From b32216df61628ed6d12cd6051a06365cfe84d951 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 15 Nov 2024 15:03:34 +0000 Subject: [PATCH] Auto-Update: 2024-11-15T15:00:31.902868+00:00 --- CVE-2013/CVE-2013-39xx/CVE-2013-3900.json | 104 ++-- CVE-2017/CVE-2017-132xx/CVE-2017-13227.json | 8 +- CVE-2021/CVE-2021-37xx/CVE-2021-3740.json | 8 +- CVE-2021/CVE-2021-37xx/CVE-2021-3741.json | 8 +- CVE-2021/CVE-2021-37xx/CVE-2021-3742.json | 8 +- CVE-2021/CVE-2021-38xx/CVE-2021-3838.json | 8 +- CVE-2021/CVE-2021-38xx/CVE-2021-3841.json | 8 +- CVE-2021/CVE-2021-39xx/CVE-2021-3902.json | 8 +- CVE-2021/CVE-2021-39xx/CVE-2021-3986.json | 8 +- CVE-2021/CVE-2021-39xx/CVE-2021-3987.json | 8 +- CVE-2021/CVE-2021-39xx/CVE-2021-3988.json | 8 +- CVE-2021/CVE-2021-39xx/CVE-2021-3991.json | 8 +- CVE-2022/CVE-2022-12xx/CVE-2022-1226.json | 8 +- CVE-2022/CVE-2022-18xx/CVE-2022-1884.json | 8 +- CVE-2022/CVE-2022-218xx/CVE-2022-21882.json | 20 +- CVE-2022/CVE-2022-219xx/CVE-2022-21919.json | 40 +- CVE-2022/CVE-2022-22xx/CVE-2022-2232.json | 8 +- CVE-2022/CVE-2022-316xx/CVE-2022-31666.json | 8 +- CVE-2022/CVE-2022-316xx/CVE-2022-31667.json | 8 +- CVE-2022/CVE-2022-316xx/CVE-2022-31668.json | 8 +- CVE-2022/CVE-2022-316xx/CVE-2022-31669.json | 8 +- CVE-2022/CVE-2022-316xx/CVE-2022-31670.json | 8 +- CVE-2022/CVE-2022-316xx/CVE-2022-31671.json | 8 +- CVE-2023/CVE-2023-01xx/CVE-2023-0109.json | 8 +- CVE-2023/CVE-2023-07xx/CVE-2023-0737.json | 8 +- CVE-2023/CVE-2023-23xx/CVE-2023-2332.json | 8 +- CVE-2023/CVE-2023-340xx/CVE-2023-34049.json | 8 +- CVE-2023/CVE-2023-356xx/CVE-2023-35659.json | 8 +- CVE-2023/CVE-2023-356xx/CVE-2023-35686.json | 8 +- CVE-2023/CVE-2023-389xx/CVE-2023-38920.json | 8 +- CVE-2023/CVE-2023-41xx/CVE-2023-4134.json | 4 +- CVE-2023/CVE-2023-44xx/CVE-2023-4458.json | 8 +- CVE-2023/CVE-2023-46xx/CVE-2023-4679.json | 8 +- CVE-2024/CVE-2024-07xx/CVE-2024-0787.json | 8 +- CVE-2024/CVE-2024-08xx/CVE-2024-0875.json | 8 +- CVE-2024/CVE-2024-101xx/CVE-2024-10104.json | 8 +- CVE-2024/CVE-2024-101xx/CVE-2024-10113.json | 8 +- CVE-2024/CVE-2024-101xx/CVE-2024-10146.json | 4 +- CVE-2024/CVE-2024-102xx/CVE-2024-10260.json | 8 +- CVE-2024/CVE-2024-103xx/CVE-2024-10311.json | 8 +- CVE-2024/CVE-2024-103xx/CVE-2024-10394.json | 8 +- CVE-2024/CVE-2024-103xx/CVE-2024-10396.json | 8 +- CVE-2024/CVE-2024-103xx/CVE-2024-10397.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10443.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10534.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10571.json | 4 +- CVE-2024/CVE-2024-105xx/CVE-2024-10582.json | 8 +- CVE-2024/CVE-2024-107xx/CVE-2024-10793.json | 8 +- CVE-2024/CVE-2024-108xx/CVE-2024-10825.json | 8 +- CVE-2024/CVE-2024-108xx/CVE-2024-10897.json | 8 +- CVE-2024/CVE-2024-109xx/CVE-2024-10921.json | 8 +- CVE-2024/CVE-2024-109xx/CVE-2024-10924.json | 8 +- CVE-2024/CVE-2024-109xx/CVE-2024-10962.json | 8 +- CVE-2024/CVE-2024-109xx/CVE-2024-10976.json | 8 +- CVE-2024/CVE-2024-109xx/CVE-2024-10977.json | 8 +- CVE-2024/CVE-2024-109xx/CVE-2024-10978.json | 8 +- CVE-2024/CVE-2024-109xx/CVE-2024-10979.json | 8 +- CVE-2024/CVE-2024-10xx/CVE-2024-1097.json | 8 +- CVE-2024/CVE-2024-111xx/CVE-2024-11120.json | 8 +- CVE-2024/CVE-2024-111xx/CVE-2024-11136.json | 8 +- CVE-2024/CVE-2024-111xx/CVE-2024-11182.json | 8 +- CVE-2024/CVE-2024-111xx/CVE-2024-11193.json | 4 +- CVE-2024/CVE-2024-112xx/CVE-2024-11206.json | 4 +- CVE-2024/CVE-2024-112xx/CVE-2024-11207.json | 8 +- CVE-2024/CVE-2024-112xx/CVE-2024-11208.json | 8 +- CVE-2024/CVE-2024-112xx/CVE-2024-11209.json | 8 +- CVE-2024/CVE-2024-112xx/CVE-2024-11210.json | 8 +- CVE-2024/CVE-2024-112xx/CVE-2024-11211.json | 8 +- CVE-2024/CVE-2024-112xx/CVE-2024-11212.json | 8 +- CVE-2024/CVE-2024-112xx/CVE-2024-11213.json | 8 +- CVE-2024/CVE-2024-112xx/CVE-2024-11214.json | 8 +- CVE-2024/CVE-2024-112xx/CVE-2024-11215.json | 8 +- CVE-2024/CVE-2024-112xx/CVE-2024-11237.json | 8 +- CVE-2024/CVE-2024-112xx/CVE-2024-11238.json | 137 ++++ CVE-2024/CVE-2024-112xx/CVE-2024-11239.json | 137 ++++ CVE-2024/CVE-2024-112xx/CVE-2024-11240.json | 141 +++++ CVE-2024/CVE-2024-12xx/CVE-2024-1240.json | 8 +- CVE-2024/CVE-2024-16xx/CVE-2024-1682.json | 8 +- CVE-2024/CVE-2024-217xx/CVE-2024-21783.json | 8 +- CVE-2024/CVE-2024-217xx/CVE-2024-21799.json | 8 +- CVE-2024/CVE-2024-218xx/CVE-2024-21808.json | 8 +- CVE-2024/CVE-2024-218xx/CVE-2024-21820.json | 8 +- CVE-2024/CVE-2024-218xx/CVE-2024-21850.json | 8 +- CVE-2024/CVE-2024-218xx/CVE-2024-21853.json | 8 +- CVE-2024/CVE-2024-221xx/CVE-2024-22185.json | 8 +- CVE-2024/CVE-2024-231xx/CVE-2024-23198.json | 8 +- CVE-2024/CVE-2024-233xx/CVE-2024-23312.json | 8 +- CVE-2024/CVE-2024-237xx/CVE-2024-23715.json | 8 +- CVE-2024/CVE-2024-239xx/CVE-2024-23918.json | 8 +- CVE-2024/CVE-2024-239xx/CVE-2024-23919.json | 8 +- CVE-2024/CVE-2024-249xx/CVE-2024-24984.json | 8 +- CVE-2024/CVE-2024-249xx/CVE-2024-24985.json | 8 +- CVE-2024/CVE-2024-255xx/CVE-2024-25563.json | 8 +- CVE-2024/CVE-2024-255xx/CVE-2024-25565.json | 8 +- CVE-2024/CVE-2024-256xx/CVE-2024-25647.json | 8 +- CVE-2024/CVE-2024-25xx/CVE-2024-2550.json | 8 +- CVE-2024/CVE-2024-25xx/CVE-2024-2551.json | 8 +- CVE-2024/CVE-2024-25xx/CVE-2024-2552.json | 8 +- CVE-2024/CVE-2024-260xx/CVE-2024-26017.json | 8 +- CVE-2024/CVE-2024-272xx/CVE-2024-27200.json | 8 +- CVE-2024/CVE-2024-280xx/CVE-2024-28028.json | 8 +- CVE-2024/CVE-2024-280xx/CVE-2024-28030.json | 8 +- CVE-2024/CVE-2024-280xx/CVE-2024-28049.json | 8 +- CVE-2024/CVE-2024-280xx/CVE-2024-28051.json | 8 +- CVE-2024/CVE-2024-281xx/CVE-2024-28169.json | 8 +- CVE-2024/CVE-2024-288xx/CVE-2024-28881.json | 8 +- CVE-2024/CVE-2024-288xx/CVE-2024-28885.json | 8 +- CVE-2024/CVE-2024-289xx/CVE-2024-28950.json | 8 +- CVE-2024/CVE-2024-289xx/CVE-2024-28952.json | 8 +- CVE-2024/CVE-2024-290xx/CVE-2024-29076.json | 8 +- CVE-2024/CVE-2024-290xx/CVE-2024-29077.json | 8 +- CVE-2024/CVE-2024-290xx/CVE-2024-29079.json | 8 +- CVE-2024/CVE-2024-290xx/CVE-2024-29083.json | 8 +- CVE-2024/CVE-2024-290xx/CVE-2024-29085.json | 8 +- CVE-2024/CVE-2024-310xx/CVE-2024-31074.json | 8 +- CVE-2024/CVE-2024-311xx/CVE-2024-31154.json | 8 +- CVE-2024/CVE-2024-311xx/CVE-2024-31158.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31337.json | 8 +- CVE-2024/CVE-2024-314xx/CVE-2024-31407.json | 8 +- CVE-2024/CVE-2024-316xx/CVE-2024-31695.json | 8 +- CVE-2024/CVE-2024-320xx/CVE-2024-32044.json | 8 +- CVE-2024/CVE-2024-320xx/CVE-2024-32048.json | 8 +- CVE-2024/CVE-2024-324xx/CVE-2024-32483.json | 8 +- CVE-2024/CVE-2024-324xx/CVE-2024-32485.json | 8 +- CVE-2024/CVE-2024-326xx/CVE-2024-32667.json | 8 +- CVE-2024/CVE-2024-336xx/CVE-2024-33611.json | 8 +- CVE-2024/CVE-2024-336xx/CVE-2024-33617.json | 8 +- CVE-2024/CVE-2024-336xx/CVE-2024-33624.json | 8 +- CVE-2024/CVE-2024-33xx/CVE-2024-3379.json | 8 +- CVE-2024/CVE-2024-340xx/CVE-2024-34022.json | 8 +- CVE-2024/CVE-2024-340xx/CVE-2024-34023.json | 8 +- CVE-2024/CVE-2024-340xx/CVE-2024-34028.json | 8 +- CVE-2024/CVE-2024-341xx/CVE-2024-34164.json | 8 +- CVE-2024/CVE-2024-341xx/CVE-2024-34165.json | 8 +- CVE-2024/CVE-2024-341xx/CVE-2024-34167.json | 8 +- CVE-2024/CVE-2024-341xx/CVE-2024-34170.json | 8 +- CVE-2024/CVE-2024-347xx/CVE-2024-34719.json | 4 +- CVE-2024/CVE-2024-347xx/CVE-2024-34729.json | 8 +- CVE-2024/CVE-2024-347xx/CVE-2024-34747.json | 8 +- CVE-2024/CVE-2024-347xx/CVE-2024-34776.json | 8 +- CVE-2024/CVE-2024-34xx/CVE-2024-3447.json | 8 +- CVE-2024/CVE-2024-352xx/CVE-2024-35201.json | 8 +- CVE-2024/CVE-2024-352xx/CVE-2024-35245.json | 8 +- CVE-2024/CVE-2024-35xx/CVE-2024-3501.json | 8 +- CVE-2024/CVE-2024-35xx/CVE-2024-3502.json | 8 +- CVE-2024/CVE-2024-362xx/CVE-2024-36242.json | 8 +- CVE-2024/CVE-2024-362xx/CVE-2024-36245.json | 8 +- CVE-2024/CVE-2024-362xx/CVE-2024-36253.json | 8 +- CVE-2024/CVE-2024-362xx/CVE-2024-36275.json | 8 +- CVE-2024/CVE-2024-362xx/CVE-2024-36276.json | 8 +- CVE-2024/CVE-2024-362xx/CVE-2024-36282.json | 8 +- CVE-2024/CVE-2024-362xx/CVE-2024-36284.json | 8 +- CVE-2024/CVE-2024-362xx/CVE-2024-36294.json | 8 +- CVE-2024/CVE-2024-364xx/CVE-2024-36482.json | 8 +- CVE-2024/CVE-2024-364xx/CVE-2024-36488.json | 8 +- CVE-2024/CVE-2024-370xx/CVE-2024-37024.json | 8 +- CVE-2024/CVE-2024-370xx/CVE-2024-37025.json | 8 +- CVE-2024/CVE-2024-370xx/CVE-2024-37027.json | 8 +- CVE-2024/CVE-2024-372xx/CVE-2024-37285.json | 8 +- CVE-2024/CVE-2024-37xx/CVE-2024-3760.json | 8 +- CVE-2024/CVE-2024-383xx/CVE-2024-38383.json | 8 +- CVE-2024/CVE-2024-383xx/CVE-2024-38387.json | 8 +- CVE-2024/CVE-2024-384xx/CVE-2024-38479.json | 4 +- CVE-2024/CVE-2024-386xx/CVE-2024-38660.json | 8 +- CVE-2024/CVE-2024-386xx/CVE-2024-38665.json | 8 +- CVE-2024/CVE-2024-386xx/CVE-2024-38668.json | 8 +- CVE-2024/CVE-2024-392xx/CVE-2024-39285.json | 8 +- CVE-2024/CVE-2024-393xx/CVE-2024-39368.json | 8 +- CVE-2024/CVE-2024-396xx/CVE-2024-39609.json | 8 +- CVE-2024/CVE-2024-396xx/CVE-2024-39610.json | 8 +- CVE-2024/CVE-2024-397xx/CVE-2024-39707.json | 8 +- CVE-2024/CVE-2024-397xx/CVE-2024-39766.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39811.json | 8 +- CVE-2024/CVE-2024-404xx/CVE-2024-40404.json | 8 +- CVE-2024/CVE-2024-404xx/CVE-2024-40405.json | 8 +- CVE-2024/CVE-2024-404xx/CVE-2024-40407.json | 8 +- CVE-2024/CVE-2024-404xx/CVE-2024-40408.json | 8 +- CVE-2024/CVE-2024-404xx/CVE-2024-40410.json | 8 +- CVE-2024/CVE-2024-404xx/CVE-2024-40443.json | 8 +- CVE-2024/CVE-2024-405xx/CVE-2024-40579.json | 8 +- CVE-2024/CVE-2024-406xx/CVE-2024-40660.json | 4 +- CVE-2024/CVE-2024-406xx/CVE-2024-40661.json | 4 +- CVE-2024/CVE-2024-406xx/CVE-2024-40671.json | 4 +- CVE-2024/CVE-2024-408xx/CVE-2024-40885.json | 8 +- CVE-2024/CVE-2024-411xx/CVE-2024-41167.json | 8 +- CVE-2024/CVE-2024-412xx/CVE-2024-41206.json | 8 +- CVE-2024/CVE-2024-412xx/CVE-2024-41209.json | 8 +- CVE-2024/CVE-2024-412xx/CVE-2024-41217.json | 8 +- CVE-2024/CVE-2024-421xx/CVE-2024-42188.json | 8 +- CVE-2024/CVE-2024-424xx/CVE-2024-42499.json | 8 +- CVE-2024/CVE-2024-428xx/CVE-2024-42834.json | 8 +- CVE-2024/CVE-2024-430xx/CVE-2024-43080.json | 4 +- CVE-2024/CVE-2024-430xx/CVE-2024-43081.json | 4 +- CVE-2024/CVE-2024-430xx/CVE-2024-43082.json | 4 +- CVE-2024/CVE-2024-430xx/CVE-2024-43083.json | 8 +- CVE-2024/CVE-2024-430xx/CVE-2024-43084.json | 8 +- CVE-2024/CVE-2024-430xx/CVE-2024-43085.json | 4 +- CVE-2024/CVE-2024-430xx/CVE-2024-43086.json | 4 +- CVE-2024/CVE-2024-430xx/CVE-2024-43087.json | 4 +- CVE-2024/CVE-2024-430xx/CVE-2024-43088.json | 4 +- CVE-2024/CVE-2024-430xx/CVE-2024-43089.json | 4 +- CVE-2024/CVE-2024-430xx/CVE-2024-43090.json | 8 +- CVE-2024/CVE-2024-430xx/CVE-2024-43091.json | 4 +- CVE-2024/CVE-2024-43xx/CVE-2024-4311.json | 8 +- CVE-2024/CVE-2024-43xx/CVE-2024-4343.json | 8 +- CVE-2024/CVE-2024-450xx/CVE-2024-45099.json | 8 +- CVE-2024/CVE-2024-452xx/CVE-2024-45253.json | 8 +- CVE-2024/CVE-2024-452xx/CVE-2024-45254.json | 8 +- CVE-2024/CVE-2024-455xx/CVE-2024-45594.json | 8 +- CVE-2024/CVE-2024-456xx/CVE-2024-45642.json | 8 +- CVE-2024/CVE-2024-456xx/CVE-2024-45670.json | 8 +- CVE-2024/CVE-2024-457xx/CVE-2024-45784.json | 8 +- CVE-2024/CVE-2024-458xx/CVE-2024-45875.json | 8 +- CVE-2024/CVE-2024-458xx/CVE-2024-45876.json | 8 +- CVE-2024/CVE-2024-458xx/CVE-2024-45877.json | 8 +- CVE-2024/CVE-2024-458xx/CVE-2024-45878.json | 8 +- CVE-2024/CVE-2024-458xx/CVE-2024-45879.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47914.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47915.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47916.json | 8 +- CVE-2024/CVE-2024-482xx/CVE-2024-48284.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48966.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48967.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48970.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48971.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48973.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48974.json | 8 +- CVE-2024/CVE-2024-490xx/CVE-2024-49025.json | 8 +- CVE-2024/CVE-2024-493xx/CVE-2024-49362.json | 8 +- CVE-2024/CVE-2024-493xx/CVE-2024-49379.json | 4 +- CVE-2024/CVE-2024-497xx/CVE-2024-49776.json | 8 +- CVE-2024/CVE-2024-497xx/CVE-2024-49777.json | 8 +- CVE-2024/CVE-2024-497xx/CVE-2024-49778.json | 8 +- CVE-2024/CVE-2024-503xx/CVE-2024-50305.json | 4 +- CVE-2024/CVE-2024-503xx/CVE-2024-50306.json | 4 +- CVE-2024/CVE-2024-508xx/CVE-2024-50823.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50824.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50825.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50826.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50827.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50828.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50829.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50830.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50831.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50832.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50833.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50834.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50835.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50836.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50837.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50838.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50839.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50840.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50841.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50842.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50843.json | 8 +- CVE-2024/CVE-2024-509xx/CVE-2024-50955.json | 8 +- CVE-2024/CVE-2024-509xx/CVE-2024-50956.json | 8 +- CVE-2024/CVE-2024-509xx/CVE-2024-50968.json | 8 +- CVE-2024/CVE-2024-50xx/CVE-2024-5082.json | 4 +- CVE-2024/CVE-2024-50xx/CVE-2024-5083.json | 4 +- CVE-2024/CVE-2024-510xx/CVE-2024-51027.json | 8 +- CVE-2024/CVE-2024-511xx/CVE-2024-51156.json | 8 +- CVE-2024/CVE-2024-516xx/CVE-2024-51658.json | 8 +- CVE-2024/CVE-2024-516xx/CVE-2024-51659.json | 8 +- CVE-2024/CVE-2024-516xx/CVE-2024-51679.json | 8 +- CVE-2024/CVE-2024-516xx/CVE-2024-51684.json | 8 +- CVE-2024/CVE-2024-516xx/CVE-2024-51687.json | 8 +- CVE-2024/CVE-2024-516xx/CVE-2024-51688.json | 8 +- CVE-2024/CVE-2024-519xx/CVE-2024-51996.json | 8 +- CVE-2024/CVE-2024-51xx/CVE-2024-5125.json | 8 +- CVE-2024/CVE-2024-522xx/CVE-2024-52291.json | 8 +- CVE-2024/CVE-2024-522xx/CVE-2024-52292.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52302.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52308.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52369.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52370.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52371.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52372.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52373.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52374.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52375.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52376.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52377.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52378.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52379.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52380.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52381.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52382.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52383.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52384.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52393.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52396.json | 8 +- CVE-2024/CVE-2024-525xx/CVE-2024-52505.json | 8 +- CVE-2024/CVE-2024-525xx/CVE-2024-52524.json | 8 +- CVE-2024/CVE-2024-525xx/CVE-2024-52549.json | 8 +- CVE-2024/CVE-2024-525xx/CVE-2024-52550.json | 8 +- CVE-2024/CVE-2024-525xx/CVE-2024-52551.json | 4 +- CVE-2024/CVE-2024-525xx/CVE-2024-52552.json | 4 +- CVE-2024/CVE-2024-525xx/CVE-2024-52553.json | 8 +- CVE-2024/CVE-2024-525xx/CVE-2024-52554.json | 8 +- CVE-2024/CVE-2024-526xx/CVE-2024-52613.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5917.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5918.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5919.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5920.json | 8 +- CVE-2024/CVE-2024-60xx/CVE-2024-6068.json | 8 +- CVE-2024/CVE-2024-71xx/CVE-2024-7124.json | 8 +- CVE-2024/CVE-2024-74xx/CVE-2024-7404.json | 8 +- CVE-2024/CVE-2024-77xx/CVE-2024-7730.json | 8 +- CVE-2024/CVE-2024-77xx/CVE-2024-7787.json | 8 +- CVE-2024/CVE-2024-81xx/CVE-2024-8180.json | 4 +- CVE-2024/CVE-2024-86xx/CVE-2024-8648.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8961.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8978.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8979.json | 4 +- CVE-2024/CVE-2024-91xx/CVE-2024-9186.json | 8 +- CVE-2024/CVE-2024-93xx/CVE-2024-9356.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9413.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9465.json | 9 +- CVE-2024/CVE-2024-94xx/CVE-2024-9472.json | 4 +- CVE-2024/CVE-2024-94xx/CVE-2024-9476.json | 4 +- CVE-2024/CVE-2024-95xx/CVE-2024-9529.json | 8 +- CVE-2024/CVE-2024-96xx/CVE-2024-9609.json | 8 +- CVE-2024/CVE-2024-96xx/CVE-2024-9633.json | 8 +- CVE-2024/CVE-2024-96xx/CVE-2024-9693.json | 4 +- CVE-2024/CVE-2024-98xx/CVE-2024-9832.json | 8 +- CVE-2024/CVE-2024-98xx/CVE-2024-9834.json | 8 +- README.md | 64 +- _state.csv | 655 ++++++++++---------- 330 files changed, 2688 insertions(+), 1063 deletions(-) create mode 100644 CVE-2024/CVE-2024-112xx/CVE-2024-11238.json create mode 100644 CVE-2024/CVE-2024-112xx/CVE-2024-11239.json create mode 100644 CVE-2024/CVE-2024-112xx/CVE-2024-11240.json diff --git a/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json b/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json index 41fced2b17e..e1c5ab5eb6a 100644 --- a/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json +++ b/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json @@ -2,8 +2,8 @@ "id": "CVE-2013-3900", "sourceIdentifier": "secure@microsoft.com", "published": "2013-12-11T00:55:03.693", - "lastModified": "2024-11-14T21:15:06.097", - "vulnStatus": "Modified", + "lastModified": "2024-11-15T14:34:02.340", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-01-10", "cisaActionDue": "2022-07-10", @@ -22,8 +22,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", @@ -75,7 +95,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-347" } ] } @@ -89,48 +109,63 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", - "matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", - "matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372" + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AFD13A6-A390-4400-9029-2F4058CA17E2" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1FED4C9-B680-4F44-ADC0-AC43D6B5F184" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F513002-D8C1-4D3A-9F79-4B52498F67E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805" }, { "vulnerable": true, @@ -147,16 +182,6 @@ "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*", - "matchCriteriaId": "9F98AE07-3995-4501-9804-FEA5A87ADFAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*", - "matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", @@ -191,21 +216,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*", - "matchCriteriaId": "08627673-D381-4481-BD04-F56599C43105" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", - "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", - "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" } ] } diff --git a/CVE-2017/CVE-2017-132xx/CVE-2017-13227.json b/CVE-2017/CVE-2017-132xx/CVE-2017-13227.json index ce3c65aab5a..7001241ad91 100644 --- a/CVE-2017/CVE-2017-132xx/CVE-2017-13227.json +++ b/CVE-2017/CVE-2017-132xx/CVE-2017-13227.json @@ -2,13 +2,17 @@ "id": "CVE-2017-13227", "sourceIdentifier": "security@android.com", "published": "2024-11-14T23:15:05.013", - "lastModified": "2024-11-14T23:15:05.013", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the autofill service, the package name that is provided by the app process is trusted inappropriately. \u00a0This could lead to information disclosure with no additional execution privileges needed. \u00a0User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En el servicio de autocompletar, el nombre del paquete que proporciona el proceso de la aplicaci\u00f3n se considera de confianza de forma inapropiada. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-37xx/CVE-2021-3740.json b/CVE-2021/CVE-2021-37xx/CVE-2021-3740.json index f693509b657..8cb70346835 100644 --- a/CVE-2021/CVE-2021-37xx/CVE-2021-3740.json +++ b/CVE-2021/CVE-2021-37xx/CVE-2021-3740.json @@ -2,13 +2,17 @@ "id": "CVE-2021-3740", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:04.987", - "lastModified": "2024-11-15T11:15:04.987", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Session Fixation vulnerability exists in chatwoot/chatwoot versions prior to 2.4.0. The application does not invalidate existing sessions on other devices when a user changes their password, allowing old sessions to persist. This can lead to unauthorized access if an attacker has obtained a session token." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de fijaci\u00f3n de sesi\u00f3n en las versiones de chatwoot/chatwoot anteriores a la 2.4.0. La aplicaci\u00f3n no invalida las sesiones existentes en otros dispositivos cuando un usuario cambia su contrase\u00f1a, lo que permite que las sesiones antiguas persistan. Esto puede provocar un acceso no autorizado si un atacante ha obtenido un token de sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-37xx/CVE-2021-3741.json b/CVE-2021/CVE-2021-37xx/CVE-2021-3741.json index ea520193264..47d6cf604a8 100644 --- a/CVE-2021/CVE-2021-37xx/CVE-2021-3741.json +++ b/CVE-2021/CVE-2021-37xx/CVE-2021-3741.json @@ -2,13 +2,17 @@ "id": "CVE-2021-3741", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:05.327", - "lastModified": "2024-11-15T11:15:05.327", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.6. The vulnerability occurs when a user uploads an SVG file containing a malicious XSS payload in the profile settings. When the avatar is opened in a new page, the custom JavaScript code is executed, leading to potential security risks." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de cross-site scripting (XSS) almacenado en chatwoot/chatwoot, que afecta a todas las versiones anteriores a la 2.6. La vulnerabilidad se produce cuando un usuario carga un archivo SVG que contiene un payload XSS malicioso en la configuraci\u00f3n del perfil. Cuando se abre el avatar en una p\u00e1gina nueva, se ejecuta el c\u00f3digo JavaScript personalizado, lo que genera posibles riesgos de seguridad." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-37xx/CVE-2021-3742.json b/CVE-2021/CVE-2021-37xx/CVE-2021-3742.json index f860950e9a0..0c67cbd3ef8 100644 --- a/CVE-2021/CVE-2021-37xx/CVE-2021-3742.json +++ b/CVE-2021/CVE-2021-37xx/CVE-2021-3742.json @@ -2,13 +2,17 @@ "id": "CVE-2021-3742", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:05.547", - "lastModified": "2024-11-15T11:15:05.547", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Server-Side Request Forgery (SSRF) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.5.0. The vulnerability allows an attacker to upload an SVG file containing a malicious SSRF payload. When the SVG file is used as an avatar and opened in a new tab, it can trigger the SSRF, potentially leading to host redirection." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de Server-Side Request Forgery (SSRF) en chatwoot/chatwoot, que afecta a todas las versiones anteriores a la 2.5.0. La vulnerabilidad permite a un atacante cargar un archivo SVG que contiene un payload SSRF malicioso. Cuando el archivo SVG se utiliza como avatar y se abre en una nueva pesta\u00f1a, puede activar la SSRF, lo que puede provocar una redirecci\u00f3n del host." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-38xx/CVE-2021-3838.json b/CVE-2021/CVE-2021-38xx/CVE-2021-3838.json index 3937f9e5833..faa2dda0c90 100644 --- a/CVE-2021/CVE-2021-38xx/CVE-2021-3838.json +++ b/CVE-2021/CVE-2021-38xx/CVE-2021-3838.json @@ -2,13 +2,17 @@ "id": "CVE-2021-3838", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:05.763", - "lastModified": "2024-11-15T11:15:05.763", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code." + }, + { + "lang": "es", + "value": "DomPDF anterior a la versi\u00f3n 2.0.0 es vulnerable a la deserializaci\u00f3n de PHAR debido a la falta de verificaci\u00f3n del protocolo antes de pasarlo a la funci\u00f3n file_get_contents(). Un atacante que pueda cargar archivos de cualquier tipo al servidor puede pasar el protocolo phar:// para deserializar el archivo cargado y crear instancias de objetos PHP arbitrarios. Esto puede provocar la ejecuci\u00f3n remota de c\u00f3digo, especialmente cuando DOMPdf se utiliza con marcos con cadenas POP documentadas como Laravel o c\u00f3digo de desarrollador vulnerable." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-38xx/CVE-2021-3841.json b/CVE-2021/CVE-2021-38xx/CVE-2021-3841.json index cc969b1cb85..3bf315f7431 100644 --- a/CVE-2021/CVE-2021-38xx/CVE-2021-3841.json +++ b/CVE-2021/CVE-2021-38xx/CVE-2021-3841.json @@ -2,13 +2,17 @@ "id": "CVE-2021-3841", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:05.980", - "lastModified": "2024-11-15T11:15:05.980", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "sylius/sylius versions prior to 1.9.10, 1.10.11, and 1.11.2 are vulnerable to stored cross-site scripting (XSS) through SVG files. This vulnerability allows attackers to inject malicious scripts that can be executed in the context of the user's browser." + }, + { + "lang": "es", + "value": "Las versiones de sylius/sylius anteriores a 1.9.10, 1.10.11 y 1.11.2 son vulnerables a cross-site scripting (XSS) almacenado a trav\u00e9s de archivos SVG. Esta vulnerabilidad permite a los atacantes inyectar secuencias de comandos maliciosas que pueden ejecutarse en el contexto del navegador del usuario." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-39xx/CVE-2021-3902.json b/CVE-2021/CVE-2021-39xx/CVE-2021-3902.json index 7c82b33df32..6d12a3443af 100644 --- a/CVE-2021/CVE-2021-39xx/CVE-2021-3902.json +++ b/CVE-2021/CVE-2021-39xx/CVE-2021-3902.json @@ -2,13 +2,17 @@ "id": "CVE-2021-3902", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:06.190", - "lastModified": "2024-11-15T11:15:06.190", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper restriction of external entities (XXE) vulnerability in dompdf/dompdf's SVG parser allows for Server-Side Request Forgery (SSRF) and deserialization attacks. This issue affects all versions prior to 2.0.0. The vulnerability can be exploited even if the isRemoteEnabled option is set to false. It allows attackers to perform SSRF, disclose internal image files, and cause PHAR deserialization attacks." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de restricci\u00f3n indebida de entidades externas (XXE) en el analizador SVG de dompdf/dompdf permite ataques de deserializaci\u00f3n y Server-Side Request Forgery (SSRF). Este problema afecta a todas las versiones anteriores a la 2.0.0. La vulnerabilidad se puede explotar incluso si la opci\u00f3n isRemoteEnabled est\u00e1 configurada como falsa. Permite a los atacantes realizar SSRF, divulgar archivos de im\u00e1genes internos y provocar ataques de deserializaci\u00f3n PHAR." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-39xx/CVE-2021-3986.json b/CVE-2021/CVE-2021-39xx/CVE-2021-3986.json index 6f4e2f2bb48..010c2730009 100644 --- a/CVE-2021/CVE-2021-39xx/CVE-2021-3986.json +++ b/CVE-2021/CVE-2021-39xx/CVE-2021-3986.json @@ -2,13 +2,17 @@ "id": "CVE-2021-3986", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:06.400", - "lastModified": "2024-11-15T11:15:06.400", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in janeczku/calibre-web allows unauthorized users to view the names of private shelves belonging to other users. This issue occurs in the file shelf.py at line 221, where the name of the shelf is exposed in an error message when a user attempts to remove a book from a shelf they do not own. This vulnerability discloses private information and affects all versions prior to the fix." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en janeczku/calibre-web permite a usuarios no autorizados ver los nombres de los estantes privados que pertenecen a otros usuarios. Este problema se produce en el archivo shelf.py en la l\u00ednea 221, donde el nombre del estante se expone en un mensaje de error cuando un usuario intenta eliminar un libro de un estante que no es de su propiedad. Esta vulnerabilidad revela informaci\u00f3n privada y afecta a todas las versiones anteriores a la correcci\u00f3n." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-39xx/CVE-2021-3987.json b/CVE-2021/CVE-2021-39xx/CVE-2021-3987.json index 89b6e30a096..5943c6bec44 100644 --- a/CVE-2021/CVE-2021-39xx/CVE-2021-3987.json +++ b/CVE-2021/CVE-2021-39xx/CVE-2021-3987.json @@ -2,13 +2,17 @@ "id": "CVE-2021-3987", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:06.610", - "lastModified": "2024-11-15T11:15:06.610", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability exists in janeczku/calibre-web. The affected version allows users without public shelf permissions to create public shelves. The vulnerability is due to the `create_shelf` method in `shelf.py` not verifying if the user has the necessary permissions to create a public shelf. This issue can lead to unauthorized actions being performed by users." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de control de acceso indebido en janeczku/calibre-web. La versi\u00f3n afectada permite a los usuarios sin permisos de estanter\u00eda p\u00fablica crear estanter\u00edas p\u00fablicas. La vulnerabilidad se debe a que el m\u00e9todo `create_shelf` en `shelf.py` no verifica si el usuario tiene los permisos necesarios para crear una estanter\u00eda p\u00fablica. Este problema puede provocar que los usuarios realicen acciones no autorizadas." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-39xx/CVE-2021-3988.json b/CVE-2021/CVE-2021-39xx/CVE-2021-3988.json index 6a843c325c0..88abc47eadd 100644 --- a/CVE-2021/CVE-2021-39xx/CVE-2021-3988.json +++ b/CVE-2021/CVE-2021-39xx/CVE-2021-3988.json @@ -2,13 +2,17 @@ "id": "CVE-2021-3988", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:06.877", - "lastModified": "2024-11-15T11:15:06.877", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-site Scripting (XSS) vulnerability exists in janeczku/calibre-web, specifically in the file `edit_books.js`. The vulnerability occurs when editing book properties, such as uploading a cover or a format. The affected code directly inserts user input into the DOM without proper sanitization, allowing attackers to execute arbitrary JavaScript code. This can lead to various attacks, including stealing cookies. The issue is present in the code handling the `#btn-upload-cover` change event." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-site Scripting (XSS) en janeczku/calibre-web, espec\u00edficamente en el archivo `edit_books.js`. La vulnerabilidad se produce al editar las propiedades de un libro, como cargar una portada o un formato. El c\u00f3digo afectado inserta directamente la entrada del usuario en el DOM sin la limpieza adecuada, lo que permite a los atacantes ejecutar c\u00f3digo JavaScript arbitrario. Esto puede dar lugar a varios ataques, incluido el robo de cookies. El problema est\u00e1 presente en el c\u00f3digo que maneja el evento de cambio `#btn-upload-cover`." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-39xx/CVE-2021-3991.json b/CVE-2021/CVE-2021-39xx/CVE-2021-3991.json index f565b306ce1..c5b8126ff81 100644 --- a/CVE-2021/CVE-2021-39xx/CVE-2021-3991.json +++ b/CVE-2021/CVE-2021-39xx/CVE-2021-3991.json @@ -2,13 +2,17 @@ "id": "CVE-2021-3991", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:07.173", - "lastModified": "2024-11-15T11:15:07.173", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Authorization vulnerability exists in Dolibarr versions prior to the 'develop' branch. A user with restricted permissions in the 'Reception' section is able to access specific reception details via direct URL access, bypassing the intended permission restrictions." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de autorizaci\u00f3n incorrecta en las versiones de Dolibarr anteriores a la rama \"develop\". Un usuario con permisos restringidos en la secci\u00f3n \"Recepci\u00f3n\" puede acceder a detalles espec\u00edficos de la recepci\u00f3n a trav\u00e9s del acceso directo a la URL, eludiendo las restricciones de permisos previstas." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-12xx/CVE-2022-1226.json b/CVE-2022/CVE-2022-12xx/CVE-2022-1226.json index 35dcac5bfa6..3f54009082c 100644 --- a/CVE-2022/CVE-2022-12xx/CVE-2022-1226.json +++ b/CVE-2022/CVE-2022-12xx/CVE-2022-1226.json @@ -2,13 +2,17 @@ "id": "CVE-2022-1226", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:07.527", - "lastModified": "2024-11-15T11:15:07.527", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Scripting (XSS) vulnerability in phpipam/phpipam versions prior to 1.4.7 allows attackers to execute arbitrary JavaScript code in the browser of a victim. This vulnerability affects the import Data set feature via a spreadsheet file upload. The affected endpoints include import-vlan-preview.php, import-subnets-preview.php, import-vrf-preview.php, import-ipaddr-preview.php, import-devtype-preview.php, import-devices-preview.php, and import-l2dom-preview.php. The vulnerability can be exploited by uploading a specially crafted spreadsheet file containing malicious JavaScript payloads, which are then executed in the context of the victim's browser. This can lead to defacement of websites, execution of malicious JavaScript code, stealing of user cookies, and unauthorized access to user accounts." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en las versiones de phpipam/phpipam anteriores a la 1.4.7 permite a los atacantes ejecutar c\u00f3digo JavaScript arbitrario en el navegador de una v\u00edctima. Esta vulnerabilidad afecta a la funci\u00f3n de importaci\u00f3n de conjuntos de datos mediante la carga de un archivo de hoja de c\u00e1lculo. Los endpoints afectados incluyen import-vlan-preview.php, import-subnets-preview.php, import-vrf-preview.php, import-ipaddr-preview.php, import-devtype-preview.php, import-devices-preview.php e import-l2dom-preview.php. La vulnerabilidad se puede explotar cargando un archivo de hoja de c\u00e1lculo especialmente manipulado que contenga payloads de JavaScript maliciosaos, que luego se ejecutan en el contexto del navegador de la v\u00edctima. Esto puede provocar la desfiguraci\u00f3n de sitios web, la ejecuci\u00f3n de c\u00f3digo JavaScript malicioso, el robo de cookies de usuario y el acceso no autorizado a las cuentas de usuario." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-18xx/CVE-2022-1884.json b/CVE-2022/CVE-2022-18xx/CVE-2022-1884.json index 9c1c4331818..260b21db040 100644 --- a/CVE-2022/CVE-2022-18xx/CVE-2022-1884.json +++ b/CVE-2022/CVE-2022-18xx/CVE-2022-1884.json @@ -2,13 +2,17 @@ "id": "CVE-2022-1884", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:07.803", - "lastModified": "2024-11-15T11:15:07.803", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote command execution vulnerability exists in gogs/gogs versions <=0.12.7 when deployed on a Windows server. The vulnerability arises due to improper validation of the `tree_path` parameter during file uploads. An attacker can set `tree_path=.git.` to upload a file into the .git directory, allowing them to write or rewrite the `.git/config` file. If the `core.sshCommand` is set, this can lead to remote command execution." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n remota de comandos en las versiones de gogs/gogs <=0.12.7 cuando se implementan en un servidor Windows. La vulnerabilidad surge debido a una validaci\u00f3n incorrecta del par\u00e1metro `tree_path` durante la carga de archivos. Un atacante puede configurar `tree_path=.git.` para cargar un archivo en el directorio .git, lo que le permite escribir o reescribir el archivo `.git/config`. Si se configura `core.sshCommand`, esto puede provocar la ejecuci\u00f3n remota de comandos." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21882.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21882.json index cebde9dc276..6ac8ad8ea19 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21882.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21882.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21882", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.507", - "lastModified": "2024-11-14T21:15:13.590", - "vulnStatus": "Modified", + "lastModified": "2024-11-15T14:35:03.910", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-02-04", "cisaActionDue": "2022-02-18", @@ -109,9 +109,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.17763.2452", - "matchCriteriaId": "86E8ADB6-8720-454D-AAFE-C5B4C65EB462" + "matchCriteriaId": "79A35DBE-C34D-464D-B037-AADB63B221AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.2452", + "matchCriteriaId": "54A85F24-AB36-4A04-B420-F19D1A9DE26C" }, { "vulnerable": true, @@ -169,7 +175,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21882", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21919.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21919.json index f17ec3e2904..45af71e49d5 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21919.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21919.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21919", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.463", - "lastModified": "2024-11-14T21:15:18.723", - "vulnStatus": "Modified", + "lastModified": "2024-11-15T14:35:32.303", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-04-25", "cisaActionDue": "2022-05-16", @@ -89,21 +89,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.10240.19177", - "matchCriteriaId": "E35D1476-A761-432E-9105-3C57929D75D3" + "matchCriteriaId": "BCF9D462-E6B6-45D3-8E9F-788F2E646817" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.19177", + "matchCriteriaId": "9B6CEFAB-4D29-4427-8294-203A4A98F1AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.14393.4886", - "matchCriteriaId": "D197C143-21B8-4024-AF78-818DAA10D9F2" + "matchCriteriaId": "010F22B5-38B1-4176-B7E8-BB8875B9787C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.4886", + "matchCriteriaId": "4D852EB5-2456-429B-B1D8-DD57710DFE49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.17763.2452", - "matchCriteriaId": "86E8ADB6-8720-454D-AAFE-C5B4C65EB462" + "matchCriteriaId": "79A35DBE-C34D-464D-B037-AADB63B221AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.2452", + "matchCriteriaId": "54A85F24-AB36-4A04-B420-F19D1A9DE26C" }, { "vulnerable": true, @@ -202,7 +220,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21919", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-22xx/CVE-2022-2232.json b/CVE-2022/CVE-2022-22xx/CVE-2022-2232.json index 9332b78b6d7..a96884b3ad2 100644 --- a/CVE-2022/CVE-2022-22xx/CVE-2022-2232.json +++ b/CVE-2022/CVE-2022-22xx/CVE-2022-2232.json @@ -2,13 +2,17 @@ "id": "CVE-2022-2232", "sourceIdentifier": "secalert@redhat.com", "published": "2024-11-14T15:15:06.527", - "lastModified": "2024-11-14T15:15:06.527", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Keycloak package. This flaw allows an attacker to utilize an LDAP injection to bypass the username lookup or potentially perform other malicious actions." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en el paquete Keycloak que permite a un atacante utilizar una inyecci\u00f3n LDAP para eludir la b\u00fasqueda de nombre de usuario o potencialmente realizar otras acciones maliciosas." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31666.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31666.json index da2b83fbc24..a50aca7f6b5 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31666.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31666.json @@ -2,13 +2,17 @@ "id": "CVE-2022-31666", "sourceIdentifier": "security@vmware.com", "published": "2024-11-14T12:15:16.083", - "lastModified": "2024-11-14T12:15:16.083", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Harbor fails to validate user permissions while deleting Webhook policies, allowing malicious users to view, update and delete Webhook policies of other users.\u00a0\u00a0The attacker could modify Webhook policies configured in other projects." + }, + { + "lang": "es", + "value": "Harbor no puede validar los permisos de los usuarios al eliminar pol\u00edticas de Webhook, lo que permite que usuarios malintencionados vean, actualicen y eliminen pol\u00edticas de Webhook de otros usuarios. El atacante podr\u00eda modificar pol\u00edticas de Webhook configuradas en otros proyectos." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31667.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31667.json index b18c97cb194..30080ce66e4 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31667.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31667.json @@ -2,13 +2,17 @@ "id": "CVE-2022-31667", "sourceIdentifier": "security@vmware.com", "published": "2024-11-14T12:15:16.390", - "lastModified": "2024-11-14T12:15:16.390", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Harbor fails to validate the user permissions when updating a robot account that\u00a0belongs to a project that the authenticated user doesn\u2019t have access to.\u00a0\n\nBy sending a request that attempts to update a robot account, and specifying a robot\u00a0account id and robot account name that belongs to a different project that the user\u00a0doesn\u2019t have access to, it was possible to revoke the robot account permissions." + }, + { + "lang": "es", + "value": "Harbor no puede validar los permisos de usuario al actualizar una cuenta de robot que pertenece a un proyecto al que el usuario autenticado no tiene acceso. Al enviar una solicitud que intenta actualizar una cuenta de robot y especificar un ID y un nombre de cuenta de robot que pertenecen a un proyecto diferente al que el usuario no tiene acceso, fue posible revocar los permisos de la cuenta de robot." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31668.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31668.json index bd9a5813e1f..d692c0531db 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31668.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31668.json @@ -2,13 +2,17 @@ "id": "CVE-2022-31668", "sourceIdentifier": "security@vmware.com", "published": "2024-11-14T12:15:16.607", - "lastModified": "2024-11-14T12:15:16.607", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Harbor fails to validate the user permissions when updating p2p preheat policies.\u00a0By sending a request to update a p2p preheat policy with an id that belongs to a project that the currently authenticated user doesn't have access to, the attacker could modify p2p preheat policies configured in other projects." + }, + { + "lang": "es", + "value": "Harbor no puede validar los permisos de usuario al actualizar las pol\u00edticas de precalentamiento P2P. Al enviar una solicitud para actualizar una pol\u00edtica de precalentamiento P2P con un ID que pertenece a un proyecto al que el usuario autenticado actualmente no tiene acceso, el atacante podr\u00eda modificar las pol\u00edticas de precalentamiento P2P configuradas en otros proyectos." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31669.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31669.json index a37715bf061..140dda6fed7 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31669.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31669.json @@ -2,13 +2,17 @@ "id": "CVE-2022-31669", "sourceIdentifier": "security@vmware.com", "published": "2024-11-14T12:15:16.817", - "lastModified": "2024-11-14T12:15:16.817", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Harbor fails to validate the user permissions when updating tag immutability policies.\u00a0\n\nBy sending a request to update a tag immutability policy with an id that belongs to a\nproject that the currently authenticated user doesn\u2019t have access to, the attacker could\nmodify tag immutability policies configured in other projects." + }, + { + "lang": "es", + "value": "Harbor no puede validar los permisos de usuario al actualizar las pol\u00edticas de inmutabilidad de etiquetas. Al enviar una solicitud para actualizar una pol\u00edtica de inmutabilidad de etiquetas con un ID que pertenece a un proyecto al que el usuario autenticado actualmente no tiene acceso, el atacante podr\u00eda modificar las pol\u00edticas de inmutabilidad de etiquetas configuradas en otros proyectos." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31670.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31670.json index fbdb899ef97..996cdc100ae 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31670.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31670.json @@ -2,13 +2,17 @@ "id": "CVE-2022-31670", "sourceIdentifier": "security@vmware.com", "published": "2024-11-14T12:15:17.040", - "lastModified": "2024-11-14T12:15:17.040", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Harbor fails to validate the user permissions when updating tag retention policies.\u00a0\n\nBy sending a request to update a tag retention policy with an id that belongs to a project\u00a0that the currently authenticated user doesn\u2019t have access to, the attacker could modify\ntag retention policies configured in other projects." + }, + { + "lang": "es", + "value": "Harbor no puede validar los permisos de usuario al actualizar las pol\u00edticas de retenci\u00f3n de etiquetas. Al enviar una solicitud para actualizar una pol\u00edtica de retenci\u00f3n de etiquetas con un ID que pertenece a un proyecto al que el usuario autenticado actualmente no tiene acceso, el atacante podr\u00eda modificar las pol\u00edticas de retenci\u00f3n de etiquetas configuradas en otros proyectos." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31671.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31671.json index 30bafad6775..d5c041a5ac4 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31671.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31671.json @@ -2,13 +2,17 @@ "id": "CVE-2022-31671", "sourceIdentifier": "security@vmware.com", "published": "2024-11-14T12:15:17.250", - "lastModified": "2024-11-14T12:15:17.250", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Harbor fails to validate user permissions when reading and updating job execution logs through the P2P preheat execution logs. By sending a request that attempts to read/update P2P preheat execution logs and specifying different job IDs, malicious authenticated users\u00a0could read all the job logs stored in the Harbor database." + }, + { + "lang": "es", + "value": "Harbor no puede validar los permisos de usuario al leer y actualizar los registros de ejecuci\u00f3n de trabajos a trav\u00e9s de los registros de ejecuci\u00f3n de precalentamiento P2P. Al enviar una solicitud que intenta leer o actualizar los registros de ejecuci\u00f3n de precalentamiento P2P y especificar diferentes identificadores de trabajo, los usuarios autenticados malintencionados podr\u00edan leer todos los registros de trabajo almacenados en la base de datos de Harbor." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0109.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0109.json index d8fe7120be7..43503c357c6 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0109.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0109.json @@ -2,13 +2,17 @@ "id": "CVE-2023-0109", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:08.097", - "lastModified": "2024-11-15T11:15:08.097", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability was discovered in usememos/memos version 0.9.1. This vulnerability allows an attacker to upload a JavaScript file containing a malicious script and reference it in an HTML file. When the HTML file is accessed, the malicious script is executed. This can lead to the theft of sensitive information, such as login credentials, from users visiting the affected website. The issue has been fixed in version 0.10.0." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de cross-site scripting (XSS) almacenado en la versi\u00f3n 0.9.1 de usememos/memos. Esta vulnerabilidad permite a un atacante cargar un archivo JavaScript que contiene una secuencia de comandos maliciosa y hacer referencia a ella en un archivo HTML. Cuando se accede al archivo HTML, se ejecuta la secuencia de comandos maliciosa. Esto puede provocar el robo de informaci\u00f3n confidencial, como las credenciales de inicio de sesi\u00f3n, de los usuarios que visitan el sitio web afectado. El problema se ha solucionado en la versi\u00f3n 0.10.0." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0737.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0737.json index 46a7c7399b5..fa582b7eaaa 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0737.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0737.json @@ -2,13 +2,17 @@ "id": "CVE-2023-0737", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:08.363", - "lastModified": "2024-11-15T11:15:08.363", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "wallabag version 2.5.2 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers to arbitrarily delete user accounts via the /account/delete endpoint. This issue is fixed in version 2.5.4." + }, + { + "lang": "es", + "value": "La versi\u00f3n 2.5.2 de wallabag contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) que permite a los atacantes eliminar arbitrariamente cuentas de usuario a trav\u00e9s del endpoint /account/delete. Este problema se solucion\u00f3 en la versi\u00f3n 2.5.4." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2332.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2332.json index 4965e35dd80..3c7b9599116 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2332.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2332.json @@ -2,13 +2,17 @@ "id": "CVE-2023-2332", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:08.643", - "lastModified": "2024-11-15T11:15:08.643", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored Cross-site Scripting (XSS) vulnerability exists in the Conditions tab of Pricing Rules in pimcore/pimcore versions 10.5.19. The vulnerability is present in the From and To fields of the Date Range section, allowing an attacker to inject malicious scripts. This can lead to the execution of arbitrary JavaScript code in the context of the user's browser, potentially stealing cookies or redirecting users to malicious sites. The issue is fixed in version 10.5.21." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-site Scripting (XSS) almacenado en Conditions tab of Pricing Rules in pimcore/pimcore en las versiones 10.5.19. La vulnerabilidad est\u00e1 presente en los campos Desde y Hasta de la secci\u00f3n Intervalo de fechas, lo que permite a un atacante inyectar secuencias de comandos maliciosas. Esto puede provocar la ejecuci\u00f3n de c\u00f3digo JavaScript arbitrario en el contexto del navegador del usuario, lo que podr\u00eda robar cookies o redirigir a los usuarios a sitios maliciosos. El problema se solucion\u00f3 en la versi\u00f3n 10.5.21." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34049.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34049.json index c30564d98b7..b17be3fe429 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34049.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34049.json @@ -2,13 +2,17 @@ "id": "CVE-2023-34049", "sourceIdentifier": "security@vmware.com", "published": "2024-11-14T05:15:28.260", - "lastModified": "2024-11-14T05:15:28.260", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH.\u00a0Do not make the copy path on the target predictable and ensure we check return codes of the scp command if the copy fails." + }, + { + "lang": "es", + "value": "La opci\u00f3n de pre-vuelo de Salt-SSH copia el script al destino en una ruta predecible, lo que permite a un atacante forzar a Salt-SSH a ejecutar su script. Si un atacante tiene acceso a la m\u00e1quina virtual de destino y conoce la ruta al script de pre-vuelo antes de que se ejecute, puede asegurarse de que Salt-SSH ejecute su script con los privilegios del usuario que ejecuta Salt-SSH. No haga que la ruta de copia en el destino sea predecible y aseg\u00farese de verificar los c\u00f3digos de retorno del comando scp si la copia falla." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35659.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35659.json index f814cb42bf7..51e23e83519 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35659.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35659.json @@ -2,13 +2,17 @@ "id": "CVE-2023-35659", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:19.763", - "lastModified": "2024-11-13T18:15:19.763", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DevmemIntChangeSparse of devicemem_server.c, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En DevmemIntChangeSparse de devicemem_server.c, existe la posibilidad de que se ejecute un c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35686.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35686.json index 9c4ad9a7512..3d90b814f30 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35686.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35686.json @@ -2,13 +2,17 @@ "id": "CVE-2023-35686", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:19.860", - "lastModified": "2024-11-13T18:15:19.860", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PVRSRVRGXKickTA3DKM of rgxta3d.c, there is a possible arbitrary code execution due to improper input validation. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En PVRSRVRGXKickTA3DKM de rgxta3d.c, existe la posibilidad de ejecuci\u00f3n de c\u00f3digo arbitrario debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38920.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38920.json index 8f3af1665d4..5e906c01a68 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38920.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38920.json @@ -2,13 +2,17 @@ "id": "CVE-2023-38920", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T20:15:16.840", - "lastModified": "2024-11-13T20:15:16.840", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Cyber Cafe Management System v.1.0 allows a local attacker to execute arbitrary code via a crafted script to the adminname parameter." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Scripting en Cyber Cafe Management System v.1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de una secuencia de comandos dise\u00f1ada espec\u00edficamente para el par\u00e1metro adminname." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4134.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4134.json index 3370fcb467f..ff7cf581aeb 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4134.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4134.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4134", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-14T11:15:03.730", - "lastModified": "2024-11-14T11:15:03.730", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4458.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4458.json index a0a15bf7853..1f1a519787e 100644 --- a/CVE-2023/CVE-2023-44xx/CVE-2023-4458.json +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4458.json @@ -2,13 +2,17 @@ "id": "CVE-2023-4458", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-14T12:15:17.487", - "lastModified": "2024-11-14T12:15:17.487", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found within the parsing of extended attributes in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en el an\u00e1lisis de atributos extendidos en el m\u00f3dulo ksmbd del kernel. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esto para divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Linux. Solo los sistemas con ksmbd habilitado son vulnerables a esta CVE." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4679.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4679.json index 552d818f5e7..62aa5874428 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4679.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4679.json @@ -2,13 +2,17 @@ "id": "CVE-2023-4679", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:08.917", - "lastModified": "2024-11-15T11:15:08.917", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gf_filterpacket_del function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de use after free en la versi\u00f3n 2.3-DEV-revrelease de GPAC, espec\u00edficamente en la funci\u00f3n gf_filterpacket_del en filter_core/filter.c en la l\u00ednea 38. Esta vulnerabilidad puede generar una condici\u00f3n de doble liberaci\u00f3n, que puede provocar que la aplicaci\u00f3n se bloquee." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0787.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0787.json index 58cabf411b5..0b2c2c22356 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0787.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0787.json @@ -2,13 +2,17 @@ "id": "CVE-2024-0787", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:09.213", - "lastModified": "2024-11-15T11:15:09.213", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "phpIPAM version 1.5.1 contains a vulnerability where an attacker can bypass the IP block mechanism to brute force passwords for users by using the 'X-Forwarded-For' header. The issue lies in the 'get_user_ip()' function in 'class.Common.php' at lines 1044 and 1045, where the presence of the 'X-Forwarded-For' header is checked and used instead of 'REMOTE_ADDR'. This vulnerability allows attackers to perform brute force attacks on user accounts, including the admin account. The issue is fixed in version 1.7.0." + }, + { + "lang": "es", + "value": "La versi\u00f3n 1.5.1 de phpIPAM contiene una vulnerabilidad que permite a un atacante eludir el mecanismo de bloqueo de direcciones IP para obtener por fuerza bruta las contrase\u00f1as de los usuarios mediante el encabezado 'X-Forwarded-For'. El problema se encuentra en la funci\u00f3n 'get_user_ip()' de 'class.Common.php' en las l\u00edneas 1044 y 1045, donde se comprueba la presencia del encabezado 'X-Forwarded-For' y se utiliza en lugar de 'REMOTE_ADDR'. Esta vulnerabilidad permite a los atacantes realizar ataques por fuerza bruta en las cuentas de usuario, incluida la cuenta de administrador. El problema se ha corregido en la versi\u00f3n 1.7.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0875.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0875.json index e3d232c7d38..d32c0a188cb 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0875.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0875.json @@ -2,13 +2,17 @@ "id": "CVE-2024-0875", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:09.490", - "lastModified": "2024-11-15T11:15:09.490", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in openemr/openemr version 7.0.1. An attacker can inject malicious payloads into the 'inputBody' field in the Secure Messaging feature, which can then be sent to other users. When the recipient views the malicious message, the payload is executed, potentially compromising their account. This issue is fixed in version 7.0.2.1." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting (XSS) almacenado en la versi\u00f3n 7.0.1 de openemr/openemr. Un atacante puede inyectar payloads maliciosos en el campo 'inputBody' de la funci\u00f3n de mensajer\u00eda segura, que luego se pueden enviar a otros usuarios. Cuando el destinatario ve el mensaje malicioso, se ejecuta el payload, lo que puede comprometer su cuenta. Este problema se solucion\u00f3 en la versi\u00f3n 7.0.2.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10104.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10104.json index bededc0c71e..7795e4990f6 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10104.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10104.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10104", "sourceIdentifier": "contact@wpscan.com", "published": "2024-11-15T07:15:17.063", - "lastModified": "2024-11-15T07:15:17.063", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Jobs for WordPress plugin before 2.7.8 does not sanitise and escape some of its Job settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks" + }, + { + "lang": "es", + "value": "El complemento Jobs para WordPress anterior a la versi\u00f3n 2.7.8 no desinfecta ni escapa a algunas de sus configuraciones de Job, lo que podr\u00eda permitir que usuarios con privilegios elevados, como los colaboradores, realicen ataques de Cross Site Scripting almacenado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10113.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10113.json index 37ab5c96a8e..5ddc1874a0b 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10113.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10113.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10113", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T06:15:03.340", - "lastModified": "2024-11-15T06:15:03.340", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP AdCenter \u2013 Ad Manager & Adsense Ads plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpadcenter_ad shortcode in all versions up to, and including, 2.5.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP AdCenter \u2013 Ad Manager & Adsense Ads para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto wpadcenter_ad del complemento en todas las versiones hasta la 2.5.7 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10146.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10146.json index f0c9df6a60c..ccbdd058f6a 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10146.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10146.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10146", "sourceIdentifier": "contact@wpscan.com", "published": "2024-11-14T06:15:07.080", - "lastModified": "2024-11-14T19:35:05.160", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10260.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10260.json index 55164c6128e..3b5d41e8588 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10260.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10260.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10260", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T06:15:03.753", - "lastModified": "2024-11-15T06:15:03.753", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Tripetto plugin for WordPress is vulnerable to Stored Cross-Site Scripting via File uploads in all versions up to, and including, 8.0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the file." + }, + { + "lang": "es", + "value": "El complemento Tripetto para WordPress es vulnerable a Cross Site Scripting almacenado mediante cargas de archivos en todas las versiones hasta la 8.0.3 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10311.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10311.json index 51d163588f1..d682122c940 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10311.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10311.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10311", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T10:15:03.980", - "lastModified": "2024-11-15T10:15:03.980", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The External Database Based Actions plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.1. This is due to a missing capability check in the 'edba_admin_handle' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin settings and log in as any existing user on the site, such as an administrator." + }, + { + "lang": "es", + "value": "El complemento External Database Based Actions para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en versiones hasta la 0.1 incluida. Esto se debe a una comprobaci\u00f3n de capacidad faltante en la funci\u00f3n 'edba_admin_handle'. Esto permite que atacantes autenticados, con permisos de nivel de suscriptor y superiores, actualicen la configuraci\u00f3n del complemento e inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10394.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10394.json index c121d8f6cd5..3591f5fbef3 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10394.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10394.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10394", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-14T20:15:20.777", - "lastModified": "2024-11-14T20:15:20.777", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local user can bypass the OpenAFS PAG (Process Authentication Group)\nthrottling mechanism in Unix clients, allowing the user to create a PAG using\nan existing id number, effectively joining the PAG and letting the user steal\nthe credentials in that PAG." + }, + { + "lang": "es", + "value": "Un usuario local puede eludir el mecanismo de limitaci\u00f3n de PAG (grupo de autenticaci\u00f3n de procesos) de OpenAFS en clientes Unix, lo que le permite crear un PAG utilizando un n\u00famero de identificaci\u00f3n existente, uni\u00e9ndose efectivamente al PAG y permitiendo al usuario robar las credenciales en ese PAG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10396.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10396.json index 12e359767ce..3e7c606ddcc 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10396.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10396.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10396", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-14T20:15:20.917", - "lastModified": "2024-11-14T20:15:20.917", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated user can provide a malformed ACL to the fileserver's StoreACL\nRPC, causing the fileserver to crash, possibly expose uninitialized memory, and\npossibly store garbage data in the audit log.\nMalformed ACLs provided in responses to client FetchACL RPCs can cause client\nprocesses to crash and possibly expose uninitialized memory into other ACLs\nstored on the server." + }, + { + "lang": "es", + "value": "Un usuario autenticado puede proporcionar una ACL mal formada a la RPC StoreACL del servidor de archivos, lo que provocar\u00e1 que el servidor de archivos se bloquee, posiblemente exponga memoria no inicializada y posiblemente almacene datos basura en el registro de auditor\u00eda. Las ACL mal formadas proporcionadas en respuestas a las RPC FetchACL del cliente pueden provocar que los procesos del cliente se bloqueen y posiblemente expongan memoria no inicializada en otras ACL almacenadas en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10397.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10397.json index 822cdccc452..3d31f9b9377 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10397.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10397.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10397", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-14T20:15:21.057", - "lastModified": "2024-11-14T20:15:21.057", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious server can crash the OpenAFS cache manager and other client\nutilities, and possibly execute arbitrary code." + }, + { + "lang": "es", + "value": "Un servidor malintencionado puede bloquear el administrador de cach\u00e9 OpenAFS y otras utilidades del cliente y posiblemente ejecutar c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10443.