From cc13ee5acdeedd8b969d5fbc0a91f8dd4ecc364a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 1 Nov 2024 13:03:21 +0000 Subject: [PATCH] Auto-Update: 2024-11-01T13:00:21.251545+00:00 --- CVE-2019/CVE-2019-252xx/CVE-2019-25219.json | 4 +- CVE-2023/CVE-2023-520xx/CVE-2023-52044.json | 4 +- CVE-2023/CVE-2023-520xx/CVE-2023-52045.json | 4 +- CVE-2023/CVE-2023-520xx/CVE-2023-52066.json | 8 +- CVE-2023/CVE-2023-58xx/CVE-2023-5816.json | 8 +- CVE-2024/CVE-2024-01xx/CVE-2024-0105.json | 4 +- CVE-2024/CVE-2024-01xx/CVE-2024-0106.json | 4 +- CVE-2024/CVE-2024-100xx/CVE-2024-10005.json | 8 +- CVE-2024/CVE-2024-100xx/CVE-2024-10006.json | 8 +- CVE-2024/CVE-2024-100xx/CVE-2024-10086.json | 8 +- CVE-2024/CVE-2024-101xx/CVE-2024-10108.json | 8 +- CVE-2024/CVE-2024-102xx/CVE-2024-10223.json | 8 +- CVE-2024/CVE-2024-102xx/CVE-2024-10228.json | 8 +- CVE-2024/CVE-2024-102xx/CVE-2024-10232.json | 4 +- CVE-2024/CVE-2024-103xx/CVE-2024-10331.json | 66 +- CVE-2024/CVE-2024-103xx/CVE-2024-10367.json | 64 + CVE-2024/CVE-2024-103xx/CVE-2024-10392.json | 8 +- CVE-2024/CVE-2024-103xx/CVE-2024-10399.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10452.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10454.json | 4 +- CVE-2024/CVE-2024-104xx/CVE-2024-10456.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10487.json | 4 +- CVE-2024/CVE-2024-104xx/CVE-2024-10488.json | 4 +- CVE-2024/CVE-2024-104xx/CVE-2024-10491.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10500.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10501.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10502.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10503.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10505.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10506.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10507.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10509.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10525.json | 4 +- CVE-2024/CVE-2024-105xx/CVE-2024-10544.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10546.json | 10 +- CVE-2024/CVE-2024-105xx/CVE-2024-10556.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10557.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10559.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10561.json | 8 +- CVE-2024/CVE-2024-105xx/CVE-2024-10573.json | 4 +- CVE-2024/CVE-2024-105xx/CVE-2024-10594.json | 4 +- CVE-2024/CVE-2024-105xx/CVE-2024-10595.json | 4 +- CVE-2024/CVE-2024-105xx/CVE-2024-10596.json | 4 +- CVE-2024/CVE-2024-105xx/CVE-2024-10597.json | 4 +- CVE-2024/CVE-2024-105xx/CVE-2024-10598.json | 4 +- CVE-2024/CVE-2024-105xx/CVE-2024-10599.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10600.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10601.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10602.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10605.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10607.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10608.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10609.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10610.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10611.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10612.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10613.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10615.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10616.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10617.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10618.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10619.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10620.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10651.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10652.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10653.json | 4 +- CVE-2024/CVE-2024-106xx/CVE-2024-10654.json | 141 ++ CVE-2024/CVE-2024-204xx/CVE-2024-20493.json | 1531 ++++++++++++++++++- CVE-2024/CVE-2024-215xx/CVE-2024-21510.json | 4 +- CVE-2024/CVE-2024-215xx/CVE-2024-21537.json | 8 +- CVE-2024/CVE-2024-233xx/CVE-2024-23309.json | 8 +- CVE-2024/CVE-2024-247xx/CVE-2024-24777.json | 8 +- CVE-2024/CVE-2024-255xx/CVE-2024-25566.json | 8 +- CVE-2024/CVE-2024-280xx/CVE-2024-28052.json | 8 +- CVE-2024/CVE-2024-288xx/CVE-2024-28875.json | 8 +- CVE-2024/CVE-2024-301xx/CVE-2024-30149.json | 4 +- CVE-2024/CVE-2024-311xx/CVE-2024-31151.json | 8 +- CVE-2024/CVE-2024-311xx/CVE-2024-31152.json | 8 +- CVE-2024/CVE-2024-319xx/CVE-2024-31972.json | 4 +- CVE-2024/CVE-2024-319xx/CVE-2024-31973.json | 4 +- CVE-2024/CVE-2024-319xx/CVE-2024-31975.json | 4 +- CVE-2024/CVE-2024-329xx/CVE-2024-32946.json | 8 +- CVE-2024/CVE-2024-336xx/CVE-2024-33603.json | 8 +- CVE-2024/CVE-2024-336xx/CVE-2024-33623.json | 8 +- CVE-2024/CVE-2024-336xx/CVE-2024-33626.json | 8 +- CVE-2024/CVE-2024-336xx/CVE-2024-33699.json | 8 +- CVE-2024/CVE-2024-337xx/CVE-2024-33700.json | 8 +- CVE-2024/CVE-2024-360xx/CVE-2024-36060.json | 4 +- CVE-2024/CVE-2024-375xx/CVE-2024-37573.json | 4 +- CVE-2024/CVE-2024-393xx/CVE-2024-39332.json | 4 +- CVE-2024/CVE-2024-397xx/CVE-2024-39719.json | 4 +- CVE-2024/CVE-2024-397xx/CVE-2024-39720.json | 4 +- CVE-2024/CVE-2024-397xx/CVE-2024-39721.json | 4 +- CVE-2024/CVE-2024-397xx/CVE-2024-39722.json | 4 +- CVE-2024/CVE-2024-39xx/CVE-2024-3935.json | 4 +- CVE-2024/CVE-2024-420xx/CVE-2024-42041.json | 4 +- CVE-2024/CVE-2024-425xx/CVE-2024-42515.json | 4 +- CVE-2024/CVE-2024-428xx/CVE-2024-42835.json | 4 +- CVE-2024/CVE-2024-433xx/CVE-2024-43382.json | 4 +- CVE-2024/CVE-2024-433xx/CVE-2024-43383.json | 4 +- CVE-2024/CVE-2024-439xx/CVE-2024-43930.json | 4 +- CVE-2024/CVE-2024-439xx/CVE-2024-43933.json | 4 +- CVE-2024/CVE-2024-439xx/CVE-2024-43984.json | 4 +- CVE-2024/CVE-2024-440xx/CVE-2024-44080.json | 4 +- CVE-2024/CVE-2024-440xx/CVE-2024-44081.json | 8 +- CVE-2024/CVE-2024-465xx/CVE-2024-46531.json | 4 +- CVE-2024/CVE-2024-479xx/CVE-2024-47939.json | 4 +- CVE-2024/CVE-2024-480xx/CVE-2024-48063.json | 4 +- CVE-2024/CVE-2024-480xx/CVE-2024-48093.json | 4 +- CVE-2024/CVE-2024-481xx/CVE-2024-48112.json | 4 +- CVE-2024/CVE-2024-481xx/CVE-2024-48138.json | 4 +- CVE-2024/CVE-2024-482xx/CVE-2024-48200.json | 4 +- CVE-2024/CVE-2024-482xx/CVE-2024-48202.json | 4 +- CVE-2024/CVE-2024-482xx/CVE-2024-48206.json | 4 +- CVE-2024/CVE-2024-482xx/CVE-2024-48214.json | 4 +- CVE-2024/CVE-2024-482xx/CVE-2024-48241.json | 4 +- CVE-2024/CVE-2024-482xx/CVE-2024-48271.json | 4 +- CVE-2024/CVE-2024-482xx/CVE-2024-48272.json | 4 +- CVE-2024/CVE-2024-483xx/CVE-2024-48307.json | 4 +- CVE-2024/CVE-2024-483xx/CVE-2024-48311.json | 4 +- CVE-2024/CVE-2024-483xx/CVE-2024-48346.json | 4 +- CVE-2024/CVE-2024-483xx/CVE-2024-48359.json | 4 +- CVE-2024/CVE-2024-483xx/CVE-2024-48360.json | 4 +- CVE-2024/CVE-2024-484xx/CVE-2024-48461.json | 4 +- CVE-2024/CVE-2024-485xx/CVE-2024-48569.json | 4 +- CVE-2024/CVE-2024-485xx/CVE-2024-48572.json | 4 +- CVE-2024/CVE-2024-485xx/CVE-2024-48573.json | 4 +- CVE-2024/CVE-2024-486xx/CVE-2024-48646.json | 4 +- CVE-2024/CVE-2024-486xx/CVE-2024-48647.json | 4 +- CVE-2024/CVE-2024-486xx/CVE-2024-48648.json | 4 +- CVE-2024/CVE-2024-487xx/CVE-2024-48733.json | 8 +- CVE-2024/CVE-2024-487xx/CVE-2024-48734.json | 8 +- CVE-2024/CVE-2024-487xx/CVE-2024-48735.json | 4 +- CVE-2024/CVE-2024-488xx/CVE-2024-48807.json | 4 +- CVE-2024/CVE-2024-489xx/CVE-2024-48910.json | 4 +- CVE-2024/CVE-2024-489xx/CVE-2024-48921.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48955.json | 4 +- CVE-2024/CVE-2024-495xx/CVE-2024-49501.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49674.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49685.json | 4 +- CVE-2024/CVE-2024-497xx/CVE-2024-49768.json | 8 +- CVE-2024/CVE-2024-497xx/CVE-2024-49769.json | 8 +- CVE-2024/CVE-2024-503xx/CVE-2024-50334.json | 8 +- CVE-2024/CVE-2024-503xx/CVE-2024-50344.json | 8 +- CVE-2024/CVE-2024-503xx/CVE-2024-50347.json | 4 +- CVE-2024/CVE-2024-503xx/CVE-2024-50348.json | 8 +- CVE-2024/CVE-2024-503xx/CVE-2024-50353.json | 8 +- CVE-2024/CVE-2024-503xx/CVE-2024-50354.json | 4 +- CVE-2024/CVE-2024-503xx/CVE-2024-50356.json | 4 +- CVE-2024/CVE-2024-504xx/CVE-2024-50419.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50421.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50422.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50423.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50424.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50425.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50428.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50454.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50455.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50456.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50459.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50466.json | 8 +- CVE-2024/CVE-2024-505xx/CVE-2024-50503.json | 8 +- CVE-2024/CVE-2024-505xx/CVE-2024-50504.json | 8 +- CVE-2024/CVE-2024-505xx/CVE-2024-50506.json | 8 +- CVE-2024/CVE-2024-505xx/CVE-2024-50507.json | 8 +- CVE-2024/CVE-2024-505xx/CVE-2024-50508.json | 8 +- CVE-2024/CVE-2024-505xx/CVE-2024-50509.json | 8 +- CVE-2024/CVE-2024-505xx/CVE-2024-50510.json | 8 +- CVE-2024/CVE-2024-505xx/CVE-2024-50511.json | 8 +- CVE-2024/CVE-2024-505xx/CVE-2024-50512.json | 8 +- CVE-2024/CVE-2024-508xx/CVE-2024-50801.json | 4 +- CVE-2024/CVE-2024-508xx/CVE-2024-50802.json | 4 +- CVE-2024/CVE-2024-510xx/CVE-2024-51060.json | 4 +- CVE-2024/CVE-2024-510xx/CVE-2024-51063.json | 4 +- CVE-2024/CVE-2024-510xx/CVE-2024-51064.json | 4 +- CVE-2024/CVE-2024-510xx/CVE-2024-51065.json | 4 +- CVE-2024/CVE-2024-510xx/CVE-2024-51066.json | 4 +- CVE-2024/CVE-2024-512xx/CVE-2024-51242.json | 4 +- CVE-2024/CVE-2024-512xx/CVE-2024-51243.json | 4 +- CVE-2024/CVE-2024-512xx/CVE-2024-51254.json | 4 +- CVE-2024/CVE-2024-512xx/CVE-2024-51255.json | 4 +- CVE-2024/CVE-2024-512xx/CVE-2024-51257.json | 8 +- CVE-2024/CVE-2024-512xx/CVE-2024-51258.json | 8 +- CVE-2024/CVE-2024-512xx/CVE-2024-51259.json | 4 +- CVE-2024/CVE-2024-512xx/CVE-2024-51260.json | 4 +- CVE-2024/CVE-2024-512xx/CVE-2024-51296.json | 8 +- CVE-2024/CVE-2024-512xx/CVE-2024-51298.json | 8 +- CVE-2024/CVE-2024-512xx/CVE-2024-51299.json | 8 +- CVE-2024/CVE-2024-513xx/CVE-2024-51300.json | 8 +- CVE-2024/CVE-2024-513xx/CVE-2024-51301.json | 8 +- CVE-2024/CVE-2024-513xx/CVE-2024-51304.json | 4 +- CVE-2024/CVE-2024-513xx/CVE-2024-51378.json | 4 +- CVE-2024/CVE-2024-514xx/CVE-2024-51419.json | 4 +- CVE-2024/CVE-2024-514xx/CVE-2024-51424.json | 4 +- CVE-2024/CVE-2024-514xx/CVE-2024-51425.json | 4 +- CVE-2024/CVE-2024-514xx/CVE-2024-51426.json | 4 +- CVE-2024/CVE-2024-514xx/CVE-2024-51427.json | 4 +- CVE-2024/CVE-2024-514xx/CVE-2024-51430.json | 4 +- CVE-2024/CVE-2024-514xx/CVE-2024-51478.json | 4 +- CVE-2024/CVE-2024-514xx/CVE-2024-51481.json | 4 +- CVE-2024/CVE-2024-514xx/CVE-2024-51482.json | 4 +- CVE-2024/CVE-2024-515xx/CVE-2024-51567.json | 4 +- CVE-2024/CVE-2024-515xx/CVE-2024-51568.json | 4 +- CVE-2024/CVE-2024-64xx/CVE-2024-6479.json | 4 +- CVE-2024/CVE-2024-64xx/CVE-2024-6480.json | 4 +- CVE-2024/CVE-2024-74xx/CVE-2024-7424.json | 4 +- CVE-2024/CVE-2024-74xx/CVE-2024-7456.json | 60 + CVE-2024/CVE-2024-78xx/CVE-2024-7883.json | 4 +- CVE-2024/CVE-2024-79xx/CVE-2024-7985.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7991.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7992.json | 8 +- CVE-2024/CVE-2024-81xx/CVE-2024-8185.json | 4 +- CVE-2024/CVE-2024-84xx/CVE-2024-8444.json | 4 +- CVE-2024/CVE-2024-85xx/CVE-2024-8512.json | 4 +- CVE-2024/CVE-2024-85xx/CVE-2024-8553.json | 4 +- CVE-2024/CVE-2024-85xx/CVE-2024-8587.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8588.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8589.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8590.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8591.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8592.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8593.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8594.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8595.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8596.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8597.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8598.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8599.json | 8 +- CVE-2024/CVE-2024-86xx/CVE-2024-8600.json | 8 +- CVE-2024/CVE-2024-86xx/CVE-2024-8627.json | 8 +- CVE-2024/CVE-2024-87xx/CVE-2024-8792.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8871.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8896.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8923.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8924.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8934.json | 4 +- CVE-2024/CVE-2024-91xx/CVE-2024-9110.json | 8 +- CVE-2024/CVE-2024-91xx/CVE-2024-9165.json | 8 +- CVE-2024/CVE-2024-93xx/CVE-2024-9388.json | 4 +- CVE-2024/CVE-2024-94xx/CVE-2024-9419.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9430.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9434.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9446.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9489.json | 8 +- CVE-2024/CVE-2024-96xx/CVE-2024-9632.json | 8 +- CVE-2024/CVE-2024-96xx/CVE-2024-9655.json | 4 +- CVE-2024/CVE-2024-97xx/CVE-2024-9700.json | 8 +- CVE-2024/CVE-2024-97xx/CVE-2024-9708.json | 8 +- CVE-2024/CVE-2024-98xx/CVE-2024-9826.json | 8 +- CVE-2024/CVE-2024-98xx/CVE-2024-9827.json | 8 +- CVE-2024/CVE-2024-98xx/CVE-2024-9846.json | 8 +- CVE-2024/CVE-2024-98xx/CVE-2024-9884.json | 8 +- CVE-2024/CVE-2024-98xx/CVE-2024-9885.json | 8 +- CVE-2024/CVE-2024-98xx/CVE-2024-9886.json | 8 +- CVE-2024/CVE-2024-99xx/CVE-2024-9988.json | 8 +- CVE-2024/CVE-2024-99xx/CVE-2024-9989.json | 8 +- CVE-2024/CVE-2024-99xx/CVE-2024-9990.json | 8 +- CVE-2024/CVE-2024-99xx/CVE-2024-9996.json | 8 +- CVE-2024/CVE-2024-99xx/CVE-2024-9997.json | 8 +- README.md | 44 +- _state.csv | 519 +++---- 261 files changed, 3148 insertions(+), 787 deletions(-) create mode 100644 CVE-2024/CVE-2024-103xx/CVE-2024-10367.json create mode 100644 CVE-2024/CVE-2024-106xx/CVE-2024-10654.json create mode 100644 CVE-2024/CVE-2024-74xx/CVE-2024-7456.json diff --git a/CVE-2019/CVE-2019-252xx/CVE-2019-25219.json b/CVE-2019/CVE-2019-252xx/CVE-2019-25219.json index e11e7b26a9b..21a718446b8 100644 --- a/CVE-2019/CVE-2019-252xx/CVE-2019-25219.json +++ b/CVE-2019/CVE-2019-252xx/CVE-2019-25219.json @@ -2,8 +2,8 @@ "id": "CVE-2019-25219", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T17:15:03.567", - "lastModified": "2024-10-30T16:35:01.230", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52044.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52044.json index 3079955f907..ac0fc2dc270 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52044.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52044.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52044", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:12.347", - "lastModified": "2024-10-31T19:15:12.347", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52045.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52045.json index d3c798ac117..3975adad641 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52045.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52045.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52045", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:12.450", - "lastModified": "2024-10-31T19:15:12.450", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52066.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52066.json index 8ea3e2c6190..9fe5f7a6c92 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52066.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52066.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52066", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.000", - "lastModified": "2024-10-30T21:15:14.000", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "http.zig commit 76cf5 was discovered to contain a CRLF injection vulnerability via the url parameter." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que el commit 76cf5 de http.zig conten\u00eda una vulnerabilidad de inyecci\u00f3n CRLF a trav\u00e9s del par\u00e1metro url." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5816.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5816.json index 41172151375..2345090c91e 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5816.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5816.json @@ -2,13 +2,17 @@ "id": "CVE-2023-5816", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T03:15:03.090", - "lastModified": "2024-10-30T03:15:03.090", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Code Explorer plugin for WordPress is vulnerable to arbitrary external file reading in all versions up to, and including, 1.4.5. This is due to the fact that the plugin does not restrict accessing files to those outside of the WordPress instance, though the intention of the plugin is to only access WordPress related files. This makes it possible for authenticated attackers, with administrator-level access, to read files outside of the WordPress instance." + }, + { + "lang": "es", + "value": " El complemento Code Explorer para WordPress es vulnerable a la lectura arbitraria de archivos externos en todas las versiones hasta la 1.4.5 incluida. Esto se debe a que el complemento no restringe el acceso a los archivos a aquellos que se encuentran fuera de la instancia de WordPress, aunque la intenci\u00f3n del complemento es acceder \u00fanicamente a los archivos relacionados con WordPress. Esto permite que atacantes autenticados, con acceso de nivel de administrador, lean archivos fuera de la instancia de WordPress." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0105.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0105.json index 68d4815c783..03774972d93 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0105.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0105.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0105", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-11-01T06:15:12.397", - "lastModified": "2024-11-01T06:15:12.397", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0106.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0106.json index 6f7c21f61a7..e643ad84bce 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0106.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0106.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0106", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-11-01T06:15:12.883", - "lastModified": "2024-11-01T06:15:12.883", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10005.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10005.json index 17f8537ba80..3ee191c4367 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10005.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10005.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10005", "sourceIdentifier": "security@hashicorp.com", "published": "2024-10-30T22:15:02.820", - "lastModified": "2024-10-30T22:15:02.820", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was identified in Consul and Consul Enterprise (\u201cConsul\u201d) such that using URL paths in L7 traffic intentions could bypass HTTP request path-based access rules." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una vulnerabilidad en Consul y Consul Enterprise (\u201cConsul\u201d) tal que el uso de rutas URL en intenciones de tr\u00e1fico L7 podr\u00eda eludir las reglas de acceso basadas en rutas de solicitud HTTP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10006.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10006.json index 9057616bdf0..efff8296597 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10006.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10006.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10006", "sourceIdentifier": "security@hashicorp.com", "published": "2024-10-30T22:15:03.063", - "lastModified": "2024-10-30T22:15:03.063", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was identified in Consul and Consul Enterprise (\u201cConsul\u201d) such that using Headers in L7 traffic intentions could bypass HTTP header based access rules." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una vulnerabilidad en Consul y Consul Enterprise (\u201cConsul\u201d) tal que el uso de encabezados en intenciones de tr\u00e1fico L7 podr\u00eda eludir las reglas de acceso basadas en encabezados HTTP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10086.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10086.json index 4d519a79ddc..8d531d59481 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10086.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10086.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10086", "sourceIdentifier": "security@hashicorp.com", "published": "2024-10-30T22:15:03.283", - "lastModified": "2024-10-30T22:15:03.283", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una vulnerabilidad en Consul y Consul Enterprise tal que la respuesta del servidor no establec\u00eda expl\u00edcitamente un encabezado HTTP Content-Type, lo que permit\u00eda que las entradas proporcionadas por el usuario se malinterpretaran y generaran un XSS reflejado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10108.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10108.json index f37458c2c40..200563ee902 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10108.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10108.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10108", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T07:15:13.887", - "lastModified": "2024-10-30T07:15:13.887", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WPAdverts \u2013 Classifieds Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's adverts_add shortcode in all versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento WPAdverts \u2013 Classifieds Plugin para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado adverts_add del complemento en todas las versiones hasta la 2.1.6 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficiente. Esto permite que atacantes no autenticados inyecten scripts web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10223.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10223.json index 1ae4d91fa9e..c23197a7d3a 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10223.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10223.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10223", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T07:15:15.487", - "lastModified": "2024-10-30T07:15:15.487", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Team \u2013 WordPress Team Member Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's htteamember shortcode in all versions up to, and including, 1.1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Team \u2013 WordPress Team Member para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto htteamember del complemento en todas las versiones hasta la 1.1.4 incluida, debido a una desinfecci\u00f3n de entrada y al escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10228.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10228.json index 71ae484b885..8df801634c6 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10228.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10228.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10228", "sourceIdentifier": "security@hashicorp.com", "published": "2024-10-29T22:15:03.220", - "lastModified": "2024-10-29T22:15:03.220", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Vagrant VMWare Utility Windows installer targeted a custom location with a non-protected path that could be modified by an unprivileged user, introducing potential for unauthorized file system writes. This vulnerability, CVE-2024-10228, was fixed in Vagrant VMWare Utility 1.0.23" + }, + { + "lang": "es", + "value": "El instalador de Windows de Vagrant VMWare Utility apuntaba a una ubicaci\u00f3n personalizada con una ruta no protegida que pod\u00eda ser modificada por un usuario sin privilegios, lo que generaba la posibilidad de escrituras no autorizadas en el sistema de archivos. Esta vulnerabilidad, CVE-2024-10228, se corrigi\u00f3 en Vagrant VMWare Utility 1.0.23" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10232.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10232.json index 2ca174d8f96..902a201214c 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10232.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10232.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10232", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-01T10:15:03.080", - "lastModified": "2024-11-01T10:15:03.080", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10331.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10331.json index a8304908828..d4e09c81063 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10331.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10331.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10331", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-24T11:15:14.327", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-01T12:41:51.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:vehicle_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4C526E65-D52A-44FC-9193-8544B55EB158" + } + ] + } + ] + } + ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.281675", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281675", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.427426", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10367.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10367.json new file mode 100644 index 00000000000..29d518e3935 --- /dev/null +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10367.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-10367", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-01T11:15:12.130", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Otter Blocks \u2013 Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 3.0.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3178637/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/otter-blocks/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9d83c085-b33a-4003-9e0a-8457669d6634?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10392.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10392.json index a35cf6ecac5..20b33797924 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10392.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10392.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10392", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-31T06:15:04.400", - "lastModified": "2024-10-31T06:15:04.400", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AI Power: Complete AI Pack plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'handle_image_upload' function in all versions up to, and including, 1.8.89. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento AI Power: Complete AI Pack para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n 'handle_image_upload' en todas las versiones hasta la 1.8.89 incluida. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10399.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10399.json index 1b40354db9f..5dff18fbff6 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10399.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10399.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10399", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T06:15:14.763", - "lastModified": "2024-10-30T06:15:14.763", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_search_users function in all versions up to, and including, 5.0.13. This makes it possible for authenticated attackers, with Subscriber-level access and above, to obtain usernames and emails of site users." + }, + { + "lang": "es", + "value": " El complemento Download Monitor para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n ajax_search_users en todas las versiones hasta la 5.0.13 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, obtengan nombres de usuario y correos electr\u00f3nicos de los usuarios del sitio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10452.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10452.json index 0ab494b6efb..d91d8051caa 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10452.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10452.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10452", "sourceIdentifier": "security@grafana.com", "published": "2024-10-29T16:15:04.593", - "lastModified": "2024-10-29T16:15:04.593", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Organization admins can delete pending invites created in an organization they are not part of." + }, + { + "lang": "es", + "value": " Los administradores de la organizaci\u00f3n pueden eliminar las invitaciones pendientes creadas en una organizaci\u00f3n de la que no forman parte." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10454.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10454.json index 49aed18266a..465eb0ba2df 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10454.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10454.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10454", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-10-31T13:15:14.580", - "lastModified": "2024-10-31T13:15:14.580", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10456.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10456.json index f671eb09e3f..3b566099a6a 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10456.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10456.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10456", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-10-30T18:15:05.123", - "lastModified": "2024-10-30T18:15:05.123", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Delta Electronics InfraSuite Device Master versions prior to 1.0.12 are affected by a deserialization vulnerability that targets the Device-Gateway, which could allow deserialization of arbitrary .NET objects prior to authentication." + }, + { + "lang": "es", + "value": "Las versiones de Delta Electronics InfraSuite Device Master anteriores a 1.0.12 se ven afectadas por una vulnerabilidad de deserializaci\u00f3n que afecta a Device-Gateway, lo que podr\u00eda permitir la deserializaci\u00f3n de objetos .NET arbitrarios antes de la autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10487.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10487.json index 417909bf83e..89aeec5ff62 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10487.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10487.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10487", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-29T22:15:03.430", - "lastModified": "2024-10-31T14:35:04.283", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10488.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10488.json index d3ad04a784e..0d6c86117d8 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10488.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10488.