diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47731.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47731.json new file mode 100644 index 00000000000..b4c9b0981df --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47731.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-47731", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-04-23T13:15:46.343", + "lastModified": "2024-04-23T13:15:46.343", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM QRadar Suite Software 1.10.12.0 through 1.10.19.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 272203." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272203", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://https://www.ibm.com/support/pages/node/7148994", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-481xx/CVE-2023-48183.json b/CVE-2023/CVE-2023-481xx/CVE-2023-48183.json index e14467408fc..830e049bbc6 100644 --- a/CVE-2023/CVE-2023-481xx/CVE-2023-48183.json +++ b/CVE-2023/CVE-2023-481xx/CVE-2023-48183.json @@ -2,12 +2,16 @@ "id": "CVE-2023-48183", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T07:15:42.730", - "lastModified": "2024-04-23T07:15:42.730", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "QuickJS before c4cdd61 has a build_for_in_iterator NULL pointer dereference because of an erroneous lexical scope of \"this\" with eval." + }, + { + "lang": "es", + "value": "QuickJS anterior a c4cdd61 tiene una desreferencia de puntero NULL build_for_in_iterator debido a un alcance l\u00e9xico err\u00f3neo de \"this\" con eval." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-481xx/CVE-2023-48184.json b/CVE-2023/CVE-2023-481xx/CVE-2023-48184.json index 1e62bf7a0e3..4df727ca292 100644 --- a/CVE-2023/CVE-2023-481xx/CVE-2023-48184.json +++ b/CVE-2023/CVE-2023-481xx/CVE-2023-48184.json @@ -2,12 +2,16 @@ "id": "CVE-2023-48184", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T07:15:42.840", - "lastModified": "2024-04-23T07:15:42.840", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "QuickJS before 7414e5f has a quickjs.h JS_FreeValueRT use-after-free because of incorrect garbage collection of async functions with closures." + }, + { + "lang": "es", + "value": "QuickJS anterior a 7414e5f tiene un use-after-free de Quickjs.h JS_FreeValueRT debido a una recolecci\u00f3n de basura incorrecta de funciones as\u00edncronas con cierres." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6833.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6833.json index 2c43e646b03..a489bb5e6c6 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6833.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6833.json @@ -2,12 +2,16 @@ "id": "CVE-2023-6833", "sourceIdentifier": "hirt@hitachi.co.jp", "published": "2024-04-23T06:15:06.340", - "lastModified": "2024-04-23T06:15:06.340", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Insertion of Sensitive Information into Log File vulnerability in Hitachi Ops Center Administrator allows local users to gain sensitive information.This issue affects Hitachi Ops Center Administrator: before 11.0.1.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en Hitachi Ops Center Administrator permite a los usuarios locales obtener informaci\u00f3n confidencial. Este problema afecta a Hitachi Ops Center Administrator: versiones anteriores a 11.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0900.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0900.json index 45ab3a325b1..da9773cad46 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0900.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0900.json @@ -2,12 +2,16 @@ "id": "CVE-2024-0900", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-23T09:15:06.833", - "lastModified": "2024-04-23T09:15:06.833", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Elespare \u2013 Build Your Blog, News & Magazine Websites with Expert-Designed Template Kits. One Click Import: No Coding Skills Required! plugin for WordPress is vulnerable to unauthorized post creation due to a missing capability check on the elespare_create_post() function hooked via AJAX in all versions up to, and including, 2.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary posts." + }, + { + "lang": "es", + "value": "El complemento The Elespare \u2013 Build Your Blog, News & Magazine Websites with Expert-Designed Template Kits. One Click Import: No Coding Skills Required! para WordPress es vulnerable a la creaci\u00f3n de publicaciones no autorizadas debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n elespare_create_post() conectada a trav\u00e9s de AJAX en todas las versiones hasta la 2.1.2 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, creen publicaciones arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1241.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1241.json index a9f36f34720..26a5ed7af42 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1241.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1241.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1241", "sourceIdentifier": "help@fluidattacks.com", "published": "2024-04-23T04:15:08.357", - "lastModified": "2024-04-23T04:15:08.357", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Watchdog Antivirus v1.6.415 is vulnerable to a Denial of Service vulnerability by triggering the 0x80002014 IOCTL code of the wsdk-driver.sys driver." + }, + { + "lang": "es", + "value": "Watchdog Antivirus v1.6.415 es afectado por una vulnerabilidad de denegaci\u00f3n de servicio al activar el c\u00f3digo IOCTL 0x80002014 del controlador wsdk-driver.sys." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21511.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21511.json index 1fa269ce289..1baec74c913 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21511.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21511.json @@ -2,12 +2,16 @@ "id": "CVE-2024-21511", "sourceIdentifier": "report@snyk.io", "published": "2024-04-23T05:15:48.963", - "lastModified": "2024-04-23T05:15:48.963", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Versions of the package mysql2 before 3.9.7 are vulnerable to Arbitrary Code Injection due to improper sanitization of the timezone parameter in the readCodeFor function by calling a native MySQL Server date/time function." + }, + { + "lang": "es", + "value": "Las versiones del paquete mysql2 anteriores a la 3.9.7 son vulnerables a la inyecci\u00f3n de c\u00f3digo arbitrario debido a una sanitizaci\u00f3n inadecuada del par\u00e1metro de zona horaria en la funci\u00f3n readCodeFor al llamar a una funci\u00f3n de fecha/hora nativa del servidor MySQL." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2493.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2493.json index c0d0e41b3d9..bb57b597511 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2493.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2493.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2493", "sourceIdentifier": "hirt@hitachi.co.jp", "published": "2024-04-23T06:15:06.797", - "lastModified": "2024-04-23T06:15:06.797", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Session Hijacking vulnerability in Hitachi Ops Center Analyzer.This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.1-00.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de secuestro de sesi\u00f3n en Hitachi Ops Center Analyzer. Este problema afecta a Hitachi Ops Center Analyzer: desde 10.0.0-00 antes de 11.0.1-00." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26922.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26922.json new file mode 100644 index 00000000000..827163d1210 --- /dev/null +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26922.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-26922", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-04-23T13:15:46.643", + "lastModified": "2024-04-23T13:15:46.643", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: validate the parameters of bo mapping operations more clearly\n\nVerify the parameters of\namdgpu_vm_bo_(map/replace_map/clearing_mappings) in one common place." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/6fef2d4c00b5b8561ad68dd2b68173f5c6af1e75", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27574.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27574.json index 792b07fdbf3..e8fd9d4a44a 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27574.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27574.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27574", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T21:15:48.987", - "lastModified": "2024-04-22T21:15:48.987", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in Trainme Academy version Ichin v.1.3.2 allows a remote attacker to obtain sensitive information via the informacion, idcurso, and tit parameters." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en Trainme Academy versi\u00f3n Ichin v.1.3.2 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros informacion, idcurso y tit." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2760.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2760.json index 94350bc9143..6f73df13906 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2760.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2760.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2760", "sourceIdentifier": "help@fluidattacks.com", "published": "2024-04-23T04:15:08.717", - "lastModified": "2024-04-23T04:15:08.717", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Bkav Home v7816, build 2403161130 is vulnerable to a Memory Information Leak vulnerability by triggering the 0x222240 IOCTL code of the BkavSDFlt.sys driver." + }, + { + "lang": "es", + "value": "Bkav Home v7816, compilaci\u00f3n 2403161130 es afectado por una vulnerabilidad de fuga de informaci\u00f3n de memoria al activar el c\u00f3digo IOCTL 0x222240 del controlador BkavSDFlt.sys." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2798.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2798.json index b34bb347c7a..368e671667f 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2798.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2798.