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10443.json index 3fbb318b150..a56d5212978 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10443.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10443.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10443", "sourceIdentifier": "security@synology.com", "published": "2024-11-15T11:15:09.750", - "lastModified": "2024-11-15T11:15:09.750", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper neutralization of special elements used in a command ('Command Injection') vulnerability in Task Manager component in Synology BeePhotos before 1.0.2-10026 and 1.1.0-10053 and Synology Photos before 1.6.2-0720 and 1.7.0-0795 allows remote attackers to execute arbitrary code via unspecified vectors." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando ('Inyecci\u00f3n de comando') en Task Manager component in Synology BeePhotos anteriores a 1.0.2-10026 y 1.1.0-10053 y Synology Photos anteriores a 1.6.2-0720 y 1.7.0-0795 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10534.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10534.json index e37528e051e..e969d16d910 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10534.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10534.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10534", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-11-15T11:15:10.100", - "lastModified": "2024-11-15T11:15:10.100", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Origin Validation Error vulnerability in Dataprom Informatics Personnel Attendance Control Systems (PACS) / Access Control Security Systems (ACSS) allows Traffic Injection.This issue affects Personnel Attendance Control Systems (PACS) / Access Control Security Systems (ACSS): before 2024." + }, + { + "lang": "es", + "value": "La vulnerabilidad de error de validaci\u00f3n de origen en Dataprom Informatics Personnel Attendance Control Systems (PACS) / Access Control Security Systems (ACSS) permite la inyecci\u00f3n de tr\u00e1fico. Este problema afecta a los sistemas de control de asistencia de personal (PACS) / sistemas de seguridad de control de acceso (ACSS): antes de 2024." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10571.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10571.json index 02817fd4673..bd0e5758981 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10571.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10571", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-14T11:15:04.630", - "lastModified": "2024-11-14T11:15:04.630", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10582.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10582.json index b69f60175ed..19f64ad2f0a 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10582.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10582.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10582", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T06:15:04.077", - "lastModified": "2024-11-15T06:15:04.077", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Music Player for Elementor \u2013 Audio Player & Podcast Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the import_mpfe_template() function in all versions up to, and including, 2.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import templates." + }, + { + "lang": "es", + "value": "El complemento Music Player for Elementor \u2013 Audio Player & Podcast Player para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n import_mpfe_template() en todas las versiones hasta la 2.4.1 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, importen plantillas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10793.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10793.json index f917d540d11..7f29ba85df1 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10793.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10793.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10793", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T06:15:04.370", - "lastModified": "2024-11-15T06:15:04.370", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Activity Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user_id parameter in all versions up to, and including, 5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrative user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Activity Log para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del par\u00e1metro user_id en todas las versiones hasta la 5.2.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario administrativo acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10825.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10825.json index 683ec12edee..14748416bcf 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10825.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10825.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10825", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T07:15:17.237", - "lastModified": "2024-11-15T07:15:17.237", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Hide My WP Ghost \u2013 Security & Firewall plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the URL in all versions up to, and including, 5.3.01 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrative user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Hide My WP Ghost \u2013 Security & Firewall para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado a trav\u00e9s de la URL en todas las versiones hasta la 5.3.01 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario administrativo para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10897.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10897.json index c9a6eb86b78..437735210a8 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10897.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10897.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10897", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T05:15:05.177", - "lastModified": "2024-11-15T05:15:05.177", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Tutor LMS Elementor Addons plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the install_etlms_dependency_plugin() function in all versions up to, and including, 2.1.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install Elementor or Tutor LMS. Please note the impact of this issue is incredibly limited due to the fact that these two plugins will likely already be installed as a dependency of the plugin." + }, + { + "lang": "es", + "value": "El complemento Tutor LMS Elementor Addons para WordPress es vulnerable a la instalaci\u00f3n no autorizada de complementos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n install_etlms_dependency_plugin() en todas las versiones hasta la 2.1.5 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, instalen Elementor o Tutor LMS. Tenga en cuenta que el impacto de este problema es incre\u00edblemente limitado debido al hecho de que estos dos complementos probablemente ya est\u00e9n instalados como una dependencia del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10921.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10921.json index 81eb452ea78..d5fd5135b51 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10921.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10921.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10921", "sourceIdentifier": "cna@mongodb.com", "published": "2024-11-14T16:15:18.030", - "lastModified": "2024-11-14T16:15:18.030", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authorized user may trigger crashes or receive the contents of buffer over-reads of Server memory by issuing specially crafted requests that construct malformed BSON in the MongoDB Server. This issue affects MongoDB Server v5.0 versions prior to 5.0.30 , MongoDB Server v6.0 versions prior to 6.0.19, MongoDB Server v7.0 versions prior to 7.0.15 and MongoDB Server v8.0 versions prior to and including 8.0.2." + }, + { + "lang": "es", + "value": "Un usuario autorizado puede provocar fallas o recibir el contenido de lecturas excesivas del b\u00fafer de la memoria del servidor al emitir solicitudes especialmente manipuladas que construyen un BSON mal formado en MongoDB Server. Este problema afecta a las versiones de MongoDB Server v5.0 anteriores a la 5.0.30, a las versiones de MongoDB Server v6.0 anteriores a la 6.0.19, a las versiones de MongoDB Server v7.0 anteriores a la 7.0.15 y a las versiones de MongoDB Server v8.0 anteriores a la 8.0.2 incluida." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10924.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10924.json index b3ee8fc5794..3ddffa6d4c7 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10924.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10924.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10924", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T04:15:03.613", - "lastModified": "2024-11-15T04:15:03.613", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the \"Two-Factor Authentication\" setting is enabled (disabled by default)." + }, + { + "lang": "es", + "value": "Los complementos Really Simple Security (Free, Pro y Pro Multisite) para WordPress son vulnerables a la omisi\u00f3n de la autenticaci\u00f3n en las versiones 9.0.0 a 9.1.1.1. Esto se debe a un manejo inadecuado de errores de verificaci\u00f3n de usuario en las acciones de la API REST de dos factores con la funci\u00f3n 'check_login_and_get_user'. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, cuando la configuraci\u00f3n \"Autenticaci\u00f3n de dos factores\" est\u00e1 habilitada (deshabilitada de forma predeterminada)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10962.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10962.json index 43737cb4db4..0e0e6f14284 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10962.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10962.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10962", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-14T14:15:17.533", - "lastModified": "2024-11-14T14:15:17.533", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Migration, Backup, Staging \u2013 WPvivid plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 0.9.107 via deserialization of untrusted input in the 'replace_row_data' and 'replace_serialize_data' functions. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must create a staging site to trigger the exploit." + }, + { + "lang": "es", + "value": "El complemento Migration, Backup, Staging \u2013 WPvivid para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 0.9.107 incluida, a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables en las funciones 'replace_row_data' y 'replace_serialize_data'. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. No hay ninguna cadena POP presente en el software vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo. Un administrador debe crear un sitio de prueba para activar el exploit." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10976.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10976.json index f0079f4cdd0..8aafb4670d3 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10976.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10976.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10976", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-11-14T13:15:03.793", - "lastModified": "2024-11-14T13:15:03.793", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incomplete tracking in PostgreSQL of tables with row security allows a reused query to view or change different rows from those intended. CVE-2023-2455 and CVE-2016-2193 fixed most interaction between row security and user ID changes. They missed cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy. This has the same consequences as the two earlier CVEs. That is to say, it leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. An attacker must tailor an attack to a particular application's pattern of query plan reuse, user ID changes, and role-specific row security policies. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected." + }, + { + "lang": "es", + "value": "El seguimiento incompleto en PostgreSQL de tablas con seguridad de filas permite que una consulta reutilizada vea o cambie filas diferentes a las previstas. CVE-2023-2455 y CVE-2016-2193 solucionaron la mayor\u00eda de las interacciones entre la seguridad de filas y los cambios de ID de usuario. Pasaron por alto los casos en los que una subconsulta, una consulta WITH, una vista de invocador de seguridad o una funci\u00f3n de lenguaje SQL hace referencia a una tabla con una pol\u00edtica de seguridad a nivel de fila. Esto tiene las mismas consecuencias que las dos CVE anteriores. Es decir, conduce a la aplicaci\u00f3n de pol\u00edticas potencialmente incorrectas en los casos en los que se utilizan pol\u00edticas espec\u00edficas de roles y se planifica una consulta determinada bajo un rol y luego se ejecuta bajo otros roles. Este escenario puede ocurrir bajo funciones de definidor de seguridad o cuando se planifica inicialmente un usuario y una consulta comunes y luego se reutilizan en varios SET ROLE. La aplicaci\u00f3n de una pol\u00edtica incorrecta puede permitir que un usuario complete lecturas y modificaciones que de otro modo estar\u00edan prohibidas. Esto afecta solo a las bases de datos que han utilizado CREATE POLICY para definir una pol\u00edtica de seguridad de filas. Un atacante debe adaptar un ataque al patr\u00f3n de reutilizaci\u00f3n de planes de consulta, cambios de ID de usuario y pol\u00edticas de seguridad de filas espec\u00edficas de roles de una aplicaci\u00f3n en particular. Las versiones anteriores a PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17 y 12.21 se ven afectadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10977.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10977.json index 6727bc3fbe5..845a14c6422 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10977.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10977.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10977", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-11-14T13:15:04.023", - "lastModified": "2024-11-14T13:15:04.023", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Client use of server error message in PostgreSQL allows a server not trusted under current SSL or GSS settings to furnish arbitrary non-NUL bytes to the libpq application. For example, a man-in-the-middle attacker could send a long error message that a human or screen-scraper user of psql mistakes for valid query results. This is probably not a concern for clients where the user interface unambiguously indicates the boundary between one error message and other text. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected." + }, + { + "lang": "es", + "value": "El uso del mensaje de error del servidor por parte del cliente en PostgreSQL permite que un servidor que no es de confianza seg\u00fan la configuraci\u00f3n actual de SSL o GSS proporcione bytes arbitrarios que no sean NUL a la aplicaci\u00f3n libpq. Por ejemplo, un atacante intermediario podr\u00eda enviar un mensaje de error largo que un usuario humano o un usuario de psql que rastree la pantalla confunda con resultados de consulta v\u00e1lidos. Probablemente esto no sea un problema para los clientes en los que la interfaz de usuario indica de forma inequ\u00edvoca el l\u00edmite entre un mensaje de error y otro texto. Las versiones anteriores a PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17 y 12.21 se ven afectadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10978.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10978.json index c219d8fd226..03bc90332a2 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10978.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10978.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10978", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-11-14T13:15:04.217", - "lastModified": "2024-11-14T13:15:04.217", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect privilege assignment in PostgreSQL allows a less-privileged application user to view or change different rows from those intended. An attack requires the application to use SET ROLE, SET SESSION AUTHORIZATION, or an equivalent feature. The problem arises when an application query uses parameters from the attacker or conveys query results to the attacker. If that query reacts to current_setting('role') or the current user ID, it may modify or return data as though the session had not used SET ROLE or SET SESSION AUTHORIZATION. The attacker does not control which incorrect user ID applies. Query text from less-privileged sources is not a concern here, because SET ROLE and SET SESSION AUTHORIZATION are not sandboxes for unvetted queries. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected." + }, + { + "lang": "es", + "value": "La asignaci\u00f3n incorrecta de privilegios en PostgreSQL permite que un usuario de la aplicaci\u00f3n con menos privilegios vea o cambie filas distintas a las previstas. Un ataque requiere que la aplicaci\u00f3n utilice SET ROLE, SET SESSION AUTHORIZATION o una funci\u00f3n equivalente. El problema surge cuando una consulta de la aplicaci\u00f3n utiliza par\u00e1metros del atacante o transmite los resultados de la consulta al atacante. Si esa consulta reacciona a current_setting('role') o al ID de usuario actual, puede modificar o devolver datos como si la sesi\u00f3n no hubiera utilizado SET ROLE o SET SESSION AUTHORIZATION. El atacante no controla qu\u00e9 ID de usuario incorrecto se aplica. El texto de la consulta de fuentes con menos privilegios no es un problema aqu\u00ed, porque SET ROLE y SET SESSION AUTHORIZATION no son entornos aislados para consultas no verificadas. Las versiones anteriores a PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17 y 12.21 se ven afectadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10979.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10979.json index 7090463f97b..740727429b0 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10979.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10979.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10979", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-11-14T13:15:04.407", - "lastModified": "2024-11-14T13:15:04.407", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected." + }, + { + "lang": "es", + "value": "El control incorrecto de las variables de entorno en PostgreSQL PL/Perl permite que un usuario de base de datos sin privilegios modifique variables de entorno de proceso sensibles (por ejemplo, PATH). Esto suele ser suficiente para permitir la ejecuci\u00f3n de c\u00f3digo arbitrario, incluso si el atacante no tiene un usuario del sistema operativo del servidor de base de datos. Las versiones anteriores a PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17 y 12.21 se ven afectadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1097.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1097.json index b60401279ef..46dea659edf 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1097.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1097.json @@ -2,13 +2,17 @@ "id": "CVE-2024-1097", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:10.550", - "lastModified": "2024-11-15T11:15:10.550", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in craigk5n/webcalendar version 1.3.0. The vulnerability occurs in the 'Report Name' input field while creating a new report. An attacker can inject malicious scripts, which are then executed in the context of other users who view the report, potentially leading to the theft of user accounts and cookies." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting (XSS) almacenado en la versi\u00f3n 1.3.0 de craigk5n/webcalendar. La vulnerabilidad se produce en el campo de entrada \"Nombre del informe\" al crear un nuevo informe. Un atacante puede inyectar secuencias de comandos maliciosas, que luego se ejecutan en el contexto de otros usuarios que ven el informe, lo que puede provocar el robo de cuentas de usuario y cookies." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11120.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11120.json index ff33b2529d5..87fa17e8669 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11120.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11120.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11120", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-11-15T02:15:17.757", - "lastModified": "2024-11-15T02:15:17.757", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "twcert@cert.org.tw", @@ -16,6 +16,10 @@ { "lang": "en", "value": "Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports." + }, + { + "lang": "es", + "value": "Algunos dispositivos GeoVision al final de su vida \u00fatil tienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo. Los atacantes remotos no autenticados pueden aprovechar esta vulnerabilidad para inyectar y ejecutar comandos arbitrarios del sistema en el dispositivo. Adem\u00e1s, esta vulnerabilidad ya ha sido explotada por atacantes y hemos recibido informes relacionados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11136.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11136.json index 08fa7fb85d4..fab044618d8 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11136.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11136.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11136", "sourceIdentifier": "cvd@cert.pl", "published": "2024-11-14T16:15:18.273", - "lastModified": "2024-11-14T16:15:18.273", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user\u2019s external storage." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n predeterminada de la c\u00e1mara TCL expone a un proveedor vulnerable a una vulnerabilidad de path traversal. La aplicaci\u00f3n maliciosa puede proporcionar una ruta URI maliciosa y eliminar archivos arbitrarios del almacenamiento externo del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11182.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11182.json index 56026453b01..e37eb100a7d 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11182.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11182.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11182", "sourceIdentifier": "security@eset.com", "published": "2024-11-15T11:15:10.410", - "lastModified": "2024-11-15T11:15:10.410", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in \n\nMDaemon Email Server before version\u00a024.5.1c. An attacker can send an HTML e-mail message \nwith \nJavaScript in an img tag. This could\n allow a remote attacker\n\nto load arbitrary JavaScript code in the context of a webmail user's browser window." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema de XSS en MDaemon Email Server anterior a la versi\u00f3n 24.5.1c. Un atacante puede enviar un mensaje de correo electr\u00f3nico HTML con JavaScript en una etiqueta img. Esto podr\u00eda permitir que un atacante remoto cargue c\u00f3digo JavaScript arbitrario en el contexto de la ventana del navegador de un usuario de correo web." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11193.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11193.json index 54d801093bd..ce939308f37 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11193.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11193", "sourceIdentifier": "security@yugabyte.com", "published": "2024-11-13T21:15:08.730", - "lastModified": "2024-11-14T15:35:06.770", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11206.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11206.json index c279c57a573..748eb02e453 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11206.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11206.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11206", "sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", "published": "2024-11-14T07:15:17.203", - "lastModified": "2024-11-14T22:35:02.177", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11207.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11207.json index 29274ad8820..97adc68a047 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11207.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11207.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11207", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-14T13:15:04.603", - "lastModified": "2024-11-14T13:15:04.603", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Apereo CAS 6.6 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /login. The manipulation of the argument redirect_uri leads to open redirect. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Apereo CAS 6.6 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /login. La manipulaci\u00f3n del argumento redirect_uri provoca una redirecci\u00f3n abierta. El ataque se puede ejecutar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11208.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11208.json index 06f78a05076..46007bfe97d 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11208.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11208.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11208", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-14T14:15:17.787", - "lastModified": "2024-11-14T14:15:17.787", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Apereo CAS 6.6 and classified as problematic. Affected by this issue is some unknown functionality of the file /login?service. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Apereo CAS 6.6 y se ha clasificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo /login?service. La manipulaci\u00f3n provoca la caducidad de la sesi\u00f3n. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. La explotaci\u00f3n se ha hecho p\u00fablica y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11209.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11209.json index d9963c5f80b..dcea9f9a513 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11209.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11209.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11209", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-14T14:15:18.090", - "lastModified": "2024-11-14T14:15:18.090", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Apereo CAS 6.6. It has been classified as critical. This affects an unknown part of the file /login?service of the component 2FA. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Apereo CAS 6.6. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /login?service del componente 2FA. La manipulaci\u00f3n conduce a una autenticaci\u00f3n incorrecta. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11210.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11210.json index 5d851b3c018..f381f3b80a2 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11210.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11210.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11210", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-14T15:15:07.800", - "lastModified": "2024-11-14T15:15:07.800", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in EyouCMS 1.51. It has been rated as critical. This issue affects the function editFile of the file application/admin/logic/FilemanagerLogic.php. The manipulation of the argument activepath leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en EyouCMS 1.51. Se ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n editFile del archivo application/admin/logic/FilemanagerLogic.php. La manipulaci\u00f3n del argumento activepath provoca un Path Traversal. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11211.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11211.json index 8c5087196ba..e12f660626c 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11211.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11211.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11211", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-14T15:15:08.077", - "lastModified": "2024-11-15T09:15:14.600", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in EyouCMS up to 1.6.7. Affected is an unknown function of the component Website Logo Handler. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en EyouCMS hasta la versi\u00f3n 1.6.7. Se trata de una funci\u00f3n desconocida del componente Website Logo Handler. La manipulaci\u00f3n permite la carga sin restricciones. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11212.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11212.json index cadaa37c170..d40bb110c9f 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11212.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11212.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11212", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-14T15:15:08.360", - "lastModified": "2024-11-14T15:15:08.360", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Best Employee Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/fetch_product_details.php. The manipulation of the argument barcode leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Best Employee Management System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /admin/fetch_product_details.php. La manipulaci\u00f3n del argumento barcode provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11213.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11213.json index 0f5c2ee4304..eda7095e691 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11213.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11213.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11213", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-14T16:15:18.450", - "lastModified": "2024-11-14T16:15:18.450", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in SourceCodester Best Employee Management System 1.0. This affects an unknown part of the file /admin/edit_role.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Best Employee Management System 1.0. Afecta a una parte desconocida del archivo /admin/edit_role.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11214.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11214.json index 2c9ac7dc898..a27fb0157f4 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11214.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11214.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11214", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-14T16:15:18.707", - "lastModified": "2024-11-14T16:15:18.707", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Best Employee Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/profile.php. The manipulation of the argument website_image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher disclosure contains confusing vulnerability classes." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Best Employee Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/profile.php. La manipulaci\u00f3n del argumento website_image permite la carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. La divulgaci\u00f3n inicial del investigador contiene clases de vulnerabilidad confusas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11215.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11215.json index b42823f879b..fd3afa630f5 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11215.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11215.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11215", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-11-14T14:15:18.367", - "lastModified": "2024-11-14T14:15:18.367", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Absolute path traversal (incorrect restriction of a path to a restricted directory) vulnerability in the EasyPHP web server, affecting version 14.1. This vulnerability could allow remote users to bypass SecurityManager restrictions and retrieve any file stored on the server by setting only consecutive strings \u2018/...%5c\u2019." + }, + { + "lang": "es", + "value": "Vulnerabilidad de path traversal absoluto (restricci\u00f3n incorrecta de una ruta a un directorio restringido) en el servidor web EasyPHP, que afecta a la versi\u00f3n 14.1. Esta vulnerabilidad podr\u00eda permitir a usuarios remotos eludir las restricciones de SecurityManager y recuperar cualquier archivo almacenado en el servidor estableciendo \u00fanicamente cadenas consecutivas '/...%5c'." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11237.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11237.json index 977282aa873..283cecd9d78 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11237.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11237.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11237", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-15T12:15:14.670", - "lastModified": "2024-11-15T12:15:14.670", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected by this issue is some unknown functionality of the component DHCP DISCOVER Packet Parser. The manipulation of the argument hostname leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en TP-Link VN020 F3v(T) TT_V6.2.1021. Este problema afecta a algunas funciones desconocidas del componente DHCP DISCOVER Packet Parser. La manipulaci\u00f3n del argumento hostname provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11238.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11238.json new file mode 100644 index 00000000000..982a7dcb0b4 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11238.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-11238", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-15T13:15:03.753", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Landray EKP up to 16.0. This affects the function delPreviewFile of the file /sys/ui/sys_ui_component/sysUiComponent.do?method=delPreviewFile. The manipulation of the argument directoryPath leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.4 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 4.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CoinIsMoney/TempGuide/blob/main/LL-exp-02.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.284673", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.284673", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.438291", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11239.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11239.json new file mode 100644 index 00000000000..4dc24069320 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11239.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-11239", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-15T14:15:19.693", + "lastModified": "2024-11-15T14:23:55.747", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Landray EKP up to 16.0 and classified as critical. This vulnerability affects the function deleteFile of the file /sys/common/import.do?method=deleteFile of the component API Interface. The manipulation of the argument folder leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 4.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CoinIsMoney/TempGuide/blob/main/LL-exp-03.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.284674", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.284674", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.438784", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11240.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11240.json new file mode 100644 index 00000000000..dbed0402188 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11240.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-11240", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-15T14:15:19.953", + "lastModified": "2024-11-15T14:23:55.747", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in IBPhoenix ibWebAdmin up to 1.0.2 and classified as problematic. This issue affects some unknown processing of the file /database.php of the component Banco de Dados Tab. The manipulation of the argument db_login_role leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://docs.google.com/document/d/1_kk14QhqJuqMGzAD_SUlOSvCGwYdeF4gI8m7mVTPBAQ/edit?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.284675", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.284675", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.438471", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1240.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1240.json index 819124e6855..709797fcdd1 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1240.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1240.json @@ -2,13 +2,17 @@ "id": "CVE-2024-1240", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:10.773", - "lastModified": "2024-11-15T11:15:10.773", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerability is due to improper handling of the 'next' parameter in the login functionality. An attacker can exploit this vulnerability to redirect users to malicious sites, which can be used for phishing or other malicious activities. The issue is fixed in pyload-ng 0.5.0b3.dev79." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de redirecci\u00f3n abierta en la versi\u00f3n 0.5.0 de pyload/pyload. La vulnerabilidad se debe a un manejo inadecuado del par\u00e1metro 'next' en la funci\u00f3n de inicio de sesi\u00f3n. Un atacante puede aprovechar esta vulnerabilidad para redirigir a los usuarios a sitios maliciosos, que pueden usarse para suplantaci\u00f3n de identidad u otras actividades maliciosas. El problema se solucion\u00f3 en pyload-ng 0.5.0b3.dev79." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1682.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1682.json index 9ceb87ce444..c4637bd3668 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1682.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1682.json @@ -2,13 +2,17 @@ "id": "CVE-2024-1682", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-14T18:15:18.193", - "lastModified": "2024-11-14T18:15:18.193", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unclaimed Amazon S3 bucket, 'codeconf', is referenced in an audio file link within the .rst documentation file. This bucket has been claimed by an external party. The use of this unclaimed S3 bucket could lead to data integrity issues, data leakage, availability problems, loss of trustworthiness, and potential further attacks if the bucket is used to host malicious content or as a pivot point for further attacks." + }, + { + "lang": "es", + "value": "En el archivo de documentaci\u00f3n .rst se hace referencia a un dep\u00f3sito de Amazon S3 no reclamado, \"codeconf\", en un enlace de archivo de audio. Este dep\u00f3sito ha sido reclamado por un tercero. El uso de este dep\u00f3sito de S3 no reclamado podr\u00eda generar problemas de integridad de los datos, fuga de datos, problemas de disponibilidad, p\u00e9rdida de confiabilidad y posibles ataques adicionales si el dep\u00f3sito se utiliza para alojar contenido malicioso o como punto de pivote para ataques adicionales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21783.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21783.json index 794199dab92..e218d98cc5d 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21783.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21783.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21783", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:08.890", - "lastModified": "2024-11-13T21:15:08.890", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow for some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "El desbordamiento de enteros en algunos programas Intel(R) VPL anteriores a la versi\u00f3n 24.1.4 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21799.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21799.json index d71d97b2a5f..4a9b3f7d685 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21799.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21799.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21799", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:09.170", - "lastModified": "2024-11-13T21:15:09.170", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path traversal for some Intel(R) Extension for Transformers software before version 1.5 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "El path traversal para alg\u00fan software Intel(R) Extension for Transformers anterior a la versi\u00f3n 1.5 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21808.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21808.json index 83b8815f7ae..ea8f0a9519b 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21808.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21808.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21808", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:09.403", - "lastModified": "2024-11-13T21:15:09.403", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Restricciones de b\u00fafer inadecuadas en algunos programas Intel(R) VPL anteriores a la versi\u00f3n 24.1.4 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21820.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21820.json index 6501a791e15..bea7c0ba472 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21820.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21820.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21820", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:09.653", - "lastModified": "2024-11-13T21:15:09.653", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Los permisos predeterminados incorrectos en algunas configuraciones de controlador de memoria del procesador Intel(R) Xeon(R) al utilizar Intel(R) SGX pueden permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21850.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21850.json index 4d8918a0ac5..58942218a48 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21850.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21850.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21850", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:09.910", - "lastModified": "2024-11-13T21:15:09.910", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information in resource not removed before reuse in some Intel(R) TDX Seamldr module software before version 1.5.02.00 may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La informaci\u00f3n confidencial de un recurso no eliminado antes de su reutilizaci\u00f3n en alg\u00fan software del m\u00f3dulo Intel(R) TDX Seamldr anterior a la versi\u00f3n 1.5.02.00 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21853.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21853.json index 5afdfa6a2b6..963a17ec78c 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21853.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21853.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21853", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:10.150", - "lastModified": "2024-11-13T21:15:10.150", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel(R) Xeon(R) Processors may allow an authorized user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "Las m\u00e1quinas de estados finitos (FSM) inadecuadas en la l\u00f3gica de hardware de algunos procesadores Intel\u00ae Xeon\u00ae de cuarta y quinta generaci\u00f3n pueden permitir que un usuario autorizado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22185.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22185.json index 7f8472460c4..78ac3ccf8e6 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22185.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22185.json @@ -2,13 +2,17 @@ "id": "CVE-2024-22185", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:10.460", - "lastModified": "2024-11-13T21:15:10.460", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Time-of-check Time-of-use Race Condition in some Intel(R) processors with Intel(R) ACTM may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La condici\u00f3n de ejecuci\u00f3n de tiempo de uso y tiempo de verificaci\u00f3n en algunos procesadores Intel(R) con Intel(R) ACTM puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23198.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23198.json index 6724ab74c89..28d1452a521 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23198.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23198.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23198", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:10.733", - "lastModified": "2024-11-13T21:15:10.733", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi products before version 23.40 may allow an unauthenticated user to enable denial of service via adjacent access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el firmware de algunos productos Intel(R) PROSet/Wireless Software e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 23.40 puede permitir que un usuario no autenticado habilite la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23312.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23312.json index 51d189a627c..1a91d814805 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23312.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23312.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23312", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:10.980", - "lastModified": "2024-11-13T21:15:10.980", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path for some Intel(R) Binary Configuration Tool software for Windows before version 3.4.5 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para alg\u00fan software de la herramienta de configuraci\u00f3n binaria Intel(R) para Windows anterior a la versi\u00f3n 3.4.5 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23715.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23715.json index 77eaca26cfd..1bb15f617ab 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23715.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23715.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23715", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.080", - "lastModified": "2024-11-13T18:15:20.080", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PMRWritePMPageList of pmr.c, there is a possible out of bounds write due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En PMRWritePMPageList de pmr.c, existe una posible escritura fuera de los l\u00edmites debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23918.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23918.json index 1ea1cef6297..41018deb8ea 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23918.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23918.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23918", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:11.227", - "lastModified": "2024-11-13T21:15:11.227", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La verificaci\u00f3n de condiciones inadecuadas en algunas configuraciones del controlador de memoria del procesador Intel(R) Xeon(R) al utilizar Intel(R) SGX puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23919.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23919.json index 5ba167ad680..2f4e888a0d6 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23919.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23919.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23919", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:11.457", - "lastModified": "2024-11-13T21:15:11.457", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in some Intel(R) Graphics software may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Restricciones de b\u00fafer inadecuadas en algunos programas de gr\u00e1ficos Intel(R) pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24984.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24984.json index 78f18a66f61..eb23c0eb1ca 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24984.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24984.json @@ -2,13 +2,17 @@ "id": "CVE-2024-24984", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:11.703", - "lastModified": "2024-11-13T21:15:11.703", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation for some Intel(R) Wireless Bluetooth(R) products for Windows before version 23.40 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta para algunos productos Intel(R) Wireless Bluetooth(R) para Windows anteriores a la versi\u00f3n 23.40 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24985.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24985.json index 0137732ba51..791c5a3c94b 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24985.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24985.json @@ -2,13 +2,17 @@ "id": "CVE-2024-24985", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:11.940", - "lastModified": "2024-11-13T21:15:11.940", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of resource to wrong sphere in some Intel(R) processors with Intel(R) ACTM may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La exposici\u00f3n de recursos a una esfera incorrecta en algunos procesadores Intel(R) con Intel(R) ACTM puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25563.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25563.json index eb5ec915c36..3d6c205b8a9 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25563.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25563.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25563", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:12.193", - "lastModified": "2024-11-13T21:15:12.193", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper initialization in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi before version 23.40 may allow a privileged user to potentially enable information disclosure via local access." + }, + { + "lang": "es", + "value": "La inicializaci\u00f3n incorrecta del firmware para algunos programas Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 23.40 puede permitir que un usuario privilegiado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25565.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25565.json index 16528e41f5d..f0d95357104 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25565.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25565.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25565", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:12.430", - "lastModified": "2024-11-13T21:15:12.430", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient control flow management in UEFI firmware for some Intel(R) Xeon(R) Processors may allow an authenticated user to enable denial of service via local access." + }, + { + "lang": "es", + "value": "La gesti\u00f3n insuficiente del flujo de control en el firmware UEFI para algunos procesadores Intel(R) Xeon(R) puede permitir que un usuario autenticado habilite la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25647.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25647.json index fd7041d0bd1..801c26336b7 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25647.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25647.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25647", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:12.683", - "lastModified": "2024-11-13T21:15:12.683", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect default permissions for some Intel(R) Binary Configuration Tool software for Windows before version 3.4.5 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Los permisos predeterminados incorrectos para alg\u00fan software de la herramienta de configuraci\u00f3n binaria Intel(R) para Windows anterior a la versi\u00f3n 3.4.5 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2550.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2550.json index 6ee4f446a06..b4fbbf0582d 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2550.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2550.json @@ -2,13 +2,17 @@ "id": "CVE-2024-2550", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:04.137", - "lastModified": "2024-11-14T10:15:04.137", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desreferencia de puntero nulo en la puerta de enlace GlobalProtect del software PAN-OS de Palo Alto Networks permite que un atacante no autenticado detenga el servicio GlobalProtect en el firewall mediante el env\u00edo de un paquete especialmente manipulado que provoca una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Los intentos repetidos de activar esta condici\u00f3n hacen que el firewall entre en modo de mantenimiento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2551.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2551.json index f15039cd2d0..a4a7ca46616 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2551.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2551.json @@ -2,13 +2,17 @@ "id": "CVE-2024-2551", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:04.547", - "lastModified": "2024-11-14T10:15:04.547", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desreferencia de puntero nulo en el software PAN-OS de Palo Alto Networks permite a un atacante no autenticado detener un servicio central del sistema en el firewall mediante el env\u00edo de un paquete manipulado a trav\u00e9s del plano de datos que provoca una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Los intentos repetidos de activar esta condici\u00f3n hacen que el firewall entre en modo de mantenimiento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2552.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2552.json index af28789e2bb..8a08b8ede8b 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2552.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2552.json @@ -2,13 +2,17 @@ "id": "CVE-2024-2552", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:04.957", - "lastModified": "2024-11-14T10:15:04.957", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions in the management plane and delete files on the firewall." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de comandos en el software PAN-OS de Palo Alto Networks permite a un administrador autenticado eludir las restricciones del sistema en el plano de administraci\u00f3n y eliminar archivos en el firewall." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26017.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26017.json index 3e3b4977101..9d83e7165c8 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26017.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26017.json @@ -2,13 +2,17 @@ "id": "CVE-2024-26017", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:12.910", - "lastModified": "2024-11-13T21:15:12.910", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path in some Intel(R) Rendering Toolkit software before version 2024.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada en algunos programas Intel(R) Rendering Toolkit anteriores a la versi\u00f3n 2024.1.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27200.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27200.json index 8856547a507..55d9588d35f 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27200.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27200.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27200", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:13.140", - "lastModified": "2024-11-13T21:15:13.140", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in some Intel(R) Granulate(TM) software before version 4.30.1 may allow a authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en algunos programas Intel(R) Granulate(TM) anteriores a la versi\u00f3n 4.30.1 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28028.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28028.json index 4e4cf0a8a87..967291ae02e 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28028.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28028.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28028", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:13.387", - "lastModified": "2024-11-13T21:15:13.387", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in some Intel(R) Neural Compressor software before version v3.0 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en algunos programas Intel(R) Neural Compressor anteriores a la versi\u00f3n v3.0 puede permitir que un usuario no autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28030.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28030.json index 5321b24e570..817d5fcc572 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28030.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28030.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28030", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:13.650", - "lastModified": "2024-11-13T21:15:13.650", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NULL pointer dereference in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La desreferenciaci\u00f3n de puntero NULL en algunos programas Intel(R) VPL anteriores a la versi\u00f3n 24.1.4 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28049.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28049.json index ec7a204f35f..98c89363040 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28049.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28049.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28049", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:13.890", - "lastModified": "2024-11-13T21:15:13.890", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi wireless products before version 23.40 may allow an unauthenticated user to enable denial of service via adjacent access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el firmware de algunos productos inal\u00e1mbricos Intel(R) PROSet/Wireless Software y Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 23.40 puede permitir que un usuario no autenticado habilite la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28051.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28051.json index 8b8888b3c5b..a8343ccf3d0 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28051.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28051.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28051", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:14.123", - "lastModified": "2024-11-13T21:15:14.123", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable information disclosure via local access." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en algunos programas Intel(R) VPL anteriores a la versi\u00f3n 24.1.4 puede permitir que un usuario autenticado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28169.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28169.json index 53358eaebe0..a1d98d482f4 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28169.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28169.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28169", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:14.377", - "lastModified": "2024-11-13T21:15:14.377", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information for some BigDL software maintained by Intel(R) before version 2.5.0 may allow an authenticated user to potentially enable denial of service via adjacent access." + }, + { + "lang": "es", + "value": "La transmisi\u00f3n de texto plano de informaci\u00f3n confidencial para alg\u00fan software BigDL mantenido por Intel\u00ae antes de la versi\u00f3n 2.5.0 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28881.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28881.json index cff922ff622..6735e3f3194 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28881.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28881.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28881", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:14.620", - "lastModified": "2024-11-13T21:15:14.620", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path for some Intel(R) Fortran Compiler Classic software before version 2021.13 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para alg\u00fan software Intel(R) Fortran Compiler Classic anterior a la versi\u00f3n 2021.13 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28885.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28885.json index 2fc70611ae7..4bf58591f00 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28885.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28885.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28885", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:14.853", - "lastModified": "2024-11-13T21:15:14.853", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Observable discrepancy in some Intel(R) QAT Engine for OpenSSL software before version v1.6.1 may allow information disclosure via network access." + }, + { + "lang": "es", + "value": "Una discrepancia observable en algunos programas Intel(R) QAT Engine para OpenSSL anteriores a la versi\u00f3n v1.6.1 puede permitir la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28950.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28950.json index bff89288957..33ef9acdf15 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28950.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28950.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28950", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:15.093", - "lastModified": "2024-11-13T21:15:15.093", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path for some Intel(R) oneAPI Math Kernel Library software for Windows before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para alg\u00fan software de la librer\u00eda de kernel matem\u00e1tica Intel(R) oneAPI para Windows anterior a la versi\u00f3n 2024.2 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28952.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28952.json index cae57effcec..e4fb994c931 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28952.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28952.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28952", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:15.310", - "lastModified": "2024-11-13T21:15:15.310", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path for some Intel(R) IPP software for Windows before version 2021.12.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para alg\u00fan software Intel(R) IPP para Windows anterior a la versi\u00f3n 2021.12.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29076.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29076.json index de61c91b787..b15fe8b5223 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29076.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29076.json @@ -2,13 +2,17 @@ "id": "CVE-2024-29076", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:15.537", - "lastModified": "2024-11-13T21:15:15.537", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncaught exception for some Intel(R) CST software before version 8.7.10803 may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "Una excepci\u00f3n no detectada para alg\u00fan software Intel(R) CST anterior a la versi\u00f3n 8.7.10803 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29077.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29077.json index a420f23acfe..df9d40846d7 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29077.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29077.json @@ -2,13 +2,17 @@ "id": "CVE-2024-29077", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:15.790", - "lastModified": "2024-11-13T21:15:15.790", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in some JAM STAPL Player software before version 2.6.1 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en algunos programas de JAM STAPL Player anteriores a la versi\u00f3n 2.6.1 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29079.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29079.json index f88860456d3..e6de56bfe15 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29079.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29079.json @@ -2,13 +2,17 @@ "id": "CVE-2024-29079", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:16.027", - "lastModified": "2024-11-13T21:15:16.027", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient control flow management in some Intel(R) VROC software before version 8.6.0.3001 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Una gesti\u00f3n insuficiente del flujo de control en algunos programas Intel(R) VROC anteriores a la versi\u00f3n 8.6.0.3001 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29083.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29083.json index 453d2eac34f..5ed16958161 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29083.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29083.json @@ -2,13 +2,17 @@ "id": "CVE-2024-29083", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:16.280", - "lastModified": "2024-11-13T21:15:16.280", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect default permissions in some Intel(R) Distribution for Python software before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Los permisos predeterminados incorrectos en algunas distribuciones Intel(R) para el software Python anteriores a la versi\u00f3n 2024.2 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29085.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29085.json index 8be4c9c8d74..d53eda12f93 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29085.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29085.json @@ -2,13 +2,17 @@ "id": "CVE-2024-29085", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:16.520", - "lastModified": "2024-11-13T21:15:16.520", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control for some BigDL software maintained by Intel(R) before version 2.5.0 may allow an authenticated user to potentially enable escalation of privilege via adjacent access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado para algunos programas BigDL fabricados por Intel(R) antes de la versi\u00f3n 2.5.0 puede permitir que un usuario autenticado potencialmente habilite la escalada de privilegios a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31074.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31074.json index 11fe50f0ee2..f85967fee88 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31074.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31074.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31074", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:16.790", - "lastModified": "2024-11-13T21:15:16.790", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Observable timing discrepancy in some Intel(R) QAT Engine for OpenSSL software before version v1.6.1 may allow information disclosure via network access." + }, + { + "lang": "es", + "value": "Una discrepancia de tiempo observable en algunos programas Intel(R) QAT Engine para OpenSSL anteriores a la versi\u00f3n v1.6.1 puede permitir la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31154.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31154.json index b975a40c6b4..0cd0ca9b2bb 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31154.