b536e55f5f5f94ec71dcf0db33fbb63706af62a0cde4ce8d5a2,2024-11-21T09:42:41.593000 CVE-2024-43580,0,0,578dcd1b350b9fd81334110f26d5d064d5661f87134eea1071e0f880d33affe0,2024-10-18T16:49:06 -CVE-2024-43581,0,0,53e723cd36ca94380d9a266ffe5c0c585597d8e53099dfe3880019506d280c56,2024-10-16T21:54:44.573000 -CVE-2024-43582,0,0,1fa32536a02dd051541af52f298c1866a0bc95cc534c6669697fd0359b801dc8,2024-10-16T21:35:49.927000 -CVE-2024-43583,0,0,f4b4aba9b30ffe87b2c6e42c4c75b66a4e03481d26df9684d387b3e805f10044,2024-10-16T21:36:59.847000 +CVE-2024-43581,0,1,e471bdd15e05b3241201f54b0718a529108553b0288a0e4866f06e32c21e9156,2024-10-16T21:54:44.573000 +CVE-2024-43582,0,1,3f04436d6ed862645c77171eec9a4a02b53fbb787665d30bb278de96210d8406,2024-10-16T21:35:49.927000 +CVE-2024-43583,0,1,16ba737dbf3f07f3d1e9cff3315798a7a207440f5aa788061aef7c3680c9d6e8,2024-10-16T21:36:59.847000 CVE-2024-43584,0,0,48e627cfea6a9647e06f5895df87f7de5808f3364c6c538ecf02965881aa5325,2024-10-16T21:38:33.867000 -CVE-2024-43585,0,0,abb358e19455f7e715fa07d11f064f5897658545f27c7ebbd3d9c4d861590896,2024-10-16T21:38:57.467000 +CVE-2024-43585,0,1,d5b51daae74e528bee5e49484ec714a235a78329b8dc0a81e0003a06ed04afc6,2024-10-16T21:38:57.467000 CVE-2024-43587,0,0,9de9e4aae1c926feb9c254fb5c9841a525dc7e95ddee4987c94a6de807a75369,2024-10-18T16:54:36.267000 -CVE-2024-43589,0,0,cc903ffbf9d43a375770e2d4c51903c8c3fd1fb1fffb8f41fcf7a5ca5018c226,2024-10-22T19:29:53.660000 +CVE-2024-43589,0,1,7421a03d79a251f1fcb3e670cc2ede90fd5c85114ad0506fb2719206f281e7f0,2024-10-22T19:29:53.660000 CVE-2024-4359,0,0,7150fb55811fab9c0cf824bc2e13150506ba38ad4b035cd5caa45a7a79ce7a92,2024-08-12T13:41:36.517000 CVE-2024-43590,0,0,56f37bed6fa12b529a536cabd867859c2b7202ec5a699f63f91ae2da59bda0d9,2024-10-16T21:44:50.927000 CVE-2024-43591,0,0,122a3422706c1a52ba2f8f892feb955dcc1b1b00d57e2a43f0bf994287808e37,2024-10-16T21:46:38.153000 -CVE-2024-43592,0,0,b9ca8e169ff2961078c91cf3fb1e31e9b422da371a8ddcc4dbd570ca574c2533,2024-10-22T19:30:02.777000 -CVE-2024-43593,0,0,a20f40915672f2b39a9d2274a7dc761f5c23347abce3eb6ca20eb8bd84b36912,2024-10-22T19:30:19.870000 +CVE-2024-43592,0,1,aefb3ea2eef4806b0b04bf1216ce25a8b6f83f456c5748fe7fb5b675b193040f,2024-10-22T19:30:02.777000 +CVE-2024-43593,0,1,2bb48f4f0afa52430e295c1e926a52b9335896fd8f7df026028468d0b3163bed,2024-10-22T19:30:19.870000 CVE-2024-43594,0,0,5a486aece5f37225094d6faef1943aa61cf6e355499759b65b20904dc2182775,2025-01-08T12:38:56.207000 CVE-2024-43595,0,0,cb5b5951e4919de1a872d590fd0c42132b697a287d76901f8d922654387160cb,2024-10-18T16:55:06.487000 CVE-2024-43596,0,0,378e2538af1a4ff984cad3b4476baafa72ef2d70988fd63f25f16366167c11ae,2024-10-18T16:59:08.667000 CVE-2024-43598,0,0,e3ba2ac69aa626cce11d0f511da9d5528d9a33bfea6bff124e6fc71c816b20a4,2024-11-19T03:52:01.630000 -CVE-2024-43599,0,0,39101324225bdbc43df2de78182987bbfc7288ac33fcdced82345e1095aeaf54,2024-10-17T20:03:28.687000 +CVE-2024-43599,0,1,e8ed1fc525a6895d6a19bfee310c1be1add8fbfc1bd1f275dd80d76add28514d,2024-10-17T20:03:28.687000 CVE-2024-4360,0,0,bf74f5eccc1881547f6f91a61251be583253ca151ec1301fcbaee9647faf35b1,2024-08-12T13:41:36.517000 CVE-2024-43600,0,0,512e86bf1b068e11fed10f17ded98012e43b045697c873b109da2f251d32875c,2025-01-08T12:39:18.487000 -CVE-2024-43601,0,0,35cdeede2e58bf8e469b6bd8445e66b2bbb115308bad619fe129e9b16444ee89,2024-11-08T22:15:20.270000 +CVE-2024-43601,0,1,f4750adec6049954723df6377c0e9969d37c9d4c9bb640431f543dc8ccffc558,2024-11-08T22:15:20.270000 CVE-2024-43602,0,0,8305a93b11e5988c2ad84757fc77cd97d5fa424c6919ea25cb20c9e18393fcb4,2024-11-19T03:40:15.550000 CVE-2024-43603,0,0,06afd6ae30de0f84874ac0f27e9ca0fa20255c6f1ba3c73cbed895f042f11d3a,2024-10-17T19:55:34.360000 CVE-2024-43604,0,0,1effbab36c6fa1acdc7a9e982f82dcccb7e0dc04d9831b75e228387e20d65027,2024-10-17T19:54:24.387000 -CVE-2024-43607,0,0,177b707b3c03bc962c8aac04ddde5ed155a406d7972129b86a3e09a27930d8d1,2024-10-22T19:03:17.993000 -CVE-2024-43608,0,0,75fa80cbbca2584783cc832318883f4ef6d591cdbe417f665655ebd55f28b18c,2024-10-22T18:58:04.887000 +CVE-2024-43607,0,1,c9f23b17f1ded786cfc1cf9810a98a9c06f0681a9460c31b2dc8ee2c9e999ca5,2024-10-22T19:03:17.993000 +CVE-2024-43608,0,1,399ddc2b1ac9bebe5d70e52dcc84e7ee76f38d680b84b8bee477db5662f31693,2024-10-22T18:58:04.887000 CVE-2024-43609,0,0,ba7efbed5be9c886d14b380fdcac5b8a331d529611297a73ede304b8d72e0023,2024-10-17T21:18:58.113000 CVE-2024-4361,0,0,43aff6787a4479f38b03751f8b309978e2b7bd8011ebcb21afe8f9fe0204fc3b,2024-11-21T09:42:41.863000 CVE-2024-43610,0,0,531fee574a493d6d17cbcfcc8b12aee01a4bdae3496f2cb465e3c91e82deed46,2025-01-10T14:59:49.673000 -CVE-2024-43611,0,0,70068d68bda071c9a5571ee7abb6c83fdd9b870395a94ed7f5071cbbc659a60b,2024-10-22T16:01:19.373000 +CVE-2024-43611,0,1,a43082b318173acaf88ab8fedf18a695493c85d011ba81bbd1c7b0e31b837833,2024-10-22T16:01:19.373000 CVE-2024-43612,0,0,812c826e3c16ba289dfbb62de4b281704dbf93c4d4b0a921ae535f6bffcdffc3,2024-10-21T20:48:02.050000 CVE-2024-43613,0,0,cc633dda43ef8b13ce69f0ec4a9b365544125d76676b641d4b82c2346a780a25,2025-01-07T16:20:13.437000 CVE-2024-43614,0,0,c5d2c4e61e699928a9aa80596895800f4eb921603cf99ac879c7ced052428111,2024-10-21T20:50:38.370000 -CVE-2024-43615,0,0,a7be6185efd769f927c83d1bcf5f6fbb2f4769f426bd0b8c50fc4d20209f00f6,2024-10-21T21:00:34.967000 +CVE-2024-43615,0,1,fa3ae0c75332c4f77e78f0d17ed80118371844c95c489872e0a72219eacc2cf0,2024-10-21T21:00:34.967000 CVE-2024-43616,0,0,53854d33ac39e3d7883338ceed28a977b17a47e36ed07fb5aef1617d3c509acc,2024-10-21T20:47:00.313000 CVE-2024-4362,0,0,3b83c9a7b151f785cffad1c0294ad31322ebd0ae3d7f1bdc0ab46d7d0832649c,2024-11-21T09:42:41.970000 -CVE-2024-43620,0,0,a935a8bbb1e54ea422982302b021d38c3912daf8bf270cdc7a8487109f7065f4,2024-11-15T23:59:51.167000 -CVE-2024-43621,0,0,c5d57e6015c1d75d3c4461b962c84a9cdfa927e7e6926e390a302c8391905bd9,2024-11-15T23:59:21.473000 -CVE-2024-43622,0,0,3e2e5858bb3fa263064b9d23bf51d9750a25ed68188b05de649b9c021d02046f,2024-11-15T23:58:33.873000 -CVE-2024-43623,0,0,87b8f7bc683e8b3b7fe34347c8e5bb7170c21f69ec0ed4540acbf2ee029fb4c1,2024-11-15T23:58:12.060000 -CVE-2024-43624,0,0,237bb010b3f51e4de82c4596705039e74409905541d51dfda70570e5f5dfe9fb,2024-11-19T03:16:15.290000 +CVE-2024-43620,0,1,8e0c2a1210cc0c4b2cb1627c80802cd8cf1eb8d1337fe83c819d52cdc6ca964e,2024-11-15T23:59:51.167000 +CVE-2024-43621,0,1,0abee03416290603675a89e86634b63819c275cad6799db8e43c2e3aac84cbd0,2024-11-15T23:59:21.473000 +CVE-2024-43622,0,1,ad575e18f1ef382f66d7c1290041cf669cb5b64261107c3aa70fa11f73f5952f,2024-11-15T23:58:33.873000 +CVE-2024-43623,0,1,0f9c6c76a581f843641864e1de0871c0accd3ed19fe67e4c401e68e4da6abcf9,2024-11-15T23:58:12.060000 +CVE-2024-43624,0,1,30475df2c61619f30f9943a8bfb7fbb2350caa3abedbc4b64dda2488a1d147b4,2024-11-19T03:16:15.290000 CVE-2024-43625,0,0,68df669d7dcffb981f25954519e698738cce85de84bdd374f69d71e9dd7a7022,2024-11-15T23:57:16.503000 -CVE-2024-43626,0,0,0edbeba811d7c9bc68b4a47616fc151cfd59d1e39fc3b7e17f5ac9d2eb788ce2,2024-11-19T03:05:34.913000 -CVE-2024-43627,0,0,9e3bcbebca283707c18558e61292f47d2275a0f7bf9fe7aa5ff575776b2ac580,2024-11-18T20:58:03.997000 -CVE-2024-43628,0,0,e46575aeda438b73861ccd27a09a42ba9caa07171f319c73d040ee9cb0be5d55,2024-11-18T20:46:32.610000 -CVE-2024-43629,0,0,16e1684667c0371abf112645264dcc9490d1ba76f588baa7c035c032f0f94f87,2024-11-18T22:09:18.567000 +CVE-2024-43626,0,1,486dbe054ce85d97e57e9ad7ca3938bb003ac6113ead549157352f470f311591,2024-11-19T03:05:34.913000 +CVE-2024-43627,0,1,741664f973f7b20b804205d21374e7eb7d458b158faad678c87a3cfeec063e68,2024-11-18T20:58:03.997000 +CVE-2024-43628,0,1,538401a643a844ceacced9bd85bd7161bc8ff92e9fb402101732dadc6534620a,2024-11-18T20:46:32.610000 +CVE-2024-43629,0,1,745c4ecf1f5a7477ae8de491fb6f4fada671b6ff98c24860aedbc91174a25ac7,2024-11-18T22:09:18.567000 CVE-2024-4363,0,0,65b08f1c6d9daebee455731976fd6a26ce5f13b809e82b66186e7456eaecaacd,2024-11-21T09:42:42.077000 -CVE-2024-43630,0,0,2a718bc8aa4341912569976e41cfc84bfd1cf0b31776d710828ee13f25105814,2024-11-18T22:24:12.903000 +CVE-2024-43630,0,1,10eeb21a6f2a79e6a91ff91956e5e1644fb8394addf05545a814b714d2374669,2024-11-18T22:24:12.903000 CVE-2024-43631,0,0,519247a5aa47985a9f335820c0c32d6bb5e1f7e893b785e917890249dcff1add,2024-11-18T22:23:15.277000 -CVE-2024-43633,0,0,691669fb5a688367d95af64b6f12888268d6ea4edd63151f1dd36a153d2fd40a,2024-11-18T22:22:44.710000 -CVE-2024-43634,0,0,2a273da4655ac9f3da9efa77dd5dcb1cf422fc3dda9be1cf94d587e4bf695b91,2024-11-18T22:22:16.637000 -CVE-2024-43635,0,0,eb4a791ea8097d966c3dd360519231a5c41fd892e0a779656d0cbd0bc32ebf28,2024-11-18T22:22:01.707000 -CVE-2024-43636,0,0,2180f9ac8e71cf7c3fbfcc2d98493b69fa0772a79f738241de9a3c4267cbab43,2024-11-18T22:21:28.470000 -CVE-2024-43637,0,0,c1a94d4317c5eb2ce756e4c94c24f21bed59b2d0eff681aadec811fdc7d623eb,2024-11-21T14:15:12.160000 -CVE-2024-43638,0,0,dae9ac4f2cb73e47a22307aeecac0c3968206b05b3583d9aab6daa64a8aa04ba,2024-11-18T22:20:47.567000 -CVE-2024-43639,0,0,b3783430dd6783cb8abde787ab854880eea2a80dd483a4c37f6b81cfed36147e,2024-11-18T22:20:32.157000 +CVE-2024-43633,0,1,7244c3dbd5881a5fbe303349bae14a953fd2f11fcb5f6093580155a023126d93,2024-11-18T22:22:44.710000 +CVE-2024-43634,0,1,e3c713e04638910af8eeabc34848ff137b9aed154982507ae34da6b46cf801fd,2024-11-18T22:22:16.637000 +CVE-2024-43635,0,1,053a5829225a9d524016712c62c1f31d03a06c0b3248a1c1ea0da05f56eb497a,2024-11-18T22:22:01.707000 +CVE-2024-43636,0,1,afc76c42bdadaeba44f988236ebd63c88e497a467a5740e688d196803e8bcdce,2024-11-18T22:21:28.470000 +CVE-2024-43637,0,1,d6ef5c322668852b95a4f7feaf22db0d81be8ff2984d09cc29cf08e918efb3ba,2024-11-21T14:15:12.160000 +CVE-2024-43638,0,1,e6534f68740bd044c868a67725a125a4b8003373d9fc8d34dcf3c08cd5db5dbc,2024-11-18T22:20:47.567000 +CVE-2024-43639,0,1,82198a305b5de8852a6ed8ba9e3881b09e98575bd0c6200e616908e3ee0bac7e,2024-11-18T22:20:32.157000 CVE-2024-4364,0,0,1da1221ea22df19dc783db461566062967d2c845a3b0950f429b6c7a4cffef5c,2024-11-21T09:42:42.187000 -CVE-2024-43640,0,0,667cb982d58471aa96d4120f03f9f02ba2e80342795b0dbda96f2a5ee6fbcecf,2024-11-18T22:20:20.383000 -CVE-2024-43641,0,0,9c0bc221f5413e08c0ba3b54233515b0ac4a97b358d1a8f2e9f553546ee75a27,2024-11-18T22:19:59.720000 -CVE-2024-43642,0,0,e2503c59b407ec71f260eb643c79e0141d69a0df5967c0d5afa9c1ceedb62454,2024-11-18T22:19:11.417000 -CVE-2024-43643,0,0,2c3550629043583ad7ba6edc5f9b9195fbde70d42e204b2ac82f9a361903bc96,2024-11-18T22:18:15.320000 -CVE-2024-43644,0,0,d7ae81dc39a8d80999b28a10bf2b9f4f3ec0b06b97a543b1aa4024a754a6187f,2024-11-18T22:15:46.917000 +CVE-2024-43640,0,1,16843680a9066680f809920b975554f0765ce32d566810253d5d865eb2fee2a6,2024-11-18T22:20:20.383000 +CVE-2024-43641,0,1,4d821f148b1b091b5372277a43d3f0bdb78a5b8beb9cfaee81caf77c3c85ed5d,2024-11-18T22:19:59.720000 +CVE-2024-43642,0,1,cf171c02ec1b5a740025d68b60b29f5a1fc38171f92f19f147fa20b4aaa96c24,2024-11-18T22:19:11.417000 +CVE-2024-43643,0,1,32cb5d1b17433076bd0ae5bcf07bb1792b6dadb43cf6b11daea104603512b338,2024-11-18T22:18:15.320000 +CVE-2024-43644,0,1,ccb3202ed275a10d3ea40b7629c1edce6c85b0898338b4273b169ea23f85298e,2024-11-18T22:15:46.917000 CVE-2024-43645,0,0,3483c2f4a4e8d8673a85c08c57279dcaf2dcabe54994c554778de6585015f0e0,2024-11-18T22:17:01.340000 CVE-2024-43646,0,0,e44ad8cceba821cb635623bea36106bdbc329e7b38ada87c67235302b176e252,2024-11-18T22:17:53.577000 CVE-2024-43647,0,0,8afbf70ad2cef6fb4b1caf7e1a2477d89764414a1ebb1b6c70d7bf7b3d2442bb,2024-09-10T12:09:50.377000 -CVE-2024-43648,0,0,bde2221ccc3b52f0ae5a3b05355aa2bc5f4598ee725ec189d4e8596bee83b033,2025-01-09T15:15:15.977000 -CVE-2024-43649,0,0,560060abc23fbd63ad6d0d1d06cb5f5cc3d24b9c8e26d4d015cbb232289cbc13,2025-01-09T15:15:16.173000 +CVE-2024-43648,0,1,eae1427f9d358ae9db25619b11f3c78ed61918c4b05e7a38744323695df594e2,2025-01-09T15:15:15.977000 +CVE-2024-43649,0,1,b9c2f4ee51c53a4dbae007951dbb5168361aacabb78e138c94a0681606a4e45f,2025-01-09T15:15:16.173000 CVE-2024-4365,0,0,8395a37d6a53a1070a3da8569444b421529dea178299a0f784e109ce6848c89d,2024-11-21T09:42:42.317000 -CVE-2024-43650,0,0,f57c4c703d40cb1b16da32a6f9b05bb372c49445a1b082beac328b32d9fb70c1,2025-01-09T08:15:27.417000 -CVE-2024-43651,0,0,ae6190c0fb2ef2abff378edd3f5ffc36d80bfaea3861050b603b76d43f4960d1,2025-01-09T08:15:27.590000 -CVE-2024-43652,0,0,ec5308dd1f6f098e3ee4aae35f54d41325b706f17b43844c4f9f2b2560b4bf0f,2025-01-09T15:15:16.410000 -CVE-2024-43653,0,0,b2e8ee2cfc385db1630c2e64dc783ab9ab98c663237611281865e5f2df7d4ade,2025-01-09T15:15:16.627000 -CVE-2024-43654,0,0,cece469995fbc11327863c7c6c65a5202f2355e53830841234c124d507cd84eb,2025-01-09T15:15:16.837000 -CVE-2024-43655,0,0,84a84cb9f2f0c9c81851b45f6751858fb461708f35ee0b7196880e2f47bce0d5,2025-01-09T08:15:28.300000 -CVE-2024-43656,0,0,4cbbf796d97dec391ba537e53605fb94c330271b006bdccac6b42cb3d393a929,2025-01-09T15:15:17.090000 -CVE-2024-43657,0,0,085803f36d5893d44b31afc938df3b4f5c290f94c59253f3f02018476365e3e0,2025-01-09T15:15:17.303000 -CVE-2024-43658,0,0,03812cbdc33c23bf8bd0a3a9e1d82b30062ca72f54383da1609f5ac33cd77109,2025-01-09T08:15:28.867000 -CVE-2024-43659,0,0,8bcb4593473145e6e6ee0d5a400ac85e28dcac60a0ab4a1a48139e6d6313a32a,2025-01-09T15:15:17.523000 +CVE-2024-43650,0,1,14bf211da6842a08317043b25a4b62a1a094af0f2d36b41708004b4bd91bb1e7,2025-01-09T08:15:27.417000 +CVE-2024-43651,0,1,b99daa4a3f229a19f7f60beffbc0d57c17bb9accd2d1b368b70107234815ee68,2025-01-09T08:15:27.590000 +CVE-2024-43652,0,1,7143192f0a7520786cea1542c5e063437d61a5c9bccaa958985fa38493810d82,2025-01-09T15:15:16.410000 +CVE-2024-43653,0,1,d04aa6975a17153abefe917560d6d1394b036486757532d84558850d7109a740,2025-01-09T15:15:16.627000 +CVE-2024-43654,0,1,eeb5c9b9abdb2dbecce1774c66c9109462d87fd3b52422a91dccfa59db1e782e,2025-01-09T15:15:16.837000 +CVE-2024-43655,0,1,98299fbc218a9be14813ac7eeedeb4e104c477c32b361774528facfc5469368e,2025-01-09T08:15:28.300000 +CVE-2024-43656,0,1,bc029a2a44780a2f02bdde2625389d315052319f6819f3193f94290162fad19e,2025-01-09T15:15:17.090000 +CVE-2024-43657,0,1,ad32eb1a9a1b671c029ee82ed9a61b5524fce5591dfe3b7077b73eb696414620,2025-01-09T15:15:17.303000 +CVE-2024-43658,0,1,85fb0601fb7a4a23bb8d04be30f4037024c8eac7a4b70921cafba6799488b60f,2025-01-09T08:15:28.867000 +CVE-2024-43659,0,1,bde366e60b219186a2f91fa966b7a1b80d6a4a58c30e1fcff02c65f90e1b2441,2025-01-09T15:15:17.523000 CVE-2024-4366,0,0,3c382e606a72e58f20f6afa38987a3fb436df349cdb6108f029876febf16f59e,2024-11-21T09:42:42.433000 -CVE-2024-43660,0,0,b9e1c5753cc7e5c8abcae50151d70f5f517757bde30a39a6080ee10adacf268a,2025-01-09T15:15:17.750000 -CVE-2024-43661,0,0,f4dfa4f7658b52a8a77fcfbb3eae6949ea19515d5043ab5b1cd464974db887f2,2025-01-09T15:15:17.937000 -CVE-2024-43662,0,0,8b0996f37d4d356a300c8703334b6df6e707291e0e0de56d34e4f561f2e110de,2025-01-09T08:15:29.637000 -CVE-2024-43663,0,0,72db2907cca35299b830e0500b9d3be9c12c6a839a8339eeaa6da1e357cb492f,2025-01-09T15:15:18.173000 +CVE-2024-43660,0,1,238845f4a9d34597d8664c50dd0fa08545611e1bed47ee50fa5d4dd87d303bf3,2025-01-09T15:15:17.750000 +CVE-2024-43661,0,1,c70725ed5b48f93093f892c549359e2d42477c7c299ead1de45c75542d8e6cab,2025-01-09T15:15:17.937000 +CVE-2024-43662,0,1,e334affe46a369f95b6a85bfbb8d720aee845ddb9b4fed0030c89383aab45244,2025-01-09T08:15:29.637000 +CVE-2024-43663,0,1,ee082244e3082be3e29c575c6f9c4b1d33a6184a6affdfde70ed6b52fa37688f,2025-01-09T15:15:18.173000 CVE-2024-4367,0,0,06d0056dd66ff219c5446225478001d7ace4cdfa0f0e8d7454a5c61b93b71c50,2024-11-21T09:42:42.537000 CVE-2024-4368,0,0,3d10c8e78c29700111196d36c50b5f085edebb06975b60275c2b591108b23a7b,2024-12-20T17:23:03.420000 CVE-2024-43683,0,0,df9b098d0d10bbc57333de3cddd48795135c3c7c667cdc231a2f356001c571ba,2024-11-01T16:15:08.930000 @@ -264463,7 +264464,7 @@ CVE-2024-43755,0,0,478380913bd8cdca07355832bb95eb988bf4e0c44806af477f9c965e2e53d CVE-2024-43756,0,0,574012d52ba61623896d593dde944e97d1e4486f17b00226542a0b61b33f8b0d,2024-09-13T17:00:59.890000 CVE-2024-43758,0,0,0f26a442661cf8c474cf15fed83c27096c39a987496f8728b4b680b80eec825a,2024-09-13T17:27:33.230000 CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b8941c2,2024-09-13T17:13:35.427000 -CVE-2024-4376,0,0,54ab76d9fd6742e25c4ca941b8688277ccbde54c93ac0337a04e833897b0d9f6,2024-11-21T09:42:43.643000 +CVE-2024-4376,0,1,94138e8e651c032092aa3010a371bed6e45860e384f116ba7324122ea0a4aeb0,2024-11-21T09:42:43.643000 CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e04019cc,2024-09-13T17:00:30.440000 CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000 CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000 @@ -264487,7 +264488,7 @@ CVE-2024-43785,0,0,c69a7a1b76ab98e61c9a0f35fc5e8f8769aeb7b686c50dc8dedd669a5550a CVE-2024-43787,0,0,1a44e32ba66f4d08dfe20638472e0f7856c0efa618069dd526f05b02631b9f37,2024-08-23T16:18:28.547000 CVE-2024-43788,0,0,290e7a1b5dd5a875b2c0c161d5e1d5cebe1d1deb8baea06c779e3306a9c15cd6,2024-09-03T15:15:15.937000 CVE-2024-43789,0,0,191ab74ea80ce6d2eec86337e012c73ac929ab0eb8b2b5b9c0b7a70aacfeb146,2024-10-19T01:13:38.170000 -CVE-2024-4379,0,0,c5acd93aa800864f7acb3920c2e1dd692d78e43f065155807dd56c9131783b88,2024-11-21T09:42:44.073000 +CVE-2024-4379,0,1,37d34fcdd687bc07bf2966ad63809173817fa1bdf7b035ac951d00c2af1c834c,2024-11-21T09:42:44.073000 CVE-2024-43790,0,0,fc8ee27e53d833089ce57799eec4699d334f17a8a731e2b6aa318c728034d3eb,2024-11-21T09:35:52.580000 CVE-2024-43791,0,0,7fe390fa1f18fb27c406d9a297217e43c3ca0ea374347a19f94c9a8ba2f42bbb,2024-09-12T18:26:31.783000 CVE-2024-43792,0,0,a9dc7a3fbfcaf4975458bcaba4ba24ea7a77298dd49dd0bbc01ee066025ef52e,2024-09-16T16:26:18.063000 @@ -264681,7 +264682,7 @@ CVE-2024-43966,0,0,b1c3a2c914b7fe3d93385a29bdef310151a44a0dfd7002e70261789dc777c CVE-2024-43967,0,0,66cf70e54d96e5c9aeb8db434f3fb011e631096716456a134558f4b472b4d158,2024-09-18T17:00:57.497000 CVE-2024-43968,0,0,e68d2b1867fd5f5aa5b26c5e7c6ccd7ec578fd8c649ccf866817e41be944243d,2024-11-08T20:43:04.257000 CVE-2024-43969,0,0,e8eccaca93e84d826c12a7bcb831012c8f9a0c683a018b1ad485d805b91a7483,2024-09-20T12:30:51.220000 -CVE-2024-4397,0,0,89386af0bdb18f04ae0a1641ba5a5e2d23a657489cd71771129d68065d3cdbe1,2024-11-21T09:42:45.863000 +CVE-2024-4397,0,1,5646e465afbadff74c039caa4c6970bcb84b5d40dbf11296e0765f5e0c8afb85,2024-11-21T09:42:45.863000 CVE-2024-43970,0,0,2b47a67bd95544f24bdc1a4cc32dd92da388690995a292f770d40c585891a766,2024-09-25T14:18:53.297000 CVE-2024-43971,0,0,1e49fcf5224ad0c23ad76de8f088ba096b929897c7ed5e5894fcd05c79e6d09d,2024-09-25T14:18:13.137000 CVE-2024-43972,0,0,4f406ff04cb3c0b59ca13837f305ef0175722ef92955f73d7615bcf08b6757d0,2024-09-25T14:16:18.150000 @@ -265001,7 +265002,7 @@ CVE-2024-44333,0,0,c5d624202dbc9a9b1670ac84eba11673bfacf2e3bd54495df9c00726b1f1c CVE-2024-44334,0,0,2a3b81ccad3fcc31e1a06c0adb7939fa911851042ebf4e5dd5061206cc9f639c,2024-09-09T20:35:12.473000 CVE-2024-44335,0,0,4962d89eefd697dbe30866ff3edf68624ec476c2d20b191be41bf6d9942ab0b8,2024-09-09T20:35:17.330000 CVE-2024-44337,0,0,030514f9e40e38f59570e28e764a82624613b34238346a3330ba41ff1d541657,2024-11-14T16:35:14.613000 -CVE-2024-4434,0,0,9840e483802709da3e92e3ee8c1ca68cc6799f55a3383f128355159c938f1e16,2024-11-21T09:42:49.417000 +CVE-2024-4434,0,1,5b78e9743fafd737a4f1854944ce6d23c3aade80622de2d2c661a69a83cb4785,2024-11-21T09:42:49.417000 CVE-2024-44340,0,0,83e58ea9785ebdf6a4101ac95bdee1fca6e905c550b6bbbcea8839f08b665ae8,2024-08-30T14:56:38.207000 CVE-2024-44341,0,0,7651f1877c3d6b1232bf2f13cf52731db1b14545c472830418f8093ef24618dc,2024-08-30T14:57:07.260000 CVE-2024-44342,0,0,9946b8e73e8a0eed62aea52b08d3d3c4e1ec770a53fc7da4a55ac13f51727d07,2024-08-30T14:57:40.020000 @@ -265033,17 +265034,17 @@ CVE-2024-4442,0,0,844d8a9e1a5332f1ad3d82aef05b898fff95bdcb7b0afea7ea7412d6289085 CVE-2024-4443,0,0,8ed4073f9cfaad35bf0f90203988f70cd4df728c41539bb0698ffdf5cc8f7663,2024-11-21T09:42:50.490000 CVE-2024-44430,0,0,3721795c76cba90da57f56d458597661e7f72bb635cd84939230dc04ed512dd8,2024-09-19T01:38:06.317000 CVE-2024-44439,0,0,532d340c7125d38b3791848ed20a07920e65477c51ca4d64efca5629beabb48a,2024-10-08T16:35:05.540000 -CVE-2024-4444,0,0,feeaffc9146fccf0816d38147af86858ffa3c68d94baf1fab273954d1c7348c4,2024-11-21T09:42:50.610000 +CVE-2024-4444,0,1,5a075d926874db369446f94ed68ec67ba0fa03fc550eee1cec41afaa66ebd515,2024-11-21T09:42:50.610000 CVE-2024-44445,0,0,70e29647242626c5fc3cd02b62378e61567a9538e073b5b0672118158325e4f5,2024-11-21T22:15:07.637000 CVE-2024-4445,0,0,46341af9b6fb502c6f33de80f90e54dcbc98c3195a6f7b6924f2303483fe6e07,2024-11-21T09:42:50.723000 -CVE-2024-44450,0,0,b6d4cb9f3062751960bc65f4ba2a54253ec161ef54efc949eeaece289e8f3cb4,2025-01-07T19:15:32.417000 +CVE-2024-44450,0,1,e2b00db1a138b66c9c880a204501c6260391eb5150f3adddaf21310d31badd17,2025-01-07T19:15:32.417000 CVE-2024-44459,0,0,6692baff458ff714d53ffedc49b8e8781eaf99012cbbded46425655a64ca52e7,2024-10-30T20:35:29.427000 CVE-2024-4446,0,0,a4fc1a809d7fdafb7a075aa0f7592e0b84c47ee34b07d544758f459a4a149dac,2024-11-21T09:42:50.843000 CVE-2024-44460,0,0,9863860565b5b349bc349acea444639a968dc1cc5f314565dcb3e0a824f6c075,2024-10-30T19:35:23.557000 CVE-2024-44466,0,0,3824c468cd2523312a1f0e671375267b0867452156bf2d5a836d4f6e1120aef2,2024-09-13T16:32:15.977000 CVE-2024-4447,0,0,a02a5cdbc4f2e9542a4f483cb43980050f9b1fc4980862ed9fbd83a26766a001,2024-11-21T09:42:50.960000 -CVE-2024-4448,0,0,356f34c44ac1109ec5528b933202fba5dcdfacf158a90e9f78c9882d9c4396bf,2024-11-21T09:42:51.083000 -CVE-2024-4449,0,0,e0f013aaee4b2f3a95f1ce013908a251c37d824202f60baaf056feb992729f5c,2024-11-21T09:42:51.207000 +CVE-2024-4448,0,1,197d3158c61d99ddd6004dcd7aede172c577da2d78b1e2493a7386f2023c71d9,2024-11-21T09:42:51.083000 +CVE-2024-4449,0,1,39921a6dcb21e348bd9abaacfd435dd001693183924106932b268ea3b91a784e,2024-11-21T09:42:51.207000 CVE-2024-4450,0,0,02e484232dba5ed729e6871e0f75add019f9f5e1494153f0f3ce664a865195ee,2024-11-21T09:42:51.320000 CVE-2024-4451,0,0,faf07e9f83c53ae5ef942ca91b86c49b80b994759e8a08c8a30c23242182311a,2024-11-21T09:42:51.450000 CVE-2024-4452,0,0,31e0967488cd58f7aa1b5a425ccebf2e29782f1d55559ce85e4cf68972ed27f9,2025-01-09T17:46:34.190000 @@ -265311,7 +265312,7 @@ CVE-2024-4503,0,0,2132d5ce18b15e7f49d624050d37d046236cbc0a9924b5835e61870f1f8cb8 CVE-2024-45030,0,0,9cc95b0e18d97ae2d004c3ea39d53ef7b2d0a717fa5db48c05c2ce46c047c993,2024-09-13T16:29:23.557000 CVE-2024-45031,0,0,017f99f70a4f31d5d517fa658889f4a7c7b307e882787bb5b0932965fbc8d615,2024-11-25T22:15:12.147000 CVE-2024-45032,0,0,75a74373a834b410b3000717965b9b9008f7b669f77fa266ab9375e4b0ce2b38,2024-09-10T12:09:50.377000 -CVE-2024-45033,0,0,9a7efc6d27c5d904218e7741d554de6d20d99201fbb8d2a67409ef8f851a8da1,2025-01-08T14:15:26.430000 +CVE-2024-45033,0,1,000e00bc207b9db5c53da9d9d78e0a49c8eb853dd299898aa9ab62800859bb63,2025-01-08T14:15:26.430000 CVE-2024-45034,0,0,80b2a6349e3fbd5310682cad782ac1c7cd4045823c8e49419a11cd7d9f2228c8,2024-11-21T09:37:12.150000 CVE-2024-45036,0,0,073b83b36c025e469170e1438f525dfe8c1cf64302463ae555be2dc182c39166,2024-08-27T13:01:37.913000 CVE-2024-45037,0,0,6a9a799667a034f6a88566586d984ff32eb736329e4a27787d4e8edb33b29a0e,2024-08-28T12:57:39.090000 @@ -265344,7 +265345,7 @@ CVE-2024-45063,0,0,1409a1792fb044d0180db60765e18242d949607976f55c38d4cb7d3b87690 CVE-2024-45066,0,0,5840c56de67d6ec89c19e6b63643f7547b6ea7016be72ec0c0aaf3000af5773e,2024-10-01T16:18:10.680000 CVE-2024-45068,0,0,c8edc7e1dd2efd4150730702fd7fc207bb2cdcb6fa3089f6d2a2ca2cb86ca5f7,2024-12-03T03:15:04.953000 CVE-2024-4507,0,0,0cce0099e9b56e6c38adf32141097ae968c74e9462bd520a29ad2d370b497aec,2024-11-21T09:42:58.820000 -CVE-2024-45070,0,0,22574037e49e95906a7300ab0e802f62743a4b51e77c1347912693e01e58537c,2025-01-07T08:15:25.457000 +CVE-2024-45070,0,1,43e0077f9a86df49dc06e0bc270dca12765a65a9b97b06417a38e8b9e983cbe0,2025-01-07T08:15:25.457000 CVE-2024-45071,0,0,0ebd9328ae264441016b56fd159e414fac64c80926728a2280c837cee121e42d,2024-10-21T13:41:29.383000 CVE-2024-45072,0,0,81a2a0ec5ac444c67185500c958244112d85754bd4f0526c244291848278a803,2024-10-21T13:41:20.463000 CVE-2024-45073,0,0,ddb4c27340658cb42df2ff98e474d882b5cca95df6d9db84fd1527d0e88d9eea,2025-01-07T14:36:34.757000 @@ -265363,7 +265364,7 @@ CVE-2024-45097,0,0,86a5f6f58b36ff4d76801faef73b7a44c24bdd910aa639853fe61c2940eea CVE-2024-45098,0,0,beeee876795e27e2a560d9e6400141cf489497a78fea87df6979a5ea96e1eb85,2024-09-06T13:01:44.023000 CVE-2024-45099,0,0,858c41c5f15c72cacc9dd43b5c393ed0070ec0aaeb790150e951db7166ebd0e9,2024-11-16T00:11:09.470000 CVE-2024-4510,0,0,02ed18b24a084b78d31c63e9da1b95e453ef9099ebd9923c60b7e5c73b97e063,2024-11-21T09:42:59.297000 -CVE-2024-45100,0,0,16142afdb50e3e231e065a129998fec030a04def71a52fc2bded01a6eca84caf,2025-01-07T13:15:07.530000 +CVE-2024-45100,0,1,a1114146ec3a16b64841da41e807a8556df40765aeb56724f02ad4b7fa3cd578,2025-01-07T13:15:07.530000 CVE-2024-45101,0,0,f325c1ff668b2b7378c2468672321659723e47dba843b782909feb83b24e490e,2024-09-14T11:47:14.677000 CVE-2024-45103,0,0,a8c0055551f03e695e63b0973f1e941c9fcf8c5e34f2e57e30f25b4a4f7f650a,2024-12-13T19:19:52.410000 CVE-2024-45104,0,0,3df80228db5c275f30b0ae9082e735c38b4d72283dadc8a224190c0e3a2a19ff,2024-12-13T19:19:54.233000 @@ -265719,17 +265720,17 @@ CVE-2024-45528,0,0,ff006d3788a72915c0ea7e0acb04c7bc391e0a5989792ab2fc5081b004438 CVE-2024-4553,0,0,9862f42eb10f611dc9aec9c57d4f4f13e8047cde599ac2416b7f996e777484e8,2024-11-21T09:43:05.533000 CVE-2024-45537,0,0,597f8cb0bc693defc5493b35ff64dd73b6ef5e1561e8374a576856f0f629ae61,2024-10-01T20:41:33.207000 CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000 -CVE-2024-45541,0,0,51274b640375a2820e7f1484fb3f070939b71fb0a749b6e02a71928f4ae9c1b4,2025-01-06T11:15:09.230000 -CVE-2024-45542,0,0,a56b1bce0adf91d9dad8cf087012b8ec7884408c3d93039936f8404c4eb87d4b,2025-01-06T11:15:09.390000 -CVE-2024-45546,0,0,8403fc698bd5f592c2ef44e8b2c55cfb5649e2fd452892ff27b0c2584c28d968,2025-01-06T11:15:09.540000 -CVE-2024-45547,0,0,4dc3eed2ac1b3c54c9ff2888a99f52b0a8b71ade207943bbae56c90042492d6c,2025-01-06T11:15:09.707000 -CVE-2024-45548,0,0,3d56484871c5f989d6bd26cb413e0b687cf5563ecad273db2c9df0909a2aa015,2025-01-06T11:15:09.887000 +CVE-2024-45541,0,1,494fa0bf2ba5ae57c811c74447d94cb72dc87db35882903804fe00f8534e622f,2025-01-06T11:15:09.230000 +CVE-2024-45542,0,1,e8df39ce6dfac9c14dba19d48abc7fec6adab8fed1e0fe6ac0fb65301a530763,2025-01-06T11:15:09.390000 +CVE-2024-45546,0,1,fb4f65f29586d5f9417a22d536bcbe8d2819d93bea58d481dfacb7d1cbbaf7a6,2025-01-06T11:15:09.540000 +CVE-2024-45547,0,1,381efb032446f10d50ac0f4a5dfce739aec489bb9221bef665ba364ff1ca22e5,2025-01-06T11:15:09.707000 +CVE-2024-45548,0,1,89ddf1abcb91522c5dd0103c7099f3e9287eed6195a06aa6f83989144af4cfab,2025-01-06T11:15:09.887000 CVE-2024-4555,0,0,42addb69d2a25e76680bd75ca9680f4458507a72790c92c0c02ea27cb2860a95,2024-09-12T15:13:25.520000 -CVE-2024-45550,0,0,b0789fdd4961d36c08190b6dbce2260108f9777f2e0a44de8894dfe1e7a2da96,2025-01-06T11:15:10.050000 -CVE-2024-45553,0,0,6c4f6e446b91e4d791279b00cecb9bdc5aa80c60e2b3c4a228bac5b39437acef,2025-01-06T11:15:10.207000 -CVE-2024-45555,0,0,7fbff62653b149bd141f389e0b75ef05ec9b9bc8e4a8762678686006a6181419,2025-01-06T11:15:10.383000 -CVE-2024-45558,0,0,98e955ee35293bb99ece2d059213abbe054f9d5bf8112563dd64a49acb170aa1,2025-01-06T11:15:10.550000 -CVE-2024-45559,0,0,3817efc707280a2061c6d619f118d1fdf9eaa12e9f052dd916e5cb009c17ceb1,2025-01-06T11:15:10.720000 +CVE-2024-45550,0,1,79780bde9fec62373dc45fe03c51f7deca2bb183d14298bbd27ed417d08c9c00,2025-01-06T11:15:10.050000 +CVE-2024-45553,0,1,55db1ade4f3d3adf83fb61d69e90545954b7b3de6f3b3837c1498ff97c7755a2,2025-01-06T11:15:10.207000 +CVE-2024-45555,0,1,9e39350e71867eec42057be76dcc838d552c7efdab5ee6bfa10ed30e107bc9db,2025-01-06T11:15:10.383000 +CVE-2024-45558,0,1,634657cba4357108854061d40acd01535b2a2f3610245e192f24ae3d3c98195b,2025-01-06T11:15:10.550000 +CVE-2024-45559,0,1,0708a71bc7801a1c888b32627558973efd00bc4d011fce90da4d3f7c6f900efc,2025-01-06T11:15:10.720000 CVE-2024-4556,0,0,d3c0d9c7da9d7922d293ea55522a02a915493dd034ff9fc52c8d9c8976cd2d90,2024-09-12T15:09:55.107000 CVE-2024-4557,0,0,f03788c64b01fc0f9d9c6cb18548e7bc0f50cbdbc649d65a3f2f5d0fd687df83,2024-11-21T09:43:06.003000 CVE-2024-4558,0,0,3406f02edd918cc96dd602fdb16b4d4e12ad3abf909753504b463aebc8840fcf,2024-12-20T17:18:09.597000 @@ -265766,9 +265767,9 @@ CVE-2024-45615,0,0,c30088518f209241a4477d2e3a519bfb4d1ac78aedba26657029fbd462ec7 CVE-2024-45616,0,0,1085539023e4e5b89570d6ae0eeb36345f56862519ec2d3828fdfdb4094c35ec,2024-09-13T19:21:11.507000 CVE-2024-45617,0,0,19610115cdc30d39d46b78744575fe09f3e6d1f4808ae6cff78fbd6e07ff3834,2024-09-13T19:21:08.633000 CVE-2024-45618,0,0,568c90c57b7ee930d8a3481e22bb2d280889dcfd3fb3b6bd7af44366182a800c,2024-09-13T16:30:27.693000 -CVE-2024-45619,0,0,1e4196fcb40894226b5632408ab68df1b37de0f8ecee5d0f6b733d275e6cdcda,2024-09-23T23:26:14.460000 +CVE-2024-45619,0,1,1e46faca13c19c2f5a641e3f79bdbabb7b7948476e71fa88fbdf683636a0dac1,2024-09-23T23:26:14.460000 CVE-2024-4562,0,0,1d8c94d2c9e951f1ce39add830e97b604d004eed2906b0c427e620795ace9b12,2024-12-09T13:40:22.660000 -CVE-2024-45620,0,0,e72cba821965d5c505281ac4caac54494bb88161465cfa3fb639f2609ef70a0f,2024-09-19T19:21:38.653000 +CVE-2024-45620,0,1,c9c0e188f9138f80a3a74c030b14451e2b57736bb7ee176eabf96a25853636b9,2024-09-19T19:21:38.653000 CVE-2024-45621,0,0,ac12b11e9ee38c1675227b959e3f6dea489aa432edadcfa5df8bccf96f70b623,2024-09-16T17:28:53.437000 CVE-2024-45622,0,0,b710e3973bc54105a6c52433711f835588415a56a038ced9ed7020c8b95caa25,2024-09-03T16:35:09.647000 CVE-2024-45623,0,0,5c441374691aca3d3dc1871007085f3589123ddb707473a40f59605250fae5e7,2024-09-03T15:35:15.360000 @@ -265776,7 +265777,7 @@ CVE-2024-45624,0,0,b55674d4570db6379ffcfb68d511bfd6e80435e71433865e310cb34f4d504 CVE-2024-45625,0,0,d20161a4995ace7748c12e338379fbc120e9cd3065297a8eb4465406af4a3f9e,2024-09-10T11:19:40.113000 CVE-2024-4563,0,0,b89c6e32d64d62a8b24c69598703856273065e960659587d8cad79f58476b289,2025-01-08T19:51:35.093000 CVE-2024-4564,0,0,ee8f47044242c05a630f54d8d399a7051500b8cbd4c8fa39ec50216846d2f2cf,2024-11-21T09:43:07.050000 -CVE-2024-45640,0,0,4f7258d4a10770dd15c770b196db9f2c63abfae563acccd54bf2aa4b6de18d73,2025-01-07T13:15:07.690000 +CVE-2024-45640,0,1,923abe7b70ac2297df80331720303a7ee55474d7dd4031afdf0c5f6c2b1c1e0c,2025-01-07T13:15:07.690000 CVE-2024-45642,0,0,cfb188922d2de3d0a2e624109932e190c43782f5c9c1e7fb30a5b975a8a432ea,2024-11-16T00:13:06.017000 CVE-2024-4565,0,0,7eafc37f7621bbcecc9df42111f1503d84607d3815c6d13bfc741bedf44b3a75,2024-11-21T09:43:07.187000 CVE-2024-45656,0,0,bd9c2ffe8b9cbe4ee804430325ca28b90db5a453ccc34b145371cf00c3254208,2024-10-29T14:34:04.427000 @@ -265841,8 +265842,8 @@ CVE-2024-45757,0,0,bf1316f0b7743cc8b2dd152914a491dabcdcc4f499d811d2cff0eb86873ad CVE-2024-45758,0,0,f0fb5f8c507698836da499cc5b1208e03d29350c5ed4c9f129b68f0a5cb78d3b,2024-09-06T18:35:13.043000 CVE-2024-45759,0,0,96ed0b2a7f9059dba88885e611a5e1fcb866322df76f436717311dca576bf841,2024-11-26T02:10:03.923000 CVE-2024-4576,0,0,5d6e20f8b249755ca9fcbe51fe3fd43fba59ef712e27f2f4bdb5a18fd3b16894,2024-11-21T09:43:08.357000 -CVE-2024-45760,0,0,35aefae9c710552de43192cff3d1c2ef9be900a0a18f4bcc871924e5d1a88503,2024-12-09T17:15:08.830000 -CVE-2024-45761,0,0,3419c8823d4e98e4f2dc56e2bfb9e449e95509d7a7350932ca3baba85c9dba1b,2024-12-09T17:15:08.973000 +CVE-2024-45760,0,1,99deb86cfbbec6685ba47f919433acd1eecec0a5b5779d0b0218a26363b1a3e0,2024-12-09T17:15:08.830000 +CVE-2024-45761,0,1,64cae0166e79891ba7dc3e3a5ca20f9c6c226d76179b0d3582febddad80e0cd7,2024-12-09T17:15:08.973000 CVE-2024-45763,0,0,a7ddd532f2bb5c2b2d3e38495bd9ea7c226b148039b8171e3c9fb2ed387f4d40,2024-11-13T16:52:22.340000 CVE-2024-45764,0,0,c353a0fd0c056be8491ccb43ce6ed73b5aa49742ff25bc6f5eb80e348a6c26e2,2024-11-13T19:08:29.580000 CVE-2024-45765,0,0,d08df3289bc68e719740469698ac413966bdff60f13781ac62b99dc021094015,2024-11-13T19:06:45.377000 @@ -265917,7 +265918,7 @@ CVE-2024-45846,0,0,2dc52e631da6305e69c4ec41a31065295e97fb440738cb4ab8cf441230ccb CVE-2024-45847,0,0,3830d7080eb13e308a8ddd546f067a19eb804f0838ec8f8f29a74dda734ad0a9,2024-09-16T17:31:04.850000 CVE-2024-45848,0,0,6f5730880237e31aadd2854d52e28385fba40c7dad2ea626301ca30809f39f0e,2024-09-16T17:33:40.127000 CVE-2024-45849,0,0,46e5035d6f95a4ecb8bf2602b8415c2bba60f0d2762d4890316d1a5f17a08bfd,2024-09-16T17:34:00.843000 -CVE-2024-4585,0,0,7116f42f5b5716a3d8c4b1edcf9b28d402913c3caaa984ccc9bd2e24bd625d33,2024-11-21T09:43:09.590000 +CVE-2024-4585,0,1,36ee0dddf150c1fe45be7835adf52c12fd48e546dcb3dc7a0de0c5aa4a83b035,2024-11-21T09:43:09.590000 CVE-2024-45850,0,0,92d800d965bcab684571f57c7e193379a44e37487189e17aead36d9c00c31e20,2024-09-16T17:35:56.077000 CVE-2024-45851,0,0,c763d4772d4b93d4f78c3f1e1a47da2eb06d11d899cf76ee20b03b93430a4f2a,2024-09-16T17:36:19.283000 CVE-2024-45852,0,0,0ead78f6dbf9f521b241aaee0791820ea076bfb0817a14f802217fca28829b18,2024-09-16T17:51:04.233000 @@ -265927,11 +265928,11 @@ CVE-2024-45855,0,0,e6e5b68e5acfd1a11667f892905b75596ff190a43aa42b48206624d54da65 CVE-2024-45856,0,0,e6b9b2fd7d6b1f551cd54988a64cb58cc784f94e8c708d32288205688db5e8b3,2024-09-16T18:04:07.503000 CVE-2024-45857,0,0,155be2d615e14f1319cd5feb7b9ff9515597a0164559c75d5c0315890dd6abf1,2024-09-12T18:14:03.913000 CVE-2024-45858,0,0,0df7c725db1f686eed6c3a7c2ead8f37bc1625652a53d698cd2020fa092b71f7,2024-09-20T12:30:17.483000 -CVE-2024-4586,0,0,c8c5d78787ed08111f3d1479eada84d68f892a627b4f6478fb4fff7d9b545d43,2024-11-21T09:43:09.720000 +CVE-2024-4586,0,1,1e64124c172e15e52e50d41a48952d17eb2d28f78b1e1eb28a47e7209c2ddfd8,2024-11-21T09:43:09.720000 CVE-2024-45861,0,0,c1f4c9e760528cd76c1d322aebdd047c23548de2bff38acf411e9e8f33d76e94,2024-09-30T19:25:01.957000 CVE-2024-45862,0,0,978619918b70a0e597faaa1fb96cde619ba308684a21968124e854bb2280e6cb,2024-09-30T19:33:30.750000 CVE-2024-45863,0,0,1fee45429edf1e1d278b9719725e6f59aea4c2c5ea3426505f2ffa79bbb7401d,2024-09-30T12:45:57.823000 -CVE-2024-4587,0,0,5e7d99fc21223314007dcf65a9128b5b6a2249937ba08ce0e201aedac0ecf10c,2024-11-21T09:43:09.840000 +CVE-2024-4587,0,1,6e0756d713dce0137cec62233dc929c658f9ad06c4c4f81cebc89e92807484d5,2024-11-21T09:43:09.840000 CVE-2024-45870,0,0,7a30327a3b07ea492687f8bea78c6feded9c2b4343f01f96c886501ba9343fa5,2024-10-04T13:50:43.727000 CVE-2024-45871,0,0,32dfbe8f011c0d6ba33d55f499957ab473f4a3c4b9d5c67dca122c6cca769dab,2024-10-04T13:50:43.727000 CVE-2024-45872,0,0,e18ff596429d3aba40a7f322d661b21ce58ba490c52baf7992f80517ae78efac,2024-10-04T13:50:43.727000 @@ -265942,7 +265943,7 @@ CVE-2024-45876,0,0,f6de4c7d604c6dd2f7e1a8d2fb502be5b6de209d3d65c4296d1c452a4c06d CVE-2024-45877,0,0,9582f95508441ff8668fb3c2396c695e228995bf0aaadec2b0ea7dd7c2886d0c,2024-11-26T20:15:29.633000 CVE-2024-45878,0,0,380b6876caf9ba5ffb74fdb33ffda229459724407b18c5e7a3895e851a10b7ce,2024-11-21T22:15:08.717000 CVE-2024-45879,0,0,eb00ed1fa99b5c18176745e6e3317441cb9322d5c39f28666842989922c18994,2024-11-21T22:15:09.093000 -CVE-2024-4588,0,0,7866304e6fa2b09be81e7fdb725d6993abbdd0ced75d7ecf29975e29b192084f,2024-11-21T09:43:09.973000 +CVE-2024-4588,0,1,685e7aff6752631966b14e5dee7c8ee2c6273c24f9a766890388046a8f4a3deb,2024-11-21T09:43:09.973000 CVE-2024-45880,0,0,7db764a375fd449d608b2e306c708935371745a73b826ee4d78beefdb301fc6c,2024-10-10T12:56:30.817000 CVE-2024-45882,0,0,4b0a29313ff139ff388faa209b52dbe9b1e52f27432d17b76603ff6e23d1d75c,2024-11-04T18:50:05.607000 CVE-2024-45884,0,0,f04063f0180be568548e6dd42cfc649bcd5b1d1d88b2cb6dbe97f20555b20cb6,2024-11-04T18:50:05.607000 @@ -265950,21 +265951,21 @@ CVE-2024-45885,0,0,21fac6fa060708c0bf200eedfde21b586fabd65a64cf9b816d33eef50d56a CVE-2024-45887,0,0,24a4ddfb76b4d1b631b5d4186e7fb53f2eeb2f09008d2a0ae625e930fd2864ba,2024-11-04T18:50:05.607000 CVE-2024-45888,0,0,a8a8d3410d0c0fb4f37192a64a57faaacac10298b4424520b2a88fd900e4cbfb,2024-11-04T18:50:05.607000 CVE-2024-45889,0,0,c86a0e263ccd6437be47bcc801fb283c01c7b12e872de390af5f95bc7ea3a2e2,2024-11-04T18:50:05.607000 -CVE-2024-4589,0,0,48d432184b5478b8b3448bca40d8dad0c57b71b4324b81876ca3508e38695070,2024-11-21T09:43:10.100000 +CVE-2024-4589,0,1,3b2a1ac8329cd7d81ae7e291e1d41f838449588d999f1e1383a46b77bed2f812,2024-11-21T09:43:10.100000 CVE-2024-45890,0,0,1268f2fd4b6aba11ef3530cd5b6292bf76a5559ba1830e5d9e49a173c6ad6c80,2024-11-04T18:50:05.607000 CVE-2024-45891,0,0,88ad32ec0b1ab06d9249db7ab8b63e4faaa6bc391d83f17dd40cc0e9b31c20a6,2024-11-04T18:50:05.607000 CVE-2024-45893,0,0,6c84264076402008e1d3164c837b41c956707abb83c8d13c45c84eaf9607a248,2024-11-04T18:50:05.607000 CVE-2024-45894,0,0,aa3308191dd52aa025940666b3c9be411bca923dac4ae21bb2670f487e3648a1,2024-11-25T22:15:12.850000 -CVE-2024-4590,0,0,5717e25956c67e5f4372661da5c39437f7b84c1da381a6bdcb45fb58f07202c8,2024-11-21T09:43:10.230000 -CVE-2024-4591,0,0,02b00671089f1475af5d65328adb0cef9685079119c5a08df45d79cbc288cef1,2024-11-21T09:43:10.360000 +CVE-2024-4590,0,1,aa0918ed77dfc3ddcec6d1556b73a681b240159104e97d697d0433b76b41cc7b,2024-11-21T09:43:10.230000 +CVE-2024-4591,0,1,184bacb4e54ad95afdb1a5af398e77b53d2103206894b260e13aecd1e884c879,2024-11-21T09:43:10.360000 CVE-2024-45918,0,0,48580a666556a417453ad10009e9e6c09650ad8552887042735654a6c1d17b8c,2024-11-05T20:35:23.220000 CVE-2024-45919,0,0,556d242983a2cdf42d2c43810929509003333fff8369d850096346be8d6454a9,2024-10-10T12:57:21.987000 -CVE-2024-4592,0,0,39871dc6f19142e422b904bedf26bf20bbb4ce040b7b0c147e46a187e97ef1bf,2024-11-21T09:43:10.483000 +CVE-2024-4592,0,1,37d8cda339797a77b3d594515b690a2567c959526b965d19ea8590ba0c37b5b0,2024-11-21T09:43:10.483000 CVE-2024-45920,0,0,18cd7d843e95664f36e41d61ee16ead05ded8f3803935a54c34174a6fcfb09ed,2024-10-04T13:51:25.567000 -CVE-2024-4593,0,0,95a162ab8667321220f0edf914165848a939bd12c5a79011a4b331476d906713,2024-11-21T09:43:10.620000 +CVE-2024-4593,0,1,acf9410c836453eacd4b99e35c369063a63cdad3c46c8fc8e52c674f75abe410,2024-11-21T09:43:10.620000 CVE-2024-45932,0,0,d99580c15e1f4253b78fc8eade7af10b7af736f831e0b29b8ba22455d6a4f441,2024-10-11T13:21:12.003000 