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2798", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-23T06:15:07.143", - "lastModified": "2024-04-23T06:15:07.143", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget containers in all versions up to, and including, 1.3.971 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los contenedores de widgets del complemento en todas las versiones hasta la 1.3.971 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2799.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2799.json index 3dcf4fe803c..731d894203b 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2799.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2799.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2799", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-23T06:15:07.417", - "lastModified": "2024-04-23T06:15:07.417", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Grid & Advanced Text widget HTML tags in all versions up to, and including, 1.3.96 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de las etiquetas HTML del widget Image Grid & Advanced Text en todas las versiones hasta la 1.3.96 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida proporcionado por el usuario. atributos. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28890.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28890.json index 749f4508414..4da52346595 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28890.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28890.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28890", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-23T05:15:49.260", - "lastModified": "2024-04-23T05:15:49.260", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Forminator prior to 1.29.0 contains an unrestricted upload of file with dangerous type vulnerability. If this vulnerability is exploited, a remote attacker may obtain sensitive information by accessing files on the server, alter the site that uses the plugin, and cause a denial-of-service (DoS) condition. " + }, + { + "lang": "es", + "value": "Forminator anterior a 1.29.0 contiene una carga sin restricciones de archivos con una vulnerabilidad de tipo peligroso. Si se explota esta vulnerabilidad, un atacante remoto puede obtener informaci\u00f3n confidencial accediendo a archivos en el servidor, alterar el sitio que utiliza el complemento y provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29368.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29368.json index 28a75443e5e..dcccf13e2bf 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29368.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29368.json @@ -2,12 +2,16 @@ "id": "CVE-2024-29368", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T21:15:49.043", - "lastModified": "2024-04-22T21:15:49.043", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue discovered in moziloCMS v2.0 allows attackers to bypass file upload restrictions and run arbitrary code by changing the file extension after upload via crafted POST request." + }, + { + "lang": "es", + "value": "Un problema descubierto en moziloCMS v2.0 permite a los atacantes eludir las restricciones de carga de archivos y ejecutar c\u00f3digo arbitrario cambiando la extensi\u00f3n del archivo despu\u00e9s de la carga mediante una solicitud POST manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30800.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30800.json new file mode 100644 index 00000000000..8db50e140cf --- /dev/null +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30800.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-30800", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-04-23T13:15:46.700", + "lastModified": "2024-04-23T13:15:46.700", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "PX4 Autopilot v.1.14 allows an attacker to fly the drone into no-fly zones by breaching the geofence using flaws in the function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/PX4/PX4-Autopilot/issues/22282", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/PX4/PX4-Autopilot/pull/22394", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json index 6e6b8e30c40..e29da7823d3 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json @@ -2,12 +2,16 @@ "id": "CVE-2024-31036", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T22:15:07.400", - "lastModified": "2024-04-22T22:15:07.400", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A heap-buffer-overflow vulnerability in the read_byte function in NanoMQ v.0.21.7 allows attackers to cause a denial of service via transmission of crafted hexstreams." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en la funci\u00f3n read_byte en NanoMQ v.0.21.7 permite a los atacantes provocar una denegaci\u00f3n de servicio mediante la transmisi\u00f3n de hexstreams manipulados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31077.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31077.json index 97a28961ec1..3fe54e0a16a 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31077.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31077.json @@ -2,12 +2,16 @@ "id": "CVE-2024-31077", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-23T05:15:49.323", - "lastModified": "2024-04-23T05:15:49.323", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Forminator prior to 1.29.3 contains a SQL injection vulnerability. If this vulnerability is exploited, a remote authenticated attacker with an administrative privilege may obtain and alter any information in the database and cause a denial-of-service (DoS) condition." + }, + { + "lang": "es", + "value": "Forminator anterior a 1.29.3 contiene una vulnerabilidad de inyecci\u00f3n SQL. Si se explota esta vulnerabilidad, un atacante remoto autenticado con privilegios administrativos puede obtener y alterar cualquier informaci\u00f3n en la base de datos y provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31857.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31857.json index dda6eb2beb0..316ea3e351f 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31857.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31857.json @@ -2,12 +2,16 @@ "id": "CVE-2024-31857", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-23T05:15:49.377", - "lastModified": "2024-04-23T05:15:49.377", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Forminator prior to 1.15.4 contains a cross-site scripting vulnerability. If this vulnerability is exploited, a remote attacker may obtain user information etc. and alter the page contents on the user's web browser." + }, + { + "lang": "es", + "value": "Forminator anterior a 1.15.4 contiene una vulnerabilidad de Cross Site Scripting. Si se explota esta vulnerabilidad, un atacante remoto puede obtener informaci\u00f3n del usuario, etc. y alterar el contenido de la p\u00e1gina en el navegador web del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3177.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3177.json index 3003a9a01e9..4553676cc98 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3177.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3177.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3177", "sourceIdentifier": "jordan@liggitt.net", "published": "2024-04-22T23:15:51.180", - "lastModified": "2024-04-22T23:15:51.180", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account\u2019s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.\n\n" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema de seguridad en Kubernetes donde los usuarios pueden lanzar contenedores que omiten la pol\u00edtica de secretos montables aplicada por el complemento de admisi\u00f3n ServiceAccount cuando usan contenedores, contenedores init y contenedores ef\u00edmeros con el campo envFrom completo. La pol\u00edtica garantiza que los pods que se ejecutan con una cuenta de servicio solo puedan hacer referencia a secretos especificados en el campo de secretos de la cuenta de servicio. Los cl\u00fasteres de Kubernetes solo se ven afectados si el complemento de admisi\u00f3n ServiceAccount y la anotaci\u00f3n kubernetes.io/enforce-mountable-secrets se usan junto con contenedores, contenedores init y contenedores ef\u00edmeros con el campo envFrom completo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3185.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3185.json index ee29d509cdb..d103b98def4 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3185.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3185.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3185", "sourceIdentifier": "cve@rapid7.com", "published": "2024-04-23T09:15:07.023", - "lastModified": "2024-04-23T09:15:07.023", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32039.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32039.json index 41966af4bd7..cbcf6cb323b 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32039.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32039.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32039", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-22T21:15:49.090", - "lastModified": "2024-04-22T21:15:49.090", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to integer overflow and out-of-bounds write. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use `/gfx` options (e.g. deactivate with `/bpp:32` or `/rfx` as it is on by default)." + }, + { + "lang": "es", + "value": "FreeRDP es una implementaci\u00f3n gratuita del protocolo de escritorio remoto. Los clientes basados en FreeRDP que utilizan una versi\u00f3n de FreeRDP anterior a la 3.5.0 o 2.11.6 son vulnerables al desbordamiento de enteros y a la escritura fuera de los l\u00edmites. Las versiones 3.5.0 y 2.11.6 solucionan el problema. Como workaround, no utilice las opciones `/gfx` (por ejemplo, desact\u00edvelas con `/bpp:32` o `/rfx`, ya que est\u00e1n activadas de forma predeterminada)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32040.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32040.json index 76776612faf..a177ece9a3a 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32040.