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31154.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31154", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:17.040", - "lastModified": "2024-11-13T21:15:17.040", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in UEFI firmware for some Intel(R) Server S2600BPBR may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el firmware UEFI para algunos servidores Intel(R) S2600BPBR puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31158.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31158.json index 27efaec69e0..5b01975eeb8 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31158.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31158.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31158", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:17.287", - "lastModified": "2024-11-13T21:15:17.287", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in UEFI firmware in some Intel(R) Server Board S2600BP Family may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el firmware UEFI en algunos Intel(R) Server Board S2600BP Family puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31337.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31337.json index 8466f94c54d..97208083460 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31337.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31337.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31337", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.167", - "lastModified": "2024-11-13T18:15:20.167", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PVRSRVRGXKickTA3DKM of rgxta3d.c, there is a possible arbitrary code execution due to improper input validation. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En PVRSRVRGXKickTA3DKM de rgxta3d.c, existe la posibilidad de ejecuci\u00f3n de c\u00f3digo arbitrario debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31407.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31407.json index f7bdbf383a1..275ded41357 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31407.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31407.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31407", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:17.530", - "lastModified": "2024-11-13T21:15:17.530", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path in some Intel(R) High Level Synthesis Compiler software for Intel(R) Quartus(R) Prime Pro Edition Software before version 24.1 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada en alg\u00fan software Intel(R) High Level Synthesis Compiler para Intel(R) Quartus(R) Prime Pro Edition anterior a la versi\u00f3n 24.1 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31695.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31695.json index 73ef27483fe..200d9f2ccc8 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31695.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31695.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31695", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T22:15:15.953", - "lastModified": "2024-11-14T22:15:15.953", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A misconfiguration in the fingerprint authentication mechanism of Binance: BTC, Crypto and NFTS v2.85.4, allows attackers to bypass authentication when adding a new fingerprint." + }, + { + "lang": "es", + "value": "Una mala configuraci\u00f3n en el mecanismo de autenticaci\u00f3n de huellas dactilares de Binance: BTC, Crypto y NFTS v2.85.4, permite a los atacantes eludir la autenticaci\u00f3n al agregar una nueva huella dactilar." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32044.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32044.json index 35d30b7c1ad..4bc4e3191fb 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32044.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32044.json @@ -2,13 +2,17 @@ "id": "CVE-2024-32044", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:17.763", - "lastModified": "2024-11-13T21:15:17.763", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control for some Intel(R) Arc(TM) Pro Graphics for Windows drivers before version 31.0.101.5319 may allow an authenticated user to potentially enable escalation of privilege via adjacent access." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado para algunos controladores de gr\u00e1ficos Intel(R) Arc(TM) Pro para Windows anteriores a la versi\u00f3n 31.0.101.5319 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32048.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32048.json index aa4f99f823c..cfa4d97d207 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32048.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32048.json @@ -2,13 +2,17 @@ "id": "CVE-2024-32048", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:18.013", - "lastModified": "2024-11-13T21:15:18.013", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in the Intel(R) Distribution of OpenVINO(TM) Model Server software before version 2024.0 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el software Intel(R) Distribution of OpenVINO(TM) Model Server anterior a la versi\u00f3n 2024.0 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32483.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32483.json index df6ab9a4e5d..1a73d888b35 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32483.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32483.json @@ -2,13 +2,17 @@ "id": "CVE-2024-32483", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:18.270", - "lastModified": "2024-11-13T21:15:18.270", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control for some Intel(R) EMA software before version 1.13.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado para algunos programas Intel(R) EMA anteriores a la versi\u00f3n 1.13.1.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32485.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32485.json index 7653970c027..db1c5a913a0 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32485.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32485.json @@ -2,13 +2,17 @@ "id": "CVE-2024-32485", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:18.520", - "lastModified": "2024-11-13T21:15:18.520", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input Validation in some Intel(R) VROC software before version 8.6.0.2003 may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en algunos programas Intel(R) VROC anteriores a la versi\u00f3n 8.6.0.2003 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32667.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32667.json index 8ada1251e16..66956cbd320 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32667.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32667.json @@ -2,13 +2,17 @@ "id": "CVE-2024-32667", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:18.760", - "lastModified": "2024-11-13T21:15:18.760", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read for some OpenCL(TM) software may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites para alg\u00fan software OpenCL(TM) puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33611.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33611.json index 898901fb379..d96c3b91c40 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33611.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33611.json @@ -2,13 +2,17 @@ "id": "CVE-2024-33611", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:19.000", - "lastModified": "2024-11-13T21:15:19.000", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation for some Intel(R) PROSet/Wireless WiFi software for Windows before version 23.60 may allow a privileged user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta para alg\u00fan software Intel(R) PROSet/Wireless WiFi para Windows anterior a la versi\u00f3n 23.60 puede permitir que un usuario privilegiado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33617.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33617.json index 415ee743e87..75d910493d6 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33617.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33617.json @@ -2,13 +2,17 @@ "id": "CVE-2024-33617", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:19.243", - "lastModified": "2024-11-13T21:15:19.243", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient control flow management in some Intel(R) QAT Engine for OpenSSL software before version v1.6.1 may allow information disclosure via network access." + }, + { + "lang": "es", + "value": "La gesti\u00f3n insuficiente del flujo de control en algunos programas Intel(R) QAT Engine para OpenSSL anteriores a la versi\u00f3n v1.6.1 puede permitir la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33624.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33624.json index ca02cab565d..014ac5824da 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33624.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33624.json @@ -2,13 +2,17 @@ "id": "CVE-2024-33624", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:19.510", - "lastModified": "2024-11-13T21:15:19.510", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation for some Intel(R) PROSet/Wireless WiFi software for Windows before version 23.60 may allow an unauthenticated user to potentially enable denial of service via network access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta para alg\u00fan software Intel(R) PROSet/Wireless WiFi para Windows anterior a la versi\u00f3n 23.60 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3379.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3379.json index fbb4c0c37f7..5604618a7ec 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3379.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3379.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3379", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-14T18:15:18.503", - "lastModified": "2024-11-14T18:15:18.503", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In lunary-ai/lunary versions 1.2.2 through 1.2.6, an incorrect authorization vulnerability allows unprivileged users to re-generate the private key for projects they do not have access to. Specifically, a user with a 'Member' role can issue a request to regenerate the private key of a project without having the necessary permissions or being assigned to that project. This issue was fixed in version 1.2.7." + }, + { + "lang": "es", + "value": "En las versiones 1.2.2 a 1.2.6 de lunary-ai/lunary, una vulnerabilidad de autorizaci\u00f3n incorrecta permite a los usuarios sin privilegios volver a generar la clave privada para proyectos a los que no tienen acceso. En concreto, un usuario con un rol de \"Miembro\" puede emitir una solicitud para regenerar la clave privada de un proyecto sin tener los permisos necesarios o estar asignado a ese proyecto. Este problema se solucion\u00f3 en la versi\u00f3n 1.2.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34022.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34022.json index ead751fd3f4..e9883b5f813 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34022.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34022.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34022", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:19.757", - "lastModified": "2024-11-13T21:15:19.757", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Access Control in some Thunderbolt(TM) Share software before version 1.0.49.9 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en algunos programas Thunderbolt(TM) Share anteriores a la versi\u00f3n 1.0.49.9 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34023.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34023.json index aa0cf0e6fb8..a6ba5ae9c0f 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34023.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34023.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34023", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:19.993", - "lastModified": "2024-11-13T21:15:19.993", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted pointer dereference in some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La desreferencia de puntero no confiable en algunos Intel(R) Graphics Drivers puede permitir que un usuario autenticado potencialmente habilite la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34028.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34028.json index ad76e8bab62..34cb2c0d7e2 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34028.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34028.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34028", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:20.247", - "lastModified": "2024-11-13T21:15:20.247", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path in some Intel(R) Graphics Offline Compiler for OpenCL(TM) Code software for Windows before version 2024.1.0.142, graphics driver 31.0.101.5445 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada en alg\u00fan software Intel(R) Graphics Offline Compiler for OpenCL(TM) Code para Windows anterior a la versi\u00f3n 2024.1.0.142, controlador de gr\u00e1ficos 31.0.101.5445 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34164.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34164.json index 34be29b1711..b5da99bdf99 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34164.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34164.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34164", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:20.507", - "lastModified": "2024-11-13T21:15:20.507", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path element in some Intel(R) MAS software before version 2.5 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un elemento de ruta de b\u00fasqueda no controlada en alg\u00fan software Intel(R) MAS anterior a la versi\u00f3n 2.5 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34165.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34165.json index 37a180d553e..fb4bf8b3ae4 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34165.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34165.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34165", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:20.763", - "lastModified": "2024-11-13T21:15:20.763", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path in some Intel(R) oneAPI DPC++/C++ Compiler before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada en algunos Intel(R) oneAPI DPC++/C++ Compiler anteriores a la versi\u00f3n 2024.2 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34167.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34167.json index b51469d58c8..a2d59d48f22 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34167.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34167.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34167", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:21.013", - "lastModified": "2024-11-13T21:15:21.013", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path for the Intel(R) Server Board S2600ST Family BIOS and Firmware Update software all versions may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para todas las versiones Intel(R) Server Board S2600ST Family BIOS and Firmware Update puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34170.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34170.json index 9b97ea9ed53..9cd6e423ee8 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34170.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34170.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34170", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:21.280", - "lastModified": "2024-11-13T21:15:21.280", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "Restricciones de b\u00fafer inadecuadas en algunos Intel(R) Graphics Drivers pueden permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local. " } ], "metrics": { diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34719.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34719.json index 696d6a9bfe3..a4cb1e6840f 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34719.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34719.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34719", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.267", - "lastModified": "2024-11-14T19:35:05.990", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34729.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34729.json index 7863dbfe44c..9c7e8d57623 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34729.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34729.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34729", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.337", - "lastModified": "2024-11-13T18:15:20.337", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple locations, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En varias ubicaciones, existe la posibilidad de ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34747.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34747.json index c2051bf98a2..8ba86e1e155 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34747.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34747.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34747", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.410", - "lastModified": "2024-11-13T18:15:20.410", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DevmemXIntMapPages of devicemem_server.c, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En DevmemXIntMapPages de devicemem_server.c, existe un posible use-after-free debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. " } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34776.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34776.json index cbaddb104b2..d5c7d1e9949 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34776.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34776.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34776", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:21.520", - "lastModified": "2024-11-13T21:15:21.520", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in some Intel(R) SGX SDK software may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites en alg\u00fan software Intel(R) SGX SDK puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3447.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3447.json index c2a1eaddcf7..e23708942f5 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3447.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3447.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3447", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-14T12:15:17.743", - "lastModified": "2024-11-14T12:15:17.743", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un desbordamiento de b\u00fafer basado en mont\u00f3n en la emulaci\u00f3n de dispositivo SDHCI de QEMU. El error se activa cuando tanto `s->data_count` como el tama\u00f1o de `s->fifo_buffer` se establecen en 0x200, lo que genera un acceso fuera de los l\u00edmites. Un invitado malintencionado podr\u00eda usar esta falla para bloquear el proceso QEMU en el host, lo que genera una condici\u00f3n de denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35201.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35201.json index dc368ad57ef..eb9746a69c5 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35201.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35201.json @@ -2,13 +2,17 @@ "id": "CVE-2024-35201", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:21.773", - "lastModified": "2024-11-13T21:15:21.773", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect default permissions in the Intel(R) SDP Tool for Windows software all versions may allow an authenticated user to enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Los permisos predeterminados incorrectos en todas las versiones del software Intel(R) SDP Tool para Windows pueden permitir que un usuario autenticado habilite la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35245.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35245.json index e83991f8e25..ef510fb5a43 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35245.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35245.json @@ -2,13 +2,17 @@ "id": "CVE-2024-35245", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:22.003", - "lastModified": "2024-11-13T21:15:22.003", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path element in some Intel(R) PROSet/Wireless WiFi software for Windows before version 23.60 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un elemento de ruta de b\u00fasqueda no controlada en alg\u00fan software Intel(R) PROSet/Wireless WiFi para Windows anterior a la versi\u00f3n 23.60 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3501.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3501.json index f03c32255d3..14ee89a5d7e 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3501.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3501.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3501", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-14T18:15:18.713", - "lastModified": "2024-11-14T18:15:18.713", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In lunary-ai/lunary versions up to and including 1.2.5, an information disclosure vulnerability exists due to the inclusion of single-use tokens in the responses of `GET /v1/users/me` and `GET /v1/users/me/org` API endpoints. These tokens, intended for sensitive operations such as password resets or account verification, are exposed to unauthorized actors, potentially allowing them to perform actions on behalf of the user. This issue was addressed in version 1.2.6, where the exposure of single-use tokens in user-facing queries was mitigated." + }, + { + "lang": "es", + "value": "En las versiones de lunary-ai/lunary hasta la 1.2.5 incluida, existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n debido a la inclusi\u00f3n de tokens de un solo uso en las respuestas de los endpoints de API `GET /v1/users/me` y `GET /v1/users/me/org`. Estos tokens, destinados a operaciones confidenciales como restablecimiento de contrase\u00f1as o verificaci\u00f3n de cuentas, est\u00e1n expuestos a actores no autorizados, lo que potencialmente les permite realizar acciones en nombre del usuario. Este problema se solucion\u00f3 en la versi\u00f3n 1.2.6, donde se mitig\u00f3 la exposici\u00f3n de tokens de un solo uso en consultas de cara al usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3502.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3502.json index a020644cf18..2051a754aab 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3502.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3502.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3502", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-14T18:15:18.943", - "lastModified": "2024-11-14T18:15:18.943", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In lunary-ai/lunary versions up to and including 1.2.5, an information disclosure vulnerability exists where account recovery hashes of users are inadvertently exposed to unauthorized actors. This issue occurs when authenticated users inspect responses from `GET /v1/users/me` and `GET /v1/users/me/org` endpoints. The exposed account recovery hashes, while not directly related to user passwords, represent sensitive information that should not be accessible to unauthorized parties. Exposing these hashes could potentially facilitate account recovery attacks or other malicious activities. The vulnerability was addressed in version 1.2.6." + }, + { + "lang": "es", + "value": "En las versiones de lunary-ai/lunary hasta la 1.2.5 incluida, existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la que los hashes de recuperaci\u00f3n de cuentas de los usuarios se exponen inadvertidamente a actores no autorizados. Este problema se produce cuando los usuarios autenticados inspeccionan las respuestas de los endpoints `GET /v1/users/me` y `GET /v1/users/me/org`. Los hashes de recuperaci\u00f3n de cuentas expuestos, si bien no est\u00e1n directamente relacionados con las contrase\u00f1as de los usuarios, representan informaci\u00f3n confidencial a la que no deber\u00edan tener acceso partes no autorizadas. La exposici\u00f3n de estos hashes podr\u00eda facilitar ataques de recuperaci\u00f3n de cuentas u otras actividades maliciosas. La vulnerabilidad se solucion\u00f3 en la versi\u00f3n 1.2.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36242.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36242.json index a89cd0ab55a..4a923afaad3 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36242.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36242.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36242", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:22.237", - "lastModified": "2024-11-13T21:15:22.237", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Protection mechanism failure in the SPP for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La falla del mecanismo de protecci\u00f3n en el SPP de algunos procesadores Intel(R) puede permitir que un usuario autenticado potencialmente habilite la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36245.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36245.json index 75e5c9f1888..864e09efc78 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36245.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36245.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36245", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:22.493", - "lastModified": "2024-11-13T21:15:22.493", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path element in some Intel(R) VTune(TM) Profiler software before version 2024.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un elemento de ruta de b\u00fasqueda no controlada en alg\u00fan software Intel(R) VTune(TM) Profiler anterior a la versi\u00f3n 2024.2.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36253.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36253.json index 73eee6fc2a7..d8efe4a8be4 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36253.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36253.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36253", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:22.730", - "lastModified": "2024-11-13T21:15:22.730", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path in the Intel(R) SDP Tool for Windows software all version may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada en todas las versiones del software Intel(R) SDP Tool para Windows puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36275.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36275.json index 9cacf4a8609..66e9252d804 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36275.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36275.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36275", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:22.987", - "lastModified": "2024-11-13T21:15:22.987", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NULL pointer dereference in some Intel(R) Optane(TM) PMem Management software versions before CR_MGMT_02.00.00.4040, CR_MGMT_03.00.00.0499 may allow a authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La desreferencia de puntero NULL en algunas versiones del software Intel(R) Optane(TM) PMem Management anteriores a CR_MGMT_02.00.00.4040, CR_MGMT_03.00.00.0499 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36276.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36276.json index e893d5ebdec..6181c912696 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36276.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36276.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36276", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:23.253", - "lastModified": "2024-11-13T21:15:23.253", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure inherited permissions for some Intel(R) CIP software before version 2.4.10852 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Los permisos heredados inseguros para alg\u00fan software Intel(R) CIP anterior a la versi\u00f3n 2.4.10852 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36282.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36282.json index 6a414ff53eb..3b43aff8281 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36282.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36282.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36282", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:23.500", - "lastModified": "2024-11-13T21:15:23.500", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in the Intel(R) Server Board S2600ST Family BIOS and Firmware Update software all versions may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en todas las versiones del software Intel(R) Server Board S2600ST Family BIOS and Firmware Update puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36284.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36284.json index fdecfac2adc..b6b8963c5d7 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36284.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36284.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36284", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:23.793", - "lastModified": "2024-11-13T21:15:23.793", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in some Intel(R) Neural Compressor software before version v3.0 may allow an authenticated user to potentially enable escalation of privilege via adjacent access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en algunos programas Intel(R) Neural Compressor anteriores a la versi\u00f3n v3.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36294.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36294.json index b853675ec21..6bd0645d6d1 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36294.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36294.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36294", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:24.040", - "lastModified": "2024-11-13T21:15:24.040", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure inherited permissions for some Intel(R) DSA software before version 24.3.26.8 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Los permisos heredados inseguros para alg\u00fan software Intel(R) DSA anterior a la versi\u00f3n 24.3.26.8 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36482.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36482.json index ae1f36d66c3..f04053d097c 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36482.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36482.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36482", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:24.287", - "lastModified": "2024-11-13T21:15:24.287", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in some Intel(R) CIP software before version 2.4.10852 may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en algunos programas Intel(R) CIP anteriores a la versi\u00f3n 2.4.10852 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36488.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36488.json index 9d48089a44c..0be3c16ca4f 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36488.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36488.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36488", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:24.533", - "lastModified": "2024-11-13T21:15:24.533", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Access Control in some Intel(R) DSA before version 24.3.26.8 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en algunos Intel(R) DSA anteriores a la versi\u00f3n 24.3.26.8 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37024.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37024.json index 53c60a7bafa..ed0db92571c 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37024.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37024.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37024", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:24.763", - "lastModified": "2024-11-13T21:15:24.763", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path for some ACAT software maintained by Intel(R) for Windows before version 3.11.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para alg\u00fan software ACAT mantenido por Intel(R) para Windows antes de la versi\u00f3n 3.11.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37025.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37025.json index 0de3c499b12..4059cc461ab 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37025.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37025.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37025", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:25.000", - "lastModified": "2024-11-13T21:15:25.000", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect execution-assigned permissions in some Intel(R) Advanced Link Analyzer Standard Edition software installer before version 23.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Los permisos de ejecuci\u00f3n asignados incorrectamente en algunos instaladores de software Intel(R) Advanced Link Analyzer Standard Edition anteriores a la versi\u00f3n 23.1.1 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37027.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37027.json index f2c62c6f5d4..5928704ed47 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37027.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37027.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37027", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:25.240", - "lastModified": "2024-11-13T21:15:25.240", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input validation in some Intel(R) VTune(TM) Profiler software before version 2024.2.0 may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en algunos programas Intel(R) VTune(TM) Profiler anteriores a la versi\u00f3n 2024.2.0 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37285.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37285.json index bf7ff41da34..b67da800f3b 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37285.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37285.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37285", "sourceIdentifier": "bressers@elastic.co", "published": "2024-11-14T17:15:06.457", - "lastModified": "2024-11-14T17:15:06.457", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. A successful attack requires a malicious user to have a combination of both specific Elasticsearch indices privileges https://www.elastic.co/guide/en/elasticsearch/reference/current/defining-roles.html#roles-indices-priv \u00a0and Kibana privileges https://www.elastic.co/guide/en/fleet/current/fleet-roles-and-privileges.html \u00a0assigned to them.\n\n\n\nThe following Elasticsearch indices permissions are required\n\n * write\u00a0privilege on the system indices .kibana_ingest*\n * The allow_restricted_indices\u00a0flag is set to true\n\n\nAny of the following Kibana privileges are additionally required\n\n * Under Fleet\u00a0the All\u00a0privilege is granted\n * Under Integration\u00a0the Read\u00a0or All\u00a0privilege is granted\n * Access to the fleet-setup\u00a0privilege is gained through the Fleet Server\u2019s service account token" + }, + { + "lang": "es", + "value": "Un problema de deserializaci\u00f3n en Kibana puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario cuando Kibana intenta analizar un documento YAML que contiene un payload manipulado. Un ataque exitoso requiere que un usuario malintencionado tenga una combinaci\u00f3n de privilegios espec\u00edficos de \u00edndices de Elasticsearch https://www.elastic.co/guide/en/elasticsearch/reference/current/defining-roles.html#roles-indices-priv y privilegios de Kibana https://www.elastic.co/guide/en/fleet/current/fleet-roles-and-privileges.html asignados a ellos. Se requieren los siguientes permisos de \u00edndices de Elasticsearch * privilegio de escritura en los \u00edndices del sistema .kibana_ingest* * El indicador allow_restricted_indices est\u00e1 configurado en verdadero Cualquiera de los siguientes privilegios de Kibana tambi\u00e9n se requiere * En Fleet, se otorga el privilegio All * En Integration, se otorga el privilegio Read o All * El acceso al privilegio de configuraci\u00f3n de la flota se obtiene a trav\u00e9s del token de cuenta de servicio del servidor Fleet" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3760.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3760.json index 77e0e8dd98c..53d10f68a60 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3760.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3760.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3760", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-14T19:15:06.327", - "lastModified": "2024-11-14T19:15:06.327", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In lunary-ai/lunary version 1.2.7, there is a lack of rate limiting on the forgot password page, leading to an email bombing vulnerability. Attackers can exploit this by automating forgot password requests to flood targeted user accounts with a high volume of password reset emails. This not only overwhelms the victim's mailbox, making it difficult to manage and locate legitimate emails, but also significantly impacts mail servers by consuming their resources. The increased load can cause performance degradation and, in severe cases, make the mail servers unresponsive or unavailable, disrupting email services for the entire organization." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 1.2.7 de lunary-ai/lunary, no existe un l\u00edmite de velocidad en la p\u00e1gina de contrase\u00f1a olvidada, lo que genera una vulnerabilidad de bombardeo de correo electr\u00f3nico. Los atacantes pueden aprovechar esto automatizando las solicitudes de contrase\u00f1a olvidada para inundar las cuentas de usuario objetivo con un gran volumen de correos electr\u00f3nicos de restablecimiento de contrase\u00f1a. Esto no solo sobrecarga el buz\u00f3n de la v\u00edctima, lo que dificulta la administraci\u00f3n y la ubicaci\u00f3n de correos electr\u00f3nicos leg\u00edtimos, sino que tambi\u00e9n afecta significativamente a los servidores de correo al consumir sus recursos. El aumento de la carga puede causar una degradaci\u00f3n del rendimiento y, en casos graves, hacer que los servidores de correo no respondan o no est\u00e9n disponibles, lo que interrumpe los servicios de correo electr\u00f3nico para toda la organizaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38383.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38383.json index 0da19014a22..47dd0fcdcfe 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38383.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38383.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38383", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:25.470", - "lastModified": "2024-11-13T21:15:25.470", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path for some Intel(R) Quartus(R) Prime Pro Edition software for Windows before version 24.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para algunos programas Intel(R) Quartus(R) Prime Pro Edition para Windows anteriores a la versi\u00f3n 24.2 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38387.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38387.json index 2b4e8bf57ca..9b66de9f01f 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38387.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38387.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38387", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:25.697", - "lastModified": "2024-11-13T21:15:25.697", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path in the Intel(R) Graphics Driver installers for versions 15.40 and 15.45 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada en los instaladores de Intel(R) Graphics Driver para las versiones 15.40 y 15.45 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38479.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38479.json index 758a72d3513..9715d0543fa 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38479.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38479.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38479", "sourceIdentifier": "security@apache.org", "published": "2024-11-14T10:15:05.347", - "lastModified": "2024-11-14T19:35:07.153", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38660.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38660.json index ede912afb2a..299834fac50 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38660.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38660.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38660", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:25.980", - "lastModified": "2024-11-13T21:15:25.980", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Protection mechanism failure in the SPP for some Intel(R) Xeon(R) processor family (E-Core) may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La falla del mecanismo de protecci\u00f3n en el SPP de algunos procesadores de la familia Intel(R) Xeon(R) (E-Core) puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local. " } ], "metrics": { diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38665.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38665.json index 892d380efa6..cebcf7d4bba 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38665.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38665.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38665", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:26.247", - "lastModified": "2024-11-13T21:15:26.247", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites en algunos Intel(R) Graphics Drivers puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38668.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38668.json index 6bbb360e73f..3c5ce7b1b30 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38668.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38668.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38668", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:26.500", - "lastModified": "2024-11-13T21:15:26.500", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path for some Intel(R) Quartus(R) Prime Standard Edition software for Windows before version 23.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para algunos programas Intel(R) Quartus(R) Prime Standard Edition para Windows anteriores a la versi\u00f3n 23.1.1 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39285.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39285.json index 53871e3f782..9bd6533e6a7 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39285.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39285.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39285", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:26.740", - "lastModified": "2024-11-13T21:15:26.740", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in UEFI firmware in some Intel(R) Server M20NTP Family may allow a privileged user to potentially enable information disclosure via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en el firmware UEFI en algunos Intel(R) Server M20NTP Family puede permitir que un usuario privilegiado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local. " } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39368.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39368.json index 4edaa94e457..1b7c5d0b46e 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39368.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39368.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39368", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:26.977", - "lastModified": "2024-11-13T21:15:26.977", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper neutralization of special elements used in an SQL command ('SQL Injection') in some Intel(R) Neural Compressor software before version v3.0 may allow an authenticated user to potentially enable escalation of privilege via adjacent access." + }, + { + "lang": "es", + "value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en alg\u00fan software Intel(R) Neural Compressor anterior a la versi\u00f3n v3.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39609.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39609.json index 8ea58583ecc..e60468e529e 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39609.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39609.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39609", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:27.197", - "lastModified": "2024-11-13T21:15:27.197", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Access Control in UEFI firmware for some Intel(R) Server Board M70KLP may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en el firmware UEFI para algunos Intel(R) Server Board M70KLP puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39610.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39610.json index aa4ed44d651..7ebc9e18a9d 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39610.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39610.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39610", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-11-15T06:15:04.667", - "lastModified": "2024-11-15T06:15:04.667", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in FitNesse releases prior to 20241026. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the product." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross Site Scripting en las versiones de FitNesse anteriores a la 20241026. Si se explota esta vulnerabilidad, se puede ejecutar una secuencia de comandos arbitraria en el navegador web del usuario que est\u00e9 usando el producto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39707.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39707.json index 4d0e5e4247f..307ee2133e1 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39707.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39707.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39707", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T22:15:16.147", - "lastModified": "2024-11-14T22:15:16.147", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insyde IHISI function 0x49 can restore factory defaults for certain UEFI variables without further authentication by default, which could lead to a possible roll-back attack in certain platforms. This is fixed in: kernel 5.2, version 05.29.19; kernel 5.3, version 05.38.19; kernel 5.4, version 05.46.19; kernel 5.5, version 05.54.19; kernel 5.6, version 05.61.19." + }, + { + "lang": "es", + "value": "La funci\u00f3n 0x49 de Insyde IHISI puede restaurar los valores predeterminados de f\u00e1brica para ciertas variables UEFI sin autenticaci\u00f3n adicional de forma predeterminada, lo que podr\u00eda provocar un posible ataque de reversi\u00f3n en ciertas plataformas. Esto se solucion\u00f3 en: kernel 5.2, versi\u00f3n 05.29.19; kernel 5.3, versi\u00f3n 05.38.19; kernel 5.4, versi\u00f3n 05.46.19; kernel 5.5, versi\u00f3n 05.54.19; kernel 5.6, versi\u00f3n 05.61.19." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39766.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39766.json index bd58ec77fef..59b7e8b2d83 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39766.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39766.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39766", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:27.480", - "lastModified": "2024-11-13T21:15:27.480", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper neutralization of special elements used in SQL command in some Intel(R) Neural Compressor software before version v3.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en el comando SQL en alg\u00fan software Intel(R) Neural Compressor anterior a la versi\u00f3n v3.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39811.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39811.json index 8196166133b..7958512001f 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39811.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39811.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39811", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:27.740", - "lastModified": "2024-11-13T21:15:27.740", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in firmware for some Intel(R) Server M20NTP Family UEFI may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el firmware de algunos Intel(R) Server M20NTP Family UEFI puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40404.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40404.json index 79348baf01d..64f7ae46544 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40404.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40404.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40404", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T23:15:03.867", - "lastModified": "2024-11-13T23:15:03.867", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered to contain an access control issue in the API endpoint where Web Sockets connections are established." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Cybele Software Thinfinity Workspace anterior a v7.0.2.113 conten\u00eda un problema de control de acceso en el endpoint de API donde se establecen las conexiones Web Sockets." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40405.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40405.json index 54a7306f09b..01bc49572bd 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40405.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40405.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40405", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T23:15:03.930", - "lastModified": "2024-11-13T23:15:03.930", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in Cybele Software Thinfinity Workspace before v7.0.3.109 allows attackers to gain access to a secondary broker via a crafted request." + }, + { + "lang": "es", + "value": "El control de acceso incorrecto en Cybele Software Thinfinity Workspace anterior a v7.0.3.109 permite a los atacantes obtener acceso a un agente secundario a trav\u00e9s de una solicitud manipulada espec\u00edficamente para ello." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40407.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40407.json index 2e13836c512..0f5785fff2f 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40407.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40407.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40407", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T23:15:03.993", - "lastModified": "2024-11-13T23:15:03.993", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A full path disclosure in Cybele Software Thinfinity Workspace before v7.0.2.113 allows attackers to obtain the root path of the application via unspecified vectors." + }, + { + "lang": "es", + "value": "Una divulgaci\u00f3n de ruta completa en Cybele Software Thinfinity Workspace anterior a v7.0.2.113 permite a los atacantes obtener la ruta ra\u00edz de la aplicaci\u00f3n a trav\u00e9s de vectores no especificados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40408.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40408.json index 9bf9d87683f..ef06694811c 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40408.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40408.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40408", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T23:15:04.060", - "lastModified": "2024-11-13T23:15:04.060", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered to contain an access control issue in the Create Profile section. This vulnerability allows attackers to create arbitrary user profiles with elevated privileges." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que la versi\u00f3n anterior a v7.0.2.113 de Cybele Software Thinfinity Workspace conten\u00eda un problema de control de acceso en la secci\u00f3n Crear perfil. Esta vulnerabilidad permite a los atacantes crear perfiles de usuario arbitrarios con privilegios elevados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40410.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40410.json index ed80ad0dac9..5e5cf0068ca 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40410.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40410.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40410", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T23:15:04.137", - "lastModified": "2024-11-13T23:15:04.137", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered to contain a hardcoded cryptographic key used for encryption." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Cybele Software Thinfinity Workspace anterior a v7.0.2.113 conten\u00eda una clave criptogr\u00e1fica codificada utilizada para el cifrado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40443.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40443.json index cd440c9bc8a..97a9b7b6b1f 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40443.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40443.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40443", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T20:15:17.253", - "lastModified": "2024-11-13T20:15:17.253", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in Simple Laboratory Management System using PHP and MySQL v.1.0 allows a remote attacker to cause a denial of service via the delete_users function in the Useres.php" + }, + { + "lang": "es", + "value": "La vulnerabilidad de inyecci\u00f3n SQL en Simple Laboratory Management System que utiliza PHP y MySQL v.1.0 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n delete_users en Useres.php" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40579.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40579.json index 20ecf1ebb12..0614ce84ac2 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40579.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40579.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40579", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T22:15:16.230", - "lastModified": "2024-11-14T22:15:16.230", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Virtuozzo Hybrid Server for WHMCS Open Source v.1.7.1 allows a remote attacker to obtain sensitive information via modification of the hostname parameter." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Scripting en Virtuozzo Hybrid Server para WHMCS Open Source v.1.7.1 permite a un atacante remoto obtener informaci\u00f3n confidencial mediante la modificaci\u00f3n del par\u00e1metro del nombre de host." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40660.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40660.json index 31953a65c8c..a97662efc86 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40660.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40660.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40660", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.570", - "lastModified": "2024-11-14T19:35:07.343", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40661.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40661.json index 4382d17b89a..52b74cbbad2 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40661.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40661.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40661", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.650", - "lastModified": "2024-11-14T16:35:06.610", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40671.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40671.json index 792e4523ddd..5e9582c62c5 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40671.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40671.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40671", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.723", - "lastModified": "2024-11-14T16:35:07.450", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40885.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40885.json index b2b0572924b..62187b2beda 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40885.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40885.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40885", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:28.353", - "lastModified": "2024-11-13T21:15:28.353", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in the UEFI firmware of some Intel(R) Server M20NTP BIOS may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "El use after free en el firmware UEFI de algunos Intel(R) Server M20NTP BIOS puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41167.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41167.json index c2ca0a6866d..870cf8aa8d9 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41167.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41167.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41167", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:28.590", - "lastModified": "2024-11-13T21:15:28.590", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in UEFI firmware in some Intel(R) Server Board M10JNP2SB Family may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el firmware UEFI en algunos Intel(R) Server Board M10JNP2SB Family puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41206.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41206.json index 085e2e4a964..cee0c37bc44 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41206.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41206.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41206", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T23:15:05.197", - "lastModified": "2024-11-14T23:15:05.197", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer over-read in tsMuxer version nightly-2024-03-14-01-51-12 allows attackers to cause Information Disclosure via a crafted TS video file." + }, + { + "lang": "es", + "value": "Una sobrelectura de b\u00fafer basada en pila en la versi\u00f3n nightly-2024-03-14-01-51-12 de tsMuxer permite a los atacantes provocar la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s de un archivo de video TS manipulado espec\u00edficamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41209.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41209.json index fceedd5b3ee..e6810f87237 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41209.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41209.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41209", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T23:15:05.277", - "lastModified": "2024-11-14T23:15:05.277", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow in tsMuxer version nightly-2024-03-14-01-51-12 allows attackers to cause Denial of Service (DoS) and Code Execution via a crafted MOV video file." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer basado en mont\u00f3n en tsMuxer versi\u00f3n nightly-2024-03-14-01-51-12 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) y ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de un archivo de video MOV manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41217.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41217.json index 6f0fcb77dee..b3c80cfec03 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41217.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41217.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41217", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T23:15:05.370", - "lastModified": "2024-11-14T23:15:05.370", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow in tsMuxer version nightly-2024-05-10-02-00-45 allows attackers to cause Denial of Service (DoS) via a crafted MKV video file." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer basado en mont\u00f3n en la versi\u00f3n nightly-2024-05-10-02-00-45 de tsMuxer permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo de video MKV manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42188.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42188.json index 1acbf743a04..b7bcd3b63ec 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42188.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42188.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42188", "sourceIdentifier": "psirt@hcl.com", "published": "2024-11-14T16:15:19.283", - "lastModified": "2024-11-14T16:35:08.270", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL Connections is vulnerable to a broken access control vulnerability that may allow an unauthorized user to update data in certain scenarios." + }, + { + "lang": "es", + "value": "HCL Connections es vulnerable a una vulnerabilidad de control de acceso roto que puede permitir que un usuario no autorizado actualice datos en ciertos escenarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42499.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42499.json index 80584beb854..89c8846b39a 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42499.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42499.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42499", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-11-15T06:15:04.933", - "lastModified": "2024-11-15T06:15:04.933", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in FitNesse releases prior to 20241026. If this vulnerability is exploited, an attacker may be able to know whether a file exists at a specific path, and/or obtain some part of the file contents under specific conditions." + }, + { + "lang": "es", + "value": "En las versiones de FitNesse anteriores a 20241026 existe un problema de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido (\"Path Traversal\"). Si se aprovecha esta vulnerabilidad, un atacante podr\u00eda saber si existe un archivo en una ruta espec\u00edfica y/o obtener parte del contenido del archivo en condiciones espec\u00edficas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42834.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42834.json index bf594562e14..5416961365c 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42834.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42834.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42834", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T20:15:17.330", - "lastModified": "2024-11-13T20:15:17.330", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Customer API in Incognito Service Activation Center (SAC) UI v14.11 allows authenticated attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the lastName parameter." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en la API Create Customer en la interfaz de usuario del Incognito Service Activation Center (SAC) v14.11 permite a atacantes autenticados ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro lastName." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43080.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43080.json index 91f54a4eba7..61b14f61163 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43080.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43080.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43080", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.783", - "lastModified": "2024-11-14T16:35:09.127", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43081.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43081.json index 8ae96058ce0..95f7a4b7323 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43081.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43081.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43081", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.863", - "lastModified": "2024-11-14T16:35:09.987", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43082.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43082.json index b3bcece146a..5c2c5f34c64 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43082.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43082.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43082", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.927", - "lastModified": "2024-11-14T16:35:10.857", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43083.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43083.json index 2ceed12c0eb..3d98ce68311 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43083.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43083.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43083", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.037", - "lastModified": "2024-11-13T22:35:06.987", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In validate of WifiConfigurationUtil.java , there is a possible persistent denial of service due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En la validaci\u00f3n de WifiConfigurationUtil.java, existe una posible denegaci\u00f3n persistente del servicio debido al agotamiento de los recursos. Esto podr\u00eda provocar una denegaci\u00f3n local del servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43084.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43084.json index 8d339f4d0d8..3b6e5db0b5e 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43084.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43084.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43084", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.100", - "lastModified": "2024-11-13T22:35:07.777", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In visitUris of multiple files, there is a possible information disclosure due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En el caso de visitUris de varios archivos, es posible que se divulgue informaci\u00f3n debido a un proxy confuso. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43085.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43085.json index 88e2761014c..8ddd74b8b71 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43085.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43085.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43085", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.173", - "lastModified": "2024-11-14T16:35:11.720", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43086.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43086.json index 5e59e989b58..ce6fd3106e3 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43086.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43086.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43086", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.240", - "lastModified": "2024-11-14T16:35:12.570", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43087.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43087.json index 4c6a13006cb..b6aa83aa68d 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43087.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43087.