CVE-2024-45933,0,0,759d6a3e7435330ae5ac65a95fe1b2df4df43c6847bfcdfa4b0f1cc74b85e165,2024-10-08T19:35:19.013000 -CVE-2024-4594,0,0,4b34efcb6f4308752e9558541e1fa4f6d61fcc2dac16dc8a08ed71274ff5d952,2024-11-21T09:43:10.750000 +CVE-2024-4594,0,1,9cab146d667527180e6e10017b5bf5c9192d6e12221bf2b8ceff6110e4abf5c8,2024-11-21T09:43:10.750000 CVE-2024-45944,0,0,6d03dc18ef28caed77231477de7c6077e701a445c58ff0076d2d6f3df9c40ed1,2024-10-21T18:35:12.750000 CVE-2024-4595,0,0,b231a1aeda499abd5ca6b421976daa8f6f28396a16f8604bfd7dfec0ee9aca83,2024-11-21T09:43:10.880000 CVE-2024-4596,0,0,d9eb59275f90b642ecdd9ea0d4bcc770e66fe4d7b7c779875bb4504f4aafa9cc,2024-11-21T09:43:11.013000 @@ -266008,7 +266009,7 @@ CVE-2024-46054,0,0,ea04f3f8e16edda442709a7e528b23bf1b32148ce756ebc6055b7f37df234 CVE-2024-46055,0,0,2ecbec976f7a11e048b71b99bcd1a2b2515c490fb210532b75713cca9d5d2cde,2024-11-27T18:15:13.300000 CVE-2024-4606,0,0,efb59025d4d9edff921c42e826e018a201d0090d0d6626c386da644be50bec17,2024-11-21T09:43:12.187000 CVE-2024-4607,0,0,3fbc86af3054a713c72304e558427371fb55d0a3c5b757e7fbd2ba69e3403989,2024-09-10T15:03:24.710000 -CVE-2024-46073,0,0,f3a5f77cc62ed89d8144e731131c74a56c84369a1d780862b25c2ffe240daa15,2025-01-06T20:15:34.307000 +CVE-2024-46073,0,1,22fdd5390d19b1333aba0b9bc82d9a2369f96da02619462b22f8fd1b876f2bdf,2025-01-06T20:15:34.307000 CVE-2024-46076,0,0,533f845bcff4e34eaa5948ad05e882b3c3e66cc8bf88fa3e81a53d103476adf5,2024-10-10T12:57:21.987000 CVE-2024-46077,0,0,a5bc7bbcd6483a38f972ed0ac7afc6e2a47e42057f395fc853fcf78a91666377,2024-10-07T19:37:26.967000 CVE-2024-46078,0,0,325885497969c4ab975e485e79dd673f326fd36b09e5b7ca8211f68ed9bb4152,2024-10-07T19:37:27.763000 @@ -266048,10 +266049,10 @@ CVE-2024-46236,0,0,7b5402efa8af8d36f034a678c339a134167dfcac00261c63f07ca8461d45c CVE-2024-46237,0,0,edf91e19e8040a7af51513872bc3be6ebdceb66177f9157d729c7b8ec5e1e843,2024-10-22T18:35:05.180000 CVE-2024-46238,0,0,29d23fb8d92e8081613799e52d1cf111bedb1054a60c1ee2d7b7ebea94fbd847,2024-10-23T15:13:25.583000 CVE-2024-46239,0,0,039d008e66cebe4327bee95b97b4914de6b1e6cba80f55339b9918f2122a17b6,2024-10-23T15:13:25.583000 -CVE-2024-4624,0,0,b8449ff3b8e0ee2c88b4f6d45e1af5d82eabc4c0852145584765c0329d0b8432,2024-11-21T09:43:14.500000 +CVE-2024-4624,0,1,e0324c3ca4395e6d6fc79cd4969bf6dd7c9a77c44dd228691f150703336f5925,2024-11-21T09:43:14.500000 CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8af69,2024-10-25T19:00:20.737000 CVE-2024-46241,0,0,1f0674ec17f2d56b2953e5c99a2b749bf8e4230c80e89ee3aa315644015de064,2024-09-26T13:32:55.343000 -CVE-2024-46242,0,0,769195230f50897f071b58f9b4b54dec1834197fa3d9d04995e60de3195c248b,2025-01-07T21:15:11.783000 +CVE-2024-46242,0,1,278c5d74ca553d7a6ee7eea1c9d6c6283b4a956d21df9f54eec439967fafe153,2025-01-07T21:15:11.783000 CVE-2024-46256,0,0,e8ff1292d6b21c7ae8cc6b0452346dfd4818ec086d9a14227767a4b9e342f7b1,2024-10-24T17:15:16.690000 CVE-2024-46257,0,0,2e21e52a1504a13633477840dbd557e9ad05285ae3938c3634988f0489dcfd2d,2024-10-24T18:15:08.617000 CVE-2024-46258,0,0,c52e6b996ce625372477bea80c1b4801ac61785137225fc2e692df95afee475a,2024-10-04T16:41:08.497000 @@ -266066,7 +266067,7 @@ CVE-2024-46274,0,0,e8c90b6947c4da1392f83bfebd900cbdfed8c637485ec4663a2d105644845 CVE-2024-46276,0,0,5c8b43007df0585eb933909da61b8f47de16d68e8615bc06f0a4e02b0d57d1f0,2024-10-04T16:36:49.997000 CVE-2024-46278,0,0,4acb28cd7ebc7add3a20d70095d3ee01ce1590ae1dbea75cd2bdc6a0c3af99da,2024-10-07T20:35:10.653000 CVE-2024-46280,0,0,ab3566e0063e53ac2e5b5f7c85459fe370bba081cd349a76be524da46e7b1f30,2024-10-04T13:51:25.567000 -CVE-2024-4629,0,0,5a5e61d31c256268719f1bf927e70336c70971918c932b03b7c80bdb03a47e35,2024-11-21T09:43:14.917000 +CVE-2024-4629,0,1,251a39637b21bb7dfc1b06d2efb86be683ad7108e31cf9c5aaf3c8bfdb6f2912,2024-11-21T09:43:14.917000 CVE-2024-46292,0,0,6e543ec70c022ed438a1862317450c67dfdfcc236273b05b6735216c507a4b5e,2024-10-21T00:15:12.240000 CVE-2024-46293,0,0,cdf7dd89681d0833046aa5ad29cedff9aa2b895b26f1c28cbf443af5b95df8f8,2024-10-04T13:51:25.567000 CVE-2024-4630,0,0,82a11161e7dad25328c03408fa02b9b902b87dd7b721653ce57b8b6de91fa741,2024-11-21T09:43:15.090000 @@ -266147,7 +266148,7 @@ CVE-2024-46489,0,0,8af935ea59345c18a65a02a5934ad59e5a604855494058e15126d177378ce CVE-2024-4649,0,0,4d2745585cf315e835fe49b119863dc16ab23ffa6a0fb55c521fd42730ee3aba,2024-11-21T09:43:17.160000 CVE-2024-4650,0,0,e996a369330ff048d5d46394badf00f4a99aa8d6c43da1d218c2935f28245e26,2024-11-21T09:43:17.287000 CVE-2024-46503,0,0,4f133c90e139e687d3dd9079c4687fb4224dd448ab71bd78013c69a7fcf35624,2024-10-10T14:15:05.183000 -CVE-2024-46505,0,0,5c523d6875b198ca38ff85b254785b56a9cb84ac573f83c23f2c54d3ae278629,2025-01-09T20:15:38.377000 +CVE-2024-46505,0,1,f71409e4be302d5b28b815c936e10720530d03846915bcd778c9d6052dfddb94,2025-01-09T20:15:38.377000 CVE-2024-4651,0,0,304016477f2e0da8d2c810f11ab42c8694b0d1d56c9a6b57832c85592f3b17e5,2024-11-21T09:43:18.380000 CVE-2024-46510,0,0,e9a3205dddab0350f50c282da49e122f35ec4d8f62968fc04b06d0d1993acf5f,2024-10-04T13:51:25.567000 CVE-2024-46511,0,0,3a87227fab118194b35c27ec843f20409610bb66e9a3053a91cfd554e931eb81,2024-10-04T13:51:25.567000 @@ -266531,11 +266532,11 @@ CVE-2024-46972,0,0,e19d7ffbd835a75458fdf16b6890ed1469688eeb0b4a5070c87028b8ff0ad CVE-2024-46973,0,0,0437a0b4f343551c70c990e4fd559a1c21cac753a3df1f8e90ebfba823ecbaf4,2024-12-28T17:15:07.420000 CVE-2024-46976,0,0,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000 CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000 -CVE-2024-46978,0,0,5ad4a14bdb0dcc622f405a376b5dff5a37cfd5b77f4a078b27e4c7705de4bf3c,2024-09-20T12:30:17.483000 -CVE-2024-46979,0,0,490db2a65c2e0ed655ace5926e805008e6332771442746f4b78cb7ccfb47c4d8,2024-09-20T12:30:17.483000 +CVE-2024-46978,0,1,8cb25f9777f3da72a7e17ebb1025b8204e0c9f0cad9bc43c4f3e91460b0c6504,2024-09-20T12:30:17.483000 +CVE-2024-46979,0,1,293e38efa9bdae8b6a0e5ef1a6ee441d732d2fc2f9c954ebb81e8f4f232bb886,2024-09-20T12:30:17.483000 CVE-2024-4698,0,0,bacaa5816ca7faa95636ae2f271b15e227f011cc07694063c87ee8c589b1d9ca,2024-11-21T09:43:24.037000 CVE-2024-46980,0,0,af6abbb7c817e885585263f7e870b90d5eec39445973b747d025531199a9f9d7,2024-10-16T14:05:27.090000 -CVE-2024-46981,0,0,3d071f2e93f6888966fc9317d8c8d40f2dbb89b438b7b9029fb93d5df249acc8,2025-01-06T22:15:09.360000 +CVE-2024-46981,0,1,9f97b53b36e9c3ac951ece7b55b6aff6652a1d1dd051242b4e63209963e060aa,2025-01-06T22:15:09.360000 CVE-2024-46982,0,0,9aa3197a5a032dd5db5e6acfa0b57e6615cbf21fa2b1e4c18eb76df60b38a557,2024-09-20T12:30:51.220000 CVE-2024-46983,0,0,7c7df76ebb106f89e08b4c4d3e297d6ae1aae76ec1b5bc455bb05a05912cafa7,2024-09-25T17:46:48.927000 CVE-2024-46984,0,0,fc718e2faa8dd342e66acdcd5b953d439a3a729196f5ca9103e5d6e019d43a58,2024-09-25T17:49:17.007000 @@ -266742,7 +266743,7 @@ CVE-2024-47226,0,0,6a25a0d071ab5701a47d882acebc80a4d8b5fc68de099ea62782be7804f42 CVE-2024-47227,0,0,6f3ab8e4530635c45675163a95fcca820448d6a59b97a7e312ec08fa6e1adb85,2024-09-27T16:37:44.143000 CVE-2024-4723,0,0,4af091203745bd84c430d86c99d3eb1a1bbf42d9cd7d7cc786b00931c8615cb4,2024-11-21T09:43:27.393000 CVE-2024-47238,0,0,991ba9ead429ebc60cff80896403b8dada014219662ed81ab5b7c16db20b7ff0,2024-12-12T18:15:25.250000 -CVE-2024-47239,0,0,23694eaed33e97d6ea23d2c88972feb6555614c727521309731b03ea9988ee68,2025-01-08T03:15:08.413000 +CVE-2024-47239,0,1,5238aa82be099c5ad381b6d11e162e2bb77ed59c8034f9207290c75ff6c49120,2025-01-08T03:15:08.413000 CVE-2024-4724,0,0,cfaff446ce857d4884ca5d5aa97ad803d1f94867ae84d40ef51da0f69b75c51d,2024-11-21T09:43:27.537000 CVE-2024-47240,0,0,92a5dec476dd087df4961145c909b905b6c005bf5a596b1ea14c96642acb150c,2024-10-22T15:28:55.637000 CVE-2024-47241,0,0,b0d6175169ec2eb1b3cefb7c95304da9c64f618bd3ffbb076b6917f1b435ff01,2024-12-13T14:37:10.467000 @@ -266867,7 +266868,7 @@ CVE-2024-47387,0,0,c7bda230ed387b3a5e8a3302c0dd2e0a690bfa613a8307335761c5f8a12fc CVE-2024-47388,0,0,758c51fdaec18732cfb900475a403560931bd32506c62fbb2207642d3eb56ac1,2024-10-07T17:47:48.410000 CVE-2024-47389,0,0,eabda1865aa20b5bc50afcdfc3971a8275494d92b1cb9b6597fae9e3bd09426d,2024-10-07T17:47:48.410000 CVE-2024-4739,0,0,7b14c0aa87931fd19f500e5986f0b9cf9b632066d66dcbd2ac4307c74e99fb69,2024-10-22T14:07:02.023000 -CVE-2024-47390,0,0,d738f0c3283a40a8f6c8244c45a08e8f9645d076c423589db94d9379aff3c640,2024-10-07T17:47:48.410000 +CVE-2024-47390,0,1,cc63875e69f06d4c17e24abcdb338b4f6bd982a7482b6fa20c9c6090683f0101,2024-10-07T17:47:48.410000 CVE-2024-47391,0,0,500eb0e23f5ae3d06f662233d5d40aa77710641ba95c8d575dc20b70f2347927,2025-01-07T13:57:47.850000 CVE-2024-47392,0,0,7d93a3635e28232dc25322d9d02a74dbdc0712d524ee3084f036fccefe253476,2024-10-07T17:47:48.410000 CVE-2024-47393,0,0,228410e0daf6874cb668c644bc1c416844376ff82bc2ee46443d12bb91864fc8,2024-10-07T17:47:48.410000 @@ -266875,7 +266876,7 @@ CVE-2024-47394,0,0,a0040493a4339256d0c055721ffe7da5d10466a1db94b9e0e71b6b8311834 CVE-2024-47395,0,0,1bb947c2581bc5b0cdddabd963abdc1a3b1033f7495712457f47382960f59672,2024-10-07T17:47:48.410000 CVE-2024-47396,0,0,87d25ccb080048e8349758bc99d9fe3be10c922e0add195e0af639ec72573bb0,2024-10-04T13:51:25.567000 CVE-2024-47397,0,0,d6e33b579c6f3b98878c9c8af5ba33c7a8163496fd4923a2f333df46298539b5,2024-12-18T07:15:07.847000 -CVE-2024-47398,0,0,2bff61f7d70a92d0ceb99a66f744b8050565b00c57f665eb3e5990316a9f0fc7,2025-01-07T08:15:25.617000 +CVE-2024-47398,0,1,0e8500765dd23e95693039212d9342c839876f578954591efc256dea85968391,2025-01-07T08:15:25.617000 CVE-2024-4740,0,0,7752b92b77e605ff7518e19b7a1f8eb00ebf5f274219e7e50671031cca9d8ca9,2024-10-18T15:13:42.123000 CVE-2024-47401,0,0,1843fc3969dd105524932d791f7cb23585ffaa9a07fff3a19d42b3611152d674,2024-10-29T14:34:04.427000 CVE-2024-47402,0,0,5294b67f23b6e0be377ef33c2041b98bab989a32ba18cd1f6c0f3e64e01670d3,2024-11-06T15:26:23.290000 @@ -266985,9 +266986,9 @@ CVE-2024-47522,0,0,c02f34b0206a3beffa01319045412a788f423598c15fe9aabedbdbabe2236 CVE-2024-47523,0,0,c97d6eb97cc8d0172f2511cd438bb91b754c178ebc143b911ae3b2c8f936379d,2024-10-07T19:07:30.287000 CVE-2024-47524,0,0,e4d42d0b194ce3c0402a53054852a6593b27aa59e8071d3d2c032cd906d11934,2024-12-19T15:43:50.877000 CVE-2024-47525,0,0,364dacf60576b018309a04ebeec08c327d1c9e8981ee8174f648b489b0d4c3f6,2024-10-07T19:08:18.707000 -CVE-2024-47526,0,0,86d04d8cba87486a75885c09b4bfb191d63e912924182c96df9050cb3d19202c,2024-12-19T15:49:50.127000 +CVE-2024-47526,0,1,e6ef6575ae5b0a2221f8be4f9064116fa9427cd6f465c5030c61a805e8320554,2024-12-19T15:49:50.127000 CVE-2024-47527,0,0,1dcbf13d29fcb84d1e579a81ed4d69927be1c75466b6a541ab32ebdecfc8aa5f,2024-10-07T19:08:41.467000 -CVE-2024-47528,0,0,ad10c52396e96ba0df17abd5081aa48c683ce1514a93e4ed49486f9eb626497e,2024-12-19T21:15:08.227000 +CVE-2024-47528,0,1,3f65f733cd8300819c87671b1ca454309a088f113f11810e20e86a0a8dd55d7b,2024-12-19T21:15:08.227000 CVE-2024-47529,0,0,a9b0336ebc517e6b99f42e4f010d2f2e59bda66b9cdceae417bf754098135fc3,2024-11-13T17:15:46.543000 CVE-2024-4753,0,0,6cb88657cc9cdcd163d97950cd1c5e06d9e39da73171d051883e9b5e56df07c3,2024-11-21T09:43:31.570000 CVE-2024-47530,0,0,059f55f31dd2067533b59f87cfbe90b48f1215a28a9b34ee8ca800e201dbc5b3,2024-11-15T18:03:06.497000 @@ -267278,7 +267279,7 @@ CVE-2024-47819,0,0,1a39bf32e7c6b82a650954a5b0900e95e1d66c96c1e4e5b23991d0f535e5e CVE-2024-4782,0,0,69b6d7a01a2232b7cbf2c7215ed8752a1696f8fe397399bcac0eb145fbd6c00f,2024-08-19T13:00:23.117000 CVE-2024-47820,0,0,bfecf70d13c7a8f68f3c0cf587c2e722ee17961ccd2429ee24d46ee3b305c114,2024-11-19T21:57:56.293000 CVE-2024-47821,0,0,1ad5cc98b31fb97413a2af4b0b825f5fc2f8d897ba91f4430ae5ce2de36ae65e,2024-10-28T13:58:09.230000 -CVE-2024-47822,0,0,112867ef61321fd31839857c8845308750c840249de62ae63bdb48f078a1ee72,2025-01-03T16:31:38.163000 +CVE-2024-47822,0,1,92c6f57c3e90f75d3fc504f166ddbbe4b9ecd9f20fa8edf7413164d0cd32832b,2025-01-03T16:31:38.163000 CVE-2024-47823,0,0,336ac507480a6e31bc670e3eea63dd6c12b526e914a6141258cfa4b3d9c44b55,2024-10-10T12:56:30.817000 CVE-2024-47824,0,0,97bf5a27d2397e0f0377b54caf7f6a92074070c7778d6b1d1355aecbed8e7f6b,2024-11-21T17:15:17.650000 CVE-2024-47825,0,0,f2c70b114484b175f9d75f5ebb125aac926bd889413c3088b95d536b95e4823b,2024-12-19T15:59:27.760000 @@ -267364,7 +267365,7 @@ CVE-2024-47924,0,0,5e9fdcc1d6f6368ecfcd2003d54cc5c9ae067e5e908a91cef46fb2536076e CVE-2024-47925,0,0,e85657cf2064d6c6e6af79febd3acfb5604d99d861da18ed64400f723839f9de,2024-12-30T10:15:07.233000 CVE-2024-47926,0,0,484379ebe866d5f80b8df90be76850be47d4ff1695103f0fb6b101347d861dde,2024-12-30T10:15:07.380000 CVE-2024-4793,0,0,a6ca6dc2e5c47daa16d59954e19a82bf00c36bb6db82d6b1c1e23c1f1df319c1,2024-11-21T09:43:37.463000 -CVE-2024-47934,0,0,28f170d97bf8bc919dd16011660985c27c58b2ee0f6825b207bfb4f2474336ca,2025-01-08T03:15:08.550000 +CVE-2024-47934,0,1,c5ee21e51979d89f537acbabceb77f32a9e51b9036a475c6fa323918ce911a01,2025-01-08T03:15:08.550000 CVE-2024-47939,0,0,56807ff489784cf4fadb2e00da7b797597c1ced2e2c98f8bd3c06e8fe447a672,2024-11-01T12:57:03.417000 CVE-2024-4794,0,0,c8bbe767ad72c9235212e11271c46c761e04d6a9b46861dabd15f61ddf88f000,2024-11-21T09:43:37.600000 CVE-2024-47940,0,0,13d7c32b7f73c4e4fb7631fb34c565a5b9a53b3818e0802f4a7c760b1b5809b8,2024-11-13T23:14:54.567000 @@ -267467,7 +267468,7 @@ CVE-2024-48107,0,0,b5b8b343747520d221208e32b51858629d40939b404e026dbb08a7426b04c CVE-2024-4811,0,0,915f672b7f988abc754bd7b97d58f0edb23fd3edeaf5b2a0e3bdcdf831f36175,2024-11-21T09:43:40.057000 CVE-2024-48112,0,0,66b06dae67eaefbc5b4fba345a4c29b161777f09831586e1142c2f5b06f80bd2,2024-11-01T12:57:03.417000 CVE-2024-48119,0,0,baa21abf94b191e4316bf16893ebdf390866a932a6251e9efb907f2e6f573b4f,2024-10-30T14:32:43.217000 -CVE-2024-4812,0,0,a490e4b6d911638f9543834788bca429a9c892f573982270343459cdd9657899,2024-11-21T09:43:40.183000 +CVE-2024-4812,0,1,8ef04e2594d9b88fdf0c6c095b09aa229bb7a9aa44c0aa25b1242cac8134f5e7,2024-11-21T09:43:40.183000 CVE-2024-48120,0,0,b0e650c739b138b707281499471fca0d2a4e71d5ab6d1ef4874ee3da12eccefd,2024-10-29T20:57:53.360000 CVE-2024-4813,0,0,53589647721842c051dd9f712ddb32f92956eced2bba5aa7c708a955b3cd0fb3,2024-11-21T09:43:40.333000 CVE-2024-48138,0,0,1cf669aa62b7ce9fd297b61c1300f02586ab21a6411386c8391a654aac137760,2024-11-01T12:57:35.843000 @@ -267529,7 +267530,7 @@ CVE-2024-48238,0,0,3f2ffc614fa15d916232399b967037f846ea28604374a981ad0466971cf3e CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bdbd1,2024-10-29T19:35:22.840000 CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000 CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000 -CVE-2024-48245,0,0,7131ea275da65bf915f9243b9e4c8a536d1c22efe172cdad637796c446928e25,2025-01-07T20:15:29.750000 +CVE-2024-48245,0,1,aca39816c4fa40e3329fe946417f7ca9849849875505e3b3a53a29b06062021c,2025-01-07T20:15:29.750000 CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000 CVE-2024-48251,0,0,c80def3e238ed0fab4e8dad7bc06f5b33b90fcccea2cf3bdaafbfe1c7c4fb67e,2024-10-17T18:35:12.280000 @@ -267600,9 +267601,9 @@ CVE-2024-4845,0,0,e1e461ef60509dabf0e7e2dde808d36cb958becba4b5c88bdf30fa8f1c23ed CVE-2024-48450,0,0,2ad4bca80a954b5a64850267d64cde36a0cc73a58476afe8de69f997e4304a47,2024-10-29T21:35:23.350000 CVE-2024-48453,0,0,3e4df1eeae274bbab92d66627c425462f4715efda5653276293edf2b80192e38,2024-12-12T02:04:03.420000 CVE-2024-48454,0,0,9e0f8e82bd55ca3c8b98e816c5edf51ab830449d458f68194479be7d35927289,2024-10-25T12:56:07.750000 -CVE-2024-48455,0,0,a648d35b2f8e965b19a855c3cf0ba90eba06b6a31f91dba6390c9d300b4dd829,2025-01-07T22:15:30.620000 -CVE-2024-48456,0,0,fbb569fb57e72aec0b2b4128e6a8adfd90b8bb9238365e9a09eddcb2d6533a26,2025-01-07T16:15:34.867000 -CVE-2024-48457,0,0,99b77ae7cdd1ef223e036610bca59359991ba4db95d35fe9aa786febce4524d5,2025-01-07T16:15:35.057000 +CVE-2024-48455,0,1,7d16a6752881f9c2507814c64a467c98b64e570b5df68063a15b1ef3b600bc74,2025-01-07T22:15:30.620000 +CVE-2024-48456,0,1,5157f8dd26a6f4dec318ad8d7c80b2cd217ac77f0e9ed233c772d4f65ef0a60a,2025-01-07T16:15:34.867000 +CVE-2024-48457,0,1,d6eb8d01e509ef9b22dcdaa634f41366b40afb740c8dfe3efbec542dff95a537,2025-01-07T16:15:35.057000 CVE-2024-48459,0,0,f2ab7e7f3244c10dbfc979fa6bc201608cff2894282b5a96f254cb41fcce18b6,2024-10-29T20:35:32.737000 CVE-2024-4846,0,0,74d9cb500e6ec3c3eeaefc6b52bb41cb76c1e47820ff2b958b0158c620b5f565,2024-11-21T09:43:43.533000 CVE-2024-48461,0,0,18aa4511ff3360b386c9bf1fdfd51c3ed737ebfb483f16f5fc9298b5d999091e,2024-11-01T12:57:35.843000 @@ -267736,12 +267737,12 @@ CVE-2024-48796,0,0,af934df534ab75235e1b609d30ba8aaacbf70e231eca2b1d83bb7c56f7435 CVE-2024-48797,0,0,2110fc80ce6bc93f3409e41d3f07d7dd5f915b042535d12c80259e5f23c33e53,2024-10-15T15:35:21.060000 CVE-2024-48798,0,0,dadb9566d8b17c10e086a899d0bc5f2eefdadd4b8fe689e19e59e53466693f38,2024-10-15T16:35:14.783000 CVE-2024-48799,0,0,08708f80d6f8e09461b37a6e3d378feddc587adfbbfb6b6612c565f84b843309,2024-10-15T15:35:21.350000 -CVE-2024-48806,0,0,8e8ad2f8954d3df6e06c035f8b2c86f552dadf52151a01b5625256e5b1eddfb5,2025-01-09T21:15:29.190000 +CVE-2024-48806,0,1,cf462794c194cfb8c5dde4193d682250671e969bd2724c97bd5e93104c277eff,2025-01-09T21:15:29.190000 CVE-2024-48807,0,0,a763796bbe84709db2996b18e1ed107315b165fb8245eca95257cb100e85926e,2024-11-01T12:57:03.417000 CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000 CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000 CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000 -CVE-2024-48814,0,0,46471728da40407ff11123dfcb472e75a476a6005b270a33821b6c23b2956a42,2025-01-03T20:15:27.807000 +CVE-2024-48814,0,1,e0fd310be8f6c6c0398b3d476623ef8046cc307663b5065ef443208fabb22b0c,2025-01-03T20:15:27.807000 CVE-2024-4882,0,0,415f96cc42f39d5a62242781ac68568d1b60333c23c5a2a5227f986f314b970a,2024-11-21T09:43:47.037000 CVE-2024-48821,0,0,4896dd6ac80918ca5a6581c0f1374f01a9628402f48179089cf11ce291dadb67,2024-10-15T15:35:21.620000 CVE-2024-48822,0,0,118b043493af5b9e81bfea3d9d49d263053f84c00f596289e418351e3f2a583f,2024-10-15T15:35:21.887000 @@ -267891,7 +267892,7 @@ CVE-2024-49015,0,0,37529d5761af482cd0dcd51421f68e98bb465151b638153faae64c55d80d2 CVE-2024-49016,0,0,5ffa65cb14f197ed3c1b2c1c254c73267acc7dd4b0338af7dcfe63369c9e6c90,2024-11-15T16:07:22.397000 CVE-2024-49017,0,0,f43c33d401dc76077d08f945bc9ba920a4efa68901a1ba74f0f8247d99b9e7fa,2024-11-15T16:07:03.200000 CVE-2024-49018,0,0,ae7ed94fdc922ed650134e6ab80414a8ba590aee8ad96d58fefa968f494bcc69,2024-11-15T16:06:29.407000 -CVE-2024-49019,0,0,843647f8f90ac786c0a7f52167d5ad1708680de16d471d21015ae93f5cacb13d,2024-11-18T21:12:46.067000 +CVE-2024-49019,0,1,51d80633575b3651222ce228ac6f3eff23cc4c436add1febb1aae21bf5bba9c1,2024-11-18T21:12:46.067000 CVE-2024-4902,0,0,911ddf9902c4a6fad164d9b35cb427e99b0367ddb6da36eb88769e39c7047b11,2024-11-21T09:43:49.733000 CVE-2024-49021,0,0,6307ace2b764fb3bcaadf5b8f349375e7b79a2e73d5feba8d2f974b7854838d0,2024-11-15T16:04:55.487000 CVE-2024-49023,0,0,27afda74dc87c5b87ec57696c77daeb47321854c2cad0318414c8543eb0f695d,2024-10-18T17:01:32.803000 @@ -267907,19 +267908,19 @@ CVE-2024-49032,0,0,2e3ed76a18e7e440c4779b1b39efc25e7929e757a805c700d9f6cf42038a1 CVE-2024-49033,0,0,0b8161312cdfc9b642b95e25fdd7fb28f8da9471a1a685f531281e8315cca116,2024-11-16T00:05:44.867000 CVE-2024-49035,0,0,b8c5253f989db480a09b22c2721a40bec353954b7c849014eb3accde35704a43,2025-01-09T19:33:26.117000 CVE-2024-49038,0,0,d819cb8c436c8d1f23a8ef402cfafd0e6fa1953b75147b2b89c5ea3174acc4d3,2025-01-09T19:30:34.403000 -CVE-2024-49039,0,0,1b38f44a621b2ec6c9245d6149c0d2e4243dd86623a9535e85cd3047ada03cbc,2024-11-14T15:20:51.670000 +CVE-2024-49039,0,1,6122ccc781020872525f82a586569b8a8504ad241937f05f0ad5693192a0209d,2024-11-14T15:20:51.670000 CVE-2024-4904,0,0,8f1d8ea4c71693b63388d0102ac60b48cb8ea1f86873e76d3239d3cadf4cec58,2024-11-21T09:43:50.007000 CVE-2024-49040,0,0,5d0b4fb7954b8696818411a1e9fccbcaf7848a4d687b1b89ca1a2a3a7950420c,2024-11-16T00:05:03.997000 CVE-2024-49041,0,0,5aad01a38ad5836a29450000f7208eca5e1f415e92498e1c20ae71645dbb883e,2025-01-08T12:37:44.467000 CVE-2024-49042,0,0,8743867024ab3e89f3af6361330279cbb35cfe9cd54baf2d468c03c6c484face,2025-01-07T16:18:47.907000 CVE-2024-49043,0,0,37989fd57d6d886902b1161cbc445ed9dc49420e49ee7bdbcd84bf837df93d50,2024-11-15T16:05:30.773000 CVE-2024-49044,0,0,61fc818fe767bc9cc29166454a6588c5d1d52bf58babfe90898a89e53c1bd092,2024-11-16T00:03:54.977000 -CVE-2024-49046,0,0,b0aad407293d17e8d984623741bd55ea04b6e04629c13046891467cb593f4a52,2024-11-18T22:10:12.960000 +CVE-2024-49046,0,1,fa303d95babd4507ae3a79adf52721be1035f8d3e139e0f24c1eb099120e4eeb,2024-11-18T22:10:12.960000 CVE-2024-49048,0,0,2c8bc2708b66cad2499cc492932ede5905afe01e10258a40161762d2e33decf3,2024-11-18T22:09:37.927000 CVE-2024-49049,0,0,c510785dd30539d3724df912aa8da4b851ae582a28953b6446e9eb173c99b367,2024-11-18T22:08:03.687000 CVE-2024-4905,0,0,2b63ffdcb38fb304ee9705fa63cc828cd6e46febb41820e3a1c40a13d8aac8a0,2024-11-21T09:43:50.167000 CVE-2024-49050,0,0,1ca3aba40e7a6ba785e0e59d398d85984b6ad8076eb89bafbd8a62fb83eaedd2,2024-11-18T22:03:27.367000 -CVE-2024-49051,0,0,1a4c11022b4ef8ffb4e676126a8467f49f4fbe220c913e43f0c88e07a91fb5db,2024-11-18T22:23:46.893000 +CVE-2024-49051,0,1,7661cc84589a095bc9740e8c9d6010a12fed72232f528202af6ce5846e398c59,2024-11-18T22:23:46.893000 CVE-2024-49052,0,0,562a3afb9529893213b3c3a54ea9afa75634dd6a87e1e537d239e6b014ada48e,2024-11-26T20:15:32.723000 CVE-2024-49053,0,0,7d3d935c2cf119f79891fe57d31ce5c3db6e001c0aac2858fe6266c8800373cd,2025-01-08T12:37:15.987000 CVE-2024-49054,0,0,1cfc6e1b9daff4eccbd3f4eb039d3f29a00c732f02dfff3006c8c1d6493fc090,2024-11-22T16:15:32.150000 @@ -268001,7 +268002,7 @@ CVE-2024-49128,0,0,61f3b1f2b27917537450570d46559cc1ce4522b278ac0335f6e925ad4b1d2 CVE-2024-49129,0,0,223570c167f433a4c02faf3f31e73eada47d15eb94c282b8aa1bad95d88ddac4,2024-12-12T02:04:40.023000 CVE-2024-4913,0,0,8f1077ca1f909bbf49b8f2a274026fe5a87623cec281204da7efc615ad191bc7,2024-11-21T09:43:51.293000 CVE-2024-49132,0,0,be2b2e04b47664c09047c5ba81c591f625835bce2bac2dd85f81eca9dbed8d65,2024-12-12T02:04:40.163000 -CVE-2024-49138,0,0,4fa7975557e7800bb8a05fa2d0fa696b3905dbd52a6337f5959412513125fefd,2024-12-13T18:09:53.140000 +CVE-2024-49138,0,1,286dc37677622c63dcdad4f86c15d7e8b98bbb3aa097b7516a11d8c38b7b5d16,2024-12-13T18:09:53.140000 CVE-2024-4914,0,0,c1e4acb17def81a0854cc115da953100335e1c8f9a391685fb384320f3256d4e,2024-11-21T09:43:51.437000 CVE-2024-49142,0,0,0749a500a57c88fc905121d494880b9b10db7a198a004c0881a5436a2a5dd05f,2024-12-12T02:04:40.460000 CVE-2024-49147,0,0,6fba53ba9d6b385fdc5b31747e6fa75096746742b3ab2cf525cf8f2b1550ed5c,2025-01-10T18:09:53.377000 @@ -268031,7 +268032,7 @@ CVE-2024-49219,0,0,f1d68eec1c9ab3e09b8cbb145b6b08a53ad6423a21f950f984e7cee76ad18 CVE-2024-4922,0,0,bb9a0aa233bf80c6bc7dce5e0ab23357e07cb196c0e6896cf35d102b17579ad3,2024-11-21T09:43:52.600000 CVE-2024-49220,0,0,faf07abbc3d041986f9dd5add34f86ec4149aba235d59cb64d0e41accd37e636,2024-11-06T20:41:13.367000 CVE-2024-49221,0,0,d2fb02495e07f2419889499bb8b5df57c5f20f0042cb9376e70fe86de15e4577,2024-11-06T20:54:50.527000 -CVE-2024-49222,0,0,d60a32b594cb99ce5a4273de2f0263717b96905c6a8df2bd184dd56f9a9081d3,2025-01-07T11:15:07.080000 +CVE-2024-49222,0,1,367662d9734bb0906b72311c2b44c1343dd51857945fc4f1b85a1ad7612de976,2025-01-07T11:15:07.080000 CVE-2024-49223,0,0,a7d176a598c283de56521e3b710f4184e7490e998a47d606d989d0c6c315905c,2024-11-06T20:55:37.613000 CVE-2024-49224,0,0,75840cb7ce6f3bb64fdc7339d09a00a40cf89f51439ca3235d36e0b239d0e9dc,2024-10-21T16:31:21.593000 CVE-2024-49225,0,0,90650671372b1f8039d786d35158c69ffea32c9f90c78144024b2dea1bb85078,2024-10-21T16:33:00.403000 @@ -268060,7 +268061,7 @@ CVE-2024-49245,0,0,e8e8d148ba2622c6de7907cb96750bb4941a87354e433710a753f01ebd1fe CVE-2024-49246,0,0,28e5162107791ffb37238aa3ac873351ab857b8f3ab6fa2ad94faf103ac85423,2024-10-18T12:52:33.507000 CVE-2024-49247,0,0,d2ac676e81ce462e72e2813cda8fbe63034693433b246cc39508427218855573,2024-10-16T16:38:14.557000 CVE-2024-49248,0,0,f291e52f81f78f3237f2d2191f793b757979f653d407498c9c343b86e2c909c3,2024-10-18T12:52:33.507000 -CVE-2024-49249,0,0,d05f86b34e3155a9d70dff4c1e7fd1eb4d8e81d7f18a9b5d78af4b87bfa4550c,2025-01-07T11:15:07.243000 +CVE-2024-49249,0,1,b4f4a6a9882921834b62022cf34aba2e4a3c61cc277540649baccabdc92c287c,2025-01-07T11:15:07.243000 CVE-2024-4925,0,0,e0c35c24ae94fe6f5c3ab83c42fc1a3e6327502f935d5eebb867dcc0eafe594c,2024-11-21T09:43:53.060000 CVE-2024-49250,0,0,43e64ea5aa7f096ad91e13517936d197d803fc23a811330d0cad77bbf1cbd01e,2024-10-22T18:44:20.297000 CVE-2024-49251,0,0,c2064b8e0d36ff12817e191223dd1318e55cb1f4fe3be4332ab398f5a6dad8e3,2024-10-16T16:38:14.557000 @@ -268109,7 +268110,7 @@ CVE-2024-49290,0,0,96e76b27a181dc096cfd832ba5b2be4d826e178057417e0d837c9408f6a4c CVE-2024-49291,0,0,249dc671b72ac546a6c5c29c6da882835446fe95844bab5700ec27796ce85169,2024-10-18T12:52:33.507000 CVE-2024-49292,0,0,4d7f035bdbc17c54c66913bbb4437e27e133be56065732023f8dac91223c3b43,2024-10-18T12:52:33.507000 CVE-2024-49293,0,0,2d53402d532cd283b635562c0a1d47cc207eea6245a05010c9022145b2413c0d,2024-10-29T15:07:39.407000 -CVE-2024-49294,0,0,4db861ceda8892c163391392bd056e4d157099f65b9e650f49b7871acf4315b9,2025-01-07T11:15:07.400000 +CVE-2024-49294,0,1,93d4db74b4f77bcd1a4525c7c80b4b37436a519667df0c47a3e499278b0371de,2025-01-07T11:15:07.400000 CVE-2024-49295,0,0,93cf95834b6245279ffc7131566626d99288891705acd63ad80fc783ba87c120,2024-10-18T12:52:33.507000 CVE-2024-49296,0,0,f284461b2c629099a66bbc96fd2d4da6cf3b98ef4116d3463b0ca9af7265634a,2024-10-18T12:52:33.507000 CVE-2024-49297,0,0,f192074d26b33e0d5f10cc1f854aa454ad790ff37de6ee072448709786ed06dd,2024-10-18T12:52:33.507000 @@ -268242,7 +268243,7 @@ CVE-2024-49509,0,0,15e897a9631a64e5146680986f3191fcf788babf34f3f0ba79ae3fe2c381d CVE-2024-49510,0,0,5e39a02e4fdffae2c7a663bfd00500c029c1db2acc5c0e5406cd285743c01041,2024-11-16T00:35:01.073000 CVE-2024-49511,0,0,1ccfa6e8c66c4ee14d0fcfa1d4c2c0cb523a129998f43db64fa514a90d65cbbe,2024-11-16T00:34:33.607000 CVE-2024-49512,0,0,a84d30bdef56eee22b653ecf431eedca8d6beb3b76f7aeffe4966ed165543146,2024-11-16T00:34:20.890000 -CVE-2024-49513,0,0,c64d3775249227cb6feeaa2f514c265fa7c3e3b42d87e7341eafd3a185da69ff,2024-12-19T17:15:33.163000 +CVE-2024-49513,0,1,e9e1c475f471a905f15d99f98a666aee75885d3b41963cbca0028b6f047180a6,2024-12-19T17:15:33.163000 CVE-2024-49514,0,0,49167289c5b9d01fc885a7ca0339bf6627a9365daa3fab2d195910d5101cdbe8,2024-11-18T18:06:39.030000 CVE-2024-49515,0,0,79d1cd1b41e183c3a6d8383ca22dee59ebc2441ad64ca67571e15c6d3f39714a,2024-11-13T19:14:24.320000 CVE-2024-49516,0,0,44da5d94482e4b65792e0d29a7ef15205438256f74e207e521457b4cb0fb7589,2024-11-13T18:52:31.573000 @@ -268300,9 +268301,9 @@ CVE-2024-49588,0,0,c0da3a5f349cd3c67a8d63a4235e951da64ca910546e63aa78047573574ef CVE-2024-4959,0,0,0b1acb96710cbb6b752fcc1086e21a77c5901c1eec006db8a6dce25dccf4805b,2024-11-21T09:43:56.943000 CVE-2024-49592,0,0,2c7b7fb1be7fc5fd754e82efd0fe5851f47e43e4cc7b8ec1fd6fcc2811eb81ce,2024-11-27T17:15:12.093000 CVE-2024-49593,0,0,20effb99bee61641edd5d332c453463760e6d2b9681276cd06a2523441d82150,2024-11-18T19:35:04.960000 -CVE-2024-49595,0,0,e715f11d06335e1e17eabc9d1389200984cc96f59dfba7f7efb6cf9c5caa01cd,2024-11-26T03:15:06.093000 -CVE-2024-49596,0,0,c44795f05db0c2cd91772588b447c01a2c3f26201ecef137956772ef71be6633,2024-11-26T03:15:06.570000 -CVE-2024-49597,0,0,c7a0a5f566843e9934d19b1faec35a3f6bb311d359ef0fb8d2db7b87219648cc,2024-11-26T03:15:06.940000 +CVE-2024-49595,0,1,9dcdc489e7a905f34699c5abdecc55ff874d971fe6cdab5a7a9c940438c71a88,2024-11-26T03:15:06.093000 +CVE-2024-49596,0,1,59f12ea24b85efe99582dbf4c7f368ed8daabdccd27b8888a507afdb2350be78,2024-11-26T03:15:06.570000 +CVE-2024-49597,0,1,289d210e1a84097417043b17841d88b0b7b70db3c7b49297de7f69e637bfd782,2024-11-26T03:15:06.940000 CVE-2024-4960,0,0,cb9d437153604ad93bb6e00104a9b56bfe5e254dbc3e337bc4ad4c4807dc6043,2024-11-21T09:43:57.130000 CVE-2024-49600,0,0,7dd36af0562a7a3e2c947fbaeecc47c0db101134aaed1a6fcda1c993abd4a7f3,2024-12-09T15:15:17.387000 CVE-2024-49602,0,0,ce2881877ef434cea49676d9552515f35e1e7fab160d8c28c4447d4378779323,2025-01-09T15:43:39.177000 @@ -268339,7 +268340,7 @@ CVE-2024-4963,0,0,67dca6c290c51e1f929d7f3dfe0d3ba90537d5b271cac6a81972486d8287b5 CVE-2024-49630,0,0,5d5212a4fd00a4480462df1c38eaafc5b22d0dc97c9520d614d873afc7d0c32d,2024-10-23T20:44:41.857000 CVE-2024-49631,0,0,45a5e9d1057a3cd6c6ba6f2dc4f5984c91f22b07b3b9e1857d79de0901c3fd83,2024-10-24T14:12:59.600000 CVE-2024-49632,0,0,e5b03a135dc094c1402ff0134987cbfd694e41138079093acfca549c8329b68a,2024-10-31T16:31:51.467000 -CVE-2024-49633,0,0,00a061be0a48c4614726083d9d5c55dc3f72a4983fc45f14a59137e8b5feab10,2025-01-07T11:15:07.570000 +CVE-2024-49633,0,1,20aa7ba185077e95d0d7cd0d38e590c6275f74d99d7b01e008fcb7c1ea23b8ab,2025-01-07T11:15:07.570000 CVE-2024-49634,0,0,cb7ee19cf65dddead09be1c930a4fd93461242ccf257a4be3d49b56c45adfb5b,2024-10-31T16:30:35.667000 CVE-2024-49635,0,0,102de38d0812458f9f1fa982d39e2d1f0a5efb2957fbe85ad59acb8ccb675690,2024-10-31T15:27:24.033000 CVE-2024-49636,0,0,dd794c9b19923ed176790bc43ce11d5d0ecabc98357844277c9ed12de654e3d4,2024-10-31T14:51:06.170000 @@ -268351,12 +268352,12 @@ CVE-2024-49640,0,0,4c180b38360d895b5529c0cacd80ee0efdc50a74016f2ac30c77a9804d51d CVE-2024-49641,0,0,dd5f63553226575656eaee9a4082903c9d17af8bd8e4a3679997712e65a5699d,2024-10-31T16:05:44.353000 CVE-2024-49642,0,0,d468295557b49fcd0885ad53f4d4a9e1b94d606c40e4bf5757f7b7c473c0095e,2024-11-07T20:59:18.593000 CVE-2024-49643,0,0,ed3b1be7c4b1861c3a8d1896b7e215b84bac778f41b48aa929c6b742a8d02889,2024-10-31T18:48:20.883000 -CVE-2024-49644,0,0,2727f04955d4a6e732b3b9da581941a731d807ba5bb670e6b1eed421e447cbb7,2025-01-07T11:15:07.740000 +CVE-2024-49644,0,1,829f461f4de6ca5d08d168acd395c830ed2c7a5a1999dc0f6513eb8561524626,2025-01-07T11:15:07.740000 CVE-2024-49645,0,0,225bbc01d1af09c9b0cd04013457b91bb7bf182d8b2faf2ed65f9008d687df32,2024-10-31T17:59:25.867000 CVE-2024-49646,0,0,5ae2cf77cf761a2408e25a9079b81f0c710751cca666465e6c546ad44f9d9669,2024-10-29T14:34:04.427000 CVE-2024-49647,0,0,728c1c9e03d4c2bc3debb0722129144c88b82a7f2fd74481d492b7a7939dcdda,2024-10-29T14:34:04.427000 CVE-2024-49648,0,0,2d0290252441f267498bcb004235c498b429b43c6ed6a20da0adf8a057fb4505,2024-10-29T14:34:04.427000 -CVE-2024-49649,0,0,14abf7cb0affda2bbce3fb806c5b49faa37727206b711f6e68daff65bfbaa9cb,2025-01-07T11:15:07.897000 +CVE-2024-49649,0,1,553fd47dfde6fab994e9adb470977662275a67107834694bc7b12dde8ddccf12,2025-01-07T11:15:07.897000 CVE-2024-4965,0,0,3e9f3a5683542d0f872185bb7cd9d74f67d4aad7a54eb5c75ee0939651d20c21,2024-11-21T09:43:57.867000 CVE-2024-49650,0,0,957bb63482c3b8d31b833ced44fc3b066a055f77165a90d58e6b148446915af5,2024-10-29T14:34:04.427000 CVE-2024-49651,0,0,eff1cce374eeb20a6db75a05fbc6ce94258af07964e7154f22db427d876203b3,2024-11-01T16:39:52.677000 @@ -268395,19 +268396,19 @@ CVE-2024-49682,0,0,1be8ca92696fefc2dbcfcb6321a4e4bba71eb7e99599246dbba19a2990e0e CVE-2024-49683,0,0,7be9ea3f510dbaa7fe885cdcb7745560fbc269f7e9bd22850dce90772b3593dd,2024-10-25T12:56:07.750000 CVE-2024-49684,0,0,36531d7cf4c7a4e38f6860bda9ec7c0d48195d2fcc27ad0578736763df8ccca2,2024-10-25T12:56:36.827000 CVE-2024-49685,0,0,caea3f86fb77aaa3e3026aa8a74adcd66d73ae057e76042ddf5cfe89f39cb8d6,2024-11-01T12:57:03.417000 -CVE-2024-49686,0,0,baf3410882df63d208e14e8da911b60bccabfd65db7e6f4f0541f590e65681d2,2024-12-31T14:15:23.137000 -CVE-2024-49687,0,0,c99a1d34982930167efc7c8eeffc090d87582a2db0c6c3b9c22ca4216aefc81e,2024-12-31T14:15:23.430000 +CVE-2024-49686,0,1,1648efd420dd9feaa12bda71d4c28e07c0afcf094efff0cfc461507ecbd2e840,2024-12-31T14:15:23.137000 +CVE-2024-49687,0,1,f3e38245690627a2452025d02cff1519f25509e656e89abda20c64ecd5ee7193,2024-12-31T14:15:23.430000 CVE-2024-49689,0,0,5b95dcb1b308ac9918618c653b8d612d05dba2416c0a5caade9d4ff079c39dcd,2024-11-19T21:57:32.967000 CVE-2024-4969,0,0,590a42a007878875f8821a8461ae21649b587614d8fa87d6d7abc856a4793907,2024-11-21T09:43:58.430000 CVE-2024-49690,0,0,e7d1fbeec3ae6b3b41207427caf7ef895bb3e2f53a7a24c5af615a4c19bee7df,2024-10-25T12:56:36.827000 CVE-2024-49691,0,0,2f3c33899873b4bca45696103bf1bbca6b35f2f5e193db4c70c0b540bc208ed1,2024-10-25T12:56:07.750000 CVE-2024-49692,0,0,63f1db65001fdd89311c7274cad5fd7c03efa214b1be9bf8dfe49d3d0c423ea9,2024-11-08T14:55:56.947000 CVE-2024-49693,0,0,44d78874f13d80a90e8b1d3381135df2d470fd44cf95ccececddf651f87dfe70,2024-11-08T15:19:50.400000 -CVE-2024-49694,0,0,5cd734cb3f409957203e4b60359c65820f491cf17de2681eabeeab61e2241d30,2024-12-31T14:15:23.567000 +CVE-2024-49694,0,1,0d6f13ba9d257598e8b2ef9ba3d33dc447bfa87d7e595941924aca91bd604a70,2024-12-31T14:15:23.567000 CVE-2024-49695,0,0,83cd58e8b597dad6e6c36cfc6ae43f6a32a1a4af5eeaeb26b9996a7c576928f1,2024-11-08T15:20:33.257000 CVE-2024-49696,0,0,527dc628015bfd53942eb90e4ad813b4a45b3c729bd97fce7834df7a63766ec9,2024-11-08T15:21:12.533000 CVE-2024-49697,0,0,530eb2f42eba87aaffb73d54c4b9e27dfb5194483cfcc3edf311ece4f08a0142,2024-11-19T21:57:32.967000 -CVE-2024-49698,0,0,6f47d48c68a0e3b0db47bf6ddd0912ea2b9039f0abbd1ce724c1624ed59195f3,2024-12-31T14:15:23.697000 +CVE-2024-49698,0,1,0da674ff14e9a1aa3e4bc23d228b70f80e183926d4686276e19237b19658e09f,2024-12-31T14:15:23.697000 CVE-2024-4970,0,0,ceae782189e36ea72b2794d871ba0e98c5d8d6d33670b120902bfb4e771c4acb,2024-11-21T09:43:58.627000 CVE-2024-49701,0,0,faa8cd67d7f87e8b700116e3ea01c26a0bace35a674e83df64e802c479757838,2024-10-25T12:56:36.827000 CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944713,2024-11-08T14:32:56.010000 @@ -268429,13 +268430,13 @@ CVE-2024-49758,0,0,f891ae0ec5c7895deabc0eccebd3e73286a9d9fd4354848fbc41505bd0bd6 CVE-2024-49759,0,0,610a4e9f5af24f6dcf0d77f64b6089eb7684536e8fb10bf2683f8d4527857243,2024-11-20T14:40:17.500000 CVE-2024-4976,0,0,16bd07a57c5dc4ac4f14e557fadcc8a28548e360e7369bfe14dca9926e162c22,2024-11-21T09:43:59.473000 CVE-2024-49760,0,0,75841761dd5df70a4ca6c3e394f7ea6839399355b25f53d5f5cc9d4a1b4206b8,2024-11-06T15:01:01.013000 -CVE-2024-49761,0,0,2a9c84e1993360f8869c44a6d1fa9145d33a380330bc27b195f16f2f6a7e64f1,2024-12-27T16:15:24.890000 +CVE-2024-49761,0,1,74c9ed8af3a70d422dfb6dc224418808179b97cab54a609db7fba09a6e58be38,2024-12-27T16:15:24.890000 CVE-2024-49762,0,0,8bec7a982a398dc7244cc4fcff8a6228db9aa548054deba17633d09b61bb84ad,2024-10-25T12:56:07.750000 CVE-2024-49763,0,0,706ba0a589607648882ee8e4b87865f557d35a41cb0b61901470810e2b3915c9,2024-12-02T17:15:11.830000 CVE-2024-49764,0,0,c58346f4b08915617a12907bf094ef531c309d79e272f856d128e79e546c89b5,2024-11-20T14:40:02.630000 CVE-2024-49765,0,0,b68d1a7945aff20278a07b001b0032d854976d5707d75233c87015e76cd3df52,2024-12-19T20:15:07.143000 CVE-2024-49766,0,0,09878bc15547b8ea8c991b180fb5531466edf7355b9f0fcf6e42430735da9ea0,2024-10-28T13:58:09.230000 -CVE-2024-49767,0,0,28abcc77613c3a46de37b57fc714334852e74c3d51debe74df89f7a3f916a0ae,2025-01-03T12:15:26.257000 +CVE-2024-49767,0,1,cb728aa6f1f66bb7ae32512afdc2eb0e134661b75b86eb2b6c7d233d085b5195,2025-01-03T12:15:26.257000 CVE-2024-49768,0,0,f42149a947b9e6a9df44e097df1a7cbc9a84f232e5092fba26854faae247d400,2024-11-07T17:28:02.853000 CVE-2024-49769,0,0,236a5de10e245676abd4e56a87000acf7227e0ad3f0804fa300b288d259df1fe,2024-11-21T09:41:49.443000 CVE-2024-4977,0,0,026eae4d797999c87edd6a0a48d5f155eb66afb40876322e42b1c71fd25c420a,2024-11-21T09:43:59.597000 @@ -268449,6 +268450,7 @@ CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750 CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000 CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000 CVE-2024-4978,0,0,201c9e11d7966e2ff18e4c4242d116c7a008068b070b2496c2220d3d01e21eba,2024-11-21T09:43:59.780000 +CVE-2024-49785,1,1,b20e0551fda42e1e5e7dea2f4591aeb4fedcb85283371b5abc392097d1265651,2025-01-12T02:15:18.973000 CVE-2024-4980,0,0,323b998d90112310b6dbc550d0fd2ce6571acbfdf9fd80fd9aad030f5e003b0f,2024-11-21T09:43:59.940000 CVE-2024-49803,0,0,3d17c64dfa44a309f0956e2f80441fab8adbfd788223cf7d4d00fdb1c300ae97,2024-11-29T17:15:08.180000 CVE-2024-49804,0,0,9f69c0555ffa5cee4c9737c951497d9f13a0a16cf2a7c81ab8b24b57fe9013d8,2024-11-29T17:15:08.330000 @@ -269241,7 +269243,7 @@ CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4 CVE-2024-5060,0,0,774ede4fef00eaff2622d378b43e47e362f56e93e6a9ac286796581c1618e627,2024-11-21T09:46:52.847000 CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000 CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000 -CVE-2024-50603,0,0,b35246cd3f373780f0f033d9f431a8a5a217d06e4ba9f10d63eb2890ee470fe0,2025-01-08T01:15:07.127000 +CVE-2024-50603,0,1,8a47f70f2f8aeea4f201e673bd32873975a8414c42dc76902ee2c336df65852a,2025-01-08T01:15:07.127000 CVE-2024-5061,0,0,9654397355be6aedfaab6f6a3d8afb7e3d2327090cc58e5161ccd13e41cf9460,2024-09-03T15:11:56.787000 CVE-2024-50610,0,0,a6949359060222ba84619cd69ce2c024dafba181530f6c2f1bcffd979ed6b752,2024-10-30T19:35:30.033000 CVE-2024-50611,0,0,b9620b3c83eac2420d030761399b3b8b0064775db1dd093c666a92cebb22685a,2024-10-30T19:35:30.853000 @@ -269273,10 +269275,10 @@ CVE-2024-50653,0,0,c3c2eb452e8edda9530908359ecefe1b49303fe46316e9194f74a85e37342 CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739ca92,2024-11-21T19:15:11.113000 CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000 CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000 -CVE-2024-50658,0,0,73ac0501aca90b0d1c994980db41c5a58be35ef1940a0591e3d997dcd72d43f6,2025-01-08T16:15:34.413000 -CVE-2024-50659,0,0,435d0e21d7616ff9ee8745b77d1c306c5b9d1a2f4b510cc7aca05f20bf5253de,2025-01-08T16:15:34.597000 +CVE-2024-50658,0,1,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2d18,2025-01-08T16:15:34.413000 +CVE-2024-50659,0,1,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000 CVE-2024-5066,0,0,0791653545be3944782f3bdc7c1ab3604d2c7f0fab82f79e00981952033549de,2024-11-21T09:46:53.670000 -CVE-2024-50660,0,0,e65e3c5244699be332549a6d9ef31cecda7ab67b207af15130a73859b07f2160,2025-01-08T16:15:34.817000 +CVE-2024-50660,0,1,f71f8e7c2fcb36b53cf871d625509d1de985a324b433af36346565606f116252,2025-01-08T16:15:34.817000 CVE-2024-50667,0,0,2acba17bb6b4eea051169d8d69b68e53449d255d2507f74a89d880a87e24dc78,2024-11-12T17:35:12.270000 CVE-2024-5067,0,0,1b5c70fd6aa8a713385c4f1e29f8c71eeaa98648b5736e6e39376f75e3abb922,2024-11-21T09:46:53.810000 CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1a9a,2024-12-04T17:15:14.860000 @@ -269295,7 +269297,7 @@ CVE-2024-50716,0,0,ff7139747070d1865bee3e35d9818a32b6c31830627003594b66b97e8ce57 CVE-2024-50717,0,0,11fa2afbcd3540c8ea3fc4871e24ced6a1f1f3bff6d82e6a5d9acf86b4274a63,2024-12-28T18:15:10.210000 CVE-2024-5072,0,0,38bd8ba0572ad544e5273dfb8f5f6bfba13772caa98624367620d218345874da,2024-11-21T09:46:54.310000 CVE-2024-50724,0,0,6e4d1b405e7d4d8af96a4ce9056390bb6e194678013e22ab1b6431ba706461bd,2024-12-03T17:15:11.820000 -CVE-2024-5073,0,0,3db02993c22a514df0b86a1b6a0a6541debcfad8c13c8be6691b201564ec2c0b,2024-11-21T09:46:54.480000 +CVE-2024-5073,0,1,4251c7ea95603f225da6aa76d27216bbee1d486d1326385bf8d8eb19c22ca3fc,2024-11-21T09:46:54.480000 CVE-2024-5074,0,0,300fb8a2ae76071163fb30d885721444a084ca820de7e72b30304998ec6beaa3,2024-11-21T09:46:54.600000 CVE-2024-5075,0,0,c82cee15f5595db5c0526fc43338a3ff626ae52b2d5be5de40d2fc2c435a85d1,2024-11-21T09:46:54.773000 CVE-2024-5076,0,0,284618adb04db008f22e271ae9a9f2760662684738af47c0a5e9fac65d18374c,2024-11-21T09:46:54.940000 @@ -269452,7 +269454,7 @@ CVE-2024-51093,0,0,a6898e879de35c8cf2e460ec5a84ae7f0123df10aa875737ef5d0e250287c CVE-2024-51094,0,0,9c0a3563e2cbfb0f7e4111937c25ede7da4801ccd5cc0469207158910b8a9299,2024-11-19T17:35:14.493000 CVE-2024-5110,0,0,fb15a6e8ac3918d54232e697045ba8a0a4f2778f988710aceb135278db14c8a7,2024-11-21T09:46:59.470000 CVE-2024-5111,0,0,16553f7e015987eac3af34fccd670274f33dec3aabde04972879226d81661f96,2024-11-21T09:46:59.603000 -CVE-2024-51111,0,0,06fdca48d9f713ba11aa0605dc978b93849ded746b605b0da33a035e037b1411,2025-01-06T18:15:20.060000 +CVE-2024-51111,0,1,1b60f534839740b969e5474b088b0887cce9ab6321e3570e84fbd1d3290a378d,2025-01-06T18:15:20.060000 CVE-2024-51112,0,0,fb9ec1f188e1020f6eea6a788766268b99f0b03f66304006a370bc6367d7b8dc,2025-01-07T15:15:10.270000 CVE-2024-51114,0,0,bb120dee5f82301bedd52f6a870fc78612d9b471bba9079cbb07365933b729b3,2024-12-05T20:15:22.340000 CVE-2024-51115,0,0,97924e30f339bc462ccaad1ee3c55c378e15485436cb0bc88676f0cde030376a,2024-11-06T18:17:17.287000 @@ -269577,7 +269579,7 @@ CVE-2024-51431,0,0,828fd39fe0bf7bfec25d83e9c0a08cb7b9c4b5cc6704676ba7781e14660e7 CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000 CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 -CVE-2024-51442,0,0,35e63d5f1781e450c7e8c0c28531cca65bad128d0eee09f5a8d21bd8b9f8ce4c,2025-01-08T20:15:28.137000 +CVE-2024-51442,0,1,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000 CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000 CVE-2024-51460,0,0,0d1d0884deead80ce10e102d7fe3745fd378c1bb1816cc36f4177c2f9263fd37,2024-12-11T13:15:06.510000 CVE-2024-51463,0,0,c0364c05afe1e0b2d0890e7f96c1b512b7afe4d3c2862d4a930e0585099ce1e6,2024-12-21T14:15:21.453000 @@ -269587,11 +269589,11 @@ CVE-2024-51466,0,0,1b90c245992e2f466d154423146cea90d99df5f3b80547b5f6626d10019e0 CVE-2024-5147,0,0,b4fda03873bf91b8aee1014c1d03851aae8f0afeab0edb3aed7529ff221065c3,2024-11-21T09:47:04.057000 CVE-2024-51470,0,0,e89d5ef183a7d29ac11af41a2499db74df261ac8afb07d8bd5315410d8114abd,2024-12-18T20:15:23.233000 CVE-2024-51471,0,0,124b7b8875d261820d9fc9a3eefcc2e273bec0e6de9ec2bd5f9981a02008418a,2024-12-19T18:15:23.153000 -CVE-2024-51472,0,0,7bdead71249065fcbd818917368b77d15bccf70ee70ae6963c84c47575e93634,2025-01-06T17:15:38.517000 +CVE-2024-51472,0,1,383592ce066249eaf90c5ccf0da1c59ffdc7b2d0dfa79918061e411cf4d4f00b,2025-01-06T17:15:38.517000 CVE-2024-51478,0,0,f0595ed35f1f283d907e9d623fdb50e27981165a57dcab6e98c75f63ec12b3b4,2024-11-01T12:57:03.417000 CVE-2024-51479,0,0,cb129c5fa9252110468d8449b172cda17bf48af7dcff3fe804fa3e07241cca0d,2024-12-17T19:15:06.697000 CVE-2024-5148,0,0,f40c04de71d66c8857441b50b10a14db507d29d1691198e2bceac6bdc772cfd5,2024-09-03T12:59:02.453000 -CVE-2024-51480,0,0,5634664dd484972b7bc5443f022bffdd8950d35587589d61dc205a04a532d21a,2025-01-08T16:15:34.993000 +CVE-2024-51480,0,1,b9ff22316ffbef40d27379f77d6f7a886399364410434285cba6124d6213dc12,2025-01-08T16:15:34.993000 CVE-2024-51481,0,0,83094151def53bdd7b20b08694eaa3e2ea765e6cd9123a6af8b2435defbf5135,2024-11-01T12:57:03.417000 CVE-2024-51482,0,0,cbc1fc8da81cca1505f36c0f1154509470eaa8654cfa8f7bc9fc64f67fae91d0,2024-11-05T14:15:14.840000 CVE-2024-51483,0,0,fa3125bf4200bbd556b6245d913e02934637abfcb5898f415b371150065c77e1,2024-11-01T20:24:53.730000 @@ -269763,7 +269765,7 @@ CVE-2024-51648,0,0,dbb0968afe4034eda92af49d97342dc91c1ea36f66d8dfaf80e8afd706de0 CVE-2024-51649,0,0,c81969392142cf30b442ca2488ba5a508853d5d91fdf922f672d341833d4b7a4,2024-11-19T21:57:32.967000 CVE-2024-5165,0,0,bdb54bdc8b0d6f572d2785be548dcdb1e79f91fcf53f5df7d21dd9b71f61f720,2024-11-21T09:47:06.567000 CVE-2024-51650,0,0,04ef9455e8937238fe000c9cf2db59bb61cb5e35b0918868474c600631188fd1,2024-11-19T21:57:32.967000 -CVE-2024-51651,0,0,4ed5686615a39204286566da6f539f64e71587e745925bfaa19147e2468e0e61,2025-01-07T11:15:08.113000 +CVE-2024-51651,0,1,1728d260074e5bfcd449e5668d18c53a5f2f462f3263d9ad96d2f345aa27db40,2025-01-07T11:15:08.113000 CVE-2024-51652,0,0,73549f75abf3f3baf03afe523dcecfd729118fe687d340792e7f45a9660fb08b,2024-11-19T21:57:32.967000 CVE-2024-51653,0,0,862ff379316a4c395b2836334692d81d6ac14ebcc80990d3f9ca902be8895e5d,2024-11-19T21:57:32.967000 CVE-2024-51654,0,0,944fa9733345027a554681013fbbfaeb37ba19b59e9d7e3b6f3cbc540f2b1869,2024-11-19T21:57:32.967000 @@ -269779,7 +269781,7 @@ CVE-2024-51662,0,0,238aef4ec3bb2103208d2571b222a192ce1bc63b5768c596b0550f9a53024 CVE-2024-51663,0,0,23de5c091a55aa24b19c5d5920ebb2a18811a61b1cfb0c1e54c00fb912be0326,2024-11-18T16:54:02.457000 CVE-2024-51664,0,0,7c9d89a93636181c0db5f633dce66403f4afe72a6f264ac128d68991d43b436b,2024-11-18T16:55:08.183000 CVE-2024-51665,0,0,ca0d2b7081d27d1deb85dc534f4acbfcf953445abd78727c39ccd205fd72c238,2024-11-06T22:07:10.707000 -CVE-2024-51667,0,0,7bd4765ecd4fb026a4a93d88407c5d11d1915b6138713db98c5ec67e81f35392,2024-12-31T14:15:23.827000 +CVE-2024-51667,0,1,9b01da10bcd43f2dcf992ec3455d09183d63257bf5ff9a21e0b98b3bcb7d372f,2024-12-31T14:15:23.827000 CVE-2024-51668,0,0,14a8d783e672310bba3467db772e216d308161cfb0eb152a89517fa6214249c8,2024-11-18T16:51:31.227000 CVE-2024-51669,0,0,82aa3c5d679c42aa50b8bb219111bca86e29e8d5f223b00587efeaee0978ad5f,2024-11-25T14:46:27.873000 CVE-2024-5167,0,0,fe77c2bef4dda4bcd8edc49a185a6194f97f2f334490811a5fdb0dbedfde855f,2024-11-21T09:47:06.823000 @@ -269816,7 +269818,7 @@ CVE-2024-51697,0,0,d54df5fedd22b880ecf7b5505c933519f4cb3fe586f40d120910516b3b20b CVE-2024-51698,0,0,e71f0bbbd2c67c2df44e03f32b2229fc75aee8b458322a41a2e73201af7b63d8,2024-11-12T13:56:24.513000 CVE-2024-51699,0,0,517928539be8e07fa45441ad2fd33e98e8f06595c479d81c3630d7b5287e8aa4,2024-11-12T13:56:24.513000 CVE-2024-5170,0,0,bf5475eb7b56b589bcee149e45ce9522b71501d6f03b4c8aa2dacaf5ca700f3d,2024-09-27T18:23:43.833000 -CVE-2024-51700,0,0,89a3477e0df3a4d9bb2bf88dcb2daee9cb0cef6b2698ebde14970d5a6adf1fc5,2025-01-07T11:15:08.283000 +CVE-2024-51700,0,1,6dca2b3c17135e173ceabf5ff914821e4128a1b22021d54394df72590824c7a6,2025-01-07T11:15:08.283000 CVE-2024-51701,0,0,216549ae029fa1ca3c9662e015fe05c8ef90e5b3b611554788cb2fe2c1b49f6e,2024-11-12T13:56:24.513000 CVE-2024-51702,0,0,d8fd7c941d3344d6564f26739ba74ebc55e733635a0adc64132b1ee1f7cb0b69,2024-11-12T13:56:24.513000 CVE-2024-51703,0,0,89eb8a36a7d5c7c5a5141291669786ff7d04f102f9535e7b0f5f860d4887de26,2024-11-12T13:56:24.513000 @@ -269832,7 +269834,7 @@ CVE-2024-51711,0,0,b5026417d96a88d7b586c42ce248704eddfbd5e8bebc8b219b8d4db3121d4 CVE-2024-51712,0,0,4776afd887df3d65067949479d4a5a33236c2cc62d78d8b38f6866df8f937180,2024-11-12T13:56:24.513000 CVE-2024-51713,0,0,f4c7f9e094a3a238ed3834f5e19a6901f0195d4ea9bb6a7a802da3f40b2d1a9e,2024-11-12T13:56:24.513000 CVE-2024-51714,0,0,9a45c79b06ce9520b2fbf85a624e3fb37b1d1fc6188ebdf5ee9af84a8c5ae139,2024-11-12T13:56:24.513000 -CVE-2024-51715,0,0,6ef416fd37ef7ade2ecd9c456ca0f461172504cf31f584b91bddef125801aef7,2025-01-07T11:15:08.460000 +CVE-2024-51715,0,1,dbd90f8212021512127396d1a64802313b7d09b5e581f17792c3eb9865b5cd4d,2025-01-07T11:15:08.460000 CVE-2024-51716,0,0,1a7f478b63075a02d5dd114a22c494695394051a70a7a5a06777a5fb5656fa5a,2024-11-12T13:56:24.513000 CVE-2024-51717,0,0,e5a369baf84f0d855eda597ff3ea4e6d1166f77ec3152cdc4565d34cc9b28394,2024-11-12T13:56:24.513000 CVE-2024-51718,0,0,38d72c82e95a529daac12ce377d940e9806a7a6c19b7ba10406352fc292dedb6,2024-11-12T13:56:24.513000 @@ -269848,10 +269850,10 @@ CVE-2024-5173,0,0,090e48f75343bb69589a840e25ae60a8ac00187572b68cf38125a567b358b8 CVE-2024-51734,0,0,c7b97e928c8850d54c2fdbd4124a5548ebb3a9718f17988908d6f3c7921c071a,2024-11-05T20:35:26.167000 CVE-2024-51735,0,0,48473e5db4cd5ecc77914f0341bc3fe19cd3b449987f541b0b758a8a1a3f060f,2024-11-06T18:17:17.287000 CVE-2024-51736,0,0,29e0c9e964880fe165f986cd62daad2610accc1f9fe0e31c385a89c289e90f1f,2024-11-08T19:01:25.633000 -CVE-2024-51737,0,0,b2ade7657240ff3de094039bdb3431a3461e6116aa763c4de2d1ed23830c79fa,2025-01-08T16:15:35.170000 +CVE-2024-51737,0,1,a16cdd75ed8512dd9f47e45db68b3bcc88cb4779dc9f9cf6c8a39bd2ca429f58,2025-01-08T16:15:35.170000 CVE-2024-51739,0,0,4a842171b608b06417875a07ea66bc940b2544517c02b0c89638130ff781c875,2024-11-08T15:56:18.753000 CVE-2024-51740,0,0,aa733ae0827e15b33ac1bc93d1e5306d2cfe3763dcbc15868bfbaab35851c4a6,2024-11-08T21:09:45.387000 -CVE-2024-51741,0,0,2be0e53602dfcfe6f957cfe0f310cbadb641cb6bb28c1b3dd9021c8a1c89f290,2025-01-06T22:15:09.827000 +CVE-2024-51741,0,1,17fbc7acb9beb290488d36c45d7f5c599398962726841e9375f3f88a162a4a93,2025-01-06T22:15:09.827000 CVE-2024-51743,0,0,8f26056859b26212781070301c305145a316ade0a5df0043c74f190cbc4f712d,2024-11-19T21:57:32.967000 CVE-2024-51744,0,0,07c3cdf47d43fa1c7a4c89dc7a6775d60f31b15068c0fe1b5baf96ced0398c03,2024-11-05T16:04:26.053000 CVE-2024-51745,0,0,d79cdc683575c07b3d8b145cc0c19ec2c6f2bb6963f0182f6adb489d0286e219,2024-11-21T09:45:55.150000 @@ -270001,7 +270003,7 @@ CVE-2024-51885,0,0,9997abbc40070e9236bbd903907fadfcdf795a0645d0e60da25d32309cb45 CVE-2024-51886,0,0,98b67d59a155c38bf7cd1b013a08137e66d368961bfff45a3cea49da1e0ac0bf,2024-11-19T21:56:45.533000 CVE-2024-51887,0,0,cc4fb85ccf3bca1eab693ea1dd8297634c27f84eb36fb478e6908b9d339050b6,2024-11-19T21:56:45.533000 CVE-2024-51889,0,0,cecb0beea7b5658e0f81b9e4fa384738485c6a4057ce6c3363878c3d65a3f538,2024-11-19T21:56:45.533000 -CVE-2024-5189,0,0,5edf5a424f9fa0e1eaa916a032ae94cde4538599c1febb664e21c6af834e2dc3,2024-11-21T09:47:09.427000 +CVE-2024-5189,0,1,04853c52251f76777b8590b91b04f0c4acbef31de9c24af7a871373b3c1feaa5,2024-11-21T09:47:09.427000 CVE-2024-51890,0,0,5b43f46908771f4bebfbe45167dc65d43eb7812f09210cecbd324d63f8d05067,2024-11-19T21:56:45.533000 CVE-2024-51891,0,0,345adc86e96c214275942f5d1376ef0bacd6cccccfc0f449b93127cc90c0fe57,2024-11-19T21:56:45.533000 CVE-2024-51892,0,0,e85519f020e665443fdd48dd1127a830c1562e6a804b2d3ce865a3f4c6047b8e,2024-11-19T21:56:45.533000 @@ -270107,10 +270109,10 @@ CVE-2024-5204,0,0,861a03c6b8b38defa5d93991a4825262ae7b814b89fc2ffc1e32a59f04171e CVE-2024-52043,0,0,e434d805f99fdc6c5e33568cd1a8288e62a5c6170cf35ff5cddabfded34908c6,2024-11-08T20:39:36.233000 CVE-2024-52046,0,0,5a74dab01514d19e486bd93a9019ee0c579682f683b54180f5850e9a763ffc8f,2025-01-03T12:15:26.557000 CVE-2024-52047,0,0,6ecb2cc57cfbb85c6cec2e5013298e03b186e96436ece31ca8bbb4eadb7f8409,2025-01-02T20:16:05.163000 -CVE-2024-52048,0,0,5bea5dfbe1a77e17eacd9f07c9be6be631f082a139085eea61d0e5001ec357a6,2024-12-31T16:15:26.063000 -CVE-2024-52049,0,0,567b72c58660f1a9fe7610de287fb5c23dcfe5c2fdb82424d33e91ea96627a0b,2024-12-31T16:15:26.193000 +CVE-2024-52048,0,1,1e078330880d0288fe6f18e7f68258446e3ecf39417d40d314383386f65e0547,2024-12-31T16:15:26.063000 +CVE-2024-52049,0,1,f8a0e8b38f04cbca4f2d1554addf580ecfac2556a3acd3d36089ae2c411f0a0a,2024-12-31T16:15:26.193000 CVE-2024-5205,0,0,23f687d8508f2ecb4f71db4183b652438c4bb3a68c03d14351c40e82c1576079,2024-11-21T09:47:11.033000 -CVE-2024-52050,0,0,66a1ea61d5333528fdb6669d6acaa16941c67098068a5edb4d3e90a3f2e8f5c6,2024-12-31T16:15:26.313000 +CVE-2024-52050,0,1,a125e535af130d2fd1b3ef043255a982025942f8bb7617619bc6741a1327c411,2024-12-31T16:15:26.313000 CVE-2024-52051,0,0,2a88c8f9f62c39002493c9459b82ce96cec1cb4b6741ecfb88f77d798525819b,2024-12-10T14:30:44.957000 CVE-2024-52052,0,0,5eeeac48f24ac467a2621d7950234ff504286fc9da5b2ff1ce8d348695057bf0,2024-11-21T23:15:04.520000 CVE-2024-52053,0,0,634822104ec4d4af8aa9cf0854397b2e2ea6f5f55e9fc999886a29a44842f7b3,2024-11-21T23:15:05.387000 @@ -270234,8 +270236,8 @@ CVE-2024-52359,0,0,509efcb95ef880ccde43fccb440c416e0525cc864ec20eeb05761e61ccf2a CVE-2024-5236,0,0,2567479af261d5b21b924e08416f98f775dfb54600e5bcd680efa9c7d4ca6153,2024-11-21T09:47:14.757000 CVE-2024-52360,0,0,bdf752aab28a84a7b3de79826a68d96a66c86dd4dcfd4d6f09f0c3b534e4dfec,2024-11-19T21:56:45.533000 CVE-2024-52361,0,0,0f590da84310a3a70b1ce4708563ee9a1181dbd1f95752797a9808951be26140,2024-12-18T16:15:13.967000 -CVE-2024-52366,0,0,bb8e256858935f8814ddfe3bdf0e66cb6e5c370120e357e7af76eb242a6ca3ff,2025-01-07T12:15:24.680000 -CVE-2024-52367,0,0,f9cc4215a4354a7f10b90d4d04066cfbf874b411d0562128954bdb058284e1a8,2025-01-07T12:15:24.847000 +CVE-2024-52366,0,1,5eb5d532a2a455b08ea0a92266486ecbd59be84360d732dbaa7ab966f9474b5c,2025-01-07T12:15:24.680000 +CVE-2024-52367,0,1,c8bd249cf84afc9db3295deb602b0f010566468527c0212f3c545dd982041f33,2025-01-07T12:15:24.847000 CVE-2024-52369,0,0,e081cda06af085b69b5cce5744190264c91cd87aef2aa4d459e7fe8f2ad5e6bb,2024-11-15T13:58:08.913000 CVE-2024-5237,0,0,850239c5226c0c64e0e8de715a204a907770a544458b3a79e6f4fcfb6446a2ec,2024-11-21T09:47:14.890000 CVE-2024-52370,0,0,d2931a84b2cf7b14e018c99dc708ce275e6f773b3432c9c5f476dcff0fb41c95,2024-11-15T13:58:08.913000 @@ -270543,7 +270545,7 @@ CVE-2024-52809,0,0,652f885846d676120f14dabdd6ac521fed85152402f72016697d2b26d1715 CVE-2024-5281,0,0,fc0976db5d10ac7222d6d7be38c22f60caf8b70ddc146c5f21bffad51467d30a,2024-11-21T09:47:20.760000 CVE-2024-52810,0,0,bc519c3395fca90f2847180bace5d2bd61f10ead143c379d0438b1982cdf8ded,2024-11-29T19:15:09.163000 CVE-2024-52811,0,0,8b4a122817488a51be41eacb5a5ec9e0b5886ee8b97dd1908dd9d3513b97f482,2024-11-25T19:15:11.567000 -CVE-2024-52813,0,0,a7a093d4b10add49402e1ec74d19b9e8b011e357dece838f290e240f092e2e83,2025-01-07T16:15:35.610000 +CVE-2024-52813,0,1,8169b64a8f667238b5fed148236c36caf5ee42d982d7846d64529f8f50a42147,2025-01-07T16:15:35.610000 CVE-2024-52814,0,0,27542fdf4d1e39899f04e440482727ae79215851a144e892e913b9bf3a0be02c,2024-11-22T16:15:34.553000 CVE-2024-52815,0,0,c1e8fde97970f9249cef290754120e31a2a9f9b91031232cee085d5724ae3d3e,2024-12-03T17:15:12.267000 CVE-2024-52816,0,0,65718f19cb2a012b57ef8da79137eacc99e273905d4b5a57cf388720343e4d20,2024-12-17T16:15:18.873000 @@ -270597,15 +270599,15 @@ CVE-2024-52862,0,0,38d6d5355e836074358c16f05c0d64f338c50e9ed2c4ba8e1c39a7c2a8895 CVE-2024-52864,0,0,5aed2598110b254c3d64ec7569ade01fe6bf6ea08bd9b96449615a122a0e7958,2024-12-13T17:37:46.930000 CVE-2024-52865,0,0,d77c984fda3ac5b6322fda83849195e30728a895341439024cb7eb650daf701d,2025-01-07T18:15:19.667000 CVE-2024-52867,0,0,b14a9f7c8b0d212f056e38d3758777be722d9d6a10918da14d6ef6ffa3fcbd7e,2024-11-21T09:46:35.283000 -CVE-2024-52869,0,0,0e1bcc211838c1a54b69a90e7890a77934c3c88694b0d9758ed37975ae5d553d,2025-01-08T21:15:12.523000 +CVE-2024-52869,0,1,e0274197b53af25ceec7228d280f45262bb697201ad58fd74dcd6e7042363fe7,2025-01-08T21:15:12.523000 CVE-2024-5287,0,0,ede9629ba14e7833d0e00ab367a4e2205145f22a5dce3f4d9b720c5001bdf2cc,2024-11-21T09:47:21.753000 CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336bc4d,2024-11-18T18:35:09.027000 CVE-2024-52872,0,0,d5c137691ac8affde2eb9f0d98f11a2242b42b7ed558ce4003950a43927045f3,2024-11-18T18:35:09.270000 CVE-2024-52876,0,0,6fd21241a1a4f5f736d93e368fdcf08c204bdebd19eb249ace2fceb507212592,2024-11-18T17:35:08.900000 CVE-2024-5288,0,0,35888db4a5e323e6a29faa7e47d2416858cbeb598a42c21aa0c323691cd3d86c,2024-08-28T12:57:39.090000 CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e1b,2024-11-21T09:47:21.990000 -CVE-2024-52891,0,0,c0501cc1266a2bd619aecd0020292b22c7b56165101d569b54e2d4a5e5ed8b8c,2025-01-07T12:15:25.010000 -CVE-2024-52893,0,0,f8b9ccd71f76c6032a0fbd3777baf20a8d55e394e2ad7bc980c3b4247958cbfb,2025-01-07T12:15:25.153000 +CVE-2024-52891,0,1,c6b610008a5f3ec3869a4a93380f2e9ddf6baaf48eba1e31c2434c79c4127010,2025-01-07T12:15:25.010000 +CVE-2024-52893,0,1,93318ea4edf051cd522e6cc747b964878d2b91249e126365b5b3b33f5344312a,2025-01-07T12:15:25.153000 CVE-2024-52896,0,0,4f05d5756387a4a38056c43617cd5bc7f4b71fd12d45391dd4bd8326aa374d5f,2025-01-10T15:15:15.633000 CVE-2024-52897,0,0,81ad80051d1322a8bfb61db68a23039003246d955567fed9fc0a8a2a809d5fdf,2025-01-10T15:15:15.777000 CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000 @@ -270809,22 +270811,22 @@ CVE-2024-53161,0,0,496a29d38dca8fc4a0c4db9b85b97c97bde569f214008aac2f16d6a0701fd CVE-2024-53162,0,0,0b78b6007d139b11ecc836b6ff1b71be5bb131848854d4ea532a04007a3e73c9,2024-12-24T12:15:24.567000 CVE-2024-53163,0,0,2d7b0ced3ccddc7c37dde293df99fb4af798fe72968dd76c7ff711baacfc61b5,2024-12-24T12:15:24.670000 CVE-2024-53164,0,0,ae2c77989297659bea888fe0f75049cc76e1ff4e5da327a92f529457a5afac7f,2025-01-09T16:16:21.297000 -CVE-2024-53165,0,0,0e9c4ced051d58599256fce5cd34ba3df024303ea0387370a48f25466bb92ff1,2024-12-27T14:15:23.583000 +CVE-2024-53165,0,1,53350258975125bd4c5ef7274f7358f0b40b7e88846b451058afbf4e4f379082,2024-12-27T14:15:23.583000 CVE-2024-53166,0,0,6369240927602b727b37db00a085178ec3b29ff0d3946046726872169e4edda3,2024-12-27T14:15:23.703000 CVE-2024-53167,0,0,cb8147677dfafa0aff01cf4cd8a22b9d4f82e5ca11b808b017228795731965bc,2024-12-27T14:15:23.820000 CVE-2024-53168,0,0,d0947ca635c162627ffb66382a53e68b2f439f3fee0c80e5710bb47b867d4039,2024-12-27T14:15:23.940000 CVE-2024-53169,0,0,7a8f616983e90fab9da24cf74210604a973474b01aef0abb6badfb91bb61b143,2024-12-27T14:15:24.057000 CVE-2024-5317,0,0,c2af981f2442def6d43cf11dee826712fdb79df4e8b131d1c0815426b050d563,2024-11-21T09:47:25.040000 CVE-2024-53170,0,0,5a95bf5c259586a867511d37720707e80b478019b09b4d90ff4b0d4ba5c54981,2024-12-27T14:15:24.183000 -CVE-2024-53171,0,0,54776eea18146c8f6c8f0a67742e1d59955e54aa25169834fb4ed337868c218c,2024-12-27T14:15:24.300000 +CVE-2024-53171,0,1,81d448c72e1fd707a6a31ddf52f57715df998c161651495f116792cc893682be,2024-12-27T14:15:24.300000 CVE-2024-53172,0,0,d7717d3732a5c6ae0f50e9a209269cddb8ae836d114b1f214edb7e15b13bbbcc,2024-12-27T14:15:24.433000 -CVE-2024-53173,0,0,725c67fa52618928a385a892a7236b0c3dd392570e7ed9f6158a55061bea350a,2024-12-27T14:15:24.577000 +CVE-2024-53173,0,1,28d170c64cd25b3c0bfd184d82a85954ee86a041203b986e714d03e6777c05d9,2024-12-27T14:15:24.577000 CVE-2024-53174,0,0,d09b17bb3e4ade95a1fea7e46d1377be7e419b9b3e017763135543340c421973,2024-12-27T14:15:24.703000 CVE-2024-53175,0,0,8442e0cb3c6575762a0afcf2f42e8cb0ec5bafe58e054fa6dace9b304bab7542,2024-12-27T14:15:24.820000 CVE-2024-53176,0,0,a9ef2655bd82481455868392f2ed222883ff60b62d1eb9eb18c1813c8a099dc4,2024-12-27T14:15:24.947000 CVE-2024-53177,0,0,6e4eb608d541c1324f87a43e140e2b82d6924d66d6a13e425b7b12cb70c0a368,2024-12-27T14:15:25.067000 CVE-2024-53178,0,0,e85a20e9deaaca3fba597183ded50fa4eeb1ee318b030a9e6028781d792bddb2,2024-12-27T14:15:25.183000 -CVE-2024-53179,0,0,ce16594d497d478a69665d6f44dc3dc8a2bc449fcb80177963ad4b77c9a467f4,2025-01-09T16:16:21.440000 +CVE-2024-53179,0,1,45a146e46a0f26b82e8e53228e493445f9c33fd530eb5f24d25391bb9fb22d44,2025-01-09T16:16:21.440000 CVE-2024-5318,0,0,87e97b53a33051fc1fa3c078212ad6afb68bf37151bd321e62e233d7b2989703,2024-12-13T17:04:31.133000 CVE-2024-53180,0,0,b6b06c3d1f43c27f0e44a74a522719556265102130aa9b5248c73fb6799cb529,2024-12-27T14:15:25.410000 CVE-2024-53181,0,0,75b064e17895b9f277789ad64fcd6ed5a3980c88dfbac5e82d8241bbd1116758,2024-12-27T14:15:25.530000 @@ -270832,7 +270834,7 @@ CVE-2024-53182,0,0,276da6acd8b3e7662cb4c37221891d60d43b389e6f704002e7f31e4daedb3 CVE-2024-53183,0,0,654d7facdcdf21d8448703d0aca76dbb4f82fcf4dcd5a0bcb5fcec43860cb2c1,2024-12-27T14:15:25.743000 CVE-2024-53184,0,0,2a27b94391b5bbab80d359ad179ae46b2fc322eea3533f3c18f42b154d4e7c8c,2024-12-27T14:15:25.853000 CVE-2024-53185,0,0,dee02c021154469479b441934b7a7238faacb7a5d2e8c305c86f7d889e21f278,2025-01-06T17:17:06.007000 -CVE-2024-53186,0,0,c2645a2d328a7d64d2a84fc9623b12f8e5d7b94b72f4468b86561c8de48d32ce,2024-12-27T14:15:26.083000 +CVE-2024-53186,0,1,498922a4e74e4343d2e6b5418fb7c9fc9c9fd52e32e35efe4c719598f64c8e40,2024-12-27T14:15:26.083000 CVE-2024-53187,0,0,e9ffe4e8a0f7104ac73e1d5043e16d403601f578bb2cc6b891174adf55edbf0e,2024-12-27T14:15:26.190000 CVE-2024-53188,0,0,5f098d0b17fccef0dad3935cb2078b40fd4c7dbdb7ea624fe85c4915aafad8a8,2024-12-27T14:15:26.297000 CVE-2024-53189,0,0,7db5b520eec87b3d5cf3a4268bb96f973425e7266589752714a0bff057fca02c,2024-12-27T14:15:26.400000 @@ -270852,7 +270854,7 @@ CVE-2024-53202,0,0,7d23e49d3acff80a64d7280021d5b5a203b4ae3822284474ef22a299df0b3 CVE-2024-53203,0,0,5b84b307ac617b2733d67355e11a8602cacf08603e863af6ef90308e193fa443,2024-12-27T14:15:28.083000 CVE-2024-53204,0,0,a67dade237e65bb4a6674739087981fbee3f96204ef4395e1de0111b2e3875f1,2024-12-27T14:15:28.207000 CVE-2024-53205,0,0,310e80c96eec5b9caeb40d4ac42b3fdd15b85eabb0a1c3c5481d29db45eb8c48,2024-12-27T14:15:28.340000 -CVE-2024-53206,0,0,268ffd34c64b364fd0d3805c6b95329cc878e29dffd09db69b06c8766424586d,2024-12-27T14:15:28.453000 +CVE-2024-53206,0,1,d800df8f6d68aaab7abe7c1baba1443a71a7884f9dca1bdd8e5aa1f9928ba79d,2024-12-27T14:15:28.453000 CVE-2024-53207,0,0,eb965d61db6125837dce0de6ef3af14c44ea9331488a35d8508a0d1b2053b009,2025-01-08T21:26:42.470000 CVE-2024-53208,0,0,63742018889492dd1dd5b9e0af113e5a83b85a62bad173e2517dd29f6597d6c4,2024-12-27T14:15:28.677000 CVE-2024-53209,0,0,250dcad80d4d09ca7de716f0788117fc7d9f3ac4ecadd8b7cf17ab3f32be6e8c,2024-12-27T14:15:28.793000 @@ -270885,7 +270887,7 @@ CVE-2024-53233,0,0,3c38f13d75de4a76f794a84b10f00e056fd02bc1f845028887460515d557b CVE-2024-53234,0,0,74235b9bba8c6fa335f832d794b846a6cdfc4adf175080c7f64bc2837d1b0788,2024-12-27T14:15:31.783000 CVE-2024-53235,0,0,0c72a9d02c4c1323ac68c14078ff2fdc579770d6094d03c12233e24c514bf29f,2025-01-07T16:02:48.350000 CVE-2024-53236,0,0,7fb60b41991b24fab1f4d66c148092639a1f6c1a16382de6518a0eb474a5c377,2024-12-27T14:15:32.013000 -CVE-2024-53237,0,0,23d171fbd4bb56e8eac2319610adf1e1fd3e1e2401f72a4cefcfacfc9e5a2a90,2024-12-27T14:15:32.130000 +CVE-2024-53237,0,1,07882f01d1d5530f560578b3d5c7dbc8f17ace968716a7eae0e3c649d2e59eea,2024-12-27T14:15:32.130000 CVE-2024-53238,0,0,3c406b6fc48f1e67a491784d7df49d294e069e6ba2707bd93d3a166e8be6e2ca,2025-01-08T16:41:35.353000 CVE-2024-53239,0,0,2dbcea6108cac685093598ea95a7534dbbbaa2209a1d006a3b3659a533297412,2024-12-27T14:15:32.373000 CVE-2024-5324,0,0,616d1ba80af339308061f2c79fb4da68886ab2b91b97eb35403d14df6efb4acc,2024-11-21T09:47:25.537000 @@ -270913,7 +270915,7 @@ CVE-2024-53264,0,0,a32d4daa26a746493ea0f873c770ba4e99221937a3918a07719b9b2327c46 CVE-2024-53267,0,0,accd32a67a608848754723b681c6e9dcbc299572dceeb0ccc536e90037eb33ec,2024-11-26T19:15:30.473000 CVE-2024-53268,0,0,a408af8f5ee18e6e866628a8181262e5b345f36ec790e37835b95d7b67c7ce70,2024-11-25T20:15:10.583000 CVE-2024-53269,0,0,10f17034cc92e946addde968e4d2b396d89d8d27bdb763a678137e91a2a2579b,2024-12-18T22:15:06.763000 -CVE-2024-5327,0,0,c9fe7d7fa06a5d3d75a080dba8857bf423c18144dc7f53781589989842b7c438,2024-11-21T09:47:25.873000 +CVE-2024-5327,0,1,7e98f09a8d10ce38f293c3da3fa19ea7f6e9c79e4d1cee3652e74a347edec9e5,2024-11-21T09:47:25.873000 CVE-2024-53270,0,0,dea45b4a7668a2f5619a0d43a87d45dac27f679bda966ce8145929dde1e96ea9,2024-12-18T22:15:06.883000 CVE-2024-53271,0,0,bf343792418ea9791cab65636364e42817a58c9fbdd6d31284460cca28c348ca,2024-12-18T22:15:07.010000 CVE-2024-53272,0,0,f3ae5c3af00a8a1ede971886e8407e0fd8e6e8ff1a7606066ce068e53ea18328,2024-12-12T02:15:28.670000 @@ -270943,7 +270945,7 @@ CVE-2024-53333,0,0,fec584e947b0ef91060e7974c2bc2800b0a5e22197ac40e517d4bb4ecce04 CVE-2024-53334,0,0,16279143f552729b554e869e900fcdb0e710a67308c49b11d3ac0e3ed52e676d,2024-11-21T21:15:24.810000 CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e004,2024-11-26T18:15:19.850000 CVE-2024-5334,0,0,cb79190d7e117b2165ef511634fe8d33c9e23cab24dd6ad00dc4efad8b756c7c,2024-11-21T09:47:26.523000 -CVE-2024-53345,0,0,c1df2ca9bd6e970d2bf0dbceea5a58876e705d442c82eed7def9cfc5fe58518f,2025-01-07T20:15:29.923000 +CVE-2024-53345,0,1,f122664bf501aa1be2960db7352db8f065380488d2573ffac2bf7a21da16724b,2025-01-07T20:15:29.923000 CVE-2024-5335,0,0,227008637fcf0f08540aa31f6f2f1e0a27300047ea0b90140042ff30c0f0094f,2024-08-21T12:30:33.697000 CVE-2024-5336,0,0,3be15ca705f47dea3ffc9a0dd73cdf82724f581c9671519a64e222f9d7a209cc,2024-11-21T09:47:26.713000 CVE-2024-53364,0,0,924e143b4294f3ffb491904ae2396d08e4637aeb46539cceee83f2ecfb2d4d99,2024-12-02T20:15:07.487000 @@ -270993,7 +270995,7 @@ CVE-2024-5351,0,0,a2df3cc9be27d64a2cd3dc5a2f1d5f6a44f6e98794670e6c0c19928c9af58e CVE-2024-5352,0,0,afede3a744404a4b63e0d831a5ec0e86e744b459100c94c26c1030a6d60025a6,2024-11-21T09:47:28.743000 CVE-2024-53522,0,0,4cf27771a36f742e1b4b9b4ff1149b39f782c38d11efa74f0ad2b7f1066f5059,2025-01-09T16:16:21.560000 CVE-2024-53523,0,0,62264463ec7bd597c8cd954da8d0baf08b58aa4c7ac24397d44469055812e6bd,2024-12-11T17:15:20.073000 -CVE-2024-53526,0,0,ede57fae3431829224893dc09bc40f4c776204f72e0aae08407837c7556dcee5,2025-01-08T19:15:37.753000 +CVE-2024-53526,0,1,3676cfd79c3f40a31fab550b6a718724d172a13663a1f39116ed8201637e7248,2025-01-08T19:15:37.753000 CVE-2024-5353,0,0,797e03a5615e2bede928ac816012d8783c471de5bd74a0480881887afd7a657a,2024-11-21T09:47:28.863000 CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000 CVE-2024-5355,0,0,5ae56d862872a5268a44df2d0e26a54aa307acbf5ff2835727472c989e377b6d,2024-11-21T09:47:29.130000 @@ -271025,7 +271027,7 @@ CVE-2024-53623,0,0,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d828 CVE-2024-5363,0,0,26d4875386ad8c3215b4c09e1b67dd8ce62939d9e762298e9b8ac4e18d0732aa,2024-11-21T09:47:30.223000 CVE-2024-53635,0,0,69eb99ebd3cc8f0f627f786197a00b6b987c88368caf03b14418ba15ea7b94e4,2024-11-27T18:15:18.130000 CVE-2024-5364,0,0,70608899f95aca150ea63ad11d46a4a5108c90127a7a301ace82188c2357f63e,2024-11-21T09:47:30.357000 -CVE-2024-53647,0,0,4ef80de308443b33c9bc711a0a5be0bac6a51347abd0b8d772d50dc81af44c92,2024-12-31T16:15:26.437000 +CVE-2024-53647,0,1,cfcb346f723938ad054c8fdc72391827a75db16440dc5160efbbab2c409a3044,2024-12-31T16:15:26.437000 CVE-2024-5365,0,0,1cfce3a239d45132ff3721a342529a7c8292cbd269d61639965b045e1105a397,2024-11-21T09:47:30.490000 CVE-2024-5366,0,0,3d4708898dde8c46157274fab31aec2bb1d6d4355897d80e5ba83e77521494aa,2024-11-21T09:47:30.617000 CVE-2024-5367,0,0,a7221799367d103e649a718fec766a2c3243ad87477c7760cdab4ba0815d2580,2024-11-21T09:47:30.747000 @@ -271049,9 +271051,9 @@ CVE-2024-5370,0,0,118bbc3bfc68a5a364fa8038fafc7682a10bb0308a5e5da229e35dbd880721 CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000 CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000 CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000 -CVE-2024-53704,0,0,d49fd357f3205883b22738c32faf9b3d49bd53f54add3fc543066caf4851d6a8,2025-01-09T15:15:18.640000 -CVE-2024-53705,0,0,18d40557ccc60a94091918bbd91ac2dee93bbebeee5f1f1de3e7850089809f28,2025-01-09T15:15:18.800000 -CVE-2024-53706,0,0,df616051264a21a2698b481c8952500c05578cd2c9461313f3029aa0443422e6,2025-01-09T16:16:21.743000 +CVE-2024-53704,0,1,646c05bf19a8b546c4b27150a74eade3fe883efa2fa4dd38843e1e36cfbef051,2025-01-09T15:15:18.640000 +CVE-2024-53705,0,1,cb2aece8a5d68261ccbbe06bdcbef5f15dc8b4b71fbf212b281c5c2102470ea9,2025-01-09T15:15:18.800000 +CVE-2024-53706,0,1,df37bc87068a5b2ce03429b7e89276c6f6c8ca589f496366856bc396d49be328,2025-01-09T16:16:21.743000 CVE-2024-53707,0,0,4163d5321b4bf42492ee17d3e3420b9e06f0f632230aa0e5ae79c446b00e1993,2024-12-02T14:15:13.323000 CVE-2024-53708,0,0,cda0eccc0f844686702a234754606286df02f2b8e9c9d9d81e8fb2842526d6e1,2024-12-02T14:15:13.457000 CVE-2024-53709,0,0,74fcfcd96364eb63a20fac2c34c511b47044ab19669bd7332461d3387afde300,2024-12-02T14:15:13.600000 @@ -271154,7 +271156,7 @@ CVE-2024-53797,0,0,0f15663ed81f303c311eda4c1e4733f8c9b6c22597eba45aad68c515136db CVE-2024-53798,0,0,dd15d9db7be990295567f0511fa2c3e51a57e6a70e8f9db78d34a77a51f00ebd,2024-12-09T13:15:40.930000 CVE-2024-53799,0,0,783da60a33ccbce78617be33a3c476d287119720767ee98d4405ce9d100a841c,2024-12-06T14:15:22.170000 CVE-2024-5380,0,0,226318c98a74a19f1dd2a14061de91ef6b8613a700730137544bc16df39ee24e,2024-11-21T09:47:32.550000 -CVE-2024-53800,0,0,60f2b1b418aa5af9bf8eb7e264f0747ee70d94d6038011b54f5154fa38aa6730,2025-01-07T16:15:35.883000 +CVE-2024-53800,0,1,56635e5542038d20a727e4d779e35bdd05d1d3369439d6f17b76b02c17fd3159,2025-01-07T16:15:35.883000 CVE-2024-53801,0,0,95df68651124aa797a705f7b5a5f6851e90e49bc961e22dbe8e54a1034ec1e08,2025-01-08T16:20:07.380000 CVE-2024-53802,0,0,d38c12f04c4095c1a6ac4f4dc30d15b9305c85ea7eb04aa1ddfb5bdeec10087f,2024-12-06T14:15:22.430000 CVE-2024-53803,0,0,3ee8313ec2c5826e6c44093bf2e19288a4ab5e01b17ba7838c8e2683c5a34992,2024-12-06T14:15:22.567000 @@ -271242,12 +271244,12 @@ CVE-2024-53920,0,0,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1 CVE-2024-53921,0,0,80ba8805361036f43b4514262b685ccd25900644ea805da6dca5ed5b14f2db17,2024-12-03T20:15:16.153000 CVE-2024-5393,0,0,03f52ea3100aa691cac10394b6f99ef6880a74fc6f5839ec2548a00bbba3cf64,2024-11-21T09:47:34.007000 CVE-2024-53930,0,0,4c5164466e0edc2dc94be8460bd35fddb8be39646d6d12f4d1b2cb254100683a,2024-11-26T16:15:21.150000 -CVE-2024-53931,0,0,77ff5a910067e68acb1360e732666f9398c8f9d529fa9282c40e4c59ef92ab72,2025-01-06T22:15:10.070000 -CVE-2024-53932,0,0,a1340f254ee4139622dc4827742470a22bd1d8c2724823dabd329fa8971bf8d2,2025-01-06T22:15:10.187000 -CVE-2024-53933,0,0,db258f59d01e7e0a35abc28b4c06c75a7869e5372f2851212ef66e9f93739cbb,2025-01-08T18:15:16.830000 -CVE-2024-53934,0,0,f50233c522c7566625d128ece5511975863aa14d88756b027208f7a5801cf365,2025-01-08T17:15:15.630000 -CVE-2024-53935,0,0,e7a89bbaab57e9f8cfa36ddccaa7ded268242ad9837ae15774898afacfe8a75f,2025-01-07T22:15:30.790000 -CVE-2024-53936,0,0,f4cc5b3aa6d7f8a1434587994c947af882c4c9dd8090ccb9200829a801f79df2,2025-01-08T18:15:17.067000 +CVE-2024-53931,0,1,e78307ed2b93bc47d21f633dd05dc6e7da3d00d859ddf60c802e08d83a376edb,2025-01-06T22:15:10.070000 +CVE-2024-53932,0,1,43bc1b9f9b19f226cd2853b16f0b5930ba818010eb74314b0ddb4911324dba77,2025-01-06T22:15:10.187000 +CVE-2024-53933,0,1,6484e55fec01b39587e4bfc6c9db05bd6b88ebe583dddbf1b23ec3ce9768eae3,2025-01-08T18:15:16.830000 +CVE-2024-53934,0,1,6907ee28eae1735f064eeee19f3c7d2ef72c2431b6db3eb1e1aeacca32e1630e,2025-01-08T17:15:15.630000 +CVE-2024-53935,0,1,4c8dcaa9c4f421210789ea71e11bee20cf5edd221bb0f74366f4de22860b3f2e,2025-01-07T22:15:30.790000 +CVE-2024-53936,0,1,d66209779e1e70c7350731593e27426aa571f76f3904dd7d7769c9f4c1692f78,2025-01-08T18:15:17.067000 CVE-2024-53937,0,0,d1cd3a208e2e01cbeda6e314a3aeae43902ecd4a49e9dc0eff32993f2ac3461c,2024-12-03T19:15:12.127000 CVE-2024-53938,0,0,d0a91f2a4ef2aa08452cc7e6ae9a19bbc5f3a7a19dbe27547769ceb8e70ec886,2024-12-03T19:15:12.330000 CVE-2024-53939,0,0,63ec4d4d8a57c7e9203228b0cd3c3c84ff0fa6ec3d0f30c37967d23e20f39166,2024-12-03T19:15:12.690000 @@ -271289,7 +271291,7 @@ CVE-2024-5399,0,0,288e52e14a6c0d307abe51f4547e4c97fb8609187689201d5c80525711bdfe CVE-2024-53990,0,0,c12d8d6491761b84e3c9cbf6d8d0ec68eb0e2a55a4d29316acb646b0bf606b88,2024-12-02T18:15:11.753000 CVE-2024-53991,0,0,1aa3d39cfb5149ae5d3c6a1fbecf948ce6ac704feca22e25e4683b08ebe298d4,2024-12-19T20:15:07.670000 CVE-2024-53992,0,0,0b3a35495bb74067a0d76912041d2b5ea6535fc009d5110d24df3f489d2b8ff8,2024-12-02T17:15:14.113000 -CVE-2024-53995,0,0,fd999c775946ba421ca996b1d1eac859e635f45fd6d33cfb33931dad116fe251,2025-01-08T21:15:12.703000 +CVE-2024-53995,0,1,bb00635dc35c619dd42afff400a8261ef12f79fde565f175ef58b92669e140a0,2025-01-08T21:15:12.703000 CVE-2024-53999,0,0,9f5b40515f60aea6e9321651c1e98cb4d03b442ece2375483b9e36332d7840ba,2024-12-03T16:15:24.250000 CVE-2024-5400,0,0,fa1089745765c8c92c3b698eeb8bc3e2fdf4bae4a68ce66e55e2111c1b051015,2024-11-21T09:47:34.830000 CVE-2024-54000,0,0,52062f56a88a90280cce905a1f064658e0e87c6309ff02349950b495d69ff132,2024-12-03T16:15:24.380000 @@ -271298,15 +271300,15 @@ CVE-2024-54002,0,0,7c5a00df1d470c32b9eac42d93309bb19614d9762fa0f049a771979bb9894 CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0377,2024-11-27T20:15:26.133000 CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000 CVE-2024-54005,0,0,a1140344f7f7dfc4d3d4467b796a2fa8133c201f3d329efe99a74d57c08e17e6,2024-12-10T14:30:47.037000 -CVE-2024-54006,0,0,6bd5efcea443530b6f536e39e0d35c4df9fc909f18659576dbacb0ce5ccdea52,2025-01-07T19:15:32.803000 -CVE-2024-54007,0,0,796fbe1a2dec13fc9ac82cc0124bd0d476bde5dd7ac7433c3ded9782c4bc47c9,2025-01-07T19:15:32.927000 +CVE-2024-54006,0,1,61d23867fd196669f228162f82e3e1775797f969549cf7a5d9386ed5d42ce90d,2025-01-07T19:15:32.803000 +CVE-2024-54007,0,1,5ef2a7401e32db371ec6a593e7678f152964ec7f814874240750a461a5fc323f,2025-01-07T19:15:32.927000 CVE-2024-54008,0,0,eea0fea8f522a304d841eaa6b0b75d4fade41407f80f4626ca71a3072a5c233d,2024-12-11T14:15:19.713000 CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f828,2024-12-19T23:15:06.887000 -CVE-2024-54010,0,0,b04b4830cc7fb027e8ccc476bc48098c8473d37fe42c62b91bf9299fec2ea80f,2025-01-08T21:15:12.900000 +CVE-2024-54010,0,1,55025b40a5b298b8a5e8aa969e96243fb05f1dc7d8c7c838522e5ec07eca40f1,2025-01-08T21:15:12.900000 CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000 CVE-2024-5402,0,0,369141076231aa822f3b7e1a9c4a08753a10cb13fa106f65751574195737991f,2024-11-21T09:47:34.947000 CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000 -CVE-2024-54030,0,0,37d493b56a8cf390e60b19221d4f5e0b796e99e971fb4378755ac82c4d97f550,2025-01-07T08:15:25.760000 +CVE-2024-54030,0,1,07c84f217a6fa368622d2a223843d19c0c7e728e80537c7c260b676bb124b4cd,2025-01-07T08:15:25.760000 CVE-2024-54032,0,0,1ae7bed178388a8becc0b2310728246bc38710e9f7ad794feb179bb616babfd5,2024-12-19T19:03:15.563000 CVE-2024-54034,0,0,846c3b0b931699290bf75d8254acba5f2bce35b8e0dd38d2639a5ac7272aaf0b,2024-12-19T19:03:03.917000 CVE-2024-54036,0,0,5ff59e80ea96b2b983e83d15c9d0716c72355206496f4f700438ea4b4a5594da,2024-12-19T19:02:47.713000 @@ -271342,9 +271344,9 @@ CVE-2024-54097,0,0,b4c6de44e728b11c175226d8c406b1afd8e09dbc3d2026f314223e1d73a6d CVE-2024-54098,0,0,fcf0a7b4b42a408ef14e2cdd83601e83ad8a047dacc93336f07058716f90e9d2,2025-01-10T18:32:00.453000 CVE-2024-54099,0,0,256f48ffd68ad9fa5138803838c0141f4287c0f26c618e01fad47b5eef64495e,2025-01-10T18:29:23.150000 CVE-2024-5410,0,0,cce7b181ee3076dc24a31460b418b1921efa7dac4bb8604c266edd1c195e07b4,2024-11-21T09:47:35.930000 -CVE-2024-54100,0,0,5c60fb163375fe7d537d5524d33fa936a61d791e1da5a82e32fa99fdabc7782e,2024-12-12T12:15:23.593000 -CVE-2024-54101,0,0,d43d6b0ae089739d604e49951ca9e466c42b120666837297113c0b39f7457f81,2024-12-12T12:15:23.763000 -CVE-2024-54102,0,0,be4c9c817d1bb09114bc306e055b79d2d825f789f8bb25385156055296aef8c7,2024-12-12T12:15:23.930000 +CVE-2024-54100,0,1,840bc9af2f9cfa37451ef162a52e8affad143fca326efa8b6a5b41e0d3af9b68,2024-12-12T12:15:23.593000 +CVE-2024-54101,0,1,b28cbee4fde9c770888478d7d50338a6e8959ae8cd4abd6f917e1c088fc4ab93,2024-12-12T12:15:23.763000 +CVE-2024-54102,0,1,a99d96c4ed1106063cd9566919ec72e53ed54fdd423fab662a3574d0902f80ce,2024-12-12T12:15:23.930000 CVE-2024-54103,0,0,521378467b2ba6dcd27ca36115f9ecdab36f5f26a2021270812eb31426c0502d,2024-12-12T20:15:40.217000 CVE-2024-54104,0,0,b5d2bab146798e653b7f0c16aaf328d32a4beaf04fab7d328eae5e47092e960c,2024-12-12T20:16:31.800000 CVE-2024-54105,0,0,d9ac2ca3caf0ebcbf8d11ba2f804cdde137b4c536ba273ac19c3cd7f5fc27dbf,2024-12-12T20:17:02.203000 @@ -271362,11 +271364,11 @@ CVE-2024-54115,0,0,7a9fcec1ad70e478ab3c2b64c5e6b84cbbeae6baee0ba1ca78448a4010586 CVE-2024-54116,0,0,7906e083e51315506fc788ba23cd07cd4472b638efdaac74a3b05a9ab4791c4d,2024-12-12T20:22:56.123000 CVE-2024-54117,0,0,cd3dd10e2689d8474911355b4c987c7aca3170647fbf603148daa14ddf57f2ed,2024-12-12T20:23:13.297000 CVE-2024-54118,0,0,3d5435da91a32a7bf2206da2f7e289c3ed3a80b3e8f9d704d669dbbeea24a3de,2024-12-13T02:15:04.770000 -CVE-2024-54119,0,0,c564f426bd6c3ff144a6efc33d8f9108f1a4f189ec08fe238127728df8985549,2024-12-12T13:15:11.350000 +CVE-2024-54119,0,1,203b5add8d1c8bb3b99dbd65acf3ec32defd37e324f29074464c74c5f5b42510,2024-12-12T13:15:11.350000 CVE-2024-5412,0,0,c89822b010e86cbcf24c047ef6717bc07af2215177f02665c5af47a090ff2c1c,2024-09-06T18:07:43.940000 -CVE-2024-54120,0,0,786ad7d9500cc596cdc6340d10698901d47ea837e1c9333675429fd2a9e8bc20,2025-01-08T03:15:08.707000 -CVE-2024-54121,0,0,6667f39fda970714924f385bd27e9bc01290212b8081fd74a39d4c4dd9ffd3a2,2025-01-08T04:15:07.120000 -CVE-2024-54122,0,0,c9cc980b3351d1ad4e813b4d0be69a2d2218f2903532625dbe9f37c9343c547e,2024-12-12T13:15:11.527000 +CVE-2024-54120,0,1,86995795087749e9ea55c90e42358214d5d49c83a2730f1e5217425edfcff8b7,2025-01-08T03:15:08.707000 +CVE-2024-54121,0,1,e6931efeac60887dd7cab166567209b65e0059c8a120215e067e5ec970e9f26d,2025-01-08T04:15:07.120000 +CVE-2024-54122,0,1,d40f0694d68115518c21d41b4eee81bc4359d1962c6853404f6547d3c1bd39a1,2024-12-12T13:15:11.527000 CVE-2024-54123,0,0,adb9d810678343393bca99901a3c1b47719ef78df3ca8f4e2f7e11c7b4e0333a,2024-11-29T19:15:10.287000 