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32040.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32040", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-22T21:15:49.290", - "lastModified": "2024-04-22T21:15:49.290", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`)." + }, + { + "lang": "es", + "value": "FreeRDP es una implementaci\u00f3n gratuita del protocolo de escritorio remoto. Los clientes basados en FreeRDP que utilizan una versi\u00f3n de FreeRDP anterior a la 3.5.0 o 2.11.6 y tienen conexiones a servidores que utilizan el c\u00f3dec `NSC` son vulnerables al desbordamiento de enteros. Las versiones 3.5.0 y 2.11.6 solucionan el problema. Como workaround, no utilice el c\u00f3dec NSC (por ejemplo, utilice `-nsc`)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32041.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32041.json index b58719754f2..8879e2ff4b7 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32041.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32041.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32041", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-22T21:15:49.477", - "lastModified": "2024-04-22T21:15:49.477", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead." + }, + { + "lang": "es", + "value": "FreeRDP es una implementaci\u00f3n gratuita del protocolo de escritorio remoto. Los clientes basados en FreeRDP que utilizan una versi\u00f3n de FreeRDP anterior a 3.5.0 o 2.11.6 son vulnerables a lecturas fuera de los l\u00edmites. Las versiones 3.5.0 y 2.11.6 solucionan el problema. Como workaround, desactive `/gfx` (activado de forma predeterminada, configure las opciones `/bpp` o `/rfx` en su lugar." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32238.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32238.json index 003aab7542b..d5428eb6763 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32238.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32238.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32238", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T20:15:07.630", - "lastModified": "2024-04-22T20:15:07.630", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:30.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "H3C ER8300G2-X is vulnerable to Incorrect Access Control. The password for the router's management system can be accessed via the management system page login interface." + }, + { + "lang": "es", + "value": "H3C ER8300G2-X es vulnerable a un control de acceso incorrecto. Se puede acceder a la contrase\u00f1a del sistema de administraci\u00f3n del enrutador a trav\u00e9s de la interfaz de inicio de sesi\u00f3n de la p\u00e1gina del sistema de administraci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32394.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32394.json index 31be028ac63..8999af0c188 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32394.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32394.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32394", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T21:15:49.657", - "lastModified": "2024-04-22T21:15:49.657", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue in ruijie.com/cn RG-RSR10-01G-T(WA)-S RSR_3.0(1)B9P2_RSR10-01G-TW-S_07150910 and RG-RSR10-01G-T(WA)-S RSR_3.0(1)B9P2_RSR10-01G-TW-S_07150910 allows a remote attacker to execute arbitrary code via a crafted HTTP request." + }, + { + "lang": "es", + "value": "Un problema en ruijie.com/cn RG-RSR10-01G-T(WA)-S RSR_3.0(1)B9P2_RSR10-01G-TW-S_07150910 y RG-RSR10-01G-T(WA)-S RSR_3.0( 1) B9P2_RSR10-01G-TW-S_07150910 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud HTTP manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32399.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32399.json index a0b00401c24..00edfc9f63c 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32399.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32399.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32399", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T20:15:07.683", - "lastModified": "2024-04-22T20:15:07.683", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:30.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in RaidenMAILD Mail Server v.4.9.4 and before allows a remote attacker to obtain sensitive information via the /webeditor/ component." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Directory Traversal en RaidenMAILD Mail Server v.4.9.4 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente /webeditor/." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32405.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32405.json index 168c7ee45bc..63c30f0196a 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32405.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32405.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32405", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T20:15:07.737", - "lastModified": "2024-04-22T20:15:07.737", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in inducer relate before v.2024.1 allows a remote attacker to escalate privileges via a crafted payload to the Answer field of InlineMultiQuestion parameter on Exam function." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross Site Scripting en Inducer Relate anterior a v.2024.1 permite a un atacante remoto escalar privilegios a trav\u00e9s de un payload manipulado al campo Respuesta del par\u00e1metro InlineMultiQuestion en la funci\u00f3n Examen." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32458.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32458.json index fc2f1101df8..5be0799cf0a 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32458.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32458.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32458", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-22T21:15:49.707", - "lastModified": "2024-04-22T21:15:49.707", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes (on by default, require server side support)." + }, + { + "lang": "es", + "value": "FreeRDP es una implementaci\u00f3n gratuita del protocolo de escritorio remoto. Los clientes basados en FreeRDP que utilizan una versi\u00f3n de FreeRDP anterior a 3.5.0 o 2.11.6 son vulnerables a lecturas fuera de los l\u00edmites. Las versiones 3.5.0 y 2.11.6 solucionan el problema. Como workaround, utilice los modos `/gfx` o `/rfx` (activados de forma predeterminada, requieren soporte del lado del servidor)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32459.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32459.json index e07f91fa8ba..e8e8e2b2c61 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32459.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32459.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32459", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-22T22:15:07.463", - "lastModified": "2024-04-22T22:15:07.463", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available." + }, + { + "lang": "es", + "value": "FreeRDP es una implementaci\u00f3n gratuita del orotocolo de escritorio remoto. Los clientes y servidores basados en FreeRDP que utilizan una versi\u00f3n de FreeRDP anterior a 3.5.0 o 2.11.6 son vulnerables a lecturas fuera de los l\u00edmites. Las versiones 3.5.0 y 2.11.6 solucionan el problema. No hay workarounds disponibles." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32460.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32460.json index 305eccf55ba..3392885dfe5 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32460.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32460.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32460", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-22T22:15:07.647", - "lastModified": "2024-04-22T22:15:07.647", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support." + }, + { + "lang": "es", + "value": "FreeRDP es una implementaci\u00f3n gratuita del protocolo de escritorio remoto. Los clientes basados en FreeRDP que utilizan la ruta de dibujo `/bpp:32` heredada `GDI` con una versi\u00f3n de FreeRDP anterior a 3.5.0 o 2.11.6 son vulnerables a lecturas fuera de los l\u00edmites. Las versiones 3.5.0 y 2.11.6 solucionan el problema. Como workaround, utilice rutas de dibujo modernas (por ejemplo, las opciones `/rfx` o `/gfx`). El workaround requiere soporte del lado del servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32461.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32461.json index e51d1391343..053462cfbb2 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32461.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32461.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32461", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-22T22:15:07.840", - "lastModified": "2024-04-22T22:15:07.840", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A SQL injection vulnerability in POST /search/search=packages in LibreNMS prior to version 24.4.0 allows a user with global read privileges to execute SQL commands via the package parameter. With this vulnerability, an attacker can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials. Version 24.4.0 contains a patch for the vulnerability.\n" + }, + { + "lang": "es", + "value": "LibreNMS es un sistema de monitoreo de red de c\u00f3digo abierto basado en PHP/MySQL/SNMP. Una vulnerabilidad de inyecci\u00f3n SQL en POST /search/search=packages en LibreNMS anterior a la versi\u00f3n 24.4.0 permite a un usuario con privilegios de lectura global ejecutar comandos SQL a trav\u00e9s del par\u00e1metro del paquete. Con esta vulnerabilidad, un atacante puede aprovechar una vulnerabilidad basada en el tiempo de inyecci\u00f3n SQL para extraer todos los datos de la base de datos, como las credenciales de administrador. La versi\u00f3n 24.4.0 contiene un parche para la vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32479.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32479.json index 9a938136862..99950e7eaef 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32479.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32479.