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10488", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-29T22:15:03.523", - "lastModified": "2024-10-31T14:35:04.517", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10491.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10491.json index c1536b872ca..6e4fbc28388 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10491.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10491.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10491", "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", "published": "2024-10-29T17:15:03.853", - "lastModified": "2024-10-29T17:15:03.853", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in the Express response.links\u00a0function, allowing for arbitrary resource injection in the Link\u00a0header when unsanitized data is used.\n\nThe issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources.\n\nThis vulnerability is especially relevant for dynamic parameters." + }, + { + "lang": "es", + "value": " Se ha identificado una vulnerabilidad en la funci\u00f3n response.links de Express, que permite la inyecci\u00f3n arbitraria de recursos en el encabezado Link cuando se utilizan datos no desinfectados. El problema surge de una desinfecci\u00f3n incorrecta en los valores del encabezado `Link`, que puede permitir una combinaci\u00f3n de caracteres como `,`, `;` y `<>` para precargar recursos maliciosos. Esta vulnerabilidad es especialmente relevante para los par\u00e1metros din\u00e1micos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10500.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10500.json index 1f191876eb0..4e5f5d1bb6d 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10500.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10500.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10500", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-30T01:15:02.803", - "lastModified": "2024-10-30T01:15:02.803", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in ESAFENET CDG 5. Affected by this issue is some unknown functionality of the file /com/esafenet/servlet/policy/HookWhiteListService.java. The manipulation of the argument policyId leads to sql injection. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en ESAFENET CDG 5. Este problema afecta a una funcionalidad desconocida del archivo /com/esafenet/servlet/policy/HookWhiteListService.java. La manipulaci\u00f3n del argumento policyId provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10501.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10501.json index 9a92b4c5c12..da38ed5c994 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10501.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10501.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10501", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-30T01:15:03.107", - "lastModified": "2024-10-30T01:15:03.107", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in ESAFENET CDG 5. This affects the function findById of the file /com/esafenet/servlet/document/ExamCDGDocService.java. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": " Se ha descubierto una vulnerabilidad clasificada como cr\u00edtica en ESAFENET CDG 5. Afecta a la funci\u00f3n findById del archivo /com/esafenet/servlet/document/ExamCDGDocService.java. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10502.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10502.json index 11d30c36a36..799ae51e2a2 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10502.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10502.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10502", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-30T01:15:03.377", - "lastModified": "2024-10-30T01:15:03.377", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in ESAFENET CDG 5 and classified as critical. This vulnerability affects the function getOneFileDirectory of the file /com/esafenet/servlet/fileManagement/FileDirectoryService.java. The manipulation of the argument directoryId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG 5 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n getOneFileDirectory del archivo /com/esafenet/servlet/fileManagement/FileDirectoryService.java. La manipulaci\u00f3n del argumento directoryId provoca una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10503.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10503.json index 035245e5a28..f2635176d73 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10503.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10503.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10503", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-30T01:15:03.653", - "lastModified": "2024-10-30T01:15:03.653", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Klokan MapTiler tileserver-gl 2.3.1 and classified as problematic. This issue affects some unknown processing of the component URL Handler. The manipulation of the argument key leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": " Se encontr\u00f3 una vulnerabilidad en Klokan MapTiler tilerver-gl 2.3.1 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del componente URL Handler. La manipulaci\u00f3n del argumento key conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10505.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10505.json index 48ca47d1694..bd6669ed0a5 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10505.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10505.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10505", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-30T02:15:02.430", - "lastModified": "2024-10-30T02:15:02.430", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in wuzhicms 4.1.0. It has been classified as critical. Affected is the function add/edit of the file www/coreframe/app/content/admin/block.php. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Initially two separate issues were created by the researcher for the different function calls. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en wuzhicms 4.1.0. Se ha clasificado como cr\u00edtica. La funci\u00f3n add/edit del archivo www/coreframe/app/content/admin/block.php est\u00e1 afectada. La manipulaci\u00f3n provoca la inyecci\u00f3n de c\u00f3digo. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Inicialmente, el investigador cre\u00f3 dos problemas separados para las diferentes llamadas de funci\u00f3n. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10506.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10506.json index be498af41f9..e15eca392c6 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10506.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10506.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10506", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-30T03:15:03.490", - "lastModified": "2024-10-30T03:15:03.490", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Blood Bank System 1.0. This affects an unknown part of the file /admin/blood/update/B-.php. The manipulation of the argument Bloodname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en el c\u00f3digo de proyectos Blood Bank System 1.0. Afecta a una parte desconocida del archivo /admin/blood/update/B-.php. La manipulaci\u00f3n del argumento Bloodname provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10507.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10507.json index d0de5e3be43..205483e5a86 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10507.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10507.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10507", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-30T03:15:03.777", - "lastModified": "2024-10-30T03:15:03.777", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Codezips Free Exam Hall Seating Management System 1.0. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips Free Exam Hall Seating Management System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /login.php. La manipulaci\u00f3n del argumento email conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10509.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10509.json index 11a4cedce21..48a67973dab 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10509.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10509.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10509", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-30T03:15:04.060", - "lastModified": "2024-10-30T03:15:04.060", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Codezips Online Institute Management System 1.0. This issue affects some unknown processing of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips Online Institute Management System 1.0. Este problema afecta a algunos procesos desconocidos del archivo /login.php. La manipulaci\u00f3n del argumento email provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10525.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10525.json index c14dcc389a1..68fc746e9ad 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10525.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10525.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10525", "sourceIdentifier": "emo@eclipse.org", "published": "2024-10-30T12:15:02.787", - "lastModified": "2024-10-31T10:15:03.133", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10544.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10544.json index f28d88f4880..709f056d82b 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10544.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10544.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10544", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-31T02:15:03.080", - "lastModified": "2024-10-31T02:15:03.080", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Woo Manage Fraud Orders plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.1.7 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information about users contained in the exposed log files." + }, + { + "lang": "es", + "value": "El complemento Woo Manage Fraud Orders para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 6.1.7 incluida, a trav\u00e9s de archivos de registro expuestos p\u00fablicamente. Esto permite que atacantes no autenticados vean informaci\u00f3n potencialmente confidencial sobre los usuarios contenida en los archivos de registro expuestos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10546.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10546.json index d046cf146ff..797a2d486ae 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10546.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10546.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10546", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-30T20:15:03.700", - "lastModified": "2024-10-30T20:15:03.700", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability classified as critical was found in open-scratch Teaching \u5728\u7ebf\u6559\u5b66\u5e73\u53f0 up to 2.7. This vulnerability affects unknown code of the file /api/sys/ng-alain/getDictItemsByTable/ of the component URL Handler. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability classified as critical was found in open-scratch Teaching ?????? up to 2.7. This vulnerability affects unknown code of the file /api/sys/ng-alain/getDictItemsByTable/ of the component URL Handler. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en open-scratch Teaching ?????? hasta la versi\u00f3n 2.7. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /api/sys/ng-alain/getDictItemsByTable/ del componente URL Handler. La manipulaci\u00f3n conduce a una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10556.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10556.json index e7b4cf8b8a0..9e691166898 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10556.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10556.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10556", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T01:15:14.253", - "lastModified": "2024-10-31T01:15:14.253", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Codezips Pet Shop Management System 1.0. Affected is an unknown function of the file birdsadd.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips Pet Shop Management System 1.0. Se trata de una funci\u00f3n desconocida del archivo birdsadd.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10557.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10557.json index fe1daf891ee..a118a55905e 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10557.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10557.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10557", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T01:15:14.527", - "lastModified": "2024-10-31T01:15:14.527", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Blood Bank Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /file/updateprofile.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Blood Bank Management System 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /file/updateprofile.php. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10559.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10559.json index 7698c92c3ac..0e11646e355 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10559.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10559.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10559", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T02:15:03.370", - "lastModified": "2024-10-31T02:15:03.370", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Airport Booking Management System 1.0 and classified as critical. Affected by this issue is the function details of the component Passport Number Handler. The manipulation leads to buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Airport Booking Management System 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a los detalles de la funci\u00f3n del componente Passport Number Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque debe abordarse de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10561.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10561.json index 2c3c50fd898..90bb74915e6 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10561.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10561.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10561", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T02:15:03.680", - "lastModified": "2024-10-31T02:15:03.680", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file birdsupdate.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Codezips Pet Shop Management System 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo birdsupdate.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10573.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10573.json index 42e00ba4adc..d3120798c61 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10573.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10573", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-31T19:15:12.540", - "lastModified": "2024-10-31T19:15:12.540", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10594.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10594.json index ca9db9acd29..ef0800332f7 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10594.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10594.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10594", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T21:15:14.990", - "lastModified": "2024-10-31T21:15:14.990", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10595.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10595.json index 23294271acb..e18529cd1c0 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10595.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10595.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10595", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T21:15:15.387", - "lastModified": "2024-10-31T21:15:15.387", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10596.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10596.json index 19c578916a4..064a61b5029 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10596.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10596.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10596", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T21:15:15.647", - "lastModified": "2024-10-31T21:15:15.647", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10597.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10597.json index f623e7db1bf..1d895d83be0 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10597.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10597.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10597", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T21:15:15.893", - "lastModified": "2024-10-31T21:15:15.893", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10598.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10598.json index 8d1b2a9b4ff..c59a26a6a4d 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10598.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10598.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10598", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T22:15:02.960", - "lastModified": "2024-10-31T22:15:02.960", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10599.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10599.json index bfb2f819251..0613d3c76fa 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10599.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10599.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10599", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T22:15:03.267", - "lastModified": "2024-10-31T22:15:03.267", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10600.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10600.json index 434cf92abe7..9af49c84c56 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10600.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10600.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10600", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T23:15:12.067", - "lastModified": "2024-10-31T23:15:12.067", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10601.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10601.json index 4e04b1ba639..e93d767a991 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10601.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10601.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10601", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T23:15:12.343", - "lastModified": "2024-10-31T23:15:12.343", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10602.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10602.json index 03c3d5ff59c..e4b73c21fd6 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10602.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10602.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10602", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T00:15:02.973", - "lastModified": "2024-11-01T00:15:02.973", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10605.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10605.json index a8b3eda8149..45ddc71295a 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10605.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10605.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10605", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T00:15:03.243", - "lastModified": "2024-11-01T00:15:03.243", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10607.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10607.json index 097ac2d2bb9..5eb11ca7d6b 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10607.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10607.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10607", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T01:15:12.153", - "lastModified": "2024-11-01T01:15:12.153", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10608.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10608.json index 2de0d64dd5e..902295019cf 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10608.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10608.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10608", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T01:15:12.430", - "lastModified": "2024-11-01T01:15:12.430", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10609.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10609.json index 68f8d2f2eb9..1c80937f11f 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10609.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10609.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10609", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T01:15:12.690", - "lastModified": "2024-11-01T01:15:12.690", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10610.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10610.json index 6f19efbffb1..662f1c45909 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10610.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10610.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10610", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T02:15:03.180", - "lastModified": "2024-11-01T02:15:03.180", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10611.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10611.json index 40c58908c94..29340d92bc4 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10611.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10611.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10611", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T02:15:03.533", - "lastModified": "2024-11-01T02:15:03.533", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10612.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10612.json index 1fbf4230ecb..75739363a76 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10612.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10612.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10612", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T03:15:02.617", - "lastModified": "2024-11-01T03:15:02.617", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10613.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10613.json index ec8da566cc4..2217b46a3d8 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10613.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10613.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10613", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T03:15:02.903", - "lastModified": "2024-11-01T03:15:02.903", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10615.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10615.json index b3ddc433f4f..65456648a55 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10615.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10615.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10615", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T03:15:03.180", - "lastModified": "2024-11-01T03:15:03.180", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10616.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10616.json index 76812917094..4c2f94352fd 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10616.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10616.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10616", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T04:15:08.643", - "lastModified": "2024-11-01T04:15:08.643", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10617.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10617.json index f40c2276e22..4bc41e47a61 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10617.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10617.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10617", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T04:15:09.100", - "lastModified": "2024-11-01T04:15:09.100", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10618.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10618.json index 3da640a972a..45bcc675b7a 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10618.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10618.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10618", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T04:15:09.513", - "lastModified": "2024-11-01T04:15:09.513", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10619.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10619.json index e82f8f17224..acdd0ecf653 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10619.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10619.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10619", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T04:15:10.897", - "lastModified": "2024-11-01T04:15:10.897", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10620.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10620.json index 38d30bb4036..8b22e960a2d 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10620.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10620.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10620", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T05:15:05.167", - "lastModified": "2024-11-01T05:15:05.167", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10651.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10651.json index 9a5a1a03735..c8a847581d5 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10651.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10651.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10651", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-11-01T10:15:04.600", - "lastModified": "2024-11-01T10:15:04.600", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10652.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10652.json index 425e7840477..c2d811d91cc 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10652.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10652.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10652", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-11-01T10:15:04.877", - "lastModified": "2024-11-01T10:15:04.877", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10653.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10653.json index 6549b5d8c2c..ad2d4dd50fc 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10653.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10653.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10653", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-11-01T10:15:05.103", - "lastModified": "2024-11-01T10:15:05.103", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10654.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10654.json new file mode 100644 index 00000000000..a1dc4493997 --- /dev/null +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10654.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10654", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-01T12:15:03.077", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in TOTOLINK LR350 up to 9.3.5u.6369 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /formLoginAuth.htm. The manipulation of the argument authCode with the input 1 leads to authorization bypass. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20LR350%20Vuln.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282667", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282667", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.434801", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20493.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20493.json index 18cc4d2aee4..778fc57a380 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20493.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20493.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20493", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-23T18:15:12.533", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-01T12:54:23.