CVE-2024-54124,0,0,d93261f0be0c719ea94f116c38fdd88edcab344178e1fea1cd1f60fbeb46997e,2024-11-29T19:15:10.443000 CVE-2024-54125,0,0,94a56f6adf33a765bb985af1d7980f81408342f62f56908b0524e001bb817869,2024-12-17T06:15:21.030000 @@ -271739,7 +271741,7 @@ CVE-2024-54664,0,0,747321a87c6051262f67f5058084eecfa56ba7af72e69bdb1a4744b3c2b40 CVE-2024-5467,0,0,2029498ebdad4a454f5caa2d83ff2ed9d9f9d3c1e65d4417cbe9e14c059a84f9,2024-08-27T14:35:48.977000 CVE-2024-54674,0,0,545e92efc26fab029b2ecd902e6764f6f53f740b5b32d49c4c8440f2592a5a00,2024-12-05T19:15:08.947000 CVE-2024-54675,0,0,14b4e742326580d47a2a009f3e3f65a46d84415cc785ea77b3a28630132c9018,2024-12-05T19:15:09.100000 -CVE-2024-54676,0,0,d9af28a4f387189e5c5dfdaf98a85794f0c7f28ae70cc213f62a58f0a1221266,2025-01-08T14:15:26.617000 +CVE-2024-54676,0,1,4fd9c4279d20d22b565177b6a00ad40cedcecf79321c9cf1ad3fd3dce47385cc,2025-01-08T14:15:26.617000 CVE-2024-54677,0,0,7738db23e6dfe0ca7bf4e6721884297e1312bf0f9f87462addf38007bea25d53,2024-12-18T17:15:14.130000 CVE-2024-54679,0,0,381ad7e6890c67d9b6c47b47a43cd175dd5b1319ea7d6b78a90445a532dafd14,2024-12-06T15:15:09.693000 CVE-2024-5468,0,0,83f1a353a5b95b83c36aafd7fb0e880d8454855ef6bbd816a181cff50dcb4279,2024-11-21T09:47:44.527000 @@ -271751,9 +271753,9 @@ CVE-2024-5469,0,0,0593227e51e97383649ced684c68d7aaf013a250af5a8e55d4376628432995 CVE-2024-5470,0,0,b70339f8a022f56de8d4eb030bd8f5d3563ba0fc9c1634fd55ea697aee92ede9,2024-11-21T09:47:44.787000 CVE-2024-5471,0,0,631b7a50303d6f9a193814092037f29379ca6ca2282e0b67207306f8abcc9ba4,2024-11-21T09:47:44.903000 CVE-2024-5472,0,0,5e12957cd076edb077638ab18db3a7202837e8fd64948bba00e3365a85b54117,2024-11-21T09:47:45.027000 -CVE-2024-54724,0,0,1a09193dee038e553a3943fb6ccd0ff000e0be0d96537e2c07a02ed7805b4067,2025-01-09T20:15:38.863000 +CVE-2024-54724,0,1,c0f98e987154c550545f744e0a810dc344baf54de510016645ab4b226bb63a3c,2025-01-09T20:15:38.863000 CVE-2024-5473,0,0,fdd6160c6121db618882f16bfc9c17f8c3a2501715cb9519638ef5a1fcd2441d,2024-11-21T09:47:45.190000 -CVE-2024-54731,0,0,2ffd034fdf35990d080b6bfc4726e5afad46fa0e5f0cc3333d57d2c77c4ac0e3,2025-01-08T05:15:11.810000 +CVE-2024-54731,0,1,acd86fbebdd274bead6535bf83cf37467581b483235e177fd7e87a697a25d37c,2025-01-08T05:15:11.810000 CVE-2024-5474,0,0,63893131768de13d83eb37c8075bce21b1c0f49d4d852fdf9f27e69aab8b3e48,2024-11-15T17:00:35.697000 CVE-2024-54745,0,0,fa6c31d7a2d0035c561f7b97850c2a530b0e2e38d0e9249ae4c46e230cdcbc34,2024-12-11T17:15:20.460000 CVE-2024-54747,0,0,729a898b5b652d71ca77b05e0f5d878b359cbabc11947616e9dcb0994a6487d7,2024-12-09T15:15:21.320000 @@ -271763,9 +271765,9 @@ CVE-2024-54750,0,0,a2b9bd793ac60105835f796550f4eca54ad7139b40ad2fdf283a28d5ab764 CVE-2024-54751,0,0,1362ae63d46fa3e6e13ddf6e48994d99d3189782d67a09cf0bde552f8a9a1b0f,2024-12-11T16:15:14.910000 CVE-2024-54761,0,0,fb39517d0d10d8a3984368819e40bd7b75b522f13a59de64d1058184c9c0f22c,2025-01-10T16:15:29.163000 CVE-2024-54762,0,0,cb8e4aa44b5cf3cee838feac63d68a9bf187e0e1794dfb8457350541c62314fd,2025-01-10T16:15:29.337000 -CVE-2024-54763,0,0,a28abc0036bf5dd37db3abf51504ee9d8814d71bd02efc1ca179d108a93c5f59,2025-01-07T22:15:30.950000 -CVE-2024-54764,0,0,a35d44940374d4d013f3417b0c39eadc28db9efc4fa6d67b447b188437088daa,2025-01-07T22:15:31.113000 -CVE-2024-54767,0,0,7c02cf0b0d6cbdcad4d274fa0bc8d056590e80886a47139f828b2d63cc3bf859,2025-01-07T16:15:36.157000 +CVE-2024-54763,0,1,35fe6aeaf8ff2a2d9d1415d3e6f03dd3382c26dbe16edd942f9dacbafebc435a,2025-01-07T22:15:30.950000 +CVE-2024-54764,0,1,7108368b95c8c33cd12f1a88712752ff55f9a1ed7ed83d67f4ddea2a12f4ec62,2025-01-07T22:15:31.113000 +CVE-2024-54767,0,1,84c265d2aae9152ded289b8afe6572e4e60031d668299b365ef2804b7e7ac1df,2025-01-07T16:15:36.157000 CVE-2024-54774,0,0,4ed84230e45b966235391401edd82584405ef683a3e2fc4ff18ea7ccdbfb6480,2024-12-28T18:15:10.397000 CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244569,2024-12-28T17:15:07.733000 CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000 @@ -271775,8 +271777,8 @@ CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade3136481 CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000 CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000 CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e578d7,2024-12-13T18:15:21.940000 -CVE-2024-54818,0,0,107ce36bb49927696cb73b8a0138886f2981d404615a80bdf8340dd3abd3f997,2025-01-08T20:15:28.303000 -CVE-2024-54819,0,0,5c1961a544502914eb3b6471593c9f93ff2e75de98f3ccb61d07b0e0c14fa158,2025-01-08T15:15:19.317000 +CVE-2024-54818,0,1,c43119f169232e03fce78f76fd8c17d403249b4db9d275dadea7d70095cbc4c7,2025-01-08T20:15:28.303000 +CVE-2024-54819,0,1,8ec44a69779700b75dce08ce23b0b696a8e67a9684b58a33ba4824157f9f0485,2025-01-08T15:15:19.317000 CVE-2024-5482,0,0,201df0de22cd2de6baef389275fa06366007791ec5f711f789012d102cd7d319,2024-11-21T09:47:46.010000 CVE-2024-5483,0,0,079d428e5ef1f2457bdcfb946982be872b42b40e94b6bfbc28ab3fe49f413326,2024-11-21T09:47:46.130000 CVE-2024-5484,0,0,b3b185b98c733a0f4717de1a808b2127ff5f3061f156212c34336d217a368118,2024-05-31T11:15:09.783000 @@ -271791,7 +271793,7 @@ CVE-2024-5487,0,0,9fbfbc79e6dff8c3b550139a3c2eecf9b7c4bdde8704bc6cfe1f3d5f4415c8 CVE-2024-54879,0,0,b29885c9d1f972b1a85e410837486f9a5cbdaaa5454176171e37cc430fed9212,2025-01-07T21:15:12.170000 CVE-2024-5488,0,0,703a569b98e6f1a8130cee58df129e22e6ef47912a99f32d5a452e25c6109519,2024-11-21T09:47:46.633000 CVE-2024-54880,0,0,e5b3a5485624ea2d9e12e0827ea5724e74a008cbdfa4830f07e177ce5a2b6b3e,2025-01-07T21:15:12.367000 -CVE-2024-54887,0,0,11e8ddc91935b9fbe4f352d53e17bcacfe25c55cc861de0e154d8392ceaa584b,2025-01-09T20:15:39.277000 +CVE-2024-54887,0,1,9cd9a472618710124f54d358b5a0616c2b34979c89c661ff4cf5c991a7e09957,2025-01-09T20:15:39.277000 CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffabd,2024-11-21T09:47:46.807000 CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000 CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18a69,2024-12-26T20:15:21.800000 @@ -271846,10 +271848,10 @@ CVE-2024-55058,0,0,87b2026e0371667b97fc0d238239f420fb30954db814c22844fef43709f0f CVE-2024-55059,0,0,8104722ac1b347e422b015b1bcea370832dc93b077cc722f4435b9c43328db84,2024-12-18T16:15:14.560000 CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 -CVE-2024-55074,0,0,4af0420f80ae1d3606fca2bad2a0c9a3cb84c3679889d8fba279966efc874533,2025-01-06T21:15:14.803000 -CVE-2024-55075,0,0,375daf96ada68b9360a427ae25514843a96791a9df8bdbf270fbc0cb3e17f75e,2025-01-06T21:15:14.970000 -CVE-2024-55076,0,0,05e8fe65c45b44975ccf82b28cc98e5ce6fe02bfdaa4d732eb45b374941e43f3,2025-01-06T21:15:15.133000 -CVE-2024-55078,0,0,8eb9312455772284be54b89bbeea033d2eec085b86a20c1aba6e71ebb83bda08,2025-01-03T20:15:27.957000 +CVE-2024-55074,0,1,1bb56c00ce7b87cd6028403786c83c9593cbcc8954e072dc461304855924628a,2025-01-06T21:15:14.803000 +CVE-2024-55075,0,1,4928182cae41a13ce4b894fa02b7ed8267f67e5fe7ff39725507907b9004a7ab,2025-01-06T21:15:14.970000 +CVE-2024-55076,0,1,c92f585d56e12f2f0837c39bfd7ebadf83e043051c49b34e391e84fdfbd62f1d,2025-01-06T21:15:15.133000 +CVE-2024-55078,0,1,a384c8e758480780127b01c8311c6648b09607c6c69593e0652ea3f91c229f98,2025-01-03T20:15:27.957000 CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000 CVE-2024-55081,0,0,bc880d1fb0754a9a047f5f48c261b5410277472979a1a968b8556724a801b088,2025-01-02T20:16:05.530000 CVE-2024-55082,0,0,46e334548c0cc47791b6e59ad0b24cbe40324b7098a9a04eafe4a9b8f6aa2dd8,2025-01-02T20:16:05.813000 @@ -271876,7 +271878,7 @@ CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263e CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000 CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000 CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000 -CVE-2024-55218,0,0,99592f43d9b66cc1c3a803e3331b61363ec348667ef16223b323322ae77bb54b,2025-01-08T14:15:26.803000 +CVE-2024-55218,0,1,975f95aadd728c60a4527fcf8a0550d504208f5abb7909e62e4e8433964174c8,2025-01-08T14:15:26.803000 CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd34,2024-11-21T09:47:51.770000 CVE-2024-55224,0,0,4f8d131824b20fb869af69c38a084a00b535a965cb641c1dcc385c5e0ee6c49f,2025-01-10T18:15:24.053000 CVE-2024-55225,0,0,65ed599876ed6d6a32d724946af47b3c7b45688e546c4270a7c0aa2b7e07dd80,2025-01-10T18:15:24.530000 @@ -271906,11 +271908,11 @@ CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e59 CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000 CVE-2024-55408,0,0,f29d22484915f373690eb82371db4cff76b365f8201325c0d76b3e731d67ff58,2025-01-07T22:15:31.260000 CVE-2024-5541,0,0,f9b4d455e6b62fc87b5177b190c5e5d55cffd60f56e01c7f957c7d36f3e08c46,2024-11-21T09:47:53.453000 -CVE-2024-55410,0,0,a341b2a61f8dc44291b67917ab046b0ca56af6f84ecbeba25576f5a2ddd34b5b,2025-01-07T22:15:31.423000 +CVE-2024-55410,0,1,71d000e52276290e12865ac7387f5ba02d219f24badb5759737cae3c54cee606,2025-01-07T22:15:31.423000 CVE-2024-55411,0,0,e79315ed14538192b3442e269ae3df7163b086fe6589e73b0be27cd11820e5cb,2025-01-08T20:15:28.640000 -CVE-2024-55412,0,0,492ff029e687dc426b43e155e183e30d83635b8bd9198a179052d60e8971056e,2025-01-08T16:15:35.527000 -CVE-2024-55413,0,0,e71132936dff763cacd1e3af9fafa9260fb08cafb24be1848dd04f5f45cfd409,2025-01-08T16:15:35.717000 -CVE-2024-55414,0,0,9fbe004e5b78117f4dbe49f0ac8bd9b93d7d50832df3cfac0515d848006dd754,2025-01-08T16:15:35.883000 +CVE-2024-55412,0,1,6e1875e4d94fbec9f5b13096fd8188b74519aaec7a91136cabb4f52c00245964,2025-01-08T16:15:35.527000 +CVE-2024-55413,0,1,eef50e9e636ae6bc827b08d7c7eec17970a99ab50a51fccd44bf2d480fff7156,2025-01-08T16:15:35.717000 +CVE-2024-55414,0,1,0d97009591fcf6c0b34e60fb7a805f4c6f9d80da2e217dde940ef3fa78396336,2025-01-08T16:15:35.883000 CVE-2024-5542,0,0,6f204123d7eb6582297f3ed2f1f9284859b42e6e6e67e32f4ec293ca8971e5c4,2024-11-21T09:47:53.577000 CVE-2024-5543,0,0,a26f2d14789d49017a49269cf3e4b4468656a016d744676df971b6df226be4f0,2024-11-21T09:47:53.697000 CVE-2024-5544,0,0,9d691e1e8372bdc434d572825f303cd1b0a2983a0161dea14c330331f38ec0b0,2024-11-21T09:47:53.813000 @@ -271926,23 +271928,23 @@ CVE-2024-55471,0,0,53c8545095dcd233b02e5b5368ccdda8e9894ef3eef3c8dd7b456e3a987cf CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000 CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000 CVE-2024-55492,0,0,8ed1b6fc2ceef3fd61acd090adb38bc92ce31dd641c3b527d1e8f1507c1a53ee,2024-12-18T19:15:11.777000 -CVE-2024-55494,0,0,53c7bb1bfd8c66b0293309cdb0c5591fc782ec4aded2f3ec4a3667bed3ce3f0f,2025-01-09T20:15:39.400000 +CVE-2024-55494,0,1,e18c2df05e098bc5b8af8a805151ecf7eaea49fee3d16761131c14abd7b58686,2025-01-09T20:15:39.400000 CVE-2024-55496,0,0,c5e38095d75676960b7fbf7f58bdc885b4b159f2f77ece315454c30d8284a24b,2024-12-20T21:15:09.090000 CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000 CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000 CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000 CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000 -CVE-2024-55507,0,0,b1b3683e335ef1ef06b85193f76d2faa87feb69c749286244d6d7ec154c3df08,2025-01-03T21:15:13.340000 +CVE-2024-55507,0,1,e090c8e2ae47f2afd9c837e2f8b0be6d662da9c654c585f5e405c25baac19616,2025-01-03T21:15:13.340000 CVE-2024-55509,0,0,4a5021013466b75dc19dd985fac6f59929ccb3fafbd7ec75f16f4601bde3282f,2024-12-26T20:15:23.067000 CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000 CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74ed00,2024-12-18T16:15:14.720000 CVE-2024-55514,0,0,1ab6d03dbd59f8b12772670ec93c7ec4ae46219483a32dbdb16b58811fc912d3,2024-12-18T16:15:14.900000 CVE-2024-55515,0,0,aa63dd224a4ced8fb9deb1eadd4b58815859b25e0d9ddafab8ac8045b9bd13ff,2024-12-18T16:15:15.090000 CVE-2024-55516,0,0,4229f59dc90fe9b1d907ed2bb61094e572306fdea72c70c9a7f771b2d9b1733b,2024-12-18T16:15:15.263000 -CVE-2024-55517,0,0,75c5a4d411c549a5d957f7b0fe65313c325e61ab29b98b405b291e2c36c5f6f9,2025-01-08T20:15:28.810000 +CVE-2024-55517,0,1,3c8c33e9f0396a101831f3e5ff6c0b4973f6bbd431af52c58783b2edaa611ea1,2025-01-08T20:15:28.810000 CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4be,2024-11-21T09:47:54.927000 -CVE-2024-55529,0,0,59094f574a1ef2f6096a3e5fba1fa56f532a786844da89e23934c518ec5e2e07,2025-01-06T20:15:39.163000 -CVE-2024-5553,0,0,c6aeec952a2778be27c1792a1d1c97b8ff8c01ca6ed08226c6b506a6f771b767,2024-11-21T09:47:55.040000 +CVE-2024-55529,0,1,1d23a6190ed20d6e071a25112ca50d5aa9ed1f469e0055848697711ea503dd18,2025-01-06T20:15:39.163000 +CVE-2024-5553,0,1,d2855d45673ece713f88e0e7b6c665c1740b8c97ad76031078affbab4f13ef8c,2024-11-21T09:47:55.040000 CVE-2024-55538,0,0,67bd56020d7a76419d848694822e6e545c69b0a5adc3b05464d4d5160a8064ea,2025-01-02T15:15:23.933000 CVE-2024-55539,0,0,f458db4a5ff47752a8a05ab76298a754be66b6f65eac9c3cadabf0854aa3f5af,2025-01-09T17:15:16.057000 CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000 @@ -271957,9 +271959,9 @@ CVE-2024-55547,0,0,9d23528e3e5c1a7b1f76563e1d474f90d9913c0e87c6f8fd8a14829ed85af CVE-2024-55548,0,0,b89e0a622aeff00dfd6cdc1dc1884c1956fa3e7da287ae36b11ba4d60647d05d,2024-12-10T20:15:21.643000 CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000 CVE-2024-55550,0,0,9c9a30509bff8c2bca43bc78e6a45113dde5cc452b32a2969aee61b5f7aef23c,2025-01-08T20:46:01.203000 -CVE-2024-55553,0,0,810a82cac63f3726c70750ca498f9d26a45dd46f61fa34682212544bc48bf4cd,2025-01-09T22:15:29.350000 +CVE-2024-55553,0,1,13bfa9f6578b0e367e07f1ddced44768912e274a9195e02e1345bddc78f13274,2025-01-09T22:15:29.350000 CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000 -CVE-2024-55555,0,0,0fff864cbeb4400bcfcde3625f1f4cf98f881f2b9aba59b727db3372655bde9e,2025-01-07T20:15:30.430000 +CVE-2024-55555,0,1,23cb115ef4fe2561a6a7fcc2062f11f2cd9ea52ba2e0bb52e449ed37dbe2da95,2025-01-07T20:15:30.430000 CVE-2024-55556,0,0,36ef2f008ce211b77e0b5750d7d4b803fcde3fc58fe847ba118d22617dc7c08a,2025-01-08T20:15:28.987000 CVE-2024-55557,0,0,1c44f970be9c9162e2fd5fa3f9e1778bc69c31c3d5707dcbd0caa2e430754ba4,2024-12-17T16:15:25.900000 CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000 @@ -271981,14 +271983,14 @@ CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3e CVE-2024-55601,0,0,3b6016987278f61ded580e0e03402a0550929e4ad53cc1af6a73ada12213c6f3,2024-12-09T22:15:23.100000 CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000 CVE-2024-55603,0,0,4a06b9a652178b29a5724b7f94acd1a3f69ff4ebeee7b75073970ce4b7b59f31,2024-12-19T00:15:06.713000 -CVE-2024-55605,0,0,5da59064746c966fbecdee0873926a30743d9cf0c93b3f7a7c4a5a8c531fb4f2,2025-01-06T17:15:39.600000 +CVE-2024-55605,0,1,dcc3a0709fde085641a96a31b4e0e20a623959d1b56a48e708154e6a01cca79e,2025-01-06T17:15:39.600000 CVE-2024-5561,0,0,4022800ab031c19c97b7a8f23f8f937de2c70091af69e68157c4f9d46ea4b02c,2024-10-07T17:45:29.950000 -CVE-2024-55626,0,0,f36d57ae1c0afcb67d13cb2e795b6bacdf08b400aa00b33a8f9a2f26bbc9996e,2025-01-06T18:15:22.570000 -CVE-2024-55627,0,0,173b2a119c84983e8af5be198263941a248429780ccb3b1808671f4cb34cc3ed,2025-01-06T18:15:22.757000 -CVE-2024-55628,0,0,78a27add8018dac3ca13515be1f7ea1c6d7cc8272d70369fac3cba68fec88116,2025-01-06T18:15:22.947000 -CVE-2024-55629,0,0,1049493b548b1aac237fe627a217b344429a469a3d12233187a25d8901f7dbc3,2025-01-06T18:15:23.130000 -CVE-2024-55631,0,0,9a39e6716a26c44626015abe660ed68f10b9088a314dbff4a0b6656d61698251,2024-12-31T17:15:08.870000 -CVE-2024-55632,0,0,0eec14618b1369f8c4390eb6d097cad91004417a9fa469a1ef5602d9a98a71f4,2024-12-31T17:15:09.007000 +CVE-2024-55626,0,1,0952a5ecd227cb571e4adbe45943220192fb5cc5d057dfdd2d117bc04f36da08,2025-01-06T18:15:22.570000 +CVE-2024-55627,0,1,cd19919b57922329811e2b9b9dc695b16e6595c5efa5239d13931a5499f421ca,2025-01-06T18:15:22.757000 +CVE-2024-55628,0,1,4da72569e9fb9cf38780b6a6412844833656868f72da7feb8ac72f5657cd0a37,2025-01-06T18:15:22.947000 +CVE-2024-55629,0,1,780c4ce46e3fedeaf6697f3af5ec57ff4a22df8fc3c5787a22f379165797aef2,2025-01-06T18:15:23.130000 +CVE-2024-55631,0,1,c61e02e505f7e07e3ce0e8957584b0fef970130675c3fb922500870845563192,2024-12-31T17:15:08.870000 +CVE-2024-55632,0,1,b094f90539addcb66cb3e41a3fa71e13de9a88f56b85fd9467860f7182935280,2024-12-31T17:15:09.007000 CVE-2024-55633,0,0,c4adbf002e3ac0157724f2b4e7760aa632e73f70f1dac02e75e7bdb334ba90e7,2024-12-12T18:15:27.733000 CVE-2024-55634,0,0,daf076478546658d85b949599812ed8a4838ad415ad3f0107863e0715848bc3c,2024-12-11T17:15:21.243000 CVE-2024-55635,0,0,392082c131c01336e2210c07f5a3e2fcbd7cb3b3f9054eec0bafd4ca472aaecc,2024-12-10T22:15:28.190000 @@ -272003,7 +272005,7 @@ CVE-2024-5565,0,0,d611550f5bcf5e6c3db2413f5bd8aaf6eb30fde2563331d26a9ad58249b730 CVE-2024-55652,0,0,4e4448d6da8b16d3811a29eb55a690e8e4ef0fe299bd552eafd44d61141bd125,2024-12-12T17:15:11.360000 CVE-2024-55653,0,0,6adab931e15ac490e0ece82122d6e070bb38c705c58b8befc0c0aa90aa8fe483,2024-12-10T23:15:06.410000 CVE-2024-55655,0,0,bef00fcc348918ad1311160a89fda65196adb8f2af6577d95b0acc0a21190439,2024-12-10T23:15:06.570000 -CVE-2024-55656,0,0,46e43658c39c0da316d76f931fb81aadda5dd7fa7670e712bc5b1dcf2f53fba6,2025-01-08T16:15:36.213000 +CVE-2024-55656,0,1,0228a74363435bc50a1a96dd11ad922cd078ff988a1758acd950ec35702e2708,2025-01-08T16:15:36.213000 CVE-2024-55657,0,0,e3a13e103683f05b93abf0dd927a7c0d9024c3649cc998088f3e7a1d85a2ceab,2024-12-12T02:15:32.507000 CVE-2024-55658,0,0,c949ae18febfe1edc874d06e2355cc21345c7bd7bfd85d7215da9d3fc46dcd6d,2024-12-12T02:15:32.633000 CVE-2024-55659,0,0,dae2af40e764fbb0030d736eaddecfe37ef895af54da40dedcee663fed2b72e5,2024-12-12T02:15:32.760000 @@ -272047,14 +272049,14 @@ CVE-2024-55888,0,0,2dd59816688a6ea0fa98f443aa3b9b64966d8d29cc6ba2efa912b5e16a3e3 CVE-2024-55889,0,0,4fe80ccef310d79116a068c6ac228ca3c43ec868733cbb7b1340936879db80bb,2024-12-13T21:15:13.483000 CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000 CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9e2b,2024-12-13T18:15:22.373000 -CVE-2024-55896,0,0,58f855d897602f0ddd25272da3b6accb2a00ce40a285c9003204ef42399d7775,2025-01-03T23:15:08.437000 -CVE-2024-55897,0,0,965b449aed633549369e65253663c8ef0d14436fec1119cd03952115edc2e4cf,2025-01-03T23:15:08.573000 +CVE-2024-55896,0,1,d7dd07510a57c238a16c0fe0788b36dab26d7ddf0b08fae01a783db92ce18bc7,2025-01-03T23:15:08.437000 +CVE-2024-55897,0,1,86f551f0669482615238eeaffb68bcc56791f5e1b9341f9faf1df69a0f9917a0,2025-01-03T23:15:08.573000 CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000 -CVE-2024-5591,0,0,e2235dc9118cc79b3ae0a586a8dc702d3b6ecde665fe3ab616de0261ded7cef3,2025-01-03T15:15:10.813000 +CVE-2024-5591,0,1,5b452d13d5bfa9a2af82af55a6427cebed5363226c02cb0163eff6e664b73ee7,2025-01-03T15:15:10.813000 CVE-2024-55916,0,0,9872d6f0409f9ff4e328d02ac5245f11d6fb899ab88da03bf403c4e0d625bc2b,2025-01-11T13:15:28.353000 -CVE-2024-55917,0,0,a2dca5ced3d5dcd8acfac3cb6ea6554a4664068c0ef8ff9f8ad449c34b6bc417,2024-12-31T17:15:09.140000 +CVE-2024-55917,0,1,c12e2bbc393b15d20fbce1ec995c8d1d26abb7f3ae27ddc186e402fd7d620706,2024-12-31T17:15:09.140000 CVE-2024-55918,0,0,bbfbb68501d5d412b5390769769529160437a59c66144983bc4b57777cd87c8a,2024-12-17T20:15:23.140000 -CVE-2024-5594,0,0,940fea6f22909b147125fe747964120391a812b447143a313922817b777157c5,2025-01-06T17:15:44.383000 +CVE-2024-5594,0,1,e7555e7b165259baf6d7812e78b67ccc956e8357ef83023a2dc849ba891436dd,2025-01-06T17:15:44.383000 CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000 CVE-2024-55947,0,0,694ecef04fd68cc6252e9a6f0180b35d880ee528dac800d937aa08150e860bb0,2024-12-24T16:15:25.463000 CVE-2024-55949,0,0,730f7b9444cd8d481c090272c978e37b84fbd5b51226a21ecf1c6c64d8e22362,2024-12-16T20:15:13.683000 @@ -272063,7 +272065,7 @@ CVE-2024-55950,0,0,452ca7158ead07675fe20f22ab4fa2cbef70b0c04825b5afe33473c735fab CVE-2024-55951,0,0,a51355b6ae0f3b8ff81aa1c7eb7d8610a8ed0d99cdcd6fefacc2c260861ccc4a,2024-12-16T20:15:13.823000 CVE-2024-55952,0,0,40f06e6cb54766cf7357654cb464e4bb21c58158c39af1ac076f236e96ec903d,2024-12-18T19:15:11.933000 CVE-2024-55953,0,0,b8838dbbbaba7da3aab89f4fad26ee3c0ffb57f557fd7e9c1a84146519feab13,2024-12-18T19:15:12.067000 -CVE-2024-55955,0,0,ac1c2ef253b9a716e29c06e9b39a041456949ea871da5ba69c41a7720b4cb5ed,2024-12-31T17:15:09.270000 +CVE-2024-55955,0,1,18cba96888915c0389c7defca71606c5156a68e05c936a654d308cd47645f10a,2024-12-31T17:15:09.270000 CVE-2024-55956,0,0,8a3a8fd441b4aa1d48f534ccf7c90847b13a0644de401a73337d5c665ef64cb7,2024-12-20T15:21:39.287000 CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000 CVE-2024-55969,0,0,1d80cecd30844cd68ce96a6b7ee5ef5d3b9107e1b08adee083a129c50a18336c,2024-12-16T17:15:12.337000 @@ -272090,18 +272092,18 @@ CVE-2024-55988,0,0,29432b6415b04c94a8d0eb1b75a845ef08e4008189b66c52efa14e8cba241 CVE-2024-55989,0,0,e707f533a0988b2bfc57216e816a527d20614cdc90c948dd911308abe1511f6b,2024-12-16T15:15:26.073000 CVE-2024-5599,0,0,f3e32e76596c8dfbbbc9f620e9218f469ed68b0de9d9b75b168201bc4595067e,2024-11-21T09:47:59.700000 CVE-2024-55990,0,0,70f1199a2919622861e5a195578358ac645b32788dd8f22871a4f0f6544e2cfc,2024-12-16T15:15:26.223000 -CVE-2024-55991,0,0,8b7c1e386244b42f9c836263c4eb40e34c1d08e48e808001870ce3f60c9ede5c,2024-12-31T13:15:07.170000 +CVE-2024-55991,0,1,a34f199c56938cc20e57d9127a3f97fdc324f4b91561ace252ac42e4b494f152,2024-12-31T13:15:07.170000 CVE-2024-55992,0,0,3a92a53b1b28088a747dc25e51b5a5298ed8fdee5a7752908d383f0e1e0fd152,2024-12-16T15:15:26.377000 CVE-2024-55993,0,0,ae36d342f4e92c3c91fa789f8952d6e3879ec56feb7ffab543c711907e566de3,2024-12-16T15:15:26.523000 CVE-2024-55994,0,0,7e04714a38a4c38bb08df1f7ab727dd23504a238fc0c7a013bceb4c7eef3a1ac,2024-12-16T15:15:26.677000 -CVE-2024-55995,0,0,45e7eb77ca82a2354f5bb041caaa6ab86abf4e7e05015f03fb132c4b7cba7d09,2024-12-31T14:15:23.963000 +CVE-2024-55995,0,1,6132a7f417a29e240b35c849d0fb1e2a1e49230ff5667309d0335c2643078208,2024-12-31T14:15:23.963000 CVE-2024-55996,0,0,051525527c437967b20b933fdd4a5eda5562774a9c966611224281057a9b5a40,2024-12-16T15:15:26.820000 CVE-2024-55997,0,0,4ddd75ddbd7e8cba6002090848d5f28f908b98196d746d4696bd512d6e85dc00,2024-12-18T12:15:11.477000 CVE-2024-55998,0,0,d76278d3c46a1747090a2639250ffe1cfc4ff55a8d82cdf9add0285b6a55398c,2024-12-16T15:15:26.957000 CVE-2024-55999,0,0,55efb565e9f4beedd46b3a3d41fbf23eb559d384546ca63d9e1d7ea34eac926b,2024-12-16T16:15:08.973000 CVE-2024-5600,0,0,9ec61c0439dd991245dd59b838c072ef06691da563abf803dab52d51cc92f007,2024-11-21T09:47:59.817000 CVE-2024-56001,0,0,5139231e1834dfdb01fa94db9cdc4fd99b8a1cdda6840a89cc6d0fd5e49e75db,2024-12-16T15:15:27.090000 -CVE-2024-56002,0,0,0feef58a0177c21b8f97a76c88e1c29bc982523bd7e67524d3b993859bd9c004,2024-12-31T14:15:24.120000 +CVE-2024-56002,0,1,70b793e56112c1d8aad25f7a55707ed0973d44dd20df2cf309c7250f5eece26e,2024-12-31T14:15:24.120000 CVE-2024-56003,0,0,00f6c93c049c9977ecf4fe9b8499c83382c15c3e34f2e2e2e82b604ea04338d0,2024-12-16T16:15:09.113000 CVE-2024-56004,0,0,24e2c56dce37d20761feaa3ae43804a7a5a5da718efe84028cf96e0063b8d0d3,2024-12-16T15:15:27.233000 CVE-2024-56005,0,0,41e3f9524fba561942e40759337ee83ef99e503ed528828be049c8240cca65aa,2024-12-16T15:15:27.370000 @@ -272120,8 +272122,8 @@ CVE-2024-56017,0,0,712e189d98a2fef52195f7721a474e0e74c8371658ef85b000d5f3fb7476b CVE-2024-56018,0,0,11cd393071a4c8c34ae363a9bd0e4f4dbe2b82a67d6d33ddd3c4b0913ef79ed2,2025-01-02T12:15:24.023000 CVE-2024-56019,0,0,12df83c09b028a99e70e1e5ab6d4957e9ba6f9a980b08650fa249ccca571e99b,2025-01-02T10:15:06.883000 CVE-2024-5602,0,0,f0b74b0cc64b84af5cc9e3e41d215e059dc6bc39d5e4f09c9ace9e8dd21b7bc5,2024-11-21T09:48:00.070000 -CVE-2024-56020,0,0,a4a57f2d1fc9ce4e44c81dfe4c797c8a26005fe3dd0872d64eb712b80a1cda2d,2025-01-01T00:15:57.060000 -CVE-2024-56021,0,0,5d619aebc7acc0a52c612d97c2a68b325c71ed83b87719cd977480187b3bb3e9,2025-01-01T00:15:57.210000 +CVE-2024-56020,0,1,6eabbf7dfe4d711b77c2c1b5690ab69ae16bbfb023d3369ba79bef7ed9ef7bd6,2025-01-01T00:15:57.060000 +CVE-2024-56021,0,1,7d9694e6380a0c9ae1a9220fd82a5b0aedb67ddfca320534db2093206ea09449,2025-01-01T00:15:57.210000 CVE-2024-56022,0,0,c8920f568097ef10069e16f0a4cefddb57ad967dc6a5ec18f4b7bed5f35e4807,2025-01-02T12:15:24.157000 CVE-2024-56023,0,0,08d10ff5e9f51d2932342443d20fbc875c861e6db2ee7452719897e05fc5304c,2025-01-02T12:15:24.297000 CVE-2024-56024,0,0,7ab0e8450dc3736a54e7e1db10078f72390ddde6c15ff8e17df3f7885baf9096,2025-01-02T12:15:24.433000 @@ -272131,7 +272133,7 @@ CVE-2024-56027,0,0,72d056f872cecf282cd90313d1451ef49ef80d9d43f38abf327aea9d6b8a6 CVE-2024-56028,0,0,d35596eb496f9cd44e6a5d1667bc13c0c7185d6f34c2e69c674deb090f49b9e4,2025-01-02T10:15:07.240000 CVE-2024-56029,0,0,391836ceecdf675e79f07b017144fb7b64a99ce6cbb6a5eab1900e8e17cce3d8,2025-01-02T10:15:07.390000 CVE-2024-56030,0,0,da63ceecf3e579eebb95c35b3eedcfa793c11b2d7b07f0cebcbbb05d1b90022c,2025-01-02T10:15:07.523000 -CVE-2024-56031,0,0,c0c9b69c188fe63fbf36c992d89a4a55a7fe3c26b869e87eae67766023418f7d,2024-12-31T13:15:07.343000 +CVE-2024-56031,0,1,33acb18e2a0d97aae2a61ba73ded08d1c1d60a0938752ffe4b6d860d07159abf,2024-12-31T13:15:07.343000 CVE-2024-56032,0,0,4688a55dec9a5f0eae4f9b8f3a814a68977514c48993d1bdb237d815b5b7635c,2025-01-02T10:15:07.663000 CVE-2024-56033,0,0,889595342b97517a955694a0c9c602c447dd87ce2680784814d7facead327ceb,2025-01-02T10:15:07.803000 CVE-2024-56034,0,0,d83833b640e4942cf2d3b9aa517b178f8ac9df9967759a1534a632d5552aaf27,2025-01-02T10:15:07.947000 @@ -272139,15 +272141,15 @@ CVE-2024-56035,0,0,38105526b1d5bedc3b7b10f055a0c6b657f5498f2a3fd268e3a125c4b703b CVE-2024-56036,0,0,264856de7a67b66d35cde7a09b1d846d5b8066275baadc9f7a8d24415c8c0dff,2025-01-02T10:15:08.220000 CVE-2024-56037,0,0,c40c7bbfe169c04be24a94075e58d9c086503e3394ea3335a201d16b1a926175,2025-01-02T10:15:08.350000 CVE-2024-56038,0,0,bf7a1ae8bc88ed198a82bea4aab95bbdf4a79c01399a29b070b33ad22b464fd8,2025-01-02T10:15:08.497000 -CVE-2024-56039,0,0,f6b9be23457537f16c56ccdd6ca189f61def43e56be84045222bf0b2164ff04b,2024-12-31T13:15:07.517000 +CVE-2024-56039,0,1,7dbcf08c3b73fe01fbd1959d40fbe5cdbb1d7162cff58096421dc7bbd1935357,2024-12-31T13:15:07.517000 CVE-2024-5604,0,0,8891da3265bc2c375fdbcf484ffb602948ffb13c3bebcf06f381e67d81cf40c0,2024-11-21T09:48:00.187000 -CVE-2024-56040,0,0,cd97b647584c5a405bad3af3cb0a74b976a9b3cf745274a75ffff3b9abd6f3db,2024-12-31T14:15:24.333000 -CVE-2024-56041,0,0,e99eb7d8474aa608e8f88e76e6e0b26291c6b8c49f1d86afab33b1c9230cb227,2024-12-31T13:15:07.670000 -CVE-2024-56042,0,0,af7fe08497095e55ce7f7c6708dc128a84252b89e971bfe37f0c467a1f7e3e37,2024-12-31T13:15:07.823000 -CVE-2024-56043,0,0,b3f857a66a91080f9a19ad8de0fb57fcacb90b436bd79e9af2f82310721356af,2024-12-31T14:15:24.497000 -CVE-2024-56044,0,0,08d8d4363a4ebbd19bd2833d49f00f50da162dd583a886776c940d3025777833,2024-12-31T14:15:24.680000 -CVE-2024-56045,0,0,143d7aa8da647f8d49b69de038be6f843fc7fb9b3ca05b8b9f03896ab806904d,2024-12-31T14:15:24.827000 -CVE-2024-56046,0,0,d42c3c9d632de7081ec2fd1224192102ea48b8d918642c31e4ba2f2e629ab78b,2024-12-31T13:15:07.997000 +CVE-2024-56040,0,1,2c423ac616a879df99d96ae5419f74257216f18a93bbee8697eb684d835cfe16,2024-12-31T14:15:24.333000 +CVE-2024-56041,0,1,3efdb1f0799f2893dbc7f53144354a14d20e476906d217193dc6e5889751d4c3,2024-12-31T13:15:07.670000 +CVE-2024-56042,0,1,01fbe5ba12b7c932da2bd2b13585862d90d37f1209a4a3950de06d9539d54aa8,2024-12-31T13:15:07.823000 +CVE-2024-56043,0,1,60acc12adc3193a694615c30253ffc899be6d994fed7efb17fe7784ad693399e,2024-12-31T14:15:24.497000 +CVE-2024-56044,0,1,2f60baff634e17cad28f570f936aaf7ce1f7f1730f4394cc28002313458711f4,2024-12-31T14:15:24.680000 +CVE-2024-56045,0,1,9baa94a4403e0cd5fc5fdb961b3cd128b1568dad4e84225670225a00952addc7,2024-12-31T14:15:24.827000 +CVE-2024-56046,0,1,913a472f569b1a8d28a63df4b37926d033afe834c85d6f83de2728dde1fc05ae,2024-12-31T13:15:07.997000 CVE-2024-56047,0,0,83f2a6b23cf66f0a3517133f72c396641a8fcb2654419d1243a68e7351e0c8e2,2024-12-18T19:15:12.197000 CVE-2024-56048,0,0,704a7c76e471adab013ca3860c8d3d086c9ab580904e503d2d9e9c3e8cd3fe40,2024-12-18T19:15:12.333000 CVE-2024-56049,0,0,2a3abf0d0029b2c8d81ded058c8d6dd0c0a2c30acc0773a6a3fa87493498baa2,2024-12-18T19:15:12.470000 @@ -272158,23 +272160,23 @@ CVE-2024-56052,0,0,9a44770d39da7be425571a9350723d3d9e09d773bb8c96e5f144a39458c2f CVE-2024-56053,0,0,026aacd8a5b9ca9d06f79c80ecce4ffac76991d6422ee09c875a778f742e2ca8,2024-12-18T19:15:13.003000 CVE-2024-56054,0,0,4ecf044ccaa288170eea4018528a257091f569e9668667ecf092c6eee1833a59,2024-12-18T19:15:13.137000 CVE-2024-56055,0,0,1e85ee23c3361383079345b69160198a31bbded4d1fcb235bf4bc7a0356b4c45,2024-12-18T19:15:13.263000 -CVE-2024-56056,0,0,8d14785eb528e82368e3b3c93b1f879b67915ddd42adea1eee4b741c53e85318,2025-01-07T16:15:37.140000 +CVE-2024-56056,0,1,276c74e32dafcf10ec5fa736f4277e539a1e97cc46d2be2475432ac1bf9cd366,2025-01-07T16:15:37.140000 CVE-2024-56057,0,0,52ab628951e1d719b316ba7abe1325c61108c1e1b94190c530d208ac2916ed0a,2024-12-18T19:15:13.417000 CVE-2024-56058,0,0,acc256b72c6ddf178feafe627688e78f25a5d2961313a94b4eed1089cb116425,2024-12-18T12:15:12.087000 CVE-2024-56059,0,0,54cd8436a78994ce8bff57ca5e507720ff26093eb1124abb1e7cdd3e2c39fdfb,2024-12-18T12:15:12.237000 CVE-2024-5606,0,0,98eaf774fa1e05fbd39a41e5847ce28629e9cd607119c8a5d04808d521a366d5,2024-11-21T09:48:00.483000 CVE-2024-56060,0,0,d52c48295d0dbb3abfdc5dccd1daa1a43773049add0bc86c3cdd22c212f008f3,2025-01-02T10:15:08.643000 -CVE-2024-56061,0,0,0555300ca4f8de993de3e6199b991931f06384054ae3d66f5ece6183e106d6f8,2024-12-31T14:15:24.970000 -CVE-2024-56062,0,0,fae0b4ee5a29227fb659c685682916af494ff76f200f1118f457302d7a8a8333,2024-12-31T23:15:41.237000 -CVE-2024-56063,0,0,a30ff5745a1d7c9ece5cfb1b4b64b1a8a28fad5d7a3ff7d1ecb96f8889756364,2024-12-31T23:15:41.393000 -CVE-2024-56064,0,0,58fdde17bb443e644c38b5bcc3140c470e38a3333f869e5a8a62812956190f27,2024-12-31T13:15:08.157000 -CVE-2024-56066,0,0,6a4ae8150558078115dabaa82b9f0e1725ae58baf43b140a8d9168f05a0945e8,2024-12-31T14:15:25.117000 -CVE-2024-56067,0,0,3ffbd22c75700f278bb18c0b258b320adb7ce89f7125403ed6ac01c48f664115,2024-12-31T13:15:08.323000 -CVE-2024-56068,0,0,484c3fbeae726407c45221b9127fd7ae682f2e8afad0d985a01f78a50907db98,2024-12-31T13:15:08.483000 +CVE-2024-56061,0,1,a028e486e70270644a1996649c2c3b8450478b85bb5ddc1825cc066d2525f2f5,2024-12-31T14:15:24.970000 +CVE-2024-56062,0,1,0710d5a9eeb90721a35932b9d93096a40330ad3819456d48d0db54e95031a5c0,2024-12-31T23:15:41.237000 +CVE-2024-56063,0,1,ed2ab2d5c262e5bb3a5e177f403525bb9adf28ffe38af3acc326c401291aae27,2024-12-31T23:15:41.393000 +CVE-2024-56064,0,1,0d85e693a6ee180923e3bd9bf5f6c4beff2647e62cc73ae1ee472d7fcb52494b,2024-12-31T13:15:08.157000 +CVE-2024-56066,0,1,4b41a7e13e2d31a70f1527d8d2fafeb73707725a422cde8f675c73ee0c2f217a,2024-12-31T14:15:25.117000 +CVE-2024-56067,0,1,597ebce79b808ecc582bbfa17e7f441dc51b6f609bd6619333a0dfc4b05a0d84,2024-12-31T13:15:08.323000 +CVE-2024-56068,0,1,92316b067e27575fa15c4235d39b371638edb63fc20f54ce0f3777c553727cc7,2024-12-31T13:15:08.483000 CVE-2024-56069,0,0,83f35c4affc7acc78873e5c318e3b4a9d6eef4ba49bef76d17fd270cd3a5d8b7,2025-01-02T10:15:08.783000 CVE-2024-5607,0,0,2f2e883967a2421396c2c72ed671760bd1b0ce90e12a34d10be305825ec8d97f,2024-11-21T09:48:00.667000 -CVE-2024-56070,0,0,9be63c2c231566acbb77ec29472b97354231e15d54e62b6bc0c24031af290014,2024-12-31T14:15:25.257000 -CVE-2024-56071,0,0,9aa954a83f6091350dab32441d6c7633ddf9640183f041a290b34383764d108f,2024-12-31T13:15:08.633000 +CVE-2024-56070,0,1,116483355cd6fe6ebc5ef0a6770e85a3751a319974ba77f0d38f8b4e711917dd,2024-12-31T14:15:25.257000 +CVE-2024-56071,0,1,9c072d8fa766d28c4ff4d1af672aa62abaab633128a243597383518f7351757a,2024-12-31T13:15:08.633000 CVE-2024-56072,0,0,2f21e51bf736a459519872f37115b6d7b720b5912764e3d8251d315755964ab0,2024-12-16T17:15:13.500000 CVE-2024-56073,0,0,a6e397ff32d75ae8a3c1cdd7aec666fbdab955f0ddcd3e039f43dae421674c4b,2024-12-16T17:15:13.700000 CVE-2024-56074,0,0,a14415b5ae296cd11e2e04c1575df9e68986e1feed991423320ce9c846af3c6a,2024-12-16T16:15:09.250000 @@ -272190,7 +272192,7 @@ CVE-2024-5610,0,0,c876fccd541dbbe5edac90b3257f7d2b3efde4d5bff83326921f06d03b7a38 CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000 CVE-2024-56112,0,0,9c37554a9e3e8121be632deb2b2e9ed13eeb0233b63a1c1f431c838fba55a392,2024-12-16T16:15:10.313000 CVE-2024-56113,0,0,9c6eebe0f1bc1bdcb42beb239f6097e41ca0a3c73e7b62b154e7547ecc0e7184,2025-01-10T19:15:37.920000 -CVE-2024-56114,0,0,f02c2ad4d7ecf61e5fdce904c466ce41d4413b0292bff9e1ea986774cc1bdbf2,2025-01-09T20:15:39.730000 +CVE-2024-56114,0,1,86a5bda3b0dc5f3190bd9efda3b63869522ae9588f5c311e3902e071f356da1d,2025-01-09T20:15:39.730000 CVE-2024-56115,0,0,ccfdd8ee6f18e71a09e80e77c239dd784626f96d64ab8285164962abb0ea0b53,2024-12-31T20:16:07.903000 CVE-2024-56116,0,0,5e9e1abf1b4a263f6e9c895ad87cdc1730c02159e6e176fd37997ee62e12a317,2024-12-31T20:16:08.107000 CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000 @@ -272212,16 +272214,16 @@ CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 -CVE-2024-56198,0,0,abfdcb1f69b5c065e3b798d9edb33ef48ebf0110440e37af007485f81618d46e,2024-12-31T16:15:27.247000 +CVE-2024-56198,0,1,d9de207e762af79ae5486154cdbb63e6556ac0599a95c1cf37d7f9e9fe1adfd1,2024-12-31T16:15:27.247000 CVE-2024-56199,0,0,b62df53baa8d4848a6f31e2b0b1f49a9a24a4405c740c5c1ac552cd60e35a283,2025-01-02T18:15:20.427000 CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000 CVE-2024-56200,0,0,3879bcf029467f661c4f86f22f421720527f4e18cebe03faa8ac0ac24cb0d998,2024-12-19T19:15:08.280000 CVE-2024-56201,0,0,96f6dccb5d9eee1aebc91ce6c8578e9c38f6d2d0d9bb42f64cafa8b5002a7dfb,2025-01-08T16:15:36.387000 -CVE-2024-56203,0,0,51759cbb4476088df63db090de9799324d920ca10202f18ca01ed4e47fe27dea,2024-12-31T14:15:25.400000 -CVE-2024-56204,0,0,29d317ef540c04a3c1370210f72eb2ad1092da07e31f4181b526002329212ae2,2024-12-31T14:15:25.547000 -CVE-2024-56205,0,0,05115ecefd611267c4c19ce2b2b0a93b99d990683bc8444b258453fad8f9d47b,2024-12-31T13:15:08.803000 -CVE-2024-56206,0,0,0b5db90277d551e85d15c0f21af9a921040e1e53ecd47f22ac204e0c362a9427,2024-12-31T14:15:25.680000 -CVE-2024-56207,0,0,c1c0cb9f8e45bc20396366954155eaac05e9c5f2e9d99c268c48740db3b0d890,2024-12-31T14:15:25.830000 +CVE-2024-56203,0,1,e99e9de74c83a36dbb17a843377a1378f7cef98ac1909cf2366fcf78cc18f19f,2024-12-31T14:15:25.400000 +CVE-2024-56204,0,1,6a6e8f022625febdb1ce3a481d0a8e2bb1f1902592ae6e2bfa4e06cd41426aed,2024-12-31T14:15:25.547000 +CVE-2024-56205,0,1,8369f1bc37e0dcf8f712f3109d50a2811210639fc84cb65dbb5b1dd98af12e24,2024-12-31T13:15:08.803000 +CVE-2024-56206,0,1,bfa844e2f3c753150fa0208bfe9068ab8428125b2bc110220bdf9fe1fb8a4a32,2024-12-31T14:15:25.680000 +CVE-2024-56207,0,1,fe5fa7f9bd1f20610e53a6d1e4cb57725d4c03b95e1e7339c4f12e54715906b7,2024-12-31T14:15:25.830000 CVE-2024-56209,0,0,a6c7dbaae5e8398cb6350015f3e657a57d9dee582291551045e7d3d465af64b4,2024-12-31T11:15:07.173000 CVE-2024-56210,0,0,61e5bf0300440eaa9ba6250bb86484889ebcc3461af17fe2cb57d8d5315f345b,2024-12-31T11:15:07.337000 CVE-2024-56211,0,0,a82c653f847f9d61b21b4edbbd9e6753987fcf0dc8a11a366f8d73178e32abf2,2024-12-31T10:15:09.390000 @@ -272288,38 +272290,38 @@ CVE-2024-56266,0,0,265a3e77ffeab76fe861882c5717b3b9f7e42687ff2745ec11b3fa63a202e CVE-2024-56267,0,0,1a857d7bf07f7bdad7247fe75bbc7603553ef3ae2a1cef53f9569ee0b2c25d2f,2025-01-02T12:15:28.617000 CVE-2024-56268,0,0,6c5e42fafa8d0d431aa18ee0814c13c9e3020d74b57b5ddd14fbebc4b330873e,2025-01-02T13:15:08.120000 CVE-2024-5627,0,0,4f3ee87aef2fc9763c8caa5864c6f83c1e8820b485bf86b137197706dbea80f8,2024-11-21T09:48:02.683000 -CVE-2024-56270,0,0,df13454e72976bfa8d5a934269f214a22dc7ca6db8fdc5b423c4e419c271bb6c,2025-01-07T17:15:31.140000 -CVE-2024-56271,0,0,df93b7b8c223fda7db8cbb4a8cc54558145247fb67ea138a0710e62e8e911ccd,2025-01-07T11:15:08.633000 -CVE-2024-56272,0,0,c4dbe487d0cac00b9007bfec86295aaafd9dbe01ebce3e80cbae94fe35f40618,2025-01-07T17:15:31.287000 -CVE-2024-56273,0,0,70a23a8ba1d0ad54c61e3bfa45bff3ffe0599c3be68f5ed823651c9ddf17a51a,2025-01-07T11:15:08.800000 -CVE-2024-56274,0,0,91313746e73dee537f4f972ba62324c78971b1a73469f61e949c7f1c2409fe09,2025-01-07T11:15:08.960000 -CVE-2024-56275,0,0,2793727a8fefb5fd80a40f3d275862084bc0f436c8be3b4ff920f614e5ec8751,2025-01-07T11:15:09.130000 -CVE-2024-56276,0,0,edf3d6bd28c3bcb1c663cd9ff9c00515c0a41e8cd2eab0ccd5d51e7cdedec0f4,2025-01-07T11:15:09.293000 -CVE-2024-56278,0,0,4537d7db0492733c0f7571c5e2cb3a2ab6f2be630bbe898e32e301103b454a03,2025-01-07T11:15:09.460000 -CVE-2024-56279,0,0,fb08963287913155bbcf6e02d9560bcfc33a049d8f984ebd98ae337db0c7d0b2,2025-01-07T11:15:09.633000 +CVE-2024-56270,0,1,56f354a93121f63339f7a3dbcd942751a0062c6136e226db3b9702bd66049603,2025-01-07T17:15:31.140000 +CVE-2024-56271,0,1,be6980e11d9de76669d3bbd1d2196bf26d8b1427a176ca9aaa1451ab35bfdb65,2025-01-07T11:15:08.633000 +CVE-2024-56272,0,1,db9fe9c284d5fc60397511dcd1fecc4169ae0d17d69eb24e757a047eacf30a80,2025-01-07T17:15:31.287000 +CVE-2024-56273,0,1,f3b339a750cf26c8f041bfebab629309f499d098dce492405c144e6fabc53db9,2025-01-07T11:15:08.800000 +CVE-2024-56274,0,1,46dfc2899337e1c799d2cccc8e16e1704e1f7d8e3aa091b747fa7acd8e7f8465,2025-01-07T11:15:08.960000 +CVE-2024-56275,0,1,9300415b3d7dfdb21e4bcf98e6b049d2270278d0318cd78cd0580d5bb4fa3aff,2025-01-07T11:15:09.130000 +CVE-2024-56276,0,1,00f6b9e0227c33f5e8b70946c15e191837645d3c728e7697707e4b3163250bbd,2025-01-07T11:15:09.293000 +CVE-2024-56278,0,1,7b39d950ef51de16ae31685f069f6c6d113d1e47d70ded5845406aa9152618e9,2025-01-07T11:15:09.460000 +CVE-2024-56279,0,1,b9950fa6d62ea9e65991aa518c54819f9abe48771ec7badc646331c83db213d0,2025-01-07T11:15:09.633000 CVE-2024-5628,0,0,755412ba03c7f502c54c635c9705b96a4154da09bb9bfca64f93d1d41d08cf6a,2024-09-26T15:14:26.547000 -CVE-2024-56280,0,0,fdf350681a90dcecdfd57085a9bb526181655783e9da07940194562211312dc0,2025-01-07T11:15:09.820000 -CVE-2024-56281,0,0,787668d40c31d955a6eada5097fa8520eb1e912fbe7063c421d93ac4d330c9b5,2025-01-07T11:15:10.003000 -CVE-2024-56282,0,0,1ed2d7bce7c332f5f9b50e5d473e3717027690bc48b7c9bbbd2e1757ae2e54c0,2025-01-07T11:15:10.177000 -CVE-2024-56283,0,0,7d0efc49fd4dd9e0d9d9182be7327446bde5a6f404f99d78c94e746efbb1aaf4,2025-01-07T11:15:10.357000 -CVE-2024-56284,0,0,6c9d1d893e48b3fc757033f00523e9d52bbef21a08335a55572373f5e50b0cc9,2025-01-07T11:15:10.537000 -CVE-2024-56285,0,0,53dcbb7aac120308c48afbdf0d789a4b52206114dd7e9c6752189cfdfd994b7c,2025-01-07T11:15:10.707000 -CVE-2024-56286,0,0,f1240a345a1863c243d12ad848883f08a37ca5506ab053788b7d9eb2f4380750,2025-01-07T11:15:10.883000 -CVE-2024-56287,0,0,8a46d37184d8b991e6147853f9feefcac6bcc6a00fe2d15db8863ccdaf0b0e9e,2025-01-07T11:15:11.060000 -CVE-2024-56288,0,0,b9362d682c5550d7eb30dea55bb97b59b3a2da3b13a57a0372cc3cbf0c647e6e,2025-01-07T11:15:11.247000 -CVE-2024-56289,0,0,9fd377c183708c6d7dd6c1a0655e6959fca682baf2fcdac96c68cd04aa35e3b8,2025-01-07T11:15:11.417000 +CVE-2024-56280,0,1,9ddade5899ee5c04a28ca8e5033767061338a6b1201d6a9503f0fd5ffa3276d8,2025-01-07T11:15:09.820000 +CVE-2024-56281,0,1,9c3b69f0b2ecf520353b529a17ca8ad701ab8ccc15815f99ab295cf335f2f6a2,2025-01-07T11:15:10.003000 +CVE-2024-56282,0,1,04e98b81565a63c3e74733082f2cc2f0ed2a15a497ac9549579e47435edda923,2025-01-07T11:15:10.177000 +CVE-2024-56283,0,1,79c5f86507c9307f4fac74ade5445eeb172dfbdd1b5e4dbc1039aad6b3560ebc,2025-01-07T11:15:10.357000 +CVE-2024-56284,0,1,4ad097c30327cf6a2ce2177a9faeb87676a0ecdd2e832e7ad533b282007e7b30,2025-01-07T11:15:10.537000 +CVE-2024-56285,0,1,2bc0a65443ce7f31213741c4324efe214bb4633910e74e3aae2717eccb5f2087,2025-01-07T11:15:10.707000 +CVE-2024-56286,0,1,3d01d551bef5feb8be0f9be642aae2e234cddde808c71a0a3e0451071855abff,2025-01-07T11:15:10.883000 +CVE-2024-56287,0,1,cc75ffcc84b4adae7c76dcb39d27a677e443f14ce8e73dc6845fc0bfc2f5ccc2,2025-01-07T11:15:11.060000 +CVE-2024-56288,0,1,300fe16e1982acc540ebe3e71448c8ef62ae763dae00d2e3c1187d8e3448c8b4,2025-01-07T11:15:11.247000 +CVE-2024-56289,0,1,46da438f190346407305f70b09682e778d0c5075bd8ff6c77af321ebbcc08762,2025-01-07T11:15:11.417000 CVE-2024-5629,0,0,f9daa1fe2950a7ccef0838fb6e6cae4a7319a3ab1da6174da12e5faf2c955f5a,2024-11-21T09:48:02.860000 -CVE-2024-56290,0,0,e804845dcea0c7022f0312849d911d19b5f92ee017663329f4adf6c266928e62,2025-01-07T11:15:11.587000 -CVE-2024-56291,0,0,1e89e99736007130072d6c2209d311906f24c7b697bc98702b8f36dcad17a249,2025-01-07T11:15:11.760000 -CVE-2024-56292,0,0,c51f2fffee4e29f60b2b0d1d189c2341713abc23a1487d0cd7fdcdb1fcf4122c,2025-01-07T11:15:11.943000 -CVE-2024-56293,0,0,b8ba7b42dbe37b16f05ba1b61e44f82d739a9fcf66077d2bccae329cbac3ee18,2025-01-07T11:15:12.100000 -CVE-2024-56294,0,0,d94a6b5c80bef08f0aec07c3d76865d6fafb9641eb5afcdd2320b78b94a65505,2025-01-07T11:15:12.270000 -CVE-2024-56296,0,0,727e5ea5c0e35a0c7ef78dac3be486a88ea4e18748f08f5e17f93dc62a555a12,2025-01-07T11:15:12.467000 -CVE-2024-56297,0,0,beff089bce91d497c127a4695752299bf34729349cbe8bf9bd55f5d443a1d6b6,2025-01-07T11:15:12.643000 -CVE-2024-56298,0,0,224a1683a7d2c9bc1d94e6f791ca81d5534b4b5a190efb516c0a9e3a594a97e0,2025-01-07T11:15:12.807000 -CVE-2024-56299,0,0,81a883077652b91119a3cfe78b721fe30774c375ab9713ea1642fa0b9af8b16a,2025-01-07T11:15:12.960000 +CVE-2024-56290,0,1,f2c6c9e38b912be6577cbbb4c7df6b8bb05b29c80a0bdaf2819d11dec13b1f37,2025-01-07T11:15:11.587000 +CVE-2024-56291,0,1,48645baf7bdc88e516614d962f94fb1fac9b78ac59c04f570d3af4e27edafa2f,2025-01-07T11:15:11.760000 +CVE-2024-56292,0,1,b8c5eac9032fac60f36a83699c17bb1cf4e5aeb40bf08f49fc3262d643b66777,2025-01-07T11:15:11.943000 +CVE-2024-56293,0,1,3b45dcbdac77e414410e489682239cde470dc717efaa7ef8cf82fc2bbd777adf,2025-01-07T11:15:12.100000 +CVE-2024-56294,0,1,b26837195ca12c6c365d2fd7b3d165c913a922cd77e049adb61cad295b465d07,2025-01-07T11:15:12.270000 +CVE-2024-56296,0,1,44b95312336975bcba28e41005693632f9d16550b6452bc089daa9967bd1d3a0,2025-01-07T11:15:12.467000 +CVE-2024-56297,0,1,ed761e25c979a4fc44259b5ac2d6526707ba072d111ac25998ca3e6a01d412ae,2025-01-07T11:15:12.643000 +CVE-2024-56298,0,1,2789fa5d036005bc0351788cc02882c3b6e32cd00eb4381e16ed64e756303b30,2025-01-07T11:15:12.807000 +CVE-2024-56299,0,1,e2b6482b24da2187df00fc2d99b8b6504835dc7e0411924e896022a0742dc728,2025-01-07T11:15:12.960000 CVE-2024-5630,0,0,50874e31f2d6c9403bb3dbaf933b8b3f439196ea7c18b531eba9bc061324fe0f,2024-11-21T09:48:03.020000 -CVE-2024-56300,0,0,6531f60bb6fc7d50575450a241ba60ed46e028300b5a029de0cff1df022f04a0,2025-01-07T11:15:13.117000 +CVE-2024-56300,0,1,fd8f91c54d7b2d2f0c20bf657c6cc558d46dbec655d8d7ad2230066619d3c5be,2025-01-07T11:15:13.117000 CVE-2024-56302,0,0,3cc2e63549a8e725e4b4c7af568502951e05c6a235ad3d0ca614770a8ee20a50,2025-01-02T12:15:28.753000 CVE-2024-5631,0,0,2a74e658158bae900a85436e92fd017c375ea2371e9ccb7b5a67e7bbd481f6b3,2024-11-21T09:48:03.210000 CVE-2024-56310,0,0,504b7fd666c1442286d54f55944c462eb51c7dceeef2927a27ef8634036e0670,2025-01-10T11:15:08.653000 @@ -272331,17 +272333,17 @@ CVE-2024-56317,0,0,8d6cb761ec1de8db3f8894652188d82bc1e600feec839db7f7746cdf2c5b1 CVE-2024-56318,0,0,4614542827deff1ff7fc917535aa016ec46ffc813ff98610f6d274ec4b4e2e50,2025-01-02T20:16:06.917000 CVE-2024-56319,0,0,28ca3f0845265026262f805138452dcd32240d1eb92a7bdb1a246f385a35fe7a,2024-12-31T20:16:08.380000 CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000 -CVE-2024-56320,0,0,4eda4728c722745fa83c018bcb06c20aea9f60ff8c41259296e4a4c554063114,2025-01-03T16:15:26.180000 -CVE-2024-56321,0,0,f007cdcc8c5c7740677687fab09bc6d1ee06e39af1f26a50ef2708c735c64b11,2025-01-03T16:15:26.340000 -CVE-2024-56322,0,0,9c98015a1c7e973f340344069ea2b9fdf43de74d4499ee8abc0ff5e334235490,2025-01-03T16:15:26.480000 -CVE-2024-56324,0,0,258124e3e63e91b2b48a1da381b7cab45c2ee7a77dd9108ade3b54a6aeda90f5,2025-01-03T16:15:26.643000 +CVE-2024-56320,0,1,7c1f738efb01f994e6aa710bdf93faf09602c1cf0b08ca3443806c0c1e84929a,2025-01-03T16:15:26.180000 +CVE-2024-56321,0,1,74f6aaba2312f358c8612f649e79b3518a2426ea72dd60ae831d7b708032a87f,2025-01-03T16:15:26.340000 +CVE-2024-56322,0,1,8ee18a8aed8dde9318d518b84e60033ce04395d9ab1e2e8b41773f6c45e68aa8,2025-01-03T16:15:26.480000 +CVE-2024-56324,0,1,1ba8ed12eb3c68f3a00dead310264c1c177b76fd79da0868f4a6a097d58c19d9,2025-01-03T16:15:26.643000 CVE-2024-56326,0,0,3ccfa47d9bea58f3625dc78a40f8b39f6e3cc587e1d87fa9c9f0a5fa86f60f49,2024-12-27T18:15:38.947000 CVE-2024-56327,0,0,fc2f9db0e9292714542fc861ea9d5ceb7274916f39c244431a521117db26612f,2024-12-20T18:15:31.083000 CVE-2024-56329,0,0,8fdf810f87f9e68d511be79347aafa1a2f560fbe7ecef214b0341e7d568b9acc,2024-12-20T20:15:23.987000 CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000 CVE-2024-56330,0,0,cc2469855b48dd40812f7fbbf009598abdbeb1081f50cb0a33dff8e3cf6f718e,2024-12-20T20:15:24.167000 CVE-2024-56331,0,0,56bb9f9373efee702b7689a46e1daacea45f4bf1b3344e95d6a09a02cb29916d,2024-12-20T20:15:24.337000 -CVE-2024-56332,0,0,1ca8b3e3c7310aca62a4b73a32a15bcab556c8d36748bd113633f34cfb638a59,2025-01-03T21:15:13.550000 +CVE-2024-56332,0,1,36aaabd212236fc43704c57d84c2299eefa90a3f259bb5c46be9e43750fd2197,2025-01-03T21:15:13.550000 CVE-2024-56333,0,0,fe45e753af8e2751ee1e363cda61187450051dec4bd66c266f1a6acfb0239817,2024-12-20T20:15:24.520000 CVE-2024-56334,0,0,dd145a89bec8d5c627af1aa8e241a3a3cc8f1f4441c2e387ed54258794c2f5a4,2024-12-24T17:15:09.760000 CVE-2024-56335,0,0,68042c7d7012ee80feaa30ed25472b1a3afe996d5346e3cfc0fb43c7dcee7c7c,2024-12-20T21:15:10.277000 @@ -272365,56 +272367,56 @@ CVE-2024-56361,0,0,485be3f1d18cc489008b66f826695d363803bc91e9441f752e5a42cc4215b CVE-2024-56362,0,0,6c11627d17fd0c98131328b72e24d3fe9b01f90190167be28f8c83514e2d2986,2024-12-23T18:15:07.617000 CVE-2024-56363,0,0,7b130d481442d6564973e2a7227b43f5a030ae8a41341bb70189f5abec825a62,2024-12-23T18:15:07.767000 CVE-2024-56364,0,0,6115dedb84ebd874c4c0a6694d1fb784d8502b3a627aacf7ea4fc74186ea1ff2,2024-12-23T16:15:07.770000 -CVE-2024-56365,0,0,c5b2dbd1a5c652a33591aa7ae09b57eedaa2b08f679f5493d59f5f8c048bc0d1,2025-01-03T19:15:12.340000 -CVE-2024-56366,0,0,48479ea8f55db434c5c7ac53217ddf9dfe727218e3e7377f3d536e1c0f97ca5d,2025-01-03T19:15:12.443000 +CVE-2024-56365,0,1,90b4a8dc5af5c7417ab38949ac69cca0ac19960bffa66a95ede05bfebd2aecb3,2025-01-03T19:15:12.340000 +CVE-2024-56366,0,1,5d5050d19e9512349e99560a15ebd241b3438eb4f271b6e29d9ed63f918d5d01,2025-01-03T19:15:12.443000 CVE-2024-56368,0,0,83130770495e059f53d1ccc77eeeea04285810e00c87d0c45bcc66175a524ebf,2025-01-11T13:15:28.530000 CVE-2024-56369,0,0,c1e9261ae5b789a6873649b97707862a8b8aa38092e40c703dedc5d515d05eb3,2025-01-11T13:15:28.700000 CVE-2024-5637,0,0,a5e32b0dfdcc3b00fa1c534a6efa8caef39b80f083f1c956c246ad8a83c6df00,2024-11-21T09:48:04.030000 CVE-2024-56372,0,0,63a64a6c0142715c4ddc6ec56300de4db39119137bfcc0781143b559cb029ca1,2025-01-11T13:15:28.873000 CVE-2024-56375,0,0,1aeae50409e14309fb31af7dcf320eae7189e473177b68d63698866c2c62cd0b,2024-12-26T06:15:06.203000 -CVE-2024-56376,0,0,78193d4d04d76f4de46c79dbff8296a0eda078607f3d954520ea11bc0d6b10dc,2025-01-09T23:15:07.827000 -CVE-2024-56377,0,0,6e436e28932511f54e7bb6ea1ef2d3d7a415c2597b99deec8ebba40ac125e9b4,2025-01-09T23:15:08.173000 +CVE-2024-56376,0,1,293adfe8110695888f5d305a7e630d9f1aa8d9336bf49c9f04fccba5f352c725,2025-01-09T23:15:07.827000 +CVE-2024-56377,0,1,7ae4c8e46f2893d74e7934cbe9f468ff6df70ed8fbdd487a1c86d24398f7fec7,2025-01-09T23:15:08.173000 CVE-2024-56378,0,0,fab67c7f7143f85c88660814de01440f680c12a24f807e1e2e38a3d85020bb03,2024-12-26T20:15:23.270000 CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b84,2024-11-21T09:48:04.153000 CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804e5,2024-11-21T09:48:04.290000 CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000 -CVE-2024-56408,0,0,cd4b6b211e0a160b70acb972ac8ce8a8f58fca4bf287c8875ce7a1ecf63f672e,2025-01-03T19:15:12.533000 -CVE-2024-56409,0,0,d99656fa69c650421ca8cbabcdd83e678caa5cfb8b9a6a9a68c5e4694cb43a45,2025-01-03T19:15:12.627000 +CVE-2024-56408,0,1,231c67f9fc1f41f9606578a75272e2c2a9d506190f72a4802346eacd6c714911,2025-01-03T19:15:12.533000 +CVE-2024-56409,0,1,a0be310b5d957146d6a04dd3071b8b9ffcc804a6eb6f1cb89943675a6d183542,2025-01-03T19:15:12.627000 CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000 -CVE-2024-56410,0,0,947e02e2c3f21927d299084b1a9e59d7ee26973dfb0ebd320064a45fbd7d954e,2025-01-03T21:15:13.723000 -CVE-2024-56411,0,0,d520d39d2728c6661a63e679ea00870498cc041f14a81399120c6c5ace601ae5,2025-01-03T18:15:16.203000 -CVE-2024-56412,0,0,7ed733bbffe237b9cbc747cbba38f4b908e9d7eb10b7d53914ac34ca4f2c496a,2025-01-03T18:15:16.380000 +CVE-2024-56410,0,1,b4087d5bfbbaebdf6d473154e8d2fd891403266f5e692dae3f36d2648ba6980a,2025-01-03T21:15:13.723000 +CVE-2024-56411,0,1,16fb7833eac1e65bd4ce8b3032640cc05f65eac24341e6482a4ad42ebe57ef4d,2025-01-03T18:15:16.203000 +CVE-2024-56412,0,1,2ef0a218456ebfce214818399a26f4e9e0287febd7e719465783c6b6614888b2,2025-01-03T18:15:16.380000 CVE-2024-56413,0,0,379dc229ccabdf364af9829d579c8a73e199b5e7c66cddebda4706bf51009015,2025-01-02T16:15:08.570000 CVE-2024-56414,0,0,8d131c69616c062c73dec88651a9a991bc9ee2aa5d8bfac07e8125110c170173,2025-01-02T16:15:08.693000 CVE-2024-5642,0,0,272b3c46f017079f5e7a4c3a57dae457f6d7a543b129faf9804cec24715f8735,2024-11-21T09:48:04.713000 CVE-2024-56430,0,0,0262ea105dbec15a8d2974aa338fd319cfb88d949549b9f7b495f5427178dfce,2024-12-26T20:15:23.447000 CVE-2024-56431,0,0,5aa653764fe24dfd87678f336b5b1cc07c0f854ae90d756ecc10c6203bee6e8b,2024-12-31T19:15:47.847000 CVE-2024-56433,0,0,41933bdf4cf50f4b61b9a39102f868e297a293e10ec834a2eac62b7879bed51f,2024-12-26T09:15:07.267000 -CVE-2024-56434,0,0,df370ba2edbff780f02a9b4d24ed6dfab102277cd844bcf38c1ddf684fd08974,2025-01-08T02:15:25.330000 -CVE-2024-56435,0,0,5c71caeddeac2446874c2c436c688a69576c72ad26579455c536d2bbf1648539,2025-01-08T02:15:25.487000 -CVE-2024-56436,0,0,0a86ad198b939c5bcbac7df2188ce519e8ab4ebdabeeaf1641021c0ebec6088c,2025-01-08T02:15:25.603000 -CVE-2024-56437,0,0,5b31a0f3f6172534c24002f2ef0bc1e152e0583015fdfbb0e8ee5ecc56e90035,2025-01-08T03:15:08.840000 -CVE-2024-56438,0,0,4e5dc0cdaae7b1a741927f46a8e914a4fe2d3d5fc4c17f7ba8ccf49e9ab0d968,2025-01-08T03:15:08.970000 -CVE-2024-56439,0,0,c979f336089e1cb893bcd541d89f54c3a292c739ebd2ec9c3cb2f8601b79a207,2025-01-08T03:15:09.113000 +CVE-2024-56434,0,1,c38d6bd7111b766e42099f8b17a58e6f95abad7b836f20f54664e2006a55f006,2025-01-08T02:15:25.330000 +CVE-2024-56435,0,1,a6b9a986a1657a73fb9f5c59d2598535666faf53ac60b2c834fb1a24f728c95b,2025-01-08T02:15:25.487000 +CVE-2024-56436,0,1,47afde40a091b787140b09341604b928e7f41b98d32166125274686ea00202e1,2025-01-08T02:15:25.603000 +CVE-2024-56437,0,1,54ac281d7e990dcfe2ea842216694d1ac65a0135ef120dbbee077631df857172,2025-01-08T03:15:08.840000 +CVE-2024-56438,0,1,a8de726444760abf673229647a141e422b630f203ef45c36c35fc462f477e941,2025-01-08T03:15:08.970000 +CVE-2024-56439,0,1,a234176053e19689b53ebcf04737cad7c2a140c3eb3e74de7e619fb842a50ffb,2025-01-08T03:15:09.113000 CVE-2024-5644,0,0,160a368b3a7f8d4e53712fad16fb1094662061822d6ba961b4f309a68658057a,2024-11-21T09:48:04.900000 -CVE-2024-56440,0,0,16acffa5094bae5ee91010cb372b2993befc3770cda0cab1ec3a9e68dfd02632,2025-01-08T03:15:09.240000 -CVE-2024-56441,0,0,1b1e2750d1168970a8fb115780abcb6a33b1d8af48b4dad6a8ff85f0f1ab7ea5,2025-01-08T03:15:09.373000 -CVE-2024-56442,0,0,1bd2f376e932cfa6572382d732d00b9322ca048ad30f28356c09ce13a379824b,2025-01-08T03:15:09.510000 -CVE-2024-56443,0,0,ad5ad10964b25a50625210d09f93250e2a5f6d4e5c9ac262511c8307843adcf1,2025-01-08T03:15:09.640000 -CVE-2024-56444,0,0,49c012e99ab101f036331555d29c4e884ae38a2c2afc0500b2e4a27e29b18744,2025-01-08T03:15:09.790000 -CVE-2024-56445,0,0,65a33dd335561249bfaee3cd6aea27972a3353c074ae89a9bf8334d0031c0b44,2025-01-08T03:15:09.920000 -CVE-2024-56446,0,0,0a3ded62e8642b86266b5f4280a3e8f15fa4e5a82b716cbc12e764ea6dbf8fbd,2025-01-08T03:15:10.063000 -CVE-2024-56447,0,0,f9deaf3781a30cdd1b16e0322dc9f307ec4efcb6eea0eb504fa605f7a22fffea,2025-01-08T03:15:10.190000 -CVE-2024-56448,0,0,a6ff180097b24f90f9495c47ed27ed8e30d07b6ce79b516b8a8c36721d5cc0cb,2025-01-08T04:15:07.257000 -CVE-2024-56449,0,0,77f91abd48c81d66c65c7789cd0b293b18ad546bce183b22ce11dc4f185b2671,2025-01-08T04:15:07.390000 +CVE-2024-56440,0,1,ae579f1b21153835e0dfd37c65bd335770e60865163f9f9cadec1b9ae50c0132,2025-01-08T03:15:09.240000 +CVE-2024-56441,0,1,6e5b03dd806437c800250ef57e13302d7bd3ab4e4ad7f97b2a881093c0259f66,2025-01-08T03:15:09.373000 +CVE-2024-56442,0,1,dda2b55badb65575386cb3b79e52e9b68832911e3b093df7b363df9a122a32e1,2025-01-08T03:15:09.510000 +CVE-2024-56443,0,1,cdbd2925d2ab1f5fc291b3357d6f96093e6f4f7239d3b04f3c03c3226db117c8,2025-01-08T03:15:09.640000 +CVE-2024-56444,0,1,b1112c1e26fe8484666a86261c7106496a56b12feedef911e0e4a13c24514e38,2025-01-08T03:15:09.790000 +CVE-2024-56445,0,1,27ee30219da765f78cb6cf4a215dd2ed5b0be3f92b65b48dcd59a07977ebb5d5,2025-01-08T03:15:09.920000 +CVE-2024-56446,0,1,e70e259cb121c2b9551e5a1d449a58bfb6796e14dfd26c9506cde858102f6d89,2025-01-08T03:15:10.063000 +CVE-2024-56447,0,1,5a3b9ffa107ee32adb2af3b6efea2714febb837900fc17f2e875b21f51c5c6a2,2025-01-08T03:15:10.190000 +CVE-2024-56448,0,1,bd3de131eefe5a3405e6568540cf9e13f4fce2d5174361377916b6b7726c5f32,2025-01-08T04:15:07.257000 +CVE-2024-56449,0,1,dde1427e040e691870e4f3b98759f2de2bad6602c326d4f82fbb5218438c2df6,2025-01-08T04:15:07.390000 CVE-2024-5645,0,0,d8c292e5143e4cdbc6691cac923174cc5efea85d55c86c52beb1b8ee7a249593,2024-11-21T09:48:05.083000 -CVE-2024-56450,0,0,8d83445fd9394770e4297202ca55c40dec98823a25a951d2d5a66219bd386f9a,2025-01-08T04:15:07.520000 -CVE-2024-56451,0,0,16e6eaf2ca9291e79409dbac15288719c15f6c5555c1bd2e9c64ccd230580d92,2025-01-08T04:15:07.653000 -CVE-2024-56452,0,0,b0c38b7002f1bfba6ccac1f646aa5f88500320816fba051b881f13c590db0615,2025-01-08T04:15:07.780000 -CVE-2024-56453,0,0,4d4b2ff1a4f1fcdd3bf7dacceea672bd5d76f75955a1fa45a2f77b64eae84a91,2025-01-08T04:15:07.907000 -CVE-2024-56454,0,0,e22ca21ecac3e36caaabacfe825bf5ca67a04f5ebc374f60466a0be224ae023a,2025-01-08T04:15:08.040000 -CVE-2024-56455,0,0,e90b8b2208ee8f43002ad8cfb29e68f48c715d41c996efbde95c096302d4145f,2025-01-08T04:15:08.160000 -CVE-2024-56456,0,0,181670951c7672b798e191c0bd690e6d69a1314d4fbdd9140f86a05c5ed276df,2025-01-08T04:15:08.280000 +CVE-2024-56450,0,1,1252945507330402aa9f0e72558d46e5763770991d210e324aae9489fc6f089c,2025-01-08T04:15:07.520000 +CVE-2024-56451,0,1,00d7419847c3e6b3de0875e10fffe5f598239b3850459df91b8a5604cbc6ab74,2025-01-08T04:15:07.653000 +CVE-2024-56452,0,1,2e5bf06671a31844d5f27219d8fee11fc11ecf9df7f66380cbe5e4908120cb5c,2025-01-08T04:15:07.780000 +CVE-2024-56453,0,1,af60f335c67d7523215abd48cf5068b952ed2e035af3d8ec5e8a2b2c86d0fc26,2025-01-08T04:15:07.907000 +CVE-2024-56454,0,1,3fa628281bb1a69060803ceaade19bdbc936aa7f02780d4f1974188bdda4c552,2025-01-08T04:15:08.040000 +CVE-2024-56455,0,1,76195a7a980854524393f8222a1a97b66919d781e7b99c0069c3aad0ec4cd474,2025-01-08T04:15:08.160000 +CVE-2024-56456,0,1,e1f9bc3ecbe724ce89218e56b6417f0c37ea3eaa9f991fda3a9419c60a192cec,2025-01-08T04:15:08.280000 CVE-2024-5646,0,0,c48b41c63e1dae6ddb1f5f69529911450f8300b5322652ac7b1465148b11ea55,2024-11-21T09:48:05.203000 CVE-2024-5648,0,0,bc73cf61a73f7ebbf93011e7f0eec24203116f4c2ab4460b3b361f438af2c397,2024-11-21T09:48:05.320000 CVE-2024-5649,0,0,92f21873e8ee5bd32fcc22cd04303aa3780b31222c125187737acc3fe33a1fe2,2024-11-21T09:48:05.430000 @@ -272426,8 +272428,8 @@ CVE-2024-5651,0,0,32bbfd3237660b59f36b0fed977113a2851ca445319041dc9e59d5754bb277 CVE-2024-56510,0,0,4f41482ea166ed5c7202c0301fb2df4e26c47402a9de7a28e23eace289425385,2024-12-26T21:15:06.743000 CVE-2024-56511,0,0,372c3149918ac629ac10a134aace0fbd7732ea1726a83cd3f44608028ce6db99,2025-01-10T16:15:29.510000 CVE-2024-56512,0,0,9c068b365c4512dce8c612c9c28583046961ffa6d0e903214500eeef2ace3ea0,2024-12-28T17:15:07.967000 -CVE-2024-56513,0,0,ae84fb62a29eb1eed459a24e59d9b3a358d893fb40ba74119824346f8fb33b98,2025-01-03T17:15:08.840000 -CVE-2024-56514,0,0,38c90b436388cd7b796bc13ab110fae94f3c90b5a74cceeae9ed4f091beb9c8c,2025-01-03T17:15:09.017000 +CVE-2024-56513,0,1,9b984981824a0c6f095fb5665637efc179ff6f540261d1adf328a60bce18b5fd,2025-01-03T17:15:08.840000 +CVE-2024-56514,0,1,e058d052cba75c8abceb7466be1ca70fd5102e5e0d800171ed2174e12e737c27,2025-01-03T17:15:09.017000 CVE-2024-56516,0,0,8ab2e608947364b0ae07f700d0c92e02cbdfe27375d1a973791166b99f9664df,2024-12-30T17:15:09.687000 CVE-2024-56517,0,0,7c3d524fcdfdaec8c61e6084a922097b52b4d5b66ec799d189e8cf76cc61f4e2,2024-12-30T17:15:09.840000 CVE-2024-56519,0,0,3c5a6d8f19f54d6c861bfc224498ef149ba17c594e43f18b02fc8f106d9f1bb2,2025-01-02T20:16:07.080000 @@ -272444,7 +272446,7 @@ CVE-2024-56534,0,0,e6cdf66835e16deda6663f99f34198934e5c06c3550581413dee8ecb16895 CVE-2024-56535,0,0,e0a8f74a51f6e8cba55dd942f422ba56dbc13106a9c8a6802d1f4c5337275592,2025-01-08T16:43:06.310000 CVE-2024-56536,0,0,82f3a35e441faff3c7a03cb0b45206fa994c5b438f7f20a576643417c1362cf9,2025-01-08T17:08:05.557000 CVE-2024-56537,0,0,0f50e2b3d5ee18728fcbbdeeca2756b16ba6670964fd2d47b597dade772a636e,2024-12-27T14:15:33.290000 -CVE-2024-56538,0,0,05e6f243370f67e67c96f68f4c76b456d8b1f3b18efe17183f721393738aa996,2024-12-27T14:15:33.400000 +CVE-2024-56538,0,1,ab37fd839544119f8cb884eae6bb1f3cd661cc1788f5a1d16f890622b3e90ee6,2024-12-27T14:15:33.400000 CVE-2024-56539,0,0,73e3ac9371c38a01feaab685bc0b80785d1a14a9bbe3f9b6fa012305e81e56ab,2024-12-27T14:15:33.530000 CVE-2024-5654,0,0,a36981ce1f77c761dfb14f4c731f47a8dfd22625db842c571518ed3950c72b86,2024-11-21T09:48:06.020000 CVE-2024-56540,0,0,9bbe384790c8ce018fa6158c6c9afcb91eb4326c45847ca16b5953600db92de4,2024-12-27T14:15:33.670000 @@ -272462,15 +272464,15 @@ CVE-2024-56550,0,0,04d74517c386c38c5a8c7b0e1144163e0e9e19fcfd004bb9db0bb6bb64a06 CVE-2024-56551,0,0,f283601a0e481f41c645275541605f5f3eda11cfd0c4eb480285490826440c96,2024-12-27T15:15:13.850000 CVE-2024-56552,0,0,a3c48da8b466f06a1443e801f2355b958e7309a0c2bd86f0bd0c1f10746499ed,2024-12-27T15:15:13.970000 CVE-2024-56553,0,0,fdf86fec6a097ea50dc069e8662c894a722ee6ed2992e8a6589853082546c525,2024-12-27T15:15:14.073000 -CVE-2024-56554,0,0,1881d2b52bc93d7acc566166c5f572a8639a0ac2cb6f5c48deaa0416ddfc9fa3,2024-12-27T15:15:14.183000 +CVE-2024-56554,0,1,6ced6e9e8e1e1270fcb4c49f669b6be45eb98addaf344efdb4da50dcfb89afae,2024-12-27T15:15:14.183000 CVE-2024-56555,0,0,27d859f187620a0e53806d8ddb970b864190f9d6d5d8bd618c07bfbaa01a7d68,2024-12-27T15:15:14.297000 -CVE-2024-56556,0,0,1605467a3f8187366d07fcfdbf356d891fcdbe9d41d99195e5d22714ed0bef83,2024-12-27T15:15:14.410000 +CVE-2024-56556,0,1,8919272d8a2658673de8d794c29982b04aac7b58202cb0d5b10ac97847bb70c7,2024-12-27T15:15:14.410000 CVE-2024-56557,0,0,b094055cd23182d8b8134730a2178a00894d62ddcf24adba7c906422ed13179a,2024-12-27T15:15:14.520000 CVE-2024-56558,0,0,9c30ee52841d4d9ba86df464f654f53da1c81cefbbd52ad13c23ab80bb34ebd7,2024-12-27T15:15:14.633000 CVE-2024-56559,0,0,353853da3e898d4bba88a08653e9a07b493a01962873d91259b7435d27f07afe,2024-12-27T15:15:14.760000 CVE-2024-5656,0,0,ba99339cfecc1c5fdb0f6d1bb26f06bfe70b58ff628ceb5bd66c459a2628a6f1,2024-06-13T14:15:13.397000 CVE-2024-56560,0,0,85ecbd2fb1bf57e4c82c3eeb820b92e178360153b53599580893c82c5b85e676,2024-12-27T15:15:14.873000 -CVE-2024-56561,0,0,fbb49397b485e8352906018d22c25aa71a6f2be72214ef78b5344fab29a55a69,2024-12-27T15:15:14.983000 +CVE-2024-56561,0,1,492061328a772cb2f8530f27ee0725b40b748b1ef42174d54af13233cc40b040,2024-12-27T15:15:14.983000 CVE-2024-56562,0,0,a5cf00a14b41d9312b1cbcb4a22a54e962efae5a3b96d265960a6cc5f4747116,2024-12-27T15:15:15.087000 CVE-2024-56563,0,0,91b2ba39b032d2666c162f23200fa50d2a5b1fcceca078775c6d44565739d5f0,2024-12-27T15:15:15.197000 CVE-2024-56564,0,0,7e1462143cdd8b211490515aca5858604f3ad05c8471ec67d13a189bb520674b,2024-12-27T15:15:15.297000 @@ -272492,8 +272494,8 @@ CVE-2024-56578,0,0,b7d234c4ac370ed43017dd1993adaa95e62523ec826e1c8450512390eb22d CVE-2024-56579,0,0,ed133437fbec982ed5352c737f5d06af0ae68ef76be424fcabd4fe2113323e74,2025-01-08T17:08:40.187000 CVE-2024-5658,0,0,7e7462fc3515e519516e2f809c98e13e2106352e6aac99c565fb770e189dd063,2024-11-21T09:48:06.413000 CVE-2024-56580,0,0,179f3e1a27c51bf03a0456aee4863f0a350c8b2c58261c2a20019a0968714a4b,2025-01-08T16:43:44.460000 -CVE-2024-56581,0,0,6e98b054ab30e9a79a0d35ae442e5a2bf4559a3a6bfbf332b263e41eb8de179b,2024-12-27T15:15:17.207000 -CVE-2024-56582,0,0,90dea02e9f979a41e71cfb5a449e790da921d503d434ba7171d9fe8a71c5f49c,2025-01-09T16:16:21.920000 +CVE-2024-56581,0,1,7d033e3f0258eb014f4f78fa99fc7646d8aab61361d5183cec4e7bae2c4cf58e,2024-12-27T15:15:17.207000 +CVE-2024-56582,0,1,02d19204ba5691a62b4b158f82e42a67473e13f57590aa32eedbe050ba81e080,2025-01-09T16:16:21.920000 CVE-2024-56583,0,0,0a093de5a3582fcba5319e6417804083fa2f13d21a794dc18a40b22855a6eab7,2024-12-27T15:15:17.453000 CVE-2024-56584,0,0,eeb9dd397f2cf5bbbf04d47a1922c0a5bd55db3b2dd6af42d89d243ed3a0f9b4,2024-12-27T15:15:17.567000 CVE-2024-56585,0,0,877963cf60c4d690af9050e33b1bb1c26f5b0063aaeb8dcda5d72cde5d043865,2024-12-27T15:15:17.677000 @@ -272513,12 +272515,12 @@ CVE-2024-56597,0,0,347c4891ee178d2857b2a9b9b3a59e9ef73cd9d9644a163cb89f5004d70ba CVE-2024-56598,0,0,a2176885d0091e4f0f4ccf382f6f43c67f59acd5431ed7d070c60a0e375825cf,2024-12-27T15:15:19.200000 CVE-2024-56599,0,0,a95a82bdcf63c0a92d2e3c23853bd64450d2915701e7e1da99973a296313b4a3,2025-01-09T16:16:22.167000 CVE-2024-5660,0,0,185ada92ecf12140397c738113ef0443174eeeea8f301748716001f7b999562c,2024-12-16T14:15:05.123000 -CVE-2024-56600,0,0,52d580d322cdc56209d742bf1001e48cf3d43006079a875fc418ff12bed23270,2024-12-27T15:15:19.410000 -CVE-2024-56601,0,0,637410ffb911b579d9118778643db5f364036159a7ab02ab9694514f07f24700,2024-12-27T15:15:19.527000 -CVE-2024-56602,0,0,ff463b8e2551ec1bfa6dc83aad02b0f0a834fbe19202bbf88d2a3ced34b92f58,2024-12-27T15:15:19.650000 -CVE-2024-56603,0,0,44c1fc20c2507a1b0892802648f891a340c404613043cf4a963b0efbbafa06ad,2024-12-27T15:15:19.770000 -CVE-2024-56604,0,0,565ab9d0b315999a07c7d4356116cd8598a6b3b07028c5fa8b14764daf5f90b9,2024-12-27T15:15:19.887000 -CVE-2024-56605,0,0,b64b4a627bbf95f44fe3405d04872bb763af58a6067e54da35f3e7f7c0ee5116,2024-12-27T15:15:19.980000 +CVE-2024-56600,0,1,0e9d5fba121f41d4708c0410046aa675c5d66a3861a8e3ca75b110b011e2b752,2024-12-27T15:15:19.410000 +CVE-2024-56601,0,1,ff422f360846b58a68b5c671fdb01f5cef2f457fec3f643eac22f3fd03a0dc2c,2024-12-27T15:15:19.527000 +CVE-2024-56602,0,1,16034607763ac20d795bf025d56c2d13edc37a14d92c45e462e9e2677583902c,2024-12-27T15:15:19.650000 +CVE-2024-56603,0,1,18eff9c963be733f6b8aeb6f19b9b057f618c97b8100f1bbe36f49487df77fbb,2024-12-27T15:15:19.770000 +CVE-2024-56604,0,1,2e6cc4189e17a1d3820758f8bc76024e1ea509c6cb029501a0b3954974279029,2024-12-27T15:15:19.887000 +CVE-2024-56605,0,1,9cd1e017157cc58dc9d0ed380571e9ceb3b7db25dccb855556e1516211b8f7a4,2024-12-27T15:15:19.980000 CVE-2024-56606,0,0,ac0f83cc7a214072e6406d51e213fc315d5a502091a812f3bcbef5315f50bb3e,2025-01-08T21:46:59.767000 CVE-2024-56607,0,0,e563af3645703f9b9553a96385d656f3bc2fe49e78b5d85c2c1b6bbd37a859e0,2025-01-09T16:16:22.327000 CVE-2024-56608,0,0,0d4d7a76c820d078ab63176c92aa3cecb2c95ef837fece154b0757799d40a37f,2025-01-08T17:10:01.233000 @@ -272557,7 +272559,7 @@ CVE-2024-56637,0,0,ce12920afbf5f1fb34531af28442fd249602c3b014f7632db7bac795c36f2 CVE-2024-56638,0,0,cd59045e4a4aa08cd7b27388e793c2179e866485e78f2798dc742ee4b8739692,2024-12-27T15:15:23.527000 CVE-2024-56639,0,0,4e03b9a4b0fe8d6bd8f9fd82003b020dc8d8aef46c04d71ba745b13665fcfcb7,2024-12-27T15:15:23.633000 CVE-2024-5664,0,0,b6962e20742af8ea90e612bbc7ac8c73d6aa535f0e49e5cabd0c7dd59647632b,2024-11-21T09:48:07.107000 -CVE-2024-56640,0,0,cbe6c220e8c4e31481a770ac78aa1bd8cb1e00e3ee77b141b0919dfbc57b06eb,2024-12-27T15:15:23.730000 +CVE-2024-56640,0,1,48bdaeccc2b9a3757308095708034561204206dccd891575c3f9e436a432c35b,2024-12-27T15:15:23.730000 CVE-2024-56641,0,0,7bd87e333960b236379a7ab6f66f186a39f9577a76aff23809b25204a27a92db,2024-12-27T15:15:23.830000 CVE-2024-56642,0,0,f811146448c39a9a6cc4c1f585da7148d95f1ad3c40ca22e2cf625a123ebe4d6,2025-01-08T21:37:23.950000 CVE-2024-56643,0,0,7b5f1a4805f035363d7a8272badd51b331d739badf6cbf1475c665112dd3ac85,2025-01-06T17:14:41.813000 @@ -272721,13 +272723,13 @@ CVE-2024-56799,0,0,7c81f75b0fadc031d3c3a69969ffb946d254b09a307c8ed595c44ee135ddd CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceffa2,2024-11-21T09:48:08.837000 CVE-2024-56800,0,0,1070967245f97018d7931f1b8b9aae6488fa864b099e181ef436fe219b3674d7,2024-12-30T19:15:08.333000 CVE-2024-56801,0,0,c58a52dd8e259e8c3777b512b437d216ba31851d5b5bd83b763ba528220fc5e3,2024-12-30T19:15:08.483000 -CVE-2024-56802,0,0,2bf17880ee10109df3dc3a46015118efb291ba7061a269a28cfa534f6af9e9fe,2024-12-31T16:15:28.240000 -CVE-2024-56803,0,0,5af6b53ef642536234b1144a6b5e8ae5f304fb932318cbb15508f9cbfed0d7e0,2024-12-31T23:15:41.553000 +CVE-2024-56802,0,1,6ee863a0be69f17945770e06c9cb9ea63f693e0628097d71cfeccbe8965990b5,2024-12-31T16:15:28.240000 +CVE-2024-56803,0,1,e6caec2622228c0a4a255f1bc86158e1556677df2e0db9c60d4d558fd33bc5d3,2024-12-31T23:15:41.553000 CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000 CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000 -CVE-2024-56826,0,0,c51fc9171c82274e10f1734889cc72fa21b0b73763369bcb379630d776bc4c1a,2025-01-09T04:15:12.660000 -CVE-2024-56827,0,0,51125e31b9942484aba52fab4157819a040f3122f142a5dc92f3dfc0facfd3db,2025-01-09T04:15:12.840000 -CVE-2024-56828,0,0,58462cf48b4567824edfeec2a5b2d05411df2bbb14eef3534ab916b80e082c5f,2025-01-06T18:15:23.467000 +CVE-2024-56826,0,1,ec68978dbfde8fef0ce0777a1db20b08edcfd57501134820891a9283a7b02eac,2025-01-09T04:15:12.660000 +CVE-2024-56827,0,1,45e65a3f7a940f5d088604960cd3497fe1850c47a3f74bab0994003ce1109732,2025-01-09T04:15:12.840000 +CVE-2024-56828,0,1,5a66a8f7b43edd5d63e66fcfc3dd6271f3091ed8495d4955c9c97fcadbbb7588,2025-01-06T18:15:23.467000 CVE-2024-56829,0,0,fb517ef6b7f51e566ba1e37004f2890737a0fef0bcdec303fd5ff6dcfac6c408,2025-01-06T21:15:15.300000 CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000 CVE-2024-56830,0,0,79c85b0b070d5536c466f2e90f00cc426f8f9dfa98d4a97719c579eb1ffbed30,2025-01-02T05:15:07.967000 @@ -272818,9 +272820,9 @@ CVE-2024-5765,0,0,e5003ba3f530e37b105db973fc0ab01852d52d4c3a3d40c99dc1f996aa54e2 CVE-2024-5766,0,0,cdfccc92ec2c159269346acd4c1a0ac28434fd31fc36fe70d66da845920ad03f,2024-11-21T09:48:18.263000 CVE-2024-5767,0,0,83b611dd489bb163f66e83f90bca18a4479f0bb38020979c04a07f5718f3596b,2024-11-21T09:48:18.420000 CVE-2024-5768,0,0,6c9ff2121591327d1892929b36d619819744c12030a51756837ec582065802b9,2024-11-21T09:48:18.613000 -CVE-2024-57686,0,0,49648fcc7e0d475ee09aa80ae7bcffb690140ffe3e0dec1188ad436c735925f1,2025-01-10T15:15:16.003000 +CVE-2024-57686,0,1,9693f74223f7ecaac36b2eca4db89cb00842aaac043c797c5e6ab0d3b74faceb,2025-01-10T15:15:16.003000 CVE-2024-57687,0,0,1fac24f111ce948aa649d677d5475281ca9e9effa31423b615dde7128b0c7319,2025-01-10T16:15:29.670000 -CVE-2024-5769,0,0,8050ee07c9faa3b2614fde11774d0d6b1fdea284928125d18129fd88f30e7524,2025-01-09T11:15:16.127000 +CVE-2024-5769,0,1,abfeb18ae91d2e4533cdbeb4bf7ad73d20beb760222f23226220c40a5c6d9f91,2025-01-09T11:15:16.127000 CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d0a,2024-11-21T09:48:18.730000 CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000 CVE-2024-5772,0,0,04004702ec5106d11d8a70be9a1c34eceae4a60526afd5c3eb12e840c71e6683,2024-11-21T09:48:19.003000 @@ -272845,28 +272847,28 @@ CVE-2024-57807,0,0,3fc22681d87d16c2f19292446ad4881acc5df9d656db30c12de7c2ccac921 CVE-2024-57809,0,0,de2e3d10a38eb17297e0b63db428739f373043b7a0a3a88c9dcbf5bb2a5c6fb9,2025-01-11T14:15:25.080000 CVE-2024-5781,0,0,69395241527fa89308022b467956bfc8d570e92d8c337ad970260c71cef498ec,2024-06-12T08:15:51.363000 CVE-2024-5782,0,0,3007fa9c37260ea7caeb87e42b238e099fb02a0dcdaea4137ab796f4ff5698b0,2024-06-12T08:15:51.423000 -CVE-2024-57822,0,0,728779986122bf377df0708440f7a4e3a11314ae8b64fec754f17faeca944b11,2025-01-10T15:15:16.337000 -CVE-2024-57823,0,0,21afd0eacab6b7e7ef4135daf3a3b6cb51e2cd31ed278b77a73ef52eb6b04624,2025-01-10T14:15:29.583000 +CVE-2024-57822,0,1,8458651cb53a99880f0cbbbe484b34e3e7b673f78d525ed0f203f8ee0c783222,2025-01-10T15:15:16.337000 +CVE-2024-57823,0,1,ce9e1886072fcefc22a66f2c450b9ee2aa3eb44d9a6ffc06c176c717eb634915,2025-01-10T14:15:29.583000 CVE-2024-5783,0,0,457a67b18c53addb8fb271e75294a5e3a7e25c57923089dcfbdfc7dbab590f38,2024-06-12T08:15:51.480000 CVE-2024-57838,0,0,f85a499de384339de4a4a71cb75bd53b174dba57e86a4be11bb2c2c6c084d3f9,2025-01-11T14:15:25.940000 -CVE-2024-57839,1,1,032b45ae1cffa722bef05fa028292895e4d90fa90482cbc8605d00863c104848,2025-01-11T15:15:07.050000 +CVE-2024-57839,0,0,032b45ae1cffa722bef05fa028292895e4d90fa90482cbc8605d00863c104848,2025-01-11T15:15:07.050000 CVE-2024-5784,0,0,79d7c651de1735758dc5225e9f9f2125237472cf1705bb9d1ed95eddc5ac5820,2024-09-03T14:48:19.570000 -CVE-2024-57843,1,1,dd4f60110148da4865130a4b67434c05bf37cdb05112f1c822d44a309c31d9ef,2025-01-11T15:15:07.170000 -CVE-2024-57849,1,1,54260cfa359dcc8ee204cfec623e823ad41d4caa81589401b2671c7591230d31,2025-01-11T15:15:07.290000 +CVE-2024-57843,0,0,dd4f60110148da4865130a4b67434c05bf37cdb05112f1c822d44a309c31d9ef,2025-01-11T15:15:07.170000 +CVE-2024-57849,0,0,54260cfa359dcc8ee204cfec623e823ad41d4caa81589401b2671c7591230d31,2025-01-11T15:15:07.290000 CVE-2024-5785,0,0,0e9b551c455c61638ce3e7d2f5874ca2c1cf14d589c0a4025501beedb178de88,2024-11-21T09:48:19.780000 -CVE-2024-57850,1,1,9a81fc0a298973cadd8035bd9ef5a52d4350cca966d13539c02d81dbf66143be,2025-01-11T15:15:07.423000 +CVE-2024-57850,0,0,9a81fc0a298973cadd8035bd9ef5a52d4350cca966d13539c02d81dbf66143be,2025-01-11T15:15:07.423000 CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000 CVE-2024-5787,0,0,1d58b2484cfc2497ce3be8bc315153e4937b24852bc87d95aee088e2aedc7438,2024-11-21T09:48:20.010000 -CVE-2024-57872,1,1,eb74c3e83416c6f9d2d05799bff7f272badc720745295a18772702d9456c9170,2025-01-11T15:15:07.560000 -CVE-2024-57874,1,1,fb7bf8e334f98602ef537ee1fff4a394e3778274e92bdaf9be82f3357123b9e3,2025-01-11T15:15:07.680000 -CVE-2024-57875,1,1,f3dcb83145c83305accff33176d8c6888ebdc6e8e8dd674dec8648327cacf2fa,2025-01-11T15:15:07.803000 -CVE-2024-57876,1,1,17df6ee7b8eefc67d5b8d8002ec729347e35d22e1eb6f1ad8cf3fc55eb250f8a,2025-01-11T15:15:07.930000 -CVE-2024-57877,1,1,b7350952263e8e88d95b015a1cb17ea82c9bf87c3880897f0be6efb647f9eef7,2025-01-11T15:15:08.063000 -CVE-2024-57878,1,1,fe97f3ee2690c7f72f90773e6d1b82389119debe0cbd7bd628845864a7ea5a73,2025-01-11T15:15:08.190000 -CVE-2024-57879,1,1,feb067f3861c707c292881016bf990e111102c27bae99249c671b639a4c0298c,2025-01-11T15:15:08.317000 +CVE-2024-57872,0,0,eb74c3e83416c6f9d2d05799bff7f272badc720745295a18772702d9456c9170,2025-01-11T15:15:07.560000 +CVE-2024-57874,0,0,fb7bf8e334f98602ef537ee1fff4a394e3778274e92bdaf9be82f3357123b9e3,2025-01-11T15:15:07.680000 +CVE-2024-57875,0,0,f3dcb83145c83305accff33176d8c6888ebdc6e8e8dd674dec8648327cacf2fa,2025-01-11T15:15:07.803000 +CVE-2024-57876,0,0,17df6ee7b8eefc67d5b8d8002ec729347e35d22e1eb6f1ad8cf3fc55eb250f8a,2025-01-11T15:15:07.930000 +CVE-2024-57877,0,0,b7350952263e8e88d95b015a1cb17ea82c9bf87c3880897f0be6efb647f9eef7,2025-01-11T15:15:08.063000 +CVE-2024-57878,0,0,fe97f3ee2690c7f72f90773e6d1b82389119debe0cbd7bd628845864a7ea5a73,2025-01-11T15:15:08.190000 +CVE-2024-57879,0,0,feb067f3861c707c292881016bf990e111102c27bae99249c671b639a4c0298c,2025-01-11T15:15:08.317000 CVE-2024-5788,0,0,26eba16faf8bba170e4c4924cd3861a76450b8d63d3d592b315f9dc173dd2a7c,2024-11-21T09:48:20.137000 -CVE-2024-57880,1,1,f940af194262151ac7da7d4cb3e1ddf4b34bcf4a3d024e7fca35a39078d977cf,2025-01-11T15:15:08.440000 -CVE-2024-57881,1,1,b8bec70ff711b577966b6caa009bd593813ec4cd360ee66163b5df240bb10d63,2025-01-11T16:15:24.307000 +CVE-2024-57880,0,0,f940af194262151ac7da7d4cb3e1ddf4b34bcf4a3d024e7fca35a39078d977cf,2025-01-11T15:15:08.440000 +CVE-2024-57881,0,0,b8bec70ff711b577966b6caa009bd593813ec4cd360ee66163b5df240bb10d63,2025-01-11T16:15:24.307000 CVE-2024-5789,0,0,9dcfcd4111ea0e9e739e91d8fd580d0fefd90ab28ec12c3acba80730fef979ee,2024-09-26T20:28:29.237000 CVE-2024-5790,0,0,eec668ee9d3641cb0f3de89f3c2f9fc313b8158d0b4258bc8dbb969f253eecba,2024-11-21T09:48:20.323000 CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000 @@ -272981,14 +272983,14 @@ CVE-2024-5909,0,0,752d08318e9e6996c653a0326b8d95c79f41544af48e9d464337fb383cdb6a CVE-2024-5910,0,0,809032c1554caf15adc6ef3696e5c072f55bc8cbc0c3da859c4558e159670420,2024-11-27T17:23:02.910000 CVE-2024-5911,0,0,bb61927263d2341e1e4d29b238efafb06329a5341e4f6454fe7fa777b88bca98,2024-11-21T09:48:34.027000 CVE-2024-5912,0,0,f1baa69f560eb481c58139293216d53ba8d136d42bf8e87cbef3628e1730e90c,2024-11-21T09:48:34.157000 -CVE-2024-5913,0,0,b26985481494f7aed33047e1320d1ebd3f34f15b77d176db69dca42ced8db484,2024-11-21T09:48:34.290000 +CVE-2024-5913,0,1,f59104a6203550fd8acaa98aa373922d13ba1ceb7cd1bbdf0a7a9087953eee4b,2024-11-21T09:48:34.290000 CVE-2024-5914,0,0,3ca964506b372b7ffd07173f52014abfedaf98e8c4cf22e70771102b1e6d61bf,2024-08-20T16:22:06.357000 CVE-2024-5915,0,0,73dadb526b2278e8453a98017da373ea86e9cba97e030683507d80a084bc54bb,2024-08-20T16:23:10.493000 CVE-2024-5916,0,0,449c4ba8257ad29baaab31d93eb064a26b6b13371041c634469bfc65dbf3a0e5,2024-08-20T19:30:11.980000 -CVE-2024-5917,0,0,5eb2ea9d8384d69a552731af5a28e947dd4278dc0fac5c99506607027a71bdfd,2024-11-15T13:58:08.913000 +CVE-2024-5917,0,1,b3669a543d1da5bae4b4b4748fb8fbd6ffa091f59e2acf4b1f9008953baeab59,2024-11-15T13:58:08.913000 CVE-2024-5918,0,0,81bdc2190125b670e90203f3548cb48aebcc8fef030a219189e3db9809744209,2024-11-15T13:58:08.913000 -CVE-2024-5919,0,0,f606f8a34482315412be352ada057e6dcb9bbe137ce7e5495df362f1b832e65d,2024-11-15T13:58:08.913000 -CVE-2024-5920,0,0,258c4d4c39995895f8c2090b9202754d09144a65f93eff27d4bb29564821c251,2024-11-15T13:58:08.913000 +CVE-2024-5919,0,1,67b8d2fb49dfd173dec60605261aa31c7ca5d39f2057503325cf3a3e3dcc6386,2024-11-15T13:58:08.913000 +CVE-2024-5920,0,1,1971b636615c5415ea8fdd130d1fa401352be920104e2a15042d7f8eff9520e1,2024-11-15T13:58:08.913000 CVE-2024-5921,0,0,7b078ebfa77a04f80dea3bb6728403f1db96a3dfaed7c57f149ae4e2d1706244,2024-11-27T04:15:14.687000 CVE-2024-5922,0,0,695f58e2e058442a55c514d990c8f571599bfa26e88ff8cd313f759acf5777fc,2024-11-21T09:48:35.113000 CVE-2024-5924,0,0,317522f79ef7e40c3687a78a629fe3c643f265f4648ccabd8de5057b9325f402,2024-11-23T00:42:38.983000 @@ -273202,7 +273204,7 @@ CVE-2024-6151,0,0,4b327b1a740911613192b717f6588a19b86c3c3cf5c7049ca65e021c1c9bc3 CVE-2024-6152,0,0,56e39ec64bc38c4079fcca10d552cf2ac8153d4adf04ef1eb4977bff49f15926,2024-11-21T09:49:04.580000 CVE-2024-6153,0,0,aae068275d4c4e63555b57416b174ee8f2e1ff96ec75d6bff3d4c959289ad262,2024-11-21T09:49:04.707000 CVE-2024-6154,0,0,44eb11c4fcc6c6616a2ed49e485a415327653c78c87a2ef8353cb2a27dda49c2,2024-11-21T09:49:04.847000 -CVE-2024-6155,0,0,6269e95ed083e7f1c2e2f7772635bea6c0eaaf87604204bdc729029f42997067,2025-01-09T11:15:16.330000 +CVE-2024-6155,0,1,bcb0f3810af0585d1d27c2ff5653a3f57ff68bc54a136b27388e3e12e4cabf55,2025-01-09T11:15:16.330000 CVE-2024-6156,0,0,ed2080432a92897efaf31c0ac3d09606d8e76b43d503d06d631742410471368e,2024-12-06T00:15:04.380000 CVE-2024-6157,0,0,5be8de9f177d4f5bffe03509876e18a408a381753d90da1ebea280d1d882e02c,2024-10-15T12:58:51.050000 CVE-2024-6158,0,0,259665afaf15722a4d969735b84a2bbadf645404975cbe690c673aedfdc3c5bf,2024-08-13T15:35:29.740000 @@ -273362,7 +273364,7 @@ CVE-2024-6320,0,0,b473609913519a737186d8d4224686486fd33ffcfab73ef05e3c3cf037998a CVE-2024-6321,0,0,a39f88ef7c0aa8e0428ffa76183acf38ed3f4e4350e239a12cf9da7687522424,2024-11-21T09:49:25.667000 CVE-2024-6322,0,0,1ea07fd7c948c4f77d2f5f0917b4fee4f1d349d72b23887cd14c607a18221b99,2024-08-21T12:30:33.697000 CVE-2024-6323,0,0,113565d57693aa1eec8028c3334ea46961c6a5d9ee3823c3676e563017e4a8c2,2024-11-21T09:49:25.880000 -CVE-2024-6324,0,0,1c66ff4ea8079da30d9906ca30ff4fd883ef46b74b2bbf5009c29e3b11b1f1ca,2025-01-09T06:15:15.390000 +CVE-2024-6324,0,1,d3dc4f31e2aa068d39591d2f92aba0d94c4424640065e0df6d85d20351a8d824,2025-01-09T06:15:15.390000 CVE-2024-6325,0,0,a539dacbd205fca323eedae64dc5b22715b467b0e53648e1f180e84eacd8459a,2024-11-21T09:49:26.027000 CVE-2024-6326,0,0,85164071f9b463450ed4305c833cf3e6cf33bf0166b69ba5e80887827dfafa7a,2024-11-21T09:49:26.167000 CVE-2024-6327,0,0,d8eac136822f962fdaece40da23c68408cf6506a0c82904582d9b2430afa63be,2024-11-21T09:49:26.333000 @@ -273387,7 +273389,7 @@ CVE-2024-6346,0,0,fe2ee47547440c67b79f08fc428fde1fe9a461a17301cc498fa98e07795e20 CVE-2024-6347,0,0,ead9b349654f8c1b56b42b60b3e21504af84ff862f187d8c4f01052391405f6e,2024-08-16T14:33:42.730000 CVE-2024-6348,0,0,f8ec53a55d7061e6e616a9d49e72c1cd9f0282aa80090fa0b8e8fbc34eed5872,2024-08-20T16:17:03.810000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 -CVE-2024-6350,0,0,77fb90352ae4244d9794160736591baaf0748482f37ee2770258379fc091d7f9,2025-01-08T18:15:19.880000 +CVE-2024-6350,0,1,1fc124e07d9714607d8d4610b064f72d1361319398d6b6baa75420c813d318c6,2025-01-08T18:15:19.880000 CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000 CVE-2024-6354,0,0,b2dccb6ff0cf7d4d778c16d437a8f334569c687ad872e701936b9155052ef539,2024-11-21T09:49:28.670000 CVE-2024-6355,0,0,4c7974dc5e52fdaa43d5f5a202a9f019ba0b6401d733645ab7e0c57b90e3af56,2024-11-21T09:49:28.797000 @@ -273514,7 +273516,7 @@ CVE-2024-6491,0,0,824363835bb0ed4e34b672098c9045d2d6a7a82396a9d03ea6313f5fa9fe4d CVE-2024-6492,0,0,9c2414922871ab30614f56835ecccc8694f189e5e267c59f2a5c738ba43c5038,2024-11-21T09:49:44.590000 CVE-2024-6493,0,0,4219f4b7c8428bff689274f5093f622cc568e20fe62d456fac3f7e44bff16217,2024-09-27T21:28:49.020000 CVE-2024-6494,0,0,64483ea7ffdda997831852a5abbd9b9d09bae88699ea984e8a030b6b1f227144,2024-08-07T15:17:46.717000 -CVE-2024-6495,0,0,2c260a0f17aa1df0f2925882817d63a6a38bac3312e1bf7bd49126a378889bec,2024-11-21T09:49:45.150000 +CVE-2024-6495,0,1,1cf90e95ba6b2c86c170786fc016ee434dc2cb3ad69cedad7c126952a7f1f398,2024-11-21T09:49:45.150000 CVE-2024-6496,0,0,8ee0438cf6f5aca09ea72030714574ba710a867e64257498ed88d82c0fbc800e,2024-08-07T14:35:07.403000 CVE-2024-6497,0,0,07f4d140fbb599c99c6629075818a1f612c766637045bca9f32104a7501b4ace,2024-11-21T09:49:45.437000 CVE-2024-6498,0,0,d6615d703509a8a6bb0fec23352394e0db77972d8a99657bf636fa92bfdaa089,2024-09-06T17:35:19.293000 @@ -273796,9 +273798,9 @@ CVE-2024-6811,0,0,2c1c48c47ef38136f3e99ba59fe67000710a1b454b7a3765f0d5dee362d67d CVE-2024-6812,0,0,264f3438db917ec43d2bff1f5d827215fa9d89e7b8f942d74adc5117890c2457,2024-11-25T17:17:07.970000 CVE-2024-6813,0,0,278bd177812b8586be5e9bf710944d5077ee2b922460d8aec51a06ad7fd376e8,2024-08-27T15:01:38.630000 CVE-2024-6814,0,0,b31e87cceb8631da6ace31686c1a7dfdc25e34e059161e2f193dc590f87581bc,2024-08-27T15:03:09.817000 -CVE-2024-6815,0,0,6f144b06789520de4208219b5286871386632a65ddd25a733824561361885aec,2024-12-18T18:50:32.917000 +CVE-2024-6815,0,1,89a466be605fc13caf43f322ef273dafd0cc5b439a0cbafb8d30b56bd4fa656b,2024-12-18T18:50:32.917000 CVE-2024-6816,0,0,858a8654b7f2667618cc57a54db582dcfe9a7bffc142ecbb119ae713c0fb2870,2024-12-18T18:50:20.847000 -CVE-2024-6817,0,0,cf350421a108f720525b09eb4591580bf8a55c1ba0870948a9f9bc74d999b110,2024-12-18T18:49:49.220000 +CVE-2024-6817,0,1,dac60f28c087cbc76bf6d958a8c272d82d0cae14b306435cf13ae8dfef780ec0,2024-12-18T18:49:49.220000 CVE-2024-6818,0,0,6e8edfe40fd7f2d89243450ad7a681500d3d83711887ecc3a53ce73a96cb479d,2024-11-29T18:24:59.937000 CVE-2024-6819,0,0,ddb9aad5e919e8aaa951196a3c8629fe866716676329711fcf1fba08b1512c20,2024-11-29T18:25:32.827000 CVE-2024-6820,0,0,d49345aa069d354d1c6e40ded1ad61f62a354359a5ce0728beadc1fcf2503b8d,2024-11-29T18:25:55.430000 @@ -273883,7 +273885,7 @@ CVE-2024-6919,0,0,b502cffaac6731637d703268ee1cb83625d424238359e27c34f459fae1e79d CVE-2024-6920,0,0,47f08af90a6a020863181854f9c2a47ccb0b2acda70639073e11e485f0c32abb,2024-09-17T15:58:24.423000 CVE-2024-6921,0,0,735b476591441a7e9689fed83cb73169cabb2924188a6fba07efbb2ea45af372,2024-09-17T15:58:45.217000 CVE-2024-6922,0,0,196c8b1a215517d3fa437bc326b83379ed7039651b1b80b23da25f8c19d3cb95,2024-11-21T09:50:32.873000 -CVE-2024-6923,0,1,235c7c7694d90d102a013044b5794ac6e550405a462211b2002e1b05b7b77f3e,2025-01-11T15:15:08.587000 +CVE-2024-6923,0,0,235c7c7694d90d102a013044b5794ac6e550405a462211b2002e1b05b7b77f3e,2025-01-11T15:15:08.587000 CVE-2024-6924,0,0,ad6a8a851c17a1ce1ce245c051802abec0e6063b7f5ff29a0aaa7fbfbca0d9b8,2024-09-11T16:15:30.750000 CVE-2024-6925,0,0,6dfd55f0d9aa03a0d69b464ef7706eb56c6ecbb71e27f372831c10035bfc16ba,2024-09-11T16:12:24.103000 CVE-2024-6926,0,0,283a11d1870a64b19af6cfba1fcc94b5d99d9175cab416d56f691297f51c36a7,2024-10-07T15:29:08.993000 @@ -273966,7 +273968,7 @@ CVE-2024-7008,0,0,01821632de42f861f61e46172e8f46d902e7b9a9d4e49b492e5b5a6ef606b5 CVE-2024-7009,0,0,0bd3e070400b890979b17a6e3fd4a8938952a2dc2f9331a906ff3a4e8238dd0a,2024-08-19T17:18:50.290000 CVE-2024-7010,0,0,3981bcdc727f6b54713ae5031f036063244a02c172bba73ed7eb3fafd58f4a95,2024-11-14T14:15:19.160000 CVE-2024-7011,0,0,e740d48df619782024c914759428297bc513ff1ee0c029edfc1a0bfb8a45c92b,2024-11-05T20:35:26.370000 -CVE-2024-7012,0,0,842ae4b285f440793f2bbe3cf586082cea89beb0c97cb63c1d06f6ac6c5f9b5a,2024-11-06T09:15:04.187000 +CVE-2024-7012,0,1,428ccc1999f1ebe31e5fc8a91f3acd690056ccd6138f76ae605b4a4a6143318f,2024-11-06T09:15:04.187000 CVE-2024-7013,0,0,fda92e94524c5fdb675c080a05843f1821b747032d3c867378b19c5cd5d7a8db,2024-08-21T12:30:33.697000 CVE-2024-7014,0,0,7d2fa12c1e30aaa921a12cf50bb8b8d1050f5d9d654c2d6e992fc32bd0568c90,2024-11-21T09:50:45.550000 CVE-2024-7015,0,0,ab116060d750e6a9a8beeea583d0182fc1eebb586ce4d2ced61ebfad13abc299,2024-09-23T09:15:03.230000 @@ -274046,7 +274048,7 @@ CVE-2024-7121,0,0,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e8 CVE-2024-7122,0,0,a714bca7ce9a04fdc160eb1b34585e3b54798ff2063ca218fe9e9e63b202df51,2024-09-03T14:41:02.420000 CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000 CVE-2024-7124,0,0,5c9c7cf8d1b7a1c4e7f952804eb62d8556be0b443bb2197b7b413cb39e66e9ef,2024-11-15T13:58:08.913000 -CVE-2024-7125,0,0,513953ff7aecebd74de370164b9d16223c88a1a14c34efe07fb5ae7da97b92a3,2024-08-27T13:01:37.913000 +CVE-2024-7125,0,1,413c6e6a80c28969730968912f2f9039587ff4bfd94c021e570f93e32ba87c31,2024-08-27T13:01:37.913000 CVE-2024-7127,0,0,74ea77d58ecf556d18acaf9d16337686e906f23336ce730a34b76f4ca6d94021,2024-11-21T09:50:55.093000 CVE-2024-7128,0,0,63ebd08f49c0068667fb6b2f49b7c3f23e6c76a3f34bab8f2c541fe2bb7b0be0,2024-11-21T09:50:55.230000 CVE-2024-7129,0,0,87988fd1b36137710339cfba45c7e36a36bf99a87dea14d473728b3b1a3c931e,2024-09-27T18:26:27.560000 @@ -274060,7 +274062,7 @@ CVE-2024-7137,0,0,315ca8a4d8d765de04e23f26963a3f09773d43e19e5c1f55bfec2de2390ac1 CVE-2024-7138,0,0,5c76b507d93bfe0849573964a8b74ef29a6c94608dcf9ad8427b4e5898b74f76,2024-12-19T20:15:07.947000 CVE-2024-7139,0,0,522023278c89645da01bf63de201ded1722527d54b07fd76deb6fd63af2bffab,2024-12-19T20:15:08.073000 CVE-2024-7142,0,0,c720bcedface84d6fcc3a845587df515eafaababff5415179d1359a7c9e86bbc,2025-01-10T22:15:26.403000 -CVE-2024-7143,0,0,a1c752e03ac5e378db23275bf48585f862cc0a7b2a6bbc0949ed92d48374e766,2024-11-21T09:50:56.110000 +CVE-2024-7143,0,1,cbb18ddd616be4d0de19ef80dd494e49a9fc2830c5a90dc2455077acae5f057a,2024-11-21T09:50:56.110000 CVE-2024-7144,0,0,3e989e748e38a85b3db1941815e5d921ed75a2233b0a59f112c1cb1f74b3c16a,2024-09-13T14:40:14.420000 CVE-2024-7145,0,0,073fb8bd11ab6d990bf0288270f3cedbc70b03e2b8ff14d66dd5aab6d498859e,2024-09-13T14:39:44.490000 CVE-2024-7146,0,0,8f6ca05a9fea983190c8addbeaa39313a66f259ac7953d365b6f9189d7b6dba6,2024-08-19T13:00:23.117000 @@ -274149,10 +274151,10 @@ CVE-2024-7230,0,0,b48c3db9cfcc664da7dd03e3d546b45f109a909511b6f7d3ccc2a0622e8394 CVE-2024-7231,0,0,a42d8c40dbd2eb1f4925417ef7b3583328044ce4846329c1cc1446b889b841aa,2024-12-09T20:01:00.623000 CVE-2024-7232,0,0,cd730e2d43cacaa37482a0a783d14d7960195f314cd4843f3b1b0b0ec167dabd,2024-12-11T14:44:38.737000 CVE-2024-7233,0,0,4916d337a54364167f3660042f29edbabb5b82adc633fec6d80316e042d98822,2025-01-08T14:29:32.473000 -CVE-2024-7234,0,0,9742bb1615343ce07effb9b1308b133a98e722a2ae800846399938f8afb84e26,2024-12-19T19:46:05.367000 +CVE-2024-7234,0,1,15002d67cbd05fb31b36da59174f1677f90e7cada599d021ac53013549049c34,2024-12-19T19:46:05.367000 CVE-2024-7235,0,0,49e478dd92101beafcfae5dec744f026f8e9bd166387222bfbf8db413e23d13c,2024-12-19T19:42:37.133000 CVE-2024-7236,0,0,fcc745d98fc38dcf834b713942deab14ef3a5e46801ff4a4cd0fb23653cb4d35,2024-12-19T19:35:22.970000 -CVE-2024-7237,0,0,c0447a8995ec6b1a6bc041d72633fb3011caa64d44e364d1c2d874d5939eb5cb,2024-12-19T19:25:49.767000 +CVE-2024-7237,0,1,c6f5097cc372d9778c3bda7333db7906af5632b6596e0422507b4543e02310a3,2024-12-19T19:25:49.767000 CVE-2024-7238,0,0,bf5fd0e915b35b717b5977ee378efe4c6971156ee2a7326cc81c52898c719025,2024-12-11T14:34:42.833000 CVE-2024-7239,0,0,97ecc7ec36b2ceda64a8944f2ce85e3e8b96ed73a375f42f7750a9355c4915cd,2024-12-11T14:25:45.607000 CVE-2024-7240,0,0,4e20c2bab1e2a684d131a3e36871188b18ab139cfc36c1298fe27fdca0d3094f,2024-12-11T14:22:23.280000 @@ -274175,7 +274177,7 @@ CVE-2024-7256,0,0,6943aac07a7fc5ab85c828a3f2feda9d7e5f422c60266753c2056748792274 CVE-2024-7257,0,0,e824d36e9091bce947d766daa6e3bb42f606d3c1749eb85a01f040d08b0b6e1f,2024-08-05T12:41:45.957000 CVE-2024-7258,0,0,8211618224ce65efbd4103dce5e1df47001d574abef7aea73a13fd90621d6f65,2024-09-27T13:05:06.930000 CVE-2024-7259,0,0,c834fd6939c3843e66c208a30a565ced56da48b04c4e1e6d15cc77320538294a,2024-09-30T12:46:20.237000 -CVE-2024-7260,0,0,eccd02e4475c89c644774e4793804d1d23f7528435ed214274145c421ce8d68c,2024-10-01T14:15:06.553000 +CVE-2024-7260,0,1,559b6ed7b30efd6a9853bcc070d7d07323c89a0a4c84047fd13d1ffb99f2cffa,2024-10-01T14:15:06.553000 CVE-2024-7261,0,0,9f8f6eb88c793aad8dfa39951c5641f4d33066bc3f403d72218afa947a55ee89,2024-09-13T19:39:40.570000 CVE-2024-7262,0,0,d526b03d3153c594ead2917494e37906711c19eca0e0762a3647d82431b0dfb6,2024-09-05T13:30:33.680000 CVE-2024-7263,0,0,f410c2825c0d34a07a9a91c73a99395386a0f2cc2345593f0d9af7f978f4a66b,2024-08-22T06:15:04.510000 @@ -274228,8 +274230,8 @@ CVE-2024-7314,0,0,a0e3db9e46a10685462d139958ab3e89d3fb6ba3d18ec1868705f43b6ca9ee CVE-2024-7315,0,0,0276fed18ec3f282200e90c7f7fd4f2076ab30971f9a3c25cda4a70e2661c4dc,2024-10-04T13:50:43.727000 CVE-2024-7316,0,0,ead5006fa07151a6566ea5d17b1257586191433f2451251841cd8207be58bdeb,2024-10-18T12:52:33.507000 CVE-2024-7317,0,0,74b94744a502a911bfc3fa448f659d1e62224059149675770167c008b6a94652,2024-11-22T19:12:46.280000 -CVE-2024-7318,0,0,82afd2b9ee97b5432d8403e622aa0297bb10535effd39349061b4fbff688ce60,2024-10-07T20:15:17.153000 -CVE-2024-7319,0,0,866332c12fc791db5d8bbd342b8b01c08dd94b9f5212e7dacd452b7ef1245d91,2024-10-07T19:15:11.090000 +CVE-2024-7318,0,1,8cbca515fa6d8fbd9808eb88225bf271b50136ae9aabf8f4edc8bdb9df7d7f7c,2024-10-07T20:15:17.153000 +CVE-2024-7319,0,1,4525edc8de27c7880ec08e0f3c2fc246097df2a636951ddea8eaec76b898d5fc,2024-10-07T19:15:11.090000 CVE-2024-7320,0,0,3663c335309fba0eb777ff800cafcae28d107b8f49aacc2ab9010c2b3b0bbe51,2024-08-12T16:47:36.887000 CVE-2024-7321,0,0,a8c12720720f2bd402d58186893bb07a37c72ff78244c59b25b745e59e6b34a4,2024-08-12T16:49:01.887000 CVE-2024-7323,0,0,8601d2f72a02fd3ae2c8cdb848b5505e38f292f5bb4774667cf7b2bab4a3b63e,2024-09-11T14:22:46.903000 @@ -274250,7 +274252,7 @@ CVE-2024-7337,0,0,2cd8270b417854f033216917f41d138f4d99c785eb4b08e1968382f45f87c0 CVE-2024-7338,0,0,8a7fe0b32a7363bf332020943a56b4fd58e7fadb61846e600b7d3232ab649d6e,2024-08-09T14:51:45.677000 CVE-2024-7339,0,0,237e183fe2ab6169b5254e999c16693fd3f1e5326834530750ba0a0993957986,2024-12-20T17:37:05.217000 CVE-2024-7340,0,0,afceb6b3fac1138f8cb83e0f415cec5ebdcab90ac887ac6cc7416d04596c3384,2024-11-25T13:15:08.107000 -CVE-2024-7341,0,0,8d30f7ae9e3df8c21438348a88623097132df20d9a1a51195b4277b25254e473,2024-10-04T12:48:43.523000 +CVE-2024-7341,0,1,9879605967e8521e630e3508fca649ab0616466777cf91cc4c4478c8d606e537,2024-10-04T12:48:43.523000 CVE-2024-7342,0,0,bbab372366d62b7492fd885c0fd46da4598051b512f5991327f8cfce46915879,2024-08-15T18:40:22.537000 CVE-2024-7343,0,0,7f2632b50e9d4a4da19cdb31448eaac6640ad60d85ef9c956fde33f5c8956343,2024-08-15T18:40:52.707000 CVE-2024-7345,0,0,7689b50cbee63ee18ebf904fc91903644247462e42f3178c6191ec55402d6f73,2024-09-05T14:11:00.493000 @@ -274449,12 +274451,12 @@ CVE-2024-7559,0,0,e2ce69e7f6079ed4798c3f69ec4fcf3669930aad9ef8a0c5758944d7e276dc CVE-2024-7560,0,0,42fcc5d7b3253b142f100968587a9194b34fc19177fdb10cf4447b9935e32495,2024-08-08T13:04:18.753000 CVE-2024-7561,0,0,39b56d5e0c935d1569f6c65718ccaefe2b713d37c7e2453b35a28aa8c470f51e,2024-08-08T13:04:18.753000 CVE-2024-7564,0,0,aaecac6657aebcba5c5a0a4353a649c0e9b449808e772fb1d7591dba40d01531,2024-08-07T19:59:36.240000 -CVE-2024-7565,0,0,75440919f9c3c5c24bfb8da09fe4cefadf494ae6d74247e75d704bf05378801d,2024-12-19T19:15:24.127000 +CVE-2024-7565,0,1,8aaeb62e7286c635605949a18d01cfac562bbcedb4487418efb041d81ee481c8,2024-12-19T19:15:24.127000 CVE-2024-7567,0,0,6fcc07bc770e46ac627a51be07c4648386148d0b824984d20ae9036535f6d55d,2024-08-14T02:07:05.410000 CVE-2024-7568,0,0,2f553130e4eacfc693e995fca0612777f4d890e405998fe269b8e8bc9ce30eac,2024-09-27T00:41:18.483000 CVE-2024-7569,0,0,5994c6b63c20456eef57a01a5388108fe6a245760bb402517971f0893da8a4e1,2024-09-06T21:57:23.037000 CVE-2024-7570,0,0,4b95c50b05e603fd192a26ba7aeb93b1795ca78a10ab423596f59e19e721c691,2024-09-06T21:59:00.830000 -CVE-2024-7571,0,0,027d2cadad2e85c3addd672df91df7034d43e7b07ed4f18f01713a8fda40d906,2024-11-13T17:01:58.603000 +CVE-2024-7571,0,1,ce5810629ee7fc3cc150c666d504c91be9e3a0b7bc1cf876cce1d379df62801a,2024-11-13T17:01:58.603000 CVE-2024-7572,0,0,d6a06dc5856037f9439f575c54e48139962b11c091f2a709c1a513d9fb1309c5,2024-12-10T19:15:31.317000 CVE-2024-7573,0,0,b682119c0c2e97bcbd91b2c93bf46919696a7eb8e95fa746f7aa6d0673139d3d,2024-08-28T12:57:27.610000 CVE-2024-7574,0,0,af702c08dced1e58034991ae3edb1ced31d7e457008281fc7156f6946a0e1bd9,2024-08-12T13:41:36.517000 @@ -274567,11 +274569,11 @@ CVE-2024-7691,0,0,6dad0c769fb572b88a068528267f61949164dc392b80af6f168258a6b2c7f6 CVE-2024-7692,0,0,4b38ff30e017e91d8a002928077306fde8ee04d0be5e9045460020d6ccc3af22,2024-10-04T17:14:50.990000 CVE-2024-7693,0,0,dd3e43863a4776bf6aa9cee54c3310fd08dfe98f5bd8663ebc12432cb7153f16,2024-09-06T16:51:35.647000 CVE-2024-7694,0,0,3a2582a984429d8c89c3dd71bc863aef01ff80b7baff4f3e3f71f54998d90a46,2024-09-06T17:24:42.573000 -CVE-2024-7696,0,0,35e2703a3580e34793b0adb47636435a97e9bc261b606487fac86ca26d6b5071,2025-01-07T06:15:17.827000 +CVE-2024-7696,0,1,f0052f9d5e178b3ea159f04ebcfd4751f930fb606630e5cab2ff7b8b63a94d0f,2025-01-07T06:15:17.827000 CVE-2024-7697,0,0,122b8f72aeda3c5b2d61460f1dce24bd382a6f877b1c3f9efb3e322459b58ee0,2024-09-06T18:04:28.030000 CVE-2024-7698,0,0,28382cbcfd0fa7ea6a7d15c9ccdd01abba2e948df9ed5ab95948fe232327814d,2024-09-27T19:39:43.350000 CVE-2024-7699,0,0,69660c01a9078b1bb8b8ba16d42135a8912e2caf5b6ecd54d7bddf6785b1e596,2024-09-27T18:59:31.277000 -CVE-2024-7700,0,0,1522469aaa0bdc5901ec9d78e81d54d096cc309d8ac1b2cae992f977833f0bd1,2024-09-16T14:20:21.087000 +CVE-2024-7700,0,1,b57636a6ff7952071612c6f1892a1333ca0104c06c954b5d5e21b60cfc424ebb,2024-09-16T14:20:21.087000 CVE-2024-7701,0,0,b0878b02333252e534252a4736d0c5ba0d3a7fc2b33c683d1605e18b04129bd7,2024-12-15T11:15:05.387000 CVE-2024-7702,0,0,1098975bd71f66b03b30c93d5413d8a5ef0d8cda516b0c70a1252211ba8e5726,2024-08-26T18:15:46.870000 CVE-2024-7703,0,0,7f76e29a5ed460fd6ac72a2955499c5bf4953d8afc86b29ced015fa447c06880,2024-08-19T12:59:59.177000 @@ -274830,7 +274832,7 @@ CVE-2024-7994,0,0,677bb0d3a07210a7d5902c83c522b3beb4ddf65c53dfa15f4ee3e8a6eb5c8b CVE-2024-7995,0,0,a8b278e923ed83ab90058edd8bf9d51cbec9eb8e7e1669b64ad19e97359b7962,2024-11-06T18:17:17.287000 CVE-2024-7998,0,0,5a96b2d058d8fa22c17d15139fb41166f629052179fc1be6b8add20fbdc8bcac,2024-12-03T19:15:13.330000 CVE-2024-8001,0,0,643893a29009207bc6a69d6702f1ec3a6837e111f4f1f008a7509622c221c113,2025-01-08T07:15:27.463000 -CVE-2024-8002,0,0,2d8e2db5df11b9142c8e2179821bfb509bbc8d93afac1966799b3eea1f49a88e,2025-01-08T07:15:27.773000 +CVE-2024-8002,0,1,ecfd05cab564ea91e329224574eaa831f82ad64aee6aab458c22932c966b1282,2025-01-08T07:15:27.773000 CVE-2024-8003,0,0,5aa308260fe84145e956f1e70aa8ca1a5bc6781410b399a8b2ed922e0ff7150a,2024-08-21T15:51:28.397000 CVE-2024-8004,0,0,1cc79fadf99fdda419b94a0109a3ce8cf40de9c6bb1186292bde6c3cc7373354,2024-09-04T14:56:46.947000 CVE-2024-8005,0,0,d3ba332f380b70ed5e4439e944d0d74b998d66da36cd7503b081045196eb6280,2024-08-21T15:49:59.470000 @@ -275046,7 +275048,7 @@ CVE-2024-8280,0,0,19e1d16920f459f5bed4eddf42d3c01ac28ae01ae93be28d68c9917069f7aa CVE-2024-8281,0,0,1cdd6dbd512a818df03ec8d6cea011f02816e8ea2880fdd840d05646af534f31,2024-09-14T11:47:14.677000 CVE-2024-8282,0,0,7b98d77f6d765cf443cf13bd698f8cfd8cab80c6b5dfbf13bf2f0f7de3c9123a,2024-10-07T20:11:24.890000 CVE-2024-8283,0,0,14efb567cb87b0348167f56a8f98e162861e19c8a3301f44f115e279a1791d5d,2024-10-07T15:49:22.043000 -CVE-2024-8285,0,0,d1b7eb0ae66f79b761a02162a5e3beb74a3be700843628af600dac096122e0df,2024-11-13T17:15:12.503000 +CVE-2024-8285,0,1,78b9b5f21e15c9be9d1325a1f9bef88e866081691831aacc31fdca6171ef4f4d,2024-11-13T17:15:12.503000 CVE-2024-8287,0,0,44aad866f3460bf718be990008b4fca1b1acc226707db3970935711ac18575f1,2024-09-24T15:52:38.047000 CVE-2024-8288,0,0,2dbe9e38811e1b4dd40daba68eaba51e92496c00a9c8fcb0f014d8ae6dc0534a,2024-10-04T13:51:25.567000 CVE-2024-8289,0,0,9d7300f8940d3398f33784f738c77a2c01537f05398b35ceacb9c8df1f539077,2024-09-05T17:41:58.350000 @@ -275109,13 +275111,13 @@ CVE-2024-8350,0,0,247a61b5673fa12b39c86038a1ca267c4286e5d27e653a001a01bc50474753 CVE-2024-8352,0,0,543cd051297bb82684ade6cc2d79378c56659a242e531daff38a69f59fa68e41,2024-10-08T14:17:34.707000 CVE-2024-8353,0,0,86208fbdc7bdfa6f4f2e7e777db587fb8c4c81fff4599145ad5b4470d2958b9a,2024-10-01T14:31:21.430000 CVE-2024-8354,0,0,901c3ae461c821606ad2205217d6275b4b37673a3ff80ebde8daf69668234eba,2024-11-21T09:53:05.777000 -CVE-2024-8355,0,0,63472442425b5b332935cc40ff820972712b6b2a968e424ee44a8ac951d36687,2024-12-19T18:47:39.363000 +CVE-2024-8355,0,1,4774b0a8089781593380e6f779b37a4a9ea08ad24f8c16ce66477bac39d03569,2024-12-19T18:47:39.363000 CVE-2024-8356,0,0,4cc50a0cd0fc854319a533c56af330f5d1362482eab466e26933df9baec721d8,2024-12-11T04:10:37.263000 CVE-2024-8357,0,0,1d889408be1770076ad81711236c2a891b36406e9fc3a925e957f690d3e9af63,2024-12-11T04:05:34.840000 CVE-2024-8358,0,0,5fb394033ecc4990c585e13519c166d42fa3ff92798bd5136ede9dccb7b4708d,2024-12-11T04:00:11.233000 CVE-2024-8359,0,0,d54d10f5fe9164e60ec13d6bc33fcba551ad8ecc6982ba256a03e2194f9ccecf,2024-12-11T03:57:48.243000 CVE-2024-8360,0,0,ed6b27add01a92e9b19489ef7584e5d2cb3487d850b912f3eb15873fc81ef9c2,2024-12-04T19:32:21.703000 -CVE-2024-8361,0,0,08d81eea997bee8fc0bf336f88e65ae7c6477453ff150c8e91d874a8fb0dc127,2025-01-07T17:15:31.420000 +CVE-2024-8361,0,1,0808268b86d5e2801d390816e49ba659dc9b3be2593173bac124e66a458bde5d,2025-01-07T17:15:31.420000 CVE-2024-8362,0,0,6dbce73a6371abf2515922ae5bca256741ceef67962b22664e0b4f9994cda556,2025-01-02T17:37:05.167000 CVE-2024-8363,0,0,31dc15c8efef4d6babfe272b0bb3432c061f6d6e93807b938d15de08fc21d43f,2024-09-11T16:35:05.653000 CVE-2024-8364,0,0,627f8b2156971d2679081614445e8377234b8cf137137dc8007755116bce395c,2024-09-25T15:08:08.503000 @@ -275180,7 +275182,7 @@ CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae5 CVE-2024-8440,0,0,34e985174635608a463cc1a8bd0ba8df6a7ee2cfa0b1c8ff96c10b8d3b57996a,2024-09-25T19:34:19.683000 CVE-2024-8441,0,0,79cf14dd74cb6a7531e638c8f38b468aa786c22d3fb9078561c7dc22934457ee,2024-09-12T21:53:43.387000 CVE-2024-8442,0,0,2b91bb44d575b3d90f25cd37b7592343788501ad22a72f25bc333300a58411e4,2024-11-08T19:01:03.880000 -CVE-2024-8443,0,0,dc49fab5422a622c5f6090a841894713f46969e58fb040071f5165926d9e2d4a,2024-10-01T13:15:03.110000 +CVE-2024-8443,0,1,e403b8f31dbddb2e3b372b092da72428bab5de3f10c800d3013c6f9756adca46,2024-10-01T13:15:03.110000 CVE-2024-8444,0,0,f516c67d5c6818a3458bc5304f2627d10a27062fc7ef8aa09a9d28875d1dcf3b,2024-11-01T12:57:03.417000 CVE-2024-8445,0,0,384f7011d0e449169e0e5da94ceb0dcddb207f57c664fe42a2a017883a234991,2024-10-01T06:15:02.650000 CVE-2024-8447,0,0,088059513f315430b00dba123e41a9d4243fc076052470fb763d6e64e1ae7fea,2025-01-02T21:15:10.303000 @@ -275210,7 +275212,7 @@ CVE-2024-8470,0,0,0b09aa8b8067433b7afb73b61c7aa44d3ef7ce8628b7e8d3b9e29fa3afb00f CVE-2024-8471,0,0,3934935f0a31bf82a596702efda6613996b08d7c183fa97f6a84e3cc4bc42129,2024-09-06T11:44:22.510000 CVE-2024-8472,0,0,a6a3ced3bf4a7f20791a06fac7764ccd2d88fa692882742c77836c8aae9605ea,2024-09-06T11:44:34.543000 CVE-2024-8473,0,0,bbd4d04523589cb8c745e9ab16e4a2c78d73b9497ab6f7282bb7e3bf6a9bfe27,2024-09-06T11:44:45.017000 -CVE-2024-8474,0,0,a1b136fefd80a840df73e57b6ef6834949bba9550af0fd9a07b6f39da4b7950f,2025-01-06T17:15:44.747000 +CVE-2024-8474,0,1,ca77f77fc618b5fd4298b40abef97ee786810bbfbf9b2402979806660a251c6c,2025-01-06T17:15:44.747000 CVE-2024-8475,0,0,c86d89e65a4821d108142f782b16ddf63e182d7002314d62a9de3c71a0583b70,2024-12-17T12:15:21.010000 CVE-2024-8476,0,0,e10a403d1e51fb18d41d013015e6a782c14511b4b5a178aec34efa9588c9653e,2024-10-02T17:31:00.583000 CVE-2024-8477,0,0,19e1a50b82df4e949fc45923ac7e1924aea3a0df2879078ebf532cd95acaecd0,2024-10-15T13:30:52.877000 @@ -275218,14 +275220,14 @@ CVE-2024-8478,0,0,484f2c68e6e7a76a908ae4220aa78a61277af4da3d4158c47b9f9bfdd22b29 CVE-2024-8479,0,0,7f607ab6226df6cc30f72675a0a7928628cd9dd405d303e55b9ea75b85e4f01b,2024-09-27T16:12:10.427000 CVE-2024-8480,0,0,a3222d51b9b3bc8d7bc3a958018f5a48e92863fd740c6e5bbb78fa8f0df0cf21,2024-09-26T18:13:58.470000 CVE-2024-8481,0,0,e96492f313c7b1441b72002a9c604dad6321f6a135632489e9b86411985da7a0,2024-12-26T14:58:41.757000 -CVE-2024-8482,0,0,57ce7318b7ddf832f81e12c73f97b2d6a83ff16fd2ddddc2f2363683908d13f3,2024-10-10T12:56:30.817000 +CVE-2024-8482,0,1,f988277fdb28505c6e329cc8100614f82c281cff92307cf03886ee09632805f7,2024-10-10T12:56:30.817000 CVE-2024-8483,0,0,5195ba758d6242bcccf2c248e56be79d4b9654410f6f169122c92d0c6b15f217,2024-10-02T16:42:30.347000 CVE-2024-8484,0,0,e466c3875728036a2a9b4c89a8305493672d041c885c3b58c536c50de9cc1d74,2024-10-02T17:44:13.687000 CVE-2024-8485,0,0,7da6ab34afa2ac24f2a2d46141ca9ec2b3fec75691fe7f053cec823f479e4df5,2024-10-02T16:19:15.993000 CVE-2024-8486,0,0,72c8d12fbda6079a657a7f7d5227b28970fafaa525b2f5c74dce370135cee472,2024-10-07T17:48:28.117000 CVE-2024-8488,0,0,3018a5659d434cc801dc5e3e8a6e3f6b1d0cf4538dce2991c2254ff7a5f65d98,2024-10-10T12:56:30.817000 CVE-2024-8490,0,0,62bf39487dc10cd157d6355db7b678c26d37a733716806928b901a962cb34d9b,2024-09-27T18:36:00.053000 -CVE-2024-8495,0,0,b098ed51540ac09b3707525a74befdef00850cf1d733e87cff25ff8bfdf78c16,2024-11-13T17:01:58.603000 +CVE-2024-8495,0,1,29ea38322de367012ea87969aa3bd336d24bed46fcf85ad4d8a22d9fc7b9caf5,2024-11-13T17:01:58.603000 CVE-2024-8496,0,0,ab865babe0d164049e1365545a634298d8f9eeb65fa574e795c6818555b64d40,2024-12-13T19:42:40.417000 CVE-2024-8497,0,0,964dec8be2200cdf9d07127057f8b6f303d0e240ee7e6f76cdfe9a2fce62258d,2024-09-26T13:32:02.803000 CVE-2024-8499,0,0,2edefd90741d92198f57d70f6a88792184be7286118419ab2da73ea4b4333266,2024-11-08T21:01:13.457000 @@ -275258,7 +275260,7 @@ CVE-2024-8534,0,0,9508bbdbb90dcab7c3c9618335f28688c58197e5ebea0ff344bbe124b8a349 CVE-2024-8535,0,0,9430921b56a98fb793f25bd28deda9111898929b692dbcd6ef2778ea55060c41,2024-11-21T17:15:26.630000 CVE-2024-8536,0,0,f58b8cad2a0c4a90556b7c4730ad95a9e86edfd36c5b80cbcf69e920921131cf,2024-10-03T18:16:17.740000 CVE-2024-8538,0,0,9b85de2d90f35a6b2ee4405e401f24f5b3cc7b117815da585ee31db85a74f1aa,2024-09-26T16:28:02.990000 -CVE-2024-8539,0,0,0dbabeb96fa28101a49b13ea4f960cb06147652df4fb97a7bd7d09986f46ca6a,2024-11-13T17:01:58.603000 +CVE-2024-8539,0,1,59bd33f2134f29b35c6529cd04dd66eaf17979b7f7ed9358cbc5cc8e4fdb380a,2024-11-13T17:01:58.603000 CVE-2024-8540,0,0,c20b714994c4aa7587d38b96cb78eba5da562e7776c062ceec053d693ed236df,2024-12-10T19:15:31.463000 CVE-2024-8541,0,0,11f11486e0c328b727b3519cc94f2174fb76a070c646745035cf6e7c2e119162,2024-11-08T15:07:08.400000 CVE-2024-8543,0,0,e6cedcbecc2d6bdc12712cbe45b90facb692961eb011612655f2e0245f4a87b3,2024-09-27T16:46:26.243000 @@ -275482,9 +275484,9 @@ CVE-2024-8802,0,0,519ccb5eaf9bc8f3d38918f4150aeae97a2c25ee8bbd45cda3cfef957efbe8 CVE-2024-8803,0,0,545e61fa61f0ce131642be6837336dfca74425fdd247a1c1bbc9c5682d94d2b1,2024-10-02T17:15:12.677000 CVE-2024-8804,0,0,522f84c5f3d62fdb46aab7f45c91feee68128f2626214a0b2e00b68dfdfedbeb,2024-10-10T20:56:49.403000 CVE-2024-8805,0,0,dcb9955ad68abfddebfd4e5bbca8162f29f9659b32eab2eee4abd640abddb92c,2024-12-20T18:05:47.173000 -CVE-2024-8806,0,0,4b9ed01ad6f672a2c6917fa3d7270b3791ade8f8d7c799fd1977d8d49125e25d,2024-12-20T17:56:56.057000 -CVE-2024-8807,0,0,a3194d6f7254173351134c6667ba0ab69ff4954825d1b3258d592d08d98a976b,2024-12-20T17:56:46.357000 -CVE-2024-8808,0,0,97dc891df3d9a3e3e84cc6d2301fb4dbe91fc0ade39658278ca48e61412ce9b9,2024-12-20T17:46:19.670000 +CVE-2024-8806,0,1,7cd09a1a0db4abcb814a0dfbab2d70db4acc9d65c11554b60cdade7a08baaa96,2024-12-20T17:56:56.057000 +CVE-2024-8807,0,1,d91bc031ceed6526ebb509297cc02e75f15ded43b99ae59a8f5a1a424847c30c,2024-12-20T17:56:46.357000 +CVE-2024-8808,0,1,565dbea0989c1b7c354426a821b1e2b2ddc7be892858d7a21792ba35de69b791,2024-12-20T17:46:19.670000 CVE-2024-8809,0,0,2853294a93443c963cab4b883bfed43b8244a681241e18acbdf96048099030f0,2025-01-09T16:11:32.663000 CVE-2024-8810,0,0,4054bd11d0a58049adbca132e9cb8f89aa5e0709e583c7f8d6f2e3c10841c942,2024-11-08T19:01:03.880000 CVE-2024-8811,0,0,efd1e1c7a12a1d68e4b8fbca926671ec65f16d85c01df729a2e729ed2aa509eb,2025-01-03T22:49:49.463000 @@ -275529,9 +275531,9 @@ CVE-2024-8849,0,0,0734151af4af8138bcdc00f593bbe5da7ce0eb57042fd20edab1406815b87a CVE-2024-8850,0,0,6a79107655be2c071c14b8c23b6123b1889673d27ef57475d913bb60daea2138,2024-09-25T18:49:53.397000 CVE-2024-8852,0,0,30058a9af3dd7a32997e52bc92060be7a6e41d470611028e31f3fcdaf7d3bfbb,2024-10-25T21:20:11.410000 CVE-2024-8853,0,0,8a2f5d1c05cc9b3a3da315856bc11b5532339e2e37b2d0099ab6a7be83232255,2024-09-25T17:49:25.653000 -CVE-2024-8855,0,0,802999a70966b0b71e612ef66e31228db9820bd8dfec7895b3f8da0854e74b69,2025-01-07T16:15:37.873000 +CVE-2024-8855,0,1,1de8bc49e142b2a88a8c177dc1565dfda6e1212ade7b1c4fa034ffac7f1850ba,2025-01-07T16:15:37.873000 CVE-2024-8856,0,0,9673197f029df18178a4a1f715fc7a70f5066ac5587142a3b689de66b2851e04,2024-11-21T16:15:27.633000 -CVE-2024-8857,0,0,16278ff34750ee56afd95e32985c0c6a98ffcbe3092c1e921c57f4b64e713d3d,2025-01-07T16:15:38.023000 +CVE-2024-8857,0,1,713ef398c10fc91057d6521fb6a220800b21b6f421d41e25363e72c8aad2bf07,2025-01-07T16:15:38.023000 CVE-2024-8858,0,0,ad81041fe495a196e9577347167ecfba5a083a17b0628925776a883bde8de8f7,2024-10-02T18:41:29.067000 CVE-2024-8861,0,0,b142f8cdfb1b389115184b8221537238e047c24179b6739e896f736e2c2081f9,2024-10-01T13:41:27.213000 CVE-2024-8862,0,0,1a8961f8693547b26bd383d0fe2e24176b66436d4aff5322938219edf5b87168,2024-09-20T15:47:10.697000 @@ -275554,7 +275556,7 @@ CVE-2024-8878,0,0,3d4ef32102d482c7f9f7888fdca18ba391bf46d03cab901f0a172985b5f64f CVE-2024-8880,0,0,fec21f9fdb82cf89b5d77f28b81d3cc91cf44b9b16a849e57255b996d711b4e2,2024-09-20T16:41:38.030000 CVE-2024-8881,0,0,980dc57fdc69cc310fd5549f5e1f154150c973906f30f6c54dc1dce83956038c,2024-11-14T13:51:11.257000 CVE-2024-8882,0,0,5a6d4dfcb1806381328572de20cc9c1e0829daf2f3b9c0f7c194a6895c3d14cb,2024-11-14T13:42:12.347000 -CVE-2024-8883,0,0,89208240f72f901f0cac891c6f9d1a4a0b6583540e9cbf645ea4351f1eaefaf4,2024-11-26T19:15:32.253000 +CVE-2024-8883,0,1,8c8eec0fd4f83f0759df5cc64ba00799a93318c6979ed0f52caf0d915d406a92,2024-11-26T19:15:32.253000 CVE-2024-8884,0,0,8bd52cb69515c66efe0497c50c7e855f7f903ed80b60e3d4eb066bb30421d4f1,2024-10-10T12:56:30.817000 CVE-2024-8885,0,0,d8de77a3502a5b20af6e47454bcde651cc738a76054d494cf3d42a0bd6c77edd,2024-10-04T13:50:43.727000 CVE-2024-8887,0,0,00e0e5c50ba3385bfbbe5e32290c8ee9cfbddf32710b15539703c4ad33fc35bf,2024-10-01T17:30:07.597000 @@ -275736,8 +275738,8 @@ CVE-2024-9108,0,0,faea84220c148816dbbbe4c85a3bb857cc9636c369ae82341fa20990b41c9f CVE-2024-9109,0,0,fb548c987718d5b0f09528b96ece519c9c59d5672a83e706c42f5800de4d0fa9,2024-11-06T17:18:48.363000 CVE-2024-9110,0,0,6cdae4ea45ea56886159bd4b3be372a033888330c414e2456bb51f68ff8294f8,2024-11-01T12:57:03.417000 CVE-2024-9111,0,0,f87d9fa3fe3b3b35af7086004601bf611891d416924fbaf3140c414efa11e2f5,2024-11-21T13:57:24.187000 -CVE-2024-9112,0,0,ad9285bae0af947302e87a70eca8fb8a43bf589d6b042b2fabf799a36eeb3d9c,2024-12-19T18:15:52.733000 -CVE-2024-9113,0,0,086e75e928d82cf2d2f08c8e9e7f848acb866a8208c9d4331092de762bbe830a,2024-12-19T18:15:21.380000 +CVE-2024-9112,0,1,8d9877fecb8c764c886da94bbe95f6e394cb4e5230b68a27ca0fbf3cf57aebe2,2024-12-19T18:15:52.733000 +CVE-2024-9113,0,1,9030225483ecb82dccb5e8d7fa0223cc76a10935a46b8834c3fd517b3541af78,2024-12-19T18:15:21.380000 CVE-2024-9114,0,0,60b906f8f44fae8fcea1f0caf335eaffc083e04aca4866ccfb4f1332dddcb290,2024-11-26T20:58:01.907000 CVE-2024-9115,0,0,25542f2326bc6f5df099eec45b70d10434d94fd4a7ab6b86d1b5d71f062981f8,2024-10-01T13:47:25.403000 CVE-2024-9116,0,0,cfe74d37f77b6fa9df092f5223f72429b3619aa14bd52a27774aad87ecfb69b3,2024-10-28T13:58:09.230000 @@ -275808,7 +275810,7 @@ CVE-2024-9204,0,0,a5160d78b40684d13a0abe78f0110c3f251288d3f2bddb167ad6ebb658dbfb CVE-2024-9205,0,0,5ae9601368f3bcca980df59978014460b19f7164118a2dcd7e7fa2f27092d41f,2024-10-15T14:16:53.337000 CVE-2024-9206,0,0,be3e1f94144fc51753cd1bd12f56737ba31549963e7e6380e7b5eb5483568304,2024-10-22T15:27:08.847000 CVE-2024-9207,0,0,e5525b1e8a190b78c38e7b4cef54f1aa80674fbb3d5f5e4081838d7246c5a623,2024-10-10T12:56:30.817000 -CVE-2024-9208,0,0,8b3dbb760a0e82ad95960e955d1108019621b24f631ebc05a17db587462510fa,2025-01-07T05:15:20.790000 +CVE-2024-9208,0,1,0f3ab5f9632a8e4b4d18bc0dcd765efd79f461fe4d33f9170b7dcdb58824c59a,2025-01-07T05:15:20.790000 CVE-2024-9209,0,0,23750bdc4f9c650f82cd685942246dc8c2f4c461cac57cfd6b7d60cb94f7fe7c,2024-10-07T19:20:32.777000 CVE-2024-9210,0,0,c4e5f9d47e14247e63a2b18a451c4a1ff64faf127742a99345638ca5cbe6f226,2024-10-08T15:34:42.060000 CVE-2024-9211,0,0,9f3db3fbfc8b77df31c04200f6e0f4fd68502b04da49c90d6b1017cd48a111e9,2024-10-15T12:58:51.050000 @@ -275926,7 +275928,7 @@ CVE-2024-9350,0,0,657c5995043502e56c0a5ef90cf64491d92d2833df40202d33beba6bb4ff45 CVE-2024-9351,0,0,6ab09b725ad3122da139cd0462080a4368c97f2f828ce0920a1b033929a592ad,2024-10-18T12:53:04.627000 CVE-2024-9352,0,0,205c476dc7f28d3803fc5e0ba1bec3885621666e16e6cc937d323a311d7c25c0,2024-10-18T12:52:33.507000 CVE-2024-9353,0,0,8e0d86c3f9aaa2024af022239a79f55d320063d37d43e9df0d1290550d424793,2024-10-08T18:50:51.357000 -CVE-2024-9354,0,0,dee827dc13292a20bd90e43c0143ee53f0df1f362bf93860946aa622f3a87595,2025-01-07T07:15:28.140000 +CVE-2024-9354,0,1,eb04c5105330fca3da944e4cbdaadcc9a14a2f66d98a9175685bb64431637ef1,2025-01-07T07:15:28.140000 CVE-2024-9355,0,0,b0ec2555edb2be21aba884cb9f09977310be30a82039454ba7e0acd9a6463ce0,2024-11-21T20:15:45.247000 CVE-2024-9356,0,0,0e5b063e7a821f841b1ce9f2b8a4731ca3268644887ec3fcecffe9693970f3c1,2024-11-20T15:01:41.627000 CVE-2024-9357,0,0,640186f8f72cd78a5751991fcededaac14402a8a19b5c35e7bc40afd0be046a2,2024-11-12T13:55:21.227000 @@ -275981,7 +275983,7 @@ CVE-2024-9413,0,0,a06de6835130fe994a1b9f10a16e4d390bb61a1bb02ceb9b43d0f4e1eeae35 CVE-2024-9414,0,0,daa11a618576f3dd1bc2a87a2671aa82c6ce206bc2d923313e6d592311bc638a,2024-10-18T12:52:33.507000 CVE-2024-9417,0,0,216f9ce7a9e770763e40db955a327ba67f06d2e630f73f66eb3add63da2d3dc5,2024-10-07T17:48:28.117000 CVE-2024-9419,0,0,75c2ffcece6c8d9641e61b7d83db859a8f0c6a3be035496f4eedc8e263459f13,2024-11-01T12:57:03.417000 -CVE-2024-9420,0,0,7cbefdf032fe0567969b6ba264c077f2ba33a750aa1b8c11379439a2eb5b6650,2024-11-27T21:15:08.357000 +CVE-2024-9420,0,1,4879e480d5977eeb95f8587dfb629d05cb5c7e4b3b9e086ab407a72ef4324a90,2024-11-27T21:15:08.357000 CVE-2024-9421,0,0,037ff18a423af7d430246a25c13267312b520381fc2b22b38075ef45225d8825,2024-10-10T20:59:01.600000 CVE-2024-9422,0,0,84806a9eed518b06f6d8827496be4f70f3fd277675ce3978a293d23ef572b865,2024-11-22T18:15:18.287000 CVE-2024-9423,0,0,ea2ceee1b3bf62e5f678d6840797f5ce1005e985008fd3d6ffca2317e3c41048,2024-10-04T13:50:43.727000 @@ -276040,7 +276042,7 @@ CVE-2024-9488,0,0,24a104ee042d409dac1b47e91dfe4fa3675de573a6d9c7b27917f050255558 CVE-2024-9489,0,0,9258045c083103dfa924748299ab5c4dd4ec8da1f0d3cf12ca2c7454235f3440,2024-11-01T16:27:25.937000 CVE-2024-9500,0,0,d281910094387755c33adda8658eb046790675cd4af5161b6589be051fe5cd55,2024-11-18T17:11:17.393000 CVE-2024-9501,0,0,6a54c1f4c2f1d131dc91aaf803ea2d16e3173972cc5357c7b11859daf18eeb84,2024-10-28T13:58:09.230000 -CVE-2024-9502,0,0,00b8dbf59806a539c172c915f0826fbf68f5ca3e667d1030c55ab44041e241f8,2025-01-07T07:15:28.360000 +CVE-2024-9502,0,1,e3fb711f67887d1258017667f51437e489fede52d407ba36dbc6fd6d3d71d276,2025-01-07T07:15:28.360000 CVE-2024-9503,0,0,4a374149f46c5c701e65518c6ac93ba2816680bc5fe571350f5d89a586a796f8,2024-12-20T07:15:12.797000 CVE-2024-9504,0,0,d5582483784d6c852a9dbcff40d18eb6f930294575e0934168018fc044a9db21,2024-11-26T08:15:08.180000 CVE-2024-9505,0,0,9fa554b249edec9f6f3c55fd2b3a6ab6df16ec28919e88fec8b5527ce060489f,2024-10-31T16:39:41.193000 @@ -276151,7 +276153,7 @@ CVE-2024-9633,0,0,464719aabf82d4c51da737aba0ef58dd3d7e243c61253713abe30460682816 CVE-2024-9634,0,0,7b5dabf15ae54de4daab48b64d2e27f430eb55d7ab2217a5e19376e8531d6f32,2024-10-16T16:38:14.557000 CVE-2024-9635,0,0,9f77fd7ccc96fa6d4c00f44465f9f4a309bfc7a2ae1c26c3627ef0449f3c9e02,2024-11-23T07:15:05.027000 CVE-2024-9637,0,0,0f4d16db68000f66da50bae84c41a0f228004e7436fcad95d0969905f72e932a,2024-10-28T13:58:09.230000 -CVE-2024-9638,0,0,07713ca86d99b56fc460dcddc9f1d60133310c7d0c8406d6771a8f56af4a079c,2025-01-07T16:15:38.170000 +CVE-2024-9638,0,1,d242a26cf294563aa693c3b48eace80fd3f0c8397670ca74457232bc92e1deda,2025-01-07T16:15:38.170000 CVE-2024-9641,0,0,1af3f797b9845e72a30c1ec84ed9cc9350f350e1f0f00ee15b2f0dce5766f023,2024-12-12T18:15:28.297000 CVE-2024-9642,0,0,e785c942bfa480a7574dc49561aef989c60cf4146a0b8eb964f23c4e5169b91d,2024-10-28T13:58:09.230000 CVE-2024-9647,0,0,fcdcaf92364c0d2df50a52f6773b32a5c3346fda1bdd5380b00168c49162a8b6,2024-10-16T16:38:14.557000 @@ -276172,9 +276174,9 @@ CVE-2024-9667,0,0,cd67020c0637f62cf6584504253f57e6151bc5b9ac2da6f70bd06c3cab4780 CVE-2024-9668,0,0,b123975089368f5aaa425cf98477e50260db5149c9b36255b367650786092773,2024-11-19T15:55:00.840000 CVE-2024-9669,0,0,01f51557b08d693308fd168dc79c271cc8144ffce3e2ae9dbbb591d8bfa03544,2024-11-28T09:15:05.710000 CVE-2024-9670,0,0,bfd2d3b76924bcef9fde3b4b6223f9e716f28991a60568363900e08f18fbb441,2024-10-15T12:57:46.880000 -CVE-2024-9671,0,0,59553a56912e73e257b64816c627a93d97598b6693e3efb56d6b49b71420a6a7,2024-12-04T08:15:07.357000 +CVE-2024-9671,0,1,8da8355260be5bb56e0e5351a4b43035f95e0a0ad3494b67b9bb7fbd8d577c66,2024-12-04T08:15:07.357000 CVE-2024-9672,0,0,061e80a15aeea3b03a12d8109775a38b18a9082ea48b25cd40a1b2c0322c9214,2024-12-10T00:15:22.893000 -CVE-2024-9673,0,0,206894f51f07ab31418b13579f4576dabbf333f66a89c5e7da0f3500e18d8efd,2025-01-08T07:15:27.980000 +CVE-2024-9673,0,1,160515eb8f09fd336d7ce6380098aac12ba2c5c30d65868d874d0b5bf3432905,2025-01-08T07:15:27.980000 CVE-2024-9674,0,0,dcc152f68b1f7c703678ea1798dc92c1fa87e3588d3559438d5c688c6e83e0d4,2024-10-22T14:02:50.473000 CVE-2024-9675,0,0,e9c4b6e85b7ecac779c2e255c4d61b9639221ef958972d67d9f8fb136bf98c92,2024-12-13T18:15:22.507000 CVE-2024-9676,0,0,f274ca1f33ebade4ed690e9a2c29367dd55071e678cc70655f57d1ab479c60a8,2024-11-26T09:15:06.820000 @@ -276193,10 +276195,10 @@ CVE-2024-9692,0,0,c09412d3ade796bbe36fcbdc283e7a2ecfb61423341d9a573b10de9b4af8a9 CVE-2024-9693,0,0,96c2aa2e3e432eefa572dcd34b83d0c8393d8a6c0331136462b7a8bf8e88cb01,2024-11-26T01:57:19.427000 CVE-2024-9694,0,0,300f71d40bb815a23c3a0bc83a96e03beb3f23d9fc0b94128148bd02f8e753bb,2024-12-03T03:15:05.123000 CVE-2024-9696,0,0,a1a81fef8596ef3bd11bad2b6e9730354c1de3321eb96ce84006b7785432034a,2024-11-25T20:42:32.327000 -CVE-2024-9697,0,0,399cd7720335615817bca30ac608e0ddb27bbd480d1c83b425b8abf638174f48,2025-01-07T06:15:18.330000 +CVE-2024-9697,0,1,c059cd626f3c48dc244a85cbf70422477462cbffadef270019f017cf9846199d,2025-01-07T06:15:18.330000 CVE-2024-9698,0,0,4bf686193ae48864cd34920ebab8db56c7a750eaeae4b44accdb14ce30e1b3cc,2024-12-14T05:15:12.987000 CVE-2024-9700,0,0,e1d890043f9e82a1a371785886deff7f019dc3e23b5dc60dcf4df22bf1134a31,2024-11-25T19:57:41.387000 -CVE-2024-9702,0,0,95a99dd11fa5e921a92645d6f5e952b53257bf8f9fd0658cd67408dcd38bc530,2025-01-07T06:15:18.597000 +CVE-2024-9702,0,1,25e52f5eeb6ad87404def81bd2b31a2220db07a97e0083e3ffb9d3131fea016e,2025-01-07T06:15:18.597000 CVE-2024-9703,0,0,f74b8eb4f5c30abc9348d860f43a1acf838112c918b3b24a8823031e5bd757fc,2024-10-22T15:25:27.887000 CVE-2024-9704,0,0,447028db9bd5f1d3bac8b55d44bb1a06edbf3c8e5b267ad90ca35dbb527f8371,2024-11-25T19:19:22.113000 CVE-2024-9705,0,0,d3e6e0cdfa50d1f44cfdccc6623bdd59d96e39c6b3b67c956a243ca7bda34dec,2024-12-06T09:15:08.577000 @@ -276204,24 +276206,24 @@ CVE-2024-9706,0,0,0990872c6794dc6bd9cf2f3c5fd27263b0ba4cad305032f2567799b99ef0e2 CVE-2024-9707,0,0,f20a21de398140b8d6cd9fa80d26368471f3c29d9493920f2122c5232d98d04a,2024-11-25T18:50:39.867000 CVE-2024-9708,0,0,f728686179ba13414752570ea9b9034e944845f8c6fd05717e98b48a3f80f48a,2024-11-25T19:59:31.110000 CVE-2024-9710,0,0,7bbf75040646e84218057b076df46853b5b15199cb58878b75e4c1b0c9f87049,2025-01-03T21:36:39.877000 -CVE-2024-9712,0,0,3c0025ed12da22fff31c874b55bf94d1f6bd79f9e74da0748a61a1382c7caa7b,2024-12-19T19:17:34.457000 -CVE-2024-9713,0,0,eab37c74e5a6a8128766965a86c4f26e4851c463a4609ddef74e4502f569d29d,2024-12-19T19:16:28.340000 -CVE-2024-9714,0,0,0f3ce79bd55096572e33f259d58ea23abd9525db69dd9124bf8561703c89aea5,2024-12-19T19:14:46.480000 -CVE-2024-9715,0,0,bd8ae0d201db965d0b95830933cb81fb01bcddb12830127f72618b04e56b85f7,2024-12-19T19:14:39.070000 -CVE-2024-9716,0,0,af6655677d3d3d7ccd072c761d8c27c52735ef2b6a79a5cb8b2383194a1c7747,2024-12-19T19:14:31.030000 +CVE-2024-9712,0,1,719d18be7c52d8ccae0402eaa40c692f474fb4d2503019b879f9ba77b4b49a80,2024-12-19T19:17:34.457000 +CVE-2024-9713,0,1,a50ceee464ed5c6d3716061dcccac2a141f9638e81a9209fd3709c5bddd3ffd2,2024-12-19T19:16:28.340000 +CVE-2024-9714,0,1,ec666c360515987b60c6a267db8a5d58ae61359246fde94ed8694edcc05a63e5,2024-12-19T19:14:46.480000 +CVE-2024-9715,0,1,90d7fb3b5af0bca65d4c9ecb4721eae588a116d81281d6d4e214f56c19e4bacf,2024-12-19T19:14:39.070000 +CVE-2024-9716,0,1,790cb948e9f194418d53fd13983ab97549fcb3e60e680b3f9579bb5c924bc48a,2024-12-19T19:14:31.030000 CVE-2024-9717,0,0,ac5a4fe7ba3052ab377cc8fbaa69dbf6d2f7e58e4e7f797d10fcf7400bead2a9,2024-12-19T19:14:21.630000 -CVE-2024-9718,0,0,213b072372d5fa5a52622242a756b633a0bab350789d38579f7a83ecad5ca5b3,2024-12-19T19:14:03.807000 -CVE-2024-9719,0,0,bdc03668f43dc8efebe54daf2e02a004f323573fc8d7db2eb0a21834a3b88937,2024-12-19T19:13:52.097000 -CVE-2024-9720,0,0,2f7d7abba1f25df1be69a50daed6d5bfb839dcb0dc4d51cea842e2872aebb571,2024-12-19T19:13:44.393000 -CVE-2024-9721,0,0,b718f9f1e5b6affea6bbfe6e8eedd64110063b3054c39137126c74819d8abca4,2024-12-19T19:13:36.883000 -CVE-2024-9722,0,0,61a904714479b2c52f6553e1c86a030745d863c6eadd758dd6c2dd3dad78e9da,2024-12-19T19:13:28.567000 -CVE-2024-9723,0,0,55dd25ecfd4c778059ab1ded92f0b98aa88043e3592e911204454cb5ad9f00de,2024-12-19T19:13:20.427000 -CVE-2024-9724,0,0,11b87961addb934cb33232b02e263f3ef496d759e5e7e8dbf20edad5ba465691,2024-12-19T19:13:11.980000 -CVE-2024-9725,0,0,ffc32cb2d9057677d54d0fb34c7a3d0ddb904f67cda7ae2536a11aeb98d4fb7b,2024-12-19T19:12:56.823000 +CVE-2024-9718,0,1,cea62a90200c526da9e571eafd61197e2ebd01a36fa682a75926dc32dec02d0b,2024-12-19T19:14:03.807000 +CVE-2024-9719,0,1,55fd147f7a8a3a961c94fe117cbe3d0d8913b61db64d8d6119201dc1e4a806e3,2024-12-19T19:13:52.097000 +CVE-2024-9720,0,1,c8900e011b78f088d9646d14868245e9315a7607ab3e57ec6d39219bf0752f9b,2024-12-19T19:13:44.393000 +CVE-2024-9721,0,1,72e3418f717ccd61ce9e5935a5a88cf489c47901bdc915d43f0552bbe4ca050b,2024-12-19T19:13:36.883000 +CVE-2024-9722,0,1,e72ebb7e96169e107c7c05a23470d02402b210ee96d78345245efa393cf71639,2024-12-19T19:13:28.567000 +CVE-2024-9723,0,1,7eb42370e81e124559c42a233ba5296033e0479d7053e10f5dfdd53b95e48d34,2024-12-19T19:13:20.427000 +CVE-2024-9724,0,1,7482902ac270c2f33ea4a5f605086859be1baeccadc387d147cfc94ccd6eca93,2024-12-19T19:13:11.980000 +CVE-2024-9725,0,1,cbcbc1db69bbfedd860148a3ca871dfc7cc45af54814f872d4a1824f2ea3f9e7,2024-12-19T19:12:56.823000 CVE-2024-9726,0,0,af7bbe060b2ccf876e62d517bce90114e52bafc8d7754dbac7f1eadb563ff5a7,2024-12-19T19:12:27.903000 -CVE-2024-9727,0,0,2483ba0a173b001b71fe47c42cf98d9cbea7f6a3586eae2b599f658041b9a97b,2024-12-19T17:46:11.723000 -CVE-2024-9728,0,0,3b1c4dad21ebd9f8aa87970acf3382ae4afc2818b33a22fc3b7925c14118799f,2024-12-19T17:30:02.427000 -CVE-2024-9729,0,0,ac4d1053aaaf1fd3c8d9b691ec91996bc29ed75650984660ff2a9de644e0ef87,2024-12-20T14:30:05.087000 +CVE-2024-9727,0,1,556daebbc786f740b4ebe41add4b75c3c0baf00c41df8dbfab7ad6269c83ae49,2024-12-19T17:46:11.723000 +CVE-2024-9728,0,1,5e3aa6c196f1132bed20ac9777867e99c318733580e5077dd0c9281844337ca5,2024-12-19T17:30:02.427000 +CVE-2024-9729,0,1,518817a687ec6d98e552c60ca5c73b5fb49208352a70edfca9a6f5547621cd55,2024-12-20T14:30:05.087000 CVE-2024-9730,0,0,ae3dd3edc48df72b14cd30298987941def303925a5e007ca3641e3d298b8f51c,2024-12-20T14:31:40.050000 CVE-2024-9731,0,0,57925ebb99a22bd50adf41d9c8d07d143b056e9e812faf3bbf5ab6546be978c2,2024-12-20T14:31:37.723000 CVE-2024-9732,0,0,5bf98cb3ea904d2c3b5e240793b3b31a9f3b57972e40b98ff055b5117d5229f6,2024-11-25T16:12:03.470000 @@ -276322,9 +276324,9 @@ CVE-2024-9836,0,0,00fe9619a572716e33d038c70d158c90aa86eec43cd0588694b10c90a08bd1 CVE-2024-9837,0,0,afe4e527f22e06da82758e417087daa648749cf526ed58128828756f86ec8839,2024-10-15T12:57:46.880000 CVE-2024-9839,0,0,57bea8403f5cc48dea698cfdd728b58122c5ab953b09fd7bbfa276adce1153b8,2024-11-18T17:11:17.393000 CVE-2024-9841,0,0,c53d88eafada925ed527f104c1b1b1199a9f5255a50ee9eb8941cdbc1ee0bb15,2024-11-13T19:34:26.237000 -CVE-2024-9842,0,0,401514bda8111953e3c87d696ebe17147d50fe0193b7bd342e8f5a2f91a2c84d,2024-11-13T17:01:58.603000 -CVE-2024-9843,0,0,87995b35b7ca864fee74129f3dfad5bf38de372e00678c6a2a361bfe2c95d461,2024-11-13T17:01:58.603000 -CVE-2024-9844,0,0,3331829180724f708b2872fb021a508ee337b76627df07c328f76f3097c94fe7,2024-12-10T19:15:31.607000 +CVE-2024-9842,0,1,2eb37f068f510e77ddda054028837be42ece382f6ac977fe1435ba9700cf6cf8,2024-11-13T17:01:58.603000 +CVE-2024-9843,0,1,4c5df5ab8a1a653d3d3f7a966dfa836458a19a3057e970d5ee673e47520e1ee4,2024-11-13T17:01:58.603000 +CVE-2024-9844,0,1,71cb12ea3ccb3f87dd14d56727a9ae46fdeaae7c835095e3a9fa7c60ffe7c777,2024-12-10T19:15:31.607000 CVE-2024-9845,0,0,dac1b56b146024cd48eb8cf06bd45e68c3a45cc41706a416eb443467ca7d4d17,2024-12-13T19:44:22.813000 CVE-2024-9846,0,0,5a29335b18c23f96eafa12a0012dbfa40c39c1cc47deb5473e372f76f16fe2df,2024-11-06T14:58:04.160000 CVE-2024-9848,0,0,148772454ae4a112a7436067b81ee2ac8c78d3a83ad8a189df162c230ac91d15,2024-10-22T16:42:25.867000 @@ -276341,8 +276343,8 @@ CVE-2024-9860,0,0,1ba47332044cf478e4ab9e34b5ce7d360a589302ba3fad0810d75ba6f89141 CVE-2024-9861,0,0,faddf74719c447c20a0d8f47cab0598f03aa97157ac3e59e845bf5889b3dd378,2024-10-18T12:53:04.627000 CVE-2024-9862,0,0,bb9e8d7fb677ef0a474328a2f764c958c85a9ca1eae60fe8909db13e19514fba,2024-10-18T12:53:04.627000 CVE-2024-9863,0,0,6177d3dfde419a662cdfdb3805c47c7ca2f42ac849e1efadbda4ea00b9e257dc,2024-10-18T12:53:04.627000 -CVE-2024-9864,0,0,91b424add4c1166e969e7c568213bc2a2eecb36ccc3fd94d4cd19416db53224e,2024-10-25T12:56:07.750000 -CVE-2024-9865,0,0,1f08204ef394a3f4d99f4fac7a349f3bce03b0e5d2fd9eadb664993235082c64,2024-10-25T12:56:07.750000 +CVE-2024-9864,0,1,347ce40f75b29cd46f4c69d7aa46c64fde93346cde720bcd19722e1df8b9075b,2024-10-25T12:56:07.750000 +CVE-2024-9865,0,1,54bc6e9da0a61296d6843976ff19baeb3d29b8d7a26697c79ff27a8ef1989e15,2024-10-25T12:56:07.750000 CVE-2024-9866,0,0,a0ba39e4ebba7a797233c2839de60b66f2e325e113630d15fc927dabf744cbf9,2024-12-06T09:15:08.877000 CVE-2024-9867,0,0,af8c04cf7fe39d8c9c939bd4960d3e5a1bae720dbdabcedf4d767e596e9cc6a2,2024-11-08T16:00:04.640000 CVE-2024-9868,0,0,8b03b248bb9c12232453fd15a6ded978c56b8620d35965eebe04c58e726ecdaf,2024-11-04T13:44:51.370000 @@ -276405,7 +276407,7 @@ CVE-2024-9935,0,0,f06fac9a1e0f69e587b5a1a528890bb76351fc4722f6bb5b275546660c6f29 CVE-2024-9936,0,0,3a7d76688b7c50cd250f22b37245f0e98b9549794343dc9e35b28b9318d7f337,2024-11-06T17:35:42.870000 CVE-2024-9937,0,0,0766c76afe10a009ad41ed699dbcb8d528e71a258224f4e49db1d6ce7899ad8d,2024-10-16T16:38:14.557000 CVE-2024-9938,0,0,f49b9eb7f381d715bc7c56ebe1a2562d847f1875ed746118dd755a2d400bc9b1,2024-11-18T17:11:17.393000 -CVE-2024-9939,0,0,5cabf671a15cbf04f8e6fd07007b2e97f8f2b2099a66fd0c33c7ca53149d1acc,2025-01-08T09:15:07.577000 +CVE-2024-9939,0,1,ae100bb10bed7e94a326a3cf960a1d2287143b121b921f66c116a08f26f30aeb,2025-01-08T09:15:07.577000 CVE-2024-9940,0,0,eab3591080b81d0c80e28e097c24c0cd1f2a37ead12008dfb478144cf0f2d518,2024-10-18T12:53:04.627000 CVE-2024-9941,0,0,f8c1a3ce8301c9f96e0ee1a5f0096fa5255bc477de166caa18bdb6a9866bfb15,2024-11-26T19:37:15.283000 CVE-2024-9942,0,0,c6315b95bdda9839ef612eba500df807a644d469ed95f37c88df9fcfa0cbb756,2024-11-26T19:33:35.843000 @@ -276473,36 +276475,36 @@ CVE-2025-0173,0,0,c1f252ca4cbbf65084a89ab024bca7f0b17a90985239dec13e360a268ca336 CVE-2025-0174,0,0,a58f6ba631c2a0feb58527b8303d7d4a31c3e3872c8ddd8918aacd475478a78f,2025-01-03T02:15:07.480000 CVE-2025-0175,0,0,d9a687479ae4dd84b5b46d302a16ec57021ad84e1ebe3621ace137eeaefcef9b,2025-01-03T02:15:07.680000 CVE-2025-0176,0,0,25b97cf7942e2d65b84cd3d69b2f6ce4b0c39c12b63a98b8f04cd8b606eafaef,2025-01-03T15:15:11.360000 -CVE-2025-0194,0,0,40ef7c79a60c06ceae761bdb13cd6a0f064d915b3409b67bcbee098c5513eee9,2025-01-09T07:15:27.667000 -CVE-2025-0195,0,0,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8d0,2025-01-03T18:15:17.317000 -CVE-2025-0196,0,0,fb71521e255dd853610214509345a55ba2b3e12d37e32c94fc1c20cb4b643ab6,2025-01-03T19:15:12.793000 -CVE-2025-0197,0,0,8050294c8ecdc49228ce7833915570638c5758146d0bd01628204a571b88b989,2025-01-03T20:15:28.873000 -CVE-2025-0198,0,0,968dd1b493127f8e631dd345bdaa3f8c9507ccd8a35d54e73951fabb2c2ecd77,2025-01-03T21:15:14.053000 -CVE-2025-0199,0,0,57de8d567970e2c3ac2428151686deec2058a3256dee56257a4a398a50eeca44,2025-01-03T23:15:08.707000 -CVE-2025-0200,0,0,df6c908f9ce2f2036ba44f46c15860518f47f28bba157c7b27291d6da0ab8d0d,2025-01-04T03:15:07.020000 -CVE-2025-0201,0,0,6cdbb4667402fc2bfb5cec935533ca27feaf75663d021f7b6d92241d93220bb6,2025-01-04T04:15:05.620000 -CVE-2025-0202,0,0,134321c7f40a118fdc086dc6dd45aa3f434bd152f41ac44b0e1b8cf73eaa9bdc,2025-01-04T05:15:07.660000 -CVE-2025-0203,0,0,0936b8fabe5939ab217834cf3af41d8e076c72b533695acdc6213f3dd9c3be39,2025-01-04T07:15:18.153000 -CVE-2025-0204,0,0,8d815f9dfba8c16d95951db6f88c1d79e7832a34dc8aeff650469bbc3a37f4d1,2025-01-04T08:15:06.923000 -CVE-2025-0205,0,0,aa5b68b00b98dba8a0d346b3f72ea3ad15db09dde4cd37bb1ce9c2f4b99ff43e,2025-01-04T09:15:06.280000 -CVE-2025-0206,0,0,2c51d520a4879eb37fad3da037af175b82b1f84ee273be776d242bffb65c08ab,2025-01-04T12:15:24.830000 +CVE-2025-0194,0,1,ea5b846283dddc32441a679fd768e96aa19b3c1d104aaa33d0e1c65fbeb54de6,2025-01-09T07:15:27.667000 +CVE-2025-0195,0,1,4a31363a70a4527ce2e7dcee4bd65277485625f8cdc86358a3b4c344e22b0b11,2025-01-03T18:15:17.317000 +CVE-2025-0196,0,1,458f6c452cca173c50823549ec3211c7f71e44d78eccfc5dd05b05e882d53952,2025-01-03T19:15:12.793000 +CVE-2025-0197,0,1,6c5400440b0f9e49929925893dc9ec65ab159412a9c28b32b37aab9499c0ea0e,2025-01-03T20:15:28.873000 +CVE-2025-0198,0,1,e0434b685f3c0b2d8b346f075c44115eb14400547bd444c7c7ce380d36c7f6be,2025-01-03T21:15:14.053000 +CVE-2025-0199,0,1,865eff50876368f6ac555513ef5b5fdc0dc9570302fec6e10d6fc34ec2c217da,2025-01-03T23:15:08.707000 +CVE-2025-0200,0,1,1c56f86e27712fa129121bf2c2fd0e92b6fdb9217c52909f73ec929344fbe1a0,2025-01-04T03:15:07.020000 +CVE-2025-0201,0,1,30d561bbfd9ec1b18fbccd47b917b093d8cbccc70befce1eb07ea9e1538c205f,2025-01-04T04:15:05.620000 +CVE-2025-0202,0,1,2d38d143f9be42430cd2fd5e2922164aeeef5ba0af14e2130b6e786ce514c967,2025-01-04T05:15:07.660000 +CVE-2025-0203,0,1,f4f16172cc907092be7bf8bd85b3cb11ecbb96f6a39eff1b8d36416624072d2e,2025-01-04T07:15:18.153000 +CVE-2025-0204,0,1,846f0ee815d008acd3fd5c74a82117af3a462c0c6ef86ae890ec1388afee5e98,2025-01-04T08:15:06.923000 +CVE-2025-0205,0,1,31eeffd6d61e77b4c0d2cbe6c9b332395394cebf914095982ea8aa78b86d03a1,2025-01-04T09:15:06.280000 +CVE-2025-0206,0,1,7060596fb0cabe4d4977ba5fac21ec1b8ffcf626d16b8cad6103edc7ad85c228,2025-01-04T12:15:24.830000 CVE-2025-0207,0,0,efb215193134d5c08e2d49348e35ad7019ed0b6e630925d219b699652b9455e4,2025-01-10T21:27:26.337000 CVE-2025-0208,0,0,5a82bd838f0fb22689ddb131fe9167ef55569a112269991392ae74673203ed76,2025-01-10T21:28:35.270000 CVE-2025-0210,0,0,3ba2859cb45e451a40b49d3263091b5cb6aeae0c2bc600704b5eb18b048c0e12,2025-01-10T21:20:42.080000 CVE-2025-0211,0,0,1231f308a8a19fe7e188df08eee04bfbb40d96d8d7aedf4b585262ba30a7b684,2025-01-10T19:02:43.487000 CVE-2025-0212,0,0,3c3c12990f6722e6931f7f3acacc45b6601ddb8dd97053741e30a3edcf9fbfdd,2025-01-10T18:57:05.470000 CVE-2025-0213,0,0,6bef0c75dc81eb31e07565360e28f49bf155cd51f023f2885184491d5da7e4da,2025-01-10T18:55:12.317000 -CVE-2025-0214,0,0,9254508d81ea0b82f0019bc7737a4434f0760310a24cc79081ad4facc4fcf53a,2025-01-04T17:15:07.507000 -CVE-2025-0218,0,0,b30dc9959db76bbe16cbb2687253a109c8d9824f5a519b4a12cebcd5992ce308,2025-01-07T20:15:30.710000 -CVE-2025-0219,0,0,74ca1a5c2e45573606f215442248239c1abebb58720b73e72827cf6185a790f0,2025-01-05T06:15:05.183000 -CVE-2025-0220,0,0,e2a1de80227234e2ee0ad6599c3e6137c8cd2931a8e4558632166ff8d1637d7a,2025-01-05T13:15:05.850000 -CVE-2025-0221,0,0,bf2d1013ca5e346bb2f023d267f8796cd36ff872dcfd00def4c61e9ac89e1567,2025-01-05T15:15:17.473000 -CVE-2025-0222,0,0,4e8177a1bf3924ae38b9bf36c130d285f0307c82660c8f16a402a069a674dfe8,2025-01-05T16:15:05.217000 -CVE-2025-0223,0,0,5aabb33eada9f9a0a35847a6c98c4e16a7624f0d5b76cfb6fd378f30f372ae99,2025-01-05T16:15:05.497000 -CVE-2025-0224,0,0,28e5c7c6ae9f92e276e429054d47bb104d4a84ab655c0a2b5b9cf770216c9a84,2025-01-05T17:15:06.027000 -CVE-2025-0225,0,0,05f3e95e5a5216de1729c29aa623cb834288b97c999cdcab41fa05b2facf403c,2025-01-05T17:15:06.620000 -CVE-2025-0226,0,0,c107f3a1190ffff7a5bb943eb632d954a11de62889d175189cba857eeb732cc9,2025-01-05T18:15:05.573000 -CVE-2025-0227,0,0,b7e75591f803956c9c2fede15969a7aa7d454dc47e8d770ec080124efffe3817,2025-01-05T18:15:06.570000 +CVE-2025-0214,0,1,ab9886cad04501c9f98045ea79a687bab3aa2f4e1c4678d885179cc363adf379,2025-01-04T17:15:07.507000 +CVE-2025-0218,0,1,a91b60f4ed4073b02889d97e309ff15efbe8b9733292847b26c61e47cf8d0fa8,2025-01-07T20:15:30.710000 +CVE-2025-0219,0,1,0df779b4bd6d58b0ff20ad0b955940092f8097e652494bd0aaf18d3ba83a47b6,2025-01-05T06:15:05.183000 +CVE-2025-0220,0,1,45395f7f817c1d128320fc6be537026eba23ce1096090b22dad6583d6c985ec0,2025-01-05T13:15:05.850000 +CVE-2025-0221,0,1,e357b1ab88efec7b52704640776688eff95bff4f33a5784e0c2522d62f4c04f6,2025-01-05T15:15:17.473000 +CVE-2025-0222,0,1,37aeadb5f3e7cf3f96daaaf4c9c79ac6bedbde2921b105178cfbdea615ec7365,2025-01-05T16:15:05.217000 +CVE-2025-0223,0,1,fa77f3f10594039dfcdc73e6676cd6a55a919d3f6ff18c758d51141999349e75,2025-01-05T16:15:05.497000 +CVE-2025-0224,0,1,34e927f26263eeac5f0865bb3f665bb84f78262646747e3c7bba3162445b1d7b,2025-01-05T17:15:06.027000 +CVE-2025-0225,0,1,a91ae1eadf32c482242f51bf8f72e22af3b1f7ce3c17b6a2772cbfd812c3104b,2025-01-05T17:15:06.620000 +CVE-2025-0226,0,1,5c7f1a56df5884eb2ed4a351cb56f6a5957723e6a8849f021ed968d386d02c75,2025-01-05T18:15:05.573000 +CVE-2025-0227,0,1,847107568540833be1e5672df6dd7f20806c2636011e125e8c958e2633648ded,2025-01-05T18:15:06.570000 CVE-2025-0228,0,0,66938b3785f0c012ecf8107395e1d55bdcd9127038aa51a5d2ea2baf0ff1d498,2025-01-10T19:39:09.157000 CVE-2025-0229,0,0,8fff1ef8a125b1f6a9ab4d5590356169efaba829dabd76ed28cada0d33392c6e,2025-01-10T19:45:51.937000 CVE-2025-0230,0,0,4a92fa8518fc0d278c8c3cbf586ef798acb5ea44aa1520ab4d8f925c339cf1bf,2025-01-10T19:48:14.037000 @@ -276516,273 +276518,273 @@ CVE-2025-0240,0,0,c69bbfd2c6326ce3090e62e372d341b68729615a4388aff2a4b92f2c232fb7 CVE-2025-0241,0,0,4c166f86574c263a185a4c3fecf418950105464db70810e33e44575c571c3963,2025-01-09T09:15:08.667000 CVE-2025-0242,0,0,6e3ffe62eab5a260ad145f0774aa93a7590007f7e30a1b6b7fd39c7d565b3e01,2025-01-09T09:15:08.763000 CVE-2025-0243,0,0,117a57037c84082e44064bbeb1055284d87eb96171b291191011e49dd59c7343,2025-01-09T09:15:08.917000 -CVE-2025-0244,0,0,4dc39d4eb7e9626e46633620b63b126f4ca8c432d219058ffa0df86e8e17d0ee,2025-01-08T16:15:37.520000 -CVE-2025-0245,0,0,17124b2bb78bf9f026108e77a44161cf6b567d6714acd6476cda81e3148b7689,2025-01-08T16:15:37.693000 -CVE-2025-0246,0,0,f212da1e386aff9790e671db2401da03b9d2ebbeea4ee1b40e830ef0d58e3da6,2025-01-08T16:15:37.880000 +CVE-2025-0244,0,1,a007094477ee1c52bbc6ad80ad1856461cbdef97dbf9502d29b149d107af9f25,2025-01-08T16:15:37.520000 +CVE-2025-0245,0,1,d3f443614cf269edf96a7044d50adaa402232a03e23aa318a1f5e6bf4990a77e,2025-01-08T16:15:37.693000 +CVE-2025-0246,0,1,c39f5bdf37092ddacf9510ed2d75cd9204291d6d9bc9dd6c5bd8168e56e08082,2025-01-08T16:15:37.880000 CVE-2025-0247,0,0,82371012e5f8f9289e480669213645478b1b9bb704a5d555c359c426b5b14584,2025-01-09T22:15:29.773000 -CVE-2025-0282,0,0,275d8649ff111189168bc0e99c287c287b1a13ad70dd78a8caedd1201704d2b8,2025-01-09T22:15:29.870000 -CVE-2025-0283,0,0,573fcb41d2dcbb5f422c0804f1f8b289f75a27c245f0e6d9cb198c03e2e8d415,2025-01-08T23:15:09.920000 -CVE-2025-0291,0,0,e64e166dc7ec231b6921ab6e7b688950a3c44d4ac259882cc427bcb73fed1fd1,2025-01-08T20:15:29.353000 -CVE-2025-0294,0,0,e5d86f9b17bdfc744e2441f17af376b91232f83a0091836e1403d549321b0bdf,2025-01-07T15:15:12.113000 -CVE-2025-0295,0,0,52a16028421d06d344a294c38baeb65e7eade91eddca5850ff08cb460a814ef0,2025-01-07T16:15:39.460000 -CVE-2025-0296,0,0,ef99994aa0e927283601f299ff2a2a7b6828140dc06395bd45961df4e93495db,2025-01-07T16:15:39.673000 -CVE-2025-0297,0,0,e6df0dbc25b69f65f6585e2723e6f83d60a4cc3da33516aa4da5024622d55482,2025-01-07T16:15:39.887000 -CVE-2025-0298,0,0,ec923ed4b9b6afa6228d656ddb0c601f5ebbf31d02abf4f38a99c8dda70d2f64,2025-01-07T17:15:31.770000 -CVE-2025-0299,0,0,46c993a70c9dd5843cd4dc3486123b8f79f076cb607c745df442454088b3fb74,2025-01-07T19:15:34.743000 -CVE-2025-0300,0,0,6462b093b202cdda5c643638789beb08104cb14d8ff95eb1f2f740fecb0f8630,2025-01-07T17:15:32.090000 -CVE-2025-0301,0,0,db7e09db06a3c89075ef99c6e0773ce8d9b6391802870d788b13b4dc1d994dbc,2025-01-07T18:15:21.460000 -CVE-2025-0306,0,0,b68f04c884b94c2988081809303425e8fc9d9a1826584b2811a6c0892a02e108,2025-01-09T04:15:13 -CVE-2025-0311,0,0,de58302344eaf2d5f19c5a918661bf308f3794fc22c5bdd8fec6bf58451dfe49,2025-01-10T07:15:08.507000 -CVE-2025-0328,0,0,511489195998b544d95e473f59edc225df3f03b898b8949ae54b7be85757b835,2025-01-09T17:15:17.330000 -CVE-2025-0331,0,0,5d1653aab10b087569df4f8a29838e92935196f68c8f8116069a88ef7b3aacf8,2025-01-09T17:15:17.933000 -CVE-2025-0333,0,0,2629a2f610016a17e720ebc1880354665b0ae5926a217965d584deca7c3f405b,2025-01-09T17:15:18.077000 -CVE-2025-0334,0,0,d7673bbf36f717e1769977669c1cac432662eda5ad40e6c872bcf27cf1dda6d8,2025-01-09T06:15:15.610000 -CVE-2025-0335,0,0,d042e6fe1c6117fe3f290f44401326a621378ac168f8b7424ff902d7e887bcca,2025-01-09T06:15:15.850000 -CVE-2025-0336,0,0,04ee389408992b67dce77194d9c70ae97feea3babbe755fc187c92619ca0ff05,2025-01-09T07:15:27.860000 -CVE-2025-0339,0,0,448e19bb7bc365a2bf292fe61f3c734706db43a29b1ebde295ceec420afcd48b,2025-01-09T07:15:28.080000 -CVE-2025-0340,0,0,4f2990fc81137574b4912409b11904dee7e92cbd62c572bffa83a92d2b3d6728,2025-01-09T07:15:28.260000 -CVE-2025-0341,0,0,90d8993fb7474a58be910ed5ed3a12242101d69a099db0025c917dff8fc0565c,2025-01-09T08:15:30.060000 -CVE-2025-0342,0,0,6d3bd167a05490c5aa5dbc9a6d3538c596245238d57a65fa83ecac443971921f,2025-01-09T08:15:30.310000 -CVE-2025-0344,0,0,1715f04fd5095fb83a5a82a19a8fdfb8ee1ceb83adeb19a18037c35e0449a30c,2025-01-09T08:15:30.517000 -CVE-2025-0345,0,0,3f56e569c8daf7b06b0796fdfa20438b20d7fd91be6d3db3cb0cfe5e1b99fe14,2025-01-09T09:15:09.220000 -CVE-2025-0346,0,0,5ef713c51f5d66e23ba323fef83a836926d709bf8afa5794ad9246d5b98392a7,2025-01-09T09:15:09.393000 -CVE-2025-0347,0,0,6deecfeab5129f64e2a00007dc87253c44d21860263f71f54e4dc7b1cdd350f5,2025-01-09T10:15:07.170000 -CVE-2025-0348,0,0,331eb1ff4b382b4fa4cded2d4eff33d4e1224a2775f1380fa27191f50e86e003,2025-01-09T10:15:07.700000 -CVE-2025-0349,0,0,113bd719c64af64e563d3b7f6bc64a9c5a1e1f5ad7d7591de270b2e445c8d15a,2025-01-09T11:15:16.547000 +CVE-2025-0282,0,1,b257edaf7878c5c3066db56516962c7a4e22d5d6c4609a29e27807982d1551bb,2025-01-09T22:15:29.870000 +CVE-2025-0283,0,1,41eead2e54b3ec4f1ddec08be91107dca4ef50133bb8268a853d4aa892b33066,2025-01-08T23:15:09.920000 +CVE-2025-0291,0,1,219214cc15cb7ccb0bfb9ba364ae86cf52fd72660e30b5a762d818e944330916,2025-01-08T20:15:29.353000 +CVE-2025-0294,0,1,a327d07d0a28c11bf97cdc46ddc7c8d3ac3d1d3c7d3fe2815fad3300c0ce8fb7,2025-01-07T15:15:12.113000 +CVE-2025-0295,0,1,25640ab148146166a9c7f75e5a876df7fd52a3e8e5f4f3a77946b47387498e81,2025-01-07T16:15:39.460000 +CVE-2025-0296,0,1,cf6cf9af3bdddec1cb51f3b84722c367e8e225cbb00cfe650154536fcf67a812,2025-01-07T16:15:39.673000 +CVE-2025-0297,0,1,0eacedc5d569a6e4cd93d6fc57977d9ca29c3a72fc215125fc7066f16dca1ff3,2025-01-07T16:15:39.887000 +CVE-2025-0298,0,1,38bd8b504935de17b14dec7825327a650ad8a3d464a7f511fccd61b0c6cb74ae,2025-01-07T17:15:31.770000 +CVE-2025-0299,0,1,3081f6deab5547666aabb0e346ae06d6f615099839721c542410106d67cb7c77,2025-01-07T19:15:34.743000 +CVE-2025-0300,0,1,8b048794f60fe275045fdbb30c1864513f09183fd67ca00f819acbe6a078dfaf,2025-01-07T17:15:32.090000 +CVE-2025-0301,0,1,cda9ba0b82510401c2a22912601ff18ed3f9b7d844758d6122fa1a90dc462c4a,2025-01-07T18:15:21.460000 +CVE-2025-0306,0,1,4d323f73db0781dad08a71cd877278ed734b33cabf11626e82510c57e39603e9,2025-01-09T04:15:13 +CVE-2025-0311,0,1,a210a1b443018bc2902a83fa552ae2674f2f7ae8aeff1050d6960ddff9aeb492,2025-01-10T07:15:08.507000 +CVE-2025-0328,0,1,983a37850e7593e52c7049d9c87a360510a226adf3c659d5ad2fe111082fc07f,2025-01-09T17:15:17.330000 +CVE-2025-0331,0,1,dbc642b98482c7a868d38d7a4b1240421a9e262e76044ff9bb695321876694a4,2025-01-09T17:15:17.933000 +CVE-2025-0333,0,1,3183afb9350c8085fce656cea7939729bf7b0c3b383c8f7105e9da54dedb25bd,2025-01-09T17:15:18.077000 +CVE-2025-0334,0,1,e3a8c3debfd678ee7c1344f925152dfd8cfa42591be5b844f5f2a9504bc9f616,2025-01-09T06:15:15.610000 +CVE-2025-0335,0,1,ba6bd83ac72a18cacfb4c8aed3dc5b6304b883b41ec133eb940fb09de3e363fd,2025-01-09T06:15:15.850000 +CVE-2025-0336,0,1,4043fb76d696744bf28ebcae268d568809361da636e9237c0e97b1fdbcecfb6a,2025-01-09T07:15:27.860000 +CVE-2025-0339,0,1,cbbfea6db0802da47d039e5c973152ba413cad2d917d267fa4913f6c5b7b2f83,2025-01-09T07:15:28.080000 +CVE-2025-0340,0,1,9f8d7dfd4d7674caee1cd6596de44a56e721410bd02446351bb9cfe3109bd378,2025-01-09T07:15:28.260000 +CVE-2025-0341,0,1,34691be6c91dee5a7eddd15393d10444959b571a53ae5dc2cf37690cab93d762,2025-01-09T08:15:30.060000 +CVE-2025-0342,0,1,c0ced5aaf34287279d842270e764809b2ee2324b19427e671c3863b96f97c211,2025-01-09T08:15:30.310000 +CVE-2025-0344,0,1,01437ae923f1cc2bbba7f217401e4d3cbf96038b1beb917f0e2b7fe28b7c2e1b,2025-01-09T08:15:30.517000 +CVE-2025-0345,0,1,c3d5fb4ce1a2ffd9e41165f9ffe772836159a0e2b94ea1d233a347865b0f3929,2025-01-09T09:15:09.220000 +CVE-2025-0346,0,1,3ca882ed5f0f6ff30f77b6214e7e7bdd383925e6a59aee9ebd80a0c7383e3bae,2025-01-09T09:15:09.393000 +CVE-2025-0347,0,1,ec55ad444ba1a81cdc39b917c4d69e23fb6f894614506108703cecaf8b681d74,2025-01-09T10:15:07.170000 +CVE-2025-0348,0,1,caf29c7d10aa1d0bc868897d1f5fe71d1c997b913af05adf015858af50a20840,2025-01-09T10:15:07.700000 +CVE-2025-0349,0,1,5c5bde0373ec0c26c713a0d565cd6e4461e0dfe3c3d54fa435cc26640f811d63,2025-01-09T11:15:16.547000 CVE-2025-0390,0,0,e8680a8850f5f93c327358a0bafb5800686853499fcfad6c845505a58dd62509,2025-01-11T08:15:26.527000 CVE-2025-0391,0,0,92a57f196719fdf887816695b3a83526079e0969236a36b3dfc45b775c9f93d0,2025-01-11T09:15:05.937000 CVE-2025-0392,0,0,aa9606366d99278451746d2e901d7f278b325bf8d4482ec56713b1565fb0cf2e,2025-01-11T11:15:06.657000 -CVE-2025-20033,0,0,6018e09e60bc36da724018ac20bc63bc1922bb37746fdb9e10624cea7c137ebf,2025-01-09T07:15:28.450000 -CVE-2025-20123,0,0,7f3b728d3f9cbfa875df0a45e50a08c953f805f15b1141475f4e31dfbed0e1d1,2025-01-08T16:15:38.150000 -CVE-2025-20126,0,0,1585188395ef0aa5a894bbea6d526bdf238d58865dbcb187ac89434fb8c590b9,2025-01-08T19:15:38.553000 -CVE-2025-20166,0,0,b11a57811b63f7d2208067ccc65af65bb9e1761d9a36811f745adce498b4e21f,2025-01-08T17:15:16.990000 -CVE-2025-20167,0,0,e3874d78f816684b3ad3095069171d70c3e3e27074d9afdb1ef0c3389781207f,2025-01-08T17:15:17.163000 -CVE-2025-20168,0,0,1b582f0e103ddf474141bdcff2b1873e77789f263e13a1a2b55771b742e937b2,2025-01-08T17:15:17.323000 -CVE-2025-21102,0,0,2ea9dc2a8684b7cddaddfe4341f8f27d4b76937cd9aabee635ab02b83d4b3e6e,2025-01-08T12:15:22.850000 -CVE-2025-21111,0,0,16b52f24c4b80d09f6e5e5284496a40288893ce98ea4f8b371a26cbe1749320e,2025-01-08T18:15:20.157000 -CVE-2025-21380,0,0,e75f36ff5e70ec6381b1e288ecdc47de7aff7bd9445423df9a96002866625ee7,2025-01-09T23:15:08.340000 -CVE-2025-21385,0,0,78395053cebdb64bf40dffe2df600c983679218663e30afbadc463d2726473bd,2025-01-09T22:15:29.980000 -CVE-2025-21592,0,0,420ea0357519c97bb443c83d434ce75fef006838355a5cfc7efd4bb0d1a7dc02,2025-01-09T17:15:18.203000 -CVE-2025-21593,0,0,4dbaba2a09f0994c55b5dc730e2f276bd7aac9a71124da84296dbc403f23c4f4,2025-01-09T17:15:18.380000 -CVE-2025-21596,0,0,9a75e60c3ead434f8b8a3542517340d5e3a9bd680918fd469939b623e972c30a,2025-01-09T17:15:18.593000 -CVE-2025-21598,0,0,959ac9ae8440b60e3c44d3f343772c309366b687590619f9880fa79998eece28,2025-01-09T19:15:20.123000 -CVE-2025-21599,0,0,dfe924a6beede2a0be26145087727f05b25454a9c78c252d17fd0faaf3a7f14f,2025-01-09T17:15:18.770000 -CVE-2025-21600,0,0,140812af79b18904ac79e570bbd2620febb11bd34d2f9630802e89bffc9ff590,2025-01-09T17:15:18.960000 -CVE-2025-21602,0,0,e4e54ceafea22832f83c53a482244e16581b39f02a4fa54b2d294a7f322a8ac7,2025-01-09T17:15:19.150000 -CVE-2025-21603,0,0,b5e381674b14c0da15b91edbb6dfa15bbf2e7ab847df89260480b3be932a728c,2025-01-08T15:15:21.320000 -CVE-2025-21604,0,0,ec728601eba6bd539d6daf316c2c18ea930a896bd5f0099ef67fb1e9d57f3d64,2025-01-06T16:15:30.927000 -CVE-2025-21609,0,0,46e3af17bfffe98fbaec33d01272d23877fbd06c6cc0e4a79625fd3beabb7e1e,2025-01-03T17:15:09.147000 -CVE-2025-21610,0,0,803b1c12bbaab2c87bcfc5865cced8b68fa26746eb8c056e6bba01e1200224ac,2025-01-03T17:15:09.290000 -CVE-2025-21611,0,0,36a80f20f0f6b558dd5c487662753e7b9a1e02a5a76de946accf07884efa5778,2025-01-06T16:15:31.413000 -CVE-2025-21612,0,0,9fd30e827023ec934479d337fa9a8b1d25e05479de4a6b330575dbf744f4ba66,2025-01-06T17:15:46.840000 -CVE-2025-21613,0,0,450c2846ee71577b9830e8e719c31e155c37244e65ba9e77e5a01008786d8ec2,2025-01-06T17:15:47.043000 -CVE-2025-21614,0,0,aabe0db280dc9dc10bd490c84810b1f616f5219669182912c62b49c623ecf63b,2025-01-06T17:15:47.310000 -CVE-2025-21615,0,0,fb1d1b59e0795bd682134b6fa4b1fdae854aaf92d872a6fbaa412cd39ddeff25,2025-01-06T17:15:47.510000 -CVE-2025-21616,0,0,574f280ca4e262b9cdf785b3704051d4db7363eefe89b70ebf0256101acb2498,2025-01-07T16:15:40.390000 -CVE-2025-21617,0,0,1b5674c17538c133c12a05d0a22a69c96dc39356013d3a7f6803ed67351947a8,2025-01-06T20:15:39.453000 -CVE-2025-21618,0,0,4c20ae4fc5c8b4aacd9f26687daa5f4af9af83a3837718673c9fc7ecd24be6c6,2025-01-06T17:15:47.660000 -CVE-2025-21620,0,0,66289b3b3f28df54a495a49470b309f007a7b7fd72e39a3c6fd58a9e688ab03c,2025-01-06T23:15:07.770000 -CVE-2025-21622,0,0,6c5785ebf77d1798b874aaffe451a58c4a37257af0382e9b593172ad9a04e2cc,2025-01-07T18:15:21.703000 -CVE-2025-21623,0,0,6087933d996aad8edaafac7f0dbca82dce0a66add1f565d4e48b576d3a77cbb8,2025-01-07T17:15:32.313000 -CVE-2025-21624,0,0,48317da35eed5453ecdf02e6a373b353bc1bb2bc0793e255b08a0ed1235e3ac9,2025-01-07T17:15:32.417000 -CVE-2025-21628,0,0,9b45b82bc1cf7798fc9034c809b7aea070f1557febc397cdd0479edbf659b70e,2025-01-09T18:15:30.070000 -CVE-2025-22130,0,0,1c04fe501f2c52c223532c188d73e6b294c7cd14c808267f30384be4f18c686f,2025-01-08T16:15:38.543000 -CVE-2025-22132,0,0,68d348d844ec3947f7795605dbc0f9b5ea1e9ec0bb464d07ae2fd1571ba27a37,2025-01-07T22:15:31.590000 -CVE-2025-22133,0,0,fbcb8ce624ceed57d4b59a3f2fe5dc11cb74a45b756ff7cc7f2369bba16ab526,2025-01-08T15:15:21.727000 -CVE-2025-22136,0,0,123a9917fd0885e775ecfe67805e47c52e223b69c26b7474799ef308240a577d,2025-01-08T16:15:38.770000 -CVE-2025-22137,0,0,b7624e8939f9495a9a9ad1232e6a1d9ca96cc90779cda5c7141fa5d1adf92295,2025-01-08T16:15:38.920000 -CVE-2025-22139,0,0,be959e3195c9ea3b69331abcd52f163ffe573225c18b8ab22128a548f8371fe1,2025-01-08T20:15:29.693000 -CVE-2025-22140,0,0,270f2879e8de65b243beb9d7f4b67eed45df0b791563d9a26d7b732c538b2740,2025-01-08T20:15:29.800000 -CVE-2025-22141,0,0,2044a7b2e6c78c72031cb6881e193da3e0a629d8a5ed02e93c39455436172a69,2025-01-08T20:15:29.897000 -CVE-2025-22143,0,0,379ec5cc1d9ddc4be571cdbe4ab10dde3e7605621fcd6681c8378b70a5e0e0ce,2025-01-08T20:15:30.003000 -CVE-2025-22145,0,0,a3e7e33eb43759950c0b6a9c304c03ed60cf76009fe03502e9b6e5d41248cec1,2025-01-08T21:15:13.480000 -CVE-2025-22149,0,0,285a83f8462ddbb51760ea9329a665e948c6fc32ae5305a1fdb62a7b29cc1268,2025-01-09T18:15:30.233000 -CVE-2025-22151,0,0,dec579b0934ef0dde3835c92d162b87ef5ec884c54087c34c713c42f457c974f,2025-01-09T19:15:20.410000 +CVE-2025-20033,0,1,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 +CVE-2025-20123,0,1,54512af23f890abd1fef44213c66523a0b62c1420699fcab5bda08e37f5f4455,2025-01-08T16:15:38.150000 +CVE-2025-20126,0,1,0fcc9383f8a59c5e0d551ae3c2ee7933f9c74701d79731c282030a0992412e7d,2025-01-08T19:15:38.553000 +CVE-2025-20166,0,1,188546bff78f1ed6c60c3dafa709981ac0aa7d116e226da5b14281c3f0f04183,2025-01-08T17:15:16.990000 +CVE-2025-20167,0,1,ea01454738582257d8f0561c538bde2bc3fca79642eac6232d7fa05917ea3b87,2025-01-08T17:15:17.163000 +CVE-2025-20168,0,1,f8a58ad4899086a228f10ada9d537b9205b9094ad2b0c298be3af0260ad230d2,2025-01-08T17:15:17.323000 +CVE-2025-21102,0,1,8153781fb244bf502850065fab180d787cadc10df5675c4bfb3f0250244d97ce,2025-01-08T12:15:22.850000 +CVE-2025-21111,0,1,ac99f23afec6fb5ea7aef333a4f2d14bc0359a06e3db388b0b698b212d2c1078,2025-01-08T18:15:20.157000 +CVE-2025-21380,0,1,4c50921192674428f12ee9508d0865ca454638893a117ed6c41e0d9bb5aca2bc,2025-01-09T23:15:08.340000 +CVE-2025-21385,0,1,116d61f5bfd24a155e4d33133e1d992c619fbf22c0ac93200278bd13c2b589bd,2025-01-09T22:15:29.980000 +CVE-2025-21592,0,1,c76e12f3b53731aaade2a77d1972500240d5eb74acd4fba716952d05d47905b1,2025-01-09T17:15:18.203000 +CVE-2025-21593,0,1,9b3446b9a612891bc98169a3bb8c97e2abea25024522a1368e878da109404cd9,2025-01-09T17:15:18.380000 +CVE-2025-21596,0,1,aa7c0fc4f0d758bf67e3e13a54dacfc1fc5b4b975f6328e6068299303dc7e966,2025-01-09T17:15:18.593000 +CVE-2025-21598,0,1,9fb2094f8a2031f7ed7d32c76791306da83c38ae082d9be985e264eed6f54a73,2025-01-09T19:15:20.123000 +CVE-2025-21599,0,1,0293dfa10687534db0b6808ece4e509d0ea336805aec2c2cd4d5c7bc2313cce0,2025-01-09T17:15:18.770000 +CVE-2025-21600,0,1,0511e8e443940a54ef072ec82b613cd606986ba56f640dd75add7234169397a8,2025-01-09T17:15:18.960000 +CVE-2025-21602,0,1,98fe9b608a65f60bdad3939961d20a9c1558362795b914622d82bfabf6cfafaa,2025-01-09T17:15:19.150000 +CVE-2025-21603,0,1,de5a98ab5a1846941043ac114cde34c932a06d56fde93bc5468f6ea62d88c11e,2025-01-08T15:15:21.320000 +CVE-2025-21604,0,1,0ed8064b9182950e530cb7b2f52528d7c551930e7450b1b19d40475d7a199d1b,2025-01-06T16:15:30.927000 +CVE-2025-21609,0,1,3c2fc9da6be905fe106ba75040e21828a0454c46abf195fca7a6951c7de8750f,2025-01-03T17:15:09.147000 +CVE-2025-21610,0,1,7316a86caea5346e233350f085898ca7619157368c1365d30f5c1d1d8901ed25,2025-01-03T17:15:09.290000 +CVE-2025-21611,0,1,8e422e5fc6d4af0b6b34d70cc0908397e091aab260ca691c03a0f88c30af7c40,2025-01-06T16:15:31.413000 +CVE-2025-21612,0,1,32d3520deef4dab1468ba55f9d465e754730961f3476d51b4f9c01f3150f6f19,2025-01-06T17:15:46.840000 +CVE-2025-21613,0,1,268c717ab5e40ecdfe30f46b71bb30330e1f81d1219b0100600ddb085f34cec1,2025-01-06T17:15:47.043000 +CVE-2025-21614,0,1,bd69d1aa27c40093cb6c7a4e9844446807d2952dcd725d866d0a3146685e7e09,2025-01-06T17:15:47.310000 +CVE-2025-21615,0,1,cfb97692b989fd81bccccbf2f2ca2fbd2b4edb015e27dbadb4aef0a4db09ebad,2025-01-06T17:15:47.510000 +CVE-2025-21616,0,1,e559ef4ac5df61efe4cf0701da0053dbddf1460e9e7d82184184acca52d86c59,2025-01-07T16:15:40.390000 +CVE-2025-21617,0,1,4387c19dfae56bdfebac2dfc6a4f84986fdcf0414afd2c60b41655ee571180c5,2025-01-06T20:15:39.453000 +CVE-2025-21618,0,1,4425792278b201104db9f7fa71a6c17d2d2e26fd03424c47aa403a753e20877f,2025-01-06T17:15:47.660000 +CVE-2025-21620,0,1,aefab78f4e8b7a931e7536d08b17991e6afef83a4bc3ab5d14fb2e61be0949bd,2025-01-06T23:15:07.770000 +CVE-2025-21622,0,1,f9b304c8cae09855d048ff95696b50613640a9fdc9c30a5aadd5c3b3ce64c9b7,2025-01-07T18:15:21.703000 +CVE-2025-21623,0,1,11a3a4b165ac7ea35d006622a2c31920fdd49ec8509c7c0bc152edfb3b703f1b,2025-01-07T17:15:32.313000 +CVE-2025-21624,0,1,67d81661ccc165bcb7a2d55cd4301b8865debac4b78d0af97080ff58ad5f038c,2025-01-07T17:15:32.417000 +CVE-2025-21628,0,1,0075ad45f4e081e6b1d4b87e45ccf38954b3b032c76d5db5fcb797ed5fc6213f,2025-01-09T18:15:30.070000 +CVE-2025-22130,0,1,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000 +CVE-2025-22132,0,1,92f694afc6ce174171da36824da367c743ab8d73a418a3347309264d0570fa9a,2025-01-07T22:15:31.590000 +CVE-2025-22133,0,1,32df1a7a06703aea1606771b300b1836f84903a2a4b183527a9471791c589465,2025-01-08T15:15:21.727000 +CVE-2025-22136,0,1,69d6193ee80a32ca1bd809520bb07993c3975c9a6b70c7fbd917092d41566a08,2025-01-08T16:15:38.770000 +CVE-2025-22137,0,1,500e180482a18b49718c6495441b08426af3ad9db841f00b13a599eecbf0088e,2025-01-08T16:15:38.920000 +CVE-2025-22139,0,1,62fc450acdd2ced803ece4801c69c5eb6552f5e1f8d20b6c12e23641dea96fdd,2025-01-08T20:15:29.693000 +CVE-2025-22140,0,1,be66f05081c14fb2e0816483c4f45d3f628fc010fe866ea9da650e7ac4d60a3d,2025-01-08T20:15:29.800000 +CVE-2025-22141,0,1,a527922fbc8add89576398e2e4e44f71f48d8da972b31e27b0c4985f7420a5dc,2025-01-08T20:15:29.897000 +CVE-2025-22143,0,1,535b34000993ab6e069ce70a88afd72eb8046a8f188d22ed6e3f4d9ac657466d,2025-01-08T20:15:30.003000 +CVE-2025-22145,0,1,88df2b27b4a7796924aa6277caf85bae572e95291858d2eee15b7f4eb271d86c,2025-01-08T21:15:13.480000 +CVE-2025-22149,0,1,a38f1d25924ff640550a2206f96377b56b7eb734e7bb1771523eee3ff2dd77f7,2025-01-09T18:15:30.233000 +CVE-2025-22151,0,1,21f9e4fddd90599ac45f0514a6d95c5510077d3d9b45eefd94598514744d82c1,2025-01-09T19:15:20.410000 CVE-2025-22152,0,0,f6e16a6363f55c864692fd37f669ef41501d91a264daf32f0f68d6d46b264ef9,2025-01-10T16:15:29.910000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 -CVE-2025-22215,0,0,67b181a6458a232e8ac5c80f2cba09df8333cbef01abc4197cfb8a002eebc845,2025-01-08T15:15:21.927000 -CVE-2025-22261,0,0,b64f32ab7c14edb8b70371073baa276f94f41977fffad6128d5b8c7f32ae4fb7,2025-01-07T11:15:13.290000 +CVE-2025-22215,0,1,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000 +CVE-2025-22261,0,1,33a310cbc7efb685d95693f6e008875a8290fc5f9c6bce0cde03f1c0742bf7b7,2025-01-07T11:15:13.290000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 -CVE-2025-22293,0,0,bd03641f797a3639dbea19e70261d5f3ef47716330e1253c8622562a786a5f2c,2025-01-07T11:15:13.473000 -CVE-2025-22294,0,0,a0564480f329fcd7c0e66762a6817c8b66e311ef88bcaa9ea4b0a25b2b9b8c80,2025-01-07T16:15:41.137000 -CVE-2025-22295,0,0,2f74c7006b214a8375d66474756104bda3998e6bd4d66e5157cf783534e4f73b,2025-01-09T16:16:25.140000 -CVE-2025-22296,0,0,759024dc281b7a918cf27de1ec3629f142320bc454cf6ef32a8190d71b2c339f,2025-01-07T17:15:32.520000 -CVE-2025-22297,0,0,9977305a0d6e75d824a101b4298426a66f5e4c76cfe0c4871bbf38350398707d,2025-01-07T11:15:13.630000 -CVE-2025-22298,0,0,8bc5151a6942224b93d58d09b54219f124b26cf650100c5c624298b6e94661bd,2025-01-07T11:15:13.783000 -CVE-2025-22299,0,0,c413e7372a98636798485d615adbccdf818206e57405b9ae93b2ac23848684e5,2025-01-07T11:15:13.943000 -CVE-2025-22300,0,0,2f4f93a07fc49820875d3175d80e5708296bdd9f14a938c96de7efad275710f9,2025-01-07T11:15:14.100000 -CVE-2025-22301,0,0,30bab3717a7a0bca741d690c1479e62f819cd2155656ec44d78c982d84d75ff6,2025-01-07T11:15:14.240000 -CVE-2025-22302,0,0,9b40c40d15063e6cb76e8e33a9f975cd91b38be16047944b37a967c977abfd7a,2025-01-07T11:15:14.387000 -CVE-2025-22303,0,0,7f3990123a03c4c027b93344f96b18488d25683c34566288a5ac2e49799c51c3,2025-01-07T11:15:14.563000 -CVE-2025-22304,0,0,dc86decb897d8dcb17d6736b8050d3d147c3f346bb65a4bf4381bfc3ce627059,2025-01-07T11:15:14.740000 -CVE-2025-22305,0,0,f80b09c32552f5e5a6f1c3abe88e565f14882f9a6fcd2231897d49d487ea9c83,2025-01-07T11:15:14.907000 -CVE-2025-22306,0,0,ae136ad221e1043a964eff9f5b0e44c3146bac4ea56d0d79bbdbf2a5266a8985,2025-01-07T17:15:32.663000 -CVE-2025-22307,0,0,af185d3d1a7ef0a56a3554c175b23ae02cba28f88cbc84f5d857038d6526f0e1,2025-01-09T16:16:25.347000 -CVE-2025-22308,0,0,3082a330a5c2f55a8195387df80671bf625d85613ddf1f7720a63d796beb37c1,2025-01-07T11:15:15.043000 -CVE-2025-22309,0,0,1d83d809e311c9f86146142b11ab3c2ee137d4e51c296bdf1e9908e49bfd5e64,2025-01-07T11:15:15.190000 -CVE-2025-22310,0,0,611b8cef352c958ab385e33339cb21ae50588ba907bd8686700e8a0f08828219,2025-01-07T11:15:15.320000 -CVE-2025-22312,0,0,864b53e49a0caf0c7477fbc1a622314be233df9866c8bc743a5d17b3ab7c6f47,2025-01-07T11:15:15.480000 -CVE-2025-22313,0,0,054311c3b83fe853773d650a6f19b786dd8082621b60fa7dab47a2a10a601037,2025-01-09T16:16:25.653000 -CVE-2025-22315,0,0,88d7cb14e835cbfb35184951d4d2a01276f091d2cdaf1e147fca6e420a388c7e,2025-01-07T11:15:15.627000 -CVE-2025-22316,0,0,1d4f03291501adc4e7db2e57a09c519ced1e62121cc59f1dd048002a13f21c3d,2025-01-07T11:15:15.763000 -CVE-2025-22319,0,0,8dd7b737df78f4bf7802f660e60b5c48ed6d3989c739f6f6a383e6a420d195cf,2025-01-07T17:15:32.810000 -CVE-2025-22320,0,0,39971b0eba2ae0a7960757327aa5a1f311a765451f9b5f47f1b68ee3273616b0,2025-01-07T11:15:15.910000 -CVE-2025-22321,0,0,4c47cbd5a81bbeb1a3ce3278f8eed6d123ea975216894c1911cb3a468c9f05d5,2025-01-07T11:15:16.073000 -CVE-2025-22323,0,0,cdedb294b6295dcc011f80ea22408485a3314d32d768478ea6a9ed25cd479083,2025-01-07T11:15:16.297000 -CVE-2025-22324,0,0,d3ca2c0e753301edd7488c1b4b5c806f3a8d662d685588b06f654cf6d7c2ae95,2025-01-07T11:15:16.437000 -CVE-2025-22325,0,0,a26ebf3d09a104491cb845816a20513441b646d7a59c3b551b7343f54bb7eaf6,2025-01-07T11:15:16.577000 -CVE-2025-22326,0,0,55fcc2ec90ca2a48f1ecf2e7ef15d685d0e234288e1450bdf5945ada1cab975d,2025-01-07T11:15:16.730000 -CVE-2025-22327,0,0,94ae0a0af4015641e039cb88bbf4a5342f924e137904074a584ea13bae54ad53,2025-01-07T11:15:16.870000 -CVE-2025-22328,0,0,85e6710d10db6ae0f5bd4808efdfb16540414aacd5b21f737702fea8c3f3f3b6,2025-01-07T11:15:17.020000 -CVE-2025-22330,0,0,e2716bb603e7891158b8b3424f2395c22c8aae15da9af7a8d6b40b95d3b60449,2025-01-09T16:16:25.840000 -CVE-2025-22331,0,0,dd73fba29d20341bc312a2fcd14ef26ae7bd43959dbfaff7f18211ecd5554732,2025-01-09T16:16:26.180000 -CVE-2025-22333,0,0,9076c8d41b6efd0e0fd9421ac7e36825af266ebb1d92a228e7e9cdde0a09d000,2025-01-07T11:15:17.160000 -CVE-2025-22334,0,0,8e60bcaee158fd51d60c9a3859250bdbfa79c9dcca3ca723d148b2a899a99369,2025-01-07T17:15:32.953000 -CVE-2025-22335,0,0,7b6c88c7f724973f8b5d10f9481d7ef4194a9913c64a19757342a49b449698c6,2025-01-07T16:15:42.703000 -CVE-2025-22336,0,0,d1d30c72fb6e01dc20afc043a552806c00e06e487af20ad9dfbaf9607a442c8a,2025-01-07T11:15:17.313000 -CVE-2025-22338,0,0,7386260298494eb42e950f1f880bf8ae70e10350f68ba2f5b8af057495330fac,2025-01-07T16:15:44.117000 -CVE-2025-22339,0,0,771cfd61a8b5d752aa38f63f03d13ecf4a4d9126ac8095ef4007c48756aefabd,2025-01-07T11:15:17.463000 -CVE-2025-22342,0,0,063a12927989c01da7ad06ed778a17254bdc2f246dbbcfb9d1a331dab7385b47,2025-01-07T11:15:17.610000 -CVE-2025-22343,0,0,a01cb6c83acf422bb85038c7e3d12905550105cbaa3bde139d47adcc60f7e94e,2025-01-07T11:15:17.743000 -CVE-2025-22345,0,0,731fa8014510c52b78674ab1d585a04dc5afe96c720e1a306885c7ebf0a29f5d,2025-01-09T16:16:26.620000 -CVE-2025-22347,0,0,b23f9601774be508b95375b043d031713941d78a35e42f0b11cd23293672f811,2025-01-07T11:15:17.897000 -CVE-2025-22348,0,0,86e2244a5ffc25b4844fe28b25003a18e5b493a92b7075a4184650958446241b,2025-01-07T11:15:18.037000 -CVE-2025-22349,0,0,1aac443b538c01953d14a1490dcb4b090d3357b772a15bb29d022c3f9880c993,2025-01-07T11:15:18.183000 -CVE-2025-22350,0,0,f6384c2bb654cfdc089567a22466aa0b901f518f50760ff7d208a39363f21e1e,2025-01-07T17:15:33.093000 -CVE-2025-22351,0,0,850cf70aa8b27015ce532cecc7f0819503b3dd39321b8093c7d78fe3fb290254,2025-01-07T11:15:18.330000 -CVE-2025-22352,0,0,77c72d08304a1f4a828a4db852ee618f0ac94237ad547f3fa3c67bb38390eea4,2025-01-07T11:15:18.527000 -CVE-2025-22353,0,0,bb13d32958cb020a5d38b41c167cac622c401d6dd92bed3b5262ff1ec4b962d5,2025-01-07T11:15:18.693000 -CVE-2025-22354,0,0,a287c4cbcd18ae3f4a8063018001df7da0a271ef5be0f4f8e2c4ffadb2c93302,2025-01-07T17:15:33.230000 -CVE-2025-22355,0,0,7fb49003033f48622ee177ed3064a841afeb8f3b7923595e3ceb552e3c7193b9,2025-01-07T11:15:18.857000 -CVE-2025-22357,0,0,147c0fa518b43fbbeedf81bdce042c347d77b134bf6606621324ad2a82888239,2025-01-07T11:15:19.013000 -CVE-2025-22358,0,0,dc1be20fb09e74a2611eb7051b2d21fd1f1d91ae5c82de9f69ea7f312ec9287e,2025-01-07T11:15:19.167000 -CVE-2025-22359,0,0,11db53ae6023dbca41854e1a04c18ab114bd8d0c5c79981bba4090ad1735197c,2025-01-07T11:15:19.310000 -CVE-2025-22361,0,0,b2614e4ce373aa49ac1d587cc870c34ef6218e82cf9b65329754cc851905a787,2025-01-09T16:16:26.830000 -CVE-2025-22362,0,0,f2c1c84b7d03553f8071ba09037dd1ff504eab870b6dc98d49037cbeeba451a7,2025-01-07T11:15:19.453000 -CVE-2025-22363,0,0,9f7b898386cda8ee09a75c7b5770220c6d443164e4a4258e07c36b540b5d907e,2025-01-07T17:15:33.377000 -CVE-2025-22364,0,0,30da29bd1c8315e53dffcf2832952f80fef5aba5790c2ba343b9edf8659a4437,2025-01-07T11:15:19.600000 -CVE-2025-22365,0,0,83a5bd41bc238768f90c95f610a8a0ddd456ed7dd042625fb9e911cf5f20b4a6,2025-01-07T17:15:33.510000 +CVE-2025-22293,0,1,0fb85e30408666f4049ff5e391f5eb0edea1a607b8157160cd5e0e00489520e9,2025-01-07T11:15:13.473000 +CVE-2025-22294,0,1,fd3c530f54ed4c49be0865300ce0d8ca3b1fb9d97860cd5c24499f717ff48c10,2025-01-07T16:15:41.137000 +CVE-2025-22295,0,1,136be5b556aad26e99b99b0d958bde14845140b7f49ffd508d9c54e6615a1e64,2025-01-09T16:16:25.140000 +CVE-2025-22296,0,1,6e8d434e211ad9095a97650afe58adae3f9ad4db6fda688bcad1051851597fa6,2025-01-07T17:15:32.520000 +CVE-2025-22297,0,1,75706f4c2a12fed7b64a4984688e679b3109659c8754f6fd94d354f2106b0945,2025-01-07T11:15:13.630000 +CVE-2025-22298,0,1,8fbdb6287edcd53604c499bcc2666cd8671bac202c2c8fddf3c1979bd6d97ac7,2025-01-07T11:15:13.783000 +CVE-2025-22299,0,1,ed33d62b63b5a356f166f35523d0ebe277c23faa915ebb718f8b60502c89f669,2025-01-07T11:15:13.943000 +CVE-2025-22300,0,1,6a57ecdebd594bb9874f9f496f8407fcda82bf456b3cb11e6f289d1ac16760d5,2025-01-07T11:15:14.100000 +CVE-2025-22301,0,1,9452e2fd362c8e4bbed16fcf54279b75ddb73d32e3b82e8cc696bcc8430a1c2d,2025-01-07T11:15:14.240000 +CVE-2025-22302,0,1,cf47def0c7f10315ec5ec5cbb6719f35e1dfefa1804c44e288952615d3be542e,2025-01-07T11:15:14.387000 +CVE-2025-22303,0,1,635bde87691e20104f249fc8b934c2561de54505d91580385d410260ea82c771,2025-01-07T11:15:14.563000 +CVE-2025-22304,0,1,252ddea83eb9d82d3fcb2390c7f74bcb279abc0916e5738ca38b41846df4bac0,2025-01-07T11:15:14.740000 +CVE-2025-22305,0,1,512dabb4c557aedf4f772bcd12a2f2fd705d834d5f4ebafe479fb8cd19af813e,2025-01-07T11:15:14.907000 +CVE-2025-22306,0,1,8af5a742da3016cfaa42fd709b08ea73e49a5e792a33f8c80862b6d3eaad9eed,2025-01-07T17:15:32.663000 +CVE-2025-22307,0,1,551dc24072f38079ff7384f32ecad5baae3d2cc5e837d9af57fca3b9f480fdc7,2025-01-09T16:16:25.347000 +CVE-2025-22308,0,1,9a6d70724a98274c9d996d44a4871290056075b233769a030b30dce33c596be8,2025-01-07T11:15:15.043000 +CVE-2025-22309,0,1,41a5649d9f063abc40e2323ec834921c50bb20c7c3f52cc1cbc06eac9caf5064,2025-01-07T11:15:15.190000 +CVE-2025-22310,0,1,01093bca114875827fdf0ce9f05a34c343d3d135e32d6b40cbb65ecb6d8c931c,2025-01-07T11:15:15.320000 +CVE-2025-22312,0,1,a7bf6287b60e0e496be523a78cca84a7ead7f5ce4262b249df941bdb26960569,2025-01-07T11:15:15.480000 +CVE-2025-22313,0,1,5a053d272a7f80827a28d46605edf286de3cc07b2584d481167046830126dd01,2025-01-09T16:16:25.653000 +CVE-2025-22315,0,1,a72855198b7b6c3f24eb2b601132daa754b13da0204b23fceae9c014a71d07ff,2025-01-07T11:15:15.627000 +CVE-2025-22316,0,1,0ceb4f4ab42a49cc2d5309a5f4d9e71fec0d3cc6da31bc7e448e3f3e1c046b45,2025-01-07T11:15:15.763000 +CVE-2025-22319,0,1,e55624a930eb59e1a8b1dc4193cc8bdb767b79f4292003f9b671325f24154163,2025-01-07T17:15:32.810000 +CVE-2025-22320,0,1,4a18a096a3e3278530b059a94ed0df6bda5c51f5655f0d9ec304e5a12141712d,2025-01-07T11:15:15.910000 +CVE-2025-22321,0,1,c3ec78a4d8f363a8d35d3ed77c77053a584db7552a50bacc2a189071deec2efa,2025-01-07T11:15:16.073000 +CVE-2025-22323,0,1,dd17003bb8a99baf8d21124b28c9848ef4bfbc6ba2dd60dd9c6ef0cb160adaa0,2025-01-07T11:15:16.297000 +CVE-2025-22324,0,1,94c175f2b1ba86cf0c93b127564efaedfd44eaca3605ff24fcb7ab34e8e5268b,2025-01-07T11:15:16.437000 +CVE-2025-22325,0,1,0d9564c3b7a61f07790f6bed4b2e22bb71ad52f4f54ab2a6e38cb0f92019a94b,2025-01-07T11:15:16.577000 +CVE-2025-22326,0,1,8fe400cf7a337c720766144ab43e8e8b9db3743928ed0cca703def2633d79203,2025-01-07T11:15:16.730000 +CVE-2025-22327,0,1,2a92c2fd61b4632ef043e3ea41a846a80060d23d8650e07cab689acf9112c669,2025-01-07T11:15:16.870000 +CVE-2025-22328,0,1,bae5ea02b892a469897a505361fc54dac1bb5e3519ad609d0ce29be3676adf98,2025-01-07T11:15:17.020000 +CVE-2025-22330,0,1,839502208eee95785526cf7c123f74018642e883627c07e6a080cad1506cc7ff,2025-01-09T16:16:25.840000 +CVE-2025-22331,0,1,a2f8402b66c9c90ee6c55cbe4004f833df5c3b164a1649adc2a5ef04d9b0d06a,2025-01-09T16:16:26.180000 +CVE-2025-22333,0,1,e1ce540f097535337d77ac62982e232ef112548ec7d9205fe7d663038857be1a,2025-01-07T11:15:17.160000 +CVE-2025-22334,0,1,11b4f4e8db4b7785b74aad91051c2e8051c499de944f60aa9b4469a20e495399,2025-01-07T17:15:32.953000 +CVE-2025-22335,0,1,4a08b412add701f059cd149e45f878ef3b0f40f24de1ec01f34841e4d73759dc,2025-01-07T16:15:42.703000 +CVE-2025-22336,0,1,e498264d94897dc70f78e05983d91aacc96a48160550b893d84ce97145124d6a,2025-01-07T11:15:17.313000 +CVE-2025-22338,0,1,7129ea122c6554e3c515c55738d8d6c2390b8b27bae9ff6ebda6d0b32cd44085,2025-01-07T16:15:44.117000 +CVE-2025-22339,0,1,e3b226b5bf5a3cbff8aebc6d88bcb4fc118cdad6ece13f47708a7ca8d8f13135,2025-01-07T11:15:17.463000 +CVE-2025-22342,0,1,541f867dbda194731b8a18481f8f88aab54d4c9b69e4847a11ff394e4e7ae36c,2025-01-07T11:15:17.610000 +CVE-2025-22343,0,1,5a249d51bc1bb83b765cbc47fc56c527973dc8aee76835d7267eeba7cb4b3587,2025-01-07T11:15:17.743000 +CVE-2025-22345,0,1,c22f4b13460e8eaf77c12538b40e80ba8816f0eae4ae0faed99079f0a8b51be2,2025-01-09T16:16:26.620000 +CVE-2025-22347,0,1,1525385e6ff22d70c5483300cc97b9f106ab87009c73182f80eb64f0dbf63c86,2025-01-07T11:15:17.897000 +CVE-2025-22348,0,1,6352d8359c3f1c39d040d019b0b75df005d1e0125a12d234bd54509ec1298e20,2025-01-07T11:15:18.037000 +CVE-2025-22349,0,1,a74f87e7a6e2527d02fc5508fe1814ec7b543150e27bf810ec0f86a600fef419,2025-01-07T11:15:18.183000 +CVE-2025-22350,0,1,b767ee4077a829cec6cd85c1454f70e0f740fa78322e0041985f6badf5f3b38b,2025-01-07T17:15:33.093000 +CVE-2025-22351,0,1,976c021a6aceef5b4016e16192b334a07f7833fdfd03cd3cd33ef18efe2b3b68,2025-01-07T11:15:18.330000 +CVE-2025-22352,0,1,05ab364f7e7a1c5c049208b0f9460479a7ff74cb37dbb98d3f27efafd51be981,2025-01-07T11:15:18.527000 +CVE-2025-22353,0,1,000f3439c34c0fd18a96f9bb39dd1b25c8059f2fcd0e1683a6551f664e444d87,2025-01-07T11:15:18.693000 +CVE-2025-22354,0,1,66e404e55340b213b0c2657d1f6b7ed8a803e8838cb6bbee91b29999b4687ec1,2025-01-07T17:15:33.230000 +CVE-2025-22355,0,1,ca39854898c1796213661f5ba88920b4dbe4062400b636abea87602baebf8bcc,2025-01-07T11:15:18.857000 +CVE-2025-22357,0,1,8145dc70a7e6819f28516928dba6a6374a9f2bfc6bb0f15e92ae4f33b07e879f,2025-01-07T11:15:19.013000 +CVE-2025-22358,0,1,58275121d439329ac6bcb88bfbc8948125788be2bee13fdbccdb8edd57659b00,2025-01-07T11:15:19.167000 +CVE-2025-22359,0,1,995a1cace9e7721854dee56d9daa4b4cd821bc63cb750269e526e424750b384b,2025-01-07T11:15:19.310000 +CVE-2025-22361,0,1,af12e2c6ebfec3624d0ee30cd638aa7b24fc59355579c0263e32fae5077df9f7,2025-01-09T16:16:26.830000 +CVE-2025-22362,0,1,9877c63a6160c0c338a7dcb00929c3a65bc9baa6fcce8ad8cada6e19670cf16a,2025-01-07T11:15:19.453000 +CVE-2025-22363,0,1,34e2db3f81fd7a3e94ee4111d69bd101fd65058f31cf66551a8678163c9bff7f,2025-01-07T17:15:33.377000 +CVE-2025-22364,0,1,02d6b470672aaccdb63d99c6862a47c68775bfe3d3e9c9816eef4305afe53ac6,2025-01-07T11:15:19.600000 +CVE-2025-22365,0,1,4c3451815a0a11b5acf2693a92329835d8e81c7866963277c1b209d8a8847915,2025-01-07T17:15:33.510000 CVE-2025-22376,0,0,cdc857ed6d3bfeb79052b484654e6a7702fc9aad117c301e948aba38eb27787d,2025-01-10T22:15:27.383000 -CVE-2025-22383,0,0,5d92cf5968d0b3cb8c32ffddbb5f9d0fa05899712bf08a80edc7535b9d1dfdd0,2025-01-06T15:15:16.103000 -CVE-2025-22384,0,0,c3eb3907c8203007a185e0b56ba50453f7625b9e4c3e243d711609914b16742e,2025-01-06T17:15:47.820000 -CVE-2025-22385,0,0,055bfc0e52a8dde2e5061dc2381685f52420f7c1e16deb69c2583706ea8c2ed0,2025-01-06T16:15:32.017000 -CVE-2025-22386,0,0,cbe66cd14564939b203fdaa4ca25a1cf5873df5d1e1522586eec7d727b2660ae,2025-01-06T16:15:32.707000 -CVE-2025-22387,0,0,9dd5c36f62757a631fb5a2b118d56ec31778a4d5c7b66059ba094bd093cfa9e2,2025-01-06T17:15:47.997000 -CVE-2025-22388,0,0,7b76724cf59a9c67f325da6bd673f3f15746ba083c4bc35be8117d11c0a0d8b4,2025-01-06T15:15:16.307000 -CVE-2025-22389,0,0,50d6eaab20c8259cde700c821ce2570def076c6cb2eb277d3379fa3f59f6550e,2025-01-04T03:15:07.580000 -CVE-2025-22390,0,0,36805a833480d9f50dee34ab32e5ed9b2707017fd5287eb5a8abd68b1059bfbf,2025-01-06T17:15:48.170000 -CVE-2025-22395,0,0,ac5db0ebc696fbb0c57e43b4ad48f0832ef7eb798546a738d8afe72cc61eda1e,2025-01-07T03:15:06.047000 -CVE-2025-22445,0,0,892a817c9171cfb6ff1f1eb222a873d1fada74594dfce5a6314b9a0b173fbc06,2025-01-09T07:15:28.617000 -CVE-2025-22449,0,0,94a3675582914b0870c0eee39028c6e7cffbb606301205022783a128835fd0ee,2025-01-09T07:15:28.777000 -CVE-2025-22500,0,0,8aa8d02f24b4f8f19adb445be3e34cd476c909361320155120249ca356361cc0,2025-01-07T17:15:33.657000 -CVE-2025-22502,0,0,e47e75d81258d25ae0eee9a569a8a8d8f361d17aa85c464ced2971eda4004a93,2025-01-07T16:15:45.717000 -CVE-2025-22503,0,0,402bf3ce290423b600660d8b85d86d2013a2c04e54ea441b78372503a408f2f7,2025-01-07T16:15:45.877000 -CVE-2025-22504,0,0,90b638e88168d2406c5368298dd08d8d50ce89f618ebca66a2c405c5ff8c1c12,2025-01-09T16:16:27.110000 -CVE-2025-22505,0,0,227562933da5f0af10b16ca5892eb48796c322953626efe8c759a27f14f2c2e3,2025-01-09T16:16:27.280000 -CVE-2025-22507,0,0,2cff9b71c5a8e1294ee0ea1c856dbc50719946a9ec91412f79300cad5de53356,2025-01-07T16:15:46.040000 -CVE-2025-22508,0,0,384c415000a41c423cd3fd31c0f5924e8012dec3715b3e9b5226289291503b63,2025-01-09T16:16:27.433000 -CVE-2025-22510,0,0,fe48b46471704afa68c8928af8fd51180257ff81d98404b8b9464bf5379c6bdb,2025-01-09T16:16:27.590000 -CVE-2025-22511,0,0,28a656f74d0a00f1dcd5f2d1fb8e8415e8bf825a558b6f9a2f3991d9b3896e4c,2025-01-07T16:15:46.180000 -CVE-2025-22512,0,0,d0e0480ae125953d948bdeebc4960963d65049146d2d6560308d96f549fba6a9,2025-01-07T16:15:46.320000 -CVE-2025-22515,0,0,dc88383ea73e68ad51939744f6cae290bf90cb256d13103188ae9c7665a86c51,2025-01-07T16:15:46.497000 -CVE-2025-22516,0,0,611fd84a0c349163e43f1ea89c3240b45cba2292ed25e25c8d08cb8836f2cf54,2025-01-07T16:15:46.653000 -CVE-2025-22517,0,0,9fc983ded78103459897537381d1a380b232ba76124ae4a3d3794ebc5a224301,2025-01-07T16:15:46.820000 -CVE-2025-22518,0,0,a864a2676a4bdff938f1d9f28be32f463fce1aeb40c710954302551237bb9be6,2025-01-07T16:15:46.990000 -CVE-2025-22519,0,0,b03dc852be0c8215b11d4c8de5b1d47c9bad810d10f80dfb0ef73517ae023738,2025-01-07T16:15:47.140000 -CVE-2025-22520,0,0,edfead18f9eeda03c8cc00cb5e0cacef67069ec050ab27b8d11f83a53b1efbea,2025-01-07T16:15:47.310000 -CVE-2025-22521,0,0,72b48c3d39c0bace8209eb6225c8d6cfd624ca6576ba275fea49e5af036f6cc7,2025-01-09T16:16:27.743000 -CVE-2025-22522,0,0,024f0bd031ecc70bb9629fcbe159baf4796426c2b85db8fc05b2bf93b91b9c2b,2025-01-07T16:15:47.513000 -CVE-2025-22524,0,0,84de273bb5783bbeb6318c5154a0cd9ff47d207b84705cc5b1c22760470cbf7f,2025-01-07T16:15:47.680000 -CVE-2025-22525,0,0,c96a8d63c38ef7bfc31d30f88b9939fae4e7eb77a1967169714468d86712f834,2025-01-07T16:15:47.830000 -CVE-2025-22527,0,0,cf2d94f1fd831b4d1a833ea665e3a5e35157418ace65ba74df743363291cf741,2025-01-09T16:16:27.890000 -CVE-2025-22528,0,0,3e1473c212cdf502c2941e4cf89839c1aa0ab52527e07c4b7914a485feb0efdf,2025-01-07T16:15:47.987000 -CVE-2025-22529,0,0,872768ac8fbd7b67a82b204961d3b56dea5a0864471f1d1cdb5936b86e5a73fd,2025-01-07T16:15:48.180000 -CVE-2025-22530,0,0,31f07343a8cb5d2166ec46b0ca399cb71cd94cb7ab1ef67d619b834824c1b425,2025-01-07T16:15:48.350000 -CVE-2025-22531,0,0,9c8dd36d7210e53ba214e8f3cc09f5da41541d942c153faebf89f5d129cdcd86,2025-01-07T16:15:48.520000 -CVE-2025-22532,0,0,b809c5252350cda430ceffeda6049dcb96cccaa25d66b8277bb5a0735d1322f9,2025-01-07T16:15:48.747000 -CVE-2025-22533,0,0,25b61589f30ce3deeecfd9c254fce95888fe59e98c0f7f43787108cd88655b60,2025-01-07T16:15:48.980000 -CVE-2025-22534,0,0,2b1b89b97d9c480a79a27ab2e9768d7914cb2fe9f00d99eb04c1e686e9999643,2025-01-07T16:15:49.130000 -CVE-2025-22535,0,0,290fd01b1e1298ac4f5ff4b1da39b2ea0c013cb19143ad29b15b7a5b0c7b1b90,2025-01-09T16:16:28.047000 -CVE-2025-22536,0,0,d7d3b86b0fd1337cd788f34b766b814fcb4ee3ac1850fff21c34eb096ed2c876,2025-01-07T16:15:49.293000 -CVE-2025-22537,0,0,d7f5f598196c1650aa70b0a9d4bf3644597491174c4570a951d3e433dcfafb57,2025-01-09T16:16:28.210000 -CVE-2025-22538,0,0,12a6fca46dfb6875c8a21107d2505a7d5354a155e2258b9de3a7a1adb40ca128,2025-01-07T16:15:49.460000 -CVE-2025-22539,0,0,2aabdd6de645db62e7fdf2ec26bb2dd4cb1f19629999a6a141c8b0b3ca8db5e0,2025-01-09T16:16:28.350000 -CVE-2025-22540,0,0,1c1247d27b9b515b2d53e1355dfa1d8cdea653cdb609a07577ffab189b7ae7de,2025-01-09T16:16:28.503000 -CVE-2025-22541,0,0,b6c1d2a08ee9cabe1f5ee57bf104d9edc96473b54fda84b7fdacf8ea8bb547e8,2025-01-07T16:15:49.670000 -CVE-2025-22542,0,0,6a62d53564cd40f1caf7a166c2b05e9c874da8af52cd421b03367bbe77dbc957,2025-01-09T16:16:28.670000 -CVE-2025-22543,0,0,bb92465369b746da5e3aad33249c8aa0381b90e534dfbb0263a00bbb5c76fd92,2025-01-07T16:15:49.830000 -CVE-2025-22544,0,0,b86adfc3c97a7b5d0d3070401eb2342efddf9d1d837dd854681a3c6a418665ab,2025-01-07T16:15:50.003000 -CVE-2025-22545,0,0,93ce509499b8aeceaabee7fe6f1d969e7f54041fc7dce1a116d7d372e009170a,2025-01-07T16:15:50.140000 -CVE-2025-22546,0,0,79cc26a75b344b9ec118869ae66493493c7eb2b57dcae63bb853bc19ab4946e2,2025-01-07T16:15:50.300000 -CVE-2025-22547,0,0,448662935ffb6e18a8e1163dd127035d11795af899fe916e5975ed1890e96a0c,2025-01-07T16:15:50.463000 -CVE-2025-22548,0,0,a2db0dc193c4bf9919788b967c39e79b3c40d299b83bf580eaf891c7ba01f8f7,2025-01-07T16:15:50.623000 -CVE-2025-22549,0,0,37651db6a80599d6a9d497dbafceef4e36e97fa49984798305794401d5aab828,2025-01-07T16:15:50.790000 -CVE-2025-22550,0,0,6f6d866b2625259c5090072b3a79f45d7499a06cc915b8ccdbfd564c98f9d1cf,2025-01-07T16:15:50.960000 -CVE-2025-22551,0,0,1c18b6a68d2faff9ea94214e5f20e5d2d17b48b1ae31ff8ccdbf60543e9bb4ce,2025-01-07T16:15:51.127000 -CVE-2025-22552,0,0,2dfde245749df3b6fbe40234d508891ad03a012dcf4f3026e6523a9622ec19ed,2025-01-07T16:15:51.277000 -CVE-2025-22554,0,0,169aa2b604547b25659f115978b58d0f1bd7f01eddb66dd86a7268532d44c0d9,2025-01-07T16:15:51.443000 -CVE-2025-22555,0,0,d1e6d57508dcad2a7bd8a9f8b3df05e46a8cd4445ec31cc6bf7d6924761d0bd1,2025-01-07T16:15:51.627000 -CVE-2025-22556,0,0,80282a8b7a3877b8271925b73b265c9263e83dc11ca55c1f26f5815967b33d22,2025-01-07T16:15:51.780000 -CVE-2025-22557,0,0,554688a370f3db327fa06284ca2f5bc0989345f9c179b0129147bfc3c998df56,2025-01-07T16:15:51.920000 -CVE-2025-22558,0,0,02538728dcbe28f9141d88cc5f37cf5e77cdba128b736b8999068fb514290b69,2025-01-07T16:15:52.080000 -CVE-2025-22559,0,0,f5edeba6ab7d923752b407ae8aab3700703d56d33a7f7999527accd4fd6d59de,2025-01-07T16:15:52.243000 -CVE-2025-22560,0,0,b722a48c52ac2270e574d7f5e02e3277d49a8fd1223636c766a0dea93a013371,2025-01-07T16:15:52.380000 -CVE-2025-22561,0,0,6df9a24ef0a95058a2f735724f029210a7a58ae54131e26756e9785914470ef9,2025-01-09T16:16:28.827000 -CVE-2025-22562,0,0,7160616e3f1e58346b09b1df777bd943bb4feb68c941a8f3be9d3e61e578fef3,2025-01-07T16:15:52.540000 -CVE-2025-22563,0,0,8f83fd6b5a5ec2381366f243f66907385b1669b6fef4670423d5257df7197ee1,2025-01-07T16:15:52.940000 -CVE-2025-22571,0,0,1b4f24da1a6f1bb7f346661376dfe49926d420862ecc376c082a8f78051bb43a,2025-01-07T16:15:53.187000 -CVE-2025-22572,0,0,32ab9eedcf4e42497aa29295e4986051818a49862bb5bf5d6d005d7558592521,2025-01-07T16:15:53.357000 -CVE-2025-22573,0,0,d2119173e267406cc8c9fcd20059a69bef2e08f7671866825bd18cb7cdb0d91d,2025-01-07T16:15:53.520000 -CVE-2025-22574,0,0,c37802a3f5d46dae3a4ce727391565c816599e4812b3e203a764a730d9724f8b,2025-01-07T16:15:53.667000 -CVE-2025-22577,0,0,832542f3ba4935e52a354806ac4c5d20d6ab091f340f611b5ababf5d00adcf75,2025-01-07T16:15:53.823000 -CVE-2025-22578,0,0,95fa1fcefb1a422e599db02a6781a35ca29ce1bc289d8fd08c5f19c13e53b5b4,2025-01-07T16:15:53.970000 -CVE-2025-22579,0,0,3cd63585cff10d775a15cd489268bb3f4f3859adb48a219faa18d77152c22936,2025-01-07T16:15:54.130000 -CVE-2025-22580,0,0,b35ffa4af0fb66dbc86a0bdb9fdf61c75ae3e7d1a1b77120fa8c043d429ae245,2025-01-07T16:15:54.303000 -CVE-2025-22581,0,0,53e1424ec6641d678bf117bb3c262da47ec66270c5ac57f65419efe21500073f,2025-01-07T16:15:54.467000 -CVE-2025-22582,0,0,0e04785e89c9d4acbccb3710e27d086b1e71be3155e4f5c0e225a467988b1226,2025-01-07T16:15:54.640000 -CVE-2025-22584,0,0,92ae95688057a343a3c112aba90a91e888f006a83dffd4231d4c896dd9b0eff6,2025-01-07T16:15:54.780000 -CVE-2025-22585,0,0,ef5b5a89cfb8baed252c15be492e73d626a65d7d4898a799d60ec5b5176f289f,2025-01-07T16:15:54.923000 -CVE-2025-22589,0,0,bb529e158c7e1933304f26efc5f066f63e5c287ae81ac09f059d86eaefe4703b,2025-01-07T16:15:55.053000 -CVE-2025-22590,0,0,b614c7d50ccfeb50c3e47048ce19c3611ad36ac118669e3c81ea441e322bcf11,2025-01-07T16:15:55.200000 -CVE-2025-22591,0,0,357b853ebe55eb932f399d326d5cfd3cf40fa62ab1a4f95d6fbcdc2774241b5d,2025-01-07T16:15:55.337000 -CVE-2025-22592,0,0,ff5fac2b9bc94ed835e8f9addacdb39fda9bbbe54c2e47c1826c43b63204eab4,2025-01-07T16:15:55.470000 -CVE-2025-22593,0,0,2e2b9b257210673d1959179ba19f9ddffb24fc86c8f15dcc25f3759c772c6b90,2025-01-07T16:15:55.627000 -CVE-2025-22594,0,0,b59b67bd9bb85bd779f5fd0d6e12fc0eac702434b104751a044120db7329e348,2025-01-09T16:16:28.983000 -CVE-2025-22595,0,0,e3d65ba51248112d76081ce49c46e19c6f28b60b2f8104b6f8dd7cc03abb167b,2025-01-09T16:16:29.160000 +CVE-2025-22383,0,1,971c2012aab2f3f792cbdd2c68df4004dd1217088db2d92a7bb003d39ddd9443,2025-01-06T15:15:16.103000 +CVE-2025-22384,0,1,cce93b0fc1a45d09b2ac82e610ea925820e4793a4749701feb605ea07db42a77,2025-01-06T17:15:47.820000 +CVE-2025-22385,0,1,3b01828f8fcbdc95a43dc5d191f51b794786858443d7165673fecfe4f1c2a553,2025-01-06T16:15:32.017000 +CVE-2025-22386,0,1,bb528e31b1bdb9bbbff414b3528bcdf6ac468fced2f39ef70d45c390789b1368,2025-01-06T16:15:32.707000 +CVE-2025-22387,0,1,dd138547075d8154ac170b8fa1fe2fff6d798eaa102e4686c32ded5b7657a5a3,2025-01-06T17:15:47.997000 +CVE-2025-22388,0,1,861b73b67db062deb352be180b2d48906ffed263b47a8a982206529cfeb63b66,2025-01-06T15:15:16.307000 +CVE-2025-22389,0,1,64b4c3bed98d63311740979c9a99a1902edafd1044e1f65b92e496841e753fba,2025-01-04T03:15:07.580000 +CVE-2025-22390,0,1,7d4cd529983da112f2a19a24b746418738cb2927e6e8de52b7de278b35e6ad14,2025-01-06T17:15:48.170000 +CVE-2025-22395,0,1,ce7db6acd5106ea1fc693f8e6a4248b50542a5f440a82a6c625194d64974a971,2025-01-07T03:15:06.047000 +CVE-2025-22445,0,1,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000 +CVE-2025-22449,0,1,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000 +CVE-2025-22500,0,1,c8f154061d3da5b6a8edbf6756b48a42d68c23a6466a5b364e986467d39302c7,2025-01-07T17:15:33.657000 +CVE-2025-22502,0,1,3183867d6d0bb4304290089bf31cd36b52e2a0152aa74b8aad25d0ed6a2a48d9,2025-01-07T16:15:45.717000 +CVE-2025-22503,0,1,2312eda7beecfe6ecfb9249f8a971c65cfe30e58668d20a90b2c6b9852f7f977,2025-01-07T16:15:45.877000 +CVE-2025-22504,0,1,a9139c7e10a4bdae0f6c289db8b58ce819e8b48dfb9a72eac5250d51a0c5e3e4,2025-01-09T16:16:27.110000 +CVE-2025-22505,0,1,c16051b04eb145418bded72ca77be037cf9fee37f07ce6a67c59037e48b9c11b,2025-01-09T16:16:27.280000 +CVE-2025-22507,0,1,c94c1401c11ff9cd6e4f5b9836ac27c2be70ec71a54af6e374399078e6643932,2025-01-07T16:15:46.040000 +CVE-2025-22508,0,1,5d8664a0aa0edd6273a6b83a3d209997381a4764cb066100315f48a722d20397,2025-01-09T16:16:27.433000 +CVE-2025-22510,0,1,8cd09caaa1386b81418691abc835ea46a509fc6ea5bfc34f8e8072eb06430e1c,2025-01-09T16:16:27.590000 +CVE-2025-22511,0,1,e63694e2e15e227a326b6b7e4e9fd05c2b9f3ab5d4ee2553e80b77cf618afe5b,2025-01-07T16:15:46.180000 +CVE-2025-22512,0,1,4cedaa7556b030850a6c6378befcffe73cef9d1cc7a9b8b6aba772cc15bae404,2025-01-07T16:15:46.320000 +CVE-2025-22515,0,1,51b7aadc030c956d2c5358cbbea157a89fe0c8781c0772024e256d945eaf061c,2025-01-07T16:15:46.497000 +CVE-2025-22516,0,1,1e00a835018f3d8a5a2146e73ca06f663e6b5f20899e52befe5b59b682de3f14,2025-01-07T16:15:46.653000 +CVE-2025-22517,0,1,ee21d3d31a992a68c979e6accd10715a11d5e1ec6f6b3eed9bfa95834b0fad80,2025-01-07T16:15:46.820000 +CVE-2025-22518,0,1,535bc53910b4248a1835af44484cc739f218823417d517b592446b7a4732b124,2025-01-07T16:15:46.990000 +CVE-2025-22519,0,1,9eba78dca6b6275629a253d65542149e1a61504a2abb269961c4820ebeee5845,2025-01-07T16:15:47.140000 +CVE-2025-22520,0,1,d90fcded13c83210ff25a704cf2d7700ad6fc2bbd95729d89ec73c52d86588de,2025-01-07T16:15:47.310000 +CVE-2025-22521,0,1,e62fb335e410addf0641d689eefeeec9d9054d8a13b83f38fee365914160d44b,2025-01-09T16:16:27.743000 +CVE-2025-22522,0,1,1ebc82346c4e34dee12844f6aa464ab0e7c0d220eb4925eee3392344e450fdee,2025-01-07T16:15:47.513000 +CVE-2025-22524,0,1,8a23e2aa149aafa1995794612c63a3f12fada023081e14e67818a48edc5f07e4,2025-01-07T16:15:47.680000 +CVE-2025-22525,0,1,2450e2a7890b860ebbedbee23a3778e19f1af2d502cf8e6fca48c14a5e43a264,2025-01-07T16:15:47.830000 +CVE-2025-22527,0,1,dddb72d486920faec7518243d87904d14ce0784eb212bedd940fa2ffaca5856a,2025-01-09T16:16:27.890000 +CVE-2025-22528,0,1,587c2eb86a91198b816a3b392027083dc7733d721ed5f73afa2d78180d1fdaca,2025-01-07T16:15:47.987000 +CVE-2025-22529,0,1,f078564d1a2cecc5128f9b5ad9b171bcf776a688face6093deb4549ab61309fe,2025-01-07T16:15:48.180000 +CVE-2025-22530,0,1,b0c7f918db3196e2d7cff8d22791512c6d1a90efd0027f91a75f4129730aeb45,2025-01-07T16:15:48.350000 +CVE-2025-22531,0,1,acff81fec8faa913043078875f12f2274a04e7ce3aa58054315baa6487ee626a,2025-01-07T16:15:48.520000 +CVE-2025-22532,0,1,3a5d050ac816f53fab7959fc96e310e4f221c85104b4b73ec8f4c56672aecd81,2025-01-07T16:15:48.747000 +CVE-2025-22533,0,1,c419f2250e9da67629eed997ee8fab4e45fb888d2b080bbf3352a494c2d27aa3,2025-01-07T16:15:48.980000 +CVE-2025-22534,0,1,dd194eaffddcea05006fbf215c80f78c0da1c9c199648501c2acba0bda7b53e6,2025-01-07T16:15:49.130000 +CVE-2025-22535,0,1,3072046e7f1ee2c4a7d1000f63ddd400d9f57886221a12219f2d0476f1355377,2025-01-09T16:16:28.047000 +CVE-2025-22536,0,1,612414fd2ae44bf428e4a4427334c6bdf549dded38ebe6a0393723a27da28bd2,2025-01-07T16:15:49.293000 +CVE-2025-22537,0,1,6b7156b112f73f3a7c4fb2b5c419f12d3bb4d9cdb28589433ca844fd43d42332,2025-01-09T16:16:28.210000 +CVE-2025-22538,0,1,e23996a0de4bee61d7b9d26fb9c92b9238ea6103d78658f6843e51594873398f,2025-01-07T16:15:49.460000 +CVE-2025-22539,0,1,df8e472dc5685582a255ee74b11e95a25eb848e3c6acd09e0c458dd2492fdb63,2025-01-09T16:16:28.350000 +CVE-2025-22540,0,1,caf7762a6d7b29bdfa4150ba8f2a0a8ad866e69b2a470037bcab5c909a83adb6,2025-01-09T16:16:28.503000 +CVE-2025-22541,0,1,1f034aaf8315e01b6844dc93c84d6eecc92be16ee1bc2a53601a44acede2f7a0,2025-01-07T16:15:49.670000 +CVE-2025-22542,0,1,17a086e75d33c4a4efe1ccc96220ae08cbfda6d9f09241d5a5ce19d8954565ac,2025-01-09T16:16:28.670000 +CVE-2025-22543,0,1,a95b90ea5994dcf82fa3a826b8b103089d16a9e7c5ec798e436173791ed86467,2025-01-07T16:15:49.830000 +CVE-2025-22544,0,1,33d3ef7530048777b8ef349fb709aa34fafc7ba03f753395d15bab9e5eb5e690,2025-01-07T16:15:50.003000 +CVE-2025-22545,0,1,e947fcbe23e89a6b1495922e50c6d8c6a00d9a731ac622dfbdd42e840aa31d19,2025-01-07T16:15:50.140000 +CVE-2025-22546,0,1,37e2dd569a48b2733ef0eef3ac2b776f412dd7bdd7c8efec214691c4cec25d73,2025-01-07T16:15:50.300000 +CVE-2025-22547,0,1,d02c1c1aac8927cfd5958e1bd28d0e9aee4e985f071d7e81e9fad8b1d50e5be4,2025-01-07T16:15:50.463000 +CVE-2025-22548,0,1,136c2bc6077c855a633e629d5fb64ca4fc955e05f5a461d30662f915868e7d2f,2025-01-07T16:15:50.623000 +CVE-2025-22549,0,1,2243b6eb8b296a608ea92af5e6385fdfc51b0684defe423e7779f8841f4c735f,2025-01-07T16:15:50.790000 +CVE-2025-22550,0,1,c9d757299ac608d3147eef8746a3a208a3edcf2333ca75bfc67dae5f69ae7a41,2025-01-07T16:15:50.960000 +CVE-2025-22551,0,1,90112bb3c1110b8bbd32a85a1d9436643d5a83f07e10c0edcdb8cef72cc525d6,2025-01-07T16:15:51.127000 +CVE-2025-22552,0,1,7e6657b0ee10386c62eaca5d65f3efd565d121c7415d032cef63bab59b1fea4a,2025-01-07T16:15:51.277000 +CVE-2025-22554,0,1,bc14b75df4f6685e0e581ea026025de4daa6d4152c025c7d9f4666d66a4ca83a,2025-01-07T16:15:51.443000 +CVE-2025-22555,0,1,ab5a543fc1826d9589dcc803970816b6726fc2ce1611621c5784a44278aa42b5,2025-01-07T16:15:51.627000 +CVE-2025-22556,0,1,f3cc43d325236fd9c575f3da67d40762351c570124715d10a2e765d3fbe70747,2025-01-07T16:15:51.780000 +CVE-2025-22557,0,1,9c5b4d745c324d53c32f68a6725ce9841b21bb431f93433d8c4d539a84c3866b,2025-01-07T16:15:51.920000 +CVE-2025-22558,0,1,4cc420b1e255aced072610c0457e6900a6096a2600436efec9aedc12b8e8dea5,2025-01-07T16:15:52.080000 +CVE-2025-22559,0,1,d24c6c669460a4d864d34f776b50345e8e6a70daa5d92cb69b105eaadd7ee947,2025-01-07T16:15:52.243000 +CVE-2025-22560,0,1,9ca1212fb17f4181c18e39c7de050eeeb10043eec792b100a6ff2194db9fd722,2025-01-07T16:15:52.380000 +CVE-2025-22561,0,1,623f2eb2c761c9d3d25a004f777db613fa6e7b7a5c670c04365fe632627b5a6b,2025-01-09T16:16:28.827000 +CVE-2025-22562,0,1,5434b49fc7631b7fa2baab733e275c32c8bcafb45eb3bbd6810cf2008467fe71,2025-01-07T16:15:52.540000 +CVE-2025-22563,0,1,08641cc3ce798be612ccd7e4c4a75bb78413c6f046999167e72153c276a54042,2025-01-07T16:15:52.940000 +CVE-2025-22571,0,1,589592d19e0408795b9c88db00be613623e0a28c0ced64bee3ab080db5508985,2025-01-07T16:15:53.187000 +CVE-2025-22572,0,1,09d362e6905110bf03efd8d9b3422685fc5a6f559575660b2f11c273a0d7b10c,2025-01-07T16:15:53.357000 +CVE-2025-22573,0,1,cef0a0fee2a846fdd99777eab6d59d8922d33c31d91c1289eff639dfb1ced15d,2025-01-07T16:15:53.520000 +CVE-2025-22574,0,1,84e101e6655207515e3d308aae10328b324f66020c49c27e6a9a740f08e66749,2025-01-07T16:15:53.667000 +CVE-2025-22577,0,1,de49ca44634bd4c2dcd4ed4b2c861f3aeca16b15d3e20dc646883514b316145b,2025-01-07T16:15:53.823000 +CVE-2025-22578,0,1,a663c0074d74b9b4b7e504663f4236ea23bd746235c7a6cf544a9a518e4833f7,2025-01-07T16:15:53.970000 +CVE-2025-22579,0,1,dec211853384da65ca43ab843ad0ef7d38624586cc8219bff72d8bb4860195e9,2025-01-07T16:15:54.130000 +CVE-2025-22580,0,1,987481d428d626ab3a636b089b28e62611932bb1aa3674325a18a905b6d8d87d,2025-01-07T16:15:54.303000 +CVE-2025-22581,0,1,f24e3c65602b83836f496886c24039cf1c8846e00c33a0a0c021007f597e352b,2025-01-07T16:15:54.467000 +CVE-2025-22582,0,1,bbd386f1b2f8f011e4028e09374da7622be33dbcfbf78736ef844c0c8abee84b,2025-01-07T16:15:54.640000 +CVE-2025-22584,0,1,a02a61639277ff8bb6fdc8638a3a4457abddc62f680cc0b700d343359b21a5fe,2025-01-07T16:15:54.780000 +CVE-2025-22585,0,1,5295ca8b2b9600231062f3ce2c1c9e8b8fd93e2117553abf02fe27edb5153724,2025-01-07T16:15:54.923000 +CVE-2025-22589,0,1,04766fb247e57bcb66805699f5e7d85615d427973633880479f532a655c1369c,2025-01-07T16:15:55.053000 +CVE-2025-22590,0,1,c88e366f105099929b737c28e4e59657f86cfa9e8944fe204794560a0673da79,2025-01-07T16:15:55.200000 +CVE-2025-22591,0,1,9dc7be8606e10b7ca53ae284810d2833be8121f6bd7b217f458b2b42cfb403cb,2025-01-07T16:15:55.337000 +CVE-2025-22592,0,1,f03fcd01ef66d026e28f7de006f4752785662917cd91a853528350917c3e1917,2025-01-07T16:15:55.470000 +CVE-2025-22593,0,1,093cea1b6014e90377f5953318ea38067198a698c0fcd047cf0a30d851148629,2025-01-07T16:15:55.627000 +CVE-2025-22594,0,1,968550ed21e0d31a7010b3baeb6cd6c73db41f48ed3b2ec7133582c21723b513,2025-01-09T16:16:28.983000 +CVE-2025-22595,0,1,fa050670aab4f0b0b2f6967b3375eb65e696e921ddb4c965d5d1191910703267,2025-01-09T16:16:29.160000 CVE-2025-22596,0,0,a8207a0d155e70e84968981216ad5f3fc3a5b2db35fde4948f967fd396f31360,2025-01-10T16:15:30.143000 CVE-2025-22597,0,0,3722ca65d443dd89a5e8cc889025c17e79ade436f09d91535a0218ae72d1a4e6,2025-01-10T16:15:30.343000 CVE-2025-22598,0,0,e497fe58ac8675da7246094a2662199588779aa650b9c02699534f158225aba0,2025-01-10T16:15:30.540000 CVE-2025-22599,0,0,645942d1c7d2f7dd12d8618f2017edf7382a16a018a352b649288462de683267,2025-01-10T16:15:30.737000 CVE-2025-22600,0,0,5bcf7e241f56265340265c8ceca3bc4c44ef112e4d972ba43c49267d66196668,2025-01-10T16:15:30.940000 -CVE-2025-22621,0,0,f36d0f70806d0c581838cce0fde67d4e521043699061f9e9337c84ae8de6806b,2025-01-07T17:15:35.710000 -CVE-2025-22801,0,0,27b9082ce5d8d4b87ba9b6f23e4e15af84ad2fa4155031ac0ca54e2184d53397,2025-01-09T16:16:29.323000 -CVE-2025-22802,0,0,214d68f351c2898ee2bd148b6eb25ed42195f00e8f204a7b64b1138105ff4132,2025-01-09T16:16:29.470000 -CVE-2025-22803,0,0,441c68f86f6fa67b401f6e5b4a6b1fc9c6900e7fc148128496f3df444b8a01ab,2025-01-09T16:16:29.627000 -CVE-2025-22804,0,0,e71dad2db43c5cbabad0e3beb621e2a007cef31a57cf38ade257fdec89cc161e,2025-01-09T16:16:29.787000 -CVE-2025-22805,0,0,b229f315830b7eaaa841df6ea12b762bfb90afa95cd07e76a4234f59b62562f7,2025-01-09T16:16:29.937000 -CVE-2025-22806,0,0,38d0810175d0d3a7697aade79ef968cdd84fa6558ae654623cb0be83293008d4,2025-01-09T16:16:30.090000 -CVE-2025-22807,0,0,f5c909ddf421ba1b00357b8fc2f752e7ffc3d182794e3a42e7cea43a28dea6d2,2025-01-09T16:16:30.253000 -CVE-2025-22808,0,0,09d71f30a75447a140b0ef80ab74881642fd55f3529374fa370589815754fa9b,2025-01-09T16:16:30.403000 -CVE-2025-22809,0,0,b745aba3f13734d2a8b33b946407c4fb3f4f2c19479935186d7d77532678244a,2025-01-09T16:16:30.557000 -CVE-2025-22810,0,0,052dd8d5e210c128d77b578d21d2084a686d1948a8bf9f2ae2fb9b81177017ef,2025-01-09T16:16:30.713000 -CVE-2025-22811,0,0,b7a6bc514e71becb59b09ecdf27d686eb8febbe0b9ed30d3c4af0e19d02011ec,2025-01-09T16:16:30.880000 -CVE-2025-22812,0,0,737799c11ccfb0e23a9093e1a0d6af05e076a826f1b6bbcb8cde5abc12d8abeb,2025-01-09T16:16:31.047000 -CVE-2025-22813,0,0,69028fd8717a607fdf21189ee2d904c1c751f5821f9fb96455ba4455daf153cb,2025-01-09T16:16:31.200000 -CVE-2025-22814,0,0,65ee901cff435ec6222796cabbfb3d206b86e25fa3089067354180bc5bc92f4a,2025-01-09T16:16:31.370000 -CVE-2025-22815,0,0,19871c307c37b41f3df4e09a30e858c967eb8d21c075becc80c1555787052312,2025-01-09T16:16:31.543000 -CVE-2025-22817,0,0,f408cc27b4c2539e183caf51cda99d9a43172205efacb701c5a5d4ae1effa9c4,2025-01-09T16:16:31.693000 -CVE-2025-22818,0,0,0b340d07d2ece27af91f8b8066e3f629546c22301bcdf28840045a1ee13dbabf,2025-01-09T16:16:31.850000 -CVE-2025-22819,0,0,6b1af1021da82ce22c543b4fc91c71afc7a7509cbe3c2af149c615ab191194c7,2025-01-09T16:16:32 -CVE-2025-22820,0,0,6e607cec0145c583bf7ba939467761d08a822ff9ec808bb492c50cae48dd4f0d,2025-01-09T16:16:32.173000 -CVE-2025-22821,0,0,06e00f48a88390a64873df1624dc52157d3a129e0f312d89e4e3f2a6a6d6fde2,2025-01-09T16:16:32.363000 -CVE-2025-22822,0,0,86fe614175eab12274d995316c7ea6878f9ed293859cb308b757f1d411e4b804,2025-01-09T16:16:32.557000 -CVE-2025-22823,0,0,3cb7eb88e447de51bff31c745363425ef76d647ead034c7dcc7937c26e7a231e,2025-01-09T16:16:32.717000 -CVE-2025-22824,0,0,5fa10c72f2f35c9e6ef05d40ca4cfa4e3b7c835fa36365c8ed7a7e09e9b30683,2025-01-09T16:16:32.893000 -CVE-2025-22826,0,0,332ad518891412cb4c6c16f7ba7d02f766b23d1581d77bb741cc4eabe620f85e,2025-01-09T16:16:33.047000 -CVE-2025-22827,0,0,b5e1199d90422b236ce828e6fe5f814f4ca97d3be889a387ee962fd6e98a8505,2025-01-09T16:16:33.200000 -CVE-2025-22946,0,0,cf12baf4e5b65ee512a854f2078359f1509439f6f159900a2a7997acf1a6ec8d,2025-01-10T15:15:16.710000 +CVE-2025-22621,0,1,ffd9a82cf8c3aa7daf1fb231064828db28f1c16f80aac0f92c6df757403f534e,2025-01-07T17:15:35.710000 +CVE-2025-22801,0,1,c83deac6a5c5c2cba0bd79ad3064ebb1b72b5ce6e25705a33f2e1f95b55a8ff2,2025-01-09T16:16:29.323000 +CVE-2025-22802,0,1,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32ad7b,2025-01-09T16:16:29.470000 +CVE-2025-22803,0,1,40579bef037b2313067d92dc65978feb36bebc6c2ed9d74c87c1ec3f2a0020b9,2025-01-09T16:16:29.627000 +CVE-2025-22804,0,1,f849e4fceefdae8c4a10bdfcd020e30e710279d149d09f73eaf1413b5639f4c9,2025-01-09T16:16:29.787000 +CVE-2025-22805,0,1,48706ba2e450e09bd94a95527a9affded1d7c5bdf1954e506fc7c0ba15e41310,2025-01-09T16:16:29.937000 +CVE-2025-22806,0,1,abad4e841efbb55989787c5c7df8130b51ca008bf739af9203019a189cbc9f78,2025-01-09T16:16:30.090000 +CVE-2025-22807,0,1,ced3f50260e3170a9fd485cda90cbb19dd2040ef2dde019f7e65e19c5e51985a,2025-01-09T16:16:30.253000 +CVE-2025-22808,0,1,1d405d848c33182da454380b95184a0511541dbaf161916a1cd9f31192056b68,2025-01-09T16:16:30.403000 +CVE-2025-22809,0,1,9639933c123de30217540507527e9ab6e2f2d9e2437d2d1fcc08b2e18f33c6ee,2025-01-09T16:16:30.557000 +CVE-2025-22810,0,1,4372f4bac82487f8f1b5ed65fa560ec4f5b86bb7400d2ae1d9174273dab56855,2025-01-09T16:16:30.713000 +CVE-2025-22811,0,1,6b71547c8adb860372eb698d7cfbe94656d55c21afee419e63b97d5ceb1809f0,2025-01-09T16:16:30.880000 +CVE-2025-22812,0,1,7eb3929399cc1fbb26f1acb4a6b3defb11b6a681947f65ece8ba3a4769554dd0,2025-01-09T16:16:31.047000 +CVE-2025-22813,0,1,0949c9095843318912b500add4a3ad813cad20561750d29229375728994d8694,2025-01-09T16:16:31.200000 +CVE-2025-22814,0,1,7dcd068dd774394c72f5e46658445be9e10072ed44490ac7c32e7b13630b83b3,2025-01-09T16:16:31.370000 +CVE-2025-22815,0,1,11cce4ccbc93f659e0bd9524cb88fecbd4a761b1cff50dbd82f141375bfffcc2,2025-01-09T16:16:31.543000 +CVE-2025-22817,0,1,954c74c28c9ae42ccc9c3d99fac64ba05760f79804930893f4d8010e8621b083,2025-01-09T16:16:31.693000 +CVE-2025-22818,0,1,df699b9ee8f7ac13eddd7a376e3176900d794c4cb9e61c7068ce95105f69c9ee,2025-01-09T16:16:31.850000 +CVE-2025-22819,0,1,69c84d2b50a6b5a6c8f29ca3dda1d44a7a2b2e01b78e86c194b0307af2945f38,2025-01-09T16:16:32 +CVE-2025-22820,0,1,0c0e3bf77c4b6a6b7be9df2e5b4bf5a48b7481be319044ec7b4b3114cd5776bd,2025-01-09T16:16:32.173000 +CVE-2025-22821,0,1,aced97d1793e12e4f3cb4f90fa755ca4493ae0ec26fa69f38788bd73221f2e20,2025-01-09T16:16:32.363000 +CVE-2025-22822,0,1,d5f87ffa31bc6be641104ef549aaeae7fc45b8348e2495ffb2fb8e5af7e7f9a7,2025-01-09T16:16:32.557000 +CVE-2025-22823,0,1,16e8a59cbcc2bfc06c602dd1c4fa5e368ef951a41870f5a6e53ff24ecf09b103,2025-01-09T16:16:32.717000 +CVE-2025-22824,0,1,fb201e5b5828770ff11d00a29d3f8e00f0da01f397b44ffb8e7c8ad29623f7e1,2025-01-09T16:16:32.893000 +CVE-2025-22826,0,1,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000 +CVE-2025-22827,0,1,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000 +CVE-2025-22946,0,1,bbb309333efca2524774885144eccce64002a01a988a38ce2753d9bc51da626f,2025-01-10T15:15:16.710000 CVE-2025-22949,0,0,39d9572a05bfbbbc6c6a7518255a39870f82fdb4f4d926ef9b2339fd79f5588a,2025-01-10T16:15:31.137000 -CVE-2025-23016,0,0,1c67a63f9a41740f8d4af81b34c85e6f74b5ff1f143c072a8b498d13d3f6a8c5,2025-01-10T12:15:25.480000 +CVE-2025-23016,0,1,31a93833611c1f04fca5216d55a04a7c92375e0aedfa95a405475196dac4f70b,2025-01-10T12:15:25.480000 CVE-2025-23022,0,0,12b4268af4b5910f707f03dab9877afd2f72e34fc9d11a1b908b3e43ea4035dd,2025-01-10T16:15:31.250000 CVE-2025-23078,0,0,787208eb125873cdaeda6aad58b913bd32e17a0cac9bf50dcec492f4dc86b139,2025-01-10T18:15:26.877000 CVE-2025-23079,0,0,fe56f874f4cc1ee17ab0b4515402f86e3d193bd587a7d241b7db224cde05fc24,2025-01-10T19:15:38.353000 @@ -276792,8 +276794,8 @@ CVE-2025-23110,0,0,867db813d57403bbcc6a3d328d580ab49b5acf4f7dd1d1514716e26b355a6 CVE-2025-23111,0,0,1ad7a709e810907fc4a775b3bc42be99357664fb7b9ea9c87353d91f6efcd984,2025-01-10T22:15:27.723000 CVE-2025-23112,0,0,a562dc16cabefbf7dbab5fd0ace202da598b5a780a77bf2dded3f9d697b20716,2025-01-10T22:15:27.863000 CVE-2025-23113,0,0,5f1e9d8edc60cb14480e82bacace951a4d0edc30dda4fb97d8d9600d5a3b4ff0,2025-01-10T23:15:08.810000 -CVE-2025-23124,1,1,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000 -CVE-2025-23125,1,1,2e6f0fce9ee8e787d649705f4cf1025930f6b72d6ac2efc70c4c1837b8d7d15b,2025-01-11T15:15:09.023000 -CVE-2025-23126,1,1,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4089,2025-01-11T15:15:09.100000 -CVE-2025-23127,1,1,ef1aeaee3e917139d62386eaa309c28fa46e54be8ed45ecdaab4f9d4f96931db,2025-01-11T15:15:09.173000 -CVE-2025-23128,1,1,856260a69fb4f1bb5d13296c47ffc7dac686c7ca9a44fff8151b1b7f11a740a9,2025-01-11T15:15:09.250000 +CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000 +CVE-2025-23125,0,0,2e6f0fce9ee8e787d649705f4cf1025930f6b72d6ac2efc70c4c1837b8d7d15b,2025-01-11T15:15:09.023000 +CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4089,2025-01-11T15:15:09.100000 +CVE-2025-23127,0,0,ef1aeaee3e917139d62386eaa309c28fa46e54be8ed45ecdaab4f9d4f96931db,2025-01-11T15:15:09.173000 +CVE-2025-23128,0,0,856260a69fb4f1bb5d13296c47ffc7dac686c7ca9a44fff8151b1b7f11a740a9,2025-01-11T15:15:09.250000