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32479", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-22T22:15:08.027", - "lastModified": "2024-04-22T22:15:08.027", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Prior to version 24.4.0, there is improper sanitization on the `Service` template name, which can lead to stored Cross-site Scripting. Version 24.4.0 fixes this vulnerability." + }, + { + "lang": "es", + "value": "LibreNMS es un sistema de monitoreo de red de c\u00f3digo abierto basado en PHP/MySQL/SNMP. Antes de la versi\u00f3n 24.4.0, hab\u00eda una sanitizaci\u00f3n inadecuada en el nombre de la plantilla \"Servicio\", lo que puede provocar que se almacenen Cross Site Scripting. La versi\u00f3n 24.4.0 corrige esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32480.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32480.json index aa6ec20803e..849d6e63fda 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32480.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32480.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32480", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-22T23:15:50.440", - "lastModified": "2024-04-22T23:15:50.440", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Versions prior to 24.4.0 are vulnerable to SQL injection. The `order` parameter is obtained from `$request`. After performing a string check, the value is directly incorporated into an SQL statement and concatenated, resulting in a SQL injection vulnerability. An attacker may extract a whole database this way. Version 24.4.0 fixes the issue." + }, + { + "lang": "es", + "value": "LibreNMS es un sistema de monitoreo de red de c\u00f3digo abierto basado en PHP/MySQL/SNMP. Las versiones anteriores a la 24.4.0 son vulnerables a la inyecci\u00f3n SQL. El par\u00e1metro `order` se obtiene de `$request`. Despu\u00e9s de realizar una verificaci\u00f3n de cadena, el valor se incorpora directamente a una declaraci\u00f3n SQL y se concatena, lo que genera una vulnerabilidad de inyecci\u00f3n SQL. Un atacante puede extraer una base de datos completa de esta manera. La versi\u00f3n 24.4.0 soluciona el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32653.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32653.json index 5f4b0b7bd92..e6d064f1fb1 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32653.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32653.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32653", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-22T23:15:50.630", - "lastModified": "2024-04-22T23:15:50.630", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "jadx is a Dex to Java decompiler. Prior to version 1.5.0, the package name is not filtered before concatenation. This can be exploited to inject arbitrary code into the package name. The vulnerability allows an attacker to execute commands with shell privileges. Version 1.5.0 contains a patch for the vulnerability." + }, + { + "lang": "es", + "value": "jadx es un descompilador de Dex a Java. Antes de la versi\u00f3n 1.5.0, el nombre del paquete no se filtra antes de la concatenaci\u00f3n. Esto se puede aprovechar para inyectar c\u00f3digo arbitrario en el nombre del paquete. La vulnerabilidad permite a un atacante ejecutar comandos con privilegios de shell. La versi\u00f3n 1.5.0 contiene un parche para la vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32656.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32656.json index c224c508225..9789b511be3 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32656.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32656.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32656", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-22T23:15:50.817", - "lastModified": "2024-04-22T23:15:50.817", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Ant Media Server is live streaming engine software. A local privilege escalation vulnerability in present in versions 2.6.0 through 2.8.2 allows any unprivileged operating system user account to escalate privileges to the root user account on the system. This vulnerability arises from Ant Media Server running with Java Management Extensions (JMX) enabled and authentication disabled on localhost on port 5599/TCP. This vulnerability is nearly identical to the local privilege escalation vulnerability CVE-2023-26269 identified in Apache James. Any unprivileged operating system user can connect to the JMX service running on port 5599/TCP on localhost and leverage the MLet Bean within JMX to load a remote MBean from an attacker-controlled server. This allows an attacker to execute arbitrary code within the Java process run by Ant Media Server and execute code within the context of the `antmedia` service account on the system. Version 2.9.0 contains a patch for the issue. As a workaround, one may remove certain parameters from the `antmedia.service` file." + }, + { + "lang": "es", + "value": "Ant Media Server es un software de motor de transmisi\u00f3n en vivo. Una vulnerabilidad de escalada de privilegios local presente en las versiones 2.6.0 a 2.8.2 permite que cualquier cuenta de usuario del sistema operativo sin privilegios escale privilegios a la cuenta de usuario ra\u00edz del sistema. Esta vulnerabilidad surge cuando Ant Media Server se ejecuta con Java Management Extensions (JMX) habilitadas y la autenticaci\u00f3n deshabilitada en localhost en el puerto 5599/TCP. Esta vulnerabilidad es casi id\u00e9ntica a la vulnerabilidad de escalada de privilegios locales CVE-2023-26269 identificada en Apache James. Cualquier usuario de sistema operativo sin privilegios puede conectarse al servicio JMX que se ejecuta en el puerto 5599/TCP en localhost y aprovechar MLet Bean dentro de JMX para cargar un MBean remoto desde un servidor controlado por un atacante. Esto permite a un atacante ejecutar c\u00f3digo arbitrario dentro del proceso Java ejecutado por Ant Media Server y ejecutar c\u00f3digo dentro del contexto de la cuenta de servicio \"antmedia\" en el sistema. La versi\u00f3n 2.9.0 contiene un parche para el problema. Como workaround, se pueden eliminar ciertos par\u00e1metros del archivo `antmedia.service`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32657.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32657.json index ae5e8c343bf..52fdcf80b17 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32657.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32657.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32657", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-22T23:15:50.997", - "lastModified": "2024-04-22T23:15:50.997", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Hydra is a Continuous Integration service for Nix based projects. Attackers can execute arbitrary code in the browser context of Hydra and execute authenticated HTTP requests. The abused feature allows Nix builds to specify files that Hydra serves to clients. One use of this functionality is serving NixOS `.iso` files. The issue is only with html files served by Hydra. The issue has been patched on https://hydra.nixos.org around 2024-04-21 14:30 UTC. The nixpkgs package were fixed in unstable and 23.11. Users with custom Hydra packages can apply the fix commit to their local installations. The vulnerability is only triggered when opening HTML build artifacts, so not opening them until the vulnerability is fixed works around the issue." + }, + { + "lang": "es", + "value": "Hydra es un servicio de integraci\u00f3n continua para proyectos basados en Nix. Los atacantes pueden ejecutar c\u00f3digo arbitrario en el contexto del navegador de Hydra y ejecutar solicitudes HTTP autenticadas. La caracter\u00edstica abusada permite que las compilaciones de Nix especifiquen los archivos que Hydra entrega a los clientes. Un uso de esta funcionalidad es servir archivos `.iso` de NixOS. El problema es s\u00f3lo con los archivos html proporcionados por Hydra. El problema se solucion\u00f3 en https://hydra.nixos.org alrededor del 21 de abril de 2024 a las 14:30 UTC. El paquete nixpkgs se corrigi\u00f3 en inestable y 23.11. Los usuarios con paquetes Hydra personalizados pueden aplicar la confirmaci\u00f3n de correcci\u00f3n a sus instalaciones locales. La vulnerabilidad solo se activa al abrir artefactos de compilaci\u00f3n HTML, por lo que no abrirlos hasta que se solucione la vulnerabilidad soluciona el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3293.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3293.json index 2fc458ebd48..c4447d7b34a 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3293.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3293.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3293", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-23T02:15:48.390", - "lastModified": "2024-04-23T02:15:48.390", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The rtMedia for WordPress, BuddyPress and bbPress plugin for WordPress is vulnerable to blind SQL Injection via the rtmedia_gallery shortcode in all versions up to, and including, 4.6.18 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento rtMedia para WordPress, BuddyPress y bbPress para WordPress es vulnerable a la inyecci\u00f3n SQL ciega a trav\u00e9s del c\u00f3digo corto rtmedia_gallery en todas las versiones hasta la 4.6.18 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3491.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3491.json index 010330341b0..3628c3d5927 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3491.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3491.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3491", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-23T11:15:45.967", - "lastModified": "2024-04-23T11:15:45.967", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3664.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3664.json index 34d8be38dd4..170e7dc332e 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3664.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3664.