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-772" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,1505 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "02DB8AC0-A41E-41E8-BCBC-459C83347116" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FE3322F3-8FC7-4D6B-88DE-FAC3312EB3F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "608E3A14-3D44-429C-92DA-61FEF12D10BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "96DBD354-2BFB-4A66-8778-41FACC96F74F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "01FF9607-149F-43BE-9957-5F5C38CE49BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "B90D7BDE-3677-4F62-A68F-866E57471C23" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD18A1F-26E4-445C-A10E-32873795FA99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "2C64555C-AFFA-40A6-BD05-6D670972527A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "A900C9D8-F325-4781-B3AB-3137CBC3D8EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "EB03B75F-F539-4A3D-97EC-0DCDD21CA089" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "BF4079F5-6807-405F-8582-13284BE36FEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "5A48D1F8-305F-4292-8E7A-959231BD5ECD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.12:*:*:*:*:*:*:*", + "matchCriteriaId": "D1CD01BD-6393-4EB7-A954-B5E4FC00AAB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.13:*:*:*:*:*:*:*", + "matchCriteriaId": "F5BDF296-CB64-445B-92A9-BE629009D271" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "29F999C7-AB88-4F43-8E8E-FBE11BC2DF6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "A316A657-16D8-4DC1-9EA2-6C79061F13F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "1AC1077E-9BD3-42A3-8919-6EFC2CE8E086" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.17:*:*:*:*:*:*:*", + "matchCriteriaId": "1A623887-B250-43EE-A106-57B810B5B930" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.18:*:*:*:*:*:*:*", + "matchCriteriaId": "A4D26852-B895-4C72-BFC8-AE29BCCF9E7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8BDAB447-1F2C-4983-89B2-E723A82BCD71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1A0AB352-A4ED-4DF0-B749-84078DA48FA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "CF3B749B-2EFB-4734-B775-180A6E8627FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "54006F46-95F3-4785-9660-C1DF21789783" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C61B2F7C-195B-4DBF-8C3C-0F269E56CEC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "C35A81B4-FC1D-4E28-8235-7DAD7F1B1C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "C62E1E33-480B-44C7-8155-EF725ACE7A5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "01831166-3C2C-48CC-A8DE-EEE631349C4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "F5107E77-57C9-4C7B-A974-BAF6F01BCA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "1ED851EA-1BDF-4D88-83E8-53B14F7C1FF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "279C2F98-E719-413A-A284-5AE1B28171CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.11:*:*:*:*:*:*:*", + "matchCriteriaId": "CBA2A3A4-12A9-4280-980E-B6D932185AEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.12:*:*:*:*:*:*:*", + "matchCriteriaId": "5665319D-5532-4F03-8F12-4F98C5548023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.13:*:*:*:*:*:*:*", + "matchCriteriaId": "5994E2A7-118C-4E08-AF03-4F2409E55AEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.14:*:*:*:*:*:*:*", + "matchCriteriaId": "6A7844A0-5EF6-4AD6-ACB8-E01D8579AC93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.15:*:*:*:*:*:*:*", + "matchCriteriaId": "6CD8A9AC-3FD8-4B30-8785-B541ADC4EDEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.16:*:*:*:*:*:*:*", + "matchCriteriaId": "298441F6-BAB5-4116-BEAF-DEFB75A52CBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.17:*:*:*:*:*:*:*", + "matchCriteriaId": "63E08CFF-68F5-45E6-B6F3-D111D33C5E2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.18:*:*:*:*:*:*:*", + "matchCriteriaId": "F58348A7-25EC-4023-B4CA-CAB35A3798C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ED2AFE0E-E86E-48B4-8F2E-EF270F362214" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7C90AE41-3D8C-4ACB-BD39-F727B8C21B15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E67D82E2-C1B4-42C2-8E20-99AD23BCBD9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "204577E6-37DF-41FD-A102-0DA948399F3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E7FFD0D7-2B19-45FE-A808-4AAC64A4CA83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "AE5ED905-D723-4FF6-ADFF-EE8717F3BE7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2D072E33-BC63-4CE6-9C06-B3C70629DDA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "CBA5BA53-D8D1-4839-ACBA-E1F7CE718C75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "A8B737F7-587E-4682-A0D7-F66357BABB9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A45B6EAB-2372-4870-8E08-E8AE22ED7F3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4654FC54-A6D3-4F5D-AF55-6D3687AFF41C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "49DC76CE-4A98-478D-899C-9F7D2332D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "36E9FB92-5CA2-4046-8D0D-EC12B37540AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A37D3C0E-03A7-48E2-A04D-86288138E5DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "F642BF4F-B99D-4FEA-B3FE-6ED974C65124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DDE321FE-9034-4E0F-9A32-D41443A9D86A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "09E779C6-2740-47A1-A6D5-E22C6DC7D1CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E794B83A-4A14-431C-B882-578CD70E412B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "292E681D-D4C0-4D85-B84C-4C9328FCD12F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "963A59C5-6EC0-4BAD-B547-EFA785707050" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5F1551BB-37A4-4383-8AA8-DA25642B7353" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "88B6632C-4A35-4D10-B323-8C3266319114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "638D2739-FAA7-4880-BC2F-BC632140E9DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "40098313-CC8A-49E6-8095-093881DA7107" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "C00C3A8F-34AE-443E-9B77-0532C9F11F1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "01F32FDA-54ED-4117-8FA7-D749140F628F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B8BA96B9-A0DD-4065-A295-FA85A33F7E84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B07AA16A-6DE0-4226-8A44-CDA8E26830D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8B7AC5D5-B171-4163-BFB3-02163DD8817B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "31AD8591-C99A-4780-A742-13CFD921F46A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.1.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "173C2DA6-625C-465C-A080-E578539E30F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8288F62-8BEC-4318-8096-9D36817D1D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A617690D-92D7-4793-AEAC-15F31162D5F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F9608894-B4A7-49A1-863A-D44E53D6CE69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3FDB77ED-AB5E-475F-A5F8-515B807E99A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "0BEE0323-AC5A-4570-9681-14CD9FB8FD46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "F6773BC9-C84C-4249-B6C3-FD39BAAA0555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A4DFC6F7-2BA1-4F32-AD55-8BF0888FDB92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "291705AE-7BAE-4305-BECA-204821BF467A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FC683581-4B46-46A8-BBD8-CB01283641DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "CC2A816A-63D6-498B-B167-BE71F0019DB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "294D71C7-FFC3-4431-88AA-E03EFAE78CCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "FA8287D0-B817-4143-BE34-B3C7FEC7BDEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "9621C619-C4F8-4906-8A24-E560C08F6921" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7F9C8B-35E4-459C-B31E-FCF2DAD0120E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8AF82E95-C8D3-402B-BC97-29EA1771D5EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0350CCE9-512A-4A77-8FAB-7A8F9B061170" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3CC55E28-36AC-4D40-BB6D-A1B53503F5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "66F0A624-DDE8-490C-9DA4-762CD39764B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "901C034C-DDA4-49E1-B8B4-62F3B5C00173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D094896F-425A-4E69-8941-41147222C42D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.4.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "30825677-8EF7-46A0-BB47-887707E007C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DF5D18-28B3-45C8-A10A-56BB1202C5A3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D482F818-0A8E-49D7-8E3E-0958019FA629" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8E7BFB57-BC02-4930-A02F-83583E6A0FC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "026F1960-C879-4611-A60A-96311B63CCA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EAF8B33E-0C95-467D-A865-0A234E69D0CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "EFF144F5-D933-4DE4-818C-001BD9E3958A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.14:*:*:*:*:*:*:*", + "matchCriteriaId": "00112ED3-FE7B-425B-9A28-1E5F2BC8BB01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.15:*:*:*:*:*:*:*", + "matchCriteriaId": "DDD491D5-FAAB-493F-91A6-D2F3B5F5970E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.17:*:*:*:*:*:*:*", + "matchCriteriaId": "1519F49D-588F-4B70-B38F-EF4F3E13FEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.20:*:*:*:*:*:*:*", + "matchCriteriaId": "15354443-5EB7-4712-B2DE-61DB33830759" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.24:*:*:*:*:*:*:*", + "matchCriteriaId": "248D6B44-E134-4DEC-A947-636824E3FDFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.26:*:*:*:*:*:*:*", + "matchCriteriaId": "0820A79C-F3EF-407F-9AC7-DCAB4CD39C89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.28:*:*:*:*:*:*:*", + "matchCriteriaId": "9D3E8805-85D2-4345-8076-039513209A31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.33:*:*:*:*:*:*:*", + "matchCriteriaId": "14BB907B-D75A-4F5E-B20D-5457A71A70EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.35:*:*:*:*:*:*:*", + "matchCriteriaId": "F118B803-4C55-436A-A136-0C1FEA49858F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.38:*:*:*:*:*:*:*", + "matchCriteriaId": "6A272121-408E-45F6-A2A1-0BA6EBC060A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.45:*:*:*:*:*:*:*", + "matchCriteriaId": "61C3A433-0792-434E-AC90-A84B346499D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3:*:*:*:*:*:*:*", + "matchCriteriaId": "980CEA3B-5A81-4E8C-BEA3-DD31BE7DA2CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "A3910211-D4DB-4CA7-BBEA-DD8246FF10ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "C260BF30-7A33-4C70-9509-404856C93666" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "AF894850-39EC-4B57-BBFF-F1AB4F8389A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FAFCF9-0ABE-483E-9604-329762BB7870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.18:*:*:*:*:*:*:*", + "matchCriteriaId": "83DB4278-3126-4765-97C4-6C0A8C78DA78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.21:*:*:*:*:*:*:*", + "matchCriteriaId": "174E631B-6099-47DE-8790-BBF4B7FDB8CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.26:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE3538B-F612-4105-BFDE-A4B594482DCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.29:*:*:*:*:*:*:*", + "matchCriteriaId": "3143B0FF-C855-485E-A908-E48974B1643C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4:*:*:*:*:*:*:*", + "matchCriteriaId": "26DD9992-6D98-4E03-9599-ECF38A186FBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "24DCEAE6-355B-40AE-A7C8-AF744FCA8A86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "2097E81E-B422-4B93-AF09-F300A0E8AF71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "454DEA31-A607-4054-82D3-24A4FEB7358F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "57F0B213-8187-4465-84F1-FB8D92B36020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.12:*:*:*:*:*:*:*", + "matchCriteriaId": "E540771E-BA0B-42D1-8251-B576B0F142C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.15:*:*:*:*:*:*:*", + "matchCriteriaId": "BEC2A833-BECF-4000-A592-6113A84C2D20" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.17:*:*:*:*:*:*:*", + "matchCriteriaId": "077F1416-924A-4D25-9CEE-3BD66A96A019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.20:*:*:*:*:*:*:*", + "matchCriteriaId": "5BDC8D92-D6E0-40EE-B190-D2B32C7DEB75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.22:*:*:*:*:*:*:*", + "matchCriteriaId": "23CD5619-E534-4F40-998D-39DC19FA0451" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.25:*:*:*:*:*:*:*", + "matchCriteriaId": "C5D0EB11-14B1-44B3-8D46-B9DD872F772C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.26:*:*:*:*:*:*:*", + "matchCriteriaId": "4FA399CF-12DB-42E0-A66F-14508B52A453" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.29:*:*:*:*:*:*:*", + "matchCriteriaId": "7B5A7608-E737-420E-9B5E-836600DAC701" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.32:*:*:*:*:*:*:*", + "matchCriteriaId": "C7EB6801-336D-4F41-ADE7-1C58C63C3F6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.33:*:*:*:*:*:*:*", + "matchCriteriaId": "8413DA41-02A5-4269-8C88-9DD5076AF91B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.34:*:*:*:*:*:*:*", + "matchCriteriaId": "AA00285F-6914-4749-8A47-FC4EDAFFF3C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.35:*:*:*:*:*:*:*", + "matchCriteriaId": "4AA4D367-32B9-4F54-8352-A959F61A1FDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.39:*:*:*:*:*:*:*", + "matchCriteriaId": "2259FF9E-0C8B-440F-B1AC-51BDE3F60E68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.40:*:*:*:*:*:*:*", + "matchCriteriaId": "3C522B55-904D-4C08-B73E-1457D877C0AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.41:*:*:*:*:*:*:*", + "matchCriteriaId": "4483056A-FBF3-4E00-81EB-1E97334EF240" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.43:*:*:*:*:*:*:*", + "matchCriteriaId": "48677330-06AB-4C7F-B2AD-F7E465A9632A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.44:*:*:*:*:*:*:*", + "matchCriteriaId": "7AEA80D2-5DB8-4334-9A88-7DDE395832C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.45:*:*:*:*:*:*:*", + "matchCriteriaId": "FB1C38A5-1028-4AD3-8CC7-A00091091E76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.46:*:*:*:*:*:*:*", + "matchCriteriaId": "848147B2-C49A-43F6-9069-FC8885BDFDA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.48:*:*:*:*:*:*:*", + "matchCriteriaId": "D6FEF0DA-741E-4361-8143-068EB47D6520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F002FD55-F881-450E-BC1B-8073E188F47E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AA940C4F-13BB-465F-BB8D-CBD0109BF012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8B0434F5-9A50-4B57-9C5B-E09415D098C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AE727035-06CB-4E37-A9D2-96BD54502120" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE52B81-2CF8-48E5-A7BA-A163A25A669B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E8D7C9-5272-40E6-869B-B33959F9F0CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "FE8D5D71-5C85-4644-8A84-F073549ADB50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0790DDC2-7BA0-42DC-A157-754C0CBBE178" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "882394EA-70C8-4D86-9AEF-5D273D8E518C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "855AD3CC-F404-48C5-80D2-7F2765D16D72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "26B6BF72-9124-4213-B3C0-BD31B46E8C91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "DE8FBE89-8FDA-4B9B-BA1A-90FFD482A585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.12:*:*:*:*:*:*:*", + "matchCriteriaId": "149C3872-8DA9-48DD-ADD0-2E84C1A76A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4:*:*:*:*:*:*:*", + "matchCriteriaId": "D2D33E8C-294A-4C43-8DB6-9DA9F61F0B3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7E23ACB0-DF8B-4672-A819-4DCD3104CE4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E4723B88-62BA-40E6-AA89-BAC02D6A036F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "7C698819-3C8E-4A16-8F52-42FF1E54C076" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "8D3CE74E-59E7-448A-8417-18F97C05C798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "0986C171-0E75-4F6F-A9BD-276830104E5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.13:*:*:*:*:*:*:*", + "matchCriteriaId": "66A2777A-7831-4324-AEB2-5D93B5F6C04B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.18:*:*:*:*:*:*:*", + "matchCriteriaId": "37045680-9189-4B7F-A4F7-4E682FE20A09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.24:*:*:*:*:*:*:*", + "matchCriteriaId": "B6C9F37B-CF3C-4861-A969-C7CF4946274A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.26:*:*:*:*:*:*:*", + "matchCriteriaId": "6A1DAF21-3FED-4691-9D4C-8FD8CEA7FB3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.29:*:*:*:*:*:*:*", + "matchCriteriaId": "FB938E58-4963-4A31-8836-88E958592B30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.30:*:*:*:*:*:*:*", + "matchCriteriaId": "1E317897-EE97-44F3-96BB-E54228D72A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.35:*:*:*:*:*:*:*", + "matchCriteriaId": "1EF7FAB2-158D-4C48-9246-E7AD3BF1D801" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.37:*:*:*:*:*:*:*", + "matchCriteriaId": "056D43AE-ECDB-40D2-A196-18DDCD02629E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.38:*:*:*:*:*:*:*", + "matchCriteriaId": "D3E555F3-3580-4D71-8D8D-92FE72763D62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.39:*:*:*:*:*:*:*", + "matchCriteriaId": "93013503-8B9A-4160-AF7E-277958FA6E9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.40:*:*:*:*:*:*:*", + "matchCriteriaId": "A3B009FD-0F2B-4511-8EDF-C3E670623F89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.41:*:*:*:*:*:*:*", + "matchCriteriaId": "52579D8D-E855-42B3-B406-32DD1C39F721" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.47:*:*:*:*:*:*:*", + "matchCriteriaId": "E7E44FC6-12A2-4F76-A095-28F3804B619F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.48:*:*:*:*:*:*:*", + "matchCriteriaId": "42917E5E-E362-4B40-B2B2-3C77BA35641C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.50:*:*:*:*:*:*:*", + "matchCriteriaId": "CF317FA3-EBF3-49BB-A9E6-0D4295FA3F60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.52:*:*:*:*:*:*:*", + "matchCriteriaId": "F98B1683-914F-43D3-AE1C-311D3A90BE8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.54:*:*:*:*:*:*:*", + "matchCriteriaId": "A8D24656-CAB1-4A98-A440-482927FEDD16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.55:*:*:*:*:*:*:*", + "matchCriteriaId": "E504557C-DA5D-4D0F-A813-4CE7D5109F15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.56:*:*:*:*:*:*:*", + "matchCriteriaId": "04D2A067-C717-4921-BBF5-3EFBE02736EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.58:*:*:*:*:*:*:*", + "matchCriteriaId": "36DDEC5B-4BEA-499C-9F34-BB3D39B7A963" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.62:*:*:*:*:*:*:*", + "matchCriteriaId": "C4E44C37-0F6F-440B-BA26-FB6D0B179E44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.65:*:*:*:*:*:*:*", + "matchCriteriaId": "6AEE0050-34DC-49CB-B859-8ED500FD79A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.67:*:*:*:*:*:*:*", + "matchCriteriaId": "6A47E5C5-E058-4B4C-A258-6DF7CE0EA92B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1:*:*:*:*:*:*:*", + "matchCriteriaId": "52D83C3A-ED0B-42D5-A08A-97D27E189875" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "A649E319-D408-4AA2-8293-C9E37AF14BA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "F4187EFE-4D7E-4493-A6E0-24C98256CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.15:*:*:*:*:*:*:*", + "matchCriteriaId": "6730194F-5069-40AB-AE66-871D3992560C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.19:*:*:*:*:*:*:*", + "matchCriteriaId": "9E257F98-D1A0-4D28-9504-1749CC090D49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*", + "matchCriteriaId": "3FF1A5FC-73BE-4218-86D9-2E81FA64EABD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4E492943-6EC0-4E34-9DBC-DD1C2CF1CDCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "589E46F3-8038-4B87-8C40-55C6268B82F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "3F3B73F6-139E-42DC-B895-DDD17B5A1138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.13:*:*:*:*:*:*:*", + "matchCriteriaId": "0A2590E7-FE04-4B29-B36B-AABAA5F3B9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.15:*:*:*:*:*:*:*", + "matchCriteriaId": "3E4FD5E3-7E82-4294-8B05-D2045D857029" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3:*:*:*:*:*:*:*", + "matchCriteriaId": "4E998A4A-5346-4CFA-A617-FD1106C6B7A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "91265549-A16E-4A00-A031-4F1EB8D6881C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "EA3C316B-5485-4CDD-A1A1-6C0A9CB4719F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "ECE6D033-7B8B-4F61-B653-0C0EF13466EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.13:*:*:*:*:*:*:*", + "matchCriteriaId": "14441650-DAD5-4959-83DF-4D6F3D6A05FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "1B21ABC9-A64B-43E4-8951-1E6C0F427DBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.18:*:*:*:*:*:*:*", + "matchCriteriaId": "A48EC041-322F-422D-B95B-0FC07BDA2B6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FE0D50C0-DADB-4747-8649-8A5257111FE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.6:*:*:*:*:*:*:*", + "matchCriteriaId": "FEE2699F-353F-44CB-A778-981783DDC31F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "7D8E50BD-1FBD-483B-9C27-70E95C732E55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.12:*:*:*:*:*:*:*", + "matchCriteriaId": "F46E5E4F-787C-4C05-B1E7-C39BB9125D16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.13:*:*:*:*:*:*:*", + "matchCriteriaId": "D6A29312-38E7-456B-94DD-4D7329691114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.14:*:*:*:*:*:*:*", + "matchCriteriaId": "27F7BB31-C733-4C32-BF0F-33B5AF020156" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.15:*:*:*:*:*:*:*", + "matchCriteriaId": "DC313568-33A6-435B-98FF-8A7091D9C451" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.17:*:*:*:*:*:*:*", + "matchCriteriaId": "7F85710A-28CE-4913-8523-356461908FBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.22:*:*:*:*:*:*:*", + "matchCriteriaId": "D6069950-016B-419A-B754-D58956CB6D14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.23:*:*:*:*:*:*:*", + "matchCriteriaId": "5A2F3FEC-624F-47C5-B056-836861BB038A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.24:*:*:*:*:*:*:*", + "matchCriteriaId": "8C4B1136-66B6-42BA-BC17-86E7DCE1CF29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EA0B9B73-A9E6-4924-9EAE-B57E534938FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "012812C4-EFF8-465F-A771-134BEB617CC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "E06141A9-8C37-445A-B58A-45739AFE7D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "7EDC09E5-51D3-4672-B910-B34A9CBD6128" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.15:*:*:*:*:*:*:*", + "matchCriteriaId": "71ED7A71-81CB-444C-A4ED-EA4A58D5E73C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.16:*:*:*:*:*:*:*", + "matchCriteriaId": "CAD13331-0EB8-4C8D-85CC-D96CA9F829AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.17:*:*:*:*:*:*:*", + "matchCriteriaId": "7137F22B-F993-4620-9378-9412DAEA9EF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.21:*:*:*:*:*:*:*", + "matchCriteriaId": "923A40E8-6456-4288-B9AB-DBF5F9C4246A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1:*:*:*:*:*:*:*", + "matchCriteriaId": "13F57A86-6284-4269-823E-B30C57185D14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1.28:*:*:*:*:*:*:*", + "matchCriteriaId": "F6560447-039C-40FA-A24D-C8994AC2743B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2:*:*:*:*:*:*:*", + "matchCriteriaId": "378ED826-F5FE-40BA-9FC0-9C185A13518B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "130B6FD9-764D-4EF8-91AA-37E52AE9B3E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "225861CE-FFF8-4AFA-A07B-CB8D5BC9C361" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.11:*:*:*:*:*:*:*", + "matchCriteriaId": "FD08C4E8-3ADB-4048-9B3C-4F0385201523" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.13:*:*:*:*:*:*:*", + "matchCriteriaId": "A4875811-F209-49ED-B310-8377B2F87FF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.14:*:*:*:*:*:*:*", + "matchCriteriaId": "99C52C7B-B626-4A3C-A2EC-28A20E7FA95F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3:*:*:*:*:*:*:*", + "matchCriteriaId": "08CCBF5E-257A-4A1F-8930-3643A9588838" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "782BC9ED-1395-472B-9F34-DED812AA5BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "153449C0-B93F-49A2-8A6A-BE84305E8D2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "853A002C-839A-4372-8485-750A86E9F6E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.19:*:*:*:*:*:*:*", + "matchCriteriaId": "C62BB5D6-CE75-4C83-82DC-4148EF8CB1F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.23:*:*:*:*:*:*:*", + "matchCriteriaId": "D32F1365-EAF8-4570-B2FF-45E47E8586F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DFD07F9B-6BB3-4423-8DBE-4E89A6478E65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.9:*:*:*:*:*:*:*", + "matchCriteriaId": "34FE4F28-B704-4325-AE8A-C790163FEE71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.14:*:*:*:*:*:*:*", + "matchCriteriaId": "E832BC0C-8439-4779-9064-C2D93F231031" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.18:*:*:*:*:*:*:*", + "matchCriteriaId": "FA99DF94-D031-4375-9A16-306606FE28F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.19:*:*:*:*:*:*:*", + "matchCriteriaId": "FC149D03-5609-46E6-A1B3-F4D91F282B49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.27:*:*:*:*:*:*:*", + "matchCriteriaId": "B5D7FC6F-1370-4272-97E5-226C2ED1D335" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.38:*:*:*:*:*:*:*", + "matchCriteriaId": "164D5774-D51B-47C6-AD32-ED6B84E78BBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.39:*:*:*:*:*:*:*", + "matchCriteriaId": "24A810C8-1BB5-4589-84AB-C357C1937201" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.42:*:*:*:*:*:*:*", + "matchCriteriaId": "F22D8D65-2E88-4557-BF85-1E3ABD4CCAE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.48:*:*:*:*:*:*:*", + "matchCriteriaId": "FF62C9AF-70F5-4A12-9B0A-F32551FB2C40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.55:*:*:*:*:*:*:*", + "matchCriteriaId": "A04EB4FB-0C9F-441E-B02A-6B22F195348F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.57:*:*:*:*:*:*:*", + "matchCriteriaId": "ACDD7BD6-1C1D-49FE-8478-D0F37EB59BC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.61:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7D8466-0050-495A-9442-8C5FF3912F5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.62:*:*:*:*:*:*:*", + "matchCriteriaId": "4FB96258-8343-4E98-B3DD-C92E94A9F9F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1:*:*:*:*:*:*:*", + "matchCriteriaId": "27ACBA2A-87A7-4836-A474-AFD7D22F820D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "C73E0B2E-BABF-4998-A1D7-4E803F9D78AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.9:*:*:*:*:*:*:*", + "matchCriteriaId": "59306ADF-FAA6-4970-ADFB-C5D9A5AEF1AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "959107AC-E9EC-467C-901B-A3164E3762E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.11:*:*:*:*:*:*:*", + "matchCriteriaId": "6F944F8F-0255-42BE-BD44-D21EC9F0FFC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.13:*:*:*:*:*:*:*", + "matchCriteriaId": "0F39C535-5A41-47CE-A9CF-B360998D4BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.15:*:*:*:*:*:*:*", + "matchCriteriaId": "E9CEAEFC-7B82-41F9-A09D-C86A3A60A4FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.20:*:*:*:*:*:*:*", + "matchCriteriaId": "40FAC31D-19C0-4BA0-A019-C7E7A0BA0B5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.30:*:*:*:*:*:*:*", + "matchCriteriaId": "6CAAFE0F-416F-4BCA-BA37-30EAEADA8AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.33:*:*:*:*:*:*:*", + "matchCriteriaId": "8E1E8552-58F0-491E-B7D7-E89527872FC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.39:*:*:*:*:*:*:*", + "matchCriteriaId": "9347D71D-1F50-4F85-9F6D-E11D79BD26E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0BA16A6D-2747-4DAC-A30A-166F1FD906FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "289F9874-FC01-4809-9BDA-1AF583FB60B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2:*:*:*:*:*:*:*", + "matchCriteriaId": "74EDFC67-E4EE-4D2C-BF9F-5881C987C662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "826869BE-4874-4BBA-9392-14851560BA10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "EF52D477-3045-45D1-9FD3-12F396266463" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "88E310BF-F1F6-4124-A875-81967B9B531E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3:*:*:*:*:*:*:*", + "matchCriteriaId": "5B330F8F-F0DA-472C-A932-AD1D232C7DB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.39:*:*:*:*:*:*:*", + "matchCriteriaId": "6BF59DAA-268C-4FCF-A0AA-7967128AEBC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.46:*:*:*:*:*:*:*", + "matchCriteriaId": "140ED95D-173C-4ADB-A2E6-97F0D595D1AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.53:*:*:*:*:*:*:*", + "matchCriteriaId": "BC9B00E1-3E50-4356-B6D9-F84BCD552402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.55:*:*:*:*:*:*:*", + "matchCriteriaId": "552319A9-01F7-47BA-83B3-B2DD648AA07E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.56:*:*:*:*:*:*:*", + "matchCriteriaId": "4914603C-4B1B-48F1-826C-DB803BD21F87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.4:*:*:*:*:*:*:*", + "matchCriteriaId": "2AE21762-3085-4AFC-B1DE-A4562CDAC509" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.4.5:*:*:*:*:*:*:*", + "matchCriteriaId": "852C3478-7529-4002-8540-ABA4D556DEFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "23B8A815-5D58-4952-936E-D47B83637BEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.4.22:*:*:*:*:*:*:*", + "matchCriteriaId": "2C98D085-E321-4BAE-AF03-ABDEDC4D24BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.4.24:*:*:*:*:*:*:*", + "matchCriteriaId": "C05599C9-C0DB-47C1-B145-C410076C1049" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.4.29:*:*:*:*:*:*:*", + "matchCriteriaId": "5BC91A59-0BFA-4DE8-B414-7558D27FBC54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.4.34:*:*:*:*:*:*:*", + "matchCriteriaId": "12FDDE70-692B-458A-8475-E5B6A260410F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BEE52F59-AABA-4069-A909-64AD5DFD2B18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "20D7966E-B02B-48C8-BF96-723DD6C25314" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.9:*:*:*:*:*:*:*", + "matchCriteriaId": "FA618249-E76F-4104-9326-C9F2DC8DE3D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.12:*:*:*:*:*:*:*", + "matchCriteriaId": "7C925E1F-6BD9-4CD1-8AC4-4263A9094786" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.18:*:*:*:*:*:*:*", + "matchCriteriaId": "C5EE76D9-6D18-4823-B6B0-E1394A4D140C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.22:*:*:*:*:*:*:*", + "matchCriteriaId": "3F635946-586D-4DE2-927B-300CE569C596" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "459C11B9-ABA1-472A-8CDA-9C7B4E48E943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.27:*:*:*:*:*:*:*", + "matchCriteriaId": "FA060112-E2D8-4EC5-8400-D8D189A119B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.28:*:*:*:*:*:*:*", + "matchCriteriaId": "C3888BB0-B529-486C-8563-392BD1C5DFD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.31:*:*:*:*:*:*:*", + "matchCriteriaId": "43FE3FA7-8281-4BD9-A08B-8C79D369480E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B25468E3-03F9-4C2A-B82A-F87F4FCD57E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "5EC6F412-4A30-4E9A-B8DF-C4BF80E5C4B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2:*:*:*:*:*:*:*", + "matchCriteriaId": "DA47E8EA-29F2-40F3-826E-E7295FFAD8C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.10:*:*:*:*:*:*:*", + "matchCriteriaId": "B4D303F8-E6AA-4F1C-9988-055EECD0A902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.21:*:*:*:*:*:*:*", + "matchCriteriaId": "2DCBBA66-6D00-4D8B-86FE-81EF431A7806" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.22:*:*:*:*:*:*:*", + "matchCriteriaId": "AB768AFD-64C1-4AD4-8194-2A1D428BAC67" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-4gYEWMKg", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21510.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21510.json index 44842e3644c..ceb82213aa6 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21510.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21510.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21510", "sourceIdentifier": "report@snyk.io", "published": "2024-11-01T05:15:05.640", - "lastModified": "2024-11-01T05:15:05.640", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21537.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21537.json index 4bf609d4e07..f9c9b6e86ca 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21537.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21537.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21537", "sourceIdentifier": "report@snyk.io", "published": "2024-10-31T05:15:04.733", - "lastModified": "2024-10-31T05:15:04.733", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Versions of the package lilconfig from 3.1.0 and before 3.1.1 are vulnerable to Arbitrary Code Execution due to the insecure usage of eval in the dynamicImport function. An attacker can exploit this vulnerability by passing a malicious input through the defaultLoaders function." + }, + { + "lang": "es", + "value": "Las versiones del paquete lilconfig de la versi\u00f3n 3.1.0 y anteriores a la 3.1.1 son vulnerables a la ejecuci\u00f3n de c\u00f3digo arbitrario debido al uso inseguro de eval en la funci\u00f3n dynamicImport. Un atacante puede aprovechar esta vulnerabilidad al pasar una entrada maliciosa a trav\u00e9s de la funci\u00f3n defaultLoaders." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23309.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23309.json index 5b091cdfd73..667d6c1bdd8 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23309.