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43087", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.307", - "lastModified": "2024-11-14T19:35:08.150", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43088.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43088.json index f36b9370096..364b1f1e232 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43088.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43088.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43088", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.387", - "lastModified": "2024-11-14T19:35:08.967", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43089.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43089.json index 9df297a0431..06b3bd79023 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43089.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43089.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43089", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.450", - "lastModified": "2024-11-14T16:35:13.417", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43090.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43090.json index bd51ca472e5..c2a1728e65f 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43090.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43090.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43090", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.517", - "lastModified": "2024-11-13T22:35:07.990", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple locations, there is a possible cross-user image read due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation." + }, + { + "lang": "es", + "value": "En varias ubicaciones, es posible que varios usuarios lean una imagen debido a que no se ha verificado el permiso. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local y requerir privilegios de ejecuci\u00f3n del usuario. Para la explotaci\u00f3n, se necesita la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43091.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43091.json index eda01935e87..4b02f9ca3b4 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43091.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43091.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43091", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.590", - "lastModified": "2024-11-14T15:35:08.470", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4311.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4311.json index 89a56f23b49..275112769f2 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4311.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4311.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4311", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-14T18:15:19.473", - "lastModified": "2024-11-14T18:15:19.473", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the 'Update Password' function, allowing them to take over the user's account. This vulnerability is due to the absence of rate-limiting on the '/api/v1/current-user' endpoint, which does not restrict the number of attempts an attacker can make to guess the current password. Successful exploitation results in the attacker being able to change the password and take control of the account." + }, + { + "lang": "es", + "value": "La versi\u00f3n 0.56.4 de zenml-io/zenml es vulnerable a la apropiaci\u00f3n de cuentas debido a la falta de limitaci\u00f3n de velocidad en la funci\u00f3n de cambio de contrase\u00f1a. Un atacante puede forzar la contrase\u00f1a actual en la funci\u00f3n \"Actualizar contrase\u00f1a\", lo que le permite apropiarse de la cuenta del usuario. Esta vulnerabilidad se debe a la ausencia de limitaci\u00f3n de velocidad en el endpoint \"/api/v1/current-user\", que no restringe la cantidad de intentos que puede hacer un atacante para adivinar la contrase\u00f1a actual. Si se explota con \u00e9xito, el atacante puede cambiar la contrase\u00f1a y tomar el control de la cuenta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4343.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4343.json index 69ff686449e..a4ce68af62e 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4343.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4343.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4343", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-14T18:15:19.687", - "lastModified": "2024-11-14T18:15:19.687", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Python command injection vulnerability exists in the `SagemakerLLM` class's `complete()` method within `./private_gpt/components/llm/custom/sagemaker.py` of the imartinez/privategpt application, versions up to and including 0.3.0. The vulnerability arises due to the use of the `eval()` function to parse a string received from a remote AWS SageMaker LLM endpoint into a dictionary. This method of parsing is unsafe as it can execute arbitrary Python code contained within the response. An attacker can exploit this vulnerability by manipulating the response from the AWS SageMaker LLM endpoint to include malicious Python code, leading to potential execution of arbitrary commands on the system hosting the application. The issue is fixed in version 0.6.0." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos de Python en el m\u00e9todo `complete()` de la clase `SagemakerLLM` dentro de `./private_gpt/components/llm/custom/sagemaker.py` de la aplicaci\u00f3n imartinez/privategpt, versiones hasta la 0.3.0 incluida. La vulnerabilidad surge debido al uso de la funci\u00f3n `eval()` para analizar una cadena recibida desde un punto de conexi\u00f3n remoto de AWS SageMaker LLM en un diccionario. Este m\u00e9todo de an\u00e1lisis no es seguro ya que puede ejecutar c\u00f3digo Python arbitrario contenido en la respuesta. Un atacante puede explotar esta vulnerabilidad manipulando la respuesta del punto de conexi\u00f3n de AWS SageMaker LLM para incluir c\u00f3digo Python malicioso, lo que lleva a la posible ejecuci\u00f3n de comandos arbitrarios en el sistema que aloja la aplicaci\u00f3n. El problema se solucion\u00f3 en la versi\u00f3n 0.6.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45099.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45099.json index 658f6ccb1f6..5801a97da57 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45099.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45099.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45099", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-14T12:15:17.980", - "lastModified": "2024-11-14T12:15:17.980", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Security ReaQta 3.12 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM Security ReaQta 3.12 es vulnerable a ataques de Cross Site Scripting. Esta vulnerabilidad permite a un usuario privilegiado incorporar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales en una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45253.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45253.json index bb56251cb16..1be8d4b2a41 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45253.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45253.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45253", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-11-14T10:15:05.633", - "lastModified": "2024-11-14T10:15:05.633", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Avigilon \u2013 CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + }, + { + "lang": "es", + "value": "Avigilon \u2013 CWE-22: Limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido (\u201cPath Traversal\u201d)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45254.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45254.json index 0f12b3516b3..a50ea9ebcb7 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45254.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45254.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45254", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-11-14T10:15:06.207", - "lastModified": "2024-11-14T10:15:06.207", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VaeMendis - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + }, + { + "lang": "es", + "value": "VaeMendis - CWE-79: Neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting')" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45594.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45594.json index c5e6dd3e53e..bc42139b0ed 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45594.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45594.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45594", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-13T17:15:10.333", - "lastModified": "2024-11-13T17:15:10.333", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Decidim is a participatory democracy framework. The meeting embeds feature used in the online or hybrid meetings is subject to potential XSS attack through a malformed URL. This vulnerability is fixed in 0.28.3 and 0.29.0." + }, + { + "lang": "es", + "value": "Decidim es un framework de democracia participativa. La funci\u00f3n de integraci\u00f3n de reuniones que se utiliza en las reuniones en l\u00ednea o h\u00edbridas est\u00e1 sujeta a posibles ataques XSS a trav\u00e9s de una URL mal formada. Esta vulnerabilidad se ha corregido en las versiones 0.28.3 y 0.29.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45642.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45642.json index bbf29eab35f..b9ae44fe8ff 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45642.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45642.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45642", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-14T12:15:18.323", - "lastModified": "2024-11-14T12:15:18.323", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Security ReaQta 3.12 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM Security ReaQta 3.12 es vulnerable a ataques de Cross Site Scripting. Esta vulnerabilidad permite a un usuario privilegiado incorporar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales en una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45670.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45670.json index 3a6346bfcd9..d95035b5fb2 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45670.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45670.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45670", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-14T12:15:18.570", - "lastModified": "2024-11-14T12:15:18.570", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Security SOAR 51.0.1.0 and earlier contains a mechanism for users to recover or change their passwords without knowing the original password, but the user account must be compromised prior to the weak recovery mechanism." + }, + { + "lang": "es", + "value": "IBM Security SOAR 51.0.1.0 y versiones anteriores contienen un mecanismo para que los usuarios recuperen o cambien sus contrase\u00f1as sin conocer la contrase\u00f1a original, pero la cuenta de usuario debe verse comprometida antes del mecanismo de recuperaci\u00f3n d\u00e9bil." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45784.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45784.json index de1c9af4944..595f09c338d 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45784.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45784.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45784", "sourceIdentifier": "security@apache.org", "published": "2024-11-15T09:15:14.897", - "lastModified": "2024-11-15T09:15:14.897", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive configuration variables in task logs. This vulnerability allows DAG authors to unintentionally or intentionally log sensitive configuration variables. Unauthorized users could access these logs, potentially exposing critical data that could be exploited to compromise the security of the Airflow deployment. In version 2.10.3, secrets are now masked in task logs to prevent sensitive configuration variables from being exposed in the logging output. Users should upgrade to Airflow 2.10.3 or the latest version to eliminate this vulnerability.\u00a0If you suspect that DAG authors could have logged the secret values to the logs and that your logs are not additionally protected, it is also recommended that you update those secrets." + }, + { + "lang": "es", + "value": "Las versiones de Apache Airflow anteriores a la 2.10.3 contienen una vulnerabilidad que podr\u00eda exponer variables de configuraci\u00f3n confidenciales en los registros de tareas. Esta vulnerabilidad permite a los autores de DAG registrar variables de configuraci\u00f3n confidenciales de forma intencional o no intencionada. Los usuarios no autorizados podr\u00edan acceder a estos registros, lo que podr\u00eda exponer datos cr\u00edticos que podr\u00edan explotarse para comprometer la seguridad de la implementaci\u00f3n de Airflow. En la versi\u00f3n 2.10.3, los secretos ahora est\u00e1n enmascarados en los registros de tareas para evitar que las variables de configuraci\u00f3n confidenciales se expongan en la salida del registro. Los usuarios deben actualizar a Airflow 2.10.3 o la versi\u00f3n m\u00e1s reciente para eliminar esta vulnerabilidad. Si sospecha que los autores de DAG podr\u00edan haber registrado los valores secretos en los registros y que sus registros no est\u00e1n protegidos adicionalmente, tambi\u00e9n se recomienda que actualice esos secretos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45875.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45875.json index 2a4609037de..3f9a7e72363 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45875.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45875.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45875", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T21:15:28.843", - "lastModified": "2024-11-13T21:15:28.843", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The create user function in baltic-it TOPqw Webportal 1.35.287.1 (fixed in version1.35.291), in /Apps/TOPqw/BenutzerManagement.aspx/SaveNewUser, is vulnerable to SQL injection. The JSON object username allows the manipulation of SQL queries." + }, + { + "lang": "es", + "value": "La funci\u00f3n de creaci\u00f3n de usuarios en el portal web TOPqw de baltic-it 1.35.287.1 (corregido en la versi\u00f3n 1.35.291), en /Apps/TOPqw/BenutzerManagement.aspx/SaveNewUser, es vulnerable a la inyecci\u00f3n SQL. El objeto JSON username permite la manipulaci\u00f3n de consultas SQL." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45876.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45876.json index ad1b46fa5c9..b63b04f137a 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45876.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45876.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45876", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T21:15:28.923", - "lastModified": "2024-11-13T21:15:28.923", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The login form of baltic-it TOPqw Webportal v1.35.283.2 (fixed in version 1.35.283.4) at /Apps/TOPqw/Login.aspx is vulnerable to SQL injection. The vulnerability exists in the POST parameter txtUsername, which allows for manipulation of SQL queries." + }, + { + "lang": "es", + "value": "El formulario de inicio de sesi\u00f3n del portal web TOPqw de baltic-it v1.35.283.2 (corregido en la versi\u00f3n 1.35.283.4) en /Apps/TOPqw/Login.aspx es vulnerable a la inyecci\u00f3n SQL. La vulnerabilidad existe en el par\u00e1metro POST txtUsername, que permite la manipulaci\u00f3n de consultas SQL." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45877.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45877.json index d1153e9f5fa..86406560ca7 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45877.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45877.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45877", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T21:15:28.983", - "lastModified": "2024-11-13T21:15:28.983", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "baltic-it TOPqw Webportal v1.35.283.2 is vulnerable to Incorrect Access Control in the User Management function in /Apps/TOPqw/BenutzerManagement.aspx. This allows a low privileged user to access all modules in the web portal, view and manipulate information and permissions of other users, lock other user or unlock the own account, change the password of other users, create new users or delete existing users and view, manipulate and delete reference data." + }, + { + "lang": "es", + "value": "El portal web TOPqw v1.35.283.2 de baltic-it es vulnerable a un control de acceso incorrecto en la funci\u00f3n de administraci\u00f3n de usuarios en /Apps/TOPqw/BenutzerManagement.aspx. Esto permite que un usuario con pocos privilegios acceda a todos los m\u00f3dulos del portal web, vea y manipule informaci\u00f3n y permisos de otros usuarios, bloquee a otros usuarios o desbloquee su propia cuenta, cambie la contrase\u00f1a de otros usuarios, cree nuevos usuarios o elimine usuarios existentes y vea, manipule y elimine datos de referencia." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45878.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45878.json index f020a6b1eca..d32f73359e3 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45878.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45878.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45878", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T21:15:29.040", - "lastModified": "2024-11-13T21:15:29.040", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The \"Stammdaten\" menu of baltic-it TOPqw Webportal v1.35.283.2 (fixed in version 1.35.291), in /Apps/TOPqw/qwStammdaten.aspx, is vulnerable to persistent Cross-Site Scripting (XSS)." + }, + { + "lang": "es", + "value": "El men\u00fa \"Stammdaten\" del portal web baltic-it TOPqw v1.35.283.2 (corregido en la versi\u00f3n 1.35.291), en /Apps/TOPqw/qwStammdaten.aspx, es vulnerable a Cross-Site Scripting (XSS) persistentes." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45879.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45879.json index 0adf783eab6..87d2fa9608e 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45879.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45879.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45879", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T21:15:29.093", - "lastModified": "2024-11-13T21:15:29.093", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The file upload function in the \"QWKalkulation\" tool of baltic-it TOPqw Webportal v1.35.287.1 (fixed in version 1.35.291), in /Apps/TOPqw/QWKalkulation/QWKalkulation.aspx, is vulnerable to Cross-Site Scripting (XSS). To exploit the persistent XSS vulnerability, an attacker has to be authenticated to the application that uses the \"TOPqw Webportal\" as a software. When authenticated, the attacker can persistently place the malicious JavaScript code in the \"QWKalkulation\" menu.'" + }, + { + "lang": "es", + "value": "La funci\u00f3n de carga de archivos de la herramienta \"QWKalkulation\" de baltic-it TOPqw Webportal v1.35.287.1 (corregido en la versi\u00f3n 1.35.291), en /Apps/TOPqw/QWKalkulation/QWKalkulation.aspx, es vulnerable a Cross-Site Scripting (XSS). Para explotar la vulnerabilidad XSS persistente, un atacante debe estar autenticado en la aplicaci\u00f3n que utiliza el \"TOPqw Webportal\" como software. Una vez autenticado, el atacante puede colocar de forma persistente el c\u00f3digo JavaScript malicioso en el men\u00fa \"QWKalkulation\"." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47914.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47914.json index 1c8f51112cb..594f3bb1f7b 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47914.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47914.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47914", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-11-14T10:15:06.677", - "lastModified": "2024-11-14T10:15:06.677", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VaeMendis - CWE-352: Cross-Site Request Forgery (CSRF)" + }, + { + "lang": "es", + "value": "VaeMendis - CWE-352: Cross-Site Request Forgery (CSRF)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47915.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47915.json index 1eeff449d01..ba362ae652d 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47915.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47915.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47915", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-11-14T10:15:07.067", - "lastModified": "2024-11-14T10:15:07.067", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VaeMendis - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + }, + { + "lang": "es", + "value": "VaeMendis - CWE-200: Exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47916.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47916.json index c914d141136..86bd5b4a7b1 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47916.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47916.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47916", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-11-14T10:15:07.540", - "lastModified": "2024-11-14T10:15:07.540", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Boa web server - CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + }, + { + "lang": "es", + "value": "Servidor web Boa - CWE-22: Limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido (\"Path Traversal\")" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48284.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48284.json index 9c77a6e3fce..f66a7d7f111 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48284.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48284.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48284", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T18:15:19.150", - "lastModified": "2024-11-14T18:15:19.150", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Reflected Cross-Site Scripting (XSS) vulnerability was found in the /search-result.php page of the PHPGurukul User Registration & Login and User Management System 3.2. This vulnerability allows remote attackers to execute arbitrary scripts via the searchkey parameter in a POST HTTP request." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de tipo Cross-Site Scripting (XSS) Reflejado en /search-result.php page of the PHPGurukul User Registration & Login and User Management System 3.2. Esta vulnerabilidad permite a atacantes remotos ejecutar secuencias de comandos arbitrarias a trav\u00e9s del par\u00e1metro searchkey en una solicitud HTTP POST." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48966.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48966.json index 8789e45e50e..f697d1b9ed1 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48966.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48966.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48966", "sourceIdentifier": "productsecurity@baxter.com", "published": "2024-11-14T22:15:17.727", - "lastModified": "2024-11-14T22:15:17.727", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The software tools used by service personnel to test & calibrate the ventilator do not support user authentication. An attacker with access to the Service PC where the tools are installed could obtain diagnostic information through the test tool or manipulate the ventilator's settings and embedded software via the calibration tool, without having to authenticate to either tool. This could result in unauthorized disclosure of information and/or have unintended impacts on device settings and performance." + }, + { + "lang": "es", + "value": "Las herramientas de software que utiliza el personal de servicio para probar y calibrar el respirador no admiten la autenticaci\u00f3n de usuarios. Un atacante con acceso a la PC de servicio donde est\u00e1n instaladas las herramientas podr\u00eda obtener informaci\u00f3n de diagn\u00f3stico a trav\u00e9s de la herramienta de prueba o manipular la configuraci\u00f3n del respirador y el software integrado a trav\u00e9s de la herramienta de calibraci\u00f3n, sin tener que autenticarse en ninguna de las herramientas. Esto podr\u00eda dar lugar a una divulgaci\u00f3n no autorizada de informaci\u00f3n o tener efectos no deseados en la configuraci\u00f3n y el rendimiento del dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48967.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48967.json index 51270dc0b18..050c6732022 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48967.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48967.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48967", "sourceIdentifier": "productsecurity@baxter.com", "published": "2024-11-14T22:15:17.927", - "lastModified": "2024-11-14T22:15:17.927", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ventilator and the Service PC lack sufficient audit logging capabilities to allow for detection of malicious activity and subsequent forensic examination. An attacker with access to the ventilator and/or the Service PC could, without detection, make unauthorized changes to ventilator settings that result in unauthorized disclosure of information and/or have unintended impacts on device performance." + }, + { + "lang": "es", + "value": "El respirador y la PC de servicio carecen de capacidades de registro de auditor\u00eda suficientes para permitir la detecci\u00f3n de actividad maliciosa y el posterior examen forense. Un atacante con acceso al respirador o a la PC de servicio podr\u00eda, sin ser detectado, realizar cambios no autorizados en la configuraci\u00f3n del respirador que resulten en la divulgaci\u00f3n no autorizada de informaci\u00f3n o tengan impactos no deseados en el rendimiento del dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48970.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48970.json index ea979a33e8a..46c79b5e0d8 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48970.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48970.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48970", "sourceIdentifier": "productsecurity@baxter.com", "published": "2024-11-14T22:15:18.137", - "lastModified": "2024-11-14T22:15:18.137", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ventilator's microcontroller lacks memory protection. An attacker could connect to the internal JTAG interface and read or write to flash memory using an off-the-shelf debugging tool, which could disrupt the function of the device and/or cause unauthorized information disclosure." + }, + { + "lang": "es", + "value": "El microcontrolador del respirador carece de protecci\u00f3n de memoria. Un atacante podr\u00eda conectarse a la interfaz JTAG interna y leer o escribir en la memoria flash mediante una herramienta de depuraci\u00f3n comercial, lo que podr\u00eda interrumpir el funcionamiento del dispositivo o provocar la divulgaci\u00f3n no autorizada de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48971.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48971.json index 13f348dc611..230f8b65294 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48971.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48971.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48971", "sourceIdentifier": "productsecurity@baxter.com", "published": "2024-11-14T22:15:18.327", - "lastModified": "2024-11-14T22:15:18.327", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Clinician Password and Serial Number Clinician Password are hard-coded into the ventilator in plaintext form. This could allow an attacker to obtain the password off the ventilator and use it to gain unauthorized access to the device, with clinician privileges." + }, + { + "lang": "es", + "value": "La contrase\u00f1a del m\u00e9dico y el n\u00famero de serie est\u00e1n codificados en el respirador en formato de texto simple. Esto podr\u00eda permitir que un atacante obtenga la contrase\u00f1a del respirador y la use para obtener acceso no autorizado al dispositivo con privilegios de m\u00e9dico." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48973.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48973.json index 824f794488e..ae99cd23ce2 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48973.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48973.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48973", "sourceIdentifier": "productsecurity@baxter.com", "published": "2024-11-14T22:15:18.510", - "lastModified": "2024-11-14T22:15:18.510", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The debug port on the ventilator's serial interface is enabled by default. This could allow an attacker to send and receive messages over the debug port (which are unencrypted; see 3.2.1) that result in unauthorized disclosure of information and/or have unintended impacts on device settings and performance." + }, + { + "lang": "es", + "value": "El puerto de depuraci\u00f3n de la interfaz serial del respirador est\u00e1 habilitado de manera predeterminada. Esto podr\u00eda permitir que un atacante env\u00ede y reciba mensajes a trav\u00e9s del puerto de depuraci\u00f3n (que no est\u00e1n cifrados; consulte 3.2.1) que resulten en la divulgaci\u00f3n no autorizada de informaci\u00f3n o tengan impactos no deseados en la configuraci\u00f3n y el rendimiento del dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48974.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48974.json index 93f88b35206..5031267a9dc 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48974.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48974.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48974", "sourceIdentifier": "productsecurity@baxter.com", "published": "2024-11-14T22:15:18.727", - "lastModified": "2024-11-14T22:15:18.727", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ventilator does not perform proper file integrity checks when adopting firmware updates. This makes it possible for an attacker to force unauthorized changes to the device's configuration settings and/or compromise device functionality by pushing a compromised/illegitimate firmware file. This could disrupt the function of the device and/or cause unauthorized information disclosure." + }, + { + "lang": "es", + "value": "El respirador no realiza comprobaciones adecuadas de la integridad de los archivos al adoptar actualizaciones de firmware. Esto hace posible que un atacante fuerce cambios no autorizados en la configuraci\u00f3n del dispositivo o comprometa la funcionalidad del dispositivo al introducir un archivo de firmware comprometido o ileg\u00edtimo. Esto podr\u00eda interrumpir el funcionamiento del dispositivo o provocar la divulgaci\u00f3n no autorizada de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49025.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49025.json index 442b739ddff..a17178c21e6 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49025.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49025.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49025", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-14T20:15:25.207", - "lastModified": "2024-11-14T20:15:25.207", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en Microsoft Edge (basado en Chromium)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49362.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49362.json index a77c9e1a796..a848eeb30f2 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49362.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49362.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49362", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-14T18:15:19.243", - "lastModified": "2024-11-14T18:15:19.243", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Joplin is a free, open source note taking and to-do application. Joplin-desktop has a vulnerability that leads to remote code execution (RCE) when a user clicks on an link within untrusted notes. The issue arises due to insufficient sanitization of tag attributes introduced by the Mermaid. This vulnerability allows the execution of untrusted HTML content within the Electron window, which has full access to Node.js APIs, enabling arbitrary shell command execution." + }, + { + "lang": "es", + "value": "Joplin es una aplicaci\u00f3n de c\u00f3digo abierto y gratuita para tomar notas y realizar tareas pendientes. Joplin-desktop tiene una vulnerabilidad que provoca la ejecuci\u00f3n remota de c\u00f3digo (RCE) cuando un usuario hace clic en un enlace dentro de notas que no son de confianza. El problema surge debido a una limpieza insuficiente de los atributos de la etiqueta introducidos por Mermaid. Esta vulnerabilidad permite la ejecuci\u00f3n de contenido HTML no confiable dentro de la ventana Electron, que tiene acceso completo a las API de Node.js, lo que permite la ejecuci\u00f3n arbitraria de comandos de shell." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49379.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49379.json index 53afce9ca90..33018f58f17 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49379.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49379.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49379", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-13T18:15:22.153", - "lastModified": "2024-11-14T16:35:15.103", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49776.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49776.json index d4f1161dc53..4a5419cdf6c 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49776.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49776.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49776", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T23:15:05.457", - "lastModified": "2024-11-14T23:15:05.457", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A negative-size-param in tsMuxer version nightly-2024-04-05-01-53-02 allows attackers to cause Denial of Service (DoS) via a crafted TS video file." + }, + { + "lang": "es", + "value": "Un par\u00e1metro de tama\u00f1o negativo en la versi\u00f3n nightly-2024-04-05-01-53-02 de tsMuxer permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo de video TS manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49777.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49777.json index 01fcec36c89..039cd872a98 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49777.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49777.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49777", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T23:15:05.547", - "lastModified": "2024-11-14T23:15:05.547", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow in tsMuxer version nightly-2024-03-14-01-51-12 allows attackers to cause Denial of Service (DoS), Information Disclosure and Code Execution via a crafted MKV video file." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer basado en mont\u00f3n en tsMuxer versi\u00f3n nightly-2024-03-14-01-51-12 permite a los atacantes provocar denegaci\u00f3n de servicio (DoS), divulgaci\u00f3n de informaci\u00f3n y ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de un archivo de video MKV manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49778.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49778.json index 2a72e3ffdeb..31d78a5c21c 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49778.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49778.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49778", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T23:15:05.643", - "lastModified": "2024-11-14T23:15:05.643", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow in tsMuxer version nightly-2024-05-12-02-01-18 allows attackers to cause Denial of Service (DoS) and Code Execution via a crafted MOV video file." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer basado en mont\u00f3n en tsMuxer versi\u00f3n nightly-2024-05-12-02-01-18 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) y ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de un archivo de video MOV manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50305.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50305.json index b8c9fb7d422..a829f68493b 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50305.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50305.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50305", "sourceIdentifier": "security@apache.org", "published": "2024-11-14T10:15:08.013", - "lastModified": "2024-11-14T19:35:16.650", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50306.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50306.json index d7c11c63459..3ecfdb7361d 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50306.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50306.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50306", "sourceIdentifier": "security@apache.org", "published": "2024-11-14T10:15:08.230", - "lastModified": "2024-11-14T18:35:03.743", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50823.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50823.json index 03019bc9d0f..7b7d1275cd6 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50823.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50823.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50823", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T18:15:19.940", - "lastModified": "2024-11-14T18:15:19.940", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/login.php in kashipara E-learning Management System Project 1.0 via the username and password parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/login.php in kashipara E-learning Management System Project 1.0 a trav\u00e9s de los par\u00e1metros de nombre de usuario y contrase\u00f1a." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50824.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50824.json index f22ce0021fa..5702c780ae4 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50824.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50824.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50824", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T18:15:20.107", - "lastModified": "2024-11-14T18:15:20.107", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/class.php in kashipara E-learning Management System Project 1.0 via the class_name parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/class.php in kashipara E-learning Management System Project 1.0 a trav\u00e9s del par\u00e1metro class_name." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50825.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50825.json index 3d46fdaced2..b47f4cc713e 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50825.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50825.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50825", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T18:15:20.230", - "lastModified": "2024-11-14T18:15:20.230", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/school_year.php in kashipara E-learning Management System Project 1.0 via the school_year parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/school_year.php in kashipara E-learning Management System Project 1.0 a trav\u00e9s del par\u00e1metro school_year." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50826.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50826.json index df33903d215..5ec6123e3c2 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50826.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50826.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50826", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T18:15:20.350", - "lastModified": "2024-11-14T18:15:20.350", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/add_content.php in kashipara E-learning Management System Project 1.0 via the title and content parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/add_content.php in kashipara E-learning Management System Project 1.0 a trav\u00e9s de los par\u00e1metros de t\u00edtulo y contenido." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50827.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50827.json index 7bffb23f0af..e3afd6a7b79 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50827.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50827.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50827", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T18:15:20.457", - "lastModified": "2024-11-14T18:15:20.457", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/add_subject.php in kashipara E-learning Management System Project 1.0 via the subject_code parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/add_subject.php in kashipara E-learning Management System Project 1.0 a trav\u00e9s del par\u00e1metro subject_code." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50828.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50828.json index 91def68568b..fdcccf903ae 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50828.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50828.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50828", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T18:15:20.580", - "lastModified": "2024-11-14T18:15:20.580", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/edit_department.php in kashipara E-learning Management System Project 1.0 via the d parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/edit_department.php in kashipara E-learning Management System Project 1.0 a trav\u00e9s del par\u00e1metro d." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50829.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50829.json index ffb070c9085..3ea04e3c329 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50829.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50829.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50829", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T18:15:20.853", - "lastModified": "2024-11-14T18:15:20.853", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/edit_subject.php in kashipara E-learning Management System Project 1.0 via the unit parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/edit_subject.php in kashipara E-learning Management System Project 1.0 a trav\u00e9s del par\u00e1metro de unidad." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50830.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50830.json index 07701fcf6fa..e51848110b7 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50830.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50830.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50830", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T18:15:21.063", - "lastModified": "2024-11-14T18:15:21.063", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/calendar_of_events.php in kashipara E-learning Management System Project 1.0 via the date_start, date_end, and title parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/calendar_of_events.php in kashipara E-learning Management System Project 1.0 a trav\u00e9s de los par\u00e1metros date_start, date_end y title." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50831.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50831.json index 3755dd34757..f0957c8f129 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50831.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50831.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50831", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T18:15:21.180", - "lastModified": "2024-11-14T18:15:21.180", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection was found in /admin/admin_user.php in kashipara E-learning Management System Project 1.0 via the username and password parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una inyecci\u00f3n SQL en /admin/admin_user.php in kashipara E-learning Management System Project 1.0 a trav\u00e9s de los par\u00e1metros de nombre de usuario y contrase\u00f1a." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50832.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50832.json index 47a241a899f..18d46dfada5 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50832.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50832.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50832", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T17:15:06.823", - "lastModified": "2024-11-14T17:15:06.823", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/edit_class.php in kashipara E-learning Management System Project 1.0 via the class_name parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/edit_class.php in kashipara E-learning Management System Project 1.0 a trav\u00e9s del par\u00e1metro class_name." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50833.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50833.json index 1d3ec650435..0521b491f6b 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50833.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50833.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50833", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T17:15:06.917", - "lastModified": "2024-11-14T17:15:06.917", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /login.php in KASHIPARA E-learning Management System Project 1.0 via the username and password parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /login.php in KASHIPARA E-learning Management System Project 1.0 a trav\u00e9s de los par\u00e1metros de nombre de usuario y contrase\u00f1a." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50834.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50834.json index 14c20060c39..5ee685d979b 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50834.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50834.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50834", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T17:15:07.003", - "lastModified": "2024-11-14T17:15:07.003", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection was found in /admin/teachers.php in KASHIPARA E-learning Management System Project 1.0 via the firstname and lastname parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una inyecci\u00f3n SQL en /admin/teachers.php in KASHIPARA E-learning Management System Project 1.0 a trav\u00e9s de los par\u00e1metros firstname y lastname." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50835.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50835.json index bbaf58f07b2..f03f54a570c 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50835.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50835.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50835", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T17:15:07.090", - "lastModified": "2024-11-14T17:15:07.090", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/edit_student.php in KASHIPARA E-learning Management System Project 1.0 via the cys, un, ln, fn, and id parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/edit_student.php in KASHIPARA E-learning Management System Project 1.0 a trav\u00e9s de los par\u00e1metros cys, un, ln, fn e id." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50836.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50836.json index de86e6c5539..961511aa8c1 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50836.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50836.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50836", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T17:15:07.177", - "lastModified": "2024-11-14T17:15:07.177", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/teachers.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the firstname and lastname parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) almacenado en /admin/teachers.php in KASHIPARA E-learning Management System Project 1.0. Esta vulnerabilidad permite a atacantes remotos ejecutar secuencias de comandos arbitrarias a trav\u00e9s de los par\u00e1metros firstname y lastname." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50837.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50837.json index b72efb6337a..dbb46067ade 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50837.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50837.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50837", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T15:15:08.990", - "lastModified": "2024-11-14T19:35:17.623", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/admin_user.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the firstname and username parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) almacenado en /admin/admin_user.php in KASHIPARA E-learning Management System Project 1.0. Esta vulnerabilidad permite a atacantes remotos ejecutar secuencias de comandos arbitrarias a trav\u00e9s de los par\u00e1metros firstname y username." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50838.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50838.json index 6c3e6d55534..427ecbe8ac4 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50838.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50838.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50838", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T15:15:09.073", - "lastModified": "2024-11-14T19:35:18.427", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/department.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the d and pi parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) almacenado en /admin/department.php in KASHIPARA E-learning Management System Project 1.0. Esta vulnerabilidad permite a atacantes remotos ejecutar secuencias de comandos arbitrarias a trav\u00e9s de los par\u00e1metros d y pi." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50839.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50839.json index 3171d5f09b2..368621763cf 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50839.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50839.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50839", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T14:15:18.670", - "lastModified": "2024-11-14T19:35:19.240", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/add_subject.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the subject_code and title parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) almacenado en /admin/add_subject.php in KASHIPARA E-learning Management System Project 1.0. Esta vulnerabilidad permite a atacantes remotos ejecutar secuencias de comandos arbitrarias a trav\u00e9s de los par\u00e1metros subject_code y title." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50840.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50840.json index 563ae8c1cf1..6756f2c591d 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50840.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50840.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50840", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T14:15:18.793", - "lastModified": "2024-11-14T19:35:20.033", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/class.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the class_name parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) almacenado en /admin/class.php in KASHIPARA E-learning Management System Project 1.0. Esta vulnerabilidad permite a atacantes remotos ejecutar secuencias de comandos arbitrarias a trav\u00e9s del par\u00e1metro class_name." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50841.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50841.json index a526f78211c..b327bbe6600 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50841.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50841.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50841", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T14:15:18.880", - "lastModified": "2024-11-14T19:35:20.837", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/calendar_of_events.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the date_start, date_end, and title parameters." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) almacenado en /admin/calendar_of_events.php in KASHIPARA E-learning Management System Project 1.0. Esta vulnerabilidad permite a atacantes remotos ejecutar secuencias de comandos arbitrarias a trav\u00e9s de los par\u00e1metros date_start, date_end y title." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50842.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50842.json index 4d8414b699e..4dce8303ce0 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50842.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50842.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50842", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T14:15:18.967", - "lastModified": "2024-11-14T19:35:21.650", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/school_year.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the school_year parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) almacenado en /admin/school_year.php in KASHIPARA E-learning Management System Project 1.0. Esta vulnerabilidad permite a atacantes remotos ejecutar secuencias de comandos arbitrarias a trav\u00e9s del par\u00e1metro school_year." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50843.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50843.json index 81c10a8d7f1..2147c07d224 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50843.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50843.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50843", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T14:15:19.050", - "lastModified": "2024-11-14T19:35:22.450", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Directory listing issue was found in PHPGurukul User Registration & Login and User Management System 3.2, which allows remote attackers attacker to access sensitive files and directories via /loginsystem/assets." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un problema de listado de directorios en PHPGurukul User Registration & Login and User Management System 3.2, que permite a atacantes remotos acceder a archivos y directorios confidenciales a trav\u00e9s de /loginsystem/assets." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50955.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50955.json index 588c26b780e..2fff82ec5a0 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50955.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50955.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50955", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T22:15:15.710", - "lastModified": "2024-11-13T22:15:15.710", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in how XINJE XD5E-24R and XL5E-16T v3.5.3b handles TCP protocol messages allows attackers to cause a Denial of Service (DoS) via a crafted TCP message." + }, + { + "lang": "es", + "value": "Un problema en la forma en que XINJE XD5E-24R y XL5E-16T v3.5.3b maneja los mensajes del protocolo TCP permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un mensaje TCP manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50956.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50956.json index ff08eb0edef..84688b6b9d8 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50956.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50956.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50956", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T22:15:15.773", - "lastModified": "2024-11-13T22:15:15.773", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow in the RecvSocketData function of Inovance HCPLC_AM401-CPU1608TPTN 21.38.0.0, HCPLC_AM402-CPU1608TPTN 41.38.0.0, and HCPLC_AM403-CPU1608TN 81.38.0.0 allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted Modbus message." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer en la funci\u00f3n RecvSocketData de Inovance HCPLC_AM401-CPU1608TPTN 21.38.0.0, HCPLC_AM402-CPU1608TPTN 41.38.0.0 y HCPLC_AM403-CPU1608TN 81.38.0.0 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) o ejecutar c\u00f3digo arbitrario a trav\u00e9s de un mensaje Modbus manipulado espec\u00edficamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50968.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50968.json index 075f1c52907..7cce479413e 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50968.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50968.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50968", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T22:15:19.900", - "lastModified": "2024-11-14T22:15:19.900", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A business logic vulnerability exists in the Add to Cart function of itsourcecode Agri-Trading Online Shopping System 1.0, which allows remote attackers to manipulate the quant parameter when adding a product to the cart. By setting the quantity value to -0, an attacker can exploit a flaw in the application's total price calculation logic. This vulnerability causes the total price to be reduced to zero, allowing the attacker to add items to the cart and proceed to checkout." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de l\u00f3gica empresarial en the Add to Cart function of itsourcecode Agri-Trading Online Shopping System 1.0, que permite a atacantes remotos manipular el par\u00e1metro quant al agregar un producto al carrito. Al establecer el valor de cantidad en -0, un atacante puede explotar una falla en la l\u00f3gica de c\u00e1lculo del precio total de la aplicaci\u00f3n. Esta vulnerabilidad hace que el precio total se reduzca a cero, lo que permite al atacante agregar art\u00edculos al carrito y proceder al pago." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5082.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5082.json index db5c433f392..4a3555ada6b 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5082.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5082.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5082", "sourceIdentifier": "103e4ec9-0a87-450b-af77-479448ddef11", "published": "2024-11-14T03:15:03.533", - "lastModified": "2024-11-14T16:35:15.960", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5083.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5083.json index 52aa3131c56..6c5313a448c 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5083.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5083.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5083", "sourceIdentifier": "103e4ec9-0a87-450b-af77-479448ddef11", "published": "2024-11-14T02:15:17.257", - "lastModified": "2024-11-14T16:35:16.267", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51027.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51027.json index 7984ecc6d14..5bd9b00b7ab 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51027.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51027.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51027", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T22:15:15.823", - "lastModified": "2024-11-13T22:15:15.823", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ruijie NBR800G gateway NBR_RGOS_11.1(6)B4P9 is vulnerable to command execution in /itbox_pi/networksafe.php via the province parameter." + }, + { + "lang": "es", + "value": "La puerta de enlace Ruijie NBR800G NBR_RGOS_11.1(6)B4P9 es vulnerable a la ejecuci\u00f3n de comandos en /itbox_pi/networksafe.php a trav\u00e9s del par\u00e1metro de provincia." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51156.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51156.json index 2b121a82e21..39554bc5426 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51156.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51156.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51156", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T22:15:20.100", - "lastModified": "2024-11-14T22:15:20.100", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component 'erp.07fly.net:80/admin/SysNotifyUser/del.html?id=93'." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que 07FLYCMS V1.3.9 conten\u00eda una Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente 'erp.07fly.net:80/admin/SysNotifyUser/del.html?id=93'." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51658.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51658.json index a03c819a252..d76835de85c 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51658.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51658.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51658", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T22:15:20.187", - "lastModified": "2024-11-14T22:15:20.187", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Henrik Hoff WP Course Manager allows Stored XSS.This issue affects WP Course Manager: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Henrik Hoff WP Course Manager permite XSS almacenado. Este problema afecta a WP Course Manager: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51659.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51659.json index 0ca8fc30aa5..c91ba54ded4 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51659.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51659.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51659", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T22:15:20.390", - "lastModified": "2024-11-14T22:15:20.390", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in GeekRMX Twitter @Anywhere Plus allows Stored XSS.This issue affects Twitter @Anywhere Plus: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Twitter @Anywhere Plus de GeekRMX permite XSS almacenado. Este problema afecta a Twitter @Anywhere Plus: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51679.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51679.json index 398a5f45daf..9f8e554ae70 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51679.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51679.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51679", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T22:15:20.610", - "lastModified": "2024-11-14T22:15:20.610", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in GentleSource Appointmind allows Stored XSS.This issue affects Appointmind: from n/a through 4.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en GentleSource Appointmind permite XSS almacenado. Este problema afecta a Appointmind: desde n/a hasta 4.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51684.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51684.json index d98e1ec57fb..d5cea8acaf2 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51684.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51684.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51684", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T21:15:22.140", - "lastModified": "2024-11-14T21:15:22.140", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ciprian Popescu W3P SEO allows Stored XSS.This issue affects W3P SEO: from n/a before 1.8.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en W3P SEO de Ciprian Popescu permite XSS almacenado. Este problema afecta a W3P SEO: desde n/a hasta 1.8.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51687.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51687.json index 9e7752389e6..fc645eb438c 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51687.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51687.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51687", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T21:15:22.353", - "lastModified": "2024-11-14T21:15:22.353", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Platform.Ly Platform.Ly Official allows Stored XSS.This issue affects Platform.Ly Official: from n/a through 1.1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Platform.Ly Platform.Ly Official permite XSS almacenado. Este problema afecta a Platform.Ly Official: desde n/a hasta 1.1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51688.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51688.json index 6af9184b272..6fd8e7aa8c3 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51688.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51688.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51688", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T20:15:25.810", - "lastModified": "2024-11-14T20:15:25.810", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in FraudLabs Pro FraudLabs Pro SMS Verification allows Stored XSS.This issue affects FraudLabs Pro SMS Verification: from n/a through 1.10.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en FraudLabs Pro FraudLabs Pro SMS Verification permite XSS almacenado. Este problema afecta a FraudLabs Pro SMS Verification: desde n/a hasta 1.10.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51996.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51996.json index 1f4a4a89e34..6a4abf7c60e 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51996.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51996.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51996", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-13T17:15:11.870", - "lastModified": "2024-11-13T17:15:11.870", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. When consuming a persisted remember-me cookie, Symfony does not check if the username persisted in the database matches the username attached with the cookie, leading to authentication bypass. This vulnerability is fixed in 5.4.47, 6.4.15, and 7.1.8." + }, + { + "lang": "es", + "value": "Symphony process es un m\u00f3dulo para el framework PHP Symphony que ejecuta comandos en subprocesos. Al consumir una cookie de recordatorio persistente, Symfony no comprueba si el nombre de usuario persistente en la base de datos coincide con el nombre de usuario adjunto a la cookie, lo que provoca la omisi\u00f3n de la autenticaci\u00f3n. Esta vulnerabilidad se ha corregido en 5.4.47, 6.4.15 y 7.1.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5125.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5125.json index 46d20d9f594..f794476f757 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5125.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5125.