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3664", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-23T08:15:45.177", - "lastModified": "2024-04-23T08:15:45.177", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Quick Featured Images plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the set_thumbnail and delete_thumbnail functions in all versions up to, and including, 13.7.0. This makes it possible for authenticated attackers, with contributor-level access and above, to delete thumbnails and add thumbnails to posts they did not author." + }, + { + "lang": "es", + "value": "El complemento Quick Featured Images para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en las funciones set_thumbnail y delete_thumbnail en todas las versiones hasta la 13.7.0 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, eliminen miniaturas y agreguen miniaturas a publicaciones que no fueron de su autor\u00eda." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3665.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3665.json index a3c3f001ab2..29ff91c02c7 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3665.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3665.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3665", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-23T10:15:06.923", - "lastModified": "2024-04-23T10:15:06.923", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3732.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3732.json index a25e8160b65..037976623aa 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3732.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3732", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-23T10:15:07.537", - "lastModified": "2024-04-23T10:15:07.537", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3889.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3889.json index 5d2289f2150..379a90cf587 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3889.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3889.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3889", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-23T06:15:07.700", - "lastModified": "2024-04-23T06:15:07.700", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Advanced Accordion widget in all versions up to, and including, 1.3.971 due to insufficient input sanitization and output escaping on user supplied attributes like 'accordion_title_tag'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Advanced Accordion del complemento en todas las versiones hasta la 1.3.971 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en atributos proporcionados por el usuario como 'accordion_title_tag '. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3911.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3911.json new file mode 100644 index 00000000000..6b43fd31f78 --- /dev/null +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3911.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-3911", + "sourceIdentifier": "info@cert.vde.com", + "published": "2024-04-23T13:15:46.770", + "lastModified": "2024-04-23T13:15:46.770", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated remote attacker can\u00a0deceive users into performing unintended actions due to improper restriction of rendered UI layers or frames.\u00a0\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], + "references": [ + { + "url": "https://cert.vde.com/en/advisories/VDE-2024-023", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4031.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4031.json index c21f1e8fd0f..d03bb43d8b3 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4031.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4031.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4031", "sourceIdentifier": "cve-coordination@logitech.com", "published": "2024-04-23T07:15:43.087", - "lastModified": "2024-04-23T07:15:43.087", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:09.397", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Unquoted Search Path or Element vulnerability in Logitech MEVO WEBCAM APP on Windows allows Local Execution of Code." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de elemento o ruta de b\u00fasqueda sin comillas en la aplicaci\u00f3n Logitech MEVO WEBCAM en Windows permite la ejecuci\u00f3n local de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4040.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4040.json index 99639222ea6..eeb29bdcb5a 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4040.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4040.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4040", "sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", "published": "2024-04-22T20:15:07.803", - "lastModified": "2024-04-22T21:15:49.890", - "vulnStatus": "Received", + "lastModified": "2024-04-23T12:52:26.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.\n" + }, + { + "lang": "es", + "value": "VFS Sandbox Escape en CrushFTP en todas las versiones anteriores a 10.7.1 y 11.1.0 en todas las plataformas permite a atacantes remotos con privilegios bajos leer archivos del sistema de archivos fuera de VFS Sandbox." } ], "metrics": { diff --git a/README.md b/README.md index 6af7fb4fa74..c052c90d6f7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-23T12:00:37.979443+00:00 +2024-04-23T14:00:38.816345+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-23T11:15:45.967000+00:00 +2024-04-23T13:15:46.770000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -246540 +246544 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `4` -- [CVE-2024-3491](CVE-2024/CVE-2024-34xx/CVE-2024-3491.json) (`2024-04-23T11:15:45.967`) -- [CVE-2024-3665](CVE-2024/CVE-2024-36xx/CVE-2024-3665.json) (`2024-04-23T10:15:06.923`) -- [CVE-2024-3732](CVE-2024/CVE-2024-37xx/CVE-2024-3732.json) (`2024-04-23T10:15:07.537`) +- [CVE-2023-47731](CVE-2023/CVE-2023-477xx/CVE-2023-47731.json) (`2024-04-23T13:15:46.343`) +- [CVE-2024-26922](CVE-2024/CVE-2024-269xx/CVE-2024-26922.json) (`2024-04-23T13:15:46.643`) +- [CVE-2024-30800](CVE-2024/CVE-2024-308xx/CVE-2024-30800.json) (`2024-04-23T13:15:46.700`) +- [CVE-2024-3911](CVE-2024/CVE-2024-39xx/CVE-2024-3911.json) (`2024-04-23T13:15:46.770`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `42` -- [CVE-2024-3185](CVE-2024/CVE-2024-31xx/CVE-2024-3185.json) (`2024-04-23T09:15:07.023`) +- [CVE-2024-31857](CVE-2024/CVE-2024-318xx/CVE-2024-31857.json) (`2024-04-23T12:52:09.397`) +- [CVE-2024-32039](CVE-2024/CVE-2024-320xx/CVE-2024-32039.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32040](CVE-2024/CVE-2024-320xx/CVE-2024-32040.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32041](CVE-2024/CVE-2024-320xx/CVE-2024-32041.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32238](CVE-2024/CVE-2024-322xx/CVE-2024-32238.json) (`2024-04-23T12:52:30.940`) +- [CVE-2024-32394](CVE-2024/CVE-2024-323xx/CVE-2024-32394.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32399](CVE-2024/CVE-2024-323xx/CVE-2024-32399.json) (`2024-04-23T12:52:30.940`) +- [CVE-2024-32405](CVE-2024/CVE-2024-324xx/CVE-2024-32405.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32458](CVE-2024/CVE-2024-324xx/CVE-2024-32458.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32459](CVE-2024/CVE-2024-324xx/CVE-2024-32459.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32460](CVE-2024/CVE-2024-324xx/CVE-2024-32460.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32461](CVE-2024/CVE-2024-324xx/CVE-2024-32461.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32479](CVE-2024/CVE-2024-324xx/CVE-2024-32479.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32480](CVE-2024/CVE-2024-324xx/CVE-2024-32480.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32653](CVE-2024/CVE-2024-326xx/CVE-2024-32653.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32656](CVE-2024/CVE-2024-326xx/CVE-2024-32656.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-32657](CVE-2024/CVE-2024-326xx/CVE-2024-32657.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-3293](CVE-2024/CVE-2024-32xx/CVE-2024-3293.json) (`2024-04-23T12:52:26.253`) +- [CVE-2024-3491](CVE-2024/CVE-2024-34xx/CVE-2024-3491.json) (`2024-04-23T12:52:09.397`) +- [CVE-2024-3664](CVE-2024/CVE-2024-36xx/CVE-2024-3664.json) (`2024-04-23T12:52:09.397`) +- [CVE-2024-3665](CVE-2024/CVE-2024-36xx/CVE-2024-3665.json) (`2024-04-23T12:52:09.397`) +- [CVE-2024-3732](CVE-2024/CVE-2024-37xx/CVE-2024-3732.json) (`2024-04-23T12:52:09.397`) +- [CVE-2024-3889](CVE-2024/CVE-2024-38xx/CVE-2024-3889.json) (`2024-04-23T12:52:09.397`) +- [CVE-2024-4031](CVE-2024/CVE-2024-40xx/CVE-2024-4031.json) (`2024-04-23T12:52:09.397`) +- [CVE-2024-4040](CVE-2024/CVE-2024-40xx/CVE-2024-4040.json) (`2024-04-23T12:52:26.253`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 311d92706a7..fabb0ab7135 100644 --- a/_state.csv +++ b/_state.csv @@ -233555,6 +233555,7 @@ CVE-2023-47718,0,0,c741441681738efc3979d67da4409868f353d29cc92314f5037f92d080930 CVE-2023-4772,0,0,2771ff64adbe1ba6f7dfdd5d8e8af50d5674985cd4bd14f9ff6d841da9878bd5,2023-11-07T04:22:57.827000 CVE-2023-47722,0,0,5f2ccb67ee0472008868026b0561431d013bb25eb62913fd40686172191b4bbe,2023-12-12T21:04:18.177000 CVE-2023-4773,0,0,46809a7c239cdb033db621dca5a458d470c07362dae46adc2ff34854ee8e494c,2023-11-07T04:22:57.903000 +CVE-2023-47731,1,1,89987d51737196570bc03d907f705c55494118e0ad765e66305a171fcd3e9341,2024-04-23T13:15:46.343000 CVE-2023-4774,0,0,35ac46a4fdf0cf52bb3ea874efbb49ea5abac6c41f64de60f5743bc6ef3ffb58,2023-11-07T04:22:58.080000 CVE-2023-47741,0,0,bc210f1d0d5dc855129de9cb9f7b0cec12b64c4591e6a3d888b1fc1b1b8d7ef9,2023-12-22T18:40:58.353000 CVE-2023-47742,0,0,7ffaa6b11d646a28b2360a23ac04f2e6f6782e58ebd6f8361fb596b3069e8084,2024-03-04T13:58:23.447000 @@ -233749,8 +233750,8 @@ CVE-2023-4817,0,0,1a2b9af52c66a7fd99bf64763147c554fc82c52e367b85809793ea9592305b CVE-2023-48172,0,0,5a469e0274433a0ae0c832bd74c7fde63212f4ba8f5394a1cc6402ed0325e021,2023-12-09T04:46:27.490000 CVE-2023-48176,0,0,c3abf7182d832669fb665b5e3a6edfc409b19c925d485b0863dc39013424ec2e,2023-11-30T20:21:54.850000 CVE-2023-4818,0,0,9954c56b59d69f6380bac719b5f55b5ab2a4f6102bd5dc276878f93883a125b9,2024-01-19T16:35:49.683000 -CVE-2023-48183,0,0,129011b1c54672e489d23f39a90ae4ba5175bfed0b6176dfe3d293e12354c067,2024-04-23T07:15:42.730000 -CVE-2023-48184,0,0,fb24325ab525ea5b866e249e02a921e31a1d53a17285bd408c822e48751546ec,2024-04-23T07:15:42.840000 +CVE-2023-48183,0,1,374fef2d154279a8b351befbca3ad5116cc95f0c1cc7011c511ba962c5439277,2024-04-23T12:52:09.397000 +CVE-2023-48184,0,1,899caf45ae8acd3a7cda77d5b27c17e70ad3d79c87aaa9397538df7a4162100f,2024-04-23T12:52:09.397000 CVE-2023-48185,0,0,7ef7d220f1c753558def21f6a3c05b2c9063a72adb28cbfed77d5f1a672c1649,2023-12-02T00:21:40.093000 CVE-2023-48188,0,0,215b3c362c06f3f67c5f56adafe9b5433496acde9c1298c239fef4711454e212,2023-12-01T04:00:46.523000 CVE-2023-4819,0,0,486c1da204e823d4e3904d929a1e95095c2adfb2e9e8d41b10f2b239f97150b3,2023-11-07T04:23:00.223000 @@ -237968,7 +237969,7 @@ CVE-2023-6828,0,0,5f4e621a26f675509a21b4e2930f2bceb4ddb7b7fd69c98ea769a7d538bb63 CVE-2023-6830,0,0,60b860cb37e3725679c9ff0121ff0e6caf0b54eddc8c5cabcf4f47e5b13450f0,2024-01-16T17:05:57.137000 CVE-2023-6831,0,0,d22e6a14a06b817ad1b5878c79aa0e8f40346efc1343acf6730c9b95393b85fd,2024-02-13T22:15:45.633000 CVE-2023-6832,0,0,7ed4386fd24d6856af93f562dba88714828752ac6cbbdbbcaac4e0117f874808,2023-12-21T14:47:05.363000 -CVE-2023-6833,0,0,8dd81fdfebaeba5cb094b7629bba5227a50c280e14740a7c3fa16e2c0c9f497d,2024-04-23T06:15:06.340000 +CVE-2023-6833,0,1,e8ecb391ae212456444625d2511eded607be00d8aba692b2421c94e9bb9e82df,2024-04-23T12:52:09.397000 CVE-2023-6835,0,0,f8b6623f61d013928a6105a1c7550b3d8ff8a3e89ec2373802121baf8a7a7762,2023-12-28T20:19:11.697000 CVE-2023-6836,0,0,587b66ab7f5df7562168af9bbc63d21bd8d42ab304ba7eedd5a7c992f41b8088,2023-12-19T13:52:56.807000 CVE-2023-6837,0,0,fb15ab3396d120dc166f6807c27288be0cf7a164ade223cfab481073d4070ca9,2024-01-05T19:56:39.097000 @@ -239024,7 +239025,7 @@ CVE-2024-0896,0,0,5348557c7ea4ddb4fdb7fdcc9e92238aad12e82aa66cf5c51f44520b0ef95a CVE-2024-0897,0,0,54d1bf8163931c80ebde85ab8390c0fecedb390a8355fe15103e3a67a3a29cc9,2024-03-13T18:16:18.563000 CVE-2024-0898,0,0,8e1a15f2adb6e1251c3b5c487bb49c70d962e45988b99a32b53b9adb0687df3d,2024-03-13T18:16:18.563000 CVE-2024-0899,0,0,7d5a1ea0e11c81ea4fdf5cc7256f52b0decb0abb96aea80029ec1a81b2559961,2024-04-10T13:24:00.070000 -CVE-2024-0900,0,0,cb433b60adbb648204fa5444a3f480cde06c8792b31caf9d9f1d858e75ae26d9,2024-04-23T09:15:06.833000 +CVE-2024-0900,0,1,0df16b48e073462cef0a451a68261119942789edbcc049ef43c079272fea0ea9,2024-04-23T12:52:09.397000 CVE-2024-0901,0,0,8395d055c39a2ded7a6676d9f91e364a6c601b11f066a458c7ff4909044d580a,2024-03-26T12:55:05.010000 CVE-2024-0902,0,0,c022af4b73cd366b52a576af13eecfefbd72fc877962e0376aba015f72537ab5,2024-04-15T13:15:31.997000 CVE-2024-0903,0,0,4e5a944405938a6def0adf008001af709d311e38e0572265081d65abf85ff9fb,2024-02-22T19:07:27.197000 @@ -239316,7 +239317,7 @@ CVE-2024-1236,0,0,88f351cdece6c13383e2ef64090741dd27c149d6d5fc4eae9681e06c5b4747 CVE-2024-1237,0,0,69ceb9351727cdff4ae84eff7cbe42d0ab784516d20cfa01c677677192dd4b80,2024-03-13T18:16:18.563000 CVE-2024-1238,0,0,519bc4d0e22e37477a7bba0c3527a633c9daaf81790c98dc65378f4451d4a7cb,2024-04-01T01:12:59.077000 CVE-2024-1239,0,0,79b2087d3168ea3b3ddb25eae5afcee4c807d21abf2847eb51305ac385c39cbe,2024-03-17T22:38:29.433000 -CVE-2024-1241,0,0,0026865a830ad029c61d9ace01d8c9f64e0f198ae99f29a16832a3d722b33ee0,2024-04-23T04:15:08.357000 +CVE-2024-1241,0,1,7f642b52864fd35425cf85677ae6d83516031e7124364cddcdda87b3eeba2984,2024-04-23T12:52:09.397000 CVE-2024-1242,0,0,ab4609d5893ed1ea66780779f1561665f88460dbdd62166f0432c338817451ed,2024-02-29T13:49:29.390000 CVE-2024-1245,0,0,2e59378dab8a209b430a7bdf5dfa1ad37455bcba638f93f331bd6727be23a3f7,2024-02-15T04:44:27.987000 CVE-2024-1246,0,0,668589ae819ff5835ff63858d61771ccdb54522dbf26239874e373ac001fe82c,2024-02-15T04:44:35.470000 @@ -240676,7 +240677,7 @@ CVE-2024-21507,0,0,b27f6d75429acab2680ad1c4eafae6068e12dceeaf532d34c061e24473a2d CVE-2024-21508,0,0,cd586a09fe54df7c696f2b333fd5accf6715d2f6a2387d472b5f305a62739372,2024-04-11T12:47:44.137000 CVE-2024-21509,0,0,b1840eaff4c2213087c96721aaf87fdc6158bea90de6f63bdc95977af5681b08,2024-04-10T13:23:38.787000 CVE-2024-2151,0,0,1984075479a813303a33fbf40ee9d084e33ab05911d0014a1aff56e74a532cd4,2024-04-11T01:25:19.060000 -CVE-2024-21511,0,0,89b63877d043d4c3dfac2e169c5e62ecb21af8e06db8dbfbe8857fe11eb023f3,2024-04-23T05:15:48.963000 +CVE-2024-21511,0,1,d034a9f6c4dcc55a5c4fdcdd7e3a31e0606abc8a26dae5773e22f734aa49e036,2024-04-23T12:52:09.397000 CVE-2024-2152,0,0,d88c805e31f2469ea62a2f070cd3165046fcadf7379eeee508317e4c8341dd17,2024-04-11T01:25:19.140000 CVE-2024-2153,0,0,5a75e22f63315456f3ebc78cfda206253cd84838795a10d092092a6057d48f7b,2024-04-11T01:25:19.217000 CVE-2024-2154,0,0,e92421c8f1816c3c47b366ed659476814adc73f98704550d7856f4f06883affa,2024-04-11T01:25:19.300000 @@ -242405,7 +242406,7 @@ CVE-2024-24926,0,0,85370a4bba915c1c0a13743f2e9c9f2fe0c41f39fe0825744152646b71e97 CVE-2024-24927,0,0,98cdaf1a350e38617e814138381d6395355353f08efaf652523d3ef2353525e2,2024-02-16T13:41:18.167000 CVE-2024-24928,0,0,f27dd8933b3e0c04c71f94b7ba6e4efe2cc65b2a36497881a1a86b654ddd9d9b,2024-02-16T13:41:04.027000 CVE-2024-24929,0,0,86fd02089d6dd5db2285320055e05295225cbf800517773fc03a0bfca1a6cc16,2024-02-12T14:19:54.330000 -CVE-2024-2493,0,0,1abd3ff3230694a89cd1ef734cc4224a1c64377f8633ce3dc3b6afb803a8477a,2024-04-23T06:15:06.797000 +CVE-2024-2493,0,1,e606c23056a16cbd8d6eac9ce477fd3e041c258777c92546def600782512e2bc,2024-04-23T12:52:09.397000 CVE-2024-24930,0,0,fcd1d34f13943d1262f56fac388a51cc622b565da8178878c89844bdd4fe9a8a,2024-02-16T21:33:40.590000 CVE-2024-24931,0,0,78eddbcbbbfa8c6976ef00426867f55edd6e7bf66e82c01969653d70a2e2ef2e,2024-02-16T21:33:29.340000 CVE-2024-24932,0,0,b2f44460390b42f56a628f2eb2dc294afc8ce430fc863f2d6f9f1973cdcede3b,2024-02-16T21:35:59.587000 @@ -243666,6 +243667,7 @@ CVE-2024-26919,0,0,8ce229e6f304423499a3d2dbc331713eb1fbfa99e3cc0b71da0db8b8b65f0 CVE-2024-2692,0,0,aefc05ddca23ffc90de039367cc7fed9a06f50bd32c460cfe2bbf1c8645c8f06,2024-04-04T12:48:41.700000 CVE-2024-26920,0,0,8ad9dc4497d0ab325621ba9253d9bafe6f0648f6e0dcc53db528add7b30825c1,2024-04-17T16:51:07.347000 CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf98c7,2024-04-18T13:04:28.900000 +CVE-2024-26922,1,1,e46cde7562a4d5471cdbee8c3c8c5b6be2ee86f4e9fc22b84ea50e2337f7739f,2024-04-23T13:15:46.643000 CVE-2024-2693,0,0,0523f248585c70810eb494560526f8a16efe419cf7f3014aa23838648b0d3e89,2024-04-10T13:23:38.787000 CVE-2024-2700,0,0,ec51b942504a96d4888f64f81c70906fd44973b0d1ace8e2f862241f82ce29e0,2024-04-17T20:15:08.240000 CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000 @@ -243897,12 +243899,12 @@ CVE-2024-27569,0,0,000ff88e8ff4678a3790d0ee96674581a9a53afd1b5f0d49033b717c5dd65 CVE-2024-27570,0,0,30e1bdadd931878127199d0565523cd94923921178695ba62d569ae38e48386b,2024-03-01T15:23:36.177000 CVE-2024-27571,0,0,2fcce61cb867ec2a650e4bd74e7018e990625a473882c12953648f5c8c2545b3,2024-03-01T15:23:36.177000 CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1fe5b,2024-03-01T15:23:36.177000 -CVE-2024-27574,0,0,bcc5eeca8a1b5f671cf3af5d812b47b420b66573be9babdf35ec56e12529b804,2024-04-22T21:15:48.987000 +CVE-2024-27574,0,1,8e35363a297bb354ed77e854cc086ede00fd9f4b0bf134e0bf41d2ca17f3da6f,2024-04-23T12:52:26.253000 CVE-2024-27575,0,0,fe78cdbfc48ba2557faf61957a122c11738e27bfad3d91860b0cc50d57150a36,2024-04-07T04:15:07.723000 CVE-2024-2758,0,0,a3cb437eedb439caebfac4666310f05bccf69de779d818f9f315740c92bee7d8,2024-04-04T12:48:41.700000 CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000 CVE-2024-27592,0,0,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000 -CVE-2024-2760,0,0,08c1f34ef20ee3fccdabe30058675227fd892a51408a4d79c262955a8c8bf562,2024-04-23T04:15:08.717000 +CVE-2024-2760,0,1,a061be605bfdf89df12f7caacd6b7263c7034257ee7260474dff7d3e633c6b9d,2024-04-23T12:52:09.397000 CVE-2024-27602,0,0,641d004f193cbc187bf560868353a5607871444565457a2a1f222c57bafe0082,2024-04-03T12:38:04.840000 CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000 CVE-2024-27605,0,0,4f744199930e3e7e9b7f220c4e73a81bb4fe207bf4ecc2f618ea8f6d8437d165,2024-04-03T12:38:04.840000 @@ -244060,7 +244062,7 @@ CVE-2024-27975,0,0,5e723b988881d768c48479414306df95a821f21a86f27f09cadd1c6d52236 CVE-2024-27976,0,0,f3b1e833dad783111ddd8bfbbe0149eef66e07b7a8072b5581df7564368c462e,2024-04-19T13:10:25.637000 CVE-2024-27977,0,0,79115d830f48a29f88dcdaaca48ae6ee1fb6d0fb09d17cc8101a8fadff78d08c,2024-04-19T13:10:25.637000 CVE-2024-27978,0,0,e9674be0e16d316b4e2f9c28404921788d0b6676687576369bca16c3012670cc,2024-04-19T13:10:25.637000 -CVE-2024-2798,0,0,21e436f667c3c76cb5f2c07c9f81ccea19a79dd780b17ce51d0666b51470d984,2024-04-23T06:15:07.143000 +CVE-2024-2798,0,1,ef363290583ea8fbea084f3f83308db5f7af67c2905e490208724743ab38649d,2024-04-23T12:52:09.397000 CVE-2024-27981,0,0,bca4d502eb0003b495c2e3eabf4c8b77f995ffb842787b13a54996fb18ec7ff9,2024-04-05T12:40:52.763000 CVE-2024-27983,0,0,48b00542bfe0407141490fb6286509a0a18be683ecd066fca326b2c27e57f8c3,2024-04-20T02:15:06.660000 CVE-2024-27984,0,0,ee279ea71cab569d834a91520f5be7e4eb6eb4d684563974daf49b55af180ddb,2024-04-19T13:10:25.637000 @@ -244069,7 +244071,7 @@ CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d0260198 CVE-2024-27987,0,0,457341cfe208a4dd4f1ca3a12fe23df96b337000dbd585aed58689be29e5bec4,2024-03-15T12:53:06.423000 CVE-2024-27988,0,0,6c9106d9d93540022c2645bd4805400b787b700ca5be437ad0fb1c8ff1ee9be2,2024-04-11T12:47:44.137000 CVE-2024-27989,0,0,b74d1fab0316c439670e13d6ca0bb34eb2d1548d6234fefc31480e33b2f7df2d,2024-04-11T12:47:44.137000 -CVE-2024-2799,0,0,bfc0b11d3665998e42f5e165818294484e3b2a4809bfd417d40cf64581b6d74c,2024-04-23T06:15:07.417000 +CVE-2024-2799,0,1,9db541a4a294db65d198468a4160524d1cc3b2cab37a5bd2e04ce13a063dd4d8,2024-04-23T12:52:09.397000 CVE-2024-27990,0,0,df25e8dbaefe3a11a25da19c2008c6b4ec9f7383734455218851ceae8f43e308,2024-04-11T12:47:44.137000 CVE-2024-27991,0,0,36f883d0dbe2d030fe1b02c54d7115774c5d98e58b51c740fdf9f85a9e38a2e6,2024-04-11T12:47:44.137000 CVE-2024-27992,0,0,4c4ec466b544e71b7536bee00d1d61b3e4a0ad3df5ab4cd688e5c81388056454,2024-04-11T12:47:44.137000 @@ -244464,7 +244466,7 @@ CVE-2024-28871,0,0,afc28d49a83d8eabefecf413603caf0043f414fa513c9500837e2c75462e6 CVE-2024-28878,0,0,fe5b4dea6079affbe530b6afc0ec6cbc2c58efa98e54aaf61e9565b0ce4541ce,2024-04-15T13:15:51.577000 CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000 CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000 -CVE-2024-28890,0,0,522af5a98fb8ca91d8b44d26fb136ad7ffffeb796e0f0844ff2f140d7220b937,2024-04-23T05:15:49.260000 +CVE-2024-28890,0,1,9dae4a32452d4c238c84193167d3f8528617bb8ee93882e0c116e3ba82982853,2024-04-23T12:52:09.397000 CVE-2024-28891,0,0,d3e45bd47b45b967827b685dc5aca79c502a599b4c4b2ae06f1259844016862c,2024-03-22T12:45:36.130000 CVE-2024-28894,0,0,139b37292842325266e36fcf501a8211453c4135dbf7a79b4d495c356e7cd07a,2024-04-15T13:15:31.997000 CVE-2024-28895,0,0,e719d13135e97e941113ab974fe7dd84c43c28aacb52b0a20894b149f6e995bb,2024-04-01T01:33:21.910000 @@ -244725,7 +244727,7 @@ CVE-2024-2934,0,0,0a91524619de13afaff0e82d7a21ecc81f28b80f897e74dbcf5f2c4795f84a CVE-2024-2935,0,0,03b2e13118238c25a371886663ff5ca99f3babe087c5e23aed7873fb02fb806f,2024-04-11T01:25:41.850000 CVE-2024-2936,0,0,939d0b63a99773a9af28992aa96fda3d6af92afdee01445b26fbf5b1e7eb245c,2024-03-29T12:45:02.937000 CVE-2024-29366,0,0,7401048215b84763b7b2374bbab17e21709c21accf205850b7210511d30d6293,2024-03-22T19:02:10.300000 -CVE-2024-29368,0,0,b2fb1a5d45a101f827338a5ca2925b1e6be000e87c6951b2c0bef7990fa345fc,2024-04-22T21:15:49.043000 +CVE-2024-29368,0,1,ebfc1e19b0921e6b3ba960ec37fbdf00205266214a9fd474b282643da9277c74,2024-04-23T12:52:26.253000 CVE-2024-29374,0,0,dd275404ab360479a756d96aca2b6517b11bd3239b0ee4b1b68a18e9bbec3822,2024-03-21T19:47:03.943000 CVE-2024-29375,0,0,61c42a83ac8fdf63093e9fa8c57bcfe142ca6a7e368bf61cc8c311f84268ba4d,2024-04-04T12:48:41.700000 CVE-2024-29376,0,0,396d2086661367bf2f120a5a23cedf0a6063f8b47eb6959047bd018cf7f6b2b3,2024-04-22T19:24:06.727000 @@ -245452,6 +245454,7 @@ CVE-2024-30737,0,0,1c036a16278ee8ea2e333e89f0d66457a587f7e2e9da86fd57591a8972289 CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000 CVE-2024-3078,0,0,de9e294582cbb558bf2417239a323549d99f034f1b581828b43e34b1ad1f5683,2024-04-11T01:25:52.940000 CVE-2024-30799,0,0,eae5bca102ad0c1fe3f236f7e51af89eca892740403953a6086f43b81ad7d92b,2024-04-22T13:28:43.747000 +CVE-2024-30800,1,1,017770c8d8dc17c7d67d8fc770f953349d662c5623fd132d5a66e83de6189441,2024-04-23T13:15:46.700000 CVE-2024-30806,0,0,3c4bbd71defb52c4de24f9ad1626459edef6b60997b976e6d74aead4ee0b3b0f,2024-04-02T20:31:58.463000 CVE-2024-30807,0,0,8463e04fd42dedab289dad3fe1621f8f66d69fb63942da8a4e7f4baade23226e,2024-04-02T20:31:58.463000 CVE-2024-30808,0,0,3edb296009dfb16a5061a2505986b3903e36250320b7a7a1ea6af0d775f588e5,2024-04-02T20:31:58.463000 @@ -245545,7 +245548,7 @@ CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0 CVE-2024-31031,0,0,29fa87d48aad0a0bc20057b1b9ecb42c0a06bf12b16eb69819fa3b6a4f2669e1,2024-04-17T20:08:21.887000 CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000 CVE-2024-31033,0,0,200340e7b08fbb0d6701818d4b83bef89c21119b7d9fe7f5be450bb2b1edb614,2024-04-11T01:25:48.953000 -CVE-2024-31036,0,0,59affa21405d25f7d7f4aaa77f6b92475c58d92809aadc797bc272693561d4c1,2024-04-22T22:15:07.400000 +CVE-2024-31036,0,1,909c6e2eb879d6c5010d6c5c1d0b605640db140d047e5e64355a95d48cb1e70f,2024-04-23T12:52:26.253000 CVE-2024-31040,0,0,58d694e98ef6e322b940345b4415e080b141132f654a38c35a41dac24f1e6dc0,2024-04-17T20:08:21.887000 CVE-2024-31041,0,0,55cb17ccb9a4ccc47749a0a1f025025c536447c530ceaeb2d7f75919ad09c350,2024-04-17T20:08:21.887000 CVE-2024-31047,0,0,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000 @@ -245555,7 +245558,7 @@ CVE-2024-31063,0,0,8c5e031664c3b218697e91183f663111a47f52e7fd5496cafc4f238d7a0c4 CVE-2024-31064,0,0,f87fea954d6623f92ad98dc571744769b0a41ba2a8ecac509cf34a5bc1aaafc6,2024-03-28T20:53:20.813000 CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000 CVE-2024-31069,0,0,d29f1e01bd410bc9e289e23142033a3c4695bcaf7cee5af8670edc7046e0bf75,2024-04-15T13:15:51.577000 -CVE-2024-31077,0,0,5e70a5b93565325c41d3654d0d9da55f442014552ad5996917e7bf0ff0b812f1,2024-04-23T05:15:49.323000 +CVE-2024-31077,0,1,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000 CVE-2024-31080,0,0,e119d7df475aacadb30c21c56f7423850172683be264bf07be811aba439e59e4,2024-04-19T23:15:11.210000 CVE-2024-31081,0,0,325d39ddb700558fd97dc406aa6a705450eef92b871ed7f9ac57a8809deb6a92,2024-04-19T23:15:11.290000 CVE-2024-31082,0,0,5bd47d789b65017aa198a3c2ac34b0aa429ab490a4fcd5200779dbcd7d5b3ef9,2024-04-04T16:33:06.610000 @@ -245819,7 +245822,7 @@ CVE-2024-31745,0,0,ca5ec1c092fce054af70d410aee2649145d7a18036901e509dca6c0e74718 CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000 CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000 CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000 -CVE-2024-3177,0,0,4188435cf2eb3b06c526aa46bc19d8a49354941ecbdc9288f83e4d38423ff0a7,2024-04-22T23:15:51.180000 +CVE-2024-3177,0,1,0ec6cd116e7d510a9fccbf5b405a9ca182489a9307c7005a7220e6a302563bc9,2024-04-23T12:52:26.253000 CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000 CVE-2024-31783,0,0,39c4df7f07fa9e66dc5d42dd16bc0981c0d6511a0c96852796a6de0ccb03c2ac,2024-04-16T13:24:07.103000 CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000 @@ -245845,11 +245848,11 @@ CVE-2024-31841,0,0,de5efd40e0d92babbab87030506b1a212fb4afe9f3f9b49fa0c7d8acedda7 CVE-2024-31846,0,0,4aa9b2c36e227ec317e3797135e2468ef28cbbea439839bcc511c8ec99315bbc,2024-04-19T16:19:49.043000 CVE-2024-31848,0,0,2da60f6a287cac48661bc0aa0bb0ac92caa20fc3ae4255bef230dfecf644c92e,2024-04-08T18:49:25.863000 CVE-2024-31849,0,0,f45798bfe1f17890c1c9f615c3d632efe82fbe29dd84fe4753d6d6beae3b4f6a,2024-04-08T18:49:25.863000 -CVE-2024-3185,0,1,7d5aee3d07be9ec39704ac3d9974706c9ad0674f1443c2cd3364d807869aabfe,2024-04-23T09:15:07.023000 +CVE-2024-3185,0,1,7fcf61647d547b77181d5225cd4d3f1f2099e2653d1cd7f2d6fbb610b985c0ed,2024-04-23T12:52:09.397000 CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44b6d,2024-04-08T18:49:25.863000 CVE-2024-31851,0,0,0e8250a21123e214b1f09f2b325f0d0e22e98cb6715480d7ac13d673f761eb46,2024-04-08T18:49:25.863000 CVE-2024-31852,0,0,7a968282e2d23775fda0d6edce03c38caf21ca868b2fca3251339d962c2ec4c6,2024-04-08T18:49:25.863000 -CVE-2024-31857,0,0,25cf386d472a6a9dd436a170b897e41bdd36b8428ebda30686b5e9656f982c23,2024-04-23T05:15:49.377000 +CVE-2024-31857,0,1,3e7ac60afeec75094fbcaec8b53e1a238b7bcb05ca078ef7a1edb4dbe4dfc654,2024-04-23T12:52:09.397000 CVE-2024-31860,0,0,55dd12597bf39ae8e0517c5d55b7ea30406697589bf4efd38a9030f7ffb75da9,2024-04-09T12:48:04.090000 CVE-2024-31861,0,0,2ef21b0cb7540121255e11559e1c009c67fcac815944858c998e249e0cd71735,2024-04-11T12:47:44.137000 CVE-2024-31862,0,0,9f707e95c44d810f3a15296bc63963399801058986b2544d08155d8eb18bc340,2024-04-09T12:48:04.090000 @@ -245929,10 +245932,10 @@ CVE-2024-3203,0,0,d460cfbc8661b4424cc0984f526a676bb0961256fc9d04a7d500e891870298 CVE-2024-32035,0,0,9f9419e7b7ca688ca6c807b99c4196d3fdd26d305c290e1d723cf412a79167b9,2024-04-16T13:24:07.103000 CVE-2024-32036,0,0,4358f457ff05e2fb3005eccdac6fca8cb869be3ffa209c190e441f2c4aed7dbe,2024-04-16T23:15:09.173000 CVE-2024-32038,0,0,0c62c1bb60ae59f0486be34fe779022cf62ebed910094f07560f60e059fb8333,2024-04-19T16:19:49.043000 -CVE-2024-32039,0,0,903d6f1b801ce3cb1cf30fb63096cefc285997d688eb683fcfe664b5835eba84,2024-04-22T21:15:49.090000 +CVE-2024-32039,0,1,ad4990c66c843cfb78c18ddf4863c9df097d3c92a62d93c490b95501745f6176,2024-04-23T12:52:26.253000 CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000 -CVE-2024-32040,0,0,3766545a4f13c59ba4d4b4d068bd390255fef99cd14416b0ba9f81ad55a8bd93,2024-04-22T21:15:49.290000 -CVE-2024-32041,0,0,04b89046e3d0ca3229dfcf282ef96cdae99675e6240ef182516afb2b8e764edc,2024-04-22T21:15:49.477000 +CVE-2024-32040,0,1,c9e8a9bafebd4e002463be520ee967b3c928ddf4cec6865e7aa23fa1d81b2834,2024-04-23T12:52:26.253000 +CVE-2024-32041,0,1,e88f61c8c702a5d00724562a1be23c2ca0fc9ec03e84f95db2dfed035982cfb4,2024-04-23T12:52:26.253000 CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000 CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000 CVE-2024-32079,0,0,da7c5fc89984eb26823f30faeb9a07fc0733d153f127ad026564ff0d33e59be6,2024-04-15T13:15:31.997000 @@ -246003,7 +246006,7 @@ CVE-2024-32206,0,0,75e2f6344ef11995a7b224164fb98cef520a3da698959b3897e594f3d6e35 CVE-2024-3221,0,0,feefc929b27a3432f5d1352d15fe99f1f6ccd294cecb07c343d15630058ba883,2024-04-11T01:25:56.367000 CVE-2024-3222,0,0,66f6b4b9196c6c0a91ef8acd4cd0373a609da64e89b651a11374a40389e0fbce,2024-04-11T01:25:56.443000 CVE-2024-3223,0,0,9ffc982a7efad24c324809c3c91bef1f04ff8280442a22bc3b8b997888a9a5ba,2024-04-11T01:25:56.520000 -CVE-2024-32238,0,0,94ecef49732194650c203704488bc0b79a53c465c93001f6f8f1542de7946f78,2024-04-22T20:15:07.630000 +CVE-2024-32238,0,1,0e920ec9ded0c0837401c703af1964a27843eb631a1c2ab20523a0b29f896ad3,2024-04-23T12:52:30.940000 CVE-2024-3224,0,0,c02e228ce7415d482e2413c615262ec703d9597aa6708474ae81bc765129424f,2024-04-11T01:25:56.600000 CVE-2024-3225,0,0,756f5e08f46ab3796e26d62cd11cd06a14dd07d1ee049ee62586436225e04f96,2024-04-11T01:25:56.680000 CVE-2024-32254,0,0,0a822eba06a834cf336156a0938a7461bb1c4b55ddb75ffba99f3f6b4a1c1462,2024-04-17T12:48:31.863000 @@ -246058,9 +246061,9 @@ CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75 CVE-2024-32368,0,0,9c8576a3d1f1b62a70cacd6450f34a9ed8bf7b0c58e8707835f5fedae490db3f,2024-04-22T19:24:12.920000 CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000 CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000 -CVE-2024-32394,0,0,7cc3b3f3c56a0cd88d7f07ffeeee92eac04f5586caffaf5b812f8c10697a9b00,2024-04-22T21:15:49.657000 -CVE-2024-32399,0,0,40453e37a9d27fb351270e340117d3028138554e32350bcb25c71c2e15cf0ec2,2024-04-22T20:15:07.683000 -CVE-2024-32405,0,0,cd4abce15bd5cb1377317eccf2c7ee074ab0be4cd112d0ba830261b578da6355,2024-04-22T20:15:07.737000 +CVE-2024-32394,0,1,5f3cc70e4b86c8028147d2489cef40fa6c9285878a28bdb0855878990e97443a,2024-04-23T12:52:26.253000 +CVE-2024-32399,0,1,881ee2dd975bc6f828957c741f38d2e9a20065eb3fba67ea84e4e0b7e3e06627,2024-04-23T12:52:30.940000 +CVE-2024-32405,0,1,3981342fdb5111e1ad684c404fe5fa643bf161596abde4f7fd085ddcbb79a5d7,2024-04-23T12:52:26.253000 CVE-2024-32407,0,0,04bdb1c21d2d45016e5f7565a6490533ba649bcc5c4dc99b7e34c030532cab3a,2024-04-22T19:24:06.727000 CVE-2024-32409,0,0,2cc0bf26ecd8938fd89992a98bae2541af2d19072f0bc8cdc919759b6ea980aa,2024-04-19T16:19:49.043000 