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23309.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23309", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:04.153", - "lastModified": "2024-10-30T14:15:04.153", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LevelOne WBR-6012 router with firmware R0.40e6 has an authentication bypass vulnerability in its web application due to reliance on client IP addresses for authentication. Attackers could spoof an IP address to gain unauthorized access without needing a session token." + }, + { + "lang": "es", + "value": "El enrutador LevelOne WBR-6012 con firmware R0.40e6 tiene una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en su aplicaci\u00f3n web debido a que depende de las direcciones IP del cliente para la autenticaci\u00f3n. Los atacantes podr\u00edan falsificar una direcci\u00f3n IP para obtener acceso no autorizado sin necesidad de un token de sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24777.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24777.json index 748c7a008f8..8f5f284ac34 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24777.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24777.json @@ -2,13 +2,17 @@ "id": "CVE-2024-24777", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:04.457", - "lastModified": "2024-10-30T14:15:04.457", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site request forgery (CSRF) vulnerability exists in the Web Application functionality of the LevelOne WBR-6012 R0.40e6. A specially crafted HTTP request can lead to unauthorized access. An attacker can stage a malicious web page to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site request forgery (CSRF) en la funcionalidad de aplicaci\u00f3n web de LevelOne WBR-6012 R0.40e6. Una solicitud HTTP especialmente manipulada puede provocar un acceso no autorizado. Un atacante puede preparar una p\u00e1gina web maliciosa para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25566.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25566.json index 58aa3715ff7..dabec57cc3c 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25566.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25566.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25566", "sourceIdentifier": "responsible-disclosure@pingidentity.com", "published": "2024-10-29T16:15:04.947", - "lastModified": "2024-10-29T16:15:04.947", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Open-Redirect vulnerability exists in PingAM where well-crafted requests may cause improper validation of redirect URLs. This could allow an attacker to redirect end-users to malicious sites under their control, simplifying phishing attacks" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de redireccionamiento abierto en PingAM, en la que las solicitudes bien manipuladas pueden provocar una validaci\u00f3n incorrecta de las URL de redireccionamiento. Esto podr\u00eda permitir que un atacante redirija a los usuarios finales a sitios maliciosos bajo su control, lo que simplifica los ataques de phishing." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28052.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28052.json index 5ae9507d095..c607d752c9a 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28052.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28052.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28052", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:04.720", - "lastModified": "2024-10-30T14:15:04.720", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WBR-6012 is a wireless SOHO router. It is a low-cost device which functions as an internet gateway for homes and small offices while aiming to be easy to configure and operate. In addition to providing a WiFi access point, the device serves as a 4-port wired router and implements a variety of common SOHO router capabilities such as port forwarding, quality-of-service, web-based administration, a DHCP server, a basic DMZ, and UPnP capabilities." + }, + { + "lang": "es", + "value": "El WBR-6012 es un enrutador inal\u00e1mbrico para peque\u00f1as oficinas. Es un dispositivo de bajo costo que funciona como una puerta de enlace a Internet para hogares y peque\u00f1as oficinas y que tiene como objetivo ser f\u00e1cil de configurar y operar. Adem\u00e1s de proporcionar un punto de acceso WiFi, el dispositivo funciona como un enrutador cableado de 4 puertos e implementa una variedad de capacidades comunes de los enrutadores para peque\u00f1as oficinas, como reenv\u00edo de puertos, calidad de servicio, administraci\u00f3n basada en web, un servidor DHCP, una DMZ b\u00e1sica y capacidades UPnP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28875.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28875.json index 53a33500d05..e7c9edcfae9 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28875.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28875.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28875", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:04.990", - "lastModified": "2024-10-30T14:15:04.990", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A security flaw involving hard-coded credentials in LevelOne WBR-6012's web services allows attackers to gain unauthorized access during the first 30 seconds post-boot. Other vulnerabilities can force a reboot, circumventing the initial time restriction for exploitation.The backdoor string can be found at address 0x80100910\r\n\r\n 80100910 40 6d 21 74 ds \"@m!t2K1\"\r\n 32 4b 31 00\r\n \r\nIt is referenced by the function located at 0x800b78b0 and is used as shown in the pseudocode below:\r\n\r\n if ((SECOND_FROM_BOOT_TIME < 300) &&\r\n (is_equal = strcmp(password,\"@m!t2K1\")) {\r\n return 1;}\r\n \r\nWhere 1 is the return value to admin-level access (0 being fail and 3 being user)." + }, + { + "lang": "es", + "value": "Una falla de seguridad que involucra credenciales codificadas de forma r\u00edgida en los servicios web de LevelOne WBR-6012 permite a los atacantes obtener acceso no autorizado durante los primeros 30 segundos posteriores al arranque. Otras vulnerabilidades pueden forzar un reinicio, eludiendo la restricci\u00f3n de tiempo inicial para la explotaci\u00f3n. La cadena de puerta trasera se puede encontrar en la direcci\u00f3n 0x80100910 80100910 40 6d 21 74 ds \"@m!t2K1\" 32 4b 31 00 La funci\u00f3n ubicada en 0x800b78b0 hace referencia a ella y se utiliza como se muestra en el pseudoc\u00f3digo a continuaci\u00f3n: if ((SECOND_FROM_BOOT_TIME < 300) && (is_equal = strcmp(password,\"@m!t2K1\")) { return 1;} Donde 1 es el valor de retorno al acceso de nivel de administrador (0 es error y 3 es usuario)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30149.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30149.json index 2a1a3c0fe80..ee708a1689a 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30149.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30149.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30149", "sourceIdentifier": "psirt@hcl.com", "published": "2024-10-31T09:15:02.993", - "lastModified": "2024-10-31T09:15:02.993", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31151.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31151.json index 8953d7604af..c5072e272ff 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31151.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31151.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31151", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:05.507", - "lastModified": "2024-10-30T14:15:05.507", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A security flaw involving hard-coded credentials in LevelOne WBR-6012's web services allows attackers to gain unauthorized access during the first 30 seconds post-boot. Other vulnerabilities can force a reboot, circumventing the initial time restriction for exploitation.The password string can be found at addresses 0x 803cdd0f and 0x803da3e6:\r\n\r\n 803cdd0f 41 72 69 65 ds \"AriesSerenaCairryNativitaMegan\"\r\n 73 53 65 72 \r\n 65 6e 61 43\r\n ...\r\n\r\nIt is referenced by the function at 0x800b78b0 and simplified in the pseudocode below:\r\n\r\n if (is_equal = strcmp(password,\"AriesSerenaCairryNativitaMegan\"){\r\n ret = 3;}\r\n\r\nWhere 3 is the return value to user-level access (0 being fail and 1 being admin/backdoor).\r\n\r\nWhile there's no legitimate functionality to change this password, once authenticated it is possible manually make a change by taking advantage of TALOS-2024-XXXXX using HTTP POST paramater \"Pu\" (new user password) in place of \"Pa\" (new admin password)." + }, + { + "lang": "es", + "value": "Una falla de seguridad que involucra credenciales codificadas en los servicios web de LevelOne WBR-6012 permite a los atacantes obtener acceso no autorizado durante los primeros 30 segundos posteriores al arranque. Otras vulnerabilidades pueden forzar un reinicio, eludiendo la restricci\u00f3n de tiempo inicial para la explotaci\u00f3n. La cadena de contrase\u00f1a se puede encontrar en las direcciones 0x 803cdd0f y 0x803da3e6: 803cdd0f 41 72 69 65 ds \"AriesSerenaCairryNativitaMegan\" 73 53 65 72 65 6e 61 43 ... La funci\u00f3n hace referencia a ella en 0x800b78b0 y se simplifica en el pseudoc\u00f3digo siguiente: if (is_equal = strcmp(password,\"AriesSerenaCairryNativitaMegan\"){ ret = 3;} Donde 3 es el valor de retorno para el acceso a nivel de usuario (0 es error y 1 es administrador/puerta trasera). Si bien no hay una funcionalidad leg\u00edtima para cambiar esta contrase\u00f1a, una vez autenticado es posible realizar un cambio manualmente aprovechando TALOS-2024-XXXXX mediante HTTP POST par\u00e1metro \"Pu\" (nueva contrase\u00f1a de usuario) en lugar de \"Pa\" (nueva contrase\u00f1a de administrador)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31152.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31152.json index ed250e08188..affd9281470 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31152.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31152.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31152", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:05.773", - "lastModified": "2024-10-30T14:15:05.773", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LevelOne WBR-6012 router with firmware R0.40e6 is vulnerable to improper resource allocation within its web application, where a series of crafted HTTP requests can cause a reboot. This could lead to network service interruptions." + }, + { + "lang": "es", + "value": "El enrutador LevelOne WBR-6012 con firmware R0.40e6 es vulnerable a una asignaci\u00f3n incorrecta de recursos dentro de su aplicaci\u00f3n web, donde una serie de solicitudes HTTP manipulada pueden provocar un reinicio. Esto podr\u00eda provocar interrupciones del servicio de red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31972.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31972.json index 24fbb94ba26..9dda804f9f7 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31972.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31972.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31972", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:06.760", - "lastModified": "2024-10-31T16:35:13.347", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31973.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31973.json index 01f6dad0fc5..45f15e1a969 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31973.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31973.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31973", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:06.893", - "lastModified": "2024-10-31T16:35:14.150", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json index e9184ae98df..4a1c4727d3f 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31975", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:06.967", - "lastModified": "2024-10-31T16:35:14.937", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32946.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32946.json index 8946a0bd011..908a44d159f 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32946.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32946.json @@ -2,13 +2,17 @@ "id": "CVE-2024-32946", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:06.033", - "lastModified": "2024-10-30T14:15:06.033", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the LevelOne WBR-6012 router's firmware version R0.40e6 allows sensitive information to be transmitted in cleartext via Web and FTP services, exposing it to network sniffing attacks." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la versi\u00f3n de firmware R0.40e6 del enrutador LevelOne WBR-6012 permite transmitir informaci\u00f3n confidencial en texto plano a trav\u00e9s de servicios web y FTP, exponi\u00e9ndola a ataques de rastreo de red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33603.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33603.json index 34ce61ca26b..eba83a7b90a 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33603.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33603.json @@ -2,13 +2,17 @@ "id": "CVE-2024-33603", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:06.330", - "lastModified": "2024-10-30T14:15:06.330", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LevelOne WBR-6012 router has an information disclosure vulnerability in its web application, which allows unauthenticated users to access a verbose system log page and obtain sensitive data, such as memory addresses and IP addresses for login attempts. This flaw could lead to session hijacking due to the device's reliance on IP address for authentication." + }, + { + "lang": "es", + "value": "El enrutador LevelOne WBR-6012 tiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en su aplicaci\u00f3n web, que permite a los usuarios no autenticados acceder a una p\u00e1gina de registro del sistema con muchos detalles y obtener datos confidenciales, como direcciones de memoria y direcciones IP para los intentos de inicio de sesi\u00f3n. Esta falla podr\u00eda provocar el secuestro de sesiones debido a la dependencia del dispositivo de la direcci\u00f3n IP para la autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33623.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33623.json index 9619440d988..6876dd43964 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33623.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33623.json @@ -2,13 +2,17 @@ "id": "CVE-2024-33623", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:06.597", - "lastModified": "2024-10-30T14:15:06.597", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A denial of service vulnerability exists in the Web Application functionality of LevelOne WBR-6012 R0.40e6. A specially crafted HTTP request can lead to a reboot. An attacker can send an HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio en la funcionalidad de la aplicaci\u00f3n web de LevelOne WBR-6012 R0.40e6. Una solicitud HTTP especialmente manipulada puede provocar un reinicio. Un atacante puede enviar una solicitud HTTP para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33626.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33626.json index eaf3f54d96d..86a1da27ef6 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33626.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33626.json @@ -2,13 +2,17 @@ "id": "CVE-2024-33626", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:06.850", - "lastModified": "2024-10-30T14:15:06.850", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LevelOne WBR-6012 router contains a vulnerability within its web application that allows unauthenticated disclosure of sensitive information, such as the WiFi WPS PIN, through a hidden page accessible by an HTTP request. Disclosure of this information could enable attackers to connect to the device's WiFi network." + }, + { + "lang": "es", + "value": "El enrutador LevelOne WBR-6012 contiene una vulnerabilidad en su aplicaci\u00f3n web que permite la divulgaci\u00f3n no autenticada de informaci\u00f3n confidencial, como el PIN de WPS de WiFi, a trav\u00e9s de una p\u00e1gina oculta a la que se puede acceder mediante una solicitud HTTP. La divulgaci\u00f3n de esta informaci\u00f3n podr\u00eda permitir a los atacantes conectarse a la red WiFi del dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33699.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33699.json index 859b1a69d55..80b4c67c627 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33699.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33699.json @@ -2,13 +2,17 @@ "id": "CVE-2024-33699", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:07.100", - "lastModified": "2024-10-30T14:15:07.100", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LevelOne WBR-6012 router's web application has a vulnerability in its firmware version R0.40e6, allowing attackers to change the administrator password and gain higher privileges without the current password." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n web del enrutador LevelOne WBR-6012 tiene una vulnerabilidad en su versi\u00f3n de firmware R0.40e6, que permite a los atacantes cambiar la contrase\u00f1a de administrador y obtener mayores privilegios sin la contrase\u00f1a actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33700.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33700.json index 700718f41c0..7aa9ac858e5 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33700.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33700.json @@ -2,13 +2,17 @@ "id": "CVE-2024-33700", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:07.460", - "lastModified": "2024-10-30T14:15:07.460", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LevelOne WBR-6012 router firmware R0.40e6 suffers from an input validation vulnerability within its FTP functionality, enabling attackers to cause a denial of service through a series of malformed FTP commands. This can lead to device reboots and service disruption." + }, + { + "lang": "es", + "value": "El firmware R0.40e6 del enrutador LevelOne WBR-6012 presenta una vulnerabilidad de validaci\u00f3n de entrada en su funcionalidad FTP, lo que permite a los atacantes provocar una denegaci\u00f3n de servicio mediante una serie de comandos FTP mal formados. Esto puede provocar reinicios del dispositivo e interrupciones del servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36060.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36060.json index e21274794e1..13b6cb5b9fa 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36060.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36060", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.037", - "lastModified": "2024-10-31T15:35:34.893", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37573.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37573.json index b44bd5a813b..add167d45e1 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37573.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37573", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.107", - "lastModified": "2024-10-31T15:35:35.677", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39332.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39332.json index b3af7eeee7f..c73b1712541 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39332.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39332.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39332", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:12.897", - "lastModified": "2024-10-31T19:15:12.897", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39719.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39719.json index 7114ff58c26..4ca8b11c151 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39719.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39719.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39719", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T20:15:04.770", - "lastModified": "2024-10-31T20:15:04.770", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39720.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39720.json index e7747d410cf..dc1a58f3361 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39720.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39720.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39720", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T20:15:04.877", - "lastModified": "2024-10-31T20:15:04.877", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39721.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39721.json index 58a0e68da92..83daa0b5570 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39721.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39721.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39721", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T20:15:04.993", - "lastModified": "2024-10-31T20:15:04.993", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39722.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39722.json index d0959f88eeb..67f35bd4b45 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39722.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39722.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39722", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T20:15:05.080", - "lastModified": "2024-10-31T20:15:05.080", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3935.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3935.json index 07152374bce..829fe892652 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3935.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3935.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3935", "sourceIdentifier": "emo@eclipse.org", "published": "2024-10-30T12:15:03.090", - "lastModified": "2024-10-31T10:15:04.187", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42041.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42041.json index 23b40f4b268..bd0c13bf45e 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42041.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42041", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.223", - "lastModified": "2024-10-31T15:35:35.840", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42515.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42515.json index 544ca288281..61ba27c10e6 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42515.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42515.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42515", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:12.983", - "lastModified": "2024-10-31T19:15:12.983", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42835.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42835.json index 2e0738a125b..d5f821ea7e4 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42835.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42835.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42835", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T14:15:05.610", - "lastModified": "2024-10-31T19:35:08.113", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43382.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43382.json index a4aa1dca914..0c8a94c7340 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43382.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43382.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43382", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.160", - "lastModified": "2024-10-31T15:35:36.610", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43383.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43383.json index 33125b32346..79b4ca88d74 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43383.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43383.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43383", "sourceIdentifier": "security@apache.org", "published": "2024-10-31T10:15:04.293", - "lastModified": "2024-10-31T10:15:04.293", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43930.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43930.json index 4267bf3f28a..eb922ed21d1 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43930.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43930.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43930", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-31T10:15:04.770", - "lastModified": "2024-10-31T10:15:04.770", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43933.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43933.json index e31b8f8d40f..8130bb0315a 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43933.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43933.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43933", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-31T10:15:05.020", - "lastModified": "2024-10-31T10:15:05.020", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43984.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43984.json index 75047ccc769..f06d5ad28a8 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43984.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43984.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43984", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-31T10:15:05.253", - "lastModified": "2024-10-31T10:15:05.253", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44080.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44080.json index fad6ea5591d..2399ba91c66 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44080.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44080.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44080", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T22:15:03.633", - "lastModified": "2024-10-30T15:35:15.230", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44081.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44081.json index 6d0e94e49cf..288f9506dbd 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44081.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44081.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44081", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T22:15:03.730", - "lastModified": "2024-10-29T22:15:03.730", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Jitsi Meet before 2.0.9779, the functionality to share a video file was implemented in an insecure way, resulting in clients loading videos from an arbitrary URL if a message from another participant contains a URL encoded in the expected format." + }, + { + "lang": "es", + "value": "En Jitsi Meet anterior a 2.0.9779, la funcionalidad para compartir un archivo de video se implement\u00f3 de manera insegura, lo que provocaba que los clientes cargaran videos desde una URL arbitraria si un mensaje de otro participante conten\u00eda una URL codificada en el formato esperado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46531.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46531.json index 7d2ab22a62f..44ca9bf9277 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46531.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46531.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46531", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T19:15:14.113", - "lastModified": "2024-10-31T16:35:16.453", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47939.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47939.json index 766e4da0708..be64de77002 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47939.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47939.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47939", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-11-01T05:15:05.950", - "lastModified": "2024-11-01T05:15:05.950", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48063.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48063.json index 48e87b98e61..5486a349165 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48063.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48063.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48063", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T21:15:04.080", - "lastModified": "2024-10-30T15:35:17.993", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48093.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48093.json index 788e23419c7..868d5354ee3 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48093.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48093.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48093", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.337", - "lastModified": "2024-10-31T15:35:37.423", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48112.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48112.json index 76cb83bb571..ef808467014 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48112.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48112", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.393", - "lastModified": "2024-10-31T14:35:19.053", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48138.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48138.json index ef5646f145a..19a09fcead4 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48138.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48138.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48138", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T22:15:03.810", - "lastModified": "2024-10-30T15:35:18.830", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48200.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48200.json index 44f7fc0bac3..601bde4a5cb 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48200.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48200.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48200", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:13.150", - "lastModified": "2024-10-31T19:15:13.150", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48202.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48202.json index 4bbc2e7dd03..143d5753d32 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48202.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48202", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T19:15:14.200", - "lastModified": "2024-10-31T15:35:38.390", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48206.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48206.json index 4ef4661ce5f..709055005e6 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48206.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48206.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48206", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T21:15:04.190", - "lastModified": "2024-10-30T15:35:19.677", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48214.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48214.json index f0ee119aec7..8c65f84ba95 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48214.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48214.