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5125", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-14T18:15:26.760", - "lastModified": "2024-11-14T18:15:26.760", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "parisneo/lollms-webui version 9.6 is vulnerable to Cross-Site Scripting (XSS) and Open Redirect due to inadequate input validation and processing of SVG files during the upload process. The XSS vulnerability allows attackers to embed malicious JavaScript code within SVG files, which is executed upon rendering, leading to potential credential theft and unauthorized data access. The Open Redirect vulnerability arises from insufficient URL validation within SVG files, enabling attackers to redirect users to malicious websites, thereby exposing them to phishing attacks, malware distribution, and reputation damage. These vulnerabilities are present in the application's functionality to send files to the AI module." + }, + { + "lang": "es", + "value": "La versi\u00f3n 9.6 de parisneo/lollms-webui es vulnerable a Cross-Site Scripting (XSS) y Open Redirect debido a una validaci\u00f3n de entrada y un procesamiento inadecuados de los archivos SVG durante el proceso de carga. La vulnerabilidad XSS permite a los atacantes incrustar c\u00f3digo JavaScript malicioso en los archivos SVG, que se ejecuta al renderizarlos, lo que conduce a un posible robo de credenciales y acceso no autorizado a los datos. La vulnerabilidad Open Redirect surge de una validaci\u00f3n de URL insuficiente dentro de los archivos SVG, lo que permite a los atacantes redirigir a los usuarios a sitios web maliciosos, exponi\u00e9ndolos as\u00ed a ataques de phishing, distribuci\u00f3n de malware y da\u00f1os a la reputaci\u00f3n. Estas vulnerabilidades est\u00e1n presentes en la funcionalidad de la aplicaci\u00f3n para enviar archivos al m\u00f3dulo de IA." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-522xx/CVE-2024-52291.json b/CVE-2024/CVE-2024-522xx/CVE-2024-52291.json index 810d45223d4..f57b034c2ca 100644 --- a/CVE-2024/CVE-2024-522xx/CVE-2024-52291.json +++ b/CVE-2024/CVE-2024-522xx/CVE-2024-52291.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52291", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-13T17:15:12.087", - "lastModified": "2024-11-13T17:15:12.087", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Craft is a content management system (CMS). A vulnerability in CraftCMS allows an attacker to bypass local file system validation by utilizing a double file:// scheme (e.g., file://file:////). This enables the attacker to specify sensitive folders as the file system, leading to potential file overwriting through malicious uploads, unauthorized access to sensitive files, and, under certain conditions, remote code execution (RCE) via Server-Side Template Injection (SSTI) payloads. Note that this will only work if you have an authenticated administrator account with allowAdminChanges enabled. This is fixed in 5.4.6 and 4.12.5." + }, + { + "lang": "es", + "value": "Craft es un sistema de gesti\u00f3n de contenido (CMS). Una vulnerabilidad en CraftCMS permite a un atacante eludir la validaci\u00f3n del sistema de archivos local mediante un esquema file:// doble (por ejemplo, file://file:////). Esto permite al atacante especificar carpetas confidenciales como sistema de archivos, lo que lleva a una posible sobrescritura de archivos mediante cargas maliciosas, acceso no autorizado a archivos confidenciales y, en determinadas condiciones, ejecuci\u00f3n remota de c\u00f3digo (RCE) mediante payloads de Server-Side Template Injection (SSTI). Tenga en cuenta que esto solo funcionar\u00e1 si tiene una cuenta de administrador autenticada con allowAdminChanges habilitado. Esto se solucion\u00f3 en 5.4.6 y 4.12.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-522xx/CVE-2024-52292.json b/CVE-2024/CVE-2024-522xx/CVE-2024-52292.json index c89cbef920c..d42594ca43e 100644 --- a/CVE-2024/CVE-2024-522xx/CVE-2024-52292.json +++ b/CVE-2024/CVE-2024-522xx/CVE-2024-52292.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52292", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-13T17:15:12.303", - "lastModified": "2024-11-13T17:15:12.303", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Craft is a content management system (CMS). The dataUrl function can be exploited if an attacker has write permissions on system notification templates. This function accepts an absolute file path, reads the file's content, and converts it into a Base64-encoded string. By embedding this function within a system notification template, the attacker can exfiltrate the Base64-encoded file content through a triggered system email notification. Once the email is received, the Base64 payload can be decoded, allowing the attacker to read arbitrary files on the server. This is fixed in 5.4.9 and 4.12.8." + }, + { + "lang": "es", + "value": "Craft es un sistema de gesti\u00f3n de contenido (CMS). La funci\u00f3n dataUrl puede ser explotada si un atacante tiene permisos de escritura en las plantillas de notificaci\u00f3n del sistema. Esta funci\u00f3n acepta una ruta de archivo absoluta, lee el contenido del archivo y lo convierte en una cadena codificada en Base64. Al incorporar esta funci\u00f3n dentro de una plantilla de notificaci\u00f3n del sistema, el atacante puede extraer el contenido del archivo codificado en Base64 a trav\u00e9s de una notificaci\u00f3n de correo electr\u00f3nico del sistema activada. Una vez que se recibe el correo electr\u00f3nico, el payload Base64 puede ser decodificada, lo que permite al atacante leer archivos arbitrarios en el servidor. Esto se solucion\u00f3 en 5.4.9 y 4.12.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52302.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52302.json index 153eb796390..1088eb1bf9d 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52302.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52302.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52302", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-14T16:15:20.087", - "lastModified": "2024-11-14T16:15:20.087", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "common-user-management is a robust Spring Boot application featuring user management services designed to control user access dynamically. There is a critical security vulnerability in the application endpoint /api/v1/customer/profile-picture. This endpoint allows file uploads without proper validation or restrictions, enabling attackers to upload malicious files that can lead to Remote Code Execution (RCE)." + }, + { + "lang": "es", + "value": "common-user-management es una aplicaci\u00f3n robusta de Spring Boot que cuenta con servicios de administraci\u00f3n de usuarios dise\u00f1ados para controlar el acceso de los usuarios de forma din\u00e1mica. Existe una vulnerabilidad de seguridad cr\u00edtica en el endpoint de la aplicaci\u00f3n /api/v1/customer/profile-picture. Este endpoint permite la carga de archivos sin la validaci\u00f3n o las restricciones adecuadas, lo que permite a los atacantes cargar archivos maliciosos que pueden provocar la ejecuci\u00f3n remota de c\u00f3digo (RCE)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52308.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52308.json index 845e9de5173..d8d3e5d6a41 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52308.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52308.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52308", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-14T23:15:05.727", - "lastModified": "2024-11-15T01:15:03.740", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GitHub CLI version 2.6.1 and earlier are vulnerable to remote code execution through a malicious codespace SSH server when using `gh codespace ssh` or `gh codespace logs` commands. This has been patched in the cli v2.62.0.\n\nDevelopers connect to remote codespaces through an SSH server running within the devcontainer, which is generally provided through the [default devcontainer image]( https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-... https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-configuration/introduction-to-dev-containers#using-the-default-dev-container-configuration) . GitHub CLI [retrieves SSH connection details]( https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/inv... https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/invoker.go#L230-L244 ), such as remote username, which is used in [executing `ssh` commands]( https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L2... https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L263 ) for `gh codespace ssh` or `gh codespace logs` commands.\n\nThis exploit occurs when a malicious third-party devcontainer contains a modified SSH server that injects `ssh` arguments within the SSH connection details. `gh codespace ssh` and `gh codespace logs` commands could execute arbitrary code on the user's workstation if the remote username contains something like `-oProxyCommand=\"echo hacked\" #`. The `-oProxyCommand` flag causes `ssh` to execute the provided command while `#` shell comment causes any other `ssh` arguments to be ignored.\n\nIn `2.62.0`, the remote username information is being validated before being used." + }, + { + "lang": "es", + "value": "La versi\u00f3n 2.6.1 y anteriores de la CLI de GitHub son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de un servidor SSH de codespace malicioso cuando se usan los comandos `gh codespace ssh` o `gh codespace logs`. Esto se ha corregido en la CLI v2.62.0. Los desarrolladores se conectan a codespaces remotos a trav\u00e9s de un servidor SSH que se ejecuta dentro del devcontainer, que generalmente se proporciona a trav\u00e9s de la [imagen predeterminada de devcontainer]( https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-... https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-configuration/introduction-to-dev-containers#using-the-default-dev-container-configuration) . GitHub CLI [recupera detalles de conexi\u00f3n SSH]( https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/inv... https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/invoker.go#L230-L244 ), como el nombre de usuario remoto, que se utiliza al [ejecutar comandos `ssh`]( https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L2... https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L263 ) para los comandos `gh codespace ssh` o `gh codespace logs`. Esta vulnerabilidad se produce cuando un contenedor de desarrollo malintencionado de terceros contiene un servidor SSH modificado que inyecta argumentos `ssh` dentro de los detalles de la conexi\u00f3n SSH. Los comandos `gh codespace ssh` y `gh codespace logs` podr\u00edan ejecutar c\u00f3digo arbitrario en la estaci\u00f3n de trabajo del usuario si el nombre de usuario remoto contiene algo como `-oProxyCommand=\"echo hacked\" #`. El indicador `-oProxyCommand` hace que `ssh` ejecute el comando proporcionado mientras que el comentario de shell `#` hace que se ignoren todos los dem\u00e1s argumentos de `ssh`. En `2.62.0`, la informaci\u00f3n del nombre de usuario remoto se valida antes de usarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52369.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52369.json index 576b7f362bc..388fd35f022 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52369.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52369.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52369", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T19:15:09.533", - "lastModified": "2024-11-14T19:15:09.533", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Optimal Access Inc. KBucket allows Upload a Web Shell to a Web Server.This issue affects KBucket: from n/a through 4.1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Optimal Access Inc. KBucket permite cargar un shell web a un servidor web. Este problema afecta a KBucket: desde n/a hasta 4.1.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52370.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52370.json index 199422e6c9c..23e168cd1ea 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52370.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52370.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52370", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T19:15:09.760", - "lastModified": "2024-11-14T19:15:09.760", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Hive Support Hive Support \u2013 WordPress Help Desk allows Upload a Web Shell to a Web Server.This issue affects Hive Support \u2013 WordPress Help Desk: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Hive Support Hive Support \u2013 WordPress Help Desk permite cargar un Web Shell a un servidor web. Este problema afecta a Hive Support \u2013 WordPress Help Desk: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52371.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52371.json index 9cdba7156a7..99e7da6c3d0 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52371.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52371.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52371", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:21.383", - "lastModified": "2024-11-14T18:15:21.383", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in DonnellC Global Gateway e4 | Payeezy Gateway.This issue affects Global Gateway e4 | Payeezy Gateway: from n/a through 2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en DonnellC Global Gateway e4 | Payeezy Gateway. Este problema afecta a Global Gateway e4 | Payeezy Gateway: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52372.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52372.json index 29778d0bb24..988691952d1 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52372.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52372.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52372", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:21.737", - "lastModified": "2024-11-14T18:15:21.737", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in WebTechGlobal Easy CSV Importer BETA allows Upload a Web Shell to a Web Server.This issue affects Easy CSV Importer BETA: from n/a through 7.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en WebTechGlobal Easy CSV Importer BETA permite cargar un shell web a un servidor web. Este problema afecta a Easy CSV Importer BETA: desde n/a hasta 7.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52373.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52373.json index 04d17a6d0dd..2a25dc269e2 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52373.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52373.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52373", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:21.993", - "lastModified": "2024-11-14T18:15:21.993", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Team Devexhub Devexhub Gallery allows Upload a Web Shell to a Web Server.This issue affects Devexhub Gallery: from n/a through 2.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Team Devexhub Devexhub Gallery permite cargar un Web Shell a un servidor web. Este problema afecta a Devexhub Gallery: desde n/a hasta 2.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52374.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52374.json index 418f4db9168..d99930d712b 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52374.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52374.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52374", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:22.420", - "lastModified": "2024-11-14T18:15:22.420", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in DoThatTask Do That Task allows Upload a Web Shell to a Web Server.This issue affects Do That Task: from n/a through 1.5.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en DoThatTask Do That Task permite cargar un shell web a un servidor web. Este problema afecta a Do That Task: desde n/a hasta 1.5.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52375.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52375.json index 287523c4b6e..4c06812f8e9 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52375.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52375.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52375", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:23.117", - "lastModified": "2024-11-14T18:15:23.117", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Arttia Creative Datasets Manager by Arttia Creative.This issue affects Datasets Manager by Arttia Creative: from n/a through 1.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Arttia Creative Datasets Manager de Arttia Creative. Este problema afecta a Datasets Manager de Arttia Creative: desde n/a hasta 1.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52376.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52376.json index cf1a57a463c..b6148927450 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52376.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52376.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52376", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:23.570", - "lastModified": "2024-11-14T18:15:23.570", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in cmsMinds Boat Rental Plugin for WordPress allows Upload a Web Shell to a Web Server.This issue affects Boat Rental Plugin for WordPress: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en el complemento cmsMinds Boat Rental para WordPress permite cargar un shell web a un servidor web. Este problema afecta al complemento de alquiler de barcos para WordPress: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52377.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52377.json index 4bd5f8a3637..f1d67ba2ca1 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52377.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52377.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52377", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:23.800", - "lastModified": "2024-11-14T18:15:23.800", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in BdThemes Instant Image Generator allows Upload a Web Shell to a Web Server.This issue affects Instant Image Generator: from n/a through 1.5.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en BdThemes Instant Image Generator permite cargar un shell web a un servidor web. Este problema afecta a Instant Image Generator: desde n/a hasta 1.5.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52378.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52378.json index ec9703e7fd5..78e87c31af4 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52378.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52378.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52378", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:24.160", - "lastModified": "2024-11-14T18:15:24.160", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Labs64 DigiPass allows Absolute Path Traversal.This issue affects DigiPass: from n/a through 0.3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Labs64 DigiPass permite un Path Traversal absoluto. Este problema afecta a DigiPass: desde n/a hasta 0.3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52379.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52379.json index 1a19d5c2883..9b1029ebdb8 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52379.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52379.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52379", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:24.507", - "lastModified": "2024-11-14T18:15:24.507", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Kinetic Innovative Technologies Sdn Bhd kineticPay for WooCommerce allows Upload a Web Shell to a Web Server.This issue affects kineticPay for WooCommerce: from n/a through 2.0.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Kinetic Innovative Technologies Sdn Bhd kineticPay para WooCommerce permite cargar un shell web a un servidor web. Este problema afecta a kineticPay para WooCommerce: desde n/a hasta 2.0.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52380.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52380.json index a4f015c555e..be6e3776d4f 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52380.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52380.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52380", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:24.837", - "lastModified": "2024-11-14T18:15:24.837", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Softpulse Infotech Picsmize allows Upload a Web Shell to a Web Server.This issue affects Picsmize: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Softpulse Infotech Picsmize permite cargar un shell web a un servidor web. Este problema afecta a Picsmize: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52381.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52381.json index 961847a6b81..afd129cfed5 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52381.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52381.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52381", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:25.137", - "lastModified": "2024-11-14T18:15:25.137", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Shoaib Rehmat ZIJ KART allows PHP Local File Inclusion.This issue affects ZIJ KART: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Shoaib Rehmat ZIJ KART permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a ZIJ KART: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52382.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52382.json index 280556206f6..f34690cdc7b 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52382.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52382.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52382", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:25.400", - "lastModified": "2024-11-14T18:15:25.400", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Medma Technologies Matix Popup Builder allows Privilege Escalation.This issue affects Matix Popup Builder: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Matix Popup Builder de Medma Technologies permite la escalada de privilegios. Este problema afecta a Matix Popup Builder: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52383.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52383.json index d7e5ee01c83..a9a104dbd3d 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52383.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52383.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52383", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:25.673", - "lastModified": "2024-11-14T18:15:25.673", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in KCT Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One: from n/a through 2.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en KCT Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT) All in One permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT) All in One: desde n/a hasta 2.1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52384.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52384.json index 0be66fc6b6c..7449729f2cb 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52384.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52384.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52384", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:25.913", - "lastModified": "2024-11-14T18:15:25.913", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Sage AI Sage AI: Chatbots, OpenAI GPT-4 Bulk Articles, Dalle-3 Image Generation allows Upload a Web Shell to a Web Server.This issue affects Sage AI: Chatbots, OpenAI GPT-4 Bulk Articles, Dalle-3 Image Generation: from n/a through 2.4.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Sage AI Sage AI: Chatbots, OpenAI GPT-4 Bulk Articles, Dalle-3 Image Generation permite cargar un Web Shell a un servidor web. Este problema afecta a Sage AI: Chatbots, OpenAI GPT-4 Bulk Articles, Dalle-3 Image Generation: desde n/a hasta 2.4.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52393.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52393.json index 479a43661ff..023c4242c6a 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52393.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52393.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52393", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:26.140", - "lastModified": "2024-11-14T18:15:26.140", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Podlove Podlove Podcast Publisher.This issue affects Podlove Podcast Publisher: from n/a through 4.1.15." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en Template Engine vulnerability in Podlove Podlove Podcast Publisher. Este problema afecta a Podlove Podcast Publisher: desde n/a hasta 4.1.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52396.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52396.json index bcd0fb2fa6a..4e65c841563 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52396.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52396.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52396", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-14T18:15:26.377", - "lastModified": "2024-11-14T18:15:26.377", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in realmag777 WOLF allows Path Traversal.This issue affects WOLF: from n/a through 1.0.8.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en realmag777 WOLF permite Path Traversal. Este problema afecta a WOLF: desde n/a hasta 1.0.8.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52505.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52505.json index e1f00b39cc8..cd5b3b2b365 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52505.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52505.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52505", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-14T16:15:20.220", - "lastModified": "2024-11-14T16:15:20.220", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "matrix-appservice-irc is a Node.js IRC bridge for the Matrix messaging protocol. The provisioning API of the matrix-appservice-irc bridge up to version 3.0.2 contains a vulnerability which can lead to arbitrary IRC command execution as the bridge IRC bot. The vulnerability has been patched in matrix-appservice-irc version 3.0.3." + }, + { + "lang": "es", + "value": "matrix-appservice-irc es un puente IRC de Node.js para el protocolo de mensajer\u00eda Matrix. La API de aprovisionamiento del puente matrix-appservice-irc hasta la versi\u00f3n 3.0.2 contiene una vulnerabilidad que puede provocar la ejecuci\u00f3n arbitraria de comandos IRC como bot de puente IRC. La vulnerabilidad ha sido corregida en la versi\u00f3n 3.0.3 de matrix-appservice-irc." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52524.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52524.json index 8be1946d76c..5102dc09b4e 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52524.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52524.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52524", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-14T18:15:26.610", - "lastModified": "2024-11-14T18:15:26.610", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Giskard is an evaluation and testing framework for AI systems. A Remote Code Execution (ReDoS) vulnerability was discovered in Giskard component by the GitHub Security Lab team. When processing datasets with specific text patterns with Giskard detectors, this vulnerability could trigger exponential regex evaluation times, potentially leading to denial of service. Giskard versions prior to 2.15.5 are affected." + }, + { + "lang": "es", + "value": "Giskard es un framework de evaluaci\u00f3n y prueba para sistemas de IA. El equipo de GitHub Security Lab descubri\u00f3 una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (ReDoS) en el componente Giskard. Al procesar conjuntos de datos con patrones de texto espec\u00edficos con detectores Giskard, esta vulnerabilidad podr\u00eda generar tiempos de evaluaci\u00f3n de expresiones regulares exponenciales, lo que podr\u00eda provocar una denegaci\u00f3n de servicio. Las versiones de Giskard anteriores a la 2.15.5 se ven afectadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52549.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52549.json index 978741e53f6..43c576f3c18 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52549.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52549.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52549", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-11-13T21:15:29.233", - "lastModified": "2024-11-13T22:35:09.080", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jenkins Script Security Plugin 1367.vdf2fc45f229c and earlier, except 1365.1367.va_3b_b_89f8a_95b_ and 1362.1364.v4cf2dc5d8776, does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files on the controller file system." + }, + { + "lang": "es", + "value": "El complemento de seguridad de script de Jenkins 1367.vdf2fc45f229c y anteriores, excepto 1365.1367.va_3b_b_89f8a_95b_ y 1362.1364.v4cf2dc5d8776, no realiza una verificaci\u00f3n de permisos en un m\u00e9todo que implementa la validaci\u00f3n de formulario, lo que permite a los atacantes con permiso general/de lectura verificar la existencia de archivos en el sistema de archivos del controlador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52550.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52550.json index 7828e008a8b..1c5762fe6b3 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52550.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52550.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52550", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-11-13T21:15:29.293", - "lastModified": "2024-11-13T21:15:29.293", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jenkins Pipeline: Groovy Plugin 3990.vd281dd77a_388 and earlier, except 3975.3977.v478dd9e956c3 does not check whether the main (Jenkinsfile) script for a rebuilt build is approved, allowing attackers with Item/Build permission to rebuild a previous build whose (Jenkinsfile) script is no longer approved." + }, + { + "lang": "es", + "value": "Jenkins Pipeline: Groovy Plugin 3990.vd281dd77a_388 y anteriores, excepto 3975.3977.v478dd9e956c3 no verifica si el script principal (Jenkinsfile) para una compilaci\u00f3n reconstruida est\u00e1 aprobado, lo que permite a los atacantes con permiso de Elemento/Compilaci\u00f3n reconstruir una compilaci\u00f3n anterior cuyo script (Jenkinsfile) ya no est\u00e1 aprobado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52551.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52551.json index c13133cf758..d217bc14d78 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52551.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52551.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52551", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-11-13T21:15:29.350", - "lastModified": "2024-11-14T15:35:10.030", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52552.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52552.json index 9072a227e5d..227d1f5e018 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52552.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52552.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52552", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-11-13T21:15:29.410", - "lastModified": "2024-11-14T15:35:10.847", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52553.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52553.json index 38fa1588ac8..db82a27ae3d 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52553.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52553.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52553", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-11-13T21:15:29.473", - "lastModified": "2024-11-13T22:35:09.903", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jenkins OpenId Connect Authentication Plugin 4.418.vccc7061f5b_6d and earlier does not invalidate the previous session on login." + }, + { + "lang": "es", + "value": "El complemento de autenticaci\u00f3n Jenkins OpenId Connect 4.418.vccc7061f5b_6d y anteriores no invalidan la sesi\u00f3n anterior al iniciar sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52554.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52554.json index dab4a9dead3..abaa8ae311c 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52554.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52554.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52554", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-11-13T21:15:29.540", - "lastModified": "2024-11-13T22:35:10.700", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jenkins Shared Library Version Override Plugin 17.v786074c9fce7 and earlier declares folder-scoped library overrides as trusted, so that they're not executed in the Script Security sandbox, allowing attackers with Item/Configure permission on a folder to configure a folder-scoped library override that runs without sandbox protection." + }, + { + "lang": "es", + "value": "El complemento de anulaci\u00f3n de versi\u00f3n de librer\u00eda compartida de Jenkins 17.v786074c9fce7 y versiones anteriores declara que las anulaciones de librer\u00eda con \u00e1mbito de carpeta son confiables, de modo que no se ejecutan en el entorno aislado de seguridad de script, lo que permite a los atacantes con permiso de Elemento/Configurar en una carpeta configurar una anulaci\u00f3n de librer\u00eda con \u00e1mbito de carpeta que se ejecuta sin protecci\u00f3n de entorno aislado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-526xx/CVE-2024-52613.json b/CVE-2024/CVE-2024-526xx/CVE-2024-52613.json index 28a4ba480e8..36b8adfa3e3 100644 --- a/CVE-2024/CVE-2024-526xx/CVE-2024-52613.json +++ b/CVE-2024/CVE-2024-526xx/CVE-2024-52613.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52613", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T23:15:05.967", - "lastModified": "2024-11-14T23:15:05.967", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap-based buffer under-read in tsMuxer version nightly-2024-05-12-02-01-18 allows attackers to cause Denial of Service (DoS) via a crafted MOV video file." + }, + { + "lang": "es", + "value": "Un b\u00fafer basado en mont\u00f3n suble\u00eddo en tsMuxer versi\u00f3n nightly-2024-05-12-02-01-18 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo de video MOV manipulado espec\u00edficamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5917.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5917.json index b8d469e331a..4c060f33417 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5917.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5917.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5917", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:08.607", - "lastModified": "2024-11-14T10:15:08.607", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A server-side request forgery in PAN-OS software enables an unauthenticated attacker to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessible." + }, + { + "lang": "es", + "value": "Server-side request forgeryen el software PAN-OS permite a un atacante no autenticado utilizar la interfaz web administrativa como proxy, lo que le permite ver recursos de red internos que de otra manera no ser\u00edan accesibles." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5918.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5918.json index 9cc1d54177e..855e27be0cb 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5918.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5918.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5918", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:08.813", - "lastModified": "2024-11-14T10:15:08.813", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper certificate validation vulnerability in Palo Alto Networks PAN-OS software enables an authorized user with a specially crafted client certificate to connect to an impacted GlobalProtect portal or GlobalProtect gateway as a different legitimate user. This attack is possible only if you \"Allow Authentication with User Credentials OR Client Certificate.\"" + }, + { + "lang": "es", + "value": "Una vulnerabilidad de validaci\u00f3n de certificado incorrecta en el software PAN-OS de Palo Alto Networks permite que un usuario autorizado con un certificado de cliente especialmente manipulado se conecte a un portal o puerta de enlace de GlobalProtect afectado como un usuario leg\u00edtimo diferente. Este ataque solo es posible si \"Permite la autenticaci\u00f3n con credenciales de usuario O certificado de cliente\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5919.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5919.json index a90552b7a25..926057124b4 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5919.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5919.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5919", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:09.027", - "lastModified": "2024-11-14T10:15:09.027", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A blind XML External Entities (XXE) injection vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker to exfiltrate arbitrary files from firewalls to an attacker controlled server. This attack requires network access to the firewall management interface." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n ciega de entidades externas XML (XXE) en el software PAN-OS de Palo Alto Networks permite a un atacante autenticado extraer archivos arbitrarios de los firewalls a un servidor controlado por el atacante. Este ataque requiere acceso de red a la interfaz de administraci\u00f3n del firewall." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5920.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5920.json index a14e1b49f68..a5fca3d48f1 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5920.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5920.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5920", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:09.223", - "lastModified": "2024-11-14T10:15:09.223", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write Panorama administrator to push a specially crafted configuration to a PAN-OS node. This enables impersonation of a legitimate PAN-OS administrator who can perform restricted actions on the PAN-OS node after the execution of JavaScript in the legitimate PAN-OS administrator's browser." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) en el software PAN-OS de Palo Alto Networks permite que un administrador de Panorama autenticado de lectura y escritura env\u00ede una configuraci\u00f3n especialmente manipulada a un nodo PAN-OS. Esto permite la suplantaci\u00f3n de un administrador leg\u00edtimo de PAN-OS que puede realizar acciones restringidas en el nodo PAN-OS despu\u00e9s de la ejecuci\u00f3n de JavaScript en el navegador del administrador leg\u00edtimo de PAN-OS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6068.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6068.json index add5d47dc4c..e21d27f2d56 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6068.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6068.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6068", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-11-14T17:15:07.680", - "lastModified": "2024-11-14T17:15:07.680", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory corruption vulnerability exists in the affected products when parsing DFT files. Local threat actors can exploit this issue to disclose information and to execute arbitrary code. To exploit this vulnerability a legitimate user must open a malicious DFT file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de corrupci\u00f3n de memoria en los productos afectados al analizar archivos DFT. Los actores de amenazas locales pueden aprovechar este problema para divulgar informaci\u00f3n y ejecutar c\u00f3digo arbitrario. Para aprovechar esta vulnerabilidad, un usuario leg\u00edtimo debe abrir un archivo DFT malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7124.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7124.json index 2f89a7cdfd4..5fedbe93606 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7124.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7124.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7124", "sourceIdentifier": "cvd@cert.pl", "published": "2024-11-14T15:15:09.177", - "lastModified": "2024-11-14T15:15:09.177", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation vulnerability in DInGO dLibra software\u00a0in the parameter 'filter' in the endpoint 'indexsearch' allows a Reflected Cross-Site Scripting (XSS). An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser. This issue affects DInGO dLibra software in versions from 6.0 before 6.3.20." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web en el software DInGO dLibra en el par\u00e1metro 'filter' del endpoint 'indexsearch' permite un ataque de Cross Site Scripting (XSS) reflejado. Un atacante podr\u00eda enga\u00f1ar a alguien para que use una URL manipulada, lo que har\u00e1 que se ejecute un script en el navegador del usuario. Este problema afecta al software DInGO dLibra en las versiones 6.0 anteriores a la 6.3.20." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7404.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7404.json index 17413045a26..cfd40af837a 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7404.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7404.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7404", "sourceIdentifier": "cve@gitlab.com", "published": "2024-11-14T13:15:05.050", - "lastModified": "2024-11-14T13:15:05.050", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 17.2 prior to 17.3.7, starting from 17.4 prior to 17.4.4 and starting from 17.5 prior to 17.5.2, which could have allowed an attacker gaining full API access as the victim via the Device OAuth flow." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 17.2 anterior a la 17.3.7, desde la 17.4 anterior a la 17.4.4 y desde la 17.5 anterior a la 17.5.2, lo que podr\u00eda haber permitido que un atacante obtuviera acceso completo a la API como v\u00edctima a trav\u00e9s del flujo OAuth del dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7730.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7730.json index e498290a389..85d3e217665 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7730.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7730.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7730", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-14T12:15:18.857", - "lastModified": "2024-11-14T12:15:18.857", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap buffer overflow was found in the virtio-snd device in QEMU. When reading input audio in the virtio-snd input callback, virtio_snd_pcm_in_cb, the function did not check whether the iov can fit the data buffer. This issue can trigger an out-of-bounds write if the size of the virtio queue element is equal to virtio_snd_pcm_status, which makes the available space for audio data zero." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un desbordamiento del b\u00fafer de mont\u00f3n en el dispositivo virtio-snd en QEMU. Al leer el audio de entrada en la devoluci\u00f3n de llamada de entrada virtio-snd, virtio_snd_pcm_in_cb, la funci\u00f3n no verific\u00f3 si el iov puede caber en el b\u00fafer de datos. Este problema puede desencadenar una escritura fuera de los l\u00edmites si el tama\u00f1o del elemento de cola virtio es igual a virtio_snd_pcm_status, lo que hace que el espacio disponible para los datos de audio sea cero." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7787.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7787.json index d5db74c60a6..8c00f2c0a86 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7787.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7787.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7787", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-11-14T09:15:28.200", - "lastModified": "2024-11-14T09:15:28.200", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ITG Computer Technology vSRM Supplier Relationship Management System allows Reflected XSS, Cross-Site Scripting (XSS).This issue affects vSRM Supplier Relationship Management System: before 28.08.2024." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en ITG Computer Technology vSRM Supplier Relationship Management System permite XSS reflejado, Cross-Site Scripting (XSS). Este problema afecta al sistema de gesti\u00f3n de relaciones con proveedores vSRM: antes del 28.08.2024." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8180.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8180.json index 47d219f3abc..ce905ade1d0 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8180.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8180.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8180", "sourceIdentifier": "cve@gitlab.com", "published": "2024-11-14T11:15:04.933", - "lastModified": "2024-11-14T11:15:04.933", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8648.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8648.json index 65f21705b91..76417fdcbc8 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8648.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8648.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8648", "sourceIdentifier": "cve@gitlab.com", "published": "2024-11-14T13:15:05.323", - "lastModified": "2024-11-14T13:15:05.323", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been discovered in GitLab CE/EE affecting all versions from 16 before 17.3.7, 17.4 before 17.4.4, and 17.5 before 17.5.2. The vulnerability could allow an attacker to inject malicious JavaScript code in Analytics Dashboards through a specially crafted URL." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab CE/EE que afecta a todas las versiones desde la 16 hasta la 17.3.7, la 17.4 hasta la 17.4.4 y la 17.5 hasta la 17.5.2. La vulnerabilidad podr\u00eda permitir que un atacante inyecte c\u00f3digo JavaScript malicioso en los paneles de Analytics a trav\u00e9s de una URL especialmente manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8961.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8961.json index 3b5d37d6533..c64ac1cff7d 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8961.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8961.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8961", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T07:15:17.587", - "lastModified": "2024-11-15T07:15:17.587", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Essential Addons for Elementor \u2013 Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018nomore_items_text\u2019 parameter in all versions up to, and including, 6.0.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Los complementos Essential Addons for Elementor \u2013 Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders para WordPress son vulnerables a Cross Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'nomore_items_text' en todas las versiones hasta la 6.0.7 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8978.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8978.json index b9be9f28270..8009bf8e899 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8978.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8978.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8978", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T10:15:04.873", - "lastModified": "2024-11-15T10:15:04.873", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Essential Addons for Elementor \u2013 Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.0.9 via the 'init_content_register_user_email_controls' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including usernames and passwords of any users who register via the Login | Register Form widget, as long as that user opens the email notification for successful registration." + }, + { + "lang": "es", + "value": "Los complementos Essential Addons for Elementor \u2013 Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders para WordPress son vulnerables a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 6.0.9 incluida a trav\u00e9s de la funci\u00f3n 'init_content_register_user_email_controls'. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos confidenciales, incluidos los nombres de usuario y las contrase\u00f1as de cualquier usuario que se registre a trav\u00e9s del widget Formulario de inicio de sesi\u00f3n | Registro, siempre que ese usuario abra la notificaci\u00f3n por correo electr\u00f3nico para el registro exitoso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8979.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8979.json index d92ec843cab..abd1fd211ed 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8979.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8979.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8979", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T10:15:05.310", - "lastModified": "2024-11-15T10:15:05.310", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9186.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9186.json index cfb96527bb1..18d9b546f65 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9186.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9186.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9186", "sourceIdentifier": "contact@wpscan.com", "published": "2024-11-14T06:15:07.223", - "lastModified": "2024-11-14T06:15:07.223", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit WordPress plugin before 3.3.0 does not sanitize and escape the bwfan-track-id parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks" + }, + { + "lang": "es", + "value": "El complemento Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation de FunnelKit de WordPress anterior a la versi\u00f3n 3.3.0 no desinfecta ni escapa el par\u00e1metro bwfan-track-id antes de usarlo en una declaraci\u00f3n SQL, lo que permite que los usuarios no autenticados realicen ataques de inyecci\u00f3n SQL " } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9356.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9356.json index 9f8d9dd42b2..f8de246bab4 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9356.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9356.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9356", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T06:15:05.233", - "lastModified": "2024-11-15T06:15:05.233", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Yotpo: Product & Photo Reviews for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'yotpo_user_email' and 'yotpo_user_name' parameters in all versions up to, and including, 1.7.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Yotpo: Product & Photo Reviews for WooCommerce para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado a trav\u00e9s de los par\u00e1metros 'yotpo_user_email' y 'yotpo_user_name' en todas las versiones hasta la 1.7.8 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9413.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9413.json index 76ad5438d81..acd7321eb84 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9413.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9413.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9413", "sourceIdentifier": "arm-security@arm.com", "published": "2024-11-13T17:15:12.660", - "lastModified": "2024-11-13T17:15:12.660", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The transport_message_handler function in SCP-Firmware release versions 2.11.0-2.15.0 does not properly handle errors, potentially allowing an Application Processor (AP) to cause a buffer overflow in System Control Processor (SCP) firmware." + }, + { + "lang": "es", + "value": "La funci\u00f3n transport_message_handler en las versiones de lanzamiento de firmware SCP 2.11.0 a 2.15.0 no maneja adecuadamente los errores, lo que potencialmente permite que un procesador de aplicaciones (AP) cause un desbordamiento de b\u00fafer en el firmware del procesador de control del sistema (SCP)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json index 3b9b94997e8..2186997fba7 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9465", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:20.287", - "lastModified": "2024-11-15T02:00:01.687", - "vulnStatus": "Modified", + "lastModified": "2024-11-15T14:39:34.863", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-11-14", "cisaActionDue": "2024-12-05", @@ -139,7 +139,10 @@ }, { "url": "https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9472.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9472.json index 6a4a28ad2c9..c84e5672430 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9472.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9472.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9472", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:09.423", - "lastModified": "2024-11-14T10:15:09.423", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9476.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9476.json index f584e3e3402..80314eca9c9 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9476.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9476.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9476", "sourceIdentifier": "security@grafana.com", "published": "2024-11-13T17:15:12.747", - "lastModified": "2024-11-14T16:35:17.013", - "vulnStatus": "Received", + "lastModified": "2024-11-15T14:00:09.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9529.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9529.json index 1654ae2aca2..546da760404 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9529.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9529.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9529", "sourceIdentifier": "contact@wpscan.com", "published": "2024-11-15T07:15:17.900", - "lastModified": "2024-11-15T07:15:17.900", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Secure Custom Fields WordPress plugin before 6.3.9, Secure Custom Fields WordPress plugin before 6.3.6.3, Advanced Custom Fields Pro WordPress plugin before 6.3.9 does not prevent users from running arbitrary functions through its setting import functionalities, which could allow high privilege users such as admin to run arbitrary PHP functions." + }, + { + "lang": "es", + "value": "El complemento Secure Custom Fields WordPress anterior a 6.3.9, el complemento Secure Custom Fields WordPress anterior a 6.3.6.3 y el complemento Advanced Custom Fields Pro WordPress anterior a 6.3.9 no impiden que los usuarios ejecuten funciones arbitrarias a trav\u00e9s de sus funcionalidades de importaci\u00f3n de configuraciones, lo que podr\u00eda permitir que usuarios con altos privilegios como el administrador ejecuten funciones PHP arbitrarias." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9609.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9609.json index d11f0a61bbf..0a718d67f34 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9609.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9609.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9609", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T05:15:06.373", - "lastModified": "2024-11-15T05:15:06.373", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LearnPress Export Import \u2013 WordPress extension for LearnPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'learnpress_import_form_server' parameter in all versions up to, and including, 4.0.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento LearnPress Export Import \u2013 WordPress extension for LearnPress para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'learnpress_import_form_server' en todas las versiones hasta la 4.0.4 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9633.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9633.json index ad4c4cc8bb3..820b81b91b0 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9633.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9633.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9633", "sourceIdentifier": "cve@gitlab.com", "published": "2024-11-14T14:15:19.660", - "lastModified": "2024-11-14T14:15:19.660", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.3 before 17.3.7, all versions starting from 17.4 before 17.4.4, all versions starting from 17.5 before 17.5.2. This issue allows an attacker to create a group with a name matching an existing unique Pages domain, potentially leading to domain confusion attacks." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab CE/EE que afecta a todas las versiones a partir de la 16.3 hasta la 17.3.7, a todas las versiones a partir de la 17.4 hasta la 17.4.4 y a todas las versiones a partir de la 17.5 hasta la 17.5.2. Este problema permite a un atacante crear un grupo con un nombre que coincida con un dominio de Pages \u00fanico existente, lo que puede provocar ataques de confusi\u00f3n de dominios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9693.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9693.json index dff36efaf61..a94d6b2986d 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9693.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9693.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9693", "sourceIdentifier": "cve@gitlab.com", "published": "2024-11-14T11:15:05.210", - "lastModified": "2024-11-14T11:15:05.210", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9832.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9832.json index 396d033b484..0e227d70c19 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9832.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9832.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9832", "sourceIdentifier": "productsecurity@baxter.com", "published": "2024-11-14T21:15:22.593", - "lastModified": "2024-11-14T21:15:22.593", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is no limit on the number of failed login attempts permitted with the Clinician Password or the Serial Number Clinician Password. An attacker could execute a brute-force attack to gain unauthorized access to the ventilator, and then make changes to device settings that could disrupt the function of the device and/or result in unauthorized information disclosure." + }, + { + "lang": "es", + "value": "No existe l\u00edmite en la cantidad de intentos fallidos de inicio de sesi\u00f3n permitidos con la contrase\u00f1a del m\u00e9dico o la contrase\u00f1a del m\u00e9dico con n\u00famero de serie. Un atacante podr\u00eda ejecutar un ataque de fuerza bruta para obtener acceso no autorizado al respirador y luego realizar cambios en la configuraci\u00f3n del dispositivo que podr\u00edan interrumpir el funcionamiento del dispositivo o dar como resultado la divulgaci\u00f3n no autorizada de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9834.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9834.json index 0f583a52f15..b41c26f92a2 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9834.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9834.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9834", "sourceIdentifier": "productsecurity@baxter.com", "published": "2024-11-14T21:15:22.803", - "lastModified": "2024-11-14T21:15:22.803", - "vulnStatus": "Received", + "lastModified": "2024-11-15T13:58:08.913", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper data protection on the ventilator's serial interface could allow an attacker to send and receive messages that result in unauthorized disclosure of information and/or have unintended impacts on device settings and performance." + }, + { + "lang": "es", + "value": "La protecci\u00f3n de datos inadecuada en la interfaz serial del ventilador podr\u00eda permitir que un atacante env\u00ede y reciba mensajes que resulten en una divulgaci\u00f3n no autorizada de informaci\u00f3n y/o tengan impactos no deseados en la configuraci\u00f3n y el rendimiento del dispositivo." } ], "metrics": { diff --git a/README.md b/README.md index 4831f9c9b13..504cdb58806 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-15T13:00:20.359775+00:00 +2024-11-15T15:00:31.902868+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-15T12:15:14.670000+00:00 +2024-11-15T14:39:34.863000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -269832 +269835 ``` ### CVEs added in the last Commit -Recently added CVEs: `25` +Recently added CVEs: `3` -- [CVE-2021-3740](CVE-2021/CVE-2021-37xx/CVE-2021-3740.json) (`2024-11-15T11:15:04.987`) -- [CVE-2021-3741](CVE-2021/CVE-2021-37xx/CVE-2021-3741.json) (`2024-11-15T11:15:05.327`) -- [CVE-2021-3742](CVE-2021/CVE-2021-37xx/CVE-2021-3742.json) (`2024-11-15T11:15:05.547`) -- [CVE-2021-3838](CVE-2021/CVE-2021-38xx/CVE-2021-3838.json) (`2024-11-15T11:15:05.763`) -- [CVE-2021-3841](CVE-2021/CVE-2021-38xx/CVE-2021-3841.json) (`2024-11-15T11:15:05.980`) -- [CVE-2021-3902](CVE-2021/CVE-2021-39xx/CVE-2021-3902.json) (`2024-11-15T11:15:06.190`) -- [CVE-2021-3986](CVE-2021/CVE-2021-39xx/CVE-2021-3986.json) (`2024-11-15T11:15:06.400`) -- [CVE-2021-3987](CVE-2021/CVE-2021-39xx/CVE-2021-3987.json) (`2024-11-15T11:15:06.610`) -- [CVE-2021-3988](CVE-2021/CVE-2021-39xx/CVE-2021-3988.json) (`2024-11-15T11:15:06.877`) -- [CVE-2021-3991](CVE-2021/CVE-2021-39xx/CVE-2021-3991.json) (`2024-11-15T11:15:07.173`) -- [CVE-2022-1226](CVE-2022/CVE-2022-12xx/CVE-2022-1226.json) (`2024-11-15T11:15:07.527`) -- [CVE-2022-1884](CVE-2022/CVE-2022-18xx/CVE-2022-1884.json) (`2024-11-15T11:15:07.803`) -- [CVE-2023-0109](CVE-2023/CVE-2023-01xx/CVE-2023-0109.json) (`2024-11-15T11:15:08.097`) -- [CVE-2023-0737](CVE-2023/CVE-2023-07xx/CVE-2023-0737.json) (`2024-11-15T11:15:08.363`) -- [CVE-2023-2332](CVE-2023/CVE-2023-23xx/CVE-2023-2332.json) (`2024-11-15T11:15:08.643`) -- [CVE-2023-4348](CVE-2023/CVE-2023-43xx/CVE-2023-4348.json) (`2024-11-15T12:15:14.397`) -- [CVE-2023-4679](CVE-2023/CVE-2023-46xx/CVE-2023-4679.json) (`2024-11-15T11:15:08.917`) -- [CVE-2024-0787](CVE-2024/CVE-2024-07xx/CVE-2024-0787.json) (`2024-11-15T11:15:09.213`) -- [CVE-2024-0875](CVE-2024/CVE-2024-08xx/CVE-2024-0875.json) (`2024-11-15T11:15:09.490`) -- [CVE-2024-10443](CVE-2024/CVE-2024-104xx/CVE-2024-10443.json) (`2024-11-15T11:15:09.750`) -- [CVE-2024-10534](CVE-2024/CVE-2024-105xx/CVE-2024-10534.json) (`2024-11-15T11:15:10.100`) -- [CVE-2024-1097](CVE-2024/CVE-2024-10xx/CVE-2024-1097.json) (`2024-11-15T11:15:10.550`) -- [CVE-2024-11182](CVE-2024/CVE-2024-111xx/CVE-2024-11182.json) (`2024-11-15T11:15:10.410`) -- [CVE-2024-11237](CVE-2024/CVE-2024-112xx/CVE-2024-11237.json) (`2024-11-15T12:15:14.670`) -- [CVE-2024-1240](CVE-2024/CVE-2024-12xx/CVE-2024-1240.json) (`2024-11-15T11:15:10.773`) +- [CVE-2024-11238](CVE-2024/CVE-2024-112xx/CVE-2024-11238.json) (`2024-11-15T13:15:03.753`) +- [CVE-2024-11239](CVE-2024/CVE-2024-112xx/CVE-2024-11239.json) (`2024-11-15T14:15:19.693`) +- [CVE-2024-11240](CVE-2024/CVE-2024-112xx/CVE-2024-11240.json) (`2024-11-15T14:15:19.953`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `325` -- [CVE-2024-8979](CVE-2024/CVE-2024-89xx/CVE-2024-8979.json) (`2024-11-15T10:15:05.310`) +- [CVE-2024-5918](CVE-2024/CVE-2024-59xx/CVE-2024-5918.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-5919](CVE-2024/CVE-2024-59xx/CVE-2024-5919.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-5920](CVE-2024/CVE-2024-59xx/CVE-2024-5920.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-6068](CVE-2024/CVE-2024-60xx/CVE-2024-6068.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-7124](CVE-2024/CVE-2024-71xx/CVE-2024-7124.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-7404](CVE-2024/CVE-2024-74xx/CVE-2024-7404.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-7730](CVE-2024/CVE-2024-77xx/CVE-2024-7730.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-7787](CVE-2024/CVE-2024-77xx/CVE-2024-7787.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-8180](CVE-2024/CVE-2024-81xx/CVE-2024-8180.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-8648](CVE-2024/CVE-2024-86xx/CVE-2024-8648.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-8961](CVE-2024/CVE-2024-89xx/CVE-2024-8961.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-8978](CVE-2024/CVE-2024-89xx/CVE-2024-8978.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-8979](CVE-2024/CVE-2024-89xx/CVE-2024-8979.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-9186](CVE-2024/CVE-2024-91xx/CVE-2024-9186.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-9356](CVE-2024/CVE-2024-93xx/CVE-2024-9356.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-9413](CVE-2024/CVE-2024-94xx/CVE-2024-9413.json) (`2024-11-15T14:00:09.720`) +- [CVE-2024-9465](CVE-2024/CVE-2024-94xx/CVE-2024-9465.json) (`2024-11-15T14:39:34.863`) +- [CVE-2024-9472](CVE-2024/CVE-2024-94xx/CVE-2024-9472.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-9476](CVE-2024/CVE-2024-94xx/CVE-2024-9476.json) (`2024-11-15T14:00:09.720`) +- [CVE-2024-9529](CVE-2024/CVE-2024-95xx/CVE-2024-9529.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-9609](CVE-2024/CVE-2024-96xx/CVE-2024-9609.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-9633](CVE-2024/CVE-2024-96xx/CVE-2024-9633.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-9693](CVE-2024/CVE-2024-96xx/CVE-2024-9693.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-9832](CVE-2024/CVE-2024-98xx/CVE-2024-9832.