CVE-2024-32418,0,0,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000 @@ -246095,10 +246098,10 @@ CVE-2024-32454,0,0,82612665e825c6121646d06374d65bca8862992c0c337ca5fb468894f9c7a CVE-2024-32455,0,0,e310d9ab26897191bedf34ef484874a672ce976e6db5d528b2061e5197a0cfa7,2024-04-17T12:48:31.863000 CVE-2024-32456,0,0,c0a0240c7bede6707c2eded61ccd88c169f1ed302e5ff3046ec6dac746537832,2024-04-17T12:48:07.510000 CVE-2024-32457,0,0,7fd7ce0ef138de93b6c3b9f686be4ed7bf60ffc47479de2dc6e171832d6a4fe7,2024-04-17T12:48:07.510000 -CVE-2024-32458,0,0,989b13b43b54d8f9cae040df7c674dd8954010e1c670a628aa0cd71bc829f1f5,2024-04-22T21:15:49.707000 -CVE-2024-32459,0,0,b6a2b85c474d6d273e8772c0703d0fd9ae9420c57a4e08e0484ab20fd240e8bb,2024-04-22T22:15:07.463000 -CVE-2024-32460,0,0,b845923fc459d84695a94a20e151c8f5df593861653d803b32fbe677bc895e1e,2024-04-22T22:15:07.647000 -CVE-2024-32461,0,0,83d22b222d6b085342ae6ac86da8ce1f6b9f8b689b2e3ba283ede0f14ce6e3f6,2024-04-22T22:15:07.840000 +CVE-2024-32458,0,1,63f1a521197c952f60c25934e7fd7aa3c850cb789e0fbf4fc9820f82322003bd,2024-04-23T12:52:26.253000 +CVE-2024-32459,0,1,d31dd58136316769d63b8c95928f52be7e44ec5e5809b7af370f96f2aca14313,2024-04-23T12:52:26.253000 +CVE-2024-32460,0,1,fc58ca5ee1d47b6a3e46a6c825461997a8b177fb47b38edb8831274c3530e6c9,2024-04-23T12:52:26.253000 +CVE-2024-32461,0,1,3941d8bd271b020582637450c6381a991de4b9ffa39f4db030841834b9e2af51,2024-04-23T12:52:26.253000 CVE-2024-32462,0,0,a3aed35daade2ee454524a5ebc934210d89481f944e09c871e8061833830b63d,2024-04-21T03:15:45.827000 CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000 CVE-2024-32466,0,0,0986c266c64cc5e4b364446dfb796a6c4980d483c5a2beb3f21f15de4cb49c0b,2024-04-18T18:25:55.267000 @@ -246110,9 +246113,9 @@ CVE-2024-32474,0,0,adf2e54d1f50eac76d6eed4deebd0da24270aeb71946944c9f131a9545119 CVE-2024-32475,0,0,0fc7232a86aa0c1544df06e871c45b3dd3b0f61d5e2b0b45727dd45ce07af33f,2024-04-18T18:25:55.267000 CVE-2024-32477,0,0,edf9feceec657c5323b0a5bdd9c7c512982639e1cf50dad09f7080d975a64ba8,2024-04-19T13:10:25.637000 CVE-2024-32478,0,0,767d0906439929f5e4e53d4d2396aabddb8a0de51e7967f13464fca079c7076f,2024-04-19T16:19:49.043000 -CVE-2024-32479,0,0,4cf43690c9d0407b6643c2c4c1ff406d9dc16127b06823a7a9d52f9aa8cac76e,2024-04-22T22:15:08.027000 +CVE-2024-32479,0,1,9f233b992ed22cd02276821942e34be3b1cd724f5562f573e840e7a10cf66aba,2024-04-23T12:52:26.253000 CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000 -CVE-2024-32480,0,0,48d5eafc84d47aa80e4ad469390e78c3add13778656b7bdca54179d867e858ee,2024-04-22T23:15:50.440000 +CVE-2024-32480,0,1,f740881091f1f05e0445ba97b5de61d4d063547c57ff7478943e1cd018db3728,2024-04-23T12:52:26.253000 CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000 CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000 CVE-2024-32489,0,0,cbc8895e7f5e99c09f7bd505220fcc5514b4573939580e3f381a933acf3c9ef0,2024-04-15T13:15:31.997000 @@ -246227,9 +246230,9 @@ CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504 CVE-2024-32644,0,0,1c6536d9b118a22e007df0508c4274faf4a9f6bb52ca2e5c9b157aa559740e67,2024-04-19T16:19:49.043000 CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc6df,2024-04-19T16:19:49.043000 CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000 -CVE-2024-32653,0,0,15746b291b5be192848135c0c6fd678673b4bcbf809efc95adb9fcdbf0746ddd,2024-04-22T23:15:50.630000 -CVE-2024-32656,0,0,e07ca629d22e469dec44e49bf609e2394a8cdf2f0a281225759204e05756045e,2024-04-22T23:15:50.817000 -CVE-2024-32657,0,0,d75a2dbf2d53b439d4955d8a51cd17809b320c82c440e545c3087705382adb9e,2024-04-22T23:15:50.997000 +CVE-2024-32653,0,1,96a4de58183f8a4c5475803e77d708dc553ab0aba5c22712929dba4355cb603d,2024-04-23T12:52:26.253000 +CVE-2024-32656,0,1,507ca72541b43d2bb1e3f8cba739ba39a5095ac212b37ee6cfc977f3944f903a,2024-04-23T12:52:26.253000 +CVE-2024-32657,0,1,45665c321c855eccec4d820153233a5ab3c0184c9eb39067bd012d7165ff1a87,2024-04-23T12:52:26.253000 CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb32240,2024-04-10T13:23:38.787000 CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 CVE-2024-32681,0,0,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000 @@ -246260,7 +246263,7 @@ CVE-2024-32746,0,0,15529f833c25b7b5b5022877593c49d5afec10018bbf65b56334a694e0bc4 CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000 CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000 CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000 -CVE-2024-3293,0,0,96b18d34a2e2a67e831d502d7277c02c7af81e51afa5ce9e95357ddd8d071569,2024-04-23T02:15:48.390000 +CVE-2024-3293,0,1,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000 CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000 CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000 CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000 @@ -246352,7 +246355,7 @@ CVE-2024-3464,0,0,0c53100717f2f28c54c57fbaaef472d29e3cb0ff81ebf61eb104a899922afe CVE-2024-3465,0,0,a42aecf57f43969ec60c90b90013ebe0e449783aa33103b39be184486d2b2ca9,2024-04-11T01:26:03.697000 CVE-2024-3466,0,0,06b3d0b5c629cfcd72994ab03bcc3d914522a60f9b439b6d13775db50704418a,2024-04-11T01:26:03.777000 CVE-2024-3470,0,0,630f5f35df37b6b978ca7687ce76aaec305cc639bf4ca3fb3b6aed08fe283bb6,2024-04-19T16:19:49.043000 -CVE-2024-3491,1,1,faf3b6d379e6629535a9da007f12e5993e23962b408fdc889f4de5a26877ec61,2024-04-23T11:15:45.967000 +CVE-2024-3491,0,1,22475c1a2c147b599aec5499497f20fc9fa37c1dc206a0659b8807ac37f4f324,2024-04-23T12:52:09.397000 CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000 CVE-2024-3505,0,0,d46d6b7d35449c168e9ff66f3c93f973f2e1e579109b94b88c63ad7baac2b7b8,2024-04-15T13:15:31.997000 CVE-2024-3512,0,0,0bde0dc5c2508608f7df2e92075f3b315e69961d5bc617a9cf046c486aab6ef4,2024-04-10T13:23:38.787000 @@ -246411,8 +246414,8 @@ CVE-2024-3652,0,0,a467de8b64f8147acdef48edc35752a89afb7d5856e17302ea9c57335ed0f6 CVE-2024-3654,0,0,7e2b4ab81bb1b43884c0db8e806df093bdf87a3fc5c587d83d67f54180b50daf,2024-04-19T16:19:49.043000 CVE-2024-3660,0,0,27de83d41a96740d974951cfc0f4ab32e626a768053ae4e7908802eefe823936,2024-04-17T12:48:31.863000 CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae70066e,2024-04-15T13:15:31.997000 -CVE-2024-3664,0,0,8aa56e3e9a106325054a4f102bf91cc6b5b5e266540265b47d44ed328856fa38,2024-04-23T08:15:45.177000 -CVE-2024-3665,1,1,84d9a6ae54b89e9f03596e34f3b2e2c9da62b8d2d5ab31800dba00af2f75d21a,2024-04-23T10:15:06.923000 +CVE-2024-3664,0,1,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000 +CVE-2024-3665,0,1,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000 CVE-2024-3672,0,0,b7de207aaf40bb160711ae23312b83bd4f3d950fbf99cf282ee38b1e3854739f,2024-04-16T13:24:07.103000 CVE-2024-3684,0,0,693360cd268d4b961448865406a570238e347409fa389434d499b6fc0f790dc0,2024-04-19T16:19:49.043000 CVE-2024-3685,0,0,2d04d41485feb8a52bd1142022b18bc3f24805efb219d419e0508c4773991260,2024-04-15T13:15:51.577000 @@ -246435,7 +246438,7 @@ CVE-2024-3719,0,0,f291ba68ba6e93978bc9c39b527e377db4603f9cf0b58326694ce4a62db069 CVE-2024-3720,0,0,548129ada226460eeed0bbe63afac7cb948fd16d011c5ffd900fa7625265466b,2024-04-15T13:15:31.997000 CVE-2024-3721,0,0,e2cd22ce24461bd25c9ec7cb92e927b75c559a9256137266b8480ef946c8e320,2024-04-15T13:15:31.997000 CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000 -CVE-2024-3732,1,1,0cd92d835ab1d877a1b01b9882d820039573565a8ca882f0a6286949b787f6dc,2024-04-23T10:15:07.537000 +CVE-2024-3732,0,1,47b10b9e83ea0bac70990c3295c25b56cc73657af82bc6f5c1f4fd37930f5edb,2024-04-23T12:52:09.397000 CVE-2024-3735,0,0,9300dd852c0feb2e50ee641119a226f214818e2f2843b357387d0b439146ec2c,2024-04-15T13:15:31.997000 CVE-2024-3736,0,0,8e1e49a70c099a42d25fc2ef350c0eb9767073e2fa96b7ffe6bc4d265c3f8c23,2024-04-15T13:15:31.997000 CVE-2024-3737,0,0,1990edd10a050a438850658c5a42b3f737afd31a7356a3decab691dfe1bc7cad,2024-04-15T13:15:31.997000 @@ -246515,7 +246518,7 @@ CVE-2024-3879,0,0,9c5ce4d1a3fc01133b3321115c4ccd096980cfe5baa042c4c9bf7b273029d2 CVE-2024-3880,0,0,237e3bb93a0b113a1c50538806f68b5377561349bd4f47a9139ec72cd356417d,2024-04-17T12:48:31.863000 CVE-2024-3881,0,0,9055ecf63e1aedc7e2787afc56e67bc831564d5ee15f418ef1b408c81c24bb16,2024-04-17T12:48:31.863000 CVE-2024-3882,0,0,846c922d5cf92347db05da515dc041ccc83bdcd548fefc386c188946857d0db7,2024-04-17T12:48:31.863000 -CVE-2024-3889,0,0,529f3bbc2e9505f214020728f19282b593b604b7ec4622036c61b5ecf60e556c,2024-04-23T06:15:07.700000 +CVE-2024-3889,0,1,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000 CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000 CVE-2024-3905,0,0,666ba6ab36ae43f19518f88ffcc3dc3578e7336eef9fa01b067c40b574dea570,2024-04-17T12:48:07.510000 CVE-2024-3906,0,0,dd9841bce880aeaa28c9d51ba9e314b7fd3abe4741e8e805c9e3a8477cebd832,2024-04-17T12:48:07.510000 @@ -246523,6 +246526,7 @@ CVE-2024-3907,0,0,b4e4be60c17ce688486097ec16bf10c01177f6c8b54984e903905f799945f5 CVE-2024-3908,0,0,26db16f32c52be83b374f19657727a3a2a3db16f8ab3cda20dc3ad146f877b39,2024-04-17T12:48:07.510000 CVE-2024-3909,0,0,c5efb647be20bf9f2ba452fa9666b153466b94d0e5f3c713649def6568acf5a0,2024-04-17T12:48:07.510000 CVE-2024-3910,0,0,7d8aafa4b35964a72cdc3d08dd6c7b1615ef522d553c6c78d413b0e25fdc718e,2024-04-17T12:48:07.510000 +CVE-2024-3911,1,1,11f3bec5f1587eb22151392a8d155bb89d10f83f95efada567bdaf5751a2af93,2024-04-23T13:15:46.770000 CVE-2024-3914,0,0,bfcdc28110b7c28097238d4f47d5360ee99989ca670a402fe72b8be56b94f618,2024-04-23T02:15:49.160000 CVE-2024-3928,0,0,114c97f372c53f33fe3b26cd091686f1eb78a3749714814b77901a77b62a0107,2024-04-18T13:04:28.900000 CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000 @@ -246537,5 +246541,5 @@ CVE-2024-4020,0,0,fd9bedf3f2e4b41e8bc994bd6387cb7e34a5d92d9443a0588f231180a5be89 CVE-2024-4021,0,0,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210a6,2024-04-22T15:15:47.813000 CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000 CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000 -CVE-2024-4031,0,0,b8510946ad028bee7307984f52b83ceb9689ead2308e23f275d8d966c6713d87,2024-04-23T07:15:43.087000 -CVE-2024-4040,0,0,973a0d3e869c71c707f4ed9e103d14c0135314b263cd796fdd1f54f7ba104b13,2024-04-22T21:15:49.890000 +CVE-2024-4031,0,1,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000 +CVE-2024-4040,0,1,1c076b2ab70ecb1e80edff07a45eda641d4fa881fea89ccf32a60b6e73154ae3,2024-04-23T12:52:26.253000