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48214", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.420", - "lastModified": "2024-10-31T16:35:17.260", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json index 77255bfe1e6..022c9ec8a06 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48241", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.490", - "lastModified": "2024-10-31T15:35:39.163", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48271.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48271.json index 5efecf50b72..e8750607fdf 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48271.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48271.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48271", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T20:15:04.553", - "lastModified": "2024-10-31T16:35:18.043", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48272.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48272.json index c8337f55319..2001bc4a297 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48272.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48272.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48272", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T20:15:04.620", - "lastModified": "2024-10-31T16:35:19.107", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48307.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48307.json index 8c2740aa0d4..ae7603d7481 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48307.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48307.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48307", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T01:15:14.803", - "lastModified": "2024-10-31T19:35:09.203", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48311.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48311.json index 9ebc2cb2290..316e6190c16 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48311.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48311.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48311", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T02:15:04.003", - "lastModified": "2024-10-31T16:35:19.993", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48346.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48346.json index 650a2570a36..82bae1196fe 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48346.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48346.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48346", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.450", - "lastModified": "2024-10-31T19:35:10.023", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48359.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48359.json index fcf98dcf1d0..f376b42ddf1 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48359.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48359.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48359", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T20:15:05.340", - "lastModified": "2024-10-31T20:15:05.340", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48360.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48360.json index 0c4ade49371..435d9ff7791 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48360.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48360.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48360", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T20:15:05.420", - "lastModified": "2024-10-31T20:15:05.420", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48461.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48461.json index 939d6ec6503..a65c8aed3f9 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48461.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48461.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48461", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T21:15:04.347", - "lastModified": "2024-10-30T20:35:32.170", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48569.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48569.json index a706d8ec60e..9635e50ca25 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48569.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48569.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48569", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.567", - "lastModified": "2024-10-31T18:35:14.873", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48572.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48572.json index ae74cbf59ed..cc8ae1136b5 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48572.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48572.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48572", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T22:15:03.913", - "lastModified": "2024-10-30T15:35:20.497", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48573.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48573.json index 37d601c38d2..59d9e69cc8f 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48573.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48573", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T22:15:04.003", - "lastModified": "2024-10-30T15:35:21.227", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48646.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48646.json index d46ceeffc0b..e8e7e522570 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48646.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48646.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48646", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.640", - "lastModified": "2024-10-31T18:35:15.693", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48647.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48647.json index 623cdb30a22..a0d934c4e7d 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48647.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48647.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48647", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.743", - "lastModified": "2024-10-31T18:35:16.527", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48648.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48648.json index 0abcf2eff56..fa9afe197ce 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48648.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48648.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48648", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.813", - "lastModified": "2024-10-31T17:35:03.713", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48733.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48733.json index edfa0ca7d90..8d8c5a2f8d7 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48733.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48733.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48733", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.507", - "lastModified": "2024-10-30T21:15:14.507", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in /SASStudio/sasexec/sessions/{sessionID}/sql in SAS Studio 9.4 allows remote attacker to execute arbitrary SQL commands via the POST body request." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inyecci\u00f3n SQL en /SASStudio/sasexec/sessions/{sessionID}/sql en SAS Studio 9.4 permite a un atacante remoto ejecutar comandos SQL arbitrarios a trav\u00e9s de la solicitud del cuerpo POST." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48734.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48734.json index f6e1f464824..3b40b60c553 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48734.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48734.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48734", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.563", - "lastModified": "2024-10-30T21:15:14.563", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "*Unrestricted file upload in /SASStudio/SASStudio/sasexec/{sessionID}/{InternalPath} in SAS Studio 9.4 allows remote attacker to upload malicious files." + }, + { + "lang": "es", + "value": "*La carga de archivos sin restricciones en /SASStudio/SASStudio/sasexec/{sessionID}/{InternalPath} en SAS Studio 9.4 permite que atacantes remotos carguen archivos maliciosos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48735.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48735.json index 41d9ea6d17a..c63749b30b6 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48735.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48735.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48735", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.620", - "lastModified": "2024-10-31T20:35:06.767", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48807.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48807.json index 4eae78f7172..39154c6dd68 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48807.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48807.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48807", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.680", - "lastModified": "2024-10-31T15:35:39.950", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48910.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48910.json index 03567508d29..90bc8c50c43 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48910.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48910.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48910", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-31T15:15:15.720", - "lastModified": "2024-10-31T15:15:15.720", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48921.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48921.json index 2d380c162cb..2f839ce06c2 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48921.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48921.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48921", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-29T15:15:10.593", - "lastModified": "2024-10-29T15:15:10.593", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kyverno is a policy engine designed for Kubernetes. A kyverno ClusterPolicy, ie. \"disallow-privileged-containers,\" can be overridden by the creation of a PolicyException in a random namespace. By design, PolicyExceptions are consumed from any namespace. Administrators may not recognize that this allows users with privileges to non-kyverno namespaces to create exceptions. This vulnerability is fixed in 1.13.0." + }, + { + "lang": "es", + "value": "Kyverno es un motor de pol\u00edticas dise\u00f1ado para Kubernetes. Una ClusterPolicy de Kyverno, es decir, \"disallow-privileged-containers\", se puede anular mediante la creaci\u00f3n de una PolicyException en un espacio de nombres aleatorio. Por dise\u00f1o, las PolicyExceptions se consumen desde cualquier espacio de nombres. Es posible que los administradores no reconozcan que esto permite que los usuarios con privilegios en espacios de nombres que no sean de Kyverno creen excepciones. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 1.13.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json index 57b66f12104..3ff28fec2b8 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48955", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T18:15:05.690", - "lastModified": "2024-10-31T20:15:05.530", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49501.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49501.json index 8fd74b17749..33470d091a5 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49501.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49501.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49501", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-11-01T05:15:06.280", - "lastModified": "2024-11-01T05:15:06.280", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49674.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49674.json index ece7526804a..b3ed89b9fa8 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49674.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49674.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49674", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-31T10:15:05.490", - "lastModified": "2024-10-31T10:15:05.490", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49685.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49685.json index b4e804b6b67..40dd911a3f0 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49685.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49685.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49685", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-31T10:15:05.710", - "lastModified": "2024-10-31T10:15:05.710", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49768.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49768.json index 1ebf64ff95a..5fa99782e73 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49768.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49768.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49768", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-29T15:15:11.440", - "lastModified": "2024-10-29T15:15:11.440", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may send a request that is exactly recv_bytes (defaults to 8192) long, followed by a secondary request using HTTP pipelining. When request lookahead is disabled (default) we won't read any more requests, and when the first request fails due to a parsing error, we simply close the connection. However when request lookahead is enabled, it is possible to process and receive the first request, start sending the error message back to the client while we read the next request and queue it. This will allow the secondary request to be serviced by the worker thread while the connection should be closed. Waitress 3.0.1 fixes the race condition. As a workaround, disable channel_request_lookahead, this is set to 0 by default disabling this feature." + }, + { + "lang": "es", + "value": "Waitress es un servidor de interfaz de puerta de enlace de servidor web para Python 2 y 3. Un cliente remoto puede enviar una solicitud que tenga exactamente recv_bytes (el valor predeterminado es 8192), seguida de una solicitud secundaria mediante canalizaci\u00f3n HTTP. Cuando la b\u00fasqueda anticipada de solicitudes est\u00e1 deshabilitada (valor predeterminado), no leeremos m\u00e1s solicitudes y, cuando la primera solicitud falla debido a un error de an\u00e1lisis, simplemente cerramos la conexi\u00f3n. Sin embargo, cuando la b\u00fasqueda anticipada de solicitudes est\u00e1 habilitada, es posible procesar y recibir la primera solicitud, comenzar a enviar el mensaje de error al cliente mientras leemos la siguiente solicitud y la ponemos en cola. Esto permitir\u00e1 que el subproceso de trabajo atienda la solicitud secundaria mientras la conexi\u00f3n deber\u00eda estar cerrada. Waitress 3.0.1 corrige la condici\u00f3n de ejecuci\u00f3n. Como soluci\u00f3n alternativa, deshabilite channel_request_lookahead, que se establece en 0 de manera predeterminada, lo que deshabilita esta funci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49769.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49769.json index 309e07d6d6c..97434ed8417 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49769.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49769.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49769", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-29T15:15:12.030", - "lastModified": "2024-10-29T15:15:12.030", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote client closes the connection before waitress has had the opportunity to call getpeername() waitress won't correctly clean up the connection leading to the main thread attempting to write to a socket that no longer exists, but not removing it from the list of sockets to attempt to process. This leads to a busy-loop calling the write function. A remote attacker could run waitress out of available sockets with very little resources required. Waitress 3.0.1 contains fixes that remove the race condition." + }, + { + "lang": "es", + "value": "Waitress es un servidor de interfaz de puerta de enlace de servidor web para Python 2 y 3. Cuando un cliente remoto cierra la conexi\u00f3n antes de que waitress haya tenido la oportunidad de llamar a getpeername(), waitress no limpiar\u00e1 correctamente la conexi\u00f3n, lo que lleva al hilo principal a intentar escribir en un socket que ya no existe, pero no lo eliminar\u00e1 de la lista de sockets que se intentar\u00e1n procesar. Esto conduce a un bucle de actividad que llama a la funci\u00f3n de escritura. Un atacante remoto podr\u00eda dejar a waitress sin sockets disponibles y requerir muy pocos recursos. Waitress 3.0.1 contiene correcciones que eliminan la condici\u00f3n de carrera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50334.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50334.json index 633566b101f..126fcfe3971 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50334.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50334.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50334", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-29T15:15:12.560", - "lastModified": "2024-10-29T15:15:12.560", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Scoold is a Q&A and a knowledge sharing platform for teams. A semicolon path injection vulnerability was found on the /api;/config endpoint. By appending a semicolon in the URL, attackers can bypass authentication and gain unauthorised access to sensitive configuration data. Furthermore, PUT requests on the /api;/config endpoint while setting the Content-Type: application/hocon header allow unauthenticated attackers to file reading via HOCON file inclusion. This allows attackers to retrieve sensitive information such as configuration files from the server, which can be leveraged for further exploitation. The vulnerability has been fixed in Scoold 1.64.0. A workaround would be to disable the Scoold API with scoold.api_enabled = false." + }, + { + "lang": "es", + "value": "Scoold es una plataforma de preguntas y respuestas y de intercambio de conocimientos para equipos. Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n de ruta de punto y coma en el endpoint /api;/config. Al agregar un punto y coma en la URL, los atacantes pueden omitir la autenticaci\u00f3n y obtener acceso no autorizado a datos de configuraci\u00f3n confidenciales. Adem\u00e1s, las solicitudes PUT en el endpoint /api;/config mientras se configura el encabezado Content-Type: application/hocon permiten a los atacantes no autenticados leer archivos a trav\u00e9s de la inclusi\u00f3n de archivos HOCON. Esto permite a los atacantes recuperar informaci\u00f3n confidencial, como archivos de configuraci\u00f3n, del servidor, que se puede aprovechar para una mayor explotaci\u00f3n. La vulnerabilidad se ha corregido en Scoold 1.64.0. Una soluci\u00f3n alternativa ser\u00eda deshabilitar la API de Scoold con scoold.api_enabled = false." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50344.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50344.json index 7f962ba000f..0f343d2c30f 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50344.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50344.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50344", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-30T16:15:04.763", - "lastModified": "2024-10-30T16:15:04.763", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "I, Librarian is an open-source version of a PDF managing SaaS. Supplemental Files are allowed to be viewed in the browser, only if they have a white-listed MIME type. Unfortunately, this logic is broken, thus allowing unsafe files containing Javascript to be executed with the application context. An attacker can exploit this vulnerability by uploading a supplementary file that contains a malicious code or script. This code will then be executed when the file is loaded in the browser. The vulnerability was fixed in version 5.11.2." + }, + { + "lang": "es", + "value": "I, Librarian es una versi\u00f3n de c\u00f3digo abierto de un SaaS de gesti\u00f3n de PDF. Los archivos complementarios solo se pueden ver en el navegador si tienen un tipo MIME incluido en la lista blanca. Lamentablemente, esta l\u00f3gica no funciona, lo que permite que se ejecuten archivos no seguros que contienen Javascript con el contexto de la aplicaci\u00f3n. Un atacante puede aprovechar esta vulnerabilidad cargando un archivo complementario que contenga un c\u00f3digo o script malicioso. Este c\u00f3digo se ejecutar\u00e1 cuando se cargue el archivo en el navegador. La vulnerabilidad se solucion\u00f3 en la versi\u00f3n 5.11.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50347.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50347.json index d639ee2721a..1522b1faa95 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50347.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50347.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50347", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-31T18:15:05.600", - "lastModified": "2024-10-31T18:15:05.600", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50348.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50348.json index fa7b4da72f6..60c9366139e 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50348.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50348.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50348", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-29T23:15:03.863", - "lastModified": "2024-10-29T23:15:03.863", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InstantCMS is a free and open source content management system. In photo upload function in the photo album page there is no input validation taking place. Due to this attackers are able to inject the XSS (Cross Site Scripting) payload and execute. This vulnerability is fixed in 2.16.3." + }, + { + "lang": "es", + "value": "InstantCMS es un sistema de gesti\u00f3n de contenido gratuito y de c\u00f3digo abierto. En la funci\u00f3n de carga de fotos de la p\u00e1gina del \u00e1lbum de fotos no se realiza ninguna validaci\u00f3n de entrada. Debido a esto, los atacantes pueden inyectar el payload XSS (Cross Site Scripting) y ejecutarlo. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 2.16.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50353.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50353.json index 9172f34217f..d18f6152bcd 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50353.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50353.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50353", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-30T14:15:07.790", - "lastModified": "2024-10-30T14:15:07.790", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ICG.AspNetCore.Utilities.CloudStorage is a collection of cloud storage utilities to assist with the management of files for cloud upload. Users of this library that set a duration for a SAS Uri with a value other than 1 hour may have generated a URL with a duration that is longer, or shorter than desired. Users not implemented SAS Uri's are unaffected. This issue was resolved in version 8.0.0 of the library." + }, + { + "lang": "es", + "value": "ICG.AspNetCore.Utilities.CloudStorage es una colecci\u00f3n de utilidades de almacenamiento en la nube que ayudan con la administraci\u00f3n de archivos para la carga en la nube. Los usuarios de esta librer\u00eda que configuran una duraci\u00f3n para una URL de SAS con un valor distinto de 1 hora pueden haber generado una URL con una duraci\u00f3n mayor o menor a la deseada. Los usuarios que no implementaron URL de SAS no se ven afectados. Este problema se resolvi\u00f3 en la versi\u00f3n 8.0.0 de la librer\u00eda." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50354.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50354.json index d6f4217d168..67d0a0bb2bf 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50354.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50354.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50354", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-31T16:15:05.763", - "lastModified": "2024-10-31T16:15:05.763", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50356.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50356.json index 75664b99e1e..92fdfba4da5 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50356.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50356.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50356", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-31T18:15:05.750", - "lastModified": "2024-10-31T20:35:07.840", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50419.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50419.json index e79813fea5c..c78f7caf5ab 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50419.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50419.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50419", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-30T15:15:19.360", - "lastModified": "2024-10-30T15:15:19.360", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Authorization vulnerability in Wpsoul Greenshift \u2013 animation and page builder blocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Greenshift \u2013 animation and page builder blocks: from n/a through 9.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n incorrecta en Wpsoul Greenshift \u2013 animation and page builder blocks permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a los bloques de animaci\u00f3n y creaci\u00f3n de p\u00e1ginas Greenshift: desde n/a hasta 9.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50421.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50421.json index 0f340fefeb1..87ab35281ff 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50421.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50421.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50421", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T22:15:04.083", - "lastModified": "2024-10-29T22:15:04.083", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in WP Overnight WooCommerce PDF Invoices & Packing Slips allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WooCommerce PDF Invoices & Packing Slips: from n/a through 3.8.6." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WP Overnight WooCommerce PDF Invoices & Packing Slips permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WooCommerce PDF Invoices & Packing Slips: desde n/a hasta 3.8.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50422.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50422.json index 8be6531c4bd..d4bad65b631 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50422.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50422.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50422", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T22:15:04.290", - "lastModified": "2024-10-29T22:15:04.290", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Cloudways Breeze allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Breeze: from n/a through 2.1.14." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Cloudways Breeze permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Breeze: desde n/a hasta 2.1.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50423.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50423.json index 499dcf44a66..acfb30a88aa 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50423.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50423.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50423", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T22:15:04.500", - "lastModified": "2024-10-29T22:15:04.500", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Templately allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Templately: from n/a through 3.1.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Templately permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Templately: desde n/a hasta 3.1.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50424.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50424.json index 74fc9d3aaf7..a430aa04d8f 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50424.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50424.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50424", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T22:15:04.703", - "lastModified": "2024-10-29T22:15:04.703", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Templately allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Templately: from n/a through 3.1.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Templately permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Templately: desde n/a hasta 3.1.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50425.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50425.json index d5199a017a1..0a10b420560 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50425.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50425.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50425", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T22:15:04.917", - "lastModified": "2024-10-29T22:15:04.917", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Veribo, Roland Murg WP Booking System.This issue affects WP Booking System: from n/a through 2.0.19.10." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Mondula GmbH Multi Step Form permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Multi Step Form: desde n/a hasta 1.7.21." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50428.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50428.json index 472f3840465..80b7f83f319 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50428.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50428.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50428", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T22:15:05.133", - "lastModified": "2024-10-29T22:15:05.133", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Mondula GmbH Multi Step Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Multi Step Form: from n/a through 1.7.21." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Mondula GmbH Multi Step Form permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Multi Step Form: desde n/a hasta 1.7.21." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50454.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50454.json index 00e815864f4..55f4e105021 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50454.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50454.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50454", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T22:15:05.350", - "lastModified": "2024-10-29T22:15:05.350", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in The SEO Guys at SEOPress SEOPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SEOPress: from n/a through 8.1.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en The SEO Guys en SEOPress SEOPress permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a SEOPress: desde n/a hasta 8.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50455.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50455.json index e38215b9fae..ef6bbaaabf3 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50455.