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-9834](CVE-2024/CVE-2024-98xx/CVE-2024-9834.json) (`2024-11-15T13:58:08.913`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 886541eaeb9..d179aede818 100644 --- a/_state.csv +++ b/_state.csv @@ -61302,7 +61302,7 @@ CVE-2013-3896,0,0,2f16407b73ada215f5106e639dcd7a3a77019c2bff5360cdd75e9173d86c6e CVE-2013-3897,0,0,b72882d4e43715dd810e1a5c9b26720bf797f23fb9f46c20bf600fe2a406ffa1,2024-07-16T17:35:10.297000 CVE-2013-3898,0,0,adce080d90c6ab18e43ee5f8aeefa7f5c6eacaaeca0c2f14d949b429f34843bb,2018-10-12T22:05:15.477000 CVE-2013-3899,0,0,b949ae26d8e682596affc2c3cac842b5f50e14a7098ef4be97cbc20478609e8a,2019-02-26T14:04:00.993000 -CVE-2013-3900,0,0,48db4be12ff7c022c6cd5f59b1bd2c4a7cb0beb2ffc27a26406b2eb086f53241,2024-11-14T21:15:06.097000 +CVE-2013-3900,0,1,31662f7b42360988f09d025d3259f164b03792e115cbc5a018adb82124d95fa5,2024-11-15T14:34:02.340000 CVE-2013-3901,0,0,909726abe80e061ae6e2dd321fecfa4d619bac1c32ab43350c89c79f858d262c,2023-11-07T02:16:04.560000 CVE-2013-3902,0,0,c3268eb845cc61f648c0f924f7aea32bf035b177d6afdc3b4618f8fae3570fc9,2020-09-28T12:58:30.503000 CVE-2013-3903,0,0,ba33c71cb834f29161cb041ea3ea2cb9e5593eb9759c9e34363de18a0ee9ff62,2019-05-08T22:03:15.720000 @@ -96969,7 +96969,7 @@ CVE-2017-13221,0,0,57e3b08fba40dbad7e13f1ecaef036f44baab1a7137260bac79cedbd0aaba CVE-2017-13222,0,0,ebfdf42baf601798adad1e504ba051d585896884b139bf563ee706b616493897,2018-01-24T16:09:05.727000 CVE-2017-13225,0,0,435256662af53bc84b96c8ecfbcc5e36a7df54bbec82fdff4a451c067fc3516f,2018-01-25T14:42:54.447000 CVE-2017-13226,0,0,a63799b06443b94461c2cc06e2e1817db591c161b20b7ad48cffc3add8fc02f9,2019-10-03T00:03:26.223000 -CVE-2017-13227,0,0,2363cf93995a6f4a056a60aae17e50895cee0cf2a76cdbce9de1dc6613a4ef0f,2024-11-14T23:15:05.013000 +CVE-2017-13227,0,1,1218c8f6d24ebd15c69e188cae747189d6f4bc1ebaf096d13599f773d27d57bd,2024-11-15T13:58:08.913000 CVE-2017-13228,0,0,d6d00cc11b40a6f7cf8c7c7b74c3a16d54ba4bf0782c9a7d7071e50c41c579df,2018-03-13T14:41:27.033000 CVE-2017-13229,0,0,7ebc8fa8286ba1d5821a34ad554783788a44485aedcb5ab1d772a4b9b365c210,2018-03-06T19:52:36.463000 CVE-2017-13230,0,0,d8a847f5c7c6d9cdce8e19c6fc7435655e7234b7d29ac67a202b7766226c4533,2018-03-13T14:40:12.123000 @@ -179867,7 +179867,7 @@ CVE-2021-37391,0,0,612092213cbf3c7c8612c0c47f8c525d5a52fd73e735ce6c2b430c9b86b41 CVE-2021-37392,0,0,60b8dbff0c2d792a54d0cec2f57109e745df15412f48a80e1ebca647d9b97654,2021-08-06T16:21:28.697000 CVE-2021-37393,0,0,8aef86848c22832237243030c09554d5c294fe67bf36c767afe9af07ac38cfd0,2021-08-06T16:16:15.627000 CVE-2021-37394,0,0,3bedea4cd8c10cff8545c5ec47bc3c52f53035db41f301c1be09bcbd332575a2,2022-07-12T17:42:04.277000 -CVE-2021-3740,1,1,9a092637180243b4c6c48e61843067daad955a1bd8f7bd30ce4915aff4202dd2,2024-11-15T11:15:04.987000 +CVE-2021-3740,0,1,50364709b33e38e987de64e61691a6050ef2c764a51b7f4e96d18c3fa8da634b,2024-11-15T13:58:08.913000 CVE-2021-37400,0,0,b0d27ef29eb9b33b48de9bc66b3e1c03ad9217ada68e0e9fad53740c5cf9e509,2022-01-07T20:40:19.347000 CVE-2021-37401,0,0,59627adb2bdfa439df8627bb1689eacf7a0bb3291449d63f2dceab9e283ff994,2022-01-07T20:29:50.673000 CVE-2021-37402,0,0,cf2062259da087492fc8edbe731f8aff92da042f2b45087a0d323466afa22b5a,2022-02-10T17:57:02.027000 @@ -179875,7 +179875,7 @@ CVE-2021-37403,0,0,82552ed0c573f39bdd26ed69942611c847d9a9b43f6257e0cb1eb6c1b0bd8 CVE-2021-37404,0,0,5a0e9f6dc54189d8c836c0ab9c368f4d87fc3dcd07409437f67bddfe1436495c,2023-06-27T15:15:09.823000 CVE-2021-37405,0,0,99b66947fe60bfe7691d9d16217aae051bd21ca1d36b5350aafb451f141845f0,2024-05-17T01:59:13.510000 CVE-2021-37409,0,0,68d64f3f262bc3fe4112cc846cd3785f4b7627dd3a214f6863ba2f7b1e1497c6,2023-04-01T22:15:09.710000 -CVE-2021-3741,1,1,73fe354778441e7a1da2587ec2ae45c82217d9b82f9027d9960d61907dff8a66,2024-11-15T11:15:05.327000 +CVE-2021-3741,0,1,f28dfd128f4e9a11f9df52a41ace85bc1c50d6f5c0ea1d30c18e00fc65520623,2024-11-15T13:58:08.913000 CVE-2021-37412,0,0,c4ae4ff35985b522589284c8cdff1e75d55dc933d0298323169869b52cad8ce3,2023-01-24T15:40:30.060000 CVE-2021-37413,0,0,4cc7cba0bca0572fafb12dd6e2f19b3e6c044ad90d1c0308f827136dd04ea713,2022-06-01T19:36:47.227000 CVE-2021-37414,0,0,e94477ddecab7d5bc2d7e77a4e197ecb02bc86dc29db03c682fc50a0f087770e,2021-12-20T22:30:30.567000 @@ -179884,7 +179884,7 @@ CVE-2021-37416,0,0,2e6268d3c4aec7d053473a27b3499f3c904bb8afa46207b20648c1d9d3251 CVE-2021-37417,0,0,0af7afec4419ac71323dbe19fcafecf8b5620734ea16d7bba48e8df850d31058,2022-07-12T17:42:04.277000 CVE-2021-37418,0,0,146b4ef0e7964748fbc25b1e94686917c4647a3307c5708e67798876e0feddf4,2023-11-07T03:36:57.323000 CVE-2021-37419,0,0,9464053d73f212e534a6909af63b44d1c351a4729e973af190457c0a1d02f2c9,2022-03-18T20:43:55.713000 -CVE-2021-3742,1,1,6ddbfbfbe0ab51844a6edfd87dee0576462351074e136e00ef90db1dfb9e228f,2024-11-15T11:15:05.547000 +CVE-2021-3742,0,1,e6beb8378dac536963062c75373aaaf7538dd7cb6ac45905aa8bf7a058793cb6,2024-11-15T13:58:08.913000 CVE-2021-37420,0,0,b52aa49c12ed23f5fc454663899c9e989f90752f3b6225dd6ef1f0904854480f,2022-07-12T17:42:04.277000 CVE-2021-37421,0,0,72a802fc9066861ac62eb2ef177ad824c7c5b2ea14bb5783b3fe6f6887532709,2022-07-12T17:42:04.277000 CVE-2021-37422,0,0,04c08c63b243212678162abf332587426643acf6f890ec905ee35d9fbe2fb7d5,2021-09-17T18:11:03.127000 @@ -180604,7 +180604,7 @@ CVE-2021-38376,0,0,d4485ca92681558168e0fd9a80da3a4ca7d974684f50f50f1dbd03a5e1f21 CVE-2021-38377,0,0,48443da60f90ac4652bc515c5c3f88029b2bd62277bc482a3739e4f453b49065,2022-07-12T17:42:04.277000 CVE-2021-38378,0,0,432e746fcb98480b06b83fac0fe9649e434fa56a8d7663d16931ad26e7f975bd,2022-07-12T17:42:04.277000 CVE-2021-38379,0,0,b8dbd9bba6856ef42bc651ecfafd71af15e01cfb8b87f0442cabe4efd9091d1e,2021-11-04T13:37:43.773000 -CVE-2021-3838,1,1,a284de91f8b92b47fd992847a637bdf1fc39468a44b093c22dd03be4922d2dbd,2024-11-15T11:15:05.763000 +CVE-2021-3838,0,1,73ee934f950bc7bf45ef2754d13869d83992608338f01cd6970c5f24e125feeb,2024-11-15T13:58:08.913000 CVE-2021-38380,0,0,966a303a4461fc8fabdefd21a52860a9a0545818ea34433392a6e6db9ea93c3d,2023-11-07T03:37:24.547000 CVE-2021-38381,0,0,f90987e628b6ca7ec620183d6ef4cd28fb101753b7f8f85a6534a6827c2cc9bb,2023-11-07T03:37:24.610000 CVE-2021-38382,0,0,56aeb4bbf5aec265fc686978fb16984a29124462e10ec9d950e4eb086e18c989,2023-11-07T03:37:24.670000 @@ -180637,7 +180637,7 @@ CVE-2021-38406,0,0,1a412ed4845c3e7db5ba8209c3a4d108b981fb433611867e224ac85224be4 CVE-2021-38407,0,0,890c190c0283a8e0a8f342b5c890f629a334ad53f0da1aaff56114e2a83bc435,2021-11-05T13:43:35.517000 CVE-2021-38408,0,0,cefdd68e1c399b8924048ad1c5dce3eac2e9d956e5a6317469b54e6ccef2b652,2021-09-20T12:44:57.193000 CVE-2021-38409,0,0,ac5681ac9ecb25d83290b8fe770f1a64c20ce909cd6e46bc422ea778311ca22f,2021-12-27T20:18:03 -CVE-2021-3841,1,1,0fe29dd87c104b93c4e6a58a163cfcc73459853fdc42a84d916846d9461c4fff,2024-11-15T11:15:05.980000 +CVE-2021-3841,0,1,b1497b55607cb4e55996bd0467d8f1b896a75235583200c77a00036aebccb2fc,2024-11-15T13:58:08.913000 CVE-2021-38410,0,0,052e53829d51f2a2454940a2e213a88f9fe5d97f4595c4c33710b5a6c717b5b6,2022-08-04T02:48:06.450000 CVE-2021-38411,0,0,3f3ee8a81c8a60a013d7fdb503ae6a6cd21c95c21682c5d270adc23f92af62c0,2021-11-05T13:40:54.753000 CVE-2021-38412,0,0,cf3e8d210ed955e3f0b30bca33000f0de0090c42ecba6e720388ddafdb5fa783,2022-10-27T12:59:17.667000 @@ -181125,7 +181125,7 @@ CVE-2021-39016,0,0,88d7422235623a2db52d08ccbb930b8332e62a309f55b1a0bb58ad6b4c307 CVE-2021-39017,0,0,43da2de1e5021798d5e2da169cbabdb2f1ea3bc804f6e06fdd5bba1a80d8bbae,2023-08-08T14:22:24.967000 CVE-2021-39018,0,0,ccad4b84b3066dd393e4dd8123dc7a6269ea1c28676cd9811de926207c38696c,2022-07-18T19:27:57.433000 CVE-2021-39019,0,0,469fabcf38af6844701fed49a6e80d48722d455ad28af8536243f61e3be90191,2022-07-18T19:18:23.533000 -CVE-2021-3902,1,1,be5ebc48fde4495743d06492bf058db2d27811e49e7e5cb1cee92f3cc629e6e1,2024-11-15T11:15:06.190000 +CVE-2021-3902,0,1,0fc4ab0f3340e7aff4180ba39bd3b7680dbefdc5ebb9f68ca355d98694913531,2024-11-15T13:58:08.913000 CVE-2021-39020,0,0,f8a046ed21eb98ee1f2ce9e6feab22d062faea367e7e86b10085c29b6de05cd6,2022-05-13T17:16:25.233000 CVE-2021-39021,0,0,c20de8bb5efb66e3ec217f01f9525cf7c58f1792615ff1990e77c2bd1881bc03,2022-03-24T16:02:52.140000 CVE-2021-39022,0,0,12f9551c868b6c453d5c84008020f3db65f37eb2f4891591958baa35af27c010,2022-03-22T13:43:39.510000 @@ -181849,7 +181849,7 @@ CVE-2021-39856,0,0,b28d7eb0b7a5d39eaf23ac52dc09cb278f0e7689028bf36ed2fc3971582d7 CVE-2021-39857,0,0,1edb1b1ccf62746fa0da62a0bb737fb805f4b33f81197adfd22bca19c0f7d2f1,2023-11-07T03:37:48.580000 CVE-2021-39858,0,0,b28c2928ea13457807429906858d94adce9264a45ed2cc6a4355db39a8af6d60,2023-11-07T03:37:48.843000 CVE-2021-39859,0,0,983d64eb6a749b9e785340e4b1f0236aaa9d4cbffc4158e9a122ebb19e5056ae,2023-09-12T14:38:54.530000 -CVE-2021-3986,1,1,faa35981acac17c4c8be0a5ffa26c01782f49eb8c06ed42cea9dd8de64b10c4f,2024-11-15T11:15:06.400000 +CVE-2021-3986,0,1,cf8e85b7286f11f0bd9460ffa61e4e7e95740e9fdf9d0296bcd970c9149f95c2,2024-11-15T13:58:08.913000 CVE-2021-39860,0,0,ae8998c31697bbdcf345e9d4ddfa2fed95711346b038579c6fe27d9a56e021bb,2022-02-05T02:17:52.057000 CVE-2021-39861,0,0,66551e624494d96e7c3d65854c95f53647ef34c93a78c99750c131046b1aace0,2022-02-05T02:17:54.577000 CVE-2021-39862,0,0,bf04081e341e83b6669a4fabac8cd0b2d30699c53f96872ce03a60d22ca567b3,2023-11-07T03:37:49.170000 @@ -181860,7 +181860,7 @@ CVE-2021-39866,0,0,6fabb561196e392a171b14d09332d010f59de8a7ed9880963cc586df8f988 CVE-2021-39867,0,0,cf1dad99c282faabc5cb3cf833ed6f5b91097d777779477ac24fd680f378127d,2021-10-12T19:08:05.167000 CVE-2021-39868,0,0,01bf76261c9d86e2825302310d8b1d110b2d4f6a0f91c6aea468c32be845a7f5,2021-10-12T19:47:47.650000 CVE-2021-39869,0,0,50c4bfd31656adba59cb9dc37b7b350e99a58491e593864693fd3f1525a21185,2022-06-28T14:11:45.273000 -CVE-2021-3987,1,1,653cc223038a4f581377fba1beee2c90d50dd03cce088792ac0dffc626f16824,2024-11-15T11:15:06.610000 +CVE-2021-3987,0,1,b86edabc1c017e3020e93667bce01ab165f5d6b33d801bad1de70274874323b7,2024-11-15T13:58:08.913000 CVE-2021-39870,0,0,f4d27e6e382702365ecb6b123ea92ce819b6bff3f3b19cf8c54ff152bc410640,2021-10-09T03:31:41.567000 CVE-2021-39871,0,0,9da9bbcde2429b6f2a3b8c36de5587428d893fba2ba1c35d4bc22836c49d3722,2021-10-12T19:52:42.127000 CVE-2021-39872,0,0,389f57b77d45e9d1425003b8b643833784e02c6171170491cb4db28b7e8fd74c,2021-10-12T18:24:40.737000 @@ -181871,7 +181871,7 @@ CVE-2021-39876,0,0,163386dcc440f8e6b66258fe9f8087aeebbd81b74bcfe526af8eddfb343a7 CVE-2021-39877,0,0,f9748be5890f45dbfe5a909268c2e810aed0fd7cef3df47f2f844678254c3d6c,2021-10-12T15:55:42.793000 CVE-2021-39878,0,0,9d9437315fc043e2589cca1b010554d7ecb9e451d3d2157288a1e88191aca38b,2021-10-12T17:15:02.807000 CVE-2021-39879,0,0,429da5caba14265b91489ac72fa37fdea760044ee3fb62e1cd11f34e878ac20f,2021-10-12T15:57:48.810000 -CVE-2021-3988,1,1,171261ff6144e33763486fda151d2cdb154ce9121966a7e83f6f662db25c3427,2024-11-15T11:15:06.877000 +CVE-2021-3988,0,1,1a2b960d07e4dca041731b2dad7e71998a6580fdea304f38e856d3a0e8567280,2024-11-15T13:58:08.913000 CVE-2021-39880,0,0,f43fbf46512fe0da98b08e588e5c97c52ff7199b5c05f615aa05257e460043bf,2022-10-19T18:25:02.617000 CVE-2021-39881,0,0,5445efe9c4c4cf5d576eca639b40a53c718d8c7b4fa50521ccc2d6c6aff6a28d,2021-10-09T03:31:08.827000 CVE-2021-39882,0,0,989fca2f5d44fb7d0c221b794ff55417ebd0a1be5be524bdad69ce4323e8c8b4,2021-10-12T18:39:13.573000 @@ -181904,7 +181904,7 @@ CVE-2021-39906,0,0,e04ad55a1100d2964d2fe24a0d9044d99aa4ff75b0959894c4e77599d608f CVE-2021-39907,0,0,fb47addbd6bbabad003567f698b756cafc4248e663cf3186ea0c076027d378af,2021-11-08T18:11:09.323000 CVE-2021-39908,0,0,f72dfff8f0de9ab8ced78ab85d925d77e9a0ab0762baa52bbd5bcb5844b20d7a,2022-09-30T12:58:54.010000 CVE-2021-39909,0,0,0eb46c843aee997f319542a3de59e07a425b198542987db6d18b92f2cd302bc6,2022-10-06T19:55:19.013000 -CVE-2021-3991,1,1,2c0c1d690747b8cd1411b4e82140fb9c82030486e981110c8444d185a683fb2f,2024-11-15T11:15:07.173000 +CVE-2021-3991,0,1,e59ae99f86d2beefd3dc071c27b04367e5a4a69327aff26d3e7be5bbf9f0d029,2024-11-15T13:58:08.913000 CVE-2021-39910,0,0,282b0ca251be46e18bfa01121795127e6cadb5a2fbd4e673f7596e1fdc2179ea,2022-07-12T17:42:04.277000 CVE-2021-39911,0,0,b91f499ed64b9404e4620abe987fe34a286f26afde4bd21996a2f7b358c0c585,2022-10-06T20:14:22.410000 CVE-2021-39912,0,0,6b1571a12bafe3ca8eacf93314ab0c9c2bfaa878e8fb257fb7f993e04329f737,2021-11-08T18:38:05.060000 @@ -188713,7 +188713,7 @@ CVE-2022-1222,0,0,b3920337094656db702d78f1c526ab2ae12658b8e98c28c5c4ab7be3ad3344 CVE-2022-1223,0,0,637b2827dcaf7417e78dbd542a64935d1a8b67bacce03b5481a1f13bfe63287f,2023-08-02T09:15:12.567000 CVE-2022-1224,0,0,1f7e411e11108d7458b51eab22eb66a24149a5879c00141ef2f28fe0fafb05dc,2022-04-11T16:42:06.027000 CVE-2022-1225,0,0,5748f4f5345a9f6c3175311aa2738ab2bf9651a24ed3aa3e4677372333de4ca4,2022-04-11T16:44:30.957000 -CVE-2022-1226,1,1,dbb11adeff2274881a245eabb8643264f8b6cd64ad50fdf4980857da4a9ed05e,2024-11-15T11:15:07.527000 +CVE-2022-1226,0,1,5c9b08edd13206e693ccfda5956fd5745a205b23ba4b6a18454f74ca614034b3,2024-11-15T13:58:08.913000 CVE-2022-1227,0,0,83b90259bbaaaa877c52c1a6a345ecac76277c5a49b8d7b2e55d5609ee2638a9,2024-06-28T16:15:03.017000 CVE-2022-1228,0,0,7d23d45a83435d1e3bd4ca47a231881fd502cebe5b74cef074758e121829a08b,2022-05-03T17:07:53.397000 CVE-2022-1229,0,0,224e2e97e97497a42291fdfe93e44428659fa5e137ea549dec7de44ffe085b98,2023-04-04T16:24:30.943000 @@ -189351,7 +189351,7 @@ CVE-2022-1876,0,0,983e56cac9f7021f952f9f938d45e035dc9acbf02c1272a86efe4cc4b468e0 CVE-2022-1881,0,0,7439c809094624c8b5fdbf022a11f3d774e6fefc61f4a028f8263bd6fe529332,2022-07-27T18:21:16.887000 CVE-2022-1882,0,0,3baaf779da64335ffad3abdda3c3850b06114d069bb0bf1a437e02c2ffe782b9,2023-11-07T03:42:15.460000 CVE-2022-1883,0,0,10b029e5ce85ce2290987adcb3c5745aea973d33d0d3803bfa3a6beb774a6afd,2022-06-03T14:05:34.297000 -CVE-2022-1884,1,1,3f3a7c3aa1b09e7cf1db4005b1bf462fa64f7bc6201197278787cfbc0e7192ff,2024-11-15T11:15:07.803000 +CVE-2022-1884,0,1,e7fa10953a0a16e523463c4de82cd2670c0254a7ce2d1852a8ba795b94bb1c34,2024-11-15T13:58:08.913000 CVE-2022-1885,0,0,990571f5f58372d06c86739f0d8507a9bf4c77382683b628e53a4fb6b11f2c45,2022-07-06T18:07:38.497000 CVE-2022-1886,0,0,7934fa97f2a8af4a046d7bb9f14babcddc4a4e2348bcdab16ebde94dde55d5a5,2023-11-07T03:42:15.700000 CVE-2022-1887,0,0,c9859a4b8fe51696b2ace2c5b6406cbbf00272360b5c9ea988467e7b99e94416,2022-12-24T04:23:54.613000 @@ -191283,7 +191283,7 @@ CVE-2022-21879,0,0,b80571e02e45b4c3bc6fa1ec4c41715878dbab32c3cc02c5d5aa57f8c121e CVE-2022-2188,0,0,55d3398b17c8580970a402b3138b19fbf105bc319e31fecf24a3789446c85770,2023-11-07T03:46:16.607000 CVE-2022-21880,0,0,291621ef85ecd1019b86f86cb4969733e4105e27c85639aaa97536fe96f54759,2024-11-14T21:15:13.267000 CVE-2022-21881,0,0,d77a4cb00d202cd2aaa4cccc2d7a26120d1f5e676e87acd6db156de620f89f4c,2024-11-14T21:15:13.413000 -CVE-2022-21882,0,0,206c7272c8c7267a828073182bc732487ac2fcd1d72b705fa396e322e274672a,2024-11-14T21:15:13.590000 +CVE-2022-21882,0,1,ff742c209ea7c234b7a3d1e7b0f376edc041bc20a5fd65b7b15ab156dc4c95f9,2024-11-15T14:35:03.910000 CVE-2022-21883,0,0,5026326689733caed3be4860695075313a3399d1989a0ca93427982eff2d0932,2024-11-14T21:15:13.757000 CVE-2022-21884,0,0,02410fb143314217c18457c2c0a8c4c1fd5aa4619687bf5c3a1db4c13912f90b,2024-11-14T21:15:13.913000 CVE-2022-21885,0,0,336986904607e485c8f0fab2e3f60eba916e67195be8494ceed55d04efc9dac6,2024-11-14T21:15:14.033000 @@ -191321,7 +191321,7 @@ CVE-2022-21915,0,0,412f473c876d5413c82bb33406d924797bf5f9904cce39a1af57a204d5346 CVE-2022-21916,0,0,9679c658551086dbc3cb9abe43d1f6925b622c73df732e23cf30fbb0ec907bca,2024-11-14T21:15:18.240000 CVE-2022-21917,0,0,8d972592ce7c74763004b2445e4570f851a5ddf3b05f3882b45aaa3f6f9247f8,2024-11-14T21:15:18.403000 CVE-2022-21918,0,0,253fe40c009402fe3b7cf678ddff57641f6a3bdb714317a50bbec45230f4c336,2024-11-14T21:15:18.533000 -CVE-2022-21919,0,0,fb63c888b9e9110378672183f99bf3488918203e8250fd2113503669ba34e677,2024-11-14T21:15:18.723000 +CVE-2022-21919,0,1,7f0e7d87afa1bc20ea3b7a0b90364caefb39d7ea976ed787cfba00e9fa878dab,2024-11-15T14:35:32.303000 CVE-2022-2192,0,0,3d00254e7291c01d08e36868688becfdfa79dc421a888feb0112fc918c4c9771,2022-07-27T07:23:43.320000 CVE-2022-21920,0,0,fb6d2c0bb191175a3862953de48f2977bffc54b4daf5b0834f288d3f08dcb56e,2024-11-14T21:15:18.927000 CVE-2022-21921,0,0,38695df0b4898eb385b53bb50d763987b320ae69b4601f7d446a34b3acc5b0ef,2024-11-14T21:15:19.123000 @@ -191726,7 +191726,7 @@ CVE-2022-22316,0,0,68d428ce839b198d4fbca5fc56697c13b0333daf7d04f7ea4a4d7eedfef52 CVE-2022-22317,0,0,46e39f81c954851405d08a7503df6e1365bc23d5623a26f584840a5bb4df9249,2022-06-28T12:23:56.023000 CVE-2022-22318,0,0,8cf7c44a294363867fb36c46abe6bef4d5890a368969107e59ae542d7adc0d7b,2022-06-28T12:22:25.073000 CVE-2022-22319,0,0,73f199cb6097c35bccc1601c95a7d4fe0c341871a75277b1cee33346ff16ee7f,2023-08-08T14:22:24.967000 -CVE-2022-2232,0,0,9354a833a2a78013502e3e8cc69f67572784e16d93674f00c1d07fca96d0910a,2024-11-14T15:15:06.527000 +CVE-2022-2232,0,1,bd846ee79e1a4385023ea33ce9bacefff742799a793117ff1a96b96e7db250d6,2024-11-15T13:58:08.913000 CVE-2022-22320,0,0,d92eba3df93dbb64fe03338baeafdb26b68d25c17a5ee76ae1b40c4769623318,2022-05-19T18:14:30.350000 CVE-2022-22321,0,0,df92e805cdeb1a2d3302178f9c053a0b9b5034408cbfd90722f5c7c323fd9212,2023-08-08T14:22:24.967000 CVE-2022-22322,0,0,2e071a7d1fc94ba4d6a9ab644c15e9e9b1c9bfae24980238701c7fc913dbb02e,2022-05-06T18:16:28.067000 @@ -199605,13 +199605,13 @@ CVE-2022-31662,0,0,4716baf2173369b6ff3e13b07755ad4e0e453df4c6dc19303fe237ad32cf3 CVE-2022-31663,0,0,c250a0e102f60432d255e827fdd6db289d62d1a4e1292229b591504e22573b3c,2022-08-11T16:13:03.250000 CVE-2022-31664,0,0,8ae94e3e4b372e5f45259d81541342947ae361ebba4e6da89206986ea919de52,2023-08-08T14:22:24.967000 CVE-2022-31665,0,0,7a06345a1942d5d52d9b06c0ee41416d4ed2364fdc0d69c8a0c3f480ee888cbb,2022-08-11T16:14:08.620000 -CVE-2022-31666,0,0,93d1afa53e2b5e8dd574073ccb898437a22ca265be8333512b7d05e6509f49bb,2024-11-14T12:15:16.083000 -CVE-2022-31667,0,0,935dfca0b6ac3114c6c92c29854500f621ad40965dccc9fe68e985807237ba29,2024-11-14T12:15:16.390000 -CVE-2022-31668,0,0,1a34cb3f8dee7d08cd0bf80d68a64e47937ab73a6d606a5fc18ccbd84cb45663,2024-11-14T12:15:16.607000 -CVE-2022-31669,0,0,aae168e446b1b7b360056538dfe78a6cfcb29a95f62c1b7b749be0fd99d72e4d,2024-11-14T12:15:16.817000 +CVE-2022-31666,0,1,fddd08a0275cd2757989dfe397f2a0364bee8be87b326ee85f29b843beb3c153,2024-11-15T13:58:08.913000 +CVE-2022-31667,0,1,32cff782d282fbfcb6596afa91274b8004222cf2628408acd245bff40eebe8cb,2024-11-15T13:58:08.913000 +CVE-2022-31668,0,1,bb5f66840515f00c3c2895e8f894d8d6ed141195a34cd2692f11338811011922,2024-11-15T13:58:08.913000 +CVE-2022-31669,0,1,8740f25556ae5be0b93f4c4e5047b90d372f1ff4f6e72bf3309b6917097bae4e,2024-11-15T13:58:08.913000 CVE-2022-3167,0,0,47921e8a9cb97995d6f2ce8276ccf118a65fe4731d6ac6de65dd0ec114eec596,2022-09-14T15:32:08.950000 -CVE-2022-31670,0,0,abeb6dc4aedfef2c517ff862d14065c92b5c07b435e7bbbe658b14725b3e6d9b,2024-11-14T12:15:17.040000 -CVE-2022-31671,0,0,a228ea7ef75cbf94677ef050b31280cda6c7f9c0fe5f23cfbf5744b72bfa57cf,2024-11-14T12:15:17.250000 +CVE-2022-31670,0,1,052d448ecf5d0517ba034ef4c6d55be116c668318dde16e7f96c8c978ee85769,2024-11-15T13:58:08.913000 +CVE-2022-31671,0,1,ff77dcdc201b12eca3b816fe655bd9cbf93833faac10d6d2cec8c838b7944280,2024-11-15T13:58:08.913000 CVE-2022-31672,0,0,f935cb14a924ae93702f89793daf0806536a0ce42ff8289dde093642be80a068,2023-08-08T14:22:24.967000 CVE-2022-31673,0,0,da7dcaa4140053d84527543292fb585bb296fa966885cdf6f4d876302e1f87da,2023-08-08T14:21:49.707000 CVE-2022-31674,0,0,332df8a6563c46e3b27acddce953af7226cedea008975ba4b629bdb187c43e75,2022-08-15T18:56:24.003000 @@ -212898,7 +212898,7 @@ CVE-2023-0105,0,0,2b12a003cd73110318e79298dd730b028944de31b3b2fd49ae09c6e6c34faf CVE-2023-0106,0,0,05e0d567b91f98b80dba4d8ef37e3d6d93df29ade7db9eb7d74b845f158d4370,2023-01-12T15:04:29.543000 CVE-2023-0107,0,0,cd205e669e16f38bc95e2290070f356c4fee19f825da4c33fef61ad635b5f6dd,2023-01-12T15:04:41.817000 CVE-2023-0108,0,0,70c8cf4e996128d54da9f7301a41fc8c246a66fdfe898b159018bdcb506d722d,2023-01-12T15:05:03.130000 -CVE-2023-0109,1,1,971d8b8b1cf549cc7bac24f9497f6a3568eae851d5d592ef878abf4b6136bc1d,2024-11-15T11:15:08.097000 +CVE-2023-0109,0,1,e3a8476d90ed5e719f70b45a2f1d451ef9584771c810e3a89da7ee9b7b149d8c,2024-11-15T13:58:08.913000 CVE-2023-0110,0,0,b9a61a54a079a5cddcae7f57892e97a4bbf51450edf598dd8a9a1b1c401ebd1f,2023-01-12T15:05:16.323000 CVE-2023-0111,0,0,f766f05747dd6dfbc35868e0369bbe0def763377d79a8a4ea4e4bea44d32809b,2023-01-12T15:05:27.080000 CVE-2023-0112,0,0,66c21565a3c1e4d16d1c053665b40b7925a9b3641bc7aeaa413fbdfe779c924d,2023-01-12T15:05:37.157000 @@ -213501,7 +213501,7 @@ CVE-2023-0733,0,0,e09491ec0935323a2fec770c3ecd0ead271e6d263c55ec182afeeb068268d5 CVE-2023-0734,0,0,8d2fcc12463e0b1abec4a2a51b7df5516739ca6f45b2b04f9bbd78cb0aff604f,2023-03-09T20:55:01.123000 CVE-2023-0735,0,0,9fdced2b47db01a6a01919f52b5ed809a8d21724989b5bfa7955c49171c3b6f7,2023-02-15T19:24:41.473000 CVE-2023-0736,0,0,b3396876d05ebd2f1f90f4354a1dda6ed12cd8c3d0ffb089c43fbadd8845f1a2,2023-02-15T19:25:29.570000 -CVE-2023-0737,1,1,065075efc2b3f0b30dcd3e4d98b45ee5c76237f17b1ce7fddbf427e28a04f3ac,2024-11-15T11:15:08.363000 +CVE-2023-0737,0,1,5ae8030b4544ca482d8f862c7cdcd33aa561e809c4c313d3fcd74e92dbd682ac,2024-11-15T13:58:08.913000 CVE-2023-0738,0,0,8b8dc61e92f27262b3aa279351d6ab8033f6bacb206b350b6e8e6ebc9af5389e,2023-04-17T16:57:07.133000 CVE-2023-0739,0,0,b1b26d0ce5c494e5d7ada0f8a588c86492d1c9f0144b5f459b8cc611b553c2cd,2023-03-02T02:15:41.857000 CVE-2023-0740,0,0,a07e1065e4de29dd41d3a7cadad7fafff7c778c739891464a73f725e2a440f3d,2023-02-15T20:20:37.850000 @@ -217454,7 +217454,7 @@ CVE-2023-2331,0,0,e433c8f28124f99de996fe1b6c3691e25c108649c8ab730059c257d74b0a50 CVE-2023-23313,0,0,5ab564b75d72781324830922b5feefff3026f2101be70bbaad014ca9b998958c,2023-11-07T04:07:40.137000 CVE-2023-23314,0,0,b80392fd9584b433a38a78e2530c4db30446fa40b35f645f6acfbdcc1e22626e,2023-01-30T19:31:41.750000 CVE-2023-23315,0,0,32244c72a2b7eabff29fdd785e8853617587d6b657a16b1b687badeb31ddeb6a,2023-03-10T02:31:23.757000 -CVE-2023-2332,1,1,c32d523c81d064bd3f563c779b55ffaabb13b1e4aa25d8a36d8112f982a1997c,2024-11-15T11:15:08.643000 +CVE-2023-2332,0,1,489ede0aaa6f14f767a2f9c9e16259a2d63d7f571501feaf647974cecf801abf,2024-11-15T13:58:08.913000 CVE-2023-23324,0,0,95dd911b066baa0858b7b409d73bcd14ff22686691096373e30e8c5721aa2257,2023-12-05T12:39:44.770000 CVE-2023-23325,0,0,94e1a8e3ac75f1a3bc2a74e7374f6d9f0e838c3c3932b61fa7dac52d90f8e0d8,2023-12-05T12:48:15.773000 CVE-2023-23326,0,0,af8ef32c5b2a0d921fed756052ef1d0183c04f71130cb143f8686b6d4c026c5b,2023-03-16T15:56:41.620000 @@ -226027,7 +226027,7 @@ CVE-2023-34045,0,0,efcc90e9c554373a3c46862e56f008ba7488a75ec1d99629fde063d424a27 CVE-2023-34046,0,0,940c9fc1e6b0b0f75909505dcbc5c54324caa725c2f9e799f85d164cca40c6c7,2023-10-28T03:34:15.293000 CVE-2023-34047,0,0,2deed76b81cbbd710c03198ed7fba5a7406f65771b7a4bafc40dc468b5019e48,2023-10-18T18:04:30.410000 CVE-2023-34048,0,0,85fcdc74e66ac70590bd0779c468437a4b104548eae3fa739b3fa5514e6d1617,2024-08-14T20:02:35.353000 -CVE-2023-34049,0,0,9e49f84bec0aed0fbe1d84eb321de10205bc49c3ff0c5a1d57cf8d25a6565df7,2024-11-14T05:15:28.260000 +CVE-2023-34049,0,1,c2bb03a3e34cbdb6866b99016c0ba893ec8e8838fd743d6ef9077f0efe832f58,2024-11-15T13:58:08.913000 CVE-2023-3405,0,0,0c266b7d3570c3d94ac19eb248b9b0c3ec6e185e0d327fcad7aa0c292964fb70,2024-08-28T09:15:08.677000 CVE-2023-34050,0,0,6bf9fe5de1088502db285c6eaa05c1aab935be0e9bec211546bfc1be5b5afd5f,2023-10-25T16:54:31.770000 CVE-2023-34051,0,0,e6048bd7bc8ae549228fa0e7507cc168b790322ae0a61fef62c26cd3f513b2c1,2023-10-30T15:28:40.420000 @@ -227008,7 +227008,7 @@ CVE-2023-35654,0,0,5ec0257719972615a54320d70abd4585860da16cb9145e7dd4cf2a9de0b38 CVE-2023-35655,0,0,46ccfbda32de6d4aaa44064f160c4fe81117afbe213f242d2b419179ac9bae89,2023-10-14T01:44:43.167000 CVE-2023-35656,0,0,351408b3f3ce527e3e9ca146a71adca57765b10d14ffc2f2878145486a62e13f,2023-10-25T10:02:58.693000 CVE-2023-35658,0,0,8bcf70abab563df9c5ba967b15bc341b1fdf6e9f2ec89ab41d871dfe9fd14b2f,2023-09-14T02:18:53.670000 -CVE-2023-35659,0,0,8124ed0a425ad7c6990134f5182da212398bc8d9216184750f7d8f97acddc20e,2024-11-13T18:15:19.763000 +CVE-2023-35659,0,1,1d9225ec8c2d98e0bb710b261fa655c53a135ecdd31f56c6bc7135c01426158a,2024-11-15T14:00:09.720000 CVE-2023-3566,0,0,c2dc7026e794fcf3036669dc6d7e1d3151b5648f6848d46c6c625fc93ddde6f5,2024-05-17T02:27:36.673000 CVE-2023-35660,0,0,486a712e4d0f56647a1f8028aec97638904ee0fb3391eb5df721854ed5551546,2023-10-18T01:42:58.543000 CVE-2023-35661,0,0,92d005e666e4198e224998a5911b6ec28079a5f8101e9661c640419fbd2863da,2023-10-18T01:45:44.173000 @@ -227035,7 +227035,7 @@ CVE-2023-35681,0,0,2603f8896e8c125b6797dbd02195d63673d6f51724707bcecf3de29ee5bd3 CVE-2023-35682,0,0,8e5be0df20127646df0c428d0877b5f6025db53a632750e4d83bce87d34712e9,2023-09-13T14:39:22.120000 CVE-2023-35683,0,0,5a67cee00f3de3a526dd990d465ec70cca53419801a3d26ae9d8d814db70f2e8,2023-09-14T02:00:12.517000 CVE-2023-35684,0,0,09ccb465b40d0eb68fba17fcdf270a630f7753abe8e6c5c89ccedcd22bd9e51b,2023-09-14T02:02:15.467000 -CVE-2023-35686,0,0,d8f114f114b5a67343bd2e0d84b57d1a7167919dc682667d5ce83e513c972a16,2024-11-13T18:15:19.860000 +CVE-2023-35686,0,1,5a90ad46939bae57191718f65dfefacd86c4e383dbfef7a1f6b2818ac9179cb5,2024-11-15T14:00:09.720000 CVE-2023-35687,0,0,c28e4b6a4d942f40e08b784a20dfc07c8f0fcc8f7236ef7809c0123c392aa182,2023-09-14T02:03:49.147000 CVE-2023-35689,0,0,c77c9e7a23c05ba829d34db48953b7d9e346df1f83dfb61e4b82c0b286c3749f,2023-08-22T01:10:41.940000 CVE-2023-3569,0,0,5a78514f93a9c1a429d4db50f2959ea2876b105709fb83ffa2f2296def39f506,2023-08-14T19:15:13.793000 @@ -229657,7 +229657,7 @@ CVE-2023-38914,0,0,dfac752e4e293650625d5006e8c3410a0610877f7957a0323579b7c2d7edb CVE-2023-38915,0,0,e0a8ff70cd4417c510aef91dd0f6972af0ed915761de08e703e665c6b2313fe3,2023-08-22T15:16:26.497000 CVE-2023-38916,0,0,23fb3b5127391e950f7519403846a77510acbba7dbb851cde681d44af2040efa,2023-08-22T15:27:37.117000 CVE-2023-3892,0,0,c9f6a4d1b687347c3ba3c3230cdfc19fa2bf394a3eddbfeeec6c72ca32b3d97c,2023-09-22T19:23:28.753000 -CVE-2023-38920,0,0,7c54fcd33156f8eb6ff31c0235366533643abc0d8a43d9339f6236b561afd209,2024-11-13T20:15:16.840000 +CVE-2023-38920,0,1,9e6a8719f6c7d42d5dcd9efb4bc604b738f26314c3edaa85ac9eb22e5038f0ba,2024-11-15T14:00:09.720000 CVE-2023-38921,0,0,bebe4da2ac8c19aa3117b71df5df81a2a540954d5cd32c199b250d414df16abf,2023-08-09T18:03:20.593000 CVE-2023-38922,0,0,c13408e1267ba337650adb18b7ea02ab8164cc19f684df35716dcd3649677074,2023-08-09T18:03:54.593000 CVE-2023-38924,0,0,407f514ef1d1e932061b14361799c979737b4dfe271bb68e226240b4e084d2e1,2023-08-09T18:04:06.470000 @@ -231600,7 +231600,7 @@ CVE-2023-41336,0,0,b635acad925f51897708f1c284f31b52e812f930d0f8a69e729a597a376bd CVE-2023-41337,0,0,15e5e52f40f65a0229a0cdd3d18e84b3f05954948f9735ee45da4880e8cdce6b,2023-12-19T19:10:12.043000 CVE-2023-41338,0,0,4ff13041d1d920a3e7cf920d32fc2747c67006ee742953739c10eeb93bb4c4dc,2023-09-12T19:12:29.057000 CVE-2023-41339,0,0,d5e9f04e6c95a3d0eb6da07191e971e3e5f23fc0a4622beb8f9610cba2e4c6d5,2023-10-31T19:53:57.670000 -CVE-2023-4134,0,0,ce3f34903bbe3a1b32f01cc07034b778a77263d9eb3b998ba638b6d0499828bf,2024-11-14T11:15:03.730000 +CVE-2023-4134,0,1,0ad2c336b62ea0bc752bd81f24bb5dc8384946dfb3f97322284868077cf0a28c,2024-11-15T13:58:08.913000 CVE-2023-41343,0,0,d014d94f0c954572fa228d52527071fd46ed723d95e2596289d617e9451c129a,2023-11-09T21:59:36.353000 CVE-2023-41344,0,0,fd945b61a59b0f15cf1f2c1695c5c3de41b28d458dedce455cfee4907f8e8504,2023-11-13T19:54:38.750000 CVE-2023-41345,0,0,ee8a523a2662b0bb570a5de5622ce7c196dfd6d4b60b13c44584d06fa25b5a77,2023-11-13T16:59:55.303000 @@ -233007,7 +233007,7 @@ CVE-2023-43470,0,0,17d35487c84783e73551dd1e340a28fdad09c072567b02a75a72d522739fd CVE-2023-43472,0,0,a3008b309ff857d10385bb0be4ee0eb4e9b0900adc392c74326123abc8303cf0,2023-12-11T15:32:59.420000 CVE-2023-43477,0,0,0c74ac00cc1ee8f6c145de162b98bc7d8776c1dc19ab5c8a19701bfb74cb49ca,2023-09-22T18:37:02.227000 CVE-2023-43478,0,0,c43004e7643e046e5e2c9d48aa06e90357a6d95e192814361f05a486c7b542a0,2023-09-22T18:36:45.253000 -CVE-2023-4348,1,1,692cebc2724d39ef48703dff7796d1af38e61707ca753f487575c32468089efd,2024-11-15T12:15:14.397000 +CVE-2023-4348,0,0,692cebc2724d39ef48703dff7796d1af38e61707ca753f487575c32468089efd,2024-11-15T12:15:14.397000 CVE-2023-43481,0,0,faa16b4f46dcdc0114be0dc9597ba626c5e87f23f98df512a29c2b5826b54935,2024-08-27T19:35:07.137000 CVE-2023-43482,0,0,8fdc0252f8a99d357c7a9ff8cfbddf8addb596669b2c0bcea99d45decc176060,2024-02-09T02:11:03.607000 CVE-2023-43484,0,0,b8e1fcf13fb67bd37267e8c1ecc07c5eb977d2a46ec3271926523495750a7a82,2023-09-27T20:25:34.200000 @@ -233854,7 +233854,7 @@ CVE-2023-4454,0,0,fb429f754193553b6975a0d32c55113a293441b320ca968748467aa80d3d24 CVE-2023-4455,0,0,20e2a71b7fd8a18a1114b92d93267c5ab15590b2a47c5b1f075ea92a982f3a49,2023-08-24T21:11:31.950000 CVE-2023-4456,0,0,369c0fad995b8264d64349ce435b2c1dc3089365795bdcd3741dfadaea65acc6,2023-11-07T04:22:38.447000 CVE-2023-4457,0,0,ee0b8eadfc3272ee478862dc9e8584d1b618758034c6a68efc19123317a2c60b,2023-10-20T15:17:32.870000 -CVE-2023-4458,0,0,5c42a68b97724184291e899bb0d3a84117fb9f7533fba14f383a6e0777f4c2d6,2024-11-14T12:15:17.487000 +CVE-2023-4458,0,1,bfdb25cb1bb4e2ab2a7551e6415bd755590021839b15f79064367249f86c4202,2024-11-15T13:58:08.913000 CVE-2023-4459,0,0,ded88117b55c4284762f2f8393f20b576cf09dfb8895bd1c0d3f42fcb1ae428a,2024-04-25T14:15:09.507000 CVE-2023-4460,0,0,5fb802ae85625b42d8217a009e041c135e908761081f43a6b546052a002e9402,2024-10-01T16:35:12.403000 CVE-2023-4462,0,0,6ee35d095410fea9ab00663779e595263154c8235788b3e851e641d73c81658c,2024-05-17T02:31:35.497000 @@ -235324,7 +235324,7 @@ CVE-2023-46786,0,0,bf4916e892e13d9bd5f18249e97f7ed4aeb5247f2854f8c308efd96466799 CVE-2023-46787,0,0,eee6ea113b686659f2a66a8e2e38db99b180a9cdd992ed45b258359c2fbbafb0,2023-11-13T18:00:08.857000 CVE-2023-46788,0,0,fa89ddc1e582ea32e59694cd588090422058d73f3e55d49cdf4218b1d27bcb24,2023-11-13T18:00:01.510000 CVE-2023-46789,0,0,9fbdb411cccdb011e81628500fbc3b74a0a6d06d2a8237255e6accafa55442cd,2023-11-13T17:59:42.877000 -CVE-2023-4679,1,1,ebeb28b6071331717aa72697b138213a7ff55d425dea68ac1d3f48a6bf8a600f,2024-11-15T11:15:08.917000 +CVE-2023-4679,0,1,bd41f16aa163eb389f55143467cd4dd83f1cf653b0a52e5edf88d1f45ea711d7,2024-11-15T13:58:08.913000 CVE-2023-46790,0,0,7414a678623b3a8d31eda7749ee35a2bdf61169d6ade6fd91b06a5a0e4bffda9,2024-01-02T22:15:08.290000 CVE-2023-46791,0,0,4f7a7ce04b20ee1c59664fc3196bc82b7bf68c16659759baf914252cd593ed28,2024-01-02T22:15:08.367000 CVE-2023-46792,0,0,7e34df21be011e0e859102a1381c46b673dbda14e06d4aaaab00023b1fb66f87,2024-01-02T22:15:08.440000 @@ -242241,7 +242241,7 @@ CVE-2024-0782,0,0,dd227a8b469ce6630eb22142a87d0da772ecdb0285534b1bcdde3ca20e489d CVE-2024-0783,0,0,889b3aec94f8730e9264c4087d63efb1328316b4df2b41f572aa9ab243eedd51,2024-05-17T02:34:58.020000 CVE-2024-0784,0,0,05fccc58af077ffcd0eb7b186f39f412c8126936ae9b879608bee8086b2c9a33,2024-05-17T02:34:58.123000 CVE-2024-0786,0,0,09a89f715683ba83fe81b0a3f3fbdcf9cf5cb4fbf3001ded7457bfdf3b510a57,2024-02-28T14:06:45.783000 -CVE-2024-0787,1,1,26407bee5ab2fbf8a9ba0619061ab93718841bd094af01c5b9c7138a4aecc492,2024-11-15T11:15:09.213000 +CVE-2024-0787,0,1,4ded82f0e9865a8d4b6032375e3f9c6131e1d0daf9c4adfd7fb6e243f6c64c6d,2024-11-15T13:58:08.913000 CVE-2024-0788,0,0,77f61568ad57c437194aa13eed7b7f4a244f0c473b6deae4d7ecf1e9a4375c8f,2024-09-05T23:15:11.527000 CVE-2024-0789,0,0,dd4dfae2cf9c1e14c885c435e4946684b1e28fce4e56958a0b475f730b1ce5ce,2024-06-20T12:44:01.637000 CVE-2024-0790,0,0,faf5037c158d063c7d3783eeaaf8baa8e520d90b8a2f56f0b34167c00c86529b,2024-02-13T19:42:38.757000 @@ -242323,7 +242323,7 @@ CVE-2024-0871,0,0,2a81c9221f676df23b70ee25b96f92b79bd7fe2d47d83d3cf9575aeab8537e CVE-2024-0872,0,0,59570f703919134c83976c0a589bd002a09343b74061ad8cfeb778f494366fb8,2024-04-10T13:24:00.070000 CVE-2024-0873,0,0,0d017532f0822fb01a43bd5a5b6fb8ed2d6c3075b76ac0b6436fcb6d890c9423,2024-04-10T13:24:00.070000 CVE-2024-0874,0,0,e6fb28781735bc896300880a10982c06b4a0d863ac3f7c9c0e53997a057bc6f4,2024-09-11T22:15:01.933000 -CVE-2024-0875,1,1,adcea9cd3522b697e8642f0a8bcf59306b7f88e100065d52e51cfdd8f2125c56,2024-11-15T11:15:09.490000 +CVE-2024-0875,0,1,89dfb36d50ba6403be06cc49835d930d762a751ae158b09b4e6180de2dcd0e29,2024-11-15T13:58:08.913000 CVE-2024-0879,0,0,40ca4d922e04a74721c93cda9d6ef307a09b39f845db5f9dd6db6b694e034cf2,2024-01-31T19:16:07.630000 CVE-2024-0880,0,0,44431bf4f01e73978bc2a282db63f61857269e71b91d3e3d902140e76c6dd1ce,2024-05-17T02:35:00.317000 CVE-2024-0881,0,0,1252bf71170a54b7a474d354bacf2afe464c57991281e1919b7ffd68baf1e1ed,2024-10-31T15:35:20.223000 @@ -242502,11 +242502,11 @@ CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615a CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000 CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000 CVE-2024-10101,0,0,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4a4a,2024-11-04T19:15:05.527000 -CVE-2024-10104,0,0,c97f19eaf00df3c99ff94596b84e8a46da9f6e8d6dcd1a384f83ea84f7168f15,2024-11-15T07:15:17.063000 +CVE-2024-10104,0,1,32132c8cff39375b51f3675eac359dd441ca99a65adfb217bad642370ce25de2,2024-11-15T13:58:08.913000 CVE-2024-10108,0,0,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000 CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000 CVE-2024-10112,0,0,3a01d2baa33f19e143abe5aabe181ccab32faac99effca8d7325142fe7220a64,2024-10-25T12:56:07.750000 -CVE-2024-10113,0,0,f52d3353e7ab10b452d04f2fa10a24dc9a7b747fe8bafbbd7a0c7754ab1903d4,2024-11-15T06:15:03.340000 +CVE-2024-10113,0,1,30c83db4887ee366b46da24a82d7384a70c079ddd30bc3f9c149617d502bafbe,2024-11-15T13:58:08.913000 CVE-2024-10114,0,0,16b8947ff2e570aff6db4fc1326409cd8691db8a310b773c04315751bc454909,2024-11-07T17:04:09.203000 CVE-2024-10115,0,0,2f48f8fc2fb64e7eea0f8a197e6ea039f4addb791184326175f5bf3196ca43c6,2024-10-18T19:15:13.600000 CVE-2024-10117,0,0,7266808fb250241ee6ed4b7bcd7ffe295a81bef2421c05c5f9197e6a33b75e8d,2024-10-28T13:58:09.230000 @@ -242534,7 +242534,7 @@ CVE-2024-1014,0,0,8e546db835ee0e62e0f6ed5b95e90d5586231fc78746cbbfef7db3d61b3c5f CVE-2024-10140,0,0,ec9d51c2fc14eea2e4cdb7aa8f8bd180db2ec005ceca8608d4d081404a2e210c,2024-10-22T14:19:08.420000 CVE-2024-10141,0,0,1a2024f75553982bce647b93dbf2bff672eefec5950fa457467c64b98f6e45c7,2024-10-23T20:27:09.370000 CVE-2024-10142,0,0,f8d897c68f0699e753bf4964aa75eec3baa1d06414695c8d5256c262c45a3b84,2024-10-22T18:11:20.450000 -CVE-2024-10146,0,0,a6ea98fb4b84357fa99272a99b0f27b60fff4866bf525eca471cf9c7afe292b6,2024-11-14T19:35:05.160000 +CVE-2024-10146,0,1,a05479823dc9b244c9d3c6072656889f63716e15bd862616259d6ac79eca877a,2024-11-15T13:58:08.913000 CVE-2024-10148,0,0,83c51017fcaad8303b49e241d62740cf9ee14ff3b98ac6e60e27203bec158551,2024-11-06T16:02:22.120000 CVE-2024-1015,0,0,5516b1d1af5a9d3814b8a6e102d3692fcdb9c463b2e2645787afdcb157946f20,2024-02-02T02:04:13.267000 CVE-2024-10150,0,0,980e5c556ba92cfe6f78a7c5edf14225adf63d1f935caa703239c8f6c3933115,2024-11-05T17:47:35.353000 @@ -242607,7 +242607,7 @@ CVE-2024-10241,0,0,ae512d639185a0ae3de570db96ee11e8b4269e6da724c94a52e42eddaeb0b CVE-2024-10245,0,0,a0531404f8e42b22ebf8edf706088f8f3bbff70573c99f5feaf6c300487731f6,2024-11-12T13:55:21.227000 CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 -CVE-2024-10260,0,0,24a115b49882fd434583811f09a72f33468724f2639e8fb47c90cc1f32a9eee1,2024-11-15T06:15:03.753000 +CVE-2024-10260,0,1,244e865d9a1607c34ef78b8cc10fe9d865d0e00b89c6d7074ea26acb40607ce7,2024-11-15T13:58:08.913000 CVE-2024-10261,0,0,c0bacd51f8c13c6f93273b74702fb7ce7659bc324c7b90c6cfb500b131b8dd02,2024-11-12T13:56:24.513000 CVE-2024-10263,0,0,d8274159492686a2b3c754959bfc4509f9c9201a502006a3dee5515647626798,2024-11-08T15:59:41.633000 CVE-2024-10265,0,0,f3110d4f544093035d0a9b2f7bbeb2aefd9a822ae90a8974b8e692b012c9f1eb,2024-11-14T15:17:47.947000 @@ -242645,7 +242645,7 @@ CVE-2024-10300,0,0,ca0242a4c58ba5eb41987558653c1fad0eefdb856c34de56d3278680f413c CVE-2024-10301,0,0,43e47cf56bc671ed7b90e0f04f420138e8362a6d949261d9acbcdf888c921aa2,2024-10-25T18:47:54.033000 CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000 CVE-2024-10310,0,0,3b0decb54117e1f6369f0c8a49822eb1c6d4be5cb40b8b5a9079fd842cd0c653,2024-11-04T13:06:20.190000 -CVE-2024-10311,0,0,ff823e385531d022dff247aff5d10a6d888caf3f614cd8f33de094ad8e6d1020,2024-11-15T10:15:03.980000 +CVE-2024-10311,0,1,901db5d8eca542c05b4cebf2535d0c0c4daf89cc065922cbfb213e4c9f7b35f4,2024-11-15T13:58:08.913000 CVE-2024-10312,0,0,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000 CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000 CVE-2024-10314,0,0,4ff424a08f54d46f95f43c7d51534e0e6342cc7a5b817ec1e4e580680bb1c702,2024-11-12T13:55:21.227000 @@ -242703,9 +242703,9 @@ CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332 CVE-2024-10389,0,0,5c3e383a622dd2c962c1328ad97e7119997516337f3c204f5e02dea9bf077b56,2024-11-04T18:50:05.607000 CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000 CVE-2024-10392,0,0,6e1e37299a52c0d29351f7b918b5ce63e7a851a7204714ad635a0d36b7f4f628,2024-11-01T12:57:03.417000 -CVE-2024-10394,0,0,4cdc66d522045d131b62bdfb9e89fa2c725ded5ae77d9c9a336284d0b06165be,2024-11-14T20:15:20.777000 -CVE-2024-10396,0,0,c092919609de9bd4dd7de7dc30b35cfdf8abab6f06aaf1fb65271dd7702e20cf,2024-11-14T20:15:20.917000 -CVE-2024-10397,0,0,4228f9e0bc2b26997ae55684f775720995f3ce71af3c6095d90bd9baad018ccd,2024-11-14T20:15:21.057000 +CVE-2024-10394,0,1,4035dfc5a5bcf296734e398f64f1bd6d0cad9615950c5c863b2c2a3b361b6828,2024-11-15T13:58:08.913000 +CVE-2024-10396,0,1,eea82678934a4b6027473b74cdd3b7d449ff1d094dd2f74343b30dcc0b4b3531,2024-11-15T13:58:08.913000 +CVE-2024-10397,0,1,641d68ac85205cf509805150d7c0a339ca6da65bef2e6ec008aeac4464cea320,2024-11-15T13:58:08.913000 CVE-2024-10399,0,0,3874273dcd61d00780364abd4b80bff26291db4f2fcc766c950b26117fafe39a,2024-11-01T12:57:03.417000 CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000 CVE-2024-10402,0,0,2443718b847d5ad0a7e8e6883b9aca46725ab83d65a53ced89e927dfa1ec15f4,2024-10-28T13:58:09.230000 @@ -242748,7 +242748,7 @@ CVE-2024-10438,0,0,927b1217e569151a95177fd0867aa44fd49cf458bed4e6241532df7fa8516 CVE-2024-10439,0,0,3741efcec87ce897773441ba8b13058a649924c1100d6b93c1ffe7465b37c5dc,2024-10-31T00:35:36.173000 CVE-2024-1044,0,0,aabb10708db1db153d691de2620429bf76b48269bc86aae28cbf6b6a3c047729,2024-02-29T13:49:29.390000 CVE-2024-10440,0,0,9134bb1aaa59624e138e5f8b3325f09bddc2e56431561ccb4c3e021d68fff1ce,2024-10-31T00:34:23.870000 -CVE-2024-10443,1,1,3db059ce2ddf1ab354d8151c79beb5096218bb11f128a02f7693510ac3551dc1,2024-11-15T11:15:09.750000 +CVE-2024-10443,0,1,eb0cb1704ab48423bc57dbf5a4c19f84812c5ab8225bd00df260ebc4e3da02f0,2024-11-15T13:58:08.913000 CVE-2024-10446,0,0,deea975d5a7cce536c2612b9366552ab52fe1c83fa7bd626ef5b6cf23fd62b64,2024-11-01T16:39:25.890000 CVE-2024-10447,0,0,20a77c16977cd86421b31dc7f8e87f37efdc79e51d4f78a901539c52dec6ae6c,2024-10-31T01:23:46.300000 CVE-2024-10448,0,0,321c290fa10bd947d8b384a53dafbe5d4ff4b7a0a6522b833253529007c67a27,2024-11-01T18:26:55.980000 @@ -242801,7 +242801,7 @@ CVE-2024-10529,0,0,0345fe1a98579e0c46e6718b2719e0f35e2b675397c4baba2f79359ae71dc CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000 CVE-2024-10530,0,0,44b1f61a9c6f6aa30b3b0d0f98cecd2a1b5d01908b2709a3a311951be1b1552b,2024-11-13T17:01:16.850000 CVE-2024-10531,0,0,5f58651087e63c6b2a12c6f7bdf9268a38a5c1f35ee89b5b7476b1d8409f73e4,2024-11-13T17:01:16.850000 -CVE-2024-10534,1,1,fc58dfc669da9dbee073b4d32e6c9b5fa8546baa71f180d39f6cbb6e76ee5a3f,2024-11-15T11:15:10.100000 +CVE-2024-10534,0,1,79dcab6d073e2cfc299d2109f99835aa00ff704c80b4e6050641c4dc3c96d863,2024-11-15T13:58:08.913000 CVE-2024-10535,0,0,14a566633b856f0bcfd07185d246772590c919ba8cb5a244786d38adaffa8830,2024-11-08T21:19:27.540000 CVE-2024-10538,0,0,4258e87072a64a27fee35a0841a3c5095b5fad35eea820564ce6eaffa01f0137,2024-11-14T13:27:00.400000 CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000 @@ -242817,12 +242817,12 @@ CVE-2024-10559,0,0,f02de87419b06f79046e87a4e20909e93937f86137fa0aad3ef812234236a CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000 CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000 CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000 -CVE-2024-10571,0,0,c0573ee024b89e8cb2673955332f8d3c3706906f08577458df0aac62f4e60965,2024-11-14T11:15:04.630000 +CVE-2024-10571,0,1,c9e5eda37da45c0ee9ea2673e5008fbb192402a38328c880611324ce53244500,2024-11-15T13:58:08.913000 CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000 CVE-2024-10575,0,0,d60bf0a0bfff7c064a609e35a84fef721491108a3e1293beb652d4120d21f4e8,2024-11-13T17:01:16.850000 CVE-2024-10577,0,0,a22bb88e9d80100e8493f63e77c4cd5ab2a37147944c69ab526442c593c29d99,2024-11-13T17:01:16.850000 CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000 -CVE-2024-10582,0,0,91fe64f21f22607f8d2da01a1eb37d03b1cc1dcaaaba3974dce261cded184457,2024-11-15T06:15:04.077000 +CVE-2024-10582,0,1,6555712a7d6f47e2377fc1b0be3d50cc3c6e0937266d088860909050ec988f03,2024-11-15T13:58:08.913000 CVE-2024-10586,0,0,f1f769b86eb6d000daef591c5f367193d87a3d50622221457cbf9ad14bf94bab,2024-11-12T13:56:54.483000 CVE-2024-10588,0,0,c2bcaed6fe7b435f43e9c22f77453914df70e3466f4c66fa7dbe7829c2fb6e04,2024-11-12T13:56:24.513000 CVE-2024-10589,0,0,a6d8f39b47e9cb3150ad138c8d50791b37f1119d54a24371f819b9a1d868ac19,2024-11-12T13:56:24.513000 @@ -242956,7 +242956,7 @@ CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db5656 CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000 CVE-2024-10790,0,0,c5195852541315ac22dd1b614848e72547c3a099e7858697bb9ee4c86225d43f,2024-11-12T13:55:21.227000 CVE-2024-10791,0,0,a1ab37f8c195110cb663fc7e474028527dca661a169201c0160b30306fac4c75,2024-11-06T15:05:38.240000 -CVE-2024-10793,0,0,f137695f4beb8622e71fec8b8a2729c52d34d425fc811fecf87748e7f897f7d1,2024-11-15T06:15:04.370000 +CVE-2024-10793,0,1,849ac0ebf38dc14a8de5efdfa21bed57d99ba8cf0f5c0cd846b144396d51ad4c,2024-11-15T13:58:08.913000 CVE-2024-10794,0,0,990e73a12d2666bd3fad2efb1281964d2189bbaa2e95112b72149dc1a8399a47,2024-11-13T17:01:16.850000 CVE-2024-1080,0,0,9acdbacec5fb31283e62a6d3f1b1bde4de3af0ce021840a5a12a8cd06719b667,2024-03-13T18:16:18.563000 CVE-2024-10800,0,0,fb8e6ea9cb7f5838daa314a39d21e1e54fbb9eab7af4f73cc8a245f78af7556e,2024-11-13T17:01:16.850000 @@ -242974,7 +242974,7 @@ CVE-2024-10816,0,0,e858f5d61a9a9365d35b4f1632e08232437088d807fd2da2fd482099073bf CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000 CVE-2024-10820,0,0,53fb78c5ab1cb50fbe971478c44681256823c1d2118b9f5fa84f30fb209fb38c,2024-11-13T17:01:16.850000 CVE-2024-10824,0,0,6eb650dcc5948040831c411456d27fae52cd783d32ad30faaf04938565b810b8,2024-11-08T19:01:03.880000 -CVE-2024-10825,0,0,03b9274c1d272f478175d5325ea2089b55ebb60dbe5177acb7e6bb15edb175a7,2024-11-15T07:15:17.237000 +CVE-2024-10825,0,1,625ed9c1c1d0e6bd7023320806103f19751c752d2e5e0c1168f546a2155686c2,2024-11-15T13:58:08.913000 CVE-2024-10826,0,0,6aa37fdb16b5853a7b5472e25a8ac0220ff66e617581e203df39439d12ed70ca,2024-11-06T18:17:17.287000 CVE-2024-10827,0,0,6577ad366fcac00efbf959f7905ba60a1d9c696b896b68d8b10d38d71dfd5e3b,2024-11-06T18:17:17.287000 CVE-2024-10828,0,0,6d13ed488cefed03e92f75350a2f29132e810389942ee7924deafa370427db35,2024-11-13T17:01:16.850000 @@ -243002,7 +243002,7 @@ CVE-2024-1088,0,0,7487e11aa2518f6cc93d89dd95a39f5c8d6e4a1b2567cf073eed09f7df7825 CVE-2024-10882,0,0,d50cca8abf620c67a958717eb4d933afb7abd51207b4b48e13771e9f1de70410,2024-11-13T17:01:16.850000 CVE-2024-10887,0,0,6f1c620112f0531885feb58bf605da1bdf3e2be3ee69e7f92d5d01d446076f44,2024-11-13T17:01:16.850000 CVE-2024-1089,0,0,9442709e929187c1b992d082c3eaeec9226480f80fc28198e3a73f4a684640d5,2024-02-29T13:49:29.390000 -CVE-2024-10897,0,0,fffb1c2e69b9be300e7ab43a95519234179e8ae190ec7c981ec28d965f85e802,2024-11-15T05:15:05.177000 +CVE-2024-10897,0,1,a06583b49e979e6c2e08d66a731da16126991a206b79119172b9152aecec155d,2024-11-15T13:58:08.913000 CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000 CVE-2024-1091,0,0,54ee7e9ca708166212a73aaa10e4715176fe17b55fbce1ee0ea8f95d289d46a5,2024-02-29T13:49:29.390000 CVE-2024-10914,0,0,a19349a4797c04ddb77f70975a0145b559e2c17ff8d6db53557df6669e0449a1,2024-11-08T19:53:04.793000 @@ -243012,10 +243012,10 @@ CVE-2024-10917,0,0,1eea699579f5dcb0f1ea716ba091b6b657cbea6b54620c9aa27bd72862f79 CVE-2024-10919,0,0,e8fbb923eb829e965254205b876d7ef672d5aac59877ea419609aa8d8f6bb3e9,2024-11-08T21:07:58.383000 CVE-2024-1092,0,0,4e514cbeb8cbdb0016fe4cb374f3dffe448e95b35a82b13ed7cb7be1b7fe61c2,2024-02-13T19:43:06.247000 CVE-2024-10920,0,0,2cf9a2b6fa319444c301d4d5e50d2260546d202b9ce9ceed0622f3257443827f,2024-11-06T18:17:17.287000 -CVE-2024-10921,0,0,df49167eb143ff2e23f3731e4ab5404d7de812e4b3599b4fe801797e2459e70e,2024-11-14T16:15:18.030000 +CVE-2024-10921,0,1,e4551a7fb6e9a47101373d83ae7e9c0677be8ee1bd96c33a43c9b04fcf7dfcf8,2024-11-15T13:58:08.913000 CVE-2024-10922,0,0,2e8ad1bbe2c22b2f860e82caba9eca723e865a4e9bffae87682e3cfa53e59e0d,2024-11-08T19:01:25.633000 CVE-2024-10923,0,0,a52ee7279b45f6cbb4af1bcb280dc131fb026565d6c8cec2e60c88cc2adb08c1,2024-11-13T21:35:04.867000 -CVE-2024-10924,0,0,1bc7e84d5ffeb886c00d205d3444fdaee12f3cadcb01a2551220ee89af166a67,2024-11-15T04:15:03.613000 +CVE-2024-10924,0,1,81893a916d56c17bfaebe03737efc603a4394519bc7d6f05195e83e8e85b1166,2024-11-15T13:58:08.913000 CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976123,2024-11-08T19:01:25.633000 CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000 CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000 @@ -243031,7 +243031,7 @@ CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7d CVE-2024-10953,0,0,496fd56d3a163ffff52ed6786827de0c1da0afb8656a03af3cf0cf6c1de87d4a,2024-11-12T13:56:54.483000 CVE-2024-10958,0,0,5ab671d0f18f16536cdc1e49a5ce9e7bd51980aaa21f74ae418c3b86ac578dbd,2024-11-14T14:57:23.103000 CVE-2024-1096,0,0,9e6ec92aa91c226f1dce82b660bd82ecda12366a7db0465d5ab79a9947cb0a51,2024-03-21T02:51:34.720000 -CVE-2024-10962,0,0,fc2a3059aeabbd9a555b1076cda4c781298ae5670da3d265d60588b3053f7375,2024-11-14T14:15:17.533000 +CVE-2024-10962,0,1,cc07a6052d335762b681821acc9ab9361629b4ad0b389a0c9ce7ad2399cf435f,2024-11-15T13:58:08.913000 CVE-2024-10963,0,0,eee86a3aedc7174854dc69b5daad7ddd56acd624730edee3419c240e1ae079c9,2024-11-11T18:15:14.487000 CVE-2024-10964,0,0,59c42738567fc9804ec2d61407344d8d58a5472c34e273ef586a2c76a2aefe85,2024-11-08T19:01:03.880000 CVE-2024-10965,0,0,c66f8f41a86b61772baa3fe053f73c721fa7e86ea505631bf695cb762fd01af0,2024-11-08T19:01:03.880000 @@ -243039,13 +243039,13 @@ CVE-2024-10966,0,0,3df47cfeba07424dbca1650d45cf844f6cc1bcda5f1462544d39e404a912c CVE-2024-10967,0,0,045953be48e7bafc650cdaba1889b3cce653fc03383c0343e3292851109279a3,2024-11-08T19:01:03.880000 CVE-2024-10968,0,0,f600c79ff6183eb1b51f4003b01ba4a417fb853b88c9cd1f3e9f06879ffd32fe,2024-11-08T19:01:03.880000 CVE-2024-10969,0,0,34fb384baf8f9b6070297fa30997eac3a4fc91278070bd97f872695ea721a856,2024-11-08T19:01:03.880000 -CVE-2024-1097,1,1,316dcfa7f0cf7c7a0bf995ac2dfc528b8acfcdbcea4a052de4f42883255d518e,2024-11-15T11:15:10.550000 +CVE-2024-1097,0,1,8d4cc6316d3932e8571fa0fccc6762506fe97338769cb542b0abb6a5d89fb544,2024-11-15T13:58:08.913000 CVE-2024-10971,0,0,48718e7d6163afe0c28e377c2f658daad2fd70d420b988ed3e01fe2fd9d4a70c,2024-11-13T17:01:58.603000 CVE-2024-10975,0,0,f38693c9a402e208f0de21f91edcefa5c1f789073d3e380787ea5dd138f197fa,2024-11-08T19:01:03.880000 -CVE-2024-10976,0,0,3b148dc4518f7a8e1d6912ce588f9c1895060c7a721621b8fea7a6516e1bc558,2024-11-14T13:15:03.793000 -CVE-2024-10977,0,0,aa3e2e2e2e4638ee56b2d080cc6b88579b65dfa2345af8d2842cfc41a4d760cd,2024-11-14T13:15:04.023000 -CVE-2024-10978,0,0,4a5735a7a7e276ef0f613173360c8e5c241c0de7a97379a047204a5b4bc4f7a9,2024-11-14T13:15:04.217000 -CVE-2024-10979,0,0,e13cabad152efceb8a731ed12a662bfdee80230a27e83e5a0270b5fc18b72f97,2024-11-14T13:15:04.407000 +CVE-2024-10976,0,1,8bb93de8d5444bc1f7d7cfe21c652c167b6aaede15e99982f1b13d49d0b9457b,2024-11-15T13:58:08.913000 +CVE-2024-10977,0,1,29b2ddc2319ae0c0d223db4a89d3fc8449062a0e9ea3025a5b9e5c6a1b746feb,2024-11-15T13:58:08.913000 +CVE-2024-10978,0,1,3ebab35a4eede26cd6c86db97fd53ab90e5957182d37b6e0abcc8e9197e65113,2024-11-15T13:58:08.913000 +CVE-2024-10979,0,1,3a334af0d54c8ec80e9b8cb03e116d52b074032ecbaafbd647e9ef1aae7be8d2,2024-11-15T13:58:08.913000 CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000 CVE-2024-10987,0,0,3d92aa33c7cd82b5da2d8627d31a00cc6f3627f00f3b6f252e968a08d3bf860d,2024-11-13T00:58:55.400000 CVE-2024-10988,0,0,6d214b682ab0622d06c1c4f694c05924f3acdece53f5429fbbce41d026ca23b5,2024-11-13T00:59:17.867000 @@ -243126,7 +243126,7 @@ CVE-2024-11115,0,0,6752a3f15fe7742272035ac5069774108f37f03dae8259d5e310243c06e07 CVE-2024-11116,0,0,50b6a7b0baae7d93d967770820ad4acb1265e0c8d7e355f7414e720fb7141658,2024-11-13T17:01:16.850000 CVE-2024-11117,0,0,44ab0c5f984ce9aed4e52f00adac2e7b146a348c1dbadd3cdaa1ba5594ee10da,2024-11-13T17:01:16.850000 CVE-2024-1112,0,0,a074043c8f95f29514c3f59ea2279c09f17d99731ab21d34b196cbe82c1cf23d,2024-02-09T14:34:41.827000 -CVE-2024-11120,0,0,419abe138b2f7cd49e5a7bf2988b4cdc20f78889f5b3881f13b8849759bcb762,2024-11-15T02:15:17.757000 +CVE-2024-11120,0,1,368b83ae5902e34b0c550f99a9e3cbb6abf3210b2f6a699d61899ee63a5aa2ff,2024-11-15T13:58:08.913000 CVE-2024-11121,0,0,78c7f01d1528f5af7c7c0921f9908f534edd8a79fcf13b8e8ba56ec04209ef7f,2024-11-12T16:15:20.770000 CVE-2024-11122,0,0,8b39eb171f905156949631c8c8e8a5af8e744e4719ba7b47f1a185280518c4e7,2024-11-12T16:15:20.873000 CVE-2024-11123,0,0,2c2c3a47aaef9d48349e1017759c96035abab5e51ba4d62444aa173a7ccd2b65,2024-11-12T16:15:20.990000 @@ -243136,7 +243136,7 @@ CVE-2024-11126,0,0,b967d4c9797ae557d5008a2e89e34b56b8ab089540ce69fba53b421e80e1e CVE-2024-11127,0,0,872c91b8fef54d334e58f460ad31540519bfcc5b745ac9da794cfe9b05f34fe8,2024-11-12T15:48:59.103000 CVE-2024-1113,0,0,6955c6c679809523d129efea09ef779c898e264f7e3230a68d2b1fd615c8f410,2024-05-17T02:35:14.663000 CVE-2024-11130,0,0,578a772ca1269be9bdc99bb966d7eb9c39dbd0e02e5dba4d3229d53dfaceb8e4,2024-11-12T15:48:59.103000 -CVE-2024-11136,0,0,2dcc5ef5645ba41b5a60914f16da3e4a37e52f37d02632d7ed31a864697aa09f,2024-11-14T16:15:18.273000 +CVE-2024-11136,0,1,24240577f7b850705f8148f1e2257c636c3b9dc696f019566c5d55e0511cc8a2,2024-11-15T13:58:08.913000 CVE-2024-11138,0,0,7b0edb369e2d9df427aea00759a3991acb4ee32080a1e83cba9502f5a7a362f2,2024-11-13T17:01:58.603000 CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000 CVE-2024-11143,0,0,7f1fadde01fb3ddd4517afb19a16094808880468a8f2dcb40cb3d8e84d34f2d7,2024-11-13T17:01:16.850000 @@ -243149,25 +243149,28 @@ CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace CVE-2024-1117,0,0,0eff4d8f06fdd3645727772834638be79e19128758cbe94b2a8e7a297167b8d0,2024-05-17T02:35:15.090000 CVE-2024-11175,0,0,2129c1cdddb364757f82b16fba301982b34bdf0dfeb6c2bb6f48aa85e142eee1,2024-11-13T17:01:16.850000 CVE-2024-1118,0,0,6c399aaded9e96cfac900ecbd30e202d5a6a42d5625667c3de9725b65dc62fc3,2024-02-10T04:13:01.030000 -CVE-2024-11182,1,1,4bb7044c32e7d203f4621472bcf4c9354b62a723acec245f304b3cf0eb5267e6,2024-11-15T11:15:10.410000 +CVE-2024-11182,0,1,2c8b47b53840f1b2967586a65b9fa7c78b80f1c6c1c69d3e7c3505d211f5d54c,2024-11-15T13:58:08.913000 CVE-2024-1119,0,0,5426bc48e63724893c52e881a8535fb7954cf4e6383fc287bdb9896410f7d3a0,2024-03-20T13:00:16.367000 -CVE-2024-11193,0,0,444d5e431a5f364ce974b83b336c1383f189c8a9ea01d483f54d9727862b851c,2024-11-14T15:35:06.770000 +CVE-2024-11193,0,1,a70708fa48dd67ba3a86a48525d6b9656d6da3b4be924e80c673ce5d9c638eff,2024-11-15T14:00:09.720000 CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000 -CVE-2024-11206,0,0,62582adb7c31c981ff8b17a1a690607adba3d9e4b3935494335280526e1acb7a,2024-11-14T22:35:02.177000 -CVE-2024-11207,0,0,024c4797bd1d1d32d9a74f037a4ea043aa8c39cc5149453e07ab16481993cd3e,2024-11-14T13:15:04.603000 -CVE-2024-11208,0,0,7acfc0d5ed23c52da09f59a7646b9c68ba6eb5051d4ac6d41bbd6289d3dca8bb,2024-11-14T14:15:17.787000 -CVE-2024-11209,0,0,c160f1217e298cfc2b4ea4c66bd7fff6bc5de06dc33ddcb58badda8b6cd0450a,2024-11-14T14:15:18.090000 +CVE-2024-11206,0,1,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000 +CVE-2024-11207,0,1,98c51622a761e0f4191d7b9bd2fdd9da6fc0915a6a97cca51529b9e5f809abed,2024-11-15T13:58:08.913000 +CVE-2024-11208,0,1,5132b158407eb931e5d684318db9de41bd59baedd6c1f8713db9092ba5bcfd4a,2024-11-15T13:58:08.913000 +CVE-2024-11209,0,1,6796931fa86300b3e2b9543bd1b280cd5b640012f3ea8899a042d616c6df016b,2024-11-15T13:58:08.913000 CVE-2024-1121,0,0,19a454e1b0b19f003a8998da71d81afc60a591ff2c6ec5f42743662bb8a72434,2024-02-13T19:42:57.107000 -CVE-2024-11210,0,0,12da7228515f229535c7fc4b9759273057c94d0101b79ad3990f20080e45a07d,2024-11-14T15:15:07.800000 -CVE-2024-11211,0,0,3886c776e3040976f2d9d483fe55782570fe2f7d343ab982e6a1ff369b159942,2024-11-15T09:15:14.600000 -CVE-2024-11212,0,0,7736079fe4badb5fe2ea2d1c57eef7d38e804fef27e3d434bde972654548323a,2024-11-14T15:15:08.360000 -CVE-2024-11213,0,0,6310690398aef42147c21046e139b47a34bc0077fad5bc3ed389a644e6432516,2024-11-14T16:15:18.450000 -CVE-2024-11214,0,0,ccb4f12fd6859941f79db491e8820bb2f8c1cbacb38f9854647bd5e4e95dace1,2024-11-14T16:15:18.707000 -CVE-2024-11215,0,0,bbd6ed73a8be7440fbca0415213d736ba6de2cfe8e7fb84b25483d78ebfdebb6,2024-11-14T14:15:18.367000 +CVE-2024-11210,0,1,0cca9b9ced96b815f23a2adf405f6ef8ca2d51de736dbd61610d0077a6858d38,2024-11-15T13:58:08.913000 +CVE-2024-11211,0,1,5a3ff1958288000dff9efbfd9636a1e83dea10099aa8993b255e34f281aec47b,2024-11-15T13:58:08.913000 +CVE-2024-11212,0,1,d580f98b2d893ad0ca823fed098b3da0e1374898a103c5afa4af95f7221aafd6,2024-11-15T13:58:08.913000 +CVE-2024-11213,0,1,0c495b874546c97440b3fe42e97782a656e128548583235ee69a0a31261b0052,2024-11-15T13:58:08.913000 +CVE-2024-11214,0,1,d39fe330eb8d17269036227b36e62f47bf8007d5207bfeb9d874b55c9f476130,2024-11-15T13:58:08.913000 +CVE-2024-11215,0,1,fb8a71cad5204690d7fc24b1c1787d6360fda1c469df5e0270b5ef3894a4902a,2024-11-15T13:58:08.913000 CVE-2024-1122,0,0,0daea6a9b881beb2ea9e563443c7905c114cf68ea1093ef9f6fd6cdf2c48aad7,2024-02-15T19:17:26.630000 CVE-2024-1123,0,0,b973e4c54de6f241a32cf221a70e04068421d86df4d000867b2228a54e55ef35,2024-03-11T01:32:39.697000 -CVE-2024-11237,1,1,cb7bbda335a27301a3e6ba3926f5b080dc5afd6e88d1ca9ed1a7516f5f52402e,2024-11-15T12:15:14.670000 +CVE-2024-11237,0,1,8e8efac9e9fbe063a859c165ee378ecff565ba183a1a030817265309876770b7,2024-11-15T13:58:08.913000 +CVE-2024-11238,1,1,f196800203d7a40ea6fe71674205d5ffdaa3f312de9f25c1b832724bfe8a5907,2024-11-15T13:58:08.913000 +CVE-2024-11239,1,1,f1dab3b1bd9473b4d4db92608adf6e4ae1f9c5d4ed0e180c09e7deb1a37f009f,2024-11-15T14:23:55.747000 CVE-2024-1124,0,0,913ac2351f43d83be68411d873bf568715eb455fa7fe6219a9189bc1238726a9,2024-03-11T01:32:39.697000 +CVE-2024-11240,1,1,4cbdc145e46050047bae82d06e6eca707b526afd40e8adf36873c1573b95ee6e,2024-11-15T14:23:55.747000 CVE-2024-1125,0,0,f1d015036f4cdda32f03ba210c93a8838e991a1e1d168cce1bd81d56428097c5,2024-03-11T01:32:39.697000 CVE-2024-1126,0,0,719cb9688eaad755b04db0e390abb1a9b0b6a5e25f632a929e6736322faf9c06,2024-03-13T18:16:18.563000 CVE-2024-1127,0,0,fc004f13d69dd65990588f481257d3c8dd60a3804cfac37ac389768e5b88f08c,2024-03-13T18:16:18.563000 @@ -243279,7 +243282,7 @@ CVE-2024-1236,0,0,9d7e383554119a6eb8995bc3e3c594237fc2517d15212a162d538fac1156aa CVE-2024-1237,0,0,971489c96af173cd98795b7c46411895a847e87f027eb141f5511aec59ad2e5a,2024-03-13T18:16:18.563000 CVE-2024-1238,0,0,9f0a38233429658f32f8a976db71d716904de01ac4f7f996eed98f40cb8ba7b5,2024-04-01T01:12:59.077000 CVE-2024-1239,0,0,db432ab525693f47cc78135d0c2cedd8ee6bd0f1495c321fd41dc0e5a9f890b0,2024-03-17T22:38:29.433000 -CVE-2024-1240,1,1,bdb43b0978ed3d6e4d002880a2bdeadb8ceff6a87c91179aaa463d24ef127aab,2024-11-15T11:15:10.773000 +CVE-2024-1240,0,1,92652d70475ec1119cd517683372e3ddccb6008e6e9e687594e3ace0418a2314,2024-11-15T13:58:08.913000 CVE-2024-1241,0,0,96fd44c6e5fabc6d4bff3dcf2753825594889b1a8245005a991dd6eafde3d621,2024-04-23T12:52:09.397000 CVE-2024-1242,0,0,77f2f4c11df61eb6748d46bb4a1f43701b90877f99a1028521d6b0a2e093dca9,2024-02-29T13:49:29.390000 CVE-2024-1245,0,0,9f0a6683f1d5096645febd5b42c6e25cc14953b1062510f4b421bd46b5a5a4fe,2024-02-15T04:44:27.987000 @@ -243686,7 +243689,7 @@ CVE-2024-1678,0,0,d7ff889a45c19600d651a095e777206640b8492b0764403803a17b2b0960a8 CVE-2024-1679,0,0,17bb9123bbf364aa33e966e6c2425a349b78ca4b0bae773030e2388aec7f2994,2024-05-02T18:00:37.360000 CVE-2024-1680,0,0,bd026f6f4577d87113b1d29b371eaa9932e24a38c7da0012faa1c1e94f133830,2024-03-13T18:15:58.530000 CVE-2024-1681,0,0,1a482680a055401416ddaa083a69f1c47b6c9194da0d7c18ae32e2ad08501e23,2024-04-22T13:28:50.310000 -CVE-2024-1682,0,0,4ff469fb84591d897d3f78d88681c151b0fdc8d5b35d0167b2763ec31141a950,2024-11-14T18:15:18.193000 +CVE-2024-1682,0,1,735ddeba41963c2aebeb394ede3667cd2f4331f209d2293ba81ef590838da375,2024-11-15T13:58:08.913000 CVE-2024-1683,0,0,5eea2ca94f33514f1a10330cfb76f46bfaa5dd8e7036c4fcc56926960dff400d,2024-02-23T02:42:54.547000 CVE-2024-1684,0,0,3968c3bdd3b3ae3fb293826cfdf6d87aa6258fc78cc6b2c763e860d1cdec7f47,2024-03-13T18:15:58.530000 CVE-2024-1685,0,0,52ebc28025f57fba31216035550fa84131fc9d72b996fd38059ce631ee298162,2024-03-17T22:38:29.433000 @@ -245528,7 +245531,7 @@ CVE-2024-2178,0,0,138a5b6037346befd95f162100f3bb85e6d4a637c54fc9498b0643abc46960 CVE-2024-21780,0,0,143558a84e82d570b6723510ee619a946911b6889b6f6671986dcdd0082e6ea3,2024-08-01T23:15:27.210000 CVE-2024-21781,0,0,d162bf1e72449bae162d770913ed78a167c9a61a173e3f0334c37ec3290f1b76,2024-09-16T18:03:16.707000 CVE-2024-21782,0,0,b5dffee8207db247a6acdac6b2dcd64e03e670c2352443c2256ad0b59ce34c1e,2024-02-14T18:04:45.380000 -CVE-2024-21783,0,0,a05f9ff044b6f5634afd421a1951fc992e8ffb6f602bb1f892372e228b6ceeb0,2024-11-13T21:15:08.890000 +CVE-2024-21783,0,1,0e11253a2fcedbabc98fdc7552dc0384cab95ab9b1d8e6c9bab8c5ed0d4d020b,2024-11-15T14:00:09.720000 CVE-2024-21784,0,0,d1c03a69f724f2701560068d9ea091b9ba1c4a0fcae5582b3c351bfc2aa7deb4,2024-08-14T17:49:14.177000 CVE-2024-21785,0,0,f31a00597d17e865ab6ff0a878d7de62b53a2814c89997dcfbb5b7e2587fe6e3,2024-06-10T17:16:18.643000 CVE-2024-21787,0,0,5f2b6e4c1ffdd2284fa9bd570e3d998919dcab4195292c72560d8b2c45f658c7,2024-08-14T17:49:14.177000 @@ -245542,7 +245545,7 @@ CVE-2024-21794,0,0,3da4616cfee04bc74bfc95974dd9f83bbdb78452787277f6c7fc15778ae28 CVE-2024-21795,0,0,4c526521468e78a581fac1a65dee6fe30626865dc4bc6584b348e80d2f7486e1,2024-04-02T15:15:52.517000 CVE-2024-21796,0,0,4c30b7e370457352f3ad9c0b491bb5443c36dbd10c44444c805c65b2a198074d,2024-09-10T18:35:02.553000 CVE-2024-21798,0,0,68d62fb6f929549ed87769596cef19fa55bafb1b5bee7557a0aa8ca1ab0c212c,2024-06-12T01:15:48.833000 -CVE-2024-21799,0,0,f5d3fa5808f1ee5a186369abe742bca086d04487a39a3c612badde5d6495253e,2024-11-13T21:15:09.170000 +CVE-2024-21799,0,1,39d302e42368216e3c7296614d2ecb3dc3ef52a57f1f26a08e1325cbd5f02ae9,2024-11-15T14:00:09.720000 CVE-2024-2180,0,0,ea5a425caba6ac1cd3af8063470a5a58882d59cccfb29a7ae46ceaab23a1dfb3,2024-09-05T23:15:11.970000 CVE-2024-21801,0,0,87368b81aaeb71fd9558ab521f94a4ce96a7438d03623fd572720282a3acb74f,2024-08-14T17:49:14.177000 CVE-2024-21802,0,0,4bfb24c0cf07d11e23ce0023e7998228cd51775f2a30a94c1081993102e6adf5,2024-02-26T18:15:07.290000 @@ -245550,7 +245553,7 @@ CVE-2024-21803,0,0,69612c1623993f11d7fce2e1a14c7756ada99e8bfdc9df57a5e97833caef1 CVE-2024-21805,0,0,3a2e1d8a123029644fcb8d0bab0d1771a21e29a3866d74ce7d95b980e4d4f46c,2024-08-05T18:35:05.637000 CVE-2024-21806,0,0,65620a9d36f843c31df5bee46c66dbfc33ad38c40ca8a398b4fde7f21b629291,2024-08-14T17:49:14.177000 CVE-2024-21807,0,0,ba6f1bbbf5d17f9fae70968c02481e0be734219b1b474942a4df970f31b1da60,2024-08-14T17:49:14.177000 -CVE-2024-21808,0,0,7e2d193aa0ab28c9363fd8cc97cbb5a71e79f0b4f998fc8e9eea89dc06fe8e92,2024-11-13T21:15:09.403000 +CVE-2024-21808,0,1,58a36890001b132a5fc8444b0024287bc3b1f4b27fa50f3498c2c037d49429bb,2024-11-15T14:00:09.720000 CVE-2024-21809,0,0,50d2cad50fd4dffa4f1b9f6b2462b67131f9c0b70f872c844ae858853b94ca32,2024-05-17T18:36:05.263000 CVE-2024-2181,0,0,60b72562a78b2ad4912973d68442a626bf2476e44b4af06efcb887d1f7cfdee6,2024-04-10T13:23:38.787000 CVE-2024-21810,0,0,7633eed9bbb03bb704f77f0b689eb6e24c4196314a36f3baaed3c83403c89668,2024-08-14T17:49:14.177000 @@ -245561,7 +245564,7 @@ CVE-2024-21815,0,0,5b23099bf10c23b8e1fae5f6c90928b2a739513059f777d7513b8ba3e58d4 CVE-2024-21816,0,0,3556729912be1fc6b4992629f2fcc218916937e232361f846f9c6dbeb23ef32a,2024-03-04T13:58:23.447000 CVE-2024-21818,0,0,c637d2f2e962f29751d87c76f242879f1ed5232e4fb28fc3b3902f1a9fec3083,2024-05-17T18:36:05.263000 CVE-2024-2182,0,0,9420149cfa0f08959cb9cf762a78b873e21a3b4307bf9c2f3b44b30a64cf49e6,2024-09-14T00:15:17.220000 -CVE-2024-21820,0,0,b5dedbba660a646b4f8c9cf2dbc81b4a04e9ac6ff3e64518057d06669b56cdd6,2024-11-13T21:15:09.653000 +CVE-2024-21820,0,1,f802057867224a89a0c7d30fdb52d66b289e9c1068e3329d8dd0c17015b0b5bd,2024-11-15T14:00:09.720000 CVE-2024-21821,0,0,7321c5e03ded4c9a82a76a55d87da948884b86260a5a676716e6227a5659e3c2,2024-07-03T23:15:02.157000 CVE-2024-21823,0,0,a7d08304679f358cccf6555e051c669b20181bbee48ad836ab002c3ea453a60a,2024-08-14T21:15:16.520000 CVE-2024-21824,0,0,d1c38dae82b5f002920c2d4cd1ccb35fe1b20b53a13f43f2c755312be72b4f96,2024-11-07T16:35:12.887000 @@ -245589,10 +245592,10 @@ CVE-2024-21846,0,0,2a8624f890cdc423b16069bdaf8d771ee68cb57f48b44bf5e830d58e42e6c CVE-2024-21848,0,0,f050bf22503a8e34689d158df37ffd67892b58fde426292cce64c910f0fd1e0a,2024-04-05T12:40:52.763000 CVE-2024-21849,0,0,96989f2185cf65634de99c3c7add3d53df2db07e8a83a9a08d8d6ee18a2d5ddf,2024-02-14T18:04:45.380000 CVE-2024-2185,0,0,9581f0db66d45d4565aa3c630ed27e51d0d5b119497ed85d856079c067eccf9d,2024-04-10T13:23:38.787000 -CVE-2024-21850,0,0,531e1ea8af381c931bcba13c9f46a8981ab55ecd7f6cfddfa66c6e8d8b91d245,2024-11-13T21:15:09.910000 +CVE-2024-21850,0,1,463bfd3773f0419e4fa1af5c936c30e0da32f02c3a0469ad128b5775fc1cd264,2024-11-15T14:00:09.720000 CVE-2024-21851,0,0,8e398aac12bbb21ba05513b47999f67a62b40ba9b522286a8a37a1d73bfd4876,2024-09-09T12:21:53.383000 CVE-2024-21852,0,0,e09fcb0f4086f4ac6c48d1ca3fa7a5e41e6f642875943dbe00f653a811530b98,2024-02-07T17:15:05.653000 -CVE-2024-21853,0,0,75f9e80b6b5b6878797c20f37b89a7adda2a135241fb7078494e33680cd364c2,2024-11-13T21:15:10.150000 +CVE-2024-21853,0,1,ea7cc2deac6ab8708b41273f3995d863656691743da43d80951ae3039018caa8,2024-11-15T14:00:09.720000 CVE-2024-21857,0,0,4e2443b561b772a5c97ab940abdec5cde2140f23214432cedd665dd724466d21,2024-08-14T17:49:14.177000 CVE-2024-2186,0,0,e665ec858a077f86f139194a096540ce739bac905c65aab62f9ef8dbfe496609,2024-04-10T13:23:38.787000 CVE-2024-21860,0,0,30ba943973f6d6734369afd4519408a3b514173a6e8d04e4b4f9aa07930fea0e,2024-09-09T12:21:53.383000 @@ -245849,7 +245852,7 @@ CVE-2024-22180,0,0,18a45d8f6659d188faad8fb1bacbe12becae8c7c4918462b5af541fe52b90 CVE-2024-22181,0,0,2af604318511689351820fe608b306ed17138cbb3ba282414427968a6e6eda36,2024-06-10T17:16:18.890000 CVE-2024-22182,0,0,b8c6625a5282a72f76fb60314413b773d9f3fb9c9d9f485e5d536e19dd0bfd59,2024-08-12T21:15:31.830000 CVE-2024-22184,0,0,e3b13ffe675f8579db3776363f4670ba9137f26137c3f424c46d120f2b78c4bf,2024-08-14T17:49:14.177000 -CVE-2024-22185,0,0,9b1b85b7a471855c818a8103507275fa911a90f67f05126bc35ebbb5befba229,2024-11-13T21:15:10.460000 +CVE-2024-22185,0,1,772fdb08228087be60124779d95b96f1cbe476d6589862dcbaf74ee1accd6b2a,2024-11-15T14:00:09.720000 CVE-2024-22186,0,0,59ecddd100ddcae06a7ecf9fc641630f9ab4f57ca25d5313e480ef6c07a40e52,2024-05-28T17:15:09.680000 CVE-2024-22187,0,0,764c633f29a9b7a4988eca707a5f5a20cd222e9e3850a0ea108932eed046a25b,2024-06-10T18:15:25.660000 CVE-2024-22188,0,0,a96bd9db4651dc0f50b7bacc9da06b067d0f934ea4749ebcd5dd380cc8b5a64d,2024-10-07T19:36:44.783000 @@ -246455,7 +246458,7 @@ CVE-2024-23192,0,0,229d70b1e4ced5112284ee834fb2370481e129639e639f46dbf40dcc4e6ad CVE-2024-23193,0,0,94365d7de57d8ce926c2c7ac02ef89a93b80020f4b39156cd6a94092ab50fac2,2024-05-07T01:15:06.497000 CVE-2024-23194,0,0,089c2460385496ae22f7a90553a23720c6ebf4be452b1a50dfaeb1dc5b6ea1ab,2024-07-11T13:05:54.930000 CVE-2024-23196,0,0,e45d2b288ffc42c77c53256d3583d28293621dd89d142259811f8fe52d06b396,2024-02-10T04:06:14.577000 -CVE-2024-23198,0,0,0f445501613efdf8796171290103daf1596d09194f4462f72e013433c60356ae,2024-11-13T21:15:10.733000 +CVE-2024-23198,0,1,21e5938f4d74c8281bf8790da1b84875167859241f1d6235396b8f1f5665d0ec,2024-11-15T14:00:09.720000 CVE-2024-23201,0,0,2015a286fe1ca1d8b9078d39d11c89a41b6be37be9d18a49416dd892d150a982,2024-11-01T15:35:09.553000 CVE-2024-23203,0,0,35efc69ad503e337d3e396ab83791d4158b674a366899f0534bda8815d3c1835,2024-03-13T22:15:09.117000 CVE-2024-23204,0,0,afae0f8b3e19ab8973af8b7a3b489e4bd91d0fdadf5faf2aa71183f3a9158566,2024-03-13T23:15:45.887000 @@ -246572,7 +246575,7 @@ CVE-2024-23308,0,0,ab780e3d459f30026b937323fd197ac1b2578a1b6664154111931dd5ecc07 CVE-2024-23309,0,0,72e0380a6f27818b0b36a759ba1b1c9597b21f436a8e41a403b9b735fe7f79d2,2024-11-08T18:27:00.643000 CVE-2024-2331,0,0,4ae45893d8915acf1a1828719d664bd22bca980785ca070e6d05565096dfa696,2024-05-17T02:38:10.643000 CVE-2024-23310,0,0,4179f0bf8f658e9935c63c9c35f42aea4d1771a834836f01ffe3c75ee4f84241,2024-04-02T15:15:52.963000 -CVE-2024-23312,0,0,375d89ddae2ffdeff8958525f5581c6c7e8f49c70f5dcee886519c9704619cca,2024-11-13T21:15:10.980000 +CVE-2024-23312,0,1,4477f8277fe034df488348d28f3b9f7f99a0ea82cc211cd950a7583d9be85470,2024-11-15T14:00:09.720000 CVE-2024-23313,0,0,423eb5c8ce01f4dbd3ff16b47be219cc8721b4595695d3e2421bc510a6ef2931,2024-04-02T15:15:53.050000 CVE-2024-23314,0,0,79ce3965804323389139e64c1c8f6318f01cdd30218fdcb12aed534db8534787,2024-02-14T18:04:45.380000 CVE-2024-23315,0,0,c1f98dd0e29176e2436efe403071800577257a937d629bb3b7d47f8a4b4769c7,2024-06-10T18:15:26.180000 @@ -246899,7 +246902,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000 CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 -CVE-2024-23715,0,0,88c29c9e7d38c493f2b09f04a11c04cf9cc51f1d6a04e5441f9a2d210887e5cd,2024-11-13T18:15:20.080000 +CVE-2024-23715,0,1,be9ca32355354e8e866a9cc5f9269e48161aa8200c02ba6e7048918c9ef2bdb8,2024-11-15T14:00:09.720000 CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000 CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000 CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000 @@ -247095,8 +247098,8 @@ CVE-2024-23914,0,0,ef84d8471f9b2e6f74b964fa20e89b8542f1e03d544d051711757b2a10104 CVE-2024-23915,0,0,26daec6c21dda6d5d37818379de58533357f885ea52deb2834a097462a07bb95,2024-09-20T19:07:32.673000 CVE-2024-23916,0,0,5077cd24018e805b075cf41f1ccac823739f63acd7350dd61dccd4ccae77329c,2024-09-20T19:07:23.750000 CVE-2024-23917,0,0,f3236f3886ac3a298029762564187aed866f84d01e9365abb654a21b0d966829,2024-02-09T01:05:22.180000 -CVE-2024-23918,0,0,44be01ccc707655b960b35f55ae0581ce651ab6811f526e4235524f0bfafd701,2024-11-13T21:15:11.227000 -CVE-2024-23919,0,0,c74694ddbfac0e393150201c10476d1b21af80ad5b9f33246885002f48fa9a0b,2024-11-13T21:15:11.457000 +CVE-2024-23918,0,1,a581ec956a0e5f03f546bdeba0ea8e1c1eb252ebc5d36e878f10821dc458712f,2024-11-15T14:00:09.720000 +CVE-2024-23919,0,1,9dd58f42865811581de44d643f73ccfe6cc8b3603f753f451294afffa7a13d2f,2024-11-15T14:00:09.720000 CVE-2024-2392,0,0,a1f238224b889878ea8101bb03eb85f7363cbe3f032b78dbb59584257d093c6d,2024-03-22T12:45:36.130000 CVE-2024-23922,0,0,3574fa19d2a2f0f07ed0705fa9c0f7eca8ae68dde48fb31a4d5183868003a365,2024-09-30T15:37:28.453000 CVE-2024-23923,0,0,453ef28475b56e67e0565d9d37a0863ba038aa3a0c6bf6afee123eb3bd3aa3c8,2024-10-03T18:07:35.977000 @@ -247712,8 +247715,8 @@ CVE-2024-24978,0,0,e773fada76c847170a8dd98c98b8cc13106b8bdbc3716bb8963410e73fd17 CVE-2024-24980,0,0,3fdf73457b919755fcf59939500686a4e764152c575eabbdfb315f29409758ab,2024-08-14T17:49:14.177000 CVE-2024-24981,0,0,4778c6815162129c19c427caa98fb743cbc1e80e4ace882077c64de825799123,2024-07-03T01:48:32.340000 CVE-2024-24983,0,0,e552e4af213b0ab57adb4ba19aeb0c4530827148e23a2e1c19c3f213b7957135,2024-08-14T17:49:14.177000 -CVE-2024-24984,0,0,eaa8cd8e82c31a5c4d7e1a981159ed67d9506c5f60dfe0c2ab10b8b3e8f366e3,2024-11-13T21:15:11.703000 -CVE-2024-24985,0,0,b6e823c4c2636081879d37af0c7d7b0fefc0e2f6b469e3601a02858338b19f56,2024-11-13T21:15:11.940000 +CVE-2024-24984,0,1,4dcebd05c282433571c5f44d027f6863b80244b646728b73dd1c6e746e10144f,2024-11-15T14:00:09.720000 +CVE-2024-24985,0,1,2e4456d663edc08a6b8175093c8533ba894736097f8ac984a8f2a082bb15009f,2024-11-15T14:00:09.720000 CVE-2024-24986,0,0,77b300319c7ee1ccc9e61dd316d3dcaa5e475b38e28730cee5e5deb88cc75c00,2024-09-06T20:23:48.690000 CVE-2024-24988,0,0,9e4f6f88273498e8474a945212f722bcba31b159d34f99737f4277d72dd9fb6e,2024-02-29T13:49:29.390000 CVE-2024-24989,0,0,81a2a87b35bcbca4ec34d5e22214bdf976ca0d87c889c16ca05e31de151ff5e5,2024-06-10T17:16:21.607000 @@ -248030,7 +248033,7 @@ CVE-2024-25468,0,0,3864d1f55affa64d70277d4fba0d3f88289336bf2eb6f1b29a5e8a856bd9e CVE-2024-25469,0,0,557b8a68044694189954e70cb5b5e2ebf1ecf04b2586629d7bb1e69d0af34ee0,2024-08-27T19:35:14.107000 CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000 CVE-2024-2548,0,0,40cde8752e3c8848aae41da66672115ef0cd24cbd123858c9556b9dd3342115f,2024-10-17T15:52:32.283000 -CVE-2024-2550,0,0,5e86919977fb53ff2eff4e17809552931e33dd8e013f78df883f54e1d97b0b78,2024-11-14T10:15:04.137000 +CVE-2024-2550,0,1,80a98738149437f8501318cb0354419af6631f135c3eeab2998e07464a173794,2024-11-15T13:58:08.913000 CVE-2024-25501,0,0,53c57009bf13ac9e81165c240313efc6336b1030bc10f61986ac8903ee95ed6c,2024-08-27T20:35:14.160000 CVE-2024-25502,0,0,d9aa39f94cfb1820b327a0e3490f96eeb91b5ac2a113d9f7ad8c92fe65038e88,2024-08-22T19:35:15.140000 CVE-2024-25503,0,0,d18daea47533c0b519e93decb5b52383220a142cd875d19e67dca0b7259c8ef8,2024-08-19T20:35:07.610000 @@ -248038,7 +248041,7 @@ CVE-2024-25506,0,0,331fc2aa8008abcbe7529c8e1f902eaa8f01961e899bf76c0c02400b4802e CVE-2024-25507,0,0,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000 CVE-2024-25508,0,0,90339bb48fc1cfbfbe04d77c441539b4eb12357264469da7dce73e670017a9bc,2024-08-01T20:35:25.160000 CVE-2024-25509,0,0,43932d598b677151ec148e2c6fe397dad54fbcf37bcb8324dfd2608c97fcef93,2024-07-03T01:48:52.240000 -CVE-2024-2551,0,0,1d814e7cd17a2a7cb6f0b91456c56fa6cef3d08af17516e4c4b24379d0b802a9,2024-11-14T10:15:04.547000 +CVE-2024-2551,0,1,79910b59d2bb2193a7324aeec5862a9391a639b015c614cba847d4ed2564749d,2024-11-15T13:58:08.913000 CVE-2024-25510,0,0,861a29eb687c50c63d985cbe3b942fd6dcb2a5ed2f01fa956e441eba24a1e618,2024-07-03T01:48:53.193000 CVE-2024-25511,0,0,45841a27c05abdda5e88c8662dccb1b2ce0612679a4549ee5889dfadc7c35b1c,2024-07-03T01:48:53.997000 CVE-2024-25512,0,0,30e70416daf9bc731aa2cc10d3309e50db92ad7a3860e9d31d00559db96a5244,2024-07-03T01:48:54.810000 @@ -248048,7 +248051,7 @@ CVE-2024-25515,0,0,9552fe583425297ae50d0d3fb3aef41d1ff7ccab24982b4401e1de2eb3120 CVE-2024-25517,0,0,2d5bfca64a87833b4bf7fcaafb0e1c6c75a7c73d9c79ee7ef678b3593647ad5d,2024-07-03T01:48:58.093000 CVE-2024-25518,0,0,4f656721efc43904c6c1b7982efa8acf36cdc63eca4dc6a739fe56633964cd05,2024-07-03T01:48:58.917000 CVE-2024-25519,0,0,1e9856bf69a42caa8c87d9efc940250a43a6d8133746dd534ead5365966d2794,2024-07-03T01:48:59.717000 -CVE-2024-2552,0,0,8db340bdef42e1446619888f064f8ea116f96e25972de2c22775973aeb619fc3,2024-11-14T10:15:04.957000 +CVE-2024-2552,0,1,59109df70190e92cc64bc844f9b780348086a8d582ef6ac1b462123b55d8d538,2024-11-15T13:58:08.913000 CVE-2024-25520,0,0,ef18d590b5f58eb9bb7ec3b39fa017b59c50accc89216dbff8503dbc68a15ded,2024-07-03T01:49:00.550000 CVE-2024-25521,0,0,92b6345ac0bc5186de3acc2eb108650c8fdf5ebf11f9b3b43771a2e77e69def2,2024-07-03T01:49:01.367000 CVE-2024-25522,0,0,20bcbb11d104068e82316fe242ad3d32a079fcd34efa7624e69f8b13b3bb1c9c,2024-07-03T01:49:02.173000 @@ -248076,8 +248079,8 @@ CVE-2024-2556,0,0,d03e7f1784653a97f31dc4e2fd10447d6f2db7c14a279d58208c6467bb9e5b CVE-2024-25560,0,0,e7b7bd3b9b2bd4e7d45c7cc73f2078dfc39996dd7babf1c9bfbdcc4206fa2bb7,2024-05-08T17:05:24.083000 CVE-2024-25561,0,0,76009d8f511bac009453b1046a38e646e70f224b7d5698b6c84d95afebbbc42c,2024-09-12T18:50:32.413000 CVE-2024-25562,0,0,691463f616aff0c576eb38540790057cbc3fed7a44a49e5b85921154797d7fac,2024-08-31T03:40:47.857000 -CVE-2024-25563,0,0,5dbaf64ac70f71f2d10ecffaa7f3954751a711e1c583c35d1b603562ddf80352,2024-11-13T21:15:12.193000 -CVE-2024-25565,0,0,b7677626184e976ea6f4425f5ec7ce50f01ee1238d4f4eaa3d9ac0c9e139b31d,2024-11-13T21:15:12.430000 +CVE-2024-25563,0,1,553e75dc718d3a55fc37b920936c83b115d44c23976cf775fe2948693ea470ed,2024-11-15T14:00:09.720000 +CVE-2024-25565,0,1,a39195a6496ab48ad36fcbb2ea938d1e2b566d2088e4bbb25abaf65edc8f7619,2024-11-15T14:00:09.720000 CVE-2024-25566,0,0,ce8c284cdb4acbcf113905cd78211b80901c4f2cd5428d38bfca89845635eb11,2024-11-08T15:38:56.150000 CVE-2024-25567,0,0,312765bfd106474db1f5aba6392fe2ea9517594a364566ff599d59e6c885b134,2024-03-22T12:45:36.130000 CVE-2024-25568,0,0,1f3b68eecdadc5fc067f1c6a6f3d0aecf716d94021ea1c3d5bfe3c2dbc91ce3d,2024-08-01T13:47:46.990000 @@ -248157,7 +248160,7 @@ CVE-2024-25643,0,0,b37cbe067d8add39730eb4b37fe5e8af21dcf6913d79a4bada6119cce1ed1 CVE-2024-25644,0,0,b702cfb10f1d9840e7089aa6d4444498e1a0b1a9f6491295ca80b70c56a42bd0,2024-09-28T23:15:12.907000 CVE-2024-25645,0,0,6bd46b6b76bf2191c2da23dbf63dbdf0c2ad3d8c1e837e15d8adaddae98d01c1,2024-09-28T23:15:13.020000 CVE-2024-25646,0,0,a101219cbb661ecbc967b4403965684b4e383408a09ced0696a5c771abd09b61,2024-09-28T23:15:13.110000 -CVE-2024-25647,0,0,8be410ef7a3a62dbac203a56dda6a82d3112e6380678ead8c8b4a24eb0e359ac,2024-11-13T21:15:12.683000 +CVE-2024-25647,0,1,004a6fed6424dc49a02739de5a84f329990c1b44f0437974b2148e4b82822e29,2024-11-15T14:00:09.720000 CVE-2024-25648,0,0,43a3c9df6a9798012b99a2670068513af50de7590b4bfb346569d85e9cedfb11,2024-04-30T17:52:35.057000 CVE-2024-25649,0,0,699eb0c1b6c1eb28f54aa653e10ca84f6b536f18d39e73450a463cbb2c01c545,2024-08-27T19:35:14.950000 CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000 @@ -248425,7 +248428,7 @@ CVE-2024-26010,0,0,0e2e4323cef6d8344800a888bb1e02076ffd37daaab8c643e84c0ccb4ef63 CVE-2024-26011,0,0,8bd3606941f97d4a6211382e409999ead68edcd45e5344e383437669201d7fe9,2024-11-13T17:01:16.850000 CVE-2024-26015,0,0,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa697330841d,2024-09-09T16:12:36.640000 CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cdabc2,2024-02-28T15:15:09.320000 -CVE-2024-26017,0,0,d83811f383ba48f54a5e707d9d1ead7ec41ed4cdec53b9bb3b7f36f417009bf1,2024-11-13T21:15:12.910000 +CVE-2024-26017,0,1,29b69c6327ca7e9581060ad10131cb64e7089e27b058bc4b558a5897a14d5b73,2024-11-15T14:00:09.720000 CVE-2024-26018,0,0,3b204ab00ea9e5a4e89dbbd72602f66cfac87fb0fd92b5110c31c614c83a90a6,2024-10-31T18:35:08.353000 CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000 CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000 @@ -249487,7 +249490,7 @@ CVE-2024-27197,0,0,b073898ec17a08d3b1a11c7b0c90ebe35fb389ca08bf315d6421cc3959bbe CVE-2024-27198,0,0,bac9f46c484adf9de6a634098336c1e11ababf2b56401655185bb4c8e491abfd,2024-05-23T17:57:49.653000 CVE-2024-27199,0,0,b7165fde30d8edec4986915f0c4ca7947c54838852015584a90e5050c5a6077c,2024-03-11T15:15:47.663000 CVE-2024-2720,0,0,85869b201641191d674a3d8cb0449932108d6f33187a3194c3a297f2e914d0b6,2024-05-17T02:38:27.590000 -CVE-2024-27200,0,0,6754511877f159207e5be93a87082fa47ecc4c21f1c8127c581263b0586710a1,2024-11-13T21:15:13.140000 +CVE-2024-27200,0,1,85aaff6fe226984a748b9a99f9d807d66ef62a7ac2cdd3e0e23654f62a36798c,2024-11-15T14:00:09.720000 CVE-2024-27201,0,0,f4057db407cc0b2cb15b83d5bfcc727fb8fffbe5df642064a2f39b01d31b3338,2024-04-03T17:24:18.150000 CVE-2024-27202,0,0,dec3b871d77de488d2204727c8b45ba74ac889892271b3051ec433c7b5758780,2024-05-08T17:05:24.083000 CVE-2024-27204,0,0,21c5c3d644ab35ec9e83742f3138cff8265e6d21b8f7f41fe9d62eba43137806,2024-08-01T13:48:17.703000 @@ -250132,10 +250135,10 @@ CVE-2024-28021,0,0,d3b281f790deb0e028449c0547c897de30755152601ff8bfb79129f9a9b61 CVE-2024-28022,0,0,9077c2e7130f01aa732cd3390b7c4ae4caddc752d7d580463d4dc1ef8afd6333,2024-10-30T14:24:16.353000 CVE-2024-28023,0,0,95e92873beee8f336f4c9cf0229eba10eb803f09aac2855be4773e8156ab7584,2024-06-13T18:36:45.417000 CVE-2024-28024,0,0,b0c6ecf3013967d3efc0618c902b41d32c3ab34672126ec38ab8cb1948f54213,2024-10-29T15:15:09.697000 -CVE-2024-28028,0,0,e95524eb5ad61105067ef452a3aac000bc7fd390f05b69765e3856e2480efef9,2024-11-13T21:15:13.387000 +CVE-2024-28028,0,1,7f1683c7d8d2298a0f21e5354077b989a81758b917776e2c2063898bb751c521,2024-11-15T14:00:09.720000 CVE-2024-28029,0,0,9e4bd22dac92b2ff82c0b0c8dd5314b634ca4785041ee3b60958f95130ac218e,2024-10-17T19:15:22.063000 CVE-2024-2803,0,0,22f2c86ca1c88d78ce00e8d709ea3d268b625d199c05ddcd35d56c7f9860f31d,2024-04-04T12:48:41.700000 -CVE-2024-28030,0,0,c324a5c43f566cbab6284fbac734834910fef85afb1d707107338e0c668c4ddc,2024-11-13T21:15:13.650000 +CVE-2024-28030,0,1,383ba087a7d9e03f3729f2d371b6b408a3b63145fc91da4126609ef755900230,2024-11-15T14:00:09.720000 CVE-2024-28033,0,0,b3c00174c596428be92cce453e3547082c3550d2faa9dae834e019420834a8b4,2024-08-02T17:35:33.770000 CVE-2024-28034,0,0,1f04dc65f231aba26563c955179bb55e818d7cb96adc110022207010427ec021,2024-11-05T15:35:10.627000 CVE-2024-28039,0,0,3a8376c4c37b22221c3249737981025e902f9cb4913edf8d0bc477677335599e,2024-08-01T13:48:56.840000 @@ -250147,10 +250150,10 @@ CVE-2024-28044,0,0,467bc4d273fc147cd017e289ec4fbc7277cb9c1dda35ad3e884f62d72c51d CVE-2024-28045,0,0,bde3e039013a70b21c912b8e223d5131c889e7d6afc8ba834f2bbb61111aea50,2024-03-22T12:45:36.130000 CVE-2024-28046,0,0,e317050e5191f1a9311172b20af408b0774a96cf976a07961cd105c21cd52020,2024-09-06T18:40:14.330000 CVE-2024-28048,0,0,427932cc2219e9755e4267ffe9ddd33c638166ca04c44c64b94478c05d38f523,2024-08-07T20:35:15.970000 -CVE-2024-28049,0,0,7131c0c915f120538fc0ee7a6162cbc9dd0185775e76151b49a815722659fa90,2024-11-13T21:15:13.890000 +CVE-2024-28049,0,1,903fc60f1b27f4554ab4c5a10c9b93b4ad52238991d04f2546cd12133e95b3b1,2024-11-15T14:00:09.720000 CVE-2024-2805,0,0,286efc9a19dc11ee0838ec500ba164305f2c14641c0d5856229be06ec762a801,2024-05-17T02:38:30.840000 CVE-2024-28050,0,0,0d145d7886c67ca4edf4d6c71f8ed46211449029687ca634366ee5c88b5e7b1e,2024-09-06T18:38:11.353000 -CVE-2024-28051,0,0,df5ed6133ea2ab63cdf475c3b4ccd1f99e946c1f9e6211a82a55654f1222254d,2024-11-13T21:15:14.123000 +CVE-2024-28051,0,1,cdb08da3efbec97bcaa24b5752778d91d7dd57a757eb65acfb8041fed7e73986,2024-11-15T14:00:09.720000 CVE-2024-28052,0,0,c15d25a82fbb807832ff1bc94dd565bcc8e771a56ab0af0e3e3891fe636a1952,2024-11-13T18:07:42.263000 CVE-2024-28053,0,0,c6161d8eec33d0d4874e655333f8b3d42189dbff5254c952286bcd697b2efc85,2024-03-15T12:53:06.423000 CVE-2024-28054,0,0,42bd8bafc554125a5c189382c84c5d77dd5214fa492ad959b0494172465d0aa0,2024-03-23T03:15:11.510000 @@ -250253,7 +250256,7 @@ CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f CVE-2024-28166,0,0,d799c0db8419cc219426077b2570c40e187024e21f6e37f4e3723cf31620790d,2024-09-16T16:17:15.540000 CVE-2024-28167,0,0,1d78d7f4b9ae6d1ce7ebcfb3fbb052b019794bf39b0c5c69579e1b351fc0d30f,2024-04-09T12:48:04.090000 CVE-2024-28168,0,0,e243987a138484b576941798683716902af5bc81ad25b67661951597f2bf3e0e,2024-10-10T12:51:56.987000 -CVE-2024-28169,0,0,bbae1d636f8e2c64d0ccb8a9d3faf1f31037578ca583aad624f1fddee8e7e681,2024-11-13T21:15:14.377000 +CVE-2024-28169,0,1,92d5cedcb912c9098c051028b6e8a53f12eb4c9e88428141d44a812a099fe862,2024-11-15T14:00:09.720000 CVE-2024-2817,0,0,c674fcdba74ce38976cc24fe7d55a331a6fbc3ee70971f1cbb43b1b952ff96f8,2024-05-17T02:38:32.210000 CVE-2024-28170,0,0,b651a495621059669c19c3fdc9d2ee84d87fc5f846a93fbe1c30394bd5ddd768,2024-09-23T14:49:17.057000 CVE-2024-28171,0,0,33886fb8942146c369bad25646a1251c19953189c1ff16eea603f4d0cd1b835d,2024-03-22T12:45:36.130000 @@ -250641,10 +250644,10 @@ CVE-2024-28877,0,0,cc0627e9c2b6ba5f30332865405b5bc76f89994c49e4e390afd92f763c789 CVE-2024-28878,0,0,d059bd49c00a1fffb41c41d6dd95d1c802f748f752ac96eeef423a76a468b10c,2024-04-15T13:15:51.577000 CVE-2024-2888,0,0,170e6c09f0bbb2971ac1585d2092b2ec04063ebd1a1dbb82f7cb5e40a0b8e45e,2024-03-26T12:55:05.010000 CVE-2024-28880,0,0,d86d3a57226b47e9756d0e2de7fe8eb3bf99b87dc35f89b5848778ed1b1b3b47,2024-07-03T01:51:53.260000 -CVE-2024-28881,0,0,1b221ffc1616c51f7be9d33e4e486dadfc36ec832aa726c0a70d41f3a7215e3a,2024-11-13T21:15:14.620000 +CVE-2024-28881,0,1,97768a675f43b2a9ca17e89ef1a1b9241165217e05a61ee26347015f5a233307,2024-11-15T14:00:09.720000 CVE-2024-28882,0,0,c1fb7fe1ed5bd3e8a38fb634c7592f77c8d6a5edfc3f3375a5b593f79fbe5331,2024-11-01T21:35:02.697000 CVE-2024-28883,0,0,7608553831e95dbd64a1629b16235d631ce647c64db4d36e5f31f95004223611,2024-05-08T17:05:24.083000 -CVE-2024-28885,0,0,993331b1785d10daa9825c952479e72e791d35c58184ad4bcacb9661cb8bf131,2024-11-13T21:15:14.853000 +CVE-2024-28885,0,1,5188af4754e264735b29e0d598e87a2d0c27af581e6b3caee884ec6774f7009c,2024-11-15T14:00:09.720000 CVE-2024-28886,0,0,c5e838328be71c5eb5c783cfb3d7b29e0393c19c1f2fbf543fbfcbc9ad011077,2024-07-03T01:51:54.130000 CVE-2024-28887,0,0,02788ece8fafa84414db815e90d6fbdcb64e36e799546da1d80bab49ab148ef2,2024-09-12T18:51:49.010000 CVE-2024-28888,0,0,ae6e6114831c183954a3ca2ab2fd4722d2fcbbd18a0d2ca68d3103846864fbf7,2024-10-08T14:14:55.637000 @@ -250713,9 +250716,9 @@ CVE-2024-28947,0,0,9d3506b7ac0d8414d56f005d3db3860beb6359f3ca23ee696b9b26b32dc4d CVE-2024-28948,0,0,306b07dbd124a47412fe3ed4c4285e5515501d0fe586cae1d827a381bd21c099,2024-10-04T18:58:14.400000 CVE-2024-28949,0,0,d5e48bc4aa20c39f513a0582c3f637deca3b5b6936a689a13ce9af3ad1e7d8d0,2024-04-05T12:40:52.763000 CVE-2024-2895,0,0,b446221d46d418d396cd9d883702efdf5b2797ce3a0ab257ce4f7a9b35ffa891,2024-06-05T20:15:13.023000 -CVE-2024-28950,0,0,91fa4ba7e40a31e0a201d10153d6c2ae286c71c281e857213d9fa25fd8fa388e,2024-11-13T21:15:15.093000 +CVE-2024-28950,0,1,d87cf536998f19ca3ea46db1e2a2b6eb63d52069373bbccf1f977f66004b1215,2024-11-15T14:00:09.720000 CVE-2024-28951,0,0,a076a4222e08b02e8cd2b9c67ba4cfaca5bf7589b5e41c98ae39575c74159c6e,2024-04-02T12:50:42.233000 -CVE-2024-28952,0,0,7f65a2316775a8a40e218e2ed0afc0fa2cc39cc4e753256c2218531e68662648,2024-11-13T21:15:15.310000 +CVE-2024-28952,0,1,03ce4d26ea83e91549021668eb00f7a216a1167d8d20f0cad44e8ebe7a2762af,2024-11-15T14:00:09.720000 CVE-2024-28953,0,0,bf15e6214517ab8261fa8ae7ceac88b061cfcb90015627f72b13aec9e1761bc6,2024-08-14T17:49:14.177000 CVE-2024-28957,0,0,99432bbf0e2944655d9b3d14025b17e0714441ee50861d2d06b13856968b6443,2024-08-29T20:36:38 CVE-2024-2896,0,0,65ede353e34c386898ba2637cfb49ad4710dca05a79d3f20095106470af669ff,2024-06-26T20:15:15.187000 @@ -250830,15 +250833,15 @@ CVE-2024-29072,0,0,50e2db556663c43fd665c3ae801a5bd36f73f0e7479a230bf4ff9553f9fcd CVE-2024-29073,0,0,c7a1ecc52b2710f20eb4ca399da6fabfc271c86a39117df7ecabe6454fad279f,2024-09-18T18:31:42.290000 CVE-2024-29074,0,0,dae045c5f696de776b77da3987f8405651ce1bf4fa99e4d5313acc43e5165076,2024-04-02T12:50:42.233000 CVE-2024-29075,0,0,5f4ceb8e1519bbaa6bc09ea81eba95b9d8df6e5520fb957f27607d429d5b6e04,2024-11-12T13:55:21.227000 -CVE-2024-29076,0,0,17766f010c45b5bb4aa85c75499be7bb0c170a7f4cd8dcde231f7553919186d1,2024-11-13T21:15:15.537000 -CVE-2024-29077,0,0,8e8e05a41dfe62eb74b11460781cba77ee4e265a3e7d69e625a3fdb770098146,2024-11-13T21:15:15.790000 +CVE-2024-29076,0,1,9b074b5afc626db7949d79102d07b510201b2d6430e2467a96a36ea9f4304fec,2024-11-15T14:00:09.720000 +CVE-2024-29077,0,1,1e95b9d443d21cf896eb45bf7d1fcaa0325610a5924b0e8674ef0156a8d615bc,2024-11-15T14:00:09.720000 CVE-2024-29078,0,0,a4fab3b35091f8fd08881f2bf49d899dc5478faeb8df15472b3560684c1a5420,2024-05-28T12:39:28.377000 -CVE-2024-29079,0,0,c7e8ec115eb53c578060ca43ce3f256829cf868fd1446f363e4761e200d43e41,2024-11-13T21:15:16.027000 +CVE-2024-29079,0,1,f7b85dae4ce1b1f9a8c3b18fdea1df0834d4beca921c1f1207dddda2504eb216,2024-11-15T14:00:09.720000 CVE-2024-2908,0,0,3845fc124bc9f710736d5363f9b086190df4e2925cb4e5b4a7eb9455fd55b3c6,2024-07-03T01:53:38.703000 CVE-2024-29080,0,0,d70af9cf8ca134f2fc32b6a3edafa05fe0b9ef4b57ba184ff012b1c5ad246169,2024-11-13T16:35:13.577000 CVE-2024-29082,0,0,f3bffdf8f114e3bc255f264ae5fa99c37ecaaf471e91670eb2b8e47c9b14fc4a,2024-08-20T17:11:31.787000 -CVE-2024-29083,0,0,28646eacbc83ea0e8a4b47cca7d54265b9b1f91af20c5c5261923d7366fa5de9,2024-11-13T21:15:16.280000 -CVE-2024-29085,0,0,7e1e974304b8e0ac6fa7ae1cdf1209bcae626af3af268a5d861e1445eb4aa9b1,2024-11-13T21:15:16.520000 +CVE-2024-29083,0,1,30506b29b8a9faeff5b3a579042010fec9025d83620091d428bc84c37cc3aa3f,2024-11-15T14:00:09.720000 +CVE-2024-29085,0,1,61bb10aaa512be477286344224796ddda123654970be996af0175471c9a596c2,2024-11-15T14:00:09.720000 CVE-2024-29086,0,0,a506e441c3bf25764a8b903d5765d986b768db67b23cfb3ff53fe13b9a27e4ba,2024-04-02T12:50:42.233000 CVE-2024-29089,0,0,0e8f97a635f9f0c1a64450754b2a18a9e0c4596034f0fadf2dfda26a23dacbbd,2024-03-20T13:00:16.367000 CVE-2024-2909,0,0,0e3061bf6a0e2ec3e09b8019aa64a03564628e11a8822cb14e5d6cf0553832b0,2024-05-17T02:38:36.843000 @@ -252249,7 +252252,7 @@ CVE-2024-31069,0,0,36481f1718994048a20a15ed67941e1a51f806f748a1e21efe82cd8268700 CVE-2024-3107,0,0,26336691309b77f9b9ed1d01af8da80f39f18aa81e7e280fa98e64adbe096bda,2024-05-02T18:00:37.360000 CVE-2024-31070,0,0,6d92bf7f941ba8b0a97929fd581428fe88083485ec4febaa08ecbb4f73e2d00c,2024-09-27T17:54:52.130000 CVE-2024-31071,0,0,5282cdb502099fd214901289f849e21cb27e95440fad17b9c6193e904f64fc7f,2024-09-09T12:21:53.383000 -CVE-2024-31074,0,0,be48b84418a18269953ce437c9827ff6682085cf5f8c73b2c25679815afc5590,2024-11-13T21:15:16.790000 +CVE-2024-31074,0,1,3b76cf2ad37e2f164c566fefe158023c77a92dd5d2f4289877bafeb8205e5c44,2024-11-15T14:00:09.720000 CVE-2024-31076,0,0,b516579659528296f384d5fc2847472b67a1e9cb8089efce1b81514ba7455edc,2024-07-15T07:15:03.810000 CVE-2024-31077,0,0,4ee4934fb388f0c6aecae8ff57d029bcb5098c8db84cc409e7cf47f67893eb97,2024-08-01T13:50:46.110000 CVE-2024-31078,0,0,b0bbe41ef9db9ceb087fcafc0c2efaa7f33c48976a0bab70d091b39f8b940d0d,2024-05-07T13:39:32.710000 @@ -252316,9 +252319,9 @@ CVE-2024-31146,0,0,b342a247282dd82cf1f52d9b8502d9aab215fbb81ba82cfea4edb5bd4cfeb CVE-2024-3115,0,0,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000 CVE-2024-31151,0,0,16248b06da0978ae9664e2116ba9b7b948b4a7588c1b7fb8035d9df807e84827,2024-11-13T18:19:26.453000 CVE-2024-31152,0,0,227fcf0f32e5b111ad71b6918e612548f3ac0e6ca0eaa271448a249647dc5c85,2024-11-13T18:15:31.597000 -CVE-2024-31154,0,0,bc1001aa0c94e2c0280f1426c4398b65c53a4cf7a10673f66fd226902c040f42,2024-11-13T21:15:17.040000 +CVE-2024-31154,0,1,e597323df7123de6822eaac00675682cf71ee9dcb950706a62d0094f1cd1d86b,2024-11-15T14:00:09.720000 CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000 -CVE-2024-31158,0,0,d804b416b65d7822bef41183f16c77ae71f6246d4c7a621e51da259c1c14c0e2,2024-11-13T21:15:17.287000 +CVE-2024-31158,0,1,ac4c7692175407d91e3bc1eb8d96a9bb32ce577d22528683698bc9900cf8691e,2024-11-15T14:00:09.720000 CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000 CVE-2024-3116,0,0,9b51187c570a5abfd3b1d9bb042dab999267b982fd372840204c0edfde974aa9,2024-04-23T02:15:48.310000 CVE-2024-31160,0,0,df48ab606466bd66cd539890b6337283ccfce4c5ec6123b8878b9c85f80b785c,2024-08-16T20:27:16.697000 @@ -252509,7 +252512,7 @@ CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000 CVE-2024-31336,0,0,e16f98988b82130b2e32557c399f0ea25778a1838eb9ccce21afc0b2ed5c5a95,2024-09-13T01:15:01.980000 -CVE-2024-31337,0,0,4b589ae38443a44c3d11a1a436752f068276ccbd474510ae2326d7d6590df257,2024-11-13T18:15:20.167000 +CVE-2024-31337,0,1,211cc0c863ee5c8d748051b42330bf23dfc862367b588e297bbc4c9eb5d837ca,2024-11-15T14:00:09.720000 CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000 CVE-2024-3134,0,0,29c3b545a5da0a472480af2af3f9f3acedbe4b841a8f6f121606a369bcd8fa7c,2024-05-17T18:36:05.263000 CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 @@ -252584,7 +252587,7 @@ CVE-2024-31402,0,0,c29db4a048ec9774ef548a289fc2a98cd30777530f3e94468f19f6b59c56b CVE-2024-31403,0,0,0224148112c12b7ed3a671555d8cb853847c387c0a01fd25254394bf7f9de8b8,2024-07-03T01:54:49.817000 CVE-2024-31404,0,0,4256fd8adbfc33fbeafded726cd549f291f03694e3ecf73a230c9ad3cdb8eef9,2024-06-11T13:54:12.057000 CVE-2024-31406,0,0,50456975bcaa7f8217ed5d32434dc8fe15a49c6e53ad431c822a1405fa86be01,2024-07-08T14:18:24.767000 -CVE-2024-31407,0,0,560884c8ce63fe4b62204eb5a383776f40ebb53fca563239dbf1d49a7b92cd8f,2024-11-13T21:15:17.530000 +CVE-2024-31407,0,1,15a938a68afa06caa5faf91db976ebbae46b8f74be661e9dc8d5d3433a567064,2024-11-15T14:00:09.720000 CVE-2024-31409,0,0,09ade636686018d011934a2d430e86d633c432ebce6a25dfdd22659ad619bb0a,2024-05-16T13:03:05.353000 CVE-2024-3141,0,0,f613ac942cd4fe27f02940a465f775f9bffd5aa44eaf65a9fb94b5d68958c63e,2024-05-17T02:39:44.593000 CVE-2024-31410,0,0,23155e757f76d6df45e3314d3045af8745f87c8b7ddeb1d4a8dad059bea073da,2024-05-16T13:03:05.353000 @@ -252753,7 +252756,7 @@ CVE-2024-31680,0,0,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187 CVE-2024-31682,0,0,6ad84277376005bde3c5be691a4699ed2a494d2e47836225d1c8ccbe4273b358,2024-10-29T14:35:17.517000 CVE-2024-31684,0,0,a58e80e535316094d398f75f99933a7946ff10472558d364c59331628a9ef154,2024-11-12T18:35:08.927000 CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000 -CVE-2024-31695,0,0,689fe36b0a90399cc1d98e6d627578b21a33778bdab5ff8d35222605a12d4eb7,2024-11-14T22:15:15.953000 +CVE-2024-31695,0,1,fc44d9cb1da1273e05dbd57bee60e9de07dbf071072ff6d9a88b80b1a406cc2b,2024-11-15T13:58:08.913000 CVE-2024-3170,0,0,e5d3e527beb338f17b4d7e88e470a76429efa4bde538f57bcfe45fe38f4493ae,2024-08-01T13:56:23.270000 CVE-2024-31705,0,0,360c5213fb2e781c07e5b26068537bfd39f5bcae9363979b2bff285237ce8d8a,2024-08-20T17:35:05.360000 CVE-2024-3171,0,0,7ac04b89850dd4c13fd178af0a23f600897d741bf0b6409f6d9c0faa5fbe4cd3,2024-08-01T13:56:24.363000 @@ -252994,11 +252997,11 @@ CVE-2024-3204,0,0,5a10b779eb237794920970ea98df609533768062f7220aad3ec409486f83f9 CVE-2024-32040,0,0,2a59e6bf326f1328d8546c65d2762aad2ca566269dcea32017aa265f455e3c0b,2024-06-10T18:15:32.390000 CVE-2024-32041,0,0,bef43cb3c4ff2b6bbee1ac08a3a8a3150c93da1520ec94fc65261262f1d069b3,2024-06-10T18:15:32.483000 CVE-2024-32042,0,0,355f48ff21d72da3b9838bdef5e12f2a2c2d8ea5a789f4872ad15499dbe5842a,2024-05-16T13:03:05.353000 -CVE-2024-32044,0,0,7087433f28929667c222de39bded6c86850f8bf2427cd437b464839452278956,2024-11-13T21:15:17.763000 +CVE-2024-32044,0,1,29fcd2044604ba1daf71b4a358b0229edcb866736174ea5add1cd18e60954863,2024-11-15T14:00:09.720000 CVE-2024-32045,0,0,d9b3b8d7cbb47251e891c2a2067a997e9d9e0aef9dd4387a3cd863053ad6ba61,2024-05-28T12:39:28.377000 CVE-2024-32046,0,0,127aa65607887fd88339f17f0e1e9b6c2609d669344bd9783292254a6884d7da,2024-04-26T12:58:17.720000 CVE-2024-32047,0,0,a198c8a79835b1d83471515e78aae6b4f1f4ae4457845d496dc5b497e6e9e88b,2024-05-16T13:03:05.353000 -CVE-2024-32048,0,0,703bbbd12118cbf9966a8d0dd1a4430b0477b157c4cf1c944d88f38eebfdfee3,2024-11-13T21:15:18.013000 +CVE-2024-32048,0,1,dcbb7d2b1b84763f8715a6da1c30e312b2c12ac8e1ce8a396f9e0f38683d522c,2024-11-15T14:00:09.720000 CVE-2024-32049,0,0,d35a34bd25ca74b14076b651af92560e4e0a548295ced56eebf406c2acadf1b2,2024-05-08T17:05:24.083000 CVE-2024-3205,0,0,346ca69b09129b4c06727922b86e459ce3cb5d6f9647014bc2e489da71546615,2024-05-27T15:15:08.930000 CVE-2024-32051,0,0,e28a1e0c21bc5f7358767662bb9a7b790bf9856f0536eacca66c7e2c127c26a1,2024-07-03T01:55:45.237000 @@ -253264,9 +253267,9 @@ CVE-2024-3248,0,0,250b2dbd79112a5c409f75ad686b891df81af7a505fb4de44a036ccb0053b1 CVE-2024-32480,0,0,19c71cf4b4927bc3b3fafd8de700ee992dac8872f5c7a42dd66fe5bbf9c168fa,2024-04-23T12:52:26.253000 CVE-2024-32481,0,0,c54808d23bab7c98fa436bfac9ea5eb550592b31e4fb9b6afe22c10c85cad030,2024-04-25T17:24:59.967000 CVE-2024-32482,0,0,5a4b91f74f5513de658c6d05ee36d1ae3d22e82071be37fe63fc64fe4f8fa23a,2024-04-24T13:39:42.883000 -CVE-2024-32483,0,0,c416748a10d71c4a6f44aaaf819eed33d8f64f30f3b630739684714f4f85c5df,2024-11-13T21:15:18.270000 +CVE-2024-32483,0,1,ec309708779c7d67d94d4ab6d1420cd4d97f5965bbeb3c95e49274397024b914,2024-11-15T14:00:09.720000 CVE-2024-32484,0,0,841fb97965ab4479f29c48487f7eefb4217e0294c7a236e1213d3e2e18152bd5,2024-09-11T14:46:02.483000 -CVE-2024-32485,0,0,91c5d6e5f5bb3f808cc05ef35affd2c1e20e45556c90d200e22a9122e641bb4c,2024-11-13T21:15:18.520000 +CVE-2024-32485,0,1,08a6921a5432a718e7fa1d48e03f42c0b05e237f0cf36089f30f72c4b222334b,2024-11-15T14:00:09.720000 CVE-2024-32487,0,0,9b75323b8c9e4bc0024b685cf9b8c4f1bcf527dbb8fcae997b90b5ab98a4af95,2024-07-08T14:18:29.363000 CVE-2024-32488,0,0,a412842bd8b825cf0ccc137ff6a5e549f64f0fec820d1ace6690b9c794fe8f1d,2024-08-09T16:35:04.773000 CVE-2024-32489,0,0,159e1feadca8ba00fef63951857feba1cb8efb3d2694b3ac66347dedca764d98,2024-08-19T15:35:04.270000 @@ -253443,7 +253446,7 @@ CVE-2024-32662,0,0,5f003072f7211f34b59274650cc76076b71e9dd9df104678309b3e242e3ce CVE-2024-32663,0,0,f2fcb4ba191e2db4c103fe37b60d13e4202c7ed224bd233cedba9fff1ee4aaaa,2024-05-07T20:07:58.737000 CVE-2024-32664,0,0,7b65453ace3efd93d2cd0a4f397cf5413b4c9e5ae106db66ef45b39a143d4e8f,2024-05-07T20:07:58.737000 CVE-2024-32666,0,0,585ef297a7f1cf279098360207e1cfb775ee523d89cd54ed887150532cb5d51f,2024-09-23T14:47:22.033000 -CVE-2024-32667,0,0,4b965a675cc69e7dda5488298a4d0d6abf7886965bfdbecc9bbea8fe29afe464,2024-11-13T21:15:18.760000 +CVE-2024-32667,0,1,5ee5117ac0f3c8bdda381bf21999aa50f87a29f8ef25dae5944d192220177cdb,2024-11-15T14:00:09.720000 CVE-2024-32668,0,0,fe0a58fb56fe763cf142e84ed9a793b91b7f497782b7f4a42a54a40fcca1727a,2024-09-05T21:25:38.810000 CVE-2024-32669,0,0,1c249494e22e7c275a812095677f2945379060d0cae4bdfd8500bbbde31f40b7,2024-05-14T16:12:23.490000 CVE-2024-3267,0,0,940010b55b9a616638f110687c77a6c496dcf0d2dfd170d1aa59ab5c8e848149,2024-04-10T13:23:38.787000 @@ -254134,17 +254137,17 @@ CVE-2024-33604,0,0,f300ec136103721a36b6f9e3ad22fcddf48753bfae597ae6d6eb99e8e877f CVE-2024-33606,0,0,e277f7ddb9a42d3084a4fa02dbc3b1b3d63499186ceb3e463e593da1b13af1f7,2024-06-13T18:36:09.013000 CVE-2024-33608,0,0,2634f245511a2ef8bdf0a976af80480a0940742ffc95fa320a1cb750a797cfb7,2024-05-08T17:05:24.083000 CVE-2024-3361,0,0,3987591b20407a1c515606479571376257c715748e7334237cf48ed958e6de1a,2024-05-17T02:39:52.620000 -CVE-2024-33611,0,0,eb42fec3d132926811ac6f185ea2030119419e50e4764d622751d208ff7ea89c,2024-11-13T21:15:19 +CVE-2024-33611,0,1,cf39a65aaa20c224e34d51f4ed23923edc045062aed1a2cad8c463648c07e8b6,2024-11-15T14:00:09.720000 CVE-2024-33612,0,0,74c7c883d3664c00836e065c241cfad127fb1c2fb9de0c3022446dbc1326076a,2024-05-08T17:05:24.083000 CVE-2024-33615,0,0,2c0c4d1e8ef406786c1679d725fd5d6b0a90745e47351d773c9f2720f2fe7461,2024-05-16T13:03:05.353000 -CVE-2024-33617,0,0,e9ba05fd11b89014a0ccf01a8bdabc884cb4f58878092a0044d6024b0e2dd7d8,2024-11-13T21:15:19.243000 +CVE-2024-33617,0,1,48b1ad41b5cd3e3d5db84d8c4b46a345ab8193d6715efa3057992b1f283e39f6,2024-11-15T14:00:09.720000 CVE-2024-33619,0,0,2684fa8fefc27f2e1a5ed51c39fc9579fbba8ac802fe77fdcca9db705628800f,2024-06-21T11:22:01.687000 CVE-2024-3362,0,0,d92169c3d8c5742c227b67545a8be3a4af52d45882987a88c4a23c2fb99ad420,2024-05-17T02:39:52.720000 CVE-2024-33620,0,0,e869b572e67eecaa04960c7c1c826ad66c9d71964f8469bf34eb9ac43afb5484,2024-08-13T20:35:09.233000 CVE-2024-33621,0,0,ed1eec35bbbbdea80d33a8bbcfc24d343e0426fb309b2aaa07ef1d5e8aa29271,2024-07-15T07:15:04.067000 CVE-2024-33622,0,0,d58465a4a66214b50b1796cf92386e687ba2dbe496bc818c44d1f85dc4a8973b,2024-06-20T12:44:01.637000 CVE-2024-33623,0,0,116f3edcd13359aa5adc6eba23f440de570db71265bf02d171d8168c6f224fdb,2024-11-13T18:43:10.740000 -CVE-2024-33624,0,0,a2eb0331b63c4a1ada5e7edb3b6c0501fff0fa7d9fc8a5f2f8beb07b5d404c00,2024-11-13T21:15:19.510000 +CVE-2024-33624,0,1,ce1a80935469c9fb189b2f99578cb0b232bfca170955c09f368016008a1604e5,2024-11-15T14:00:09.720000 CVE-2024-33625,0,0,645afc1357c853e892786758021f6a244aedee60fe13b747d548e0f0fed77836,2024-05-16T13:03:05.353000 CVE-2024-33626,0,0,6efddedb3f8b7377c52729fd1e446561bd59fbdd48df7eaf407a8231acc10462,2024-11-13T18:43:57.057000 CVE-2024-33627,0,0,739561a300c8e0c5d6e0776600829ec1cdfa9e9832b6a16afdce5ca14d9efae0,2024-04-29T12:42:03.667000 @@ -254253,7 +254256,7 @@ CVE-2024-33786,0,0,4c34eaaeb6404bd11728362ca0ccaf1f06d8896bfaa0a8e30f5a7055f9db9 CVE-2024-33787,0,0,c79d3756f20fa8608bd38338556aeaa798aa21ec0e9c3dffe176487918ad4adc,2024-08-06T15:35:13.693000 CVE-2024-33788,0,0,db496e414e9eacb69df835d7ad8cccbd3f6da6b6998f07eaab69cafc694fe336,2024-07-03T01:58:47 CVE-2024-33789,0,0,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd63d5,2024-07-03T01:58:47.770000 -CVE-2024-3379,0,0,e72123e670b36578febbe2bb46d6c313dfeb7d39f810ad5f1278e7e7f1aa3fb0,2024-11-14T18:15:18.503000 +CVE-2024-3379,0,1,0b3639db5143904888f6d79b3c1af3e16e2bcb8e425bced038c913edaba9bb8f,2024-11-15T13:58:08.913000 CVE-2024-33791,0,0,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000 CVE-2024-33792,0,0,7c7c9a5cdc3e6c8c82320ec108a0ab3708c01bb96dfb27d34785495a231c6066,2024-07-03T01:58:49.357000 CVE-2024-33793,0,0,657ddfb93c384e79c20456942320d557ebaeb8c427e62d4fba5eb78b0e45cbc0,2024-07-03T01:58:50.130000 @@ -254449,13 +254452,13 @@ CVE-2024-34019,0,0,ff720c73d7b799cb466f79ed87b9acbf36d22c868dd2f8e93b3f0bc554584 CVE-2024-3402,0,0,9338564bd22c4003db146afde9bd8c1a92a594a6c110944ff805be3cba8ce58e,2024-09-24T14:04:44.507000 CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000 CVE-2024-34021,0,0,ba9a52b25c7a77dfa7bf1a07f5ab53755e56e707c7456547716a3d28e95401ca,2024-08-01T14:35:09.920000 -CVE-2024-34022,0,0,be9885513277c89f570605eed77c69263618a366c08bc63a2f2c3cf50e97f925,2024-11-13T21:15:19.757000 -CVE-2024-34023,0,0,46316aeba3909b543e52d9163276711793709e84b348a40fc6705c2c00647d31,2024-11-13T21:15:19.993000 +CVE-2024-34022,0,1,7b23e7a4942e184fec33b1bffa07086984aca57ed7d3dd370cec1e2a245271cf,2024-11-15T14:00:09.720000 +CVE-2024-34023,0,1,4dad96a4b3405ff5975c0f7d1a940e81b4b229c6fe69b1b44167ee14d10f47a5,2024-11-15T14:00:09.720000 CVE-2024-34024,0,0,0a0d832c0db4d58a70ccecce54b6344b3f181daaf3ed5285ed66313a40334a22,2024-06-20T12:44:01.637000 CVE-2024-34025,0,0,edd2792f368696b38d90328f1c1ccaaade65bc2e70f896834331ba779fb27dd0,2024-05-16T13:03:05.353000 CVE-2024-34026,0,0,d23e70be79ae55b32e18d5911869778bf5369290a7a856aaf669d9f9bc7f7d52,2024-09-26T20:52:39.357000 CVE-2024-34027,0,0,665288561aa105eb3ace1a2e821548dcc73a2a65b6f5aec99c3e8227e5375b1e,2024-11-05T15:35:13.297000 -CVE-2024-34028,0,0,449114bc782ba8cf7ae9fdfaf353aa1132d2ee473914f4ec16d940a760b33bb2,2024-11-13T21:15:20.247000 +CVE-2024-34028,0,1,a3a07b51d5aa0818b6ec8ab4e731fb278385db3589960d5a656ff9b167059806,2024-11-15T14:00:09.720000 CVE-2024-34029,0,0,f5d25bd32468c541a51740035f23234d8d5f3f16a79d2529894430e4831fa01a,2024-05-28T12:39:28.377000 CVE-2024-3403,0,0,b6e0e9c5c8bbba14526747c5960a7a5699ede8dea782a1ab2b3e6a77206d4587,2024-05-16T13:03:05.353000 CVE-2024-34030,0,0,d69df042bd8c46231655367245aee1323839b1ad1303155a792446d5da60613d,2024-10-30T20:35:19.987000 @@ -254578,11 +254581,11 @@ CVE-2024-34158,0,0,0fd72fb00224cfe4f9ed8cacfff4aeadb87d2bc96dad7a6b5b064905d0cc5 CVE-2024-3416,0,0,a081ed6eeab1f8c610822f30cf17aa2151f535dbb3c22c142c8cc9d4a77c8f63,2024-05-17T02:39:54.337000 CVE-2024-34161,0,0,bbdc550af4eb522ba0c0a49b8f0b0f2b8ab2486eb88097c00d555e9de7e4a0b7,2024-06-10T18:15:34.770000 CVE-2024-34163,0,0,2f9be74221a126c780fee9df35c4749361e313e79808498cd64aeaba263e49d6,2024-09-12T18:59:30.753000 -CVE-2024-34164,0,0,d31e52f4b8414563dc530f96235f06519a38321585993d0e19e31a8d53d2e197,2024-11-13T21:15:20.507000 -CVE-2024-34165,0,0,4e7df92d889f948bd7b0db7779d2a425023bbd80f8db8c8fb9af38371e05ad4a,2024-11-13T21:15:20.763000 -CVE-2024-34167,0,0,13c72ef17fca6815ae041d53f9b1f9a62c53beeb4c274bf58cb3a46385f220c0,2024-11-13T21:15:21.013000 +CVE-2024-34164,0,1,efd8b638f6022da57f6ee2faeaf60e8940a4bab962493112791d300389f055b1,2024-11-15T14:00:09.720000 +CVE-2024-34165,0,1,5f3c8ad4b4e4d0e5bc71a03e42e033328c198fcf3d84a7a78168501b66f95043,2024-11-15T14:00:09.720000 +CVE-2024-34167,0,1,aeda5377618eca35986281ed9d38c406cb3ea14894f4eed8413adfa9746a4305,2024-11-15T14:00:09.720000 CVE-2024-3417,0,0,ec2cc67e87ef08b286df0e04fd0b771b8794998f9cd38dab847478283ab7b53f,2024-05-17T02:39:54.430000 -CVE-2024-34170,0,0,3f9e07f216dbfcbfcd47da93744db8d51279e2263af777a1bf477a8ba358d31f,2024-11-13T21:15:21.280000 +CVE-2024-34170,0,1,85f9d5cba5ac450a886d1f7c655dc8e577cb71c8f388c153a7ce1046384cf9ed,2024-11-15T14:00:09.720000 CVE-2024-34171,0,0,c11d75efd1e3db81369447a70f71be2cc6b80f6bf0101a0af8950c5eb11372dc,2024-05-31T13:01:46.727000 CVE-2024-3418,0,0,502fc54d23469afbe964523306f6a78a43aa4bbda684d42d8a15714665a9197f,2024-05-17T02:39:54.520000 CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233e2,2024-05-17T02:39:54.607000 @@ -254791,7 +254794,7 @@ CVE-2024-34466,0,0,dd736f9a85d19253650a199739cba2301673ec6ec2adc5e7de09970e86411 CVE-2024-34467,0,0,903bd38a14a72c5e31ca95b7f024225144ec2f1cfed11b0213915da81da29f0c,2024-08-16T19:35:11.493000 CVE-2024-34468,0,0,b164ab2b609bf8b9d79a88576e6595ba967431973eb7a086f2ba71149d9690e8,2024-05-06T12:44:56.377000 CVE-2024-34469,0,0,c68e04abdf928312d44ac341a209cf5378ddee40d6b8b27a9211f964972de340,2024-08-01T13:52:22.830000 -CVE-2024-3447,0,0,ac8d540e8e074eb9e1d447a69aba75608690bbc7caea682160f4ae74862ba7cf,2024-11-14T12:15:17.743000 +CVE-2024-3447,0,1,b6e83f6d0454d82bbf78ae398e06e86ffce6005193a0451419e0df83af742b83,2024-11-15T13:58:08.913000 CVE-2024-34470,0,0,c26a3e4e103c3a39ccd71f6b73acf5c04b4f366cb36f58bea718bc4b8f16af48,2024-07-03T02:00:10.887000 CVE-2024-34471,0,0,532d16184865828974b7b8bfccacf00acd1cea4229675a661e47fbd9ede966c2,2024-07-03T02:00:12.450000 CVE-2024-34472,0,0,849451fca1b199d715cc88e41dff8ac49cd790dbac58f51bec15328bb61654e2,2024-07-03T02:00:13.630000 @@ -255022,7 +255025,7 @@ CVE-2024-34714,0,0,e231a4a259714202f61a69bb06497a65111477c8e99d84b716409e7518cfc CVE-2024-34715,0,0,a82e11e04c452d1bea6b0a9824b74b6f2046192e0be7962e7e2d23b74ac2865a,2024-05-29T19:50:25.303000 CVE-2024-34716,0,0,6c3b1bfeb59833afa0878217bf084cc4cde82455598fa083dba17b1e1360762c,2024-05-14T19:17:55.627000 CVE-2024-34717,0,0,9708a1af9b10bdcf029cd505a3cb07145d8977f96260cc07b0dfdf42dc2f21cb,2024-05-14T19:17:55.627000 -CVE-2024-34719,0,0,6509dac5d4e8a7f2cdcfeb42852d7e5d9efb42f55153585bcf2d16c7c627fade,2024-11-14T19:35:05.990000 +CVE-2024-34719,0,1,58c35f491a3b3ca454b7d586d09fcb356bc7cb2ca4d5e08c119ab24bc5d9d8a8,2024-11-15T14:00:09.720000 CVE-2024-3472,0,0,72b7d7dda7b4399aa8e0987dd9661c2b209f511d24633ce5f0fddd8a616a16dd,2024-07-03T02:06:14.580000 CVE-2024-34720,0,0,d5f9e320876749ef63f3ae3fd855102efef7812668f3ea77cca5b86835b0fa9f,2024-07-12T16:11:36.933000 CVE-2024-34721,0,0,e10eab3e44bc304347c4431c31d705a2c4a55c2499e0412aab4621d1d6ef445b,2024-11-05T21:35:07.660000 @@ -255032,7 +255035,7 @@ CVE-2024-34724,0,0,913fd057cda1c7d4c484876a49aa72529e900891c98a4a2d61e29b59d9444 CVE-2024-34725,0,0,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6cbf,2024-08-01T13:52:25.887000 CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000 CVE-2024-34727,0,0,75befb2ba24a3b4b3047b7cd5fae93e6c869e1a4a8df4db9070d6b118a79dd7b,2024-09-11T12:43:45.260000 -CVE-2024-34729,0,0,d15a507dae4941845582ffc8e24580cdf9ee1b2a7424644febf4bd7844d1b822,2024-11-13T18:15:20.337000 +CVE-2024-34729,0,1,54de913c260765be67c48041f77073710a2847abf55ca4fe236c2bf5de701ec8,2024-11-15T14:00:09.720000 CVE-2024-3473,0,0,174ffd5ba26767424b634a780ad377f8ae33849c44036babd665d0b98ce27738,2024-05-02T18:00:37.360000 CVE-2024-34731,0,0,c2796903b18972c85283f94e39f216adab1245ab24ab7429de75a096f2bef3ba,2024-08-19T13:00:23.117000 CVE-2024-34734,0,0,03ca469f8cd315011dd153921c263a875a2212423b28ba9a9477308f69d8631d,2024-10-24T20:35:05.433000 @@ -255045,7 +255048,7 @@ CVE-2024-34740,0,0,cd68171e55105c9a184cdc72c371579137a9ca2bcc91416cae3d7556d14ec CVE-2024-34741,0,0,92c683bbe77a7f293c2037090a232d821770d81c7905215e3ef6319cf6b5adba,2024-08-19T13:00:23.117000 CVE-2024-34742,0,0,ae7622882d0f2f3d011507be8bcb7493359b0ef6aaca92f56d7280395d35123c,2024-08-19T13:00:23.117000 CVE-2024-34743,0,0,9a08509f1ceb4bbb716866bb59161611c0588d77430a21c15b6c1621568bccf5,2024-08-19T20:35:16.253000 -CVE-2024-34747,0,0,51976d7e64b5102df0e10bcd03b2d521344885c7f5c7c2379156b555713ee5b8,2024-11-13T18:15:20.410000 +CVE-2024-34747,0,1,2d28e87671e44808335b186af8072869a96462e808f2184392e92b73bb99c621,2024-11-15T14:00:09.720000 CVE-2024-34749,0,0,048a4718a6adf63bcc95dd588dc6297f930a23113bd2619e190eb8b7852c3de9,2024-08-02T03:15:45.390000 CVE-2024-3475,0,0,3d68cde343ddcb97ac984b733d2ae7662c97a24c514b9a563c1c306f42f1759f,2024-05-02T13:27:25.103000 CVE-2024-34750,0,0,c670e390c383fbaa0e17449b121645c068a83500fff53e2ba8ec3633bed5a922,2024-07-09T16:22:37.120000 @@ -255074,7 +255077,7 @@ CVE-2024-34770,0,0,2eeebcb7dbb27d6d916fc0bf7ae4dafa0841a8c9eaa13ac31a6919da323f2 CVE-2024-34771,0,0,452ec502adbdf587176d97ed478a2d6f8beb3a64c98f7d59c911ddec3954d67f,2024-05-14T19:17:55.627000 CVE-2024-34772,0,0,bf5aa55974c4947b2a40ae851f7aa83dde7195e97317e1244709204543c5bdfb,2024-05-14T19:17:55.627000 CVE-2024-34773,0,0,100b1cb449b7ae251f86bd995ac4446f704b2d5bcbff0a59ab0bc97995491271,2024-05-14T19:17:55.627000 -CVE-2024-34776,0,0,45613871b3e076f024ec06465388ab7e203b433c377520e627719837b3506317,2024-11-13T21:15:21.520000 +CVE-2024-34776,0,1,c35f4786753f7787c740d9c77c4bd6de052654b924db04a30c1cfcfea09d2aa5,2024-11-15T14:00:09.720000 CVE-2024-34777,0,0,47369db5c522c34e9489779523e2c10406821ae54d821b2c269278d042fde193,2024-06-21T15:58:51.410000 CVE-2024-34779,0,0,61552efe08011b21d4ca3c0787e9337089cecf0917e51cf3275efb7daf3d34a0,2024-09-12T22:35:06.133000 CVE-2024-3478,0,0,d6058a0e6db67f9fedb470e62fc4a04776cf84b327b4bd61639e707b408d963f,2024-05-02T13:27:25.103000 @@ -255206,11 +255209,11 @@ CVE-2024-34995,0,0,c5ae887edb3d68f5b17625c821aa1f4eef9c82bfd086996cef9a6f896adae CVE-2024-34997,0,0,5fbdf010972a8268fd5a9463e95189eba51629c3cae1b641fade25965bb6360c,2024-08-27T15:35:16.800000 CVE-2024-3500,0,0,65f7cd29cdae6ff6308db5dac7c1e408d4ae13919a645c3f45d14d5a6eb829b1,2024-05-02T18:00:37.360000 CVE-2024-35009,0,0,3fe7a6685d547c8f13c78e6aa6b52334336d0dbec9afe2301a9c305ba9814939,2024-08-08T15:35:12.080000 -CVE-2024-3501,0,0,ab0fe1f3dce1fe66b80d12a62cfc54d2e4dd51a2f66f7bab1f837d3a63819abb,2024-11-14T18:15:18.713000 +CVE-2024-3501,0,1,097e8a9362bbd50897a07cfa11bacf1e8874a343e2a4be0465724b821185ab5f,2024-11-15T13:58:08.913000 CVE-2024-35010,0,0,6e4b79d2c02224bc0070ffd30b8ebbf9821b5f9a967abd7e45b682dfed020dc3,2024-08-20T14:35:18.007000 CVE-2024-35011,0,0,20c56ae7701ad2e917dd6b2ccceeffea8e94a8ddd9a2b2ca02beb893f0a0b7e1,2024-08-19T17:35:16.943000 CVE-2024-35012,0,0,c8bd09796e971cbd360d6bb5909687d1917c7ee2369b2a3730c7a0355d3c5511,2024-07-03T02:01:12.127000 -CVE-2024-3502,0,0,d04b21de3058acac73afb833001910f0d9412a3db1c01740f30b8d218c869c4a,2024-11-14T18:15:18.943000 +CVE-2024-3502,0,1,eabbd93f1d9b7f453fb7ebae4aac0fd4ce587ab0f9f2a18d8bbe28cd7c3c4aaa,2024-11-15T13:58:08.913000 CVE-2024-35039,0,0,16789b799d84c4b57ca393e0c1f64a27f89bdf5208029185a91c381dd5f853e1,2024-07-03T02:01:12.907000 CVE-2024-3504,0,0,e2de0e6f69991c8d2671ce35086e9faed799d2b484a27eddaabccf584b0c7ea8,2024-10-09T15:27:06.437000 CVE-2024-35048,0,0,7d2e40c430e02cb68d065988844aba370a92c807c6984a33499abbf4ef502def,2024-07-03T02:01:13.607000 @@ -255303,7 +255306,7 @@ CVE-2024-35198,0,0,7592c428e1bf061ba03a09a77c9fc676ecc19ee3535a3f1dd84fdd07d6a08 CVE-2024-35199,0,0,10d88a39b30b98eb1ab39fdfe91d64eca78a834d79f0e8d397aca33bb33c48ea,2024-08-07T16:15:44.737000 CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13fe,2024-05-02T18:00:37.360000 CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000 -CVE-2024-35201,0,0,2db1a163bc1fc960cb4bce5b155bf9448fecf6f215ec404871e7cb3b730550d9,2024-11-13T21:15:21.773000 +CVE-2024-35201,0,1,b30e0c3a88de4989772c1b3b29ea072e0e535b3a02eddc8535a86932d65eca8f,2024-11-15T14:00:09.720000 CVE-2024-35202,0,0,4af51be94f170b8c7faf730b20ffce243593310efdd5d249d08c2d764ada1552,2024-10-15T12:58:51.050000 CVE-2024-35204,0,0,2ea5b7f3f64c9f31f0a98ec693d23952b0be3ff72b74340b9fa74f103be148a8,2024-09-26T16:15:07.840000 CVE-2024-35205,0,0,b114736c6ce96d182acaf33482dfa6527b14733d7c35394119539255eedf2feb,2024-08-20T14:35:21.557000 @@ -255344,7 +255347,7 @@ CVE-2024-3524,0,0,caaaa672c1583c111467dc987fb30c87160b7f141d39c66ef33b7bd5d6f222 CVE-2024-35240,0,0,10f7cfa87efb80189efe3d266bfaf6f2d74876bd1f9be0a2a318dfa5c5196863,2024-05-29T13:02:09.280000 CVE-2024-35241,0,0,cb282beda3e169f0ffe5213a46ad14d5235aa62b1613d6fd39f98e381add4a7d,2024-06-20T09:15:11.993000 CVE-2024-35242,0,0,582d7cb6c304b8940a8805c990f3fb7ff37dec36204966ddd8a9cce31009f1cf,2024-06-20T09:15:12.140000 -CVE-2024-35245,0,0,6e39aa29f6e1964970afad6f3d80ce82293b09a98acaaea1c9749ebb0c2fb488,2024-11-13T21:15:22.003000 +CVE-2024-35245,0,1,0abf4f6509e66549f5f43f7be33ca478585d0e9b90c24e0597504467160d28c3,2024-11-15T14:00:09.720000 CVE-2024-35246,0,0,cc5250190c0b6d05aacf7ab7e1559a6a667a42d50dc12d387326d113c4c39730,2024-06-21T11:22:01.687000 CVE-2024-35247,0,0,88bbd7eea3b694f188b138a274c2cc76eba6f7f74ce49816ad3caef11da1dd52,2024-06-24T19:26:47.037000 CVE-2024-35248,0,0,6f761ad0894cbff75e1c7772a20ff086c968454140c8bb852c982fcf9f1a31bf,2024-06-20T16:38:22.977000 @@ -256177,16 +256180,16 @@ CVE-2024-36238,0,0,731ec648c7a4b37d3d9981730990df56da762b2c31663b42ba5ac64d30b38 CVE-2024-36239,0,0,e66429661b644353e918160353ee5e2167a6d0894e5b77a9d2b6393099a7a98a,2024-06-17T20:20:18.633000 CVE-2024-3624,0,0,af8bc198a1edb70d7feacc6f3d2793c7e8656f5800282a4e0dce44ca2e727e34,2024-04-26T12:58:17.720000 CVE-2024-36241,0,0,b4fd0c32db9ad6a0b3feb22ac73a4f053b381b184e4f898e9ee2d7a50f7f8ebe,2024-05-28T12:39:28.377000 -CVE-2024-36242,0,0,aa7c45c22002e2c12ea6d9b8585e7724421baec1ce788d199eccdf55877d9b8d,2024-11-13T21:15:22.237000 +CVE-2024-36242,0,1,948f20d8cdc28d8fae77d4ab5c7426991c25b0847dae3637aa9b6097b09a994d,2024-11-15T14:00:09.720000 CVE-2024-36243,0,0,29dab3a6b5eb0bbcb070b16ccb36842afdc1a26e250f57828442ca058f96401e,2024-09-09T12:21:53.383000 CVE-2024-36244,0,0,72ec9199c50b58fba1710bd51385a13f86b624ab2159e939e6a1444afbe8dfc0,2024-06-21T11:22:01.687000 -CVE-2024-36245,0,0,2a3b56c6f77ab27067ab462dff7f04da57eee3c95a1a9438f3f26c40b9ad2205,2024-11-13T21:15:22.493000 +CVE-2024-36245,0,1,dde3668c508a0a731afb7367784c1ce5e9599c5845e89faea97d8a30d6c66563,2024-11-15T14:00:09.720000 CVE-2024-36246,0,0,d22d56b3ac190fbff4b5b820bf9253b2e2f7fd0137ac45e12945d45896804b68,2024-08-15T17:35:07.080000 CVE-2024-36247,0,0,16c6efe40503daf1080fcbf6d9a009e1a3c1386098439c6bda19cf80a4941086,2024-09-23T14:16:11.290000 CVE-2024-3625,0,0,fb0a948a4b5da0bdab04bf1595a286af67dd68466c0feac9aee7f6c3556ca9e2,2024-04-26T12:58:17.720000 CVE-2024-36250,0,0,84e96f986a29ca7154d7560c7f995480a77fe85044db24411c2c6dac77be0279,2024-11-14T17:11:23.913000 CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000 -CVE-2024-36253,0,0,06043dbdef5bfb8c85e10716419691bf2f83dd9066a2e1afc5045e796a57514d,2024-11-13T21:15:22.730000 +CVE-2024-36253,0,1,440d7b8249c4286c7e09d3a45cabb0a3006bd48cbd66e9aa33e43eb576c7fb12,2024-11-15T14:00:09.720000 CVE-2024-36255,0,0,a469b4be0a60fb4a2e32368cbd9ff1f41eb30d9e30ebf5e64783accfe9b2d73a,2024-05-28T12:39:28.377000 CVE-2024-36257,0,0,de59e82b2cc868e7dbd975a3494539da4e2b96eaf9e15fff111a5d725848914c,2024-07-05T17:06:28.517000 CVE-2024-3626,0,0,ecad313ba7341fd9bbe18ef0c6d316a3039cc88d660f7ee647b2392d610decc0,2024-05-24T01:15:30.977000 @@ -256200,21 +256203,21 @@ CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e093 CVE-2024-36268,0,0,506bdd503241b054b98e469c8190767746cc55f82420c89947b6255b68cd420b,2024-08-27T17:19:43.653000 CVE-2024-3627,0,0,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000 CVE-2024-36270,0,0,3a197151a024bba12721f1588c9d9bd5bc71631bbef10c0636165f353f48f0a0,2024-09-09T13:16:22.050000 -CVE-2024-36275,0,0,4dcc85abca22a62e5b402e704199ae0ff4bbf6b532d5b48d3ab903b352f9f994,2024-11-13T21:15:22.987000 -CVE-2024-36276,0,0,774e048e53ae7f12d1a145ce0270a6507f6606fe728340963d470b1e9bd757e1,2024-11-13T21:15:23.253000 +CVE-2024-36275,0,1,487a1d13cdb0e2804d6b6b7a6688fa44dcd111fde6b4f7ad7eae2d7916dbb067,2024-11-15T14:00:09.720000 +CVE-2024-36276,0,1,c9c845fb57a876241c04a6ca03c9d6f88f58341d35b59d1bfe3fd800d79f949f,2024-11-15T14:00:09.720000 CVE-2024-36277,0,0,94264d57b475e2e31a7e48502c2a39dffb9729ea0c8a56f3b75bb7d3d5d2006b,2024-08-02T04:35:38.880000 CVE-2024-36278,0,0,4945d0ffe4c056118d1dbbf9f47438cd1039ab9e5603c7cf52cac309f0443d7c,2024-09-09T12:21:53.383000 CVE-2024-36279,0,0,ae6d96e367108cc090e0cf1f9382ed63328248da9c7d975607021f129b51c4ff,2024-07-03T02:03:01.997000 CVE-2024-3628,0,0,d2a16bb2e0ca783e20096bf35e3f91c09dc2bc7f0a3b813f429c51b8aa3691ef,2024-05-07T13:39:32.710000 CVE-2024-36281,0,0,3c26e9b44165c28e13e77d449048c3cb1d69d3587e4fcb2660aeaa7d88871486,2024-09-09T13:28:25.937000 -CVE-2024-36282,0,0,5c436bd71fc6a34f8d145608605710e49fde12bb5a3c294028ba03099d7b3960,2024-11-13T21:15:23.500000 -CVE-2024-36284,0,0,c0989aef04b3e0f269b2731010fa16718ca233dec86cf2b67ec35b234658d3ab,2024-11-13T21:15:23.793000 +CVE-2024-36282,0,1,2ea89db377451e49f06fc04c2ac5cac8cc2fbbc6de1bb92c35a87faef3153225,2024-11-15T14:00:09.720000 +CVE-2024-36284,0,1,016c4fa47673f1d3acfdd501ff93fb6005d1722096716132a33dc143f2cd681f,2024-11-15T14:00:09.720000 CVE-2024-36286,0,0,7d09221a564e0c2df0ff5611559a80db23ca3f0bea1adae57d3ef567da0d5321,2024-07-15T07:15:05.140000 CVE-2024-36287,0,0,58cd0f96868d0f87ad27a0900cc18166044a8ed0400369c58b15a0b5d92f53af,2024-08-07T16:13:00.603000 CVE-2024-36288,0,0,f27253452fa242bd38d9e8a6852071d40fc41ce412d6b25543b2bb1fcbe8c01c,2024-07-15T07:15:05.230000 CVE-2024-36289,0,0,c81e4dcba680502adf1e6cb5fb9cf85188de117b98260b47eb77431186ce409a,2024-07-03T02:03:02.973000 CVE-2024-3629,0,0,e776b351c13d8fab7d20c1d77ce24b1735377c1f0ada7e55eb9590007cc5c2e8,2024-05-15T16:40:19.330000 -CVE-2024-36294,0,0,b6c6254dee4e1f3b03aa8466e90b63f4569d9bf9195db83afb62f4034d310ee5,2024-11-13T21:15:24.040000 +CVE-2024-36294,0,1,ab00c27961eace667f9ea5e5ad7b6cd8c0f468a3668d36549eb32d498e33b135,2024-11-15T14:00:09.720000 CVE-2024-3630,0,0,bdc2182e4eec98ff9c8b84bc3c1a34a4c9de2619b28e4dcc17481a1a7a7b6f08,2024-11-07T16:35:19.253000 CVE-2024-36302,0,0,97f37a0491b91273ea881320e1230a32004b42aecc2ad6ef769b0832e9456ade,2024-07-03T02:03:03.750000 CVE-2024-36303,0,0,1057cf85b25be31ec287f99b57fc3e82f4cda691b1b5094cac55978878e142d7,2024-10-04T17:33:03.267000 @@ -256340,10 +256343,10 @@ CVE-2024-36479,0,0,dee4352def0751c2293c7f9148494e529c22ac95426bcab70e58c8c955d6c CVE-2024-3648,0,0,8ea394456a868f5cb440700cb4f3d40035b05f4bd668cd1adcf2b942f06e8067,2024-05-24T01:15:30.977000 CVE-2024-36480,0,0,8cfe7316f6ef17d7594f0f48ea5faff4d266af61040753ef41d7dc8fbca2c04f,2024-08-01T13:52:55.747000 CVE-2024-36481,0,0,c20069fe9216cf7ae5e42e62fc886e320b7997d027cb5be79eafe3b725910b77,2024-06-24T18:35:33.157000 -CVE-2024-36482,0,0,c253be81728d72e09ab2f36b5389d8ae561ca1c3e694fe66cda19861538bf965,2024-11-13T21:15:24.287000 +CVE-2024-36482,0,1,dae359e53b5e8177039f35b3dc38cb72d57dd1834336927a90433d819cf87afb,2024-11-15T14:00:09.720000 CVE-2024-36484,0,0,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba769,2024-07-29T07:15:03.447000 CVE-2024-36485,0,0,56777d4dd209683886c66b8d883e76c829b3cc4b5aa56001fcac75ddb73fe7db,2024-11-07T11:15:04.637000 -CVE-2024-36488,0,0,5a03e79e5e55db0ed69a4cb3e61e542c7d0731033896778422cc43aa9b2ebe89,2024-11-13T21:15:24.533000 +CVE-2024-36488,0,1,0b3730ee760831e1cc3419c6fd09e2a127d61516e56e574db3488906040cd924,2024-11-15T14:00:09.720000 CVE-2024-36489,0,0,2f34b177a387259c170db7b91a53518947ffa720aa7b598baba9b38f62a0e242,2024-09-09T13:32:13.087000 CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000 CVE-2024-36491,0,0,0594f931fd7fcba21d9716595a57f83c241ce75441ab3d963604c9fb9792c871,2024-09-27T14:05:54.037000 @@ -256662,10 +256665,10 @@ CVE-2024-37019,0,0,c34529539f4c6ff793225ec64e29909e2614ce1bc964c3c63810b9219791c CVE-2024-37021,0,0,df42b273589de5447bead7df7667049e2658c880af6df99f8ec35df9bab3713a,2024-06-24T19:26:47.037000 CVE-2024-37022,0,0,c89ab136485bb25fceb1ebadf25398758307a2b39977d566fcb7ed1a8d501728,2024-10-03T15:55:56.250000 CVE-2024-37023,0,0,8524a0bea62903b02ec8e898aba28cae243223cb44baaac206a78705a8ec65f8,2024-08-20T17:12:03.330000 -CVE-2024-37024,0,0,5e09a46ec87731d471c7bd35065b05b29124fc8058ebee245a8e18a415cbb9fd,2024-11-13T21:15:24.763000 -CVE-2024-37025,0,0,75d635e6c571768659b0a3b632f34bab059a81527f72e9dabd4bae3a153596b6,2024-11-13T21:15:25 +CVE-2024-37024,0,1,2caa5df609f178cdae1b513d222c22ba708f4adcb61f41292550c82a0cb9d6de,2024-11-15T14:00:09.720000 +CVE-2024-37025,0,1,fe09977a551870ee95e9267e6ccdd2bbc2bcf7169e9d4af92271565fefcbf58e,2024-11-15T14:00:09.720000 CVE-2024-37026,0,0,72a4b17689cbdac04fb86cce78128e997cb4a2e097881aab9fb79c35d7ec4f49,2024-06-24T19:26:47.037000 -CVE-2024-37027,0,0,608f16978ea8053438808b5ef6fa310e90e5cff41911d39ba3cedc94cb29f9f5,2024-11-13T21:15:25.240000 +CVE-2024-37027,0,1,4dc3e5cb80d4569b9b5d635193d722e490eb58453dc362e1599e328fb4c05632,2024-11-15T14:00:09.720000 CVE-2024-37028,0,0,b7e9c99e1fd0ecec6eefdacd33a3c9c912ef383532f72bb887cdccaeaf455e4d,2024-08-20T19:26:49.730000 CVE-2024-37029,0,0,2af12962304df614d8d33d4ab08c57fecf21a37e5688c3ed4ee5182e993c1306,2024-10-03T16:43:40.713000 CVE-2024-3703,0,0,bd96f9d277c687f2c8df474724f359223698fb8a762e1288e006520ebff94d49,2024-05-03T12:48:41.067000 @@ -256886,7 +256889,7 @@ CVE-2024-37280,0,0,ac35b85853446debbb96c46d0c81b9a57aa5a4ffc880ba0d37638e24be271 CVE-2024-37281,0,0,6b102b9952e22ea6bb07ccf242d5f0cb293d2c3d6d03a35a192358e7864801ae,2024-07-31T12:57:02.300000 CVE-2024-37282,0,0,9e75dd72782fd47fb8dcc1bf3ef22e08f7f64df6cb16c7858ce8e53d3eddfcf3,2024-06-28T10:27:00.920000 CVE-2024-37283,0,0,07a52ca714a9a80e3a78bead6f35fc6d30e576ab4ba6daa4bcb81e93f175a210,2024-08-12T13:41:36.517000 -CVE-2024-37285,0,0,5ec3c9c6ec0808543bc54e437e22bc2609a83a3787034dc5d9d288840ccb842b,2024-11-14T17:15:06.457000 +CVE-2024-37285,0,1,4b69777de4da67951c3e4ad3f7e6208102ae14e8d39c2868a6ce3e31c4613b59,2024-11-15T13:58:08.913000 CVE-2024-37286,0,0,6382030145a65eaac3e6c890da740dca7c4a6af69dff82fb27db89389bebb54f,2024-09-11T20:20:34.503000 CVE-2024-37287,0,0,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000 CVE-2024-37288,0,0,665135dee06da174ac43bb1366ac01932e76fc67d054a27a8125a1a355fb458d,2024-09-16T13:29:06.023000 @@ -257142,7 +257145,7 @@ CVE-2024-37571,0,0,f2268da0f70596d56829f3f9bf9d47661ad5192c587321bdcf916146c34ae CVE-2024-37573,0,0,7cf896a83bff7adb78d3c1fc14e6c4ef534e5b6ec963a5ca90d46c8aebfbcf87,2024-11-01T12:57:03.417000 CVE-2024-3758,0,0,9133e9ab6c91a5523f7a6c3075b39d739f115990ca9d090ea03db032b6c7f7e8,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,228c14dd97b4dcf6507c1901dec59f930e3b9b578ef9455bb0b7881e5199f2f8,2024-05-07T13:39:32.710000 -CVE-2024-3760,0,0,a76c6c9495269ad7ff459691b805bf829dd2e190006db9d3c1454ecf240be3c1,2024-11-14T19:15:06.327000 +CVE-2024-3760,0,1,76b9db3e61bfe14a00c564a1f24b36ec1cec03802d2d5f0be68505965aee5668,2024-11-15T13:58:08.913000 CVE-2024-3761,0,0,bcb7ea1ac08a49551e80d8143adffef9f2599014e2b4d32b190639643f083116,2024-05-20T13:00:04.957000 CVE-2024-37619,0,0,09797faff2df8b72db2a2f262ebdfd130817b6ee60286e6aa7311eb834d19b77,2024-08-01T13:54:07.797000 CVE-2024-3762,0,0,40d3f55de3ecbf79b02b0c0e4b35c8d9284b268357e297bc7035406e1948919a,2024-05-17T02:40:06.647000 @@ -257732,11 +257735,11 @@ CVE-2024-3838,0,0,19b80bb7728999ff8307a96193e2751434e29b0f17864fd13990588a7832d0 CVE-2024-38380,0,0,772c1db87e773ec094b30af8e675fcdb7ae8ec5c736b7a94607b2b1a80aeb8ac,2024-10-02T14:22:25.323000 CVE-2024-38381,0,0,5a68653a08804721325cf4b769157d8413d44196c0ae824bb1098e9e93c70b8a,2024-09-09T13:37:39.093000 CVE-2024-38382,0,0,5eb9605172a2cc2881cc14a987b3697e7a685364bc9cd84ed64848cef9c33fdc,2024-09-04T17:10:56.497000 -CVE-2024-38383,0,0,245ec87c7cd49a1235d489ca466063db57efda65770dbc268cd5c6a8bbf061a6,2024-11-13T21:15:25.470000 +CVE-2024-38383,0,1,ac21d97c00d07890c6f9f891435b12c728456706ca1ec7baf9ac4069f1397850,2024-11-15T14:00:09.720000 CVE-2024-38384,0,0,ae2be85d9f39947f564fb161f1fe1f488208e4ae714d2807653ca1b96b2300ca,2024-07-03T02:04:57.820000 CVE-2024-38385,0,0,ad39ce50ee10d7c4352abf70f77a4305b91c93b47f7bafc6237b8077dda885d1,2024-09-03T17:59:27.440000 CVE-2024-38386,0,0,4681bfa2c99f249f935e8a6e34318b7575619c3c0775d501b8fe8a79c951203a,2024-09-04T16:56:41.463000 -CVE-2024-38387,0,0,2e07917016b7be556e8636f847a2a08a41bc3ff19244634e21f23bcf7d332cd1,2024-11-13T21:15:25.697000 +CVE-2024-38387,0,1,014a3d44dcc0a711ef94361a639acd581d9d8567d9ef5156c648a25b68eac6a4,2024-11-15T14:00:09.720000 CVE-2024-38388,0,0,59d748481b79bef641da29fa14283366526c194312c93d8df5bfc773a451913c,2024-06-21T11:22:01.687000 CVE-2024-3839,0,0,7c6a8e24e8992e3cadc889bd78886524b88f88c58f4f3536293ab700e2d6e3b8,2024-07-03T02:06:38.637000 CVE-2024-38390,0,0,79dc30f8af84c9201715bbbab17f78ad07e2499ec7748a40259461d61601cd3c,2024-09-09T13:38:26.600000 @@ -257811,7 +257814,7 @@ CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f203504 CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000 CVE-2024-38476,0,0,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000 CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000 -CVE-2024-38479,0,0,ed83952a9f70632e9d0b7a4d5c8799cb8efdbff31e26235b2ce51a2f2396b47b,2024-11-14T19:35:07.153000 +CVE-2024-38479,0,1,a59c846ab11aea7508425cae5038126c4ec0f650a8e2bdbef76ed0cb402c0b6f,2024-11-15T13:58:08.913000 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 CVE-2024-38480,0,0,6eb9cee6c02610ad5600c451b6902c31f702ef5c26caea9038a07913b62ebd8a,2024-11-12T18:35:13.150000 CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000 @@ -257992,14 +257995,14 @@ CVE-2024-38655,0,0,9fa5962107ba530b2c50d108a64a004697f709eb8300ac16263e176994b9a CVE-2024-38656,0,0,cf4377c1c67875c41a0da2b125ecb3da0cd28ad5d1cc79dce747ea861df4eae2,2024-11-13T19:35:13.270000 CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000 CVE-2024-3866,0,0,7a39485bd1345ca492dd2d645f7c31281d1cbae5daa389ff1a3811c5ea0b474f,2024-10-02T18:26:59.520000 -CVE-2024-38660,0,0,7e82707ba70ea170b2983d4131cf0355f8148453f3cec9f6b1c3f696a4269e2e,2024-11-13T21:15:25.980000 +CVE-2024-38660,0,1,d0d9175d3816ca2e67508172ccde9924c32e55147382a7404f429ab929961a1c,2024-11-15T14:00:09.720000 CVE-2024-38661,0,0,b3548dc9d015869558d5e6ce591bb61c7302091308e2952841787fdc0fd16368,2024-09-03T18:03:36.033000 CVE-2024-38662,0,0,587269b0aade9b66f2b27453b59929a1dd57dcfa88975eb87dd718f6e7386b22,2024-06-24T18:34:17.547000 CVE-2024-38663,0,0,76edf2df49fecd967d78d8fa91a81453e6903492924f9f2a65b88c7cc552bf4f,2024-06-24T19:26:47.037000 CVE-2024-38664,0,0,418ee48bd44d13024e4f172458676dafa0328cf20a417e7f77e8ce1f228430db,2024-06-26T13:52:23.033000 -CVE-2024-38665,0,0,4765511d33420746aa47f4117379d18bb2ba0a0ae1377687803e1d089a7cd874,2024-11-13T21:15:26.247000 +CVE-2024-38665,0,1,506212d7d6c0aaa08403e6df260a713fd634a24e0ff4650b98c6bcf57f4eb78f,2024-11-15T14:00:09.720000 CVE-2024-38667,0,0,4b5489473e44a31d8ebc57a7df1b1f90dd93f1295210f54d8df43808f9aac1bc,2024-06-26T13:53:56.883000 -CVE-2024-38668,0,0,7e43aae0b71fac102b5e2314947928e2f84d3c6290716422d5119cf24f011fe2,2024-11-13T21:15:26.500000 +CVE-2024-38668,0,1,9cccf2aed35dda54c7ee0c225dd5cdcc55384758d468266d7050f37f91a362ac,2024-11-15T14:00:09.720000 CVE-2024-38669,0,0,8a7889053d25869f84a98ae5b3e4ecb1a68a4a8a2e59b74e93fe1ee4c37190e5,2024-07-22T13:00:53.287000 CVE-2024-3867,0,0,3968b9e505102e62d9c9cd090501b1f1c2cd1651a087ff43068fc396f312a659,2024-04-16T17:15:11.113000 CVE-2024-38670,0,0,d6d7f4b5a182e3647c0898f8ca9d2d3bda4d575e0843840aff165e03a4fc453a,2024-07-22T13:00:53.287000 @@ -258341,7 +258344,7 @@ CVE-2024-39278,0,0,51fae5fc06f1bea217dd270a1a945e50fc908e01cdd6aa79fc8df1b8bf725 CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000 CVE-2024-39281,0,0,3419a2439625cfc41f8c1fc2af52d02a93ea28cf83965accb2fa3b9f5e648646,2024-11-12T15:48:59.103000 CVE-2024-39283,0,0,3cb180f3de5aa4a3b64779758cf8f61008b6ae73b857127aaaa5aa752ce57774,2024-09-12T19:15:46.390000 -CVE-2024-39285,0,0,39ed6dd61d9c344e37343436e011d5363e13882f5dfa4b39a280a0ce133c986f,2024-11-13T21:15:26.740000 +CVE-2024-39285,0,1,b1c6d3c642e9af183b02a5dea78479f665c25d357dc70e9b85394065780bbfca,2024-11-15T14:00:09.720000 CVE-2024-39287,0,0,95145d1fbc5d3c99088ebf6343df14053c1bba8568afd021848bf0425c858769,2024-08-29T14:23:31.807000 CVE-2024-3929,0,0,f18b8c9cdb1e48904246b7e57e142d1a1782977d19d7fe85b4105fb3a35bceaa,2024-04-25T13:18:13.537000 CVE-2024-39291,0,0,557945eb3fbb1a8814c89e2fc458e5ea39dd1732dd1cb9036e754a14bd8e417d,2024-06-26T14:03:13.437000 @@ -258406,7 +258409,7 @@ CVE-2024-3936,0,0,eb020bb37778f80e494a260dbac71fcd852240dc2c6ce10d95e3bece33882b CVE-2024-39361,0,0,8673bcaced52217297c8c7fce708f73bcd943cb4e490aea668f5945b814898d2,2024-07-05T17:07:34.827000 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 CVE-2024-39364,0,0,b1aae8c993ed814613269c7b92bcab8df246636e5f77bcc9570a7ff102a4d793,2024-09-30T12:45:57.823000 -CVE-2024-39368,0,0,b6ce92d913d692bd337c3df76e00945119033974f99600b9fb680e2476fc6bd7,2024-11-13T21:15:26.977000 +CVE-2024-39368,0,1,25c435677ddde12916b9333776e571c91bf36c7e39133b9c9bc1ccded9657336,2024-11-15T14:00:09.720000 CVE-2024-3937,0,0,caaabb81caaba3cddc5592aabd3ee34f488b982de96c4de732a39d12bbc28dca,2024-05-29T13:02:09.280000 CVE-2024-39371,0,0,18c2ec312f19c927a5a7c162cba506481bea1f8c1f717499a86b2605ff600cef,2024-08-19T19:40:41.547000 CVE-2024-39373,0,0,49313ed17734e6debe931be9bab23ed5eb2e40aab9f298cb157f10a9804c26ee,2024-09-17T18:26:20.067000 @@ -258636,9 +258639,9 @@ CVE-2024-39600,0,0,3f218b3b2797556a97f50f1b3db443b951be2a33b8f95e3d04ecb200803e8 CVE-2024-39601,0,0,7691c6b30f5986c79e8398298f8afaed5e766d08eb3fdbaa17ee23cfa6227202,2024-07-24T12:55:13.223000 CVE-2024-39605,0,0,a5d8e60b596ac98c4205247c388074418dc90b00520b572619e13063948297f8,2024-11-12T13:55:21.227000 CVE-2024-39607,0,0,82ab1f90403a4f0d3b9e21e2a488cd41b34ece370e96146e9e8729444d740066,2024-08-01T15:35:17.240000 -CVE-2024-39609,0,0,e07dfcf2cb41b5de548d153b8e1dd42d9f77af2d418236acc36673302dc6f98e,2024-11-13T21:15:27.197000 +CVE-2024-39609,0,1,401f47af88785fcf6c5cc0ca5d32835e49543ee5687edc942fa4495f0d4f3044,2024-11-15T14:00:09.720000 CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fda9,2024-07-17T13:32:37.647000 -CVE-2024-39610,0,0,fc22ba77abbd619f02087a0e55c6574099838875f51f467f7e94ba44e81b892b,2024-11-15T06:15:04.667000 +CVE-2024-39610,0,1,c01bed11a0638a816f33e09e96777a7445bfb13ab6bd55745cee95e8e818ad43,2024-11-15T13:58:08.913000 CVE-2024-39612,0,0,029b5e043f8fa9387c1e935fd25a69e218f8fd7196fe19845233dbfcda84d17e,2024-09-04T16:38:56.383000 CVE-2024-39613,0,0,a01eb288198c1ee98f509a48683a6028690d03e91539f0fa22857619bc4ca335,2024-09-20T13:59:01.117000 CVE-2024-39614,0,0,80fda44b15f74076f020f7bfc25c89db880e93067c83790f059fc3bf750e00f8,2024-08-01T13:55:55.837000 @@ -258734,7 +258737,7 @@ CVE-2024-39701,0,0,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8 CVE-2024-39702,0,0,26972dcfed4a9e2d13857f82734cd85677a01fa267564ba6286c42935ec6e373,2024-07-24T12:55:13.223000 CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000 CVE-2024-39705,0,0,aa75ecfe331ee5d16e104493e16afd26f62024e9296a197b99cac0edaec74e23,2024-09-15T20:35:02.817000 -CVE-2024-39707,0,0,f6b0f729958302db0f757df58e59cc76006998070795222686dfb4ba10cf2a86,2024-11-14T22:15:16.147000 +CVE-2024-39707,0,1,a705426f80da8c6a5e48f3d7c38b841a2fbb1f6e4435784c498bc1aedae1b179,2024-11-15T13:58:08.913000 CVE-2024-39708,0,0,5ba6724a88a25c721702dbcbb09c32f9771f7eb0a866958cc03dc7237b54b807,2024-10-31T14:35:16.610000 CVE-2024-39709,0,0,18c732ed201f2614b279141675539029315bb58820f31197d64cccd45f0aa46a,2024-11-13T19:35:14.073000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 @@ -258775,7 +258778,7 @@ CVE-2024-39747,0,0,a2161f167ae95389c72b0c031bdb90fe73f7e348a5f87dbcba6e48e765456 CVE-2024-39751,0,0,a868bf4be3dd2b51f3b58089c18a834cccac125c90e59de11837fcfc432cb518,2024-08-29T16:56:32.053000 CVE-2024-39753,0,0,6bcbf6ac96b06d4d219adf124dd62c559d3dd840ef1bf69100476577424fbd3d,2024-10-23T15:12:34.673000 CVE-2024-39755,0,0,dfcf10f6b8600deddb49177d38227bb50ccc0bc92a697b205718d374dfc6c532,2024-10-04T13:50:43.727000 -CVE-2024-39766,0,0,6388255744712318565f8869c335f4fd7ecbd39dd78a5f583510a4a885200642,2024-11-13T21:15:27.480000 +CVE-2024-39766,0,1,7c05e599347e24bf3e99cf099c7c0db0a8f9d0eebdd7642cd355fe57ac61a26f,2024-11-15T14:00:09.720000 CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 CVE-2024-39771,0,0,9e0580f815353995f09e16cf0a17131e87cdc1c24ed90f31d73908db8cfc927d,2024-10-28T21:35:11.267000 @@ -258794,7 +258797,7 @@ CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e CVE-2024-39808,0,0,f1d26d2425b41e1ef901bf3d90a3385ce6661037b493c6ae6b535707b4ad0681,2024-09-11T16:26:11.920000 CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000 CVE-2024-39810,0,0,32d906c66fda3178aaaf67b328715612b9d762f16a6ecd0f62d6e5eaf48f095a,2024-08-23T16:16:36.907000 -CVE-2024-39811,0,0,f71636b525a1cf045e99031add8747081b8d26a8ef2507d798c9e3dd3d759006,2024-11-13T21:15:27.740000 +CVE-2024-39811,0,1,1d3e48021eb49ddfb2eacf0645f15509b27b0fdfaf7a0cb5a12a6885980fa18f,2024-11-15T14:00:09.720000 CVE-2024-39815,0,0,2d23504d87a7185e1f6c185524d0f78ab739cf6cb169d8e09b6dc1e083fb2cc8,2024-08-20T17:14:18.587000 CVE-2024-39816,0,0,99e8d0f2ca7c7949ccc5b1fb01e67a6b8249c725e85c2220f31f36de7605bd24,2024-09-04T16:30:42.197000 CVE-2024-39817,0,0,da37b9dcdb041f40628bdd9732b2ecb73043147c99cfbf7acdec75950efdf2c1,2024-09-11T19:36:18.050000 @@ -259000,12 +259003,12 @@ CVE-2024-40395,0,0,3ba6dbce46079967e0577ccca7056038a218abcb260e702c86d066887bd84 CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000 CVE-2024-40400,0,0,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000 CVE-2024-40402,0,0,8f3b56ab0ece8779de55d2a1e01ca402786b5a92667e8e6ee5b5e922914d1480,2024-08-01T13:57:16.643000 -CVE-2024-40404,0,0,876f75db3e531a5bd4c665beceb3a97f56df22086fc97fc7d9599d286303c544,2024-11-13T23:15:03.867000 -CVE-2024-40405,0,0,00bef22ddceb3c7a4a7fdb86809cc06673ff63eed94279b649568babbbb0e243,2024-11-13T23:15:03.930000 -CVE-2024-40407,0,0,1576c4161838235926b44ca7622fb7e0091604fa1f58a924c56f479976055019,2024-11-13T23:15:03.993000 -CVE-2024-40408,0,0,d0d659fe997f2ac31a08006f2d5e09f284cf287ec24fa71c8e64341e4af17718,2024-11-13T23:15:04.060000 +CVE-2024-40404,0,1,09c3b53abfd0e91392f863ace73d4bf792a3d39fa8ece0e52b239a44c680b5dd,2024-11-15T13:58:08.913000 +CVE-2024-40405,0,1,b6fe3ee9d74cb7dadbfaf01b71937c8526639bef219e5b271ae83c0ede768c3e,2024-11-15T13:58:08.913000 +CVE-2024-40407,0,1,cfdde6cfd1ec4997a6be04496533e6e3ba493fdb86485e1df9b448f4cdb421be,2024-11-15T13:58:08.913000 +CVE-2024-40408,0,1,f2a4bf811588bd6549be4495047343b805bc51122bf3c331b3657e08be80af16,2024-11-15T13:58:08.913000 CVE-2024-4041,0,0,bd71d95aba274d30d448ad146bc23c848b8a3b9576dc252f709372f143cb7780,2024-05-14T16:11:39.510000 -CVE-2024-40410,0,0,99b4c3f80ef9cee1c87fe7f3b5f4d699b0939f3f20dad6c07250d3e87632c8a7,2024-11-13T23:15:04.137000 +CVE-2024-40410,0,1,df61a951d33ce95e69a8770a86879c0ecb50cd8e184ef90b585d3c5705171ad7,2024-11-15T13:58:08.913000 CVE-2024-40412,0,0,6bec7f774fa3844522b88a2194ef0a518564be0031f950daee4cc3a1d2af5bc7,2024-08-01T13:57:17.453000 CVE-2024-40414,0,0,cce4bc45b3fd958899493947d8b56ef56455ed7c491dfa2b8588a84925be9f13,2024-08-07T22:13:50.937000 CVE-2024-40415,0,0,97b6ea5de4ca3bbb8d7d817518418a144fefb721c0a2cb8a92df0a8cba71dbba,2024-08-07T22:13:41.720000 @@ -259023,7 +259026,7 @@ CVE-2024-40433,0,0,e7a4ec9affcd5459ba2865b747a3c21f3af0ec6afc5f3d7573785ee389417 CVE-2024-4044,0,0,e5bbe7519a57f32e10b3da751a3cb9112f45a7270ca309aa6997e34b1ffc6b95,2024-05-14T16:11:39.510000 CVE-2024-40441,0,0,c6514ede5c7f5ef8c83cfb03126d88402099d182d6578c9b7395512c5db252a8,2024-09-26T13:32:55.343000 CVE-2024-40442,0,0,b94f825c99758bea85b2c2210a43f156f98af881c7925e7becb988dd665ef631,2024-09-26T13:32:55.343000 -CVE-2024-40443,0,0,8eb3fde9a0cb3231c2f71e4a0f44f511199181743d996156f5424e1896b0642c,2024-11-13T20:15:17.253000 +CVE-2024-40443,0,1,ca408d5d9e694f13a0db48747453974f4b97d8d30f5844a8baa1f829ec489365,2024-11-15T14:00:09.720000 CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b53,2024-05-28T12:39:42.673000 CVE-2024-40453,0,0,4483c5209dc00972ed35087fa7a57143bcc3f4e4c2aa05f9c16e6199d4acac45,2024-08-23T17:35:05.463000 CVE-2024-40455,0,0,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000 @@ -259099,7 +259102,7 @@ CVE-2024-40568,0,0,4e89eb42d593339b238d1e440516cb2ccd3f5095fd163b21c19673544e39a CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000 CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f026,2024-07-25T17:35:28.913000 CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000 -CVE-2024-40579,0,0,7f4c2b23ae20e3c6ea2a5d41c27909f2291806806a8992f0e349ad10eb6994d7,2024-11-14T22:15:16.230000 +CVE-2024-40579,0,1,3f82e21074c6bf0b316ec262cf4256590fbaedbb88be06b33f5645f8e73b5bb9,2024-11-15T13:58:08.913000 CVE-2024-4058,0,0,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000 CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000 CVE-2024-40592,0,0,5acfdff926c4ce1e8230567e18f89491dd35f3a5c402aaf623c0641f88ae3656,2024-11-14T20:37:06.040000 @@ -259157,11 +259160,11 @@ CVE-2024-40657,0,0,20ced210671262f43b0cc62341898b9fc7febd5f8789caf35d41deaa287b9 CVE-2024-40658,0,0,5f8a6b60ca62d2cfa0f9862e86c619e00e5db037ad87f1558ced4ae7f02d2bd8,2024-09-11T16:26:11.920000 CVE-2024-40659,0,0,fabbb4b92a57e596b06e9bd31b045ecca58663666534e05d61759f6961367421,2024-11-04T18:35:10.733000 CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000 -CVE-2024-40660,0,0,ae7ab748903bf86da17ab7fb8334db31f49836b36b2874e1b7e20376910cc25d,2024-11-14T19:35:07.343000 -CVE-2024-40661,0,0,ece784732e717dfd5aa9d24e114c7c911766a2da6d3d446f6065a64726338596,2024-11-14T16:35:06.610000 +CVE-2024-40660,0,1,69f3d7259c5da11ebe11f4c03a4b3a515c6f33e7688275926969f1e12f9501e4,2024-11-15T14:00:09.720000 +CVE-2024-40661,0,1,e9c32aa9f312300f15863e83b56dcd4f501b9446d32e8063b8d30f119f8dda41,2024-11-15T14:00:09.720000 CVE-2024-40662,0,0,158da2f06a1d27615161cee7fe7341ef1e87f2062801f47e3e4f4b1d6a1663ec,2024-09-11T16:26:11.920000 CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000 -CVE-2024-40671,0,0,7f55caf3fa639a1aa5f0a6d9761614e698a0cf2585c8682232f6ccfdf6934d1e,2024-11-14T16:35:07.450000 +CVE-2024-40671,0,1,1a698dcc54c72745530fe727387f290b0787d77995a851331f67ecba0eeb9701,2024-11-15T14:00:09.720000 CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f63,2024-07-03T02:07:03.943000 CVE-2024-40680,0,0,6a7d82455fef21e03a575dce9fc7ae88a549fdf8ecdf4b4bb72b8cebe35b53d9,2024-10-31T17:15:12.990000 CVE-2024-40681,0,0,fac9532bdd8d5b6d1b1f49e08b67a17d3abcf6f9f6c80d971ff62d66179abc1a,2024-10-31T17:15:13.143000 @@ -259322,7 +259325,7 @@ CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000 CVE-2024-40883,0,0,403e612e6d9c92bba755ea1bc3ab9fda6730b304c92eb59eb04af52459f79697,2024-10-27T01:35:12.100000 CVE-2024-40884,0,0,ff232cdbc88b9d59bd801683d73c76bda50973c98d329e426c37e00c00612f9e,2024-10-17T14:05:16.247000 -CVE-2024-40885,0,0,df591dc2eb8a99543ddc1acde80378c3b31fe1cf87a1f105c7c52e909f6d0941,2024-11-13T21:15:28.353000 +CVE-2024-40885,0,1,e98274fce0ae6642c4bef8a0796da12bd974b4bf43010735bc4ff5db64ebfb9b,2024-11-15T14:00:09.720000 CVE-2024-40886,0,0,366f3546e42ed526b269e117ba5fde90b643767db321194ac7a300a3dda42364,2024-08-23T16:09:31.887000 CVE-2024-4089,0,0,c48b0b1633259955b88d07dee6add98fde70c2881982b5baf56d243e9a2b6c21,2024-10-17T19:41:36.467000 CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000 @@ -259593,7 +259596,7 @@ CVE-2024-41161,0,0,9b33361091df6923832caa53c78a9e46bbbedfd096d5512869c0f1eed0413 CVE-2024-41162,0,0,e54fc1a9823f936d00354799974ba06adb4cc451d56f48d5711fb6c0d45b612e,2024-09-04T17:03:53.010000 CVE-2024-41163,0,0,27e4d5214b7422b34fa104447f5b61de05cea94735fc481acd43b25292b276a1,2024-10-08T14:47:56.787000 CVE-2024-41164,0,0,c5521af658e92e64cee6bd40535b27065e46248fed1bc5e43067dc57eef0c4d6,2024-08-19T18:39:06.157000 -CVE-2024-41167,0,0,2f28f38e8549a5ae6e4e2fea64d79fcf6e9aa38ccc595c5df38b86059823428c,2024-11-13T21:15:28.590000 +CVE-2024-41167,0,1,5e8adb8a4f1d03de454100a60c52fb33bcf00d04b8db414a4c56515dec65fd5d,2024-11-15T14:00:09.720000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 CVE-2024-41170,0,0,817fea013dbb80aba74cedd999d41f457edab776da0940277c0a8d6917a3fea3,2024-09-10T12:09:50.377000 CVE-2024-41171,0,0,21e8211c0e8b04d22b03b4933a02a2ed4c14686c5cf3c857123c3bdfefc5823a,2024-09-10T12:09:50.377000 @@ -259609,10 +259612,10 @@ CVE-2024-41184,0,0,460d3d6d07916ac0f7c6ce162599c802c196ea0f25bca5ddf54b8e8b24963 CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000 CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b59,2024-06-04T19:20:30.353000 CVE-2024-41200,0,0,c6634d5ee9208991d605965f74d59d477ce80a275c83b2ac8c83f9990bd5e19e,2024-11-05T22:35:06.980000 -CVE-2024-41206,0,0,7e6eccccc069d737de1b776f4e9312e30c44dcadcdc2055f772810c0c5b346e7,2024-11-14T23:15:05.197000 -CVE-2024-41209,0,0,a4e7aaed923cefcf23362f8e10e2d838de14426aa8be093076feb4ce9f5618ba,2024-11-14T23:15:05.277000 +CVE-2024-41206,0,1,edbaf16e5ee8ab9dd8a7f73c36515a779dd6902880ac13f83b82178d57170002,2024-11-15T13:58:08.913000 +CVE-2024-41209,0,1,c96c2c4e5eb3b8683f7fb1ba3c5fc4ccd74a82104f499ec8e7ccc3e64813740d,2024-11-15T13:58:08.913000 CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000 -CVE-2024-41217,0,0,ac2469ae081aee00a6ebee50dac48eceae280554daf52e5d74373d7e6d88920f,2024-11-14T23:15:05.370000 +CVE-2024-41217,0,1,f09401728c77dc59a55e5d2423a8e51ee32f809c3fdb8c0afc3ba242373e3b76,2024-11-15T13:58:08.913000 CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000 CVE-2024-41226,0,0,a3a85fa64d0c123f261294a19d764a3608a61e848957876669f922adbd8d3b3c,2024-09-03T21:15:15.923000 CVE-2024-41228,0,0,f3d365bd2199687dcff5eebde6177461134036d09c1cc3d7eb6b2cb72c0f76b0,2024-09-26T13:32:55.343000 @@ -260246,7 +260249,7 @@ CVE-2024-42166,0,0,18df6e3d78544dc8ad38e19fe493f73a53f7ef17f4a96d8246b9654224a5c CVE-2024-42167,0,0,cd8646272ac8e058d6c4cd2f9a697cfc1c8ee88730b877963e6d060dbe9c7f9a,2024-08-29T15:24:12.060000 CVE-2024-4217,0,0,b697d32a81a44314e31fbbbd491d72bf1d83730c215f0b4ac0b5c272bbd60693,2024-08-01T13:59:28.453000 CVE-2024-4218,0,0,dff7b6ef5b1eda10e25547a7c58ff59e7141627798ff1eb390bbb04c101af4a9,2024-05-30T13:15:41.297000 -CVE-2024-42188,0,0,7ff6efac9c403ab0f844ed338ca6070c8b8f7fc3297fe30ed747f767493b6288,2024-11-14T16:35:08.270000 +CVE-2024-42188,0,1,26a3c898c2312a232bd54c8511f8d7fef66ee727dbf7a729f62cb44bd166d795,2024-11-15T13:58:08.913000 CVE-2024-4219,0,0,e67747b1814e30f9a57aa2d5fada7a64c70b8e2f4229bf1bd72194f6b14072cc,2024-06-11T17:06:50.963000 CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad10,2024-06-11T17:05:35.203000 CVE-2024-42218,0,0,331226ea49af1a2f92292f364b4fd8bc3c26a90f49d1b9421ad0db0c509189fd,2024-08-12T18:27:54.660000 @@ -260495,7 +260498,7 @@ CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377 CVE-2024-42495,0,0,9abc7330eac6d6df1f12abde56401fb389a89e85bdfac6db206d32a19ef64c3e,2024-10-04T14:37:36.703000 CVE-2024-42496,0,0,82629bcd722b8cb6d341bed3916823c994361fb6b4946b9099c29ac012cbc5a4,2024-09-30T12:45:57.823000 CVE-2024-42497,0,0,6c95277a74b4240375f9e65f5c21a104fec038817af68c50a8b421844638164c,2024-10-16T20:05:09.183000 -CVE-2024-42499,0,0,de3ac831b8e18fdc40ee07a81a4164b14fa19c310f8891b9be165c3d1774b713,2024-11-15T06:15:04.933000 +CVE-2024-42499,0,1,c9441ed075a7bfd8e58b67a4fefec6e1fb82fdc6387117c2032cf13cf05f22de,2024-11-15T13:58:08.913000 CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000 CVE-2024-42500,0,0,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000 CVE-2024-42501,0,0,2d6a46c355be0708ff7db2c58107fc669881111adf034802ab42261dde0a7bbe,2024-09-20T12:30:51.220000 @@ -260693,7 +260696,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95 CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000 CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000 CVE-2024-42831,0,0,81c8fba77a06683f68ef3418776fd6a90738b17ea781218e5200d9ee57eaad3f,2024-10-10T12:57:21.987000 -CVE-2024-42834,0,0,0645c13fd2a3dbb82f591ee8971e056ccd13074f02dfcafd6a85738943267c7d,2024-11-13T20:15:17.330000 +CVE-2024-42834,0,1,702ce8441c33f6864b5e255415f27d92e2ceba09d0dd7351bacc93c440dba751,2024-11-15T14:00:09.720000 CVE-2024-42835,0,0,fb2d538cbd8f88f1ce5aec6568bdd53758673ed888c26df71bdc646cb1d289fd,2024-11-01T12:57:03.417000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 @@ -260797,26 +260800,26 @@ CVE-2024-4305,0,0,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d140 CVE-2024-4306,0,0,a2edc9b105cc4a694942681b57dff61f9e5285cc8aec37eba8bdc15814541dcc,2024-04-29T12:42:03.667000 CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d8390b,2024-04-30T13:11:16.690000 CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f3b,2024-07-03T02:07:22.320000 -CVE-2024-43080,0,0,730e0bfbb0e0f92fa1e95f9b258bfe2a1ab85fec5621ab92e84698ca9224cbe3,2024-11-14T16:35:09.127000 -CVE-2024-43081,0,0,6e20886638c94eff3709d5e5abac04922fe4ce24b538dfc592826e5cfcccd33c,2024-11-14T16:35:09.987000 -CVE-2024-43082,0,0,56f178a344750a698deaed3b020a59b38ac850196a812abf9ded49cf0eb7e50e,2024-11-14T16:35:10.857000 -CVE-2024-43083,0,0,9e09a78fc09963141a3fc02fd9ed1ad21971def8b416ce9fb9ce24f8d729df12,2024-11-13T22:35:06.987000 -CVE-2024-43084,0,0,437d5cc042837f1bfc9cfa8d8d836f0c2f4c7883f5fb73f66819713dd173d647,2024-11-13T22:35:07.777000 -CVE-2024-43085,0,0,c715c7e31f1af16a494792b8c4a654750dfcfcb152116fd578bca383daa762e5,2024-11-14T16:35:11.720000 -CVE-2024-43086,0,0,b35a9c0f4b81e475922d197d48e538ace9956732719607be7dbe8800d97916ab,2024-11-14T16:35:12.570000 -CVE-2024-43087,0,0,df8687413166c680df9e58e2ffe928b52946447f2106313681b4f6900ac2725f,2024-11-14T19:35:08.150000 -CVE-2024-43088,0,0,1c13294f36b1f9b0be567789e36f583be558d3a79698dff40d24917c5068c2a3,2024-11-14T19:35:08.967000 -CVE-2024-43089,0,0,b277ca7768b3e4b4b0f60e1bf47b20ac676f3753e8cd1ebaabaa7be31aea80a8,2024-11-14T16:35:13.417000 +CVE-2024-43080,0,1,799a05817985865907820873f2e9a662b70e7528a1722bc76cebfc8eb3a1468f,2024-11-15T14:00:09.720000 +CVE-2024-43081,0,1,cc1d4ea682e601791d9f0d9c15814cd90ad877dd31f4ae97c17c16e9118aa848,2024-11-15T14:00:09.720000 +CVE-2024-43082,0,1,12f0f2869b283eec76de099c8cf236101d8899667860efc0b278d21e3ecea426,2024-11-15T14:00:09.720000 +CVE-2024-43083,0,1,c980986f7048e2585e4816111a624bc7f629db6efbbd3ed5d6638f93c42b8dbc,2024-11-15T14:00:09.720000 +CVE-2024-43084,0,1,3d7cb769c3819debac5ab4b56b1b8dcc94072d34ea69ec89429430e9aeaf07c3,2024-11-15T14:00:09.720000 +CVE-2024-43085,0,1,cf52c671f83dd53a26461c676e72cb7481a4a9aad5b4b88ee4e1b647b9b40893,2024-11-15T14:00:09.720000 +CVE-2024-43086,0,1,3c0b373141dec951439b451c55790d2a488bce45bac9d3576bca83606fa321d3,2024-11-15T14:00:09.720000 +CVE-2024-43087,0,1,4485d42339159abb1686cbc8803004987a41e51d0da2d1ede54495e9cf6541e6,2024-11-15T14:00:09.720000 +CVE-2024-43088,0,1,5fbf63de8edfff74dd53eb50c668704ac8d4545d67de243eaefcbc2be774c7e6,2024-11-15T14:00:09.720000 +CVE-2024-43089,0,1,d3b053825a9d0f746a08fd76a42a6d43f88775450cf3a22f622d8b459747722b,2024-11-15T14:00:09.720000 CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000 -CVE-2024-43090,0,0,28e87613d5722ac4d9a0be826e296e6e3ad7500c170880234254815d7f83e6be,2024-11-13T22:35:07.990000 -CVE-2024-43091,0,0,720dddedca98cc00358c0c207a42957b58527a650ba575507da86ca94d698e87,2024-11-14T15:35:08.470000 +CVE-2024-43090,0,1,848285523b1896a815127be3a3a822d3044ca02a62736f67a76b73d14c9bb36e,2024-11-15T14:00:09.720000 +CVE-2024-43091,0,1,a4ed2e91dce6bf9b7994c0e48ea8b422882ce713583c38600d41c714ede7374c,2024-11-15T14:00:09.720000 CVE-2024-43093,0,0,a5e7a7a99ded32f4ceacb99abeec61cc52c3868dd50355a02eece2e0b7c2cfec,2024-11-14T21:42:34.923000 CVE-2024-43099,0,0,1e8651c725576df83054b4b74436ff5087c13bad1e13244cb0e6a25df0f7bb09,2024-09-14T11:47:14.677000 CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000 CVE-2024-43102,0,0,08e196b4c8739548226238903033d07bdd98395e1a6fb3461533ef08cfa70faf,2024-09-05T21:23:40.503000 CVE-2024-43105,0,0,65a66601afd2de184f3745e025013cb99c4a6cae651d4eabc58a96778d4da9f8,2024-08-23T16:18:28.547000 CVE-2024-43108,0,0,d9bd8ea3b307dd054ae1953991304a1a331018261701e1f611f2a6906461a05c,2024-10-17T17:15:11.883000 -CVE-2024-4311,0,0,5ce68034443eff5cfd91da7bf57e59e53b34bc4d88653b18949c94eb80ddbb7a,2024-11-14T18:15:19.473000 +CVE-2024-4311,0,1,1206cb174e395a911dfce9fc5257fd99b4e97e70b5a158c70161cd9e4c52115f,2024-11-15T13:58:08.913000 CVE-2024-43110,0,0,1fe822a52c0b3af1ede7bdafa556f57158a1ace3adaf6fcd1e0c1b1f3c86485b,2024-09-05T21:22:04.810000 CVE-2024-43111,0,0,45754d9244b10ae48023a8465600f12d5ca692d4146e1c9ba1d4a0e6fcd0734a,2024-08-29T16:53:16.233000 CVE-2024-43112,0,0,72269ebdb7b810fe860916d34468320e2e91d1a609ed10c8290e69cc95ee1d45,2024-08-29T16:51:55.937000 @@ -261117,7 +261120,7 @@ CVE-2024-43426,0,0,2e98ed8cd0fe3bbd03bc31edcafe875e17ec3c3fbf69dc03657573f422300 CVE-2024-43427,0,0,c0afa9190bfbd3a42daa26b3156ede180ba7e66263d84fafeb811083b81b57ec,2024-11-12T15:35:06.950000 CVE-2024-43428,0,0,b5ed04eb9991b8a533d52401aafbeac39cc5aa45a83db20224d68df7b23b336a,2024-11-08T19:01:03.880000 CVE-2024-43429,0,0,f5ddfa56b018dea7dd2df903532e997853780531d9960a7743dc3f510200d05d,2024-11-12T20:35:11.370000 -CVE-2024-4343,0,0,78453087f3d920ad597fcd60d72d2a9fe6e1100dded9b6d75201b30e4e1918be,2024-11-14T18:15:19.687000 +CVE-2024-4343,0,1,ab4d2662cd7c6951d24746bc50df31bf25ca1d1ac8d66b86f18b9d1e5fa73d47,2024-11-15T13:58:08.913000 CVE-2024-43430,0,0,56b9aa97c4cdbeb7d02668c0a21fc9e420a493aa45c3ca05f334d7cfa97343ea,2024-11-12T15:35:07.837000 CVE-2024-43431,0,0,b9005a05e5507a46df12a8ffbb839f8f4313b143d14ebe18ef1c5cef640c905e,2024-11-08T19:01:03.880000 CVE-2024-43432,0,0,6882cdf5acd71ff08ac60ea8ef39b61d02a539f240a4304bb1e0c1af091cba8f,2024-11-12T16:35:17.560000 @@ -262206,7 +262209,7 @@ CVE-2024-4509,0,0,996942a0a2c59f4d53067a2868fbad35944719504585e3998bbd4d788c5455 CVE-2024-45096,0,0,d4f642a1e6bb8f30a3a63abc6de33d2a734d4a63841c63adbbf0861fc10b1ff8,2024-09-06T12:34:17.957000 CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290102,2024-09-06T12:51:59.750000 CVE-2024-45098,0,0,d99373b3861e761d69e1423a19b397cd3881f87fabdf54ab0162bbecfa72f038,2024-09-06T13:01:44.023000 -CVE-2024-45099,0,0,e1f7554d7008461bbb4f440ce7777acd35ccd117526f34ce5d56e7eb080ede19,2024-11-14T12:15:17.980000 +CVE-2024-45099,0,1,2ac82c72dd3344ff32d6bcbe01fdc95a7307d008c3f97ecc0b6e21b0440cfdf3,2024-11-15T13:58:08.913000 CVE-2024-4510,0,0,e609022dce213b03ba687f592023f15f3e261f085d88e9ff14f3b7ffe9969d1b,2024-05-17T02:40:26.417000 CVE-2024-45101,0,0,cad1255565408251227b424af7803fa7b621bb0a87132fd60fe56f4ddc9639ef,2024-09-14T11:47:14.677000 CVE-2024-45103,0,0,01e8c7d7777680c3c907a9b9346c8d516e1c4df3a86a3dfed3c0a030a8c65f44,2024-09-19T01:50:12.427000 @@ -262335,8 +262338,8 @@ CVE-2024-4525,0,0,dfe2a87106534aea559d2a64c000518f6d0b8952ad5d7b752f8fc10ec2414d CVE-2024-45250,0,0,e9b56e111bbc8f345e771d0d97f6c666ffbfb94747161b5a547dc2214faeb00b,2024-10-07T17:47:48.410000 CVE-2024-45251,0,0,4723402deaff257a03485bee19d0c63cf2e4218538079529007db41f2e86ba8e,2024-10-07T17:47:48.410000 CVE-2024-45252,0,0,d5507db1b0bfef3e2d4dc8033cbb1d8a5c92c659f9cc4356d3a7d9eed6325773,2024-10-07T17:47:48.410000 -CVE-2024-45253,0,0,9c844f8b6482daf2c9e9c619f77138672c77c72437fed22b52ea10fbc4c2f52c,2024-11-14T10:15:05.633000 -CVE-2024-45254,0,0,d077d3a82c20cb66140b9ebe698ba5da6c884bf474a50526bde47dfe1280eaff,2024-11-14T10:15:06.207000 +CVE-2024-45253,0,1,3ae7870db7b1870fee32d9e68f2da2a811ff8ae3b1bc36c2651f85223f7ecf6d,2024-11-15T13:58:08.913000 +CVE-2024-45254,0,1,3a02ea6d224b632434bb70e685a0a234ace2d002ace9aee29c76fa887eafd0c4,2024-11-15T13:58:08.913000 CVE-2024-45256,0,0,1ad6eb17928348883dd9cb354722f92894049d9e7bbed38aa0c5260ca73ab2c4,2024-08-26T13:35:02.937000 CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000 CVE-2024-45259,0,0,5969bc7c5f33ec37926b142b968946029edbf5a989ec1eaf52aded1cc1f71bb1,2024-10-28T20:35:13.597000 @@ -262542,7 +262545,7 @@ CVE-2024-45590,0,0,10d4788b438864d0cd458ad76a6de33b5eb010a84e104671688016fb6cabd CVE-2024-45591,0,0,2ec8609992b5b8415223014481927a4d3688ea93678a8aaed703d491c5983587,2024-09-20T19:55:54.657000 CVE-2024-45592,0,0,344fb1da2ff8d3df06848c3a67556280c55b0a28cfca16bff24c2975e2ac29d8,2024-09-20T19:57:05.323000 CVE-2024-45593,0,0,de30c059659aa3ed9b1ad3c8d3a065abcdf373d953976edb052332afd861d49e,2024-09-20T19:57:55.573000 -CVE-2024-45594,0,0,69c3f34fe6aabfb38a40c1c78da1ebc8583478f78dd1f1666273aca16208a376,2024-11-13T17:15:10.333000 +CVE-2024-45594,0,1,b92b3752c69160ee80c6f9e6ba142ae7591b376f9627b6a940ea18bd550ea1e1,2024-11-15T14:00:09.720000 CVE-2024-45595,0,0,4000fc5613545b24d45d9ab58aeb6d6a3f02eb8751f15d7d6eaab00c6ce0b4fa,2024-09-20T19:59:02.963000 CVE-2024-45596,0,0,6e565b4a7c9ad9fc7c8e22389ae667ed11775275e4e8d0d4bae0af105f45843b,2024-09-11T16:26:11.920000 CVE-2024-45597,0,0,0fad881157bfd299e8512a05afe15ba28f7513c6a1c09923d6036dedef269a28,2024-09-11T16:26:11.920000 @@ -262571,12 +262574,12 @@ CVE-2024-45624,0,0,7a0e35c55ac45641bb752e88253516bf9e2f94ec9e17765278ecb76cea70f CVE-2024-45625,0,0,3e5f2d639aef0e82608d7bd80d0e32d86a25b4046e30921cb8739a9c3be44b6a,2024-09-10T11:19:40.113000 CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000 CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000 -CVE-2024-45642,0,0,a563b90e1d94665aa870097dba4a01ca73a67305095ae38b5397dd7a59c4707b,2024-11-14T12:15:18.323000 +CVE-2024-45642,0,1,39263e364272a62f9453ccfa5c1f7f1119294c129c855574c52446a18a672d7b,2024-11-15T13:58:08.913000 CVE-2024-4565,0,0,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2fb8,2024-07-17T14:14:08.750000 CVE-2024-45656,0,0,78d9804910af28b8c176663f88322290c5c713635ecedd69d9bf4321a17d8cf5,2024-10-29T14:34:04.427000 CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000 CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000 -CVE-2024-45670,0,0,851960da2818a1988b138d527b50d6f0503f315beb4f5bb4d2af5048acfa6e20,2024-11-14T12:15:18.570000 +CVE-2024-45670,0,1,06b027cec872ea193a76ea5f043d656902c6d062d4c55c46bbf0d21ef14923cd,2024-11-15T13:58:08.913000 CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000 CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000 CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000 @@ -262634,7 +262637,7 @@ CVE-2024-45771,0,0,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb CVE-2024-45772,0,0,d4fcff511ac9c702d11d2981d4f53f578a5b533222a07c5c21d8a62a8451fded,2024-10-04T13:20:58.327000 CVE-2024-45773,0,0,fa80a32ca25578799d772108a6e7f2b87164fbdfd3820c41dab7e96e6c83084e,2024-09-30T12:45:57.823000 CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000 -CVE-2024-45784,0,0,7df02e48fd20d4891516a0ad23c130e8093c5cabebef12010ed53de3713bf60d,2024-11-15T09:15:14.897000 +CVE-2024-45784,0,1,401349bd1daa018202f98e4495f90cc2ad6a60a28c2f61c7dee6ba498ba23ce7,2024-11-15T13:58:08.913000 CVE-2024-45785,0,0,edaf655206685301bfa1d23b3961ca90e190821a2f1da23140bfad50572d7731,2024-11-06T17:08:40.507000 CVE-2024-45786,0,0,1027a4a71b54e4ed926e7c4d82608ed7bf7290e7e8486a1ac94d8f7e4edfad02,2024-09-18T20:12:47.337000 CVE-2024-45787,0,0,46f8564066b3f70e712610c0aca9059d9bda6862d53c941af56b2ef72737a51d,2024-09-18T18:15:07.650000 @@ -262709,11 +262712,11 @@ CVE-2024-45871,0,0,728c8e6e25f852a5194b96b816339c6dea2f278495c76d4d9d6d904a9357f CVE-2024-45872,0,0,8e87b92fe22bbef6284d58a5e62493b4717b48305cf479255ef9a674e1d360d9,2024-10-04T13:50:43.727000 CVE-2024-45873,0,0,c49a27b891c2cba5f20315647687fde4c837ff4206eca9eaffb57a4f0d790169,2024-10-10T12:57:21.987000 CVE-2024-45874,0,0,2e0e68e484da1ec476bcb0982736db7f6eddfb72b06a902a4960817b887d973a,2024-10-10T12:57:21.987000 -CVE-2024-45875,0,0,f6f0e89941d2177d9810c8850060cbc17af605c456b5ad43ef5f683088af7a8c,2024-11-13T21:15:28.843000 -CVE-2024-45876,0,0,6b2a3ec48dbd89cd33218900bfadf20a5bf7bdc272a23c78460550d9ab541822,2024-11-13T21:15:28.923000 -CVE-2024-45877,0,0,f5a4d1543988cd4c3151e5d6ef920e2778ef1a61ddd107d7e53c88df86aa07bd,2024-11-13T21:15:28.983000 -CVE-2024-45878,0,0,ac801da5436b643bc050b3f519162bb33767416cbc9b097a672526cf2de8a319,2024-11-13T21:15:29.040000 -CVE-2024-45879,0,0,9c81c52b2f88395c2ed4234cf0a1109d54fc36803e47bcc4701f55f958ae5a66,2024-11-13T21:15:29.093000 +CVE-2024-45875,0,1,4511e7c6c223f11ba90de4d69c66ff141aa95f1f82f947b14caa9f3bcdaed5e7,2024-11-15T14:00:09.720000 +CVE-2024-45876,0,1,027a13f13cb51be837afea68fb1d7e00076030912fc4892d2dca3a25b5f9f3ba,2024-11-15T14:00:09.720000 +CVE-2024-45877,0,1,bd3a5e512d5935ce6c501d77acd0efa2037f56c41cb6165f588a12d3af203cbe,2024-11-15T14:00:09.720000 +CVE-2024-45878,0,1,b7f1cf9ff04c142b3f7a2f664dd5de800a21d58640f5d311d359fd7697e8408f,2024-11-15T14:00:09.720000 +CVE-2024-45879,0,1,1a89d4d18e049d294aa3955b22a2d83fd9c1ca44cb5ff049165076871ffb8a88,2024-11-15T14:00:09.720000 CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000 CVE-2024-45880,0,0,cea99cab279728fefb1cf99178e03e8166f7f71fb61ca1ac6100aefdaeff9258,2024-10-10T12:56:30.817000 CVE-2024-45882,0,0,a14449ffa2d1f7de4757ef5afa74eb71a4d5e2837a9c3cf521070ed5cd905c99,2024-11-04T18:50:05.607000 @@ -263972,9 +263975,9 @@ CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae10 CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000 CVE-2024-47912,0,0,f418c53b744005b67d73cb39395cb1c2d3d904d67f2798e6e9fa7f31b38510fd,2024-10-23T15:12:34.673000 CVE-2024-47913,0,0,7cee4e2f0a703b60f4905ba90942e3ad4333a4649dfd698a2259843e49767bfc,2024-10-07T17:48:28.117000 -CVE-2024-47914,0,0,5c1a1c65fd01e6bd94989accfa4c1506f1cf9f8b5a1a5bd5806c7686a7627eb7,2024-11-14T10:15:06.677000 -CVE-2024-47915,0,0,60eddd3046b360d3289fe3509ac1bfe6bb4b437174540ba79ec51a82b1079af5,2024-11-14T10:15:07.067000 -CVE-2024-47916,0,0,2b9b1008ac9b5bf6818ff9dfb5cda417cc71c0062d59e5e2b8d800f5df2ee80b,2024-11-14T10:15:07.540000 +CVE-2024-47914,0,1,56cc63573c5a889b6c3e411fa855c0d969375c2166d629185c0ab4fc830d3469,2024-11-15T13:58:08.913000 +CVE-2024-47915,0,1,90d7b1a0d768cb6f6b63850f82f08df84e0b2e7d9f08baf3dd8fc4db1a7a3ce0,2024-11-15T13:58:08.913000 +CVE-2024-47916,0,1,1d79f6c6a9cdbd76c726d866e7e2354e149300195b24f64860399a2a11cabeb9,2024-11-15T13:58:08.913000 CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000 CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000 CVE-2024-47939,0,0,fb0122088811efc1ccf3ce2b970c428eb00ae94db66e7aa25ff544122afe9a3d,2024-11-01T12:57:03.417000 @@ -264144,7 +264147,7 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737 CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 -CVE-2024-48284,0,0,998374701c5526c5658e1716377a4ae0da740a94202fbf58911b61696d69c3d0,2024-11-14T18:15:19.150000 +CVE-2024-48284,0,1,c1b7fb84604e1a8474a526fdad6cdbf7d9eafb7dbc2cf17d279dc64dac115aeb,2024-11-15T13:58:08.913000 CVE-2024-48289,0,0,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000 CVE-2024-48290,0,0,470dc7a365392aceea819604e300f16b964336068e4f6e607d709f5104e50d51,2024-11-08T19:01:03.880000 CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 @@ -264384,13 +264387,13 @@ CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 CVE-2024-48963,0,0,6d60ed9d1e7a308212fb6ea5de6f1d94d8559909dd9cb5f4650d856671de0962,2024-10-30T14:54:53.937000 CVE-2024-48964,0,0,7d209543eb23e2e6809a7e4f01bdb09a7ba8fb1b32d439bae945ab7d5b6dd3de,2024-10-30T13:46:31.657000 -CVE-2024-48966,0,0,d5813f9a60c2438b6b780c4550c4e99bde0ab93c9c084953d747f351f7fd03ad,2024-11-14T22:15:17.727000 -CVE-2024-48967,0,0,d96fea70a772f8520ddbf9c2bbd840ff283b092688f2f7004e7d776cbbd803a7,2024-11-14T22:15:17.927000 +CVE-2024-48966,0,1,6ce21af485b8f7bde854dc6fa73e4754262c2c902a98462d651b3be5a8dc03bb,2024-11-15T13:58:08.913000 +CVE-2024-48967,0,1,fba665d8fee6e5765d796c0f4f56dc350e86d3e170c3ebb4b0f8842760a802c5,2024-11-15T13:58:08.913000 CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000 -CVE-2024-48970,0,0,5f563678d67dcfe26333578200b13b5ea34a1ee98aae9c25cda4b4b5ae09c551,2024-11-14T22:15:18.137000 -CVE-2024-48971,0,0,ac19cbf277805a39057d67f803ce2d553d0c2a7d11070290af378d6153474166,2024-11-14T22:15:18.327000 -CVE-2024-48973,0,0,4b02cc436dd0a54227184b608b1dcbf8f2cdd92e6d392d8d40251698baedcfc2,2024-11-14T22:15:18.510000 -CVE-2024-48974,0,0,a697256b692285355762005fbf2a65d0dae9a75fe802b4209f219f91c3824571,2024-11-14T22:15:18.727000 +CVE-2024-48970,0,1,30952c19668099b57fde85f2cc4ffa98f340d9444adc84e11607e43c4c5216fe,2024-11-15T13:58:08.913000 +CVE-2024-48971,0,1,aec61daa8e3e4bc8e82a3ac6302404f969998220414a402a4bfea69832823f39,2024-11-15T13:58:08.913000 +CVE-2024-48973,0,1,1df97559f56714d73ec761dcc150a7afb6ddaa2583c3474ad5af745f48ebc20c,2024-11-15T13:58:08.913000 +CVE-2024-48974,0,1,bca1b70ac99b7db7d345213bfc69c0dea4bcbf3438528546c7259844ada903e4,2024-11-15T13:58:08.913000 CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000 CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000 CVE-2024-48989,0,0,58124d2b058d3a194dfa580edaf9984afd1d4350d13e9d1063b31cfbc8902f5b,2024-11-13T17:01:16.850000 @@ -264427,7 +264430,7 @@ CVE-2024-49019,0,0,e08679fc365479f57d65d68203459387c13c3c1dd4e5679713ba188e89b8c CVE-2024-4902,0,0,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000 CVE-2024-49021,0,0,aa53deff3838efd1c66c363e2988f51dc92f0fe1f44fbadc27229d2d752a53d8,2024-11-13T17:01:58.603000 CVE-2024-49023,0,0,af47ee9dc5b34537abe1e2a50e9a1a6dd7bec2ff89d9910cf199b8b7e8fc3c1a,2024-10-18T17:01:32.803000 -CVE-2024-49025,0,0,5b36b6511687656a4af0ef8b89408d3be008a49fa6cb3accb0de807c63dd75e7,2024-11-14T20:15:25.207000 +CVE-2024-49025,0,1,35dc42d2dd7a2e760f68b11d7ba7c5916c688fb71c05374f7a2ecaa9b21d3c92,2024-11-15T13:58:08.913000 CVE-2024-49026,0,0,389b45fb365606f0dc850137e89a99d79b49e7936c4d322daa7512c8f2a443d1,2024-11-13T17:01:58.603000 CVE-2024-49027,0,0,756a52ba86626ae0feaa38ac7b9ca7560a1f0424ed8969e0ec266d976b69f598,2024-11-13T17:01:58.603000 CVE-2024-49028,0,0,15af4a2817e602a0be5b827f4b62639c5042e250c1d16e5ecaf5290fdb0946fa,2024-11-13T17:01:58.603000 @@ -264606,7 +264609,7 @@ CVE-2024-49358,0,0,df99e254916c8dff27bc118ecfd140161a54ef4581a6841d720c531a5bf44 CVE-2024-49359,0,0,cc09522176dca55ed443e811571748ebfc3f0f5a4f89d4ec44c17a0a8a645881,2024-11-06T15:27:02.347000 CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a658,2024-08-06T18:29:27.013000 CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e281007d,2024-10-21T17:10:22.857000 -CVE-2024-49362,0,0,2f51dbc5deeb1d293fdeae27596ba8a6e3ed43c3ac3a33b254ac8bbf6cdae95d,2024-11-14T18:15:19.243000 +CVE-2024-49362,0,1,607782a5d34a0bcea667b4613803b3479fadb0d82404a368be33f1da13be2d17,2024-11-15T13:58:08.913000 CVE-2024-49366,0,0,1ea5441e3f8684e26cb3e2ee03927aa37cfc22f8ddf1688cacc08e4a6c38e9c1,2024-11-07T15:15:04.587000 CVE-2024-49367,0,0,a00a7c814532ad3abb0f836142856607dc752da167ff2cb313965be7a6e5269e,2024-11-07T14:57:17.393000 CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091363,2024-11-06T18:28:54.440000 @@ -264616,7 +264619,7 @@ CVE-2024-49373,0,0,4aa9cfdbe744fd3ae046ca1eeb4ecc11fd5a7b167271bdbcafbe01dffbbbe CVE-2024-49376,0,0,cd559b6ff037aecb65c3d5840816f94e5487658ed4c219483ab43d3c98a1839f,2024-11-14T22:49:50.667000 CVE-2024-49377,0,0,f0a66be903c1ae0848c0330b2ecd5bcb10926f277636c57c6f6f956b317ea158,2024-11-06T18:17:17.287000 CVE-2024-49378,0,0,09a13f2bc12578e659c5acb1c73f93e5796dca0b69672708f3a85d0256e97128,2024-10-28T13:58:09.230000 -CVE-2024-49379,0,0,3d849c956546825875132535f54762320e63df7b50f3a78cf46a30babea614e8,2024-11-14T16:35:15.103000 +CVE-2024-49379,0,1,f0bce3efcf99eca522c2d25bed87641aecc1ae34ed8c7ebff65d05248a2bf203,2024-11-15T14:00:09.720000 CVE-2024-49380,0,0,f56d412280c28c68a65e58c4bcb66239a0fd300a5ecc1079da487338d842284a,2024-10-28T13:58:09.230000 CVE-2024-49381,0,0,bb9988af81733ccd03de48d75bc197c7dec21a72eb70ce010eb71fafccaa1274,2024-11-14T23:04:21.637000 CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000 @@ -264813,9 +264816,9 @@ CVE-2024-49771,0,0,160fc663912b069ef891129905ae1be73f75e83c8368c487931bd9ae946e0 CVE-2024-49772,0,0,9281743e575857929b74a42ff17b0b9202ae9bb7ed1b47fefe705f7bd0b972d2,2024-11-13T20:19:54.597000 CVE-2024-49773,0,0,e7ad43d5c3fd7b249f682f0b65eb1709f39d3084c0fa75087a4fd4a2decb3591,2024-11-13T20:29:11.297000 CVE-2024-49774,0,0,ebd8a0eea0a53281f5f3ae3a93acb0432e3d9a4208605b56d1016ce02a10c1a5,2024-11-13T20:40:26.100000 -CVE-2024-49776,0,0,3d1ccd317f10894624792651edb12d0e80e06fe989d1fab4fe4cc74edd78eb45,2024-11-14T23:15:05.457000 -CVE-2024-49777,0,0,576c93bcbcdf87d22f75f1a7dfd252079adb9fc9dbf7209565d6f02cf537a981,2024-11-14T23:15:05.547000 -CVE-2024-49778,0,0,081fab9aa864a56a56b8081043da17977fbd331dbc940ba837e857bf2fe36645,2024-11-14T23:15:05.643000 +CVE-2024-49776,0,1,b98b59521cd715d0ec617d2fd0db152a13cd8254e4dda962c91988b20e09de7f,2024-11-15T13:58:08.913000 +CVE-2024-49777,0,1,9baeca1cafb37b9a950e665befe702cbd02f2ad8698e66a79c9b0d29d5965980,2024-11-15T13:58:08.913000 +CVE-2024-49778,0,1,958fdd6c4862af8f1bd031bb3fc3cf3c4e3090a99baf545814260a0e74f7bb7b,2024-11-15T13:58:08.913000 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000 CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000 @@ -265264,8 +265267,8 @@ CVE-2024-50261,0,0,946c442cc56e3e8af45dc6329602e8261cd21844e512a68f35505737590fc CVE-2024-50262,0,0,491da488ea3f6be70bbe09eed55bf84625143c296910fe98f090fd0f0e85c13c,2024-11-13T21:10:44.267000 CVE-2024-50263,0,0,031640c798eb6a3a8aeb817df2908ddb318a337ddb803a116f07c15a4af2eba6,2024-11-14T16:23:08.347000 CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 -CVE-2024-50305,0,0,0ac0ed2449a977be00632b91304d1c4dd569cf943961c8a7c2303ec2dddef88b,2024-11-14T19:35:16.650000 -CVE-2024-50306,0,0,cc5580a479aa56497866a68f93d6dda4574cf88b0c33aa007c3b6c36cae3f549,2024-11-14T18:35:03.743000 +CVE-2024-50305,0,1,b03fd6d501d19d7b209a06f202d725af272151828bcd7418064455026a0a9df5,2024-11-15T13:58:08.913000 +CVE-2024-50306,0,1,99b8de1207b2fdc71c13146c7372e7163a77f6f60a3176c55d7bfb57d63fa38c,2024-11-15T13:58:08.913000 CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 CVE-2024-50310,0,0,cdbb51e1b47d1a9497998e60f58fb5fe87ced29e9d042b4c42b3a1b3ac7563d2,2024-11-13T23:15:38.657000 @@ -265510,30 +265513,30 @@ CVE-2024-50809,0,0,0543ed682b74f6a15eb703e6e2e2cbff22bee156f875bd21c519fc7274b92 CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000 CVE-2024-50810,0,0,7da23b2ab88a2657cb76543548549613aa1f561df30582c648f7520bf514f0d4,2024-11-12T13:56:54.483000 CVE-2024-50811,0,0,d8ef1ac40dcb898d28bb949cb8cb9a8ce73f83d8e224524d33d6a2ba92df335a,2024-11-12T13:56:54.483000 -CVE-2024-5082,0,0,cb3e951bda46c1109919ca7a678dadb9606afdd347c29db218b2212393edae45,2024-11-14T16:35:15.960000 -CVE-2024-50823,0,0,2e3eed0e10706d12ac6edf3de28d8ea62fff93b7c877208ab10072a1a4fd7baf,2024-11-14T18:15:19.940000 -CVE-2024-50824,0,0,d00b846930484fbbce7bdb09824dfe70ffba685c849b72b2ba7d1c10c81206af,2024-11-14T18:15:20.107000 -CVE-2024-50825,0,0,b19038dc42214d1be237b151cc9fb5c6dc663beb62f52e2ec0213e7446b5bd16,2024-11-14T18:15:20.230000 -CVE-2024-50826,0,0,f0c8ef389fccef7f33cb99e2a4bf4a4bc876d1132cc52311f62e5fbfc012d126,2024-11-14T18:15:20.350000 -CVE-2024-50827,0,0,f168cef41cd7a54e803709d8bd886da57e0948d39d51d6345834de7710b580e0,2024-11-14T18:15:20.457000 -CVE-2024-50828,0,0,9f15c177b20d85daadeb6ffb06e3a27ac4e87ccbfbcfa7c9a30f6f82cb84750d,2024-11-14T18:15:20.580000 -CVE-2024-50829,0,0,e6266c33d16b684e110a9959e9e7eb33a7d04f9cb637340c5ee5aa729167b57c,2024-11-14T18:15:20.853000 -CVE-2024-5083,0,0,354c3da34b8f763f544f0a11d2fd1368a94de7e7d66991c980b19b9a84dcb883,2024-11-14T16:35:16.267000 -CVE-2024-50830,0,0,46d5dee8148ab451f9fe20968670525ca2af0642e62c9e7f268d471c0a9975d0,2024-11-14T18:15:21.063000 -CVE-2024-50831,0,0,02adc50bcffb5b7bf893716b08bac8248c08364658e04ba0ed22181dc2aa4c7f,2024-11-14T18:15:21.180000 -CVE-2024-50832,0,0,aedec215e4fff8b086e324bb81716bdb261a8d4579e06c7127153d9e74c69cb4,2024-11-14T17:15:06.823000 -CVE-2024-50833,0,0,8a96d04960a2653f66a832963d35c2f3eafedd781373d43d2535c42d531f1769,2024-11-14T17:15:06.917000 -CVE-2024-50834,0,0,ff4e100f60622e5d9ce338fcf7ab94d399525bdbd301fed837c9edc8d99c4f5a,2024-11-14T17:15:07.003000 -CVE-2024-50835,0,0,4c49f45501187673346fd1cc366755759fd782ee43c85d8161bb20ac39b258a6,2024-11-14T17:15:07.090000 -CVE-2024-50836,0,0,e4170c7bde5a8712bd1a169ba3cd2bdeba23ba63ce58eac087ccd35178aa8e33,2024-11-14T17:15:07.177000 -CVE-2024-50837,0,0,96fcb499d8472366d78a24893fbbac02e051d7a3c4b83012b851978cab4924d9,2024-11-14T19:35:17.623000 -CVE-2024-50838,0,0,d3c85db11c13d4fba199f7e6340f60a6c715055c9315a5219004d92d9ce4c5df,2024-11-14T19:35:18.427000 -CVE-2024-50839,0,0,01640e157e2a49f4f650966b70746ee61106bde203a589e9de4ac4be36608fd9,2024-11-14T19:35:19.240000 +CVE-2024-5082,0,1,3c0f951c5b33762a472b3ea33ccf88b6977979b0c14a32ab8b6cbf67889fd7af,2024-11-15T13:58:08.913000 +CVE-2024-50823,0,1,a7026ee15916bc36c3e42723c6a10980ba2883e893c0171902ae31b7d89f1060,2024-11-15T13:58:08.913000 +CVE-2024-50824,0,1,c55d7e12643db55061d4a640017bff61e9f15221ac6001bee882deb20ebe943b,2024-11-15T13:58:08.913000 +CVE-2024-50825,0,1,8dce200ffd161c4239ec859a75978c9248b5ff5d89ba1d807f28989fc4da017a,2024-11-15T13:58:08.913000 +CVE-2024-50826,0,1,96416466db84ead7728fcd4c227ba8d6325dccb40ead7a5cab15ffc264df75f3,2024-11-15T13:58:08.913000 +CVE-2024-50827,0,1,203b5b6d15b29a748a40717f8d394e86bd8b82d1f36ce357bf01c585dd635748,2024-11-15T13:58:08.913000 +CVE-2024-50828,0,1,d38eb603f6d52963b831aa645a76e2a42079a7abb971db821189cd7245975e71,2024-11-15T13:58:08.913000 +CVE-2024-50829,0,1,dd181a80b73d89f1ffa2079bf99fb9386ab3c8712533acd07526f8acc5c56715,2024-11-15T13:58:08.913000 +CVE-2024-5083,0,1,732c694a7e1209ed2f8fc7bc4b33638dd34156f3bcdf08e1c465413b90acb66d,2024-11-15T13:58:08.913000 +CVE-2024-50830,0,1,32471327f9de17614ff8dcf3bbf6f1a4c39c87320e10e0a3c6c50da64f1958bc,2024-11-15T13:58:08.913000 +CVE-2024-50831,0,1,2290314ea9a02a60bfa34f07e4d4c3dd85301533416c71431af8b48595f840ba,2024-11-15T13:58:08.913000 +CVE-2024-50832,0,1,cd96b74da2fa5ea2c366f454efebbe37a4e092fdcb4c80e7a0b378224ba2a8fd,2024-11-15T13:58:08.913000 +CVE-2024-50833,0,1,5964073e00a86b1dfe7860be97241ed8ef7353cb5b89ab0a9e0e4fb932d64792,2024-11-15T13:58:08.913000 +CVE-2024-50834,0,1,25391f19d247f5c5625bd98bd56a6bc2e8f791aeed4903e0b187b006792c5b65,2024-11-15T13:58:08.913000 +CVE-2024-50835,0,1,d5fbc4b0d7032126c0f14b65179dabe6edfc46679aef0894f54588480863cf78,2024-11-15T13:58:08.913000 +CVE-2024-50836,0,1,85766955476c98bd839d5b2de9f60973de1bd164e67470863e519d1cacd3f4a7,2024-11-15T13:58:08.913000 +CVE-2024-50837,0,1,fa916683a3dbdfde4d576245ae8ebbe1bad5683debaaa4ab7d920a9d6cde4375,2024-11-15T13:58:08.913000 +CVE-2024-50838,0,1,03dc014a97e8c40e12ccc27e79d2f7d1a4be7052e0e877e043248cf17a531f10,2024-11-15T13:58:08.913000 +CVE-2024-50839,0,1,3a608a7f42db8a1d3498636aca9211ea343bc7800681c21ae957ddd569de8350,2024-11-15T13:58:08.913000 CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000 -CVE-2024-50840,0,0,8955f492100255068b940e7935b918e5bbcb11994bf34f2daf1b5882bc9a7544,2024-11-14T19:35:20.033000 -CVE-2024-50841,0,0,ee2c60c11c28af1ad6f5941091e02458a0eeda596a52828fe6a1eeb35f455204,2024-11-14T19:35:20.837000 -CVE-2024-50842,0,0,5121c7171f1e61aaa48992446e276abddf9e8bc92a9c1fc4eb5a094a20f99e76,2024-11-14T19:35:21.650000 -CVE-2024-50843,0,0,7c516cdb53e3e589740dd68d67e686b2cd7aad02d1967da6279de76f51b446c0,2024-11-14T19:35:22.450000 +CVE-2024-50840,0,1,601608d1ca95a74cd56c0dd2a1a4b49ba28181e146695e4569128379dc5e5b7f,2024-11-15T13:58:08.913000 +CVE-2024-50841,0,1,024c85eb651d2b498ef517f63a06a689ce4d3e3c9e9daff3a7c4a6f00269c068,2024-11-15T13:58:08.913000 +CVE-2024-50842,0,1,cd0c52715782c1f793f61b49abf65f7f712f1badfd90077c866b2e48024a0004,2024-11-15T13:58:08.913000 +CVE-2024-50843,0,1,4477435381e6083c9119592b1603e3c4197eb68378d57b4a3fc0ce6a1344e25c,2024-11-15T13:58:08.913000 CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000 CVE-2024-50852,0,0,64b96a730bbab5fdeb50ea2ef9d8c753a3ee332a2ced5e6155c4d6262476cb74,2024-11-14T14:38:04.837000 CVE-2024-50853,0,0,1baed05583acd81f33e173c1b1cff8a1aa290b815790fbe2c0ede1914c1b3840,2024-11-14T14:49:16.290000 @@ -265548,11 +265551,11 @@ CVE-2024-5092,0,0,00bc3fe74171cc3f61d986dd5d1b43711757ac5d30e24bab5f84b663495133 CVE-2024-5093,0,0,13d2e709dd3e7be8048d02a6012bbed004823bd119b45510128e77bb922bb163,2024-06-04T19:20:58.343000 CVE-2024-5094,0,0,a6da916325cb7c5c0cbf108ef5f048d7004d52e417cf8850e363484a9b36d59d,2024-06-04T19:20:58.470000 CVE-2024-5095,0,0,1588c0abfc34bbd50f97e7721e8e7ba42bb279c7cb42725ee04b715e36b1b7b7,2024-06-04T19:20:58.577000 -CVE-2024-50955,0,0,ec1df4774ced3ee8e08b0e6dc33a1298def9632e674148ec98ebb3b55df15e72,2024-11-13T22:15:15.710000 -CVE-2024-50956,0,0,aa07eba7d8457d8deebcae0bdda9a793e5e68b4579e4144dcb9e44a634484de5,2024-11-13T22:15:15.773000 +CVE-2024-50955,0,1,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b80318c,2024-11-15T13:58:08.913000 +CVE-2024-50956,0,1,61199958fcf25ae9206f0f8875ee79a0e783a402692b34e9d18c29f4a470b75f,2024-11-15T13:58:08.913000 CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be87,2024-06-04T19:20:58.687000 CVE-2024-50966,0,0,17999db3c119b65097d64bae028974d0e6d4cf5d6910c7a7a211536c5ff5b48a,2024-11-08T19:01:03.880000 -CVE-2024-50968,0,0,e9b4ecd2f141afeba881b07b4f0db960c0ae6d7b8e09b0b3c3fa4f924f151914,2024-11-14T22:15:19.900000 +CVE-2024-50968,0,1,cdb414b0ec5b70d2218ae5e9dc043fda59b893e101e9eea07e1c691b1af0a88c,2024-11-15T13:58:08.913000 CVE-2024-50969,0,0,f82f81fef8a82d72e4053f9ec8030a8d4d20833c5d6be0f5bb0e03f29d0491f9,2024-11-14T14:47:53.487000 CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000 CVE-2024-50970,0,0,2e7889cd3277e474e337527bd160fa64940d7885ad18ecb1fd92dbeebea4ffd5,2024-11-14T14:52:08.097000 @@ -265599,7 +265602,7 @@ CVE-2024-51022,0,0,9c971f391f021663a674f6ebedab01c215349ea525c288aa5349243311884 CVE-2024-51023,0,0,b12f806c39027dd585f6605b170e48144a3513f557c323acb9850f669a22caef,2024-11-05T21:35:11.923000 CVE-2024-51024,0,0,2602616b46cde149e40ad1ec2305c8463ebfa9f137264738865d2534ea931b9c,2024-11-05T20:35:25.253000 CVE-2024-51026,0,0,62fad2f07d50146e8433d063d38894194ce538e71bf191ac14b4c471f5cbc87a,2024-11-12T18:35:32.357000 -CVE-2024-51027,0,0,be92197401f137f85b68cf1a4f391d89fcc32bae4d859fae5d823a8188d1049c,2024-11-13T22:15:15.823000 +CVE-2024-51027,0,1,0df86581863a598d2520a0e997d45372c5b4a9ad62b540c319606898003d1398,2024-11-15T13:58:08.913000 CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df46,2024-06-04T19:20:59.297000 CVE-2024-51030,0,0,f2e747039aa1c94bb05e787f4d207222d754db12ded9f6bb6df83cbdf74d7a25,2024-11-13T16:47:16.060000 CVE-2024-51031,0,0,b86b8798942030d83468cd0fee37fbed37248c27fcb27a06dd2e8866d706c425,2024-11-13T19:34:52.990000 @@ -265634,7 +265637,7 @@ CVE-2024-51136,0,0,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87 CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000 CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000 CVE-2024-51152,0,0,2fc415b0efc6d5417097e1245b382b91c976aaa5917a1040e7761d3f03c4c572,2024-11-13T20:03:06.083000 -CVE-2024-51156,0,0,fd68715628c43bd6fec84797fb8738e9d093fbe22b5f958056ed30ce651d0966,2024-11-14T22:15:20.100000 +CVE-2024-51156,0,1,ab531e15c589d8d218306e8fd6a6995b5bbbca61f7ac15e609aad877e064595a,2024-11-15T13:58:08.913000 CVE-2024-51157,0,0,15c268449f10cd3f5e2b0f898333f8df5f6a7a275257a0f4491ba5cb90f1b17e,2024-11-12T13:56:54.483000 CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000 @@ -265664,7 +265667,7 @@ CVE-2024-51246,0,0,aa194fa853a376377fe6819071cfa2916e0d00edaefe6d104071b5230b5ba CVE-2024-51247,0,0,6f763214fc728651cee8f49e7f9d3466af02b1a87bcb320803295d2391bcc8af,2024-11-05T19:28:25.143000 CVE-2024-51248,0,0,24dce655c534c26b0b67ea327bc58bc6e5d7937e725965feb96bf75ba11def28,2024-11-05T19:28:29.730000 CVE-2024-51249,0,0,23dd85f23924e75ce199438298671d7b20ece05b7ee21f636e4f3929eb3f65e7,2024-11-04T18:50:05.607000 -CVE-2024-5125,0,0,9510d0b0017e51aeff47cd796d174da78a6aa3383162558c0d995d4ae8f4e9f7,2024-11-14T18:15:26.760000 +CVE-2024-5125,0,1,4f170aace6b5c692b539636ba8a6126582ffcd0c045483b65d5ad5819a69c4c6,2024-11-15T13:58:08.913000 CVE-2024-51251,0,0,63152562fe66f261ed3205b0767b9a859ea9c0ff927b599c5c96705e6967a8f8,2024-11-04T18:50:05.607000 CVE-2024-51252,0,0,bf357f6855609c81237cb444d332859dc7316dc50aaeed6006dd85a3ea82ebf7,2024-11-05T20:54:38.960000 CVE-2024-51253,0,0,bd6b7c4e24728199770eb9a14af1e277c7168d7d6f853e011077c74df42885e3,2024-11-04T18:50:05.607000 @@ -265858,8 +265861,8 @@ CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d CVE-2024-51630,0,0,22adffaa9039d1fe9e03a4e48d178f89d1bd36af85559e36a535a227a69b456d,2024-11-12T13:56:24.513000 CVE-2024-51647,0,0,0c6d8f9a804912e43c7869d3b717f4cbcd6166cf1be9c7b6f9ef329e8fce46cc,2024-11-12T13:56:24.513000 CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000 -CVE-2024-51658,0,0,3bda80de595ed6ce4f9dabc667edf54d96a33bf2f9ee6f0f6c81a2538fec842b,2024-11-14T22:15:20.187000 -CVE-2024-51659,0,0,bf6fe4d913d8ef3c8599c1c281c6f9f1237194f182af6128aaa81ce84a9ec197,2024-11-14T22:15:20.390000 +CVE-2024-51658,0,1,435f4fb63039956e91b2b852b51372b029bcbaead7356ecd935124297917cb89,2024-11-15T13:58:08.913000 +CVE-2024-51659,0,1,78d45b532178a143b0c2b377e8ea9093595088b2434d4e401a5f34f0a4ad9452,2024-11-15T13:58:08.913000 CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000 CVE-2024-51661,0,0,7f81708d1fd43600536029afc897b01b4855aee3d2fe39c5692b8132139274de,2024-11-08T15:02:08.660000 CVE-2024-51662,0,0,f5359332d7a9d4e37aab99663d0e73af1a60912d65021c3415523622490d6f78,2024-11-12T13:56:24.513000 @@ -265876,16 +265879,16 @@ CVE-2024-51675,0,0,8a4bacc24cff024145f3f2bcaf3202f909b690eb8b24ec3863ccfd5d10856 CVE-2024-51676,0,0,ece0a16779fe3a19431027941663a0cdb1298b76465f9e748c1eef77d20b83f9,2024-11-12T13:56:24.513000 CVE-2024-51677,0,0,8b0f7a3853108bd14021b832cd2914a4bbd49dc774029c03bf84670c6d192320,2024-11-06T22:10:31.677000 CVE-2024-51678,0,0,ce4086679232add4ebc40be30bdc12f20f02b66e38c181d2556e9473603941fd,2024-11-06T22:10:45.103000 -CVE-2024-51679,0,0,c6cf4cbab8ac5216f729883f6b1e88f15c9a7d5f346cb1ab3dc5d99c672b9fed,2024-11-14T22:15:20.610000 +CVE-2024-51679,0,1,416926b16682f0c55900a28defd472a645a0e4e03f884d4071960b168013dde9,2024-11-15T13:58:08.913000 CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000 CVE-2024-51680,0,0,e3d442fcfe0b4fceddb505a5eff13c52978f820716977fad69b0fdd39fa2c605,2024-11-06T22:10:59.270000 CVE-2024-51681,0,0,6987ab81beb2df0eaa9da220f2d791ed5d8df3f0e18bd37d9a9b390a4eaf5a17,2024-11-06T22:11:16.003000 CVE-2024-51682,0,0,aaba0581a3d811571ae104155388a45dd47ae531ed284c6ab0022efdb152fbe5,2024-11-06T22:12:02.353000 CVE-2024-51683,0,0,f59d50717ee7305489d521abf4c5c1ef491e4436568b0e3c6dd145e0ad77427b,2024-11-06T22:12:19.803000 -CVE-2024-51684,0,0,24e1e7c8c6901580073f63c406d394fc7ca548013bd85f72aa7e461e38516fa1,2024-11-14T21:15:22.140000 +CVE-2024-51684,0,1,a66bec9d86deedea6e14348a98db70ceeb83061cd431a4e6c641125801528e71,2024-11-15T13:58:08.913000 CVE-2024-51685,0,0,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000 -CVE-2024-51687,0,0,04e6a0201bc9489eec8e83409b200c54e336546fbd229f632336e7cdef1933e3,2024-11-14T21:15:22.353000 -CVE-2024-51688,0,0,f336ea0855ea6c7ae9e523ec49c986b999bafe76f23320e5c7d552ada048279f,2024-11-14T20:15:25.810000 +CVE-2024-51687,0,1,24a77cb38fadbe8a5a015eafc173e9b49aed872e2c6265ce10909094b71db7bc,2024-11-15T13:58:08.913000 +CVE-2024-51688,0,1,4c55663463f797e767c6b3e5e6a57ee83b28815908f133c53dcf3a7dc0159646,2024-11-15T13:58:08.913000 CVE-2024-51689,0,0,ab2f405c7815c7db8e61d12d5b0c31d4e0752b7068e1e475bf3338853f840d9d,2024-11-12T13:56:24.513000 CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000 CVE-2024-51690,0,0,7e5eae0ff5cca9f377bf464de65b2d968392e357bd55f7a073753a3ee3d229f4,2024-11-12T13:56:24.513000 @@ -266000,7 +266003,7 @@ CVE-2024-51992,0,0,6af48747827be50f1e3a16e8e861da6495a81992702d7833ebe1335a57ab1 CVE-2024-51993,0,0,0b180a03099571fff8a13158fe72d7871f053352d43d872590f8f53c841ecca8,2024-11-08T19:01:03.880000 CVE-2024-51994,0,0,9ecdd0862ec4cb4e8cbc599710fe336df5bb3c681162050e709512d4ec211c97,2024-11-08T19:01:03.880000 CVE-2024-51995,0,0,7484e6b15af945f697a88a8c3b9d2c315fe6e0004cde6e533470a014d3f9ae3d,2024-11-08T19:01:03.880000 -CVE-2024-51996,0,0,86573c0bd0b10665030640bfed417d1076f293e97ea44e8c81dd8afe8df049b9,2024-11-13T17:15:11.870000 +CVE-2024-51996,0,1,0a7b5626197330d2deefd861196112c7d2cb23b384e4a55d59917685d6bf245c,2024-11-15T14:00:09.720000 CVE-2024-51997,0,0,ab86aff6fa43516eaff213e4584d906496b3f2e2f19bf6f0c2c9236a622fbe69,2024-11-12T13:56:54.483000 CVE-2024-51998,0,0,19a2e1052c10533bdc1ed034b91b5ec816f585536da2e947441dab97cd0af7ac,2024-11-08T19:01:03.880000 CVE-2024-52000,0,0,53607fd920c5e6c0c523f59cb394de5d5c634c469499e12c0f4cb198af2d27c3,2024-11-12T13:56:54.483000 @@ -266061,8 +266064,8 @@ CVE-2024-5228,0,0,d7fb18ef663e7fbb963ee04e575f2bc258b900955c0912600676521519fad8 CVE-2024-52286,0,0,a006a0be971b0e96964504e5809b0d7c6410ed1592b8c4976d82ae2953104dc3,2024-11-12T13:55:21.227000 CVE-2024-52288,0,0,8f949332b60260488906ff1b8c70f9a1209d9b10278c3c334faa6ae7259272ba,2024-11-12T13:55:21.227000 CVE-2024-5229,0,0,787c92e076dbd9dca682f832ee22f0e31b439c91ed2d6b58a8c544f86d4189c3,2024-07-03T02:08:42.827000 -CVE-2024-52291,0,0,bb797954dee1822ddfb0939ca521eb6b4c7024444be2086274bad3ffb8c0f6d8,2024-11-13T17:15:12.087000 -CVE-2024-52292,0,0,90401e539503dcfd236aea24ec18aa5a72dcfcee1f7b0e459ae4e79587f9a8f7,2024-11-13T17:15:12.303000 +CVE-2024-52291,0,1,fafc120c824abccbbbd1655cda9505d589a683965834f3ef4a977c8bff8181bf,2024-11-15T14:00:09.720000 +CVE-2024-52292,0,1,c4b9012714205012dabf563cec252d830c6f1b4cdf3e29387e0d322f13e715f3,2024-11-15T14:00:09.720000 CVE-2024-52293,0,0,be674165b50e47c42934b026587a88a0d357895caf150a8f7a87138e0392b425,2024-11-13T17:01:16.850000 CVE-2024-52295,0,0,5bb196d45351b5c5415457f3e913ea51119231df112b61c7f2362bdc436f254f,2024-11-13T19:35:16.587000 CVE-2024-52296,0,0,e6de64e2880a3b50a57d7a18eca2e2a99963ce11a96b5efab192b94d0fcdfe73,2024-11-13T17:01:58.603000 @@ -266072,10 +266075,10 @@ CVE-2024-52299,0,0,b25255ab4f1b29c4028976bec468c74e39d28d9197a16d9d7dc41d1fe898e CVE-2024-5230,0,0,f45c8274ba28e0dc58bed98870ed092580a9c18662584e7c3debbd7f7cd359f4,2024-06-04T19:21:02.540000 CVE-2024-52300,0,0,f4e4e536b3ce93b4bea9ba04caa74bba8b78b20ed3e702dcbb1c83ad51694c69,2024-11-13T17:01:16.850000 CVE-2024-52301,0,0,091c40845cee35a6db54cae490564bdae10317d21b9b1b70a65b6fc3311911d8,2024-11-13T17:01:16.850000 -CVE-2024-52302,0,0,bec456bb6d847ca2f982f444c73f49a605fb31e8a54bf47ab023a23471898db3,2024-11-14T16:15:20.087000 +CVE-2024-52302,0,1,07877ae667924fcd5dc6349e2bbc5755286c2a37cd731fe353996ab7a3354ec7,2024-11-15T13:58:08.913000 CVE-2024-52305,0,0,dc609877fc9dfb62c6c6bc68486e8898c1a92ac08e89f322ce436991076d7cdb,2024-11-13T19:15:08.853000 CVE-2024-52306,0,0,59f18663771ceab92cba47c3e31ee5dd3eed1ee3c6f7144187a60ded4a98f970,2024-11-13T17:01:16.850000 -CVE-2024-52308,0,0,5f2903faaa6af73bb516cae7a392d6b05fcfeb189ded112b08497d75479336bb,2024-11-15T01:15:03.740000 +CVE-2024-52308,0,1,68dbd5663bc1fce9463187e86de0183ed1b47f7db3824a2242b39ee69302613a,2024-11-15T13:58:08.913000 CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000 CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000 CVE-2024-52312,0,0,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000 @@ -266095,27 +266098,27 @@ CVE-2024-52356,0,0,6f52c6a317f3e6d9b4fea003476d72ca3813f755516b2759515eed910b7d7 CVE-2024-52357,0,0,0b87f00ebcffd7ab9b093f3ccd343158c40fba6d8989757f4c8a16b72f945025,2024-11-12T13:55:21.227000 CVE-2024-52358,0,0,98865d3b54e5cf46f7348181649ffde2326b16ddca1830d7a36a631093f0fb1c,2024-11-12T13:55:21.227000 CVE-2024-5236,0,0,3a876190aab882c0110e09fef49a5c72516897cda47bddba2de12251cfa9a5e8,2024-05-24T01:15:30.977000 -CVE-2024-52369,0,0,ae9094b09e5afb967416763a162ae84e427c99fc8df047cc10454b5d4560616d,2024-11-14T19:15:09.533000 +CVE-2024-52369,0,1,9bb6355bce4a4436b67b89be0df4c04ac56d16c7e0beb82cd7d9fa08a46a5e50,2024-11-15T13:58:08.913000 CVE-2024-5237,0,0,8803efe45da93d97b55082adbd1bb29281c1282514c20ec3608a648081cd56be,2024-06-04T19:21:03.317000 -CVE-2024-52370,0,0,8c9d6ca4ccd27001e922f930f3ccceb2cdfaf3ddd39977cc6e79e5f0568f9844,2024-11-14T19:15:09.760000 -CVE-2024-52371,0,0,e317ec242f10297ab3e3fbb218a6c860ca6829dfd4eae7680de76f5511014375,2024-11-14T18:15:21.383000 -CVE-2024-52372,0,0,23bb66a968be43561306c3e6f22460792787db17519c7be51902bbab5c73f773,2024-11-14T18:15:21.737000 -CVE-2024-52373,0,0,356a21a49fe25c0e02ed4d02c15b4a7e816a29c13c357516adc354a0e2147649,2024-11-14T18:15:21.993000 -CVE-2024-52374,0,0,78d6fb15794391c868fc56ec155b3c8f40ca933f0b5239bbbadef4b3304b3705,2024-11-14T18:15:22.420000 -CVE-2024-52375,0,0,653b0bd1373146fd4ccda17deb0c35d8f0daf24d36821bb095a73b4fd070b7ad,2024-11-14T18:15:23.117000 -CVE-2024-52376,0,0,b559962c9280acbcee199f6c3ac871209278734389b79e886993cd01664bd39d,2024-11-14T18:15:23.570000 -CVE-2024-52377,0,0,169b963bf9f71b88a242692e8abb9831743969676f6056684c710ab866a074c1,2024-11-14T18:15:23.800000 -CVE-2024-52378,0,0,725a806ad6dc447249e0f3d5a28b7126c924cffcf0e1b9b67071be6faac7979f,2024-11-14T18:15:24.160000 -CVE-2024-52379,0,0,2000c94fb8e536fc455534c247b2d585a2ae7ee7483eeabbd4d680268cba5e2b,2024-11-14T18:15:24.507000 +CVE-2024-52370,0,1,874be94a621de817f27e01c88939990ee0dc4a52d3b1b13e46feb4a595429a4a,2024-11-15T13:58:08.913000 +CVE-2024-52371,0,1,9a946993726136039a1fb1551c053f51c189ddd41644c4ba4290b169bdca8c95,2024-11-15T13:58:08.913000 +CVE-2024-52372,0,1,111b0ca2a795e6ef56f7cbe0caee5bfb901a0830290fa23e169f67a1927cccae,2024-11-15T13:58:08.913000 +CVE-2024-52373,0,1,a5189c794fe72d286d43c099f99f282b112f69d5416a7fbe6208ae0bd66ad816,2024-11-15T13:58:08.913000 +CVE-2024-52374,0,1,d1819e6a2966efc635ff2cb6b4917d1e5ba47121c8188c1c9d7250a92d203e0d,2024-11-15T13:58:08.913000 +CVE-2024-52375,0,1,35eca6c981b2f3551c72d8c94f17e1a840e8c873bc9b2228458bc70709b66885,2024-11-15T13:58:08.913000 +CVE-2024-52376,0,1,edac5b784e6996bb01a6c1e12897935fbb487b409e2d2e812f8b2c6d34005a87,2024-11-15T13:58:08.913000 +CVE-2024-52377,0,1,c192ad27456fea87ae23a8b3f39a82b8f43ef8131f5d34df56642bc235140391,2024-11-15T13:58:08.913000 +CVE-2024-52378,0,1,cd58dacad479640dc895fd48c4d69f33df5b32a6f6d7490c2be4ec3f7894bc41,2024-11-15T13:58:08.913000 +CVE-2024-52379,0,1,77d647e5917248b547551f82c04a1ee052e1c8dc5717b7dff6634059def97fb1,2024-11-15T13:58:08.913000 CVE-2024-5238,0,0,a03a95be1868c6bee6318b11858946fc155e156e4fa75ea27b59162de04fd53f,2024-06-04T19:21:03.413000 -CVE-2024-52380,0,0,439c4471e5c55a16e6c7f1fda73b7588ee53429e29d4c91b708135bb89665294,2024-11-14T18:15:24.837000 -CVE-2024-52381,0,0,5490501b0b7cb5dd31281f323cc53949170590f25be3035ec9c58749bb2a77ac,2024-11-14T18:15:25.137000 -CVE-2024-52382,0,0,8b50a0c69ecff4a10ad372fa1734c345b5933c67dc642634393504c339d3d961,2024-11-14T18:15:25.400000 -CVE-2024-52383,0,0,f6c4247e5b79c9b3acf2e12769de76728836c89b6b47cdb325f0e8aa5c66b961,2024-11-14T18:15:25.673000 -CVE-2024-52384,0,0,ce4a2adcca8fedb3ffd2031633939cc5b2a015620a5bcfe722fe131a1a735e3f,2024-11-14T18:15:25.913000 +CVE-2024-52380,0,1,424b66af08a431dc68e605f19f164d9b67b08c8aaec35ebd9f0a1ce7cf945087,2024-11-15T13:58:08.913000 +CVE-2024-52381,0,1,3fbc89030970c07d375e37c82ba59ce7607ae9e6c691ea1328542c68d514aa99,2024-11-15T13:58:08.913000 +CVE-2024-52382,0,1,c4bf60f4f3e3ee1d6c9140f8005c8310fb9af0b0c2e66dc8173a41341386c9ed,2024-11-15T13:58:08.913000 +CVE-2024-52383,0,1,59cf4c36c8c34facc65aedf368b7db52af8e4801d0555a71f39486dfcb6217b9,2024-11-15T13:58:08.913000 +CVE-2024-52384,0,1,12b6b4c606276d15fa1739f31b57b636d0ff7888825685c206f091a25d7ded7a,2024-11-15T13:58:08.913000 CVE-2024-5239,0,0,22096f8834a8c03dcb48be161c14c319f43af7764381bdfba5862a8d7ec5b0e4,2024-06-04T19:21:03.520000 -CVE-2024-52393,0,0,5d325e767191cb4360b1037e8925cbd1e9b39c416613dffc3da9c523441c42ab,2024-11-14T18:15:26.140000 -CVE-2024-52396,0,0,25ddfd2ed12e4786902a6f41c33759128a4017098e69734285be305e8b0a3d90,2024-11-14T18:15:26.377000 +CVE-2024-52393,0,1,544c9a3bd507c14f5bd824b3ace32c372ff7d621dec666c2268e7d1fbb090c75,2024-11-15T13:58:08.913000 +CVE-2024-52396,0,1,ed7ce5f089112efbbf69e98091ae455f8a1a2931f642482b52d2f92fdebab2fc,2024-11-15T13:58:08.913000 CVE-2024-5240,0,0,f498b44970022e280094b55bfe8352214cc561bf319f52e66772660c36836426,2024-06-04T19:21:03.623000 CVE-2024-5241,0,0,b91d4b722c041cbce6644b69dfde443a5ae4515bb0ecbdc8f8544e6b04a0143c,2024-06-04T19:21:03.750000 CVE-2024-5242,0,0,8cd95bcd77d40a92ee0a6d389bf812b544cb6fb4b8301f7049b84de17fceaeef,2024-05-24T01:15:30.977000 @@ -266127,30 +266130,30 @@ CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b295 CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee66037e,2024-11-03T17:15:14.860000 CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000 CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000 -CVE-2024-52505,0,0,57ccd65234ca26ee122006fc2fd297cd6476ffcbc3e000ccfd260aa2e522cc64,2024-11-14T16:15:20.220000 +CVE-2024-52505,0,1,7c58f328eee3b40bfcef13b278250e7509b58c18af26b7fe642ca2ce116c61a9,2024-11-15T13:58:08.913000 CVE-2024-5251,0,0,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000 CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000 -CVE-2024-52524,0,0,722ff46c18c852a9996cf4c27de7aa2756510ae7b124e9e0792e085fdaedaaba,2024-11-14T18:15:26.610000 +CVE-2024-52524,0,1,71485345519193ae9ba542ea67056853a738d2240eb01cec0b89113cc24468ca,2024-11-15T13:58:08.913000 CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000 CVE-2024-52530,0,0,9accb3b51708da4056e1b2d60bf748a8c8f27363e68e7120159317514b4fed53,2024-11-12T19:35:14.927000 CVE-2024-52531,0,0,4a9a627b31c610f608576c39893b61b41c0efeb9f9d97b523937261d20004d52,2024-11-12T19:35:15.807000 CVE-2024-52532,0,0,82ab4898c82b79d45f58347a35d13014aa77e1fd942e3edcc771ee91b2c6c3ad,2024-11-12T19:35:16.970000 CVE-2024-52533,0,0,81d75647e8fcacbe880bcd9f7eaf399938e1df4314078c30bc37f40639859c7b,2024-11-12T16:35:24.297000 CVE-2024-5254,0,0,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000 -CVE-2024-52549,0,0,3c79f42de089400023832f2a700dadf63bd2b4467e19d3aa8d7949f383760707,2024-11-13T22:35:09.080000 +CVE-2024-52549,0,1,fd75f7ddf331713d4d68d280968ebe1a7937bdcd0767d23dbc768a0c6cf66c13,2024-11-15T14:00:09.720000 CVE-2024-5255,0,0,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000 -CVE-2024-52550,0,0,ad35d846143676674f55bb39e6439a9aa1d1c39a085e8380205c3f9c7636b1e0,2024-11-13T21:15:29.293000 -CVE-2024-52551,0,0,7ee16d2302efffc22faf9ec686be6c4a45304f424ee88d43bce465c18138ce1f,2024-11-14T15:35:10.030000 -CVE-2024-52552,0,0,bdb4f02fc3d28749ea47fb312bc85b815498f8ace92224d78ef1aa7a8d2bc842,2024-11-14T15:35:10.847000 -CVE-2024-52553,0,0,5602c295c7578b126a9c46f9cdfcc2e7851420bc881f6e4c49d092d872bff3dd,2024-11-13T22:35:09.903000 -CVE-2024-52554,0,0,3f7ed4dee0fd87788192b6e6774565b96dc8c5231e31c40c962e78bcb5935f64,2024-11-13T22:35:10.700000 +CVE-2024-52550,0,1,661ac238dfad624bd220f9ba8f9c5922eaba43fcb8053e586f1460e86428b73b,2024-11-15T14:00:09.720000 +CVE-2024-52551,0,1,a55fcfda0c856a7c2e6739ceee574cb85a24fabb6c3ff844edb014b969fe974d,2024-11-15T14:00:09.720000 +CVE-2024-52552,0,1,2f96ac448bf9b00ee8139fe2b1f83755e1d5e7ee62e44cc3e0f2925f12d3f6ce,2024-11-15T14:00:09.720000 +CVE-2024-52553,0,1,11348c28b862f60d8b3c8dc11ab0fb5f1e53e1358b82b1f8a97199c0de1f5907,2024-11-15T14:00:09.720000 +CVE-2024-52554,0,1,6589eaee43c4794afc2869f1e1fb69f264d40d3a38b215d2e67a517b5a3abbef,2024-11-15T13:58:08.913000 CVE-2024-5256,0,0,c0c79be075ef53b66bd4c726b840e366d70c6f0c56013178c0440e2e2bf91c1e,2024-09-24T18:41:40.007000 CVE-2024-5257,0,0,e4fba0a5c9dc635ae9582dcee356a08c90165a6e8c8a0a01b6dfbef5e885cd24,2024-07-12T16:54:34.517000 CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000 CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000 CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000 CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000 -CVE-2024-52613,0,0,3e383ee6275a668108ed2d62ea0f0dad8cbfea7922ad0b4d35817148dbb199c1,2024-11-14T23:15:05.967000 +CVE-2024-52613,0,1,9959ccabc06b7c4865878e6ea669712da2592f256182abd74f6dbf4231644332,2024-11-15T13:58:08.913000 CVE-2024-5262,0,0,83603483afb7387d019b476baa2cae004e6d4e7f9b65a5997b6545bcd7a41b63,2024-06-11T17:18:50.600000 CVE-2024-5263,0,0,997be873c6f28955b5d0d8cb5df3c06ebeb17c50a7068003806eac08a0ed2846,2024-08-07T16:01:35.217000 CVE-2024-5264,0,0,7660c1edaddd779c29789898410be8f6784b9b682f1b3f0cb339e7e58b29768e,2024-06-21T17:18:00.973000 @@ -266730,10 +266733,10 @@ CVE-2024-5913,0,0,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b CVE-2024-5914,0,0,5ab56ff6e03c38766463339097d3da51e1161518db555649197f85ab7972331e,2024-08-20T16:22:06.357000 CVE-2024-5915,0,0,02c85b3460ff280d15df03319450806b3e5d30c71b9189b0ecc887e95a66b96e,2024-08-20T16:23:10.493000 CVE-2024-5916,0,0,5c958efb87a06f0a35735b489fd355d0842ab659e7fda78c1c111ac292a5fa45,2024-08-20T19:30:11.980000 -CVE-2024-5917,0,0,8312a0373c8ae07af5f5ff1c9de2dc34bf27ce28cb7dc87b5ceb7bc0541ae223,2024-11-14T10:15:08.607000 -CVE-2024-5918,0,0,601111e345cc602a705aa6e6333f879bc4848188533dab44825b2b0c4edbdab0,2024-11-14T10:15:08.813000 -CVE-2024-5919,0,0,ef37f8c39509464f0f0ee3958c2bb090e15db003bf1922feacaacba6b6b1823e,2024-11-14T10:15:09.027000 -CVE-2024-5920,0,0,d8577d51641e20a781d4d81162248086899f1355b1a3025dae0803d61f107939,2024-11-14T10:15:09.223000 +CVE-2024-5917,0,1,a39fbbac1190d92d966cdf19c9a927a7c0a96e862058b0163628c17f4a7f6de6,2024-11-15T13:58:08.913000 +CVE-2024-5918,0,1,88becd1b2966b560f82646aa7f974f77214bd3a55c994cfc8e755b4f03134072,2024-11-15T13:58:08.913000 +CVE-2024-5919,0,1,8f8927031df583665b1d75315ef8952b20df8dea438865dba0d05d4820d70f35,2024-11-15T13:58:08.913000 +CVE-2024-5920,0,1,51ec49cbee3eb90449e3fab927d98f3df16920675ceb32c0cbe775d630ce053b,2024-11-15T13:58:08.913000 CVE-2024-5922,0,0,50960a94a5a484ee279a2b7dcacb2f2a0eb6eb2607889fe30657dd07f5206782,2024-06-28T10:27:00.920000 CVE-2024-5924,0,0,4b7e4b611121f550bcb0fd877a4f853b37b9df78f8237b70038811b9cca802bd,2024-06-17T12:43:31.090000 CVE-2024-5925,0,0,e946172587053e70c75c453600b6000de540319095aebb04cea6cd10cd2597bf,2024-06-28T10:27:00.920000 @@ -266865,7 +266868,7 @@ CVE-2024-6064,0,0,4e113927f74e0953e67a2edd02307ec5164ca1a59a235d271f6fdb46199c8d CVE-2024-6065,0,0,fb62e316a0ad9ece1e768d08a64b14f3810d575505955be6b70f210883e1f8c6,2024-08-08T16:10:07.147000 CVE-2024-6066,0,0,5bf5957210d37b62ac802e0ce97b7afa3dcb298f48bcd651cbf6bebf0741a628,2024-08-08T16:05:04.247000 CVE-2024-6067,0,0,a73dc457c770b2e45a6dd293341485e3a7db7c0fb5a46fb8e73299fe897d8932,2024-08-08T16:24:21.720000 -CVE-2024-6068,0,0,50e35eb8c18da26a456aeaddd0104d0fd03875e3ed8bf390602102d874dd8853,2024-11-14T17:15:07.680000 +CVE-2024-6068,0,1,cc716d020d2e1e1c55c1561f0b0ed389125b60a453b13211fd76fbe082b95680,2024-11-15T13:58:08.913000 CVE-2024-6069,0,0,262b48eb8c330c3b1dd3ca5015bcbc32f226a318c6d31e421e5580f86d9ea37b,2024-07-09T18:19:14.047000 CVE-2024-6070,0,0,1949da6de042279176b79576f8e73bfd6878b90ce3cb716b8378384d024fe5eb,2024-08-01T14:00:09.647000 CVE-2024-6071,0,0,bca2018b96efb2814691d14babc0569e66d271cf9656a7d77f33746825377522,2024-06-28T10:27:00.920000 @@ -267748,7 +267751,7 @@ CVE-2024-7120,0,0,dd88c4d4f5099fe6bbb2fa59d0942931f85db230d235608307fdbb069312e6 CVE-2024-7121,0,0,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000 CVE-2024-7122,0,0,348ac43c4b3841d8ea6bf4cc4c8ca071e08de7e4a4af578e88c361afae480157,2024-09-03T14:41:02.420000 CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000 -CVE-2024-7124,0,0,72459d434c06551bc3a4110fda6383a68bf60af42d29b0530243092ffc7b8244,2024-11-14T15:15:09.177000 +CVE-2024-7124,0,1,8ca2faed0847a769adbf753e68a561a58b9a2ca49ac6617d2045b7c9b26cef41,2024-11-15T13:58:08.913000 CVE-2024-7125,0,0,eeabb5486a5ad2f2094206d4f0142bb635fc7a57bcd2279354b026b1e44628c1,2024-08-27T13:01:37.913000 CVE-2024-7127,0,0,2842be40cd41bba2687b1d2d238a3a521369bfe05553f868496bd1f3f7f4951f,2024-08-23T14:00:59.740000 CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583f9,2024-07-29T14:12:08.783000 @@ -267983,7 +267986,7 @@ CVE-2024-7398,0,0,4bceec8e4e1ae5d86e69945d7f8f61d9ec5b7ac80a4cf5b22e0ebbed499850 CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861e6,2024-08-13T15:30:52.337000 CVE-2024-7400,0,0,880bea0e2ff4ceadacbe376968f4ebe20bb468fa58e2ed97aa47316bc459f45c,2024-09-30T12:46:20.237000 CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000 -CVE-2024-7404,0,0,e2b94883a3e96458c9c97bac0c6868ccb3a61249960a651bd90de0fc72d255de,2024-11-14T13:15:05.050000 +CVE-2024-7404,0,1,3de89ee628b5ee024a57e174f6f544c149981b7447dbe414eb2dc5874d61c7d0,2024-11-15T13:58:08.913000 CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 CVE-2024-7409,0,0,a0a6addbe3c2f0cc1db031d3b6ccbc76b45c7e3857a91ea8908f269e71f57171,2024-11-12T17:15:10.833000 CVE-2024-7410,0,0,d4e8b81d7bab3d90baf0746a6fdf1d2e1dd63b1bd2599e20b73bae4467a0729b,2024-08-12T13:41:36.517000 @@ -268261,7 +268264,7 @@ CVE-2024-7725,0,0,0aa115eb5d51c7a8f3b04c61085136493dcca84fb2460c54ba86db4138dcdd CVE-2024-7727,0,0,210da2d03590f7837e73d2a797749f40cf37c3d8121af3fa52cb49298f27dd84,2024-09-18T18:07:55.450000 CVE-2024-7728,0,0,6e291d9f53263e2fb59ac76ca77cbca952de50403aadce3c0e948994f87ca9a9,2024-08-14T13:00:37.107000 CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f71,2024-08-14T13:00:37.107000 -CVE-2024-7730,0,0,a634741f495e3ec408272e754c9efb333594cc9ebc6a1fdfa7605f286255efbe,2024-11-14T12:15:18.857000 +CVE-2024-7730,0,1,a03a177b890b764d3539d9493e7289c45ead33d93263985f4e6c8d5545dac612,2024-11-15T13:58:08.913000 CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000 CVE-2024-7732,0,0,301f49d15dd3186d40aa3031630ea252f10589d241790753d1277daa7600dd48,2024-10-03T18:39:20.227000 CVE-2024-7733,0,0,6e2d7bf1ae3b63c8d3634c7048b79cd280171ae70720629e0842a624f33387c9,2024-09-12T16:20:49.503000 @@ -268303,7 +268306,7 @@ CVE-2024-7783,0,0,39c8808c8c931a81ab6f36457422df672bce6f594a7e28cbb717d3fa5f5b7d CVE-2024-7784,0,0,7e942e70a98522ec84a0bbfc9f820ed1b39966f32999b97410584854b83e96dc,2024-11-08T09:15:08.083000 CVE-2024-7785,0,0,a72f8e02860a571fa21aeee74639693caaa851e87622e48dd31b51d79a961437,2024-09-20T12:30:17.483000 CVE-2024-7786,0,0,fc116ee7a384561ad006648b89134c44e9184040e8b317407aecf4e96010cf80,2024-10-07T17:46:08.943000 -CVE-2024-7787,0,0,79ae0a178ab0d95375d06015f2f8124773b17fc844e5199caeeee900f5e4fd10,2024-11-14T09:15:28.200000 +CVE-2024-7787,0,1,8c972d8894bd2f09ace4b7d67f4e97757cc2c4ce5fce2ec1a031b9811f9e9802,2024-11-15T13:58:08.913000 CVE-2024-7788,0,0,70ac00bf2f1b71d3cd198f79846cc3aedcbc03d7b166d0d3297938d6d80c8e0c,2024-09-25T19:56:45.847000 CVE-2024-7790,0,0,456afed422d8355372643bd567f11679217bfde5ad866de9b559c62284a4c756,2024-08-20T19:27:28.757000 CVE-2024-7791,0,0,7416656b44e86a668ddf90bfa89c01f36bde25a07c507963ab58656b2d115a3d,2024-08-27T13:01:37.913000 @@ -268614,7 +268617,7 @@ CVE-2024-8173,0,0,50ae04f881a2d18920200f91fab2c91cb50ce1f1b838a9340ca053dbaf5dd8 CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000 CVE-2024-8175,0,0,93cd36c03979068837f469bd77e40d2775fae2df59f7cba10d5c6e9b4e387e5b,2024-09-26T13:32:02.803000 CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000 -CVE-2024-8180,0,0,3f527220eaed68bc730314de70b8de4960a606f59b9267ff7aee238c3ece9a2a,2024-11-14T11:15:04.933000 +CVE-2024-8180,0,1,1ef4988ada0861011caab53fe9c701222028221d2bc6840b7e69f2f294674651,2024-11-15T13:58:08.913000 CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000 CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000 CVE-2024-8184,0,0,92c1db6b8911f83c9668ff411c9a02657286363b11f9f1292cd97f0715f9d11d,2024-11-08T21:00:09.857000 @@ -268972,7 +268975,7 @@ CVE-2024-8643,0,0,65992d3896b37b48df19952ad7033017b9b000296b656714e5a6ab5e9ea7fe CVE-2024-8644,0,0,8daf59c098b2276a29dcd1d73a81642c115f1f83d1a0bcca3d09a68de0fbf0d0,2024-10-04T17:14:20.587000 CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000 CVE-2024-8646,0,0,80914337a2bd562d2db1f36aec06ad883cb607d6cc039af494590eb0a0b50d8e,2024-09-18T20:20:51.643000 -CVE-2024-8648,0,0,43ab4e0d4e4c0d1da9e2f5bfa98e7e8061916cc15d0b838a453b324dcbda7d27,2024-11-14T13:15:05.323000 +CVE-2024-8648,0,1,057cf1f99c5c8db25ca2994a3c910a492267630cdc8a4749d522d281110c1092,2024-11-15T13:58:08.913000 CVE-2024-8651,0,0,98f15bd48d1c12270cdb328a70de9359f32b42ef85efa713989e765f41ce1150,2024-09-23T17:51:13.050000 CVE-2024-8652,0,0,5d01775755896a4299850c49803f86a9d1b46ea9f2e8832e738f33bf1157fe52,2024-09-23T17:53:49.197000 CVE-2024-8653,0,0,9ff517ad541f0c9badefd1c8205a26f97eafbec49ef5c58c2bc37d53706b328b,2024-09-23T17:55:01.610000 @@ -269174,7 +269177,7 @@ CVE-2024-8956,0,0,1cb756cbfed7cce32103cd61ea4e7225af7cf46acb1dafb383d10ad8a9c01d CVE-2024-8957,0,0,0308f2f5a0567b3e01401fcc5a35dd0d4903c31a6d3992c47cfe16c6bc21eadc,2024-11-05T02:00:01.697000 CVE-2024-8959,0,0,0dc3502ed244ae66bafd80efba15dddd0bb76667e6d8b2d3ee7e3d6fc71e6baf,2024-10-25T12:56:07.750000 CVE-2024-8960,0,0,cb9c3666b1d5630b31aed515dc84bc6b9317ac9454d917c6e7a599d8d75d0609,2024-11-12T13:56:24.513000 -CVE-2024-8961,0,0,ef2de16a9c200ebb5c080448e86705e492f45cad59fd204acd651b5bb9a562a8,2024-11-15T07:15:17.587000 +CVE-2024-8961,0,1,ccb434262e501054e5047a0be923bd2bf8f62654dadfc497a5e1d18e49a2e834,2024-11-15T13:58:08.913000 CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4ad,2024-09-20T16:32:02.563000 CVE-2024-8964,0,0,c8fc4fc0d8f6e4149ea3cd0239ed4708c78c8d6f77eb0df4938d6649d94bf7d7,2024-10-10T12:56:30.817000 CVE-2024-8965,0,0,fcd9a7faf9aba17ebbc93d83d1389f5891b9c0797caaf85615a1a91da1ce5a78,2024-10-04T19:04:03.157000 @@ -269184,8 +269187,8 @@ CVE-2024-8970,0,0,ac6a340d484c123a9130b7a8da1b91e0090b1836f7865857c5a2324dbb60a4 CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000 CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000 CVE-2024-8977,0,0,5252c9de61b84aeddd3ec48f8829f82be03db26645b8f09321099ae149149381,2024-10-16T17:10:13.220000 -CVE-2024-8978,0,0,6fe35329c6e39a1c98f2e36c7371e3dfbe04fa7b1debe5f3e7fafd8f309095f4,2024-11-15T10:15:04.873000 -CVE-2024-8979,0,1,3b0847b3edd3752c396227a7e40f56b4d47ef0d1725031a1ca52cecc92440e0f,2024-11-15T10:15:05.310000 +CVE-2024-8978,0,1,26772e7e3a33787427107050d9c88eeb4d322de177191a9fc9b0986d407d077c,2024-11-15T13:58:08.913000 +CVE-2024-8979,0,1,6f2aaab4f48ba6288e14c4e1346c583b13992c0dae667d0763d97fce46a58acd,2024-11-15T13:58:08.913000 CVE-2024-8980,0,0,34622dfc36a70206b20752d1026a226663789c42eaaff2958041a445f566dbba,2024-10-30T14:46:14.127000 CVE-2024-8981,0,0,72a5e946545b01f6f5b55bd9be0a66c4964926bf866e85b9f0e826b5c8f5cfe7,2024-10-04T13:51:25.567000 CVE-2024-8983,0,0,a5894726a3c72e301955e62952254bf05f92543b19c3d4bf59f7d30236266e8c,2024-10-10T12:57:21.987000 @@ -269322,7 +269325,7 @@ CVE-2024-9177,0,0,c4277901c0a37ba57d19438c33c0231133f774b6681a96af5a3a31a338af68 CVE-2024-9178,0,0,eca5aa915b955e4e0d7be79d1a2a855f18f7873a33fd6eb6846d12ead9d5fc40,2024-11-08T16:03:26.157000 CVE-2024-9180,0,0,43a25f270cfb7cd861387fae3760598de599a33ae7c6d1aa6e3f1a95d5d03b2a,2024-10-18T20:15:03.393000 CVE-2024-9184,0,0,a3ba82d979bc8561ae674a4ec58c26ce5e04750eca08a1e8b1f42f6ecf9aa161,2024-10-18T12:52:33.507000 -CVE-2024-9186,0,0,4e6e56d390fd35384d0a877e85dcf65e1e19dffda20ee75abb60b60dd436dd24,2024-11-14T06:15:07.223000 +CVE-2024-9186,0,1,9ccb88cb17e2872277ccd8115b7398a92c368331839a2f4636e99d27eb66e4e9,2024-11-15T13:58:08.913000 CVE-2024-9187,0,0,ec7d5f1d630d180582cea6b34ef03e6ee8cc268d8686e0a61f71186e80a87f38,2024-10-15T12:57:46.880000 CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb88,2024-10-03T17:26:19.397000 CVE-2024-9191,0,0,ee6dfe1b0c94de0c4973c32fd9b929e1fce6c45c7ed6900711a578d548548d42,2024-11-05T17:06:41.363000 @@ -269432,7 +269435,7 @@ CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa4 CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 CVE-2024-9355,0,0,302621984b6116aa148a6d267ab2864d150a3fcf399bab5a42fa5db73f8156da,2024-11-05T08:15:04.413000 -CVE-2024-9356,0,0,882c233d2df3c09108f62454da36885e4cecfc456fe54bf5ee7bda0e8d1739dc,2024-11-15T06:15:05.233000 +CVE-2024-9356,0,1,5ef3a6f6e42eeb70f3f0a3cf86d7f29bc317f9d12d447c962c47d2384419ce59,2024-11-15T13:58:08.913000 CVE-2024-9357,0,0,ecac5cca1d13ae41e27c64ccd21707ad2b9f6cb13725a3072faecffbc49d78e9,2024-11-12T13:55:21.227000 CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000 CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000 @@ -269475,7 +269478,7 @@ CVE-2024-9409,0,0,bd26a6d58a7fb40d2ba0ec55a264bb1d6254e13220d49c2ad9283b1761c05c CVE-2024-9410,0,0,f1caeb057101bc11b923104c4939c2a18b358804c54a293851a2bbe945ca8cb5,2024-10-07T17:48:28.117000 CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000 CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000 -CVE-2024-9413,0,0,c0aecf595c7ddc8baa726964adda02d3109a7e034ff151bad0ba52cee1884a57,2024-11-13T17:15:12.660000 +CVE-2024-9413,0,1,43902701acbdeb851a55b1b248691b229ddabb1616e4335f2a201d49d639f4ae,2024-11-15T14:00:09.720000 CVE-2024-9414,0,0,5c21f14ec376abe57dfce5e862247c317429afdd9c8e1a9c0b90f9672b7f519b,2024-10-18T12:52:33.507000 CVE-2024-9417,0,0,c74a648d5508a7a2c2d3e505619e54040658d58791e6150e9a0fe8cbf972b416,2024-10-07T17:48:28.117000 CVE-2024-9419,0,0,a3f1d241a393213976f2495a35f5bc1427a284fa16c4a0b19d1f7c056beff495,2024-11-01T12:57:03.417000 @@ -269508,17 +269511,17 @@ CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b0247 CVE-2024-9462,0,0,da874134bd4c6d4628ad3a17d1671b7f5c2018935fed477a57fc0d0990ff5d0e,2024-10-28T13:58:09.230000 CVE-2024-9463,0,0,4113bfcc0359b86f4600f4bd332ad0fb25180b65c5beb0ba03a5a18a0d79965c,2024-11-15T02:00:01.687000 CVE-2024-9464,0,0,2a950a39fbd8d03d9c46c09cf06c881d311182236743fa872a3d09d866901a80,2024-10-17T06:15:04.190000 -CVE-2024-9465,0,0,4ecfaf32a41dbb8eba12ed8cfc02218dbd1e623e37487ebd8f09d7020eb91be6,2024-11-15T02:00:01.687000 +CVE-2024-9465,0,1,064f36dfd96356716729204db567e10570633c1061deec4eb5c398055c531edf,2024-11-15T14:39:34.863000 CVE-2024-9466,0,0,fd9458b730d3a9a669f2d9d658488af28ef360506c84b0ff287be2e6f400846d,2024-10-17T06:15:04.720000 CVE-2024-9467,0,0,75d04ab03e69b7f9e1a38d891f6aaa266a750bf286ffd9f476545cea603cc1a5,2024-10-15T15:09:13.297000 CVE-2024-9468,0,0,f7accbeda6900e100e8aad354b4e5585f782571ee82a35557f7f3b3ab3e92447,2024-10-10T12:51:56.987000 CVE-2024-9469,0,0,bfacd6ae0e951d4d0f806b219fe22ea394e7dcfb5460f334dffa6ddb0a7e18c6,2024-10-15T18:38:25.647000 CVE-2024-9470,0,0,13c3a583553fbf2e90723a5a0ed6f2354808c5a1753993b658aba04d0ed9b282,2024-10-10T12:51:56.987000 CVE-2024-9471,0,0,2517c360d1e41d9c7ea79e15df7f34465e8f98b985f9011876ffa34a1656df21,2024-10-15T16:55:45.090000 -CVE-2024-9472,0,0,dc9ffbb1de0e29c95cab92cb460779413a192268196ad2222d33e0638a30bd5d,2024-11-14T10:15:09.423000 +CVE-2024-9472,0,1,6dc75bb8c902376e1f062a26c7a99982f272de37330a03e0fbfe9796bed76fac,2024-11-15T13:58:08.913000 CVE-2024-9473,0,0,2610a860a1ec132e11b499793a273ee08374ba46887944874ff47b7b5fdd4588,2024-10-17T06:15:04.983000 CVE-2024-9475,0,0,273622ecfea8dd0cb8d3a034084a5946e50b2bee83443e844bae24857067e968,2024-10-28T13:58:09.230000 -CVE-2024-9476,0,0,cd14ba23f0939f14e898d7f7298e9013daf249f037aae2844de7db822bf77631,2024-11-14T16:35:17.013000 +CVE-2024-9476,0,1,e9d7dbd43229ebc9ea9972271d753666a58d144ea232688064d92b4b52fc9277,2024-11-15T14:00:09.720000 CVE-2024-9477,0,0,d96fc519f7a9945d386fdd8950ef88a71881f191581b1624fa0de9c4a83d5a52,2024-11-13T17:01:16.850000 CVE-2024-9481,0,0,00fc2967ba19d907f5a39395cc30079db3ef641b613179e4b9951bd38c8d6817,2024-11-08T20:49:03.597000 CVE-2024-9482,0,0,761865a3338cb95ad6952db46fced2e0b200e6722c7208c63ea4447e2930458e,2024-11-08T20:49:58.077000 @@ -269541,7 +269544,7 @@ CVE-2024-9520,0,0,043b00f2bf4932488b29ee05bd55762d90704159cb97bf4c710160da6d1296 CVE-2024-9521,0,0,09a594ea849fc5009e458f6cc46742d3176f440810ef4457104bfe2103f1d0c7,2024-10-16T16:38:14.557000 CVE-2024-9522,0,0,884c9004d667a145fae3b3526c4cb56c9d9a1365bd2a57b2af580c0e3b9c19a1,2024-10-15T14:27:41.553000 CVE-2024-9528,0,0,ad76266403ba94311c1f58d7258b765d914c39ddcd1148706c2e05f82ca92e87,2024-10-07T17:48:28.117000 -CVE-2024-9529,0,0,7b206f56f8791182bae9a95280730e12f0a15b3370466754cfd7515a2ac4dede,2024-11-15T07:15:17.900000 +CVE-2024-9529,0,1,1f833eccd2da22522c8143845fa5e36426abfe1c8d1327010d0bf6c2b380e515,2024-11-15T13:58:08.913000 CVE-2024-9530,0,0,a4f4ec0ca4c538513c522bc25437bdee95aa200ea2c8ddaeaa2d301c3f668205,2024-10-25T18:52:10.810000 CVE-2024-9531,0,0,2d32cff16aa07ef9767a12c3b335b7a483cb4a13b1ba87080414d4508df82841,2024-10-25T12:56:07.750000 CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000 @@ -269607,7 +269610,7 @@ CVE-2024-9598,0,0,dd6abd1d8094ef836910b53aefec035745da73e794770d7e620055613b3335 CVE-2024-9602,0,0,296483daa0f02222bb5f79446d51c7890118dbb294ec1c3853abb9b3dfc7ffb2,2024-10-10T12:51:56.987000 CVE-2024-9603,0,0,f06afeee14d2c3a95b2fa9bd06bec0b0c1ce9ce3a2d2cc5d2614c0b7bfd8287c,2024-10-10T12:51:56.987000 CVE-2024-9607,0,0,6559a4c9ecc679c1a526ad316820d8ef58b184c710c286477d0fc3422e598c6b,2024-11-05T17:40:57.777000 -CVE-2024-9609,0,0,782f63dd9ec94f0cfd9e496a7d9a070ef4b2456f453d64da74341e1a947df847,2024-11-15T05:15:06.373000 +CVE-2024-9609,0,1,c1484c5c48af634e8a1e9ca2c1221b2473ae9ec782fb8f61ec7661582d6a362d,2024-11-15T13:58:08.913000 CVE-2024-9610,0,0,c2ae8ad13a32a2ecc4cf7a3cb852077ce2d6eff8b7bb2625c3e46911eeeead24,2024-10-15T12:58:51.050000 CVE-2024-9611,0,0,f16a109b2beda9ef97e16997885b40d38db6eba42b8291e32288f7a269b19f0c,2024-10-15T12:58:51.050000 CVE-2024-9613,0,0,03f12b76d11ccd814de04879dc193f94fb86a0d3aade1fad8084c29f467aedb8,2024-10-28T13:58:09.230000 @@ -269623,7 +269626,7 @@ CVE-2024-9628,0,0,61a27472b9da741357728e2747c61581a42641370f854cfe14defa2dd6861d CVE-2024-9629,0,0,31c72e7d62d8dbf8ba1681676a61a2f04680ade1749c367b775242f4864b6d17,2024-10-29T14:34:50.257000 CVE-2024-9630,0,0,95cf42fc9d833aab63558caaeb38c94fd9570f2d1a1e45300ec7feb07db9cd04,2024-10-25T12:56:07.750000 CVE-2024-9632,0,0,c06a5ac998e148649dc6c5dee5c57116c25a0e87e4991e75c7be58f6925baae3,2024-11-13T20:15:17.487000 -CVE-2024-9633,0,0,0402d9c47d57ccecc722f11847f72044d4ddecdfc221cd0e358bd44639a93f26,2024-11-14T14:15:19.660000 +CVE-2024-9633,0,1,e5fbee35063cb2b5bb72c098df6afb2f3f6d152341b6d3ba5eca4eaf82f8969c,2024-11-15T13:58:08.913000 CVE-2024-9634,0,0,d64c376a2cd176bba19f7a8121026bf8ac88c7cb95243ab4e56bfc5d5fa1c1d3,2024-10-16T16:38:14.557000 CVE-2024-9637,0,0,bfd23401e1c5bf70ae99ee491fd04ce8ab223b8247ed87e78ca84ed9446a1b72,2024-10-28T13:58:09.230000 CVE-2024-9642,0,0,647a46d1d1e49bfca6a77d0bd6bf95c53250c168d1d2756cdcd405ced420913f,2024-10-28T13:58:09.230000 @@ -269651,7 +269654,7 @@ CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a06 CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000 CVE-2024-9689,0,0,8f8c579186810d2b61eae71f3a64a7543fcf1895acd4679afad8157c388bec86,2024-11-07T20:35:16.807000 CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000 -CVE-2024-9693,0,0,c6ea5ba17df453e037e2d4723b967aff1042a36b3e7f6b3b7751a1a0eb47d0a9,2024-11-14T11:15:05.210000 +CVE-2024-9693,0,1,d3ce3af0a6d80dbc98dd50b33c81a1344c9e31c2a5be66350b63da26f2e128f6,2024-11-15T13:58:08.913000 CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000 CVE-2024-9700,0,0,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000 CVE-2024-9703,0,0,dd5db55cccdddcc3b58f6b494a8ef777447f72688cd0a2c60dac8e42fee7b6a9,2024-10-22T15:25:27.887000 @@ -269707,8 +269710,8 @@ CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de71379 CVE-2024-9826,0,0,c03e2e0710a5712915ae2341fa5030e5bd74d5917743f7fdf85c043b115b921d,2024-11-01T16:17:10.620000 CVE-2024-9827,0,0,c5e7676b9d011eef0934f8d1e51cd92697f77495088547784042162cb4944824,2024-11-01T16:17:07.187000 CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000 -CVE-2024-9832,0,0,250bc8a027d07cac875fe02fa67ee6cd9ae11b581359f4050abc5ada38057db9,2024-11-14T21:15:22.593000 -CVE-2024-9834,0,0,67abbf15dee09830db62f959cdd27d0286551b3552366821272b2b280ac302b9,2024-11-14T21:15:22.803000 +CVE-2024-9832,0,1,f83569141ad467d0d58d6d102fc2c3d41921b26196f3d65ebeb4a5f0b165400e,2024-11-15T13:58:08.913000 +CVE-2024-9834,0,1,58a96ed6d2e0276f3eaa10de898ae35fd311ab0f6605b68b83724fedae743534,2024-11-15T13:58:08.913000 CVE-2024-9835,0,0,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f14,2024-11-12T15:35:17.853000 CVE-2024-9836,0,0,5d120048cea246a15edceb1ecc1c13de92be1dc1c21567e1e478f7428ef25fec,2024-11-12T15:35:18.093000 CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000