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50455.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50455", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T21:15:04.440", - "lastModified": "2024-10-29T21:15:04.440", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in The SEO Guys at SEOPress SEOPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SEOPress: from n/a through 8.1.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en The SEO Guys en SEOPress SEOPress permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a SEOPress: desde n/a hasta 8.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50456.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50456.json index 034292bd9d4..f2a61404998 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50456.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50456.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50456", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T21:15:04.673", - "lastModified": "2024-10-29T21:15:04.673", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in The SEO Guys at SEOPress SEOPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SEOPress: from n/a through 8.1.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en The SEO Guys en SEOPress SEOPress permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a SEOPress: desde n/a hasta 8.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50459.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50459.json index 5955f1a1da9..3942f2c6c82 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50459.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50459.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50459", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T17:15:04.423", - "lastModified": "2024-10-29T17:15:04.423", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in HM Plugin WordPress Stripe Donation and Payment Plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Stripe Donation and Payment Plugin: from n/a through 3.2.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en el complemento HM de WordPress Stripe Donation and Payment Plugin permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al complemento HM de WordPress Stripe Donation and Payment Plugin: desde n/a hasta 3.2.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50466.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50466.json index 3e5f2a0ba80..d4a836723e0 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50466.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50466.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50466", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T17:15:04.640", - "lastModified": "2024-10-29T17:15:04.640", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in DarkMySite DarkMySite \u2013 Advanced Dark Mode Plugin for WordPress darkmysite allows Cross Site Request Forgery.This issue affects DarkMySite \u2013 Advanced Dark Mode Plugin for WordPress: from n/a through 1.2.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en DarkMySite DarkMySite \u2013 Advanced Dark Mode Plugin para WordPress darkmysite permite Cross-Site Request Forgery. Este problema afecta a DarkMySite \u2013 Advanced Dark Mode Plugin para WordPress: desde n/a hasta 1.2.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50503.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50503.json index 8f027331544..6a1c6747d8c 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50503.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50503.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50503", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-30T08:15:02.813", - "lastModified": "2024-10-30T08:15:02.813", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Deryck O\u00f1ate User Toolkit allows Authentication Bypass.This issue affects User Toolkit: from n/a through 1.2.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en Deryck O\u00f1ate User Toolkit permite la omisi\u00f3n de autenticaci\u00f3n. Este problema afecta a User Toolkit: desde n/a hasta 1.2.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50504.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50504.json index 0eed2c5e16a..19bf01b9890 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50504.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50504.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50504", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-30T08:15:03.077", - "lastModified": "2024-10-30T08:15:03.077", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in Matt Whiteman Bulk Change Role allows Privilege Escalation.This issue affects Bulk Change Role: from n/a through 1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en Bulk Change Role de Matt Whiteman permite la escalada de privilegios. Este problema afecta a Bulk Change Role: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50506.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50506.json index 99de91d80fd..5732327a05d 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50506.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50506.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50506", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-30T08:15:03.323", - "lastModified": "2024-10-30T08:15:03.323", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in Azexo Marketing Automation by AZEXO allows Privilege Escalation.This issue affects Marketing Automation by AZEXO: from n/a through 1.27.80." + }, + { + "lang": "es", + "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en Azexo Marketing Automation de AZEXO permite la escalada de privilegios. Este problema afecta a Marketing Automation de AZEXO: desde n/a hasta la versi\u00f3n 1.27.80." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50507.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50507.json index 5d64a00ff50..d8e5ff815e0 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50507.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50507.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50507", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-30T08:15:03.533", - "lastModified": "2024-10-30T08:15:03.533", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Daniel Schmitzer DS.DownloadList allows Object Injection.This issue affects DS.DownloadList: from n/a through 1.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de deserializaci\u00f3n de datos no confiables en DS.DownloadList de Daniel Schmitzer permite la inyecci\u00f3n de objetos. Este problema afecta a DS.DownloadList: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50508.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50508.json index b571e8ddb17..bc889fb06ee 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50508.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50508.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50508", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-30T08:15:03.750", - "lastModified": "2024-10-30T08:15:03.750", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Chetan Khandla Woocommerce Product Design allows Path Traversal.This issue affects Woocommerce Product Design: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Chetan Khandla Woocommerce Product Design permite Path Traversal. Este problema afecta a Woocommerce Product Design: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50509.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50509.json index 84b8f3f80b0..0540ea50035 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50509.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50509.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50509", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-30T08:15:03.967", - "lastModified": "2024-10-30T08:15:03.967", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Chetan Khandla Woocommerce Product Design allows Path Traversal.This issue affects Woocommerce Product Design: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Chetan Khandla Woocommerce Product Design permite Path Traversal. Este problema afecta a Woocommerce Product Design: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50510.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50510.json index 7febb9ad62e..2acb65094f9 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50510.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50510.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50510", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-30T08:15:04.180", - "lastModified": "2024-10-30T08:15:04.180", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Web and Print Design AR For Woocommerce allows Upload a Web Shell to a Web Server.This issue affects AR For Woocommerce: from n/a through 6.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en dise\u00f1o web e impreso AR For Woocommerce permite cargar un shell web a un servidor web. Este problema afecta a AR For Woocommerce: desde n/a hasta 6.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50511.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50511.json index 05983663bcd..423f6ff1dd5 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50511.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50511.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50511", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-30T08:15:04.397", - "lastModified": "2024-10-30T08:15:04.397", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in David DONISA WP donimedia carousel allows Upload a Web Shell to a Web Server.This issue affects WP donimedia carousel: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en David DONISA WP donimedia carousel permite cargar un Web Shell a un servidor web. Este problema afecta a WP donimedia carousel: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50512.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50512.json index 1e4835fc460..96f5de1814c 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50512.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50512.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50512", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-30T08:15:04.610", - "lastModified": "2024-10-30T08:15:04.610", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Generation of Error Message Containing Sensitive Information vulnerability in Posti Posti Shipping allows Retrieve Embedded Sensitive Data.This issue affects Posti Shipping: from n/a through 3.10.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de generaci\u00f3n de mensaje de error que contiene informaci\u00f3n confidencial en Posti Posti Shipping permite recuperar datos confidenciales integrados. Este problema afecta a Posti Shipping: desde n/a hasta 3.10.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50801.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50801.json index ac32b8ad5ed..d25956bbc26 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50801.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50801.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50801", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:13.313", - "lastModified": "2024-10-31T19:15:13.313", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50802.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50802.json index 9a6052f8b56..713ae106338 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50802.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50802.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50802", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:13.413", - "lastModified": "2024-10-31T19:15:13.413", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51060.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51060.json index e585648508a..1d3656d85c4 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51060.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51060", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:13.500", - "lastModified": "2024-10-31T19:15:13.500", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51063.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51063.json index fec0a2a5fa0..407ef05c5d5 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51063.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51063.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51063", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:13.610", - "lastModified": "2024-10-31T19:15:13.610", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51064.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51064.json index 8da07cb5180..cde38516630 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51064.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51064.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51064", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:13.700", - "lastModified": "2024-10-31T19:15:13.700", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51065.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51065.json index c83bbf42a9f..7946fed8644 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51065.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51065.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51065", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:13.780", - "lastModified": "2024-10-31T19:15:13.780", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json index bbb9e62c94a..77f36c04680 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51066", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:13.860", - "lastModified": "2024-10-31T19:15:13.860", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51242.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51242.json index 21dcd5afc00..bfb819e32bc 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51242.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51242.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51242", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.793", - "lastModified": "2024-10-31T16:35:20.873", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51243.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51243.json index e8edc49224d..ec9c3d4a53c 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51243.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51243.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51243", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.860", - "lastModified": "2024-10-31T15:35:40.967", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51254.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51254.json index efd8f2347a5..65272a0f863 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51254.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51254.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51254", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T14:15:06.140", - "lastModified": "2024-10-31T15:35:41.800", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json index e1402dd8886..c65a50858e4 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51255", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T16:15:06.033", - "lastModified": "2024-10-31T19:35:10.837", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51257.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51257.json index 53d51225f93..3c6b5aacd2a 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51257.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51257.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51257", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T14:15:08.267", - "lastModified": "2024-10-30T16:35:28.993", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doCertificate function." + }, + { + "lang": "es", + "value": "DrayTek Vigor3900 1.5.1.3 permite a los atacantes inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n doCertificate." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51258.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51258.json index 5ef770407b9..5f958275c80 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51258.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51258.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51258", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T17:15:14.037", - "lastModified": "2024-10-30T18:35:17.040", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doSSLTunnel function." + }, + { + "lang": "es", + "value": "DrayTek Vigor3900 1.5.1.3 permite a los atacantes inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n doSSLTunnel." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51259.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51259.json index f942b326f12..6b21379dcfe 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51259.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51259.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51259", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T14:15:06.260", - "lastModified": "2024-10-31T19:35:11.680", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json index 76b3e88da13..6af9ffa99fb 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51260", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T16:15:06.113", - "lastModified": "2024-10-31T19:35:12.607", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51296.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51296.json index 3f3e07fa646..22f1a9a1e6c 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51296.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51296.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51296", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T14:15:08.337", - "lastModified": "2024-10-30T18:35:17.830", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the pingtrace function." + }, + { + "lang": "es", + "value": "En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n pingtrace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51298.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51298.json index d9282e4f860..c20446f3f2d 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51298.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51298.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51298", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T14:15:08.430", - "lastModified": "2024-10-30T16:35:29.790", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doGRETunnel function." + }, + { + "lang": "es", + "value": "En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n doGRETunnel." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51299.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51299.json index 7f3da0cefc6..037208e41e4 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51299.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51299.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51299", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T14:15:08.510", - "lastModified": "2024-10-30T18:35:18.640", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the dumpSyslog function." + }, + { + "lang": "es", + "value": "En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n dumpSyslog." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51300.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51300.json index 3d5e9f40e4d..b16e87a6c9f 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51300.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51300.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51300", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T14:15:08.597", - "lastModified": "2024-10-30T18:35:19.433", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the get_rrd function." + }, + { + "lang": "es", + "value": "En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n get_rrd." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51301.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51301.json index 1583fc44f27..f49a9c7e1e7 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51301.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51301.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51301", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T14:15:08.680", - "lastModified": "2024-10-30T18:35:20.227", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the packet_monitor function." + }, + { + "lang": "es", + "value": "En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n packet_monitor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51304.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51304.json index 4ffa338a219..b7bac67c1e1 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51304.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51304.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51304", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T13:15:14.360", - "lastModified": "2024-10-30T18:35:21.050", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51378.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51378.json index e3aa2ddd590..6832dbd5753 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51378.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51378.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51378", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T23:15:04.083", - "lastModified": "2024-10-30T15:35:23.600", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51419.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51419.json index d73c612b2e2..86ad9c548c8 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51419.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51419.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51419", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.913", - "lastModified": "2024-10-31T15:35:42.590", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51424.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51424.json index 26b7d1ee32a..e86c1399703 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51424.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51424.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51424", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.973", - "lastModified": "2024-10-31T16:35:21.660", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51425.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51425.json index 35418ae8b98..7ddc3fb8a71 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51425.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51425.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51425", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:15.027", - "lastModified": "2024-10-31T16:35:22.463", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51426.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51426.json index 1f7dcdbe2a0..5bf0777839c 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51426.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51426.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51426", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:15.083", - "lastModified": "2024-10-31T15:35:43.373", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51427.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51427.json index 0502294e606..9290d79f71a 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51427.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51427.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51427", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:15.147", - "lastModified": "2024-10-31T15:35:44.180", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51430.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51430.json index bb7b4177ac7..5f71641936a 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51430.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51430.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51430", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T17:15:13.403", - "lastModified": "2024-10-31T17:35:04.600", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51478.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51478.json index ee27943a589..afa0c2d6d86 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51478.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51478.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51478", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-31T17:15:13.500", - "lastModified": "2024-10-31T17:15:13.500", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51481.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51481.json index 69d9b60859a..2282745f6c4 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51481.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51481.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51481", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-31T17:15:13.723", - "lastModified": "2024-10-31T17:15:13.723", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51482.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51482.json index a3c10fbb32c..6a08d14f0db 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51482.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51482.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51482", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-31T18:15:05.997", - "lastModified": "2024-10-31T18:15:05.997", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51567.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51567.json index 853bf9a979d..643ab0b68a4 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51567.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51567", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T23:15:04.307", - "lastModified": "2024-10-30T14:35:14.933", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51568.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51568.json index 15185c2a511..7abfe003ec9 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51568.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51568", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T23:15:04.520", - "lastModified": "2024-10-30T14:35:15.670", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6479.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6479.json index 199d3e7e789..b46314d9f3c 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6479.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6479.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6479", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-31T22:15:03.577", - "lastModified": "2024-10-31T22:15:03.577", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6480.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6480.json index 73d70e3a170..4f677dfc581 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6480.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6480.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6480", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-31T22:15:03.817", - "lastModified": "2024-10-31T22:15:03.817", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7424.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7424.json index fcd0bee2162..96bd03cbda8 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7424.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7424.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7424", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-01T08:15:11.647", - "lastModified": "2024-11-01T08:15:11.647", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7456.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7456.json new file mode 100644 index 00000000000..015efa26324 --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7456.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7456", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-11-01T12:15:03.557", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability exists in the `/api/v1/external-users` route of lunary-ai/lunary version v1.4.2. The `order by` clause of the SQL query uses `sql.unsafe` without prior sanitization, allowing for SQL injection. The `orderByClause` variable is constructed without server-side validation or sanitization, enabling an attacker to execute arbitrary SQL commands. Successful exploitation can lead to complete data loss, modification, or corruption." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/lunary-ai/lunary/commit/6a0bc201181e0f4a0cc375ccf4ef0d7ae65c8a8e", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/bfb3015e-5642-4d94-ab49-e8b49c4e07e4", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7883.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7883.json index 4b25954cb42..3638ec256cb 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7883.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7883.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7883", "sourceIdentifier": "arm-security@arm.com", "published": "2024-10-31T17:15:14.013", - "lastModified": "2024-10-31T17:15:14.013", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7985.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7985.json index ebc90169596..f48dc966118 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7985.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7985.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7985", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T16:15:06.180", - "lastModified": "2024-10-29T16:15:06.180", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FileOrganizer \u2013 Manage WordPress and Website Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the \"fileorganizer_ajax_handler\" function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: The FileOrganizer Pro plugin must be installed and active to allow Subscriber+ users to upload files." + }, + { + "lang": "es", + "value": " El complemento FileOrganizer \u2013 Manage WordPress and Website Files para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n \"fileorganizer_ajax_handler\" en todas las versiones hasta la 1.0.9 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, y permisos otorgados por un administrador, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo. NOTA: El complemento FileOrganizer Pro debe estar instalado y activo para permitir que los usuarios de nivel de suscriptor+ carguen archivos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7991.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7991.json index c46b2814aa5..5311653a413 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7991.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7991.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7991", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:05.560", - "lastModified": "2024-10-29T22:15:05.560", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted DWG file, when parsed through Autodesk AutoCAD and certain AutoCAD-based products, can force an Out-of-Bounds Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo DWG creado con fines malintencionados, cuando se analiza a trav\u00e9s de Autodesk AutoCAD y ciertos productos basados en AutoCAD, puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7992.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7992.json index 5cf47eab6e5..eb3610a804d 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7992.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7992.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7992", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:05.760", - "lastModified": "2024-10-29T22:15:05.760", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted DWG file, when parsed through Autodesk AutoCAD and certain AutoCAD-based products, can force a Stack-based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo DWG creado con fines malintencionados, cuando se analiza a trav\u00e9s de Autodesk AutoCAD y ciertos productos basados en AutoCAD, puede provocar un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria . Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8185.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8185.json index 2157a43c558..121527f88d8 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8185.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8185.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8185", "sourceIdentifier": "security@hashicorp.com", "published": "2024-10-31T16:15:06.267", - "lastModified": "2024-10-31T16:15:06.267", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8444.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8444.json index 4a781dcd257..66fb40ecf40 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8444.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8444.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8444", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-30T07:15:16.060", - "lastModified": "2024-10-30T14:35:18.373", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8512.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8512.json index 6e809ce2726..03b1e68927f 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8512.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8512.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8512", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T11:15:15.963", - "lastModified": "2024-10-30T11:15:15.963", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8553.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8553.json index 07b785fcbe3..3d960576545 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8553.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8553.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8553", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-31T15:15:17.243", - "lastModified": "2024-11-01T02:15:03.870", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8587.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8587.json index 86057c6bad0..dd3f6601e1c 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8587.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8587.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8587", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T21:15:04.990", - "lastModified": "2024-10-29T21:15:04.990", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted SLDPRT file when parsed in odxsw_dll.dll through Autodesk AutoCAD can force a Heap Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo SLDPRT creado con fines malintencionados, cuando se analiza en odxsw_dll.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8588.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8588.json index 6c34d787f63..7b9ada8ca70 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8588.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8588.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8588", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:05.950", - "lastModified": "2024-10-29T22:15:05.950", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted SLDPRT file when parsed in odxsw_dll.dll through Autodesk AutoCAD can force a Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo SLDPRT creado con fines malintencionados, cuando se analiza en odxsw_dll.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de lectura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8589.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8589.json index 0f74ca65525..9779c8221a2 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8589.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8589.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8589", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:06.133", - "lastModified": "2024-10-29T22:15:06.133", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted SLDPRT file when parsed in odxsw_dll.dll through Autodesk AutoCAD can force a Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo SLDPRT creado con fines malintencionados, cuando se analiza en odxsw_dll.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de lectura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8590.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8590.json index 8556f21b531..b1eb642afeb 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8590.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8590.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8590", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:06.340", - "lastModified": "2024-10-29T22:15:06.340", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted 3DM file when parsed in atf_api.dll through Autodesk AutoCAD can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo 3DM creado con fines malintencionados, cuando se analiza en atf_api.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de tipo Use-After-Free. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8591.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8591.json index a7c3e043d75..05d473465c3 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8591.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8591.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8591", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:06.537", - "lastModified": "2024-10-29T22:15:06.537", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted 3DM file when parsed in AcTranslators.exe through Autodesk AutoCAD can force a Heap-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo 3DM creado con fines malintencionados, cuando se analiza en AcTranslators.exe a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8592.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8592.json index 00d916da075..4c1788e36c7 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8592.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8592.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8592", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:06.713", - "lastModified": "2024-10-29T22:15:06.713", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted CATPART file when parsed in AcTranslators.exe through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo CATPART creado con fines malintencionados, cuando se analiza en AcTranslators.exe a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de corrupci\u00f3n de memoria. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8593.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8593.json index 04310e67072..6e973d1d73a 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8593.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8593.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8593", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:06.907", - "lastModified": "2024-10-29T22:15:06.907", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted CATPART file when parsed in ASMKERN230A.dll through Autodesk AutoCAD can force a Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo CATPART creado con fines malintencionados, cuando se analiza en ASMKERN230A.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8594.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8594.json index 4a508f3beaf..3857c531366 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8594.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8594.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8594", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:07.103", - "lastModified": "2024-10-29T22:15:07.103", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted MODEL file when parsed in libodxdll.dll through Autodesk AutoCAD can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo MODEL creado con fines malintencionados, cuando se analiza en libodxdll.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8595.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8595.json index 9b0ecc010e2..abffd1ab177 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8595.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8595.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8595", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:07.300", - "lastModified": "2024-10-29T22:15:07.300", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted MODEL file when parsed in libodxdll.dll through Autodesk AutoCAD can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo MODEL creado con fines malintencionados, cuando se analiza en libodxdll.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de tipo Use-After-Free. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8596.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8596.json index 24c70252a7c..27d7722a026 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8596.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8596.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8596", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:07.510", - "lastModified": "2024-10-29T22:15:07.510", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted MODEL file when parsed in libodxdll.dll through Autodesk AutoCAD can force an Out-of-Bound Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo MODEL creado con fines malintencionados, cuando se analiza en libodxdll.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8597.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8597.json index 53133fc4f2b..2e8ab2ace1a 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8597.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8597.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8597", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:07.703", - "lastModified": "2024-10-29T22:15:07.703", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted STP file when parsed in ASMDATAX230A.dll through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo STP creado con fines malintencionados, cuando se analiza en ASMDATAX230A.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de corrupci\u00f3n de memoria. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8598.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8598.json index b07a00d5058..cfdc98924a3 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8598.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8598.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8598", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:07.917", - "lastModified": "2024-10-29T22:15:07.917", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted STP file when parsed in ACTranslators.exe through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo STP creado con fines malintencionados, cuando se analiza en ACTranslators.exe a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de corrupci\u00f3n de memoria. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8599.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8599.json index 18dbcb2b3b9..21b90dae047 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8599.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8599.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8599", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:08.130", - "lastModified": "2024-10-29T22:15:08.130", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted STP file when parsed in ACTranslators.exe through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo STP creado con fines malintencionados, cuando se analiza en ACTranslators.exe a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de corrupci\u00f3n de memoria. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8600.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8600.json index c7bb3d5a4a3..e6748d15326 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8600.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8600.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8600", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:08.330", - "lastModified": "2024-10-29T22:15:08.330", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted SLDPRT file when parsed in odxsw_dll.dll through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo SLDPRT creado con fines malintencionados, cuando se analiza en odxsw_dll.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de corrupci\u00f3n de memoria. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8627.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8627.json index dbce048cfc8..7054e09e6da 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8627.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8627.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8627", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T03:15:04.360", - "lastModified": "2024-10-30T03:15:04.360", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ultimate TinyMCE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'field' shortcode in all versions up to, and including, 5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento Ultimate TinyMCE para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado \"field\" en todas las versiones hasta la 5.7 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficiente. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8792.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8792.json index 45487024d84..98d5fc260d4 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8792.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8792.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8792", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T03:15:04.583", - "lastModified": "2024-10-30T03:15:04.583", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Subscribe to Comments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Subscribe to Comments para WordPress es vulnerable Cross-Site Scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 2.3 incluida. Esto permite que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8871.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8871.json index 9358f8f445f..1795e41f92c 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8871.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8871.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8871", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T06:15:16.460", - "lastModified": "2024-10-30T06:15:16.460", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Pricing Tables WordPress Plugin \u2013 Easy Pricing Tables plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Pricing Tables WordPress Plugin \u2013 Easy Pricing Tables para WordPress es vulnerable a ataques Cross-Site Scripting reflejado debido al uso de add_query_arg sin el escape apropiado en la URL en todas las versiones hasta la 3.2.5 incluida. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8896.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8896.json index 09aa075ee5b..77376bff83c 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8896.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8896.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8896", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:08.513", - "lastModified": "2024-10-29T22:15:08.513", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted DXF file when parsed in acdb25.dll\u00a0through Autodesk AutoCAD can force to access a variable prior to initialization. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo DXF creado con fines malintencionados, cuando se analiza en acdb25.dll a trav\u00e9s de Autodesk AutoCAD, puede obligar a acceder a una variable antes de la inicializaci\u00f3n. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8923.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8923.json index 6a5f7e812a7..39f13687b95 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8923.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8923.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8923", "sourceIdentifier": "psirt@servicenow.com", "published": "2024-10-29T16:15:06.417", - "lastModified": "2024-10-29T17:15:04.870", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ServiceNow has addressed an input validation vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u00a0ServiceNow deployed an update to hosted instances and ServiceNow provided the update to our partners and self-hosted customers.\u00a0Further, the vulnerability is addressed in the listed patches and hot fixes." + }, + { + "lang": "es", + "value": " ServiceNow ha solucionado una vulnerabilidad de validaci\u00f3n de entrada que se identific\u00f3 en Now Platform. Esta vulnerabilidad podr\u00eda permitir que un usuario no autenticado ejecute c\u00f3digo de forma remota dentro del contexto de Now Platform. ServiceNow implement\u00f3 una actualizaci\u00f3n en las instancias alojadas y proporcion\u00f3 la actualizaci\u00f3n a nuestros socios y clientes alojados por ellos mismos. Adem\u00e1s, la vulnerabilidad se soluciona en los parches y correcciones urgentes que se indican." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8924.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8924.json index 57ca7b4cc23..24d9c0cc06e 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8924.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8924.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8924", "sourceIdentifier": "psirt@servicenow.com", "published": "2024-10-29T17:15:04.983", - "lastModified": "2024-10-29T17:15:04.983", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ServiceNow has addressed a blind SQL injection vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to extract unauthorized information.\u00a0ServiceNow deployed an update to hosted instances, and ServiceNow provided the update to our partners and self-hosted customers.\u00a0Further, the vulnerability is addressed in the listed patches and hot fixes." + }, + { + "lang": "es", + "value": "ServiceNow ha solucionado una vulnerabilidad de inyecci\u00f3n SQL ciega que se identific\u00f3 en la plataforma Now. Esta vulnerabilidad podr\u00eda permitir que un usuario no autenticado extraiga informaci\u00f3n no autorizada. ServiceNow implement\u00f3 una actualizaci\u00f3n en las instancias alojadas y proporcion\u00f3 la actualizaci\u00f3n a nuestros socios y clientes alojados por ellos mismos. Adem\u00e1s, la vulnerabilidad se soluciona en los parches y correcciones urgentes que se indican." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8934.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8934.json index d9751863189..6b29244636b 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8934.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8934.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8934", "sourceIdentifier": "info@cert.vde.com", "published": "2024-10-31T13:15:15.040", - "lastModified": "2024-10-31T13:15:15.040", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9110.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9110.json index e6989feb0da..b57411192cf 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9110.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9110.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9110", "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", "published": "2024-10-30T17:15:14.177", - "lastModified": "2024-10-30T17:15:14.177", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A medium severity vulnerability has been identified within Privileged Identity which can allow an attacker to perform reflected cross-site scripting attacks." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de gravedad media en Privileged Identity que puede permitir a un atacante realizar ataques de Cross Site Scripting reflejado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9165.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9165.json index b597aea659d..c6e9101e7da 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9165.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9165.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9165", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-31T07:15:02.647", - "lastModified": "2024-10-31T07:15:02.647", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Gift Cards (Gift Vouchers and Packages) (WooCommerce Supported) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.4.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Gift Cards (Gift Vouchers and Packages) (WooCommerce Supported) para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 4.4.4 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9388.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9388.json index d2f1ff79465..c8aba9e09d9 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9388.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9388.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9388", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T11:15:16.297", - "lastModified": "2024-10-30T11:15:16.297", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9419.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9419.json index 3f73c062aff..1223a5249ba 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9419.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9419.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9419", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2024-10-30T18:15:08.260", - "lastModified": "2024-10-30T18:15:08.260", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Client / Server PCs with the HP Smart Universal Printing Driver installed are potentially vulnerable to Remote Code Execution and/or Elevation of Privilege. A client using the HP Smart Universal Printing Driver that sends a print job comprised of a malicious XPS file could potentially lead to Remote Code Execution and/or Elevation of Privilege on the PC." + }, + { + "lang": "es", + "value": "Los equipos cliente/servidor con el controlador de impresi\u00f3n universal inteligente de HP instalado son potencialmente vulnerables a la ejecuci\u00f3n remota de c\u00f3digo y/o la elevaci\u00f3n de privilegios. Un cliente que utilice el controlador de impresi\u00f3n universal inteligente de HP que env\u00ede un trabajo de impresi\u00f3n compuesto por un archivo XPS malicioso podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo y/o la elevaci\u00f3n de privilegios en el equipo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9430.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9430.json index 4e7f2cf6f5b..c9ca59ca1dc 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9430.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9430.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9430", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-31T07:15:03.253", - "lastModified": "2024-10-31T07:15:03.253", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Get Quote For Woocommerce \u2013 Request A Quote For Woocommerce plugin for WordPress is vulnerable to unauthorized access of Quote data due to a missing capability check on the ct_tepfw_wp_loaded function in all versions up to, and including, 1.0.0. This makes it possible for unauthenticated attackers to download Quote PDF and CSV documents." + }, + { + "lang": "es", + "value": "El complemento Get Quote For Woocommerce \u2013 Request A Quote For Woocommerce para WordPress es vulnerable al acceso no autorizado a los datos de Quote debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n ct_tepfw_wp_loaded en todas las versiones hasta la 1.0.0 incluida. Esto hace posible que atacantes no autenticados descarguen documentos PDF y CSV de Quote." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9434.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9434.json index 50b1589abab..3dafa0546ec 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9434.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9434.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9434", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-31T07:15:03.497", - "lastModified": "2024-10-31T07:15:03.497", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WPGlobus Translate Options plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.0. This is due to missing or incorrect nonce validation on the on__translate_options_page() function. This makes it possible for unauthenticated attackers to inject malicious web scripts and update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WPGlobus Translate Options para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.2.0 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n on__translate_options_page(). Esto hace posible que atacantes no autenticados inyecten scripts web maliciosos y actualicen la configuraci\u00f3n del complemento a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9446.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9446.json index 8dc5d4d6b8f..a3f45818a32 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9446.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9446.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9446", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-31T07:15:03.740", - "lastModified": "2024-10-31T07:15:03.740", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Simple Anchors Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpanchor shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Simple Anchors Links para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto wpanchor del complemento en todas las versiones hasta la 1.0.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9489.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9489.json index 2f5101b2167..a9b4a026278 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9489.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9489.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9489", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:08.703", - "lastModified": "2024-10-29T22:15:08.703", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted DWG file when parsed in ACAD.exe through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo DWG creado con fines malintencionados, al analizarse en ACAD.exe a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de corrupci\u00f3n de memoria. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9632.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9632.json index 81c7ca8ee3c..37d966bc63e 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9632.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9632.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9632", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-30T08:15:04.830", - "lastModified": "2024-10-30T08:15:04.830", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges." + }, + { + "lang": "es", + "value": " Se encontr\u00f3 un fallo en el servidor X.org. Debido a que el tama\u00f1o de asignaci\u00f3n no se rastrea correctamente en _XkbSetCompatMap, un atacante local podr\u00eda desencadenar una condici\u00f3n de desbordamiento de b\u00fafer a trav\u00e9s de un payload especialmente manipulado, lo que provocar\u00eda una denegaci\u00f3n de servicio o una escalada de privilegios locales en distribuciones donde el servidor X.org se ejecuta con privilegios de root." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9655.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9655.json index 2fc4e0b4ce8..d33a4d5ecb5 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9655.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9655.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9655", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-01T08:15:12.047", - "lastModified": "2024-11-01T08:15:12.047", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9700.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9700.json index 7ff0979e8b7..a856da64085 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9700.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9700.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9700", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-31T06:15:05.350", - "lastModified": "2024-10-31T06:15:05.350", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Forminator Forms \u2013 Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.36.0 via the submit_quizzes() function due to missing validation on the 'entry_id' user controlled key. This makes it possible for unauthenticated attackers to modify other user's quiz submissions." + }, + { + "lang": "es", + "value": "El complemento Forminator Forms \u2013 Contact Form, Payment Form & Custom Form Builder para WordPress es vulnerable a una referencia directa a objetos insegura en todas las versiones hasta la 1.36.0 incluida a trav\u00e9s de la funci\u00f3n submission_quizzes() debido a la falta de validaci\u00f3n en la clave controlada por el usuario 'entry_id'. Esto permite que atacantes no autenticados modifiquen los cuestionarios enviados por otros usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9708.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9708.json index bdf41447176..3e15e32da4e 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9708.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9708.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9708", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-31T03:15:02.737", - "lastModified": "2024-10-31T03:15:02.737", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Easy SVG Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Easy SVG Upload para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 1.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9826.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9826.json index 0936d85396e..b5bdf2cdf9a 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9826.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9826.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9826", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:08.900", - "lastModified": "2024-10-29T22:15:08.900", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted 3DM file when parsed in atf_api.dll through Autodesk AutoCAD can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo 3DM creado con fines malintencionados, cuando se analiza en atf_api.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de tipo Use-After-Free. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9827.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9827.json index eecbf32750f..bb983d48caf 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9827.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9827.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9827", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:09.100", - "lastModified": "2024-10-29T22:15:09.100", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted CATPART file when parsed in CC5Dll.dll through Autodesk AutoCAD can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo CATPART creado con fines malintencionados, cuando se analiza en CC5Dll.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de lectura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9846.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9846.json index 4eeac68dd8a..1cd2c6a2954 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9846.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9846.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9846", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T03:15:04.820", - "lastModified": "2024-10-30T03:15:04.820", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The Enable Shortcodes inside Widgets,Comments and Experts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.0.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": " El complemento Enable Shortcodes inside Widgets,Comments and Experts para WordPress es vulnerable a la ejecuci\u00f3n arbitraria de c\u00f3digos cortos en todas las versiones hasta la 1.0.0 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9884.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9884.json index afef68d0ac4..5caa26d3566 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9884.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9884.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9884", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T03:15:05.067", - "lastModified": "2024-10-30T03:15:05.067", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The T(-) Countdown plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tminus' shortcode in all versions up to, and including, 2.4.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento T(-) Countdown para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'tminus' del complemento en todas las versiones hasta la 2.4.8 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9885.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9885.json index b67c220d23b..c1f5ad1fa84 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9885.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9885.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9885", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T03:15:05.283", - "lastModified": "2024-10-30T03:15:05.283", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Widget or Sidebar Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sidebar' shortcode in all versions up to, and including, 0.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento Widget or Sidebar Shortcode para WordPress es vulnerable a la ejecuci\u00f3n de Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado de la \"barra lateral\" del complemento en todas las versiones hasta la 0.6.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9886.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9886.json index 019a89af933..e094f0c629d 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9886.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9886.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9886", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-30T03:15:05.507", - "lastModified": "2024-10-30T03:15:05.507", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Baidu Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'baidu_map' shortcode in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Baidu Map para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'baidu_map' del complemento en todas las versiones hasta la 1.2.2 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9988.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9988.json index dc23478582a..11ae5b6bbc9 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9988.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9988.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9988", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T17:15:05.227", - "lastModified": "2024-10-29T17:15:05.227", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due to missing validation on the user being supplied in the 'crypto_connect_ajax_process::register' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username." + }, + { + "lang": "es", + "value": " El complemento Crypto para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en versiones hasta la 2.15 incluida. Esto se debe a la falta de validaci\u00f3n del usuario que se proporciona en la funci\u00f3n 'crypto_connect_ajax_process::register'. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al nombre de usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9989.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9989.json index 09c8d74c326..020861ed20c 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9989.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9989.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9989", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T17:15:05.463", - "lastModified": "2024-10-29T17:15:05.463", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due a to limited arbitrary method call to 'crypto_connect_ajax_process::log_in' function in the 'crypto_connect_ajax_process' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username." + }, + { + "lang": "es", + "value": "El complemento Crypto para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en versiones hasta la 2.15 incluida. Esto se debe a una llamada de m\u00e9todo arbitrario limitada a la funci\u00f3n 'crypto_connect_ajax_process::log_in' en la funci\u00f3n 'crypto_connect_ajax_process'. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al nombre de usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9990.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9990.json index 34086a23d45..3ec11dc3d8d 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9990.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9990.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9990", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T17:15:05.707", - "lastModified": "2024-10-29T17:15:05.707", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:35.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Crypto plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.15. This is due to missing nonce validation in the 'crypto_connect_ajax_process::check' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": " El complemento Crypto para WordPress es vulnerable a Cross-Site Request Forgery en versiones hasta la 2.15 incluida. Esto se debe a la falta de validaci\u00f3n de nonce en la funci\u00f3n 'crypto_connect_ajax_process::check'. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9996.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9996.json index 749f8db6ab7..e4da81c290a 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9996.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9996.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9996", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:09.287", - "lastModified": "2024-10-29T22:15:09.287", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted DWG file when parsed in acdb25.dll through Autodesk AutoCAD can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo DWG creado con fines malintencionados, cuando se analiza en acdb25.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9997.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9997.json index 56ab33d92b9..350da0d23ad 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9997.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9997.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9997", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:09.490", - "lastModified": "2024-10-29T22:15:09.490", - "vulnStatus": "Received", + "lastModified": "2024-11-01T12:57:03.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted DWG file when parsed in acdb25.dll through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": " Un archivo DWG creado con fines malintencionados, cuando se analiza en acdb25.dll a trav\u00e9s de Autodesk AutoCAD, puede provocar una vulnerabilidad de corrupci\u00f3n de memoria. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/README.md b/README.md index 2a54208ef65..f48a55b00c7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-01T11:00:19.531042+00:00 +2024-11-01T13:00:21.251545+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-01T10:15:05.103000+00:00 +2024-11-01T12:57:35.843000+00:00 ``` ### Last Data Feed Release @@ -33,25 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -267797 +267800 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `3` -- [CVE-2024-10232](CVE-2024/CVE-2024-102xx/CVE-2024-10232.json) (`2024-11-01T10:15:03.080`) -- [CVE-2024-10651](CVE-2024/CVE-2024-106xx/CVE-2024-10651.json) (`2024-11-01T10:15:04.600`) -- [CVE-2024-10652](CVE-2024/CVE-2024-106xx/CVE-2024-10652.json) (`2024-11-01T10:15:04.877`) -- [CVE-2024-10653](CVE-2024/CVE-2024-106xx/CVE-2024-10653.json) (`2024-11-01T10:15:05.103`) +- [CVE-2024-10367](CVE-2024/CVE-2024-103xx/CVE-2024-10367.json) (`2024-11-01T11:15:12.130`) +- [CVE-2024-10654](CVE-2024/CVE-2024-106xx/CVE-2024-10654.json) (`2024-11-01T12:15:03.077`) +- [CVE-2024-7456](CVE-2024/CVE-2024-74xx/CVE-2024-7456.json) (`2024-11-01T12:15:03.557`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `256` -- [CVE-2023-6942](CVE-2023/CVE-2023-69xx/CVE-2023-6942.json) (`2024-11-01T09:15:03.067`) -- [CVE-2023-6943](CVE-2023/CVE-2023-69xx/CVE-2023-6943.json) (`2024-11-01T09:15:03.837`) +- [CVE-2024-8924](CVE-2024/CVE-2024-89xx/CVE-2024-8924.json) (`2024-11-01T12:57:35.843`) +- [CVE-2024-8934](CVE-2024/CVE-2024-89xx/CVE-2024-8934.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9110](CVE-2024/CVE-2024-91xx/CVE-2024-9110.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9165](CVE-2024/CVE-2024-91xx/CVE-2024-9165.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9388](CVE-2024/CVE-2024-93xx/CVE-2024-9388.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9419](CVE-2024/CVE-2024-94xx/CVE-2024-9419.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9430](CVE-2024/CVE-2024-94xx/CVE-2024-9430.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9434](CVE-2024/CVE-2024-94xx/CVE-2024-9434.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9446](CVE-2024/CVE-2024-94xx/CVE-2024-9446.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9489](CVE-2024/CVE-2024-94xx/CVE-2024-9489.json) (`2024-11-01T12:57:35.843`) +- [CVE-2024-9632](CVE-2024/CVE-2024-96xx/CVE-2024-9632.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9655](CVE-2024/CVE-2024-96xx/CVE-2024-9655.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9700](CVE-2024/CVE-2024-97xx/CVE-2024-9700.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9708](CVE-2024/CVE-2024-97xx/CVE-2024-9708.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9826](CVE-2024/CVE-2024-98xx/CVE-2024-9826.json) (`2024-11-01T12:57:35.843`) +- [CVE-2024-9827](CVE-2024/CVE-2024-98xx/CVE-2024-9827.json) (`2024-11-01T12:57:35.843`) +- [CVE-2024-9846](CVE-2024/CVE-2024-98xx/CVE-2024-9846.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9884](CVE-2024/CVE-2024-98xx/CVE-2024-9884.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9885](CVE-2024/CVE-2024-98xx/CVE-2024-9885.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9886](CVE-2024/CVE-2024-98xx/CVE-2024-9886.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9988](CVE-2024/CVE-2024-99xx/CVE-2024-9988.json) (`2024-11-01T12:57:35.843`) +- [CVE-2024-9989](CVE-2024/CVE-2024-99xx/CVE-2024-9989.json) (`2024-11-01T12:57:35.843`) +- [CVE-2024-9990](CVE-2024/CVE-2024-99xx/CVE-2024-9990.json) (`2024-11-01T12:57:35.843`) +- [CVE-2024-9996](CVE-2024/CVE-2024-99xx/CVE-2024-9996.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9997](CVE-2024/CVE-2024-99xx/CVE-2024-9997.json) (`2024-11-01T12:57:03.417`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 8d138013b54..477e9365795 100644 --- a/_state.csv +++ b/_state.csv @@ -138411,7 +138411,7 @@ CVE-2019-25215,0,0,e894585b718ba6ffd4c4fb2559e624b9ffb182a68ef25ae0e57369eba12bd CVE-2019-25216,0,0,4deb2b163c53c3da84ce16e745f05ec6e2891bf0f3544a26c07ca5c280831bcc,2024-10-16T16:38:14.557000 CVE-2019-25217,0,0,30c2571b4837240b6da6c51001318f4e94ce56e8b309a54c15bcaa6ac6286204,2024-10-16T16:38:14.557000 CVE-2019-25218,0,0,21c49c97c651fc97c66cf571583cc6d3b9dbe9aac07bb039252027c58d0caa37,2024-10-30T21:18:08.167000 -CVE-2019-25219,0,0,5a9c6fd8137a5395bbebfd600a3c9429c55154de7ddd9a4e7ecf893f26288516,2024-10-30T16:35:01.230000 +CVE-2019-25219,0,1,c0661fefcab12f624a8e90ae1fecb5c0217e7a2ecb68ecb3cfdaf3aa46c317ec,2024-11-01T12:57:35.843000 CVE-2019-2522,0,0,438e5228ba492857a388b8016b2219394ce3508b8a36f1f8aede8ea3eeec2072,2020-08-24T17:37:01.140000 CVE-2019-2523,0,0,4a0e4915f05e6fa4b1849fafb208e6fb024214d6840b1c8202b1873b064ed383,2020-08-24T17:37:01.140000 CVE-2019-2524,0,0,bee2c79f8df3b71e86ab52db9d5dee51c63979ccd70534be30c64d8fa54a9384,2020-08-24T17:37:01.140000 @@ -238811,8 +238811,8 @@ CVE-2023-52040,0,0,762939d11515580f100465151a16fe161b0f305136b11d8c988a24ca3b912 CVE-2023-52041,0,0,d822171150327a12062651891084a07154ed2e15efb3b51e285b66f24f49d7e8,2024-01-19T20:39:37.587000 CVE-2023-52042,0,0,d63c4bc544afb86a58bb15680099cbb76d2fb1c561f2e9993a893dae4d480107,2024-08-30T19:35:04.953000 CVE-2023-52043,0,0,2598b3da2f921eccbd3a41321ff24953e0fd67e0dc8e0987c81c7b871cbfaaa7,2024-09-06T17:35:03.427000 -CVE-2023-52044,0,0,7aa317278ff2994366571ddbcb030926a3e9d6311257c49404418e0c4b474d29,2024-10-31T19:15:12.347000 -CVE-2023-52045,0,0,9c9e6d02e7b026eab5e1d09490bba1de7042dd5d02a944639d1c3f465bd37801,2024-10-31T19:15:12.450000 +CVE-2023-52044,0,1,c442ea43c4a6943e1852c8f10494b1af7bf88c3e79ef42d325a737ce18382a88,2024-11-01T12:57:03.417000 +CVE-2023-52045,0,1,2c0803a37a2bf73d043d0b2cd853122a6bde5fa71fe726d313132267dc54d68c,2024-11-01T12:57:03.417000 CVE-2023-52046,0,0,9b8f5c0f61db55c891d556798c9c9da378945fb25af6cd3feea31d7ec4cb7ccf,2024-02-13T16:05:49.580000 CVE-2023-52047,0,0,0a58a1c6d75330480a1c8c9c493c63f296c64ed482e86c7d753ecc6c013c567f,2024-08-13T20:35:05.050000 CVE-2023-52048,0,0,e51406b0a7e0f54ab5f0d8fcca043edf25903f6ec066c183786088e2dc13a5e3,2024-02-29T13:49:47.277000 @@ -238820,7 +238820,7 @@ CVE-2023-5205,0,0,b69f37089db22b12f4214cc9f8a6664b76f8ae791614a71f308741a98961cc CVE-2023-52059,0,0,0016757ad0c8c5e292c8d6de754d386680126fb24aa8899c4ed395170c5f6803,2024-10-04T16:51:20.313000 CVE-2023-52060,0,0,10d04b0fb69a380e5645fa0ec83c2959fc511b0d1bd5963b639f55d35d913fd4,2024-10-03T19:58:19.037000 CVE-2023-52064,0,0,2e6eacf3122e193934b8e5026ba3d667018aabe2b15f00e378d2dd371a1d173e,2024-01-17T21:08:45.903000 -CVE-2023-52066,0,0,c648a4ec1c5ef225a80dff8132425ff2dc4ae3938a2384616d9f54ba31e39332,2024-10-30T21:15:14 +CVE-2023-52066,0,1,c3c376ef25a28f3060a98d8a1f7c83c541c51ed63014fbbdcc1f8157e8855b14,2024-11-01T12:57:03.417000 CVE-2023-52068,0,0,9738fbe2996c9d736286f8e78dfc9c20ccebb2ce66b7bbc56f1565006d5c4c29,2024-01-22T19:53:08.497000 CVE-2023-52069,0,0,ad23cadb3859f85a66031ccd7a898a641dcf7c2393a905b66159386dbb4d3689,2024-01-23T21:41:02.097000 CVE-2023-5207,0,0,27de1d00636be1f83fc1921e6c08668bf71abfdb23dc6eb68c14d9a95ba3c956,2024-10-03T07:15:23.347000 @@ -240144,7 +240144,7 @@ CVE-2023-5812,0,0,4574994fad5fc8adf8973438c394722f96f6011ae4790ce56c0fd06c977858 CVE-2023-5813,0,0,93b6b31c7ba02e3fd393040f54983c5b40f9009771b580feacfa12ef95641b11,2024-05-17T02:33:19.730000 CVE-2023-5814,0,0,9244fc7bd6855dc1490ac1430f496e34117935a90c9798c5ab2d28932e509bb3,2024-05-17T02:33:19.837000 CVE-2023-5815,0,0,defbb5df33ca806dbebb6606fd88458847ce0bcf3a5ef6c7d974da18bd26609d,2023-11-29T19:15:40.353000 -CVE-2023-5816,0,0,42f98d95bddfad7d36458aa6812dcaa60af44a517e282489aa2608b95063f49c,2024-10-30T03:15:03.090000 +CVE-2023-5816,0,1,66f582273d7c3cad622b94892551744bd4321bd642debc9fa30300c265230ccd,2024-11-01T12:57:03.417000 CVE-2023-5817,0,0,00c66bc0b6d0a953b3d2afbc6f7fd9f3524090fbae0f380848cb5690ac6f4dae,2023-11-07T21:16:59.943000 CVE-2023-5818,0,0,6a5ffd8673156ac79a2d58f03f35c20465bc4b549e34561533ec3670cca05fa6,2023-11-15T15:38:21.693000 CVE-2023-5819,0,0,14ae9d8f0c3976c72e001ddb723606877cb5966a66cb8e428e779c8e71f422d2,2023-11-15T15:38:07.557000 @@ -241144,8 +241144,8 @@ CVE-2023-6938,0,0,11f80052b936c04b9e187c3b789917daa425ce7825b2d97a007c8789d5c880 CVE-2023-6939,0,0,2170380787311a69988ea99fc8c330e3c06fd6984ac65df2b46bcfe4a9228a04,2024-01-05T16:07:36.623000 CVE-2023-6940,0,0,493881701dcc8fc97ee3d5ebe7c0e0a9f858a0655fb1ba83e833896ba45009d6,2023-12-29T16:58:04.290000 CVE-2023-6941,0,0,c9be07ef3de50232aec1e099fa7bd8488a030b429a8a0b5beb0f3ee1763b1559,2024-01-19T19:34:11.820000 -CVE-2023-6942,0,1,f478deb6c2162412c06c372ac0b7e6b1c92c09fe3ab026b82f90eefa775c50ce,2024-11-01T09:15:03.067000 -CVE-2023-6943,0,1,1a8a3b81e8d8731b7ee3a07f3dcf56fb695f520d19c115b4e798870b26d955d4,2024-11-01T09:15:03.837000 +CVE-2023-6942,0,0,f478deb6c2162412c06c372ac0b7e6b1c92c09fe3ab026b82f90eefa775c50ce,2024-11-01T09:15:03.067000 +CVE-2023-6943,0,0,1a8a3b81e8d8731b7ee3a07f3dcf56fb695f520d19c115b4e798870b26d955d4,2024-11-01T09:15:03.837000 CVE-2023-6944,0,0,b5d2d87fcb2c2ce3c8396de2080c9963aeb1e9a189e97ae4f9bb82eab217349c,2024-02-04T20:15:46.650000 CVE-2023-6945,0,0,4d4e197e57ce0c0a12a32b3d201450bb49cb1ee7fc52a5178125c8abda73fdea,2024-05-17T02:34:01.610000 CVE-2023-6946,0,0,0fb93ff65377878fd63e0701dc37881508b51e13c75cd51aae76c0d1bace0216,2024-02-03T00:24:34.007000 @@ -241543,8 +241543,8 @@ CVE-2024-0101,0,0,6c543091c34f4a748deb2ce2cce2816a258ea3dcb0e0560ed0bed55e86ee09 CVE-2024-0102,0,0,aac583927adc7db5e6a95a28a1f19367ab609db53a34bc65219a25c1bce42b64,2024-09-16T19:37:37.487000 CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf05,2024-06-17T12:43:31.090000 CVE-2024-0104,0,0,ea7f385fc9a8d99548e260cd2bb85f1591e8d85d5187529e2ca94577bba79fd1,2024-09-11T17:40:35.430000 -CVE-2024-0105,0,0,60fd17b4603518f02d825b743a7f2e8102175b79226f47cc38be34ef2d2a380e,2024-11-01T06:15:12.397000 -CVE-2024-0106,0,0,9729fc8649cbf920c9730e34e1ceb5586c73e24a7b31152ef501cc9836de7ac5,2024-11-01T06:15:12.883000 +CVE-2024-0105,0,1,cce9e2f103bec09a2d31121c0f1d48e620d7a6c8f6113fa3cf5900488ee9f9f4,2024-11-01T12:57:03.417000 +CVE-2024-0106,0,1,f8c44d268dd9e8e1e9deec634292fcea0dcd1ecc62e186568f74c2f8dc08695a,2024-11-01T12:57:03.417000 CVE-2024-0107,0,0,825deb4e82dfaf0b98f1fe2772df92223b06ae0e932511c6a748f272f8b997c9,2024-09-17T12:10:22.063000 CVE-2024-0108,0,0,66f975a41bb5f0143618b7229f9a8d90fdad314725e86f6c633b765a762e46f3,2024-09-16T19:27:19.833000 CVE-2024-0109,0,0,e71ce20ade0f58519f6e876bddeb521bd39d5584f365e91fb0be43461eeae6aa,2024-09-18T15:18:06.117000 @@ -242357,8 +242357,8 @@ CVE-2024-10000,0,0,2dc410e1583cc50e0eec03ed76e09a77a8842fe67c7d9b7ac5bcf33a5d12b CVE-2024-10002,0,0,b8ac1697c0b5dbe076b29d09227535990b771bd408babdf1ec6b4eb8a74fb84f,2024-10-25T21:20:39.167000 CVE-2024-10003,0,0,ef2c3c73bdb9c4390d998f61684e3cffa9d7cb4391873d2339bfd0892ebc38b9,2024-10-25T21:19:19.743000 CVE-2024-10004,0,0,2b01ad1fe33b0387cc6ecf8ca605118100ba1eac830a494972582a4b13530ed3,2024-10-16T20:35:08.850000 -CVE-2024-10005,0,0,edc61f85efb2c8ee64387b76d5c546dece648df13dcc74817469000b9a7891d7,2024-10-30T22:15:02.820000 -CVE-2024-10006,0,0,e193bbe62705517413add9f46932ae47565190d15584232aba3c35cec94eea67,2024-10-30T22:15:03.063000 +CVE-2024-10005,0,1,994151234745b865e98f1c59b1ec5c9d24ab3ed639b70dbd6289a610481e7f9a,2024-11-01T12:57:03.417000 +CVE-2024-10006,0,1,18cfd5ef2071f0d6f792ad9964a72fcc3b1008a3d47db75b247fd60b26169623,2024-11-01T12:57:03.417000 CVE-2024-10008,0,0,93a7056d3eedb0f45bdd1f80f18e9d31f27172cc24baaadb6be41dc083092214,2024-10-29T14:34:04.427000 CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9b0,2024-05-17T02:35:08.903000 CVE-2024-10011,0,0,b82cad7a266ac941493a6589c7af0eff273fe2e36d28fba66b1420614eed8185,2024-10-25T12:56:07.750000 @@ -242395,7 +242395,7 @@ CVE-2024-10078,0,0,2a32e11049e01066fde7387ca375ea057ecc9dffb9aee4dba521fe1d1cadf CVE-2024-10079,0,0,373e7888db951070e423ef6d1503b855c013868b3575c214d882cd52c4cf0816,2024-10-22T16:27:54.577000 CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000 CVE-2024-10080,0,0,e70a3cc8d8ca25d9e3db818c04f9b2eeee833bf342884de7579048a734fce30e,2024-10-22T16:27:38.840000 -CVE-2024-10086,0,0,02234af99fdc1911b188ceddac114997f3c47adcf02ae0d2c6fa25f2f241c68d,2024-10-30T22:15:03.283000 +CVE-2024-10086,0,1,55dbd034cc5bcfc72ef61558769b28af129c045d8e5e80d55b2abd4a355e138e,2024-11-01T12:57:03.417000 CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e3b,2024-05-17T02:35:09.780000 CVE-2024-10091,0,0,d0b808b13e4ac8a1cdb029b434d2f58c9a91ce65332255a3523a2d40d54e2bbc,2024-10-28T13:58:09.230000 CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfbb94,2024-10-28T13:58:09.230000 @@ -242404,7 +242404,7 @@ CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615a CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000 CVE-2024-10100,0,0,551af785b2583dfc00dd65a689907bc427d5051278643ae24a3a0c57fb4f9ff3,2024-10-18T12:52:33.507000 CVE-2024-10101,0,0,1d42831444f093da17057d1135157fc2c61373ed2c6e3aa4b33071a4d1f4b2d6,2024-10-18T12:52:33.507000 -CVE-2024-10108,0,0,60cf1d8a2677ff5ed5eb402c116ee733cd75eb79d94d0dc51d989dd05bb2bf47,2024-10-30T07:15:13.887000 +CVE-2024-10108,0,1,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000 CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000 CVE-2024-10112,0,0,3a01d2baa33f19e143abe5aabe181ccab32faac99effca8d7325142fe7220a64,2024-10-25T12:56:07.750000 CVE-2024-10115,0,0,2f48f8fc2fb64e7eea0f8a197e6ea039f4addb791184326175f5bf3196ca43c6,2024-10-18T19:15:13.600000 @@ -242481,15 +242481,15 @@ CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bf CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000 CVE-2024-10214,0,0,387761b00ca263850d15f9fc0085dd195781994f66bd9edc33fb8fef62fe7001,2024-10-29T14:34:50.257000 CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000 -CVE-2024-10223,0,0,cd865517b4f8a8ffc796b342e05a7bf08eca094f8bc12d9402375b35b3f2f4c9,2024-10-30T07:15:15.487000 +CVE-2024-10223,0,1,237ebcbe1a44551c4c262c272427d3817a64977114a9e921cdeb1f7ff3ea65fd,2024-11-01T12:57:03.417000 CVE-2024-10226,0,0,6d4cd561e79cc1ca7a5d9390efd20e7ca0cce098a56a2c4eb01cd0ded7623cbf,2024-10-31T16:48:41.553000 CVE-2024-10227,0,0,3dd5e64d31c98828e85e7c30a2d118d04e1c9c4e3f27cb753e16556963759a42,2024-10-29T14:34:04.427000 -CVE-2024-10228,0,0,ce55209329b0533b27c51280a78a7bfde62501c7788cd18c1e4ff9adf65e277d,2024-10-29T22:15:03.220000 +CVE-2024-10228,0,1,54a293a54498550442256f431c970303b3c29e13476f82cb59860e70b4078f4e,2024-11-01T12:57:35.843000 CVE-2024-10229,0,0,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca533b,2024-10-25T17:04:54.080000 CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000 CVE-2024-10230,0,0,5b2eed7a3522d994daba36d504e121d06d38d6b2f8f6bed6dcdcf2e92eeba1bb,2024-10-31T08:35:03.010000 CVE-2024-10231,0,0,eb0443e51721212742591278ce3f179ecbfdd0bb144d3d1886157523275588e9,2024-10-25T17:01:55.633000 -CVE-2024-10232,1,1,436142ee172e51f4e3c620c7329dbf0e506996a8dbcdae4a86e8608acaa883f7,2024-11-01T10:15:03.080000 +CVE-2024-10232,0,1,d054c4d1183fe7691dd9a4e63b1aec9db3ebb5d59eabdf67dbc07306ca037c57,2024-11-01T12:57:03.417000 CVE-2024-10233,0,0,ae75a6902cbd361dba7f0db59261b7e58fb8ced87e17031187e0bfd405b07086,2024-10-29T14:34:04.427000 CVE-2024-10234,0,0,29441fe4cd8bfbe6b6cb2ad55d7c2d2c9161b1369f9e713c11aec1dfec3e0850,2024-10-30T18:50:59.883000 CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000 @@ -242530,7 +242530,7 @@ CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf739 CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000 CVE-2024-10327,0,0,5a1546502e73211d148718e818d15cec9bc5841df26bde254740ef77c9d65b28,2024-10-25T12:56:07.750000 CVE-2024-1033,0,0,6041b3ccd70df4052a8c26438331689f702c93b37a47aeb2d707df9d77ed7f49,2024-05-17T02:35:12.047000 -CVE-2024-10331,0,0,7db3978f3af331926e6dbc0b348677f0ce3ba5cec6100247fa9b9851e74301d0,2024-10-25T12:56:07.750000 +CVE-2024-10331,0,1,8955cbea1b460da51772063a21c4a8ae248c07cd894909a91739eb11b6fd05d7,2024-11-01T12:41:51.470000 CVE-2024-10332,0,0,f5b2f39a2af4e4ca43edc3fb818fd22985b528866227753e69ec49cca9bc6022,2024-10-25T12:56:07.750000 CVE-2024-10335,0,0,659f6e0620614d6588fd07e5309387fdf4ea7eb7c67174683fd34316e7f3ed98,2024-10-28T15:58:13.240000 CVE-2024-10336,0,0,b6057cbdc37a7025d457bb6b96b11680d6106aa7de8d96644974542e84807905,2024-10-28T16:01:58.393000 @@ -242551,6 +242551,7 @@ CVE-2024-10355,0,0,2602c2076153349e7adf5f2683fe39bdc0cb3abdcbf15a26de13daaf9ad9d CVE-2024-10357,0,0,c001d8d64b65c4e55da5d7861409d0c563d6d1b141b88d9a7700fd93b48c7a3c,2024-10-28T13:58:09.230000 CVE-2024-1036,0,0,aa65a53beadc56e4dda3efe9acb5802f242935c19973e66e0ff7f62d01b276fd,2024-05-17T02:35:12.357000 CVE-2024-10360,0,0,3576dc079f058e2dd67b489fd947e85df4509a4862ebce17e71112c47cb76c6c,2024-10-29T14:34:04.427000 +CVE-2024-10367,1,1,f94e0205b3e2911f09f101b8fd32b52728d2ea656c27463b12aaaae3408f1e01,2024-11-01T12:57:03.417000 CVE-2024-10368,0,0,c8e0d6969c93ffe96acf5e0ee7b5c26394eeb4c801dc04ebad8a62cf1ce3fd82,2024-10-30T16:46:30.783000 CVE-2024-10369,0,0,5a59dc320150c27565cde3d9105528beaf16a536e1981e9f54165bf31963ac02,2024-10-30T16:50:32.567000 CVE-2024-1037,0,0,dc80ea945a1c7339fa73e61584161c3f0eb5c7e682984c3146b230e695ed7de9,2024-02-14T19:09:45.253000 @@ -242568,8 +242569,8 @@ CVE-2024-10381,0,0,63addd0f8191b1c4cfb4d8f0e97d60f16153f091ecece1db9c0d0bcf5f835 CVE-2024-10386,0,0,2f19951219ebf285623df88c007e35e2ba1a621ceccb3eda9a0f05f4aa7fff04,2024-10-28T13:58:09.230000 CVE-2024-10387,0,0,12b5ab9fc09cd164a10e40d20079f8a9e53a7fb87af2edbf444782194d8bf238,2024-10-28T13:58:09.230000 CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000 -CVE-2024-10392,0,0,65e1eee6207079d9eea89d0cef1fa0def22f0de8aefb921b887acdf56d76f926,2024-10-31T06:15:04.400000 -CVE-2024-10399,0,0,3c13bf7b23d522cba49f5224e24deb0565a230127f5b18eab9623dc9093a9ec0,2024-10-30T06:15:14.763000 +CVE-2024-10392,0,1,6e1e37299a52c0d29351f7b918b5ce63e7a851a7204714ad635a0d36b7f4f628,2024-11-01T12:57:03.417000 +CVE-2024-10399,0,1,3874273dcd61d00780364abd4b80bff26291db4f2fcc766c950b26117fafe39a,2024-11-01T12:57:03.417000 CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000 CVE-2024-10402,0,0,2443718b847d5ad0a7e8e6883b9aca46725ab83d65a53ced89e927dfa1ec15f4,2024-10-28T13:58:09.230000 CVE-2024-10406,0,0,f8d1d6248605ffe4053f9b52a61613e02e78b8c0be64963fa210f6d8ad819ef9,2024-10-29T20:48:36.967000 @@ -242616,10 +242617,10 @@ CVE-2024-10447,0,0,20a77c16977cd86421b31dc7f8e87f37efdc79e51d4f78a901539c52dec6a CVE-2024-10448,0,0,8592ee07b49e81610af100bc63f005e0b694650efb1b3544bc63d15b3705903e,2024-10-29T14:34:50.257000 CVE-2024-10449,0,0,8607f328e6ad15d8ca267c31a328033a0fcda88d731c3cb315537e91214fb44b,2024-10-31T12:47:08.810000 CVE-2024-10450,0,0,173344ccdd09f6157ee138e9e87d5e1e2468de9e6dcf03f6fb5d2387fc884b09,2024-10-29T14:34:50.257000 -CVE-2024-10452,0,0,b9c0cdbb1129f4d2a683c96007a5a37f3de5a0f61940081281473b366238480a,2024-10-29T16:15:04.593000 -CVE-2024-10454,0,0,00a532df7fc763ef532ba53fc65d3c8c542dd62967499eae25b9ca1ff4ccf09a,2024-10-31T13:15:14.580000 +CVE-2024-10452,0,1,f8de33384136fc07838158b10f48e0245a2ed752dbc1c5095ef19c964db1267b,2024-11-01T12:57:35.843000 +CVE-2024-10454,0,1,52aabb7e4033c13d6c0cbb6c18bbcbf12ecd563307e135d1c792e1d8c4be1291,2024-11-01T12:57:03.417000 CVE-2024-10455,0,0,9f18b197c1829a5ecbaa5a69cd0dd4162e3d6f6c6818ccd45083d33b92cd8ac7,2024-10-29T14:34:50.257000 -CVE-2024-10456,0,0,4e8313f83dd74eaf01a85b0e2c8241c892546e7f6f740c8d60482cb697257f25,2024-10-30T18:15:05.123000 +CVE-2024-10456,0,1,4a9ecb31f2661ae18403e7eb3623dabef12268f04b4de73b98309d52aed70779,2024-11-01T12:57:03.417000 CVE-2024-10458,0,0,74ca3b5ff0d83b1a9172f91e6aeac1c2c334f5a37d9d050a2b4a8dbda73ae0a5,2024-10-31T18:35:04.080000 CVE-2024-10459,0,0,41e5d3d1c5717bfbf938efdb318a0912b0d67ff5e837610ea3b33ef2a35c4dbe,2024-10-31T18:35:04.883000 CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000 @@ -242639,68 +242640,69 @@ CVE-2024-10477,0,0,ec5d3377a9eba885093e83f0ffc2c5214a9fc83d05d2bcf419cfa0429899b CVE-2024-10478,0,0,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46091,2024-10-29T14:34:04.427000 CVE-2024-10479,0,0,2cf095341510f03aced116cfbd158587751b5caab0b78f9cc79bac97953009f3,2024-10-29T14:34:04.427000 CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000 -CVE-2024-10487,0,0,afd74b0a34323c60dbd4f535b3b82532f3b5a0affd95989cc244517ea9d5ec96,2024-10-31T14:35:04.283000 -CVE-2024-10488,0,0,69038bbef0b99288e3361fe760223b169ea77142f6a0f65d45c3c8314e4211a0,2024-10-31T14:35:04.517000 +CVE-2024-10487,0,1,78655a991e24aa9dd082cd3faff3773a1cc1b0ed3ddfc55ae09b7e96ee30ac89,2024-11-01T12:57:35.843000 +CVE-2024-10488,0,1,045961a4da52daca0a2cd9eefa7cb2efdc030f8f660cedb82c9b820a312a0393,2024-11-01T12:57:35.843000 CVE-2024-1049,0,0,bd86fa3ef2f3a9c880f8a662bf41f8b013cc8d0ec2ff1efa897f3a7402b5b977,2024-03-25T01:51:01.223000 -CVE-2024-10491,0,0,bcf9eb04580934858978db75a48b33b2b8a0e47c12b6f521cfeb7a488154906e,2024-10-29T17:15:03.853000 +CVE-2024-10491,0,1,f33441d6c92d87ca16910a8323bc5e8a639fd467cfc850f84d7cafae4ac660c2,2024-11-01T12:57:35.843000 CVE-2024-1050,0,0,f9f89980ca3ef0ce2f5e1044207260b8a92a6effafa867ba6315fdcbfcd0b749,2024-05-06T12:44:56.377000 -CVE-2024-10500,0,0,81d535dbac4df1837877526cfdf7548c2eaa3351dc6d64106701c6037a0c7933,2024-10-30T01:15:02.803000 -CVE-2024-10501,0,0,292e0c63886751f2ccd49ef4c3d140301e1a7cbb898ebc15583b8b8e00402acf,2024-10-30T01:15:03.107000 -CVE-2024-10502,0,0,d6ffb011626f1c1dbbc8d4622abdedb7e203e8935c0db5d35bf55464e9cbd02d,2024-10-30T01:15:03.377000 -CVE-2024-10503,0,0,53bb49dade9742e3a0f1152f6578f325c27b8ddb13655063a5f4afecc489b9c5,2024-10-30T01:15:03.653000 -CVE-2024-10505,0,0,6d6e100b25c60406edea8f47c5d2549af8d11bf1c28e0482a6a4b39d84219591,2024-10-30T02:15:02.430000 -CVE-2024-10506,0,0,b6bcdd833738fb873edd61b4251e2f14923ebc95b84b24021d0301b0654d76fd,2024-10-30T03:15:03.490000 -CVE-2024-10507,0,0,f0d511f24f84b9e0af273e44e1eadb29e82d53fc80607d0bb45b0fad15f5c994,2024-10-30T03:15:03.777000 -CVE-2024-10509,0,0,a617a52391f6a05c8db7614b66d9896a1a6ac7734326993025e7a689a1eda8b8,2024-10-30T03:15:04.060000 +CVE-2024-10500,0,1,1a646089972ee7f6dff6d6e89f1d1a4a084051228e6ad6bbff84e72fd4493e2e,2024-11-01T12:57:03.417000 +CVE-2024-10501,0,1,a70901ebbe857107cb9bb8409a7ad0d1b2c691f80c6c857ec50d4420c6cf347f,2024-11-01T12:57:03.417000 +CVE-2024-10502,0,1,fce601075c201d64c89f4f21bd8a6e3aff01db0b1bb576e35393eb137d39e4fe,2024-11-01T12:57:03.417000 +CVE-2024-10503,0,1,d0938dc9dfcbd9b6af1dd5f7544d5c3c05248ffab7bb7a1061cb91ee8b65adf9,2024-11-01T12:57:03.417000 +CVE-2024-10505,0,1,b91e9eb2c9848979410a6c15281b48953dbd97e6906a5086a21271c2bdea80d1,2024-11-01T12:57:03.417000 +CVE-2024-10506,0,1,779ddda6fb59b285d006c174b0335ff88045953b886a0040b9c46c6375acfc3f,2024-11-01T12:57:03.417000 +CVE-2024-10507,0,1,18e22ae2d57c66f0ad77c1d6593d7aee514c678b3e74cb548851fdcaf5ed4cb2,2024-11-01T12:57:03.417000 +CVE-2024-10509,0,1,5d174170fc6707ead8a906efccd17761b5398b7c1da5f7cf9343ecd2157f9c68,2024-11-01T12:57:03.417000 CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000 CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000 -CVE-2024-10525,0,0,5ea4ebaf6df994634f638a9ead85168c676c2e7c42eff7d25f47d3c19a1b9c9f,2024-10-31T10:15:03.133000 +CVE-2024-10525,0,1,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000 CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000 CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000 -CVE-2024-10544,0,0,239e9ea296ac3b479a8dae68cc6a42a8d11e1ec00ae1acc9ec57259d367c9da2,2024-10-31T02:15:03.080000 -CVE-2024-10546,0,0,c573da975f0d4e89e31d16998c7390fafcc8c0c55569fb0e69f9382dd232eb2e,2024-10-30T20:15:03.700000 +CVE-2024-10544,0,1,d84fa7aeaabdc2cfe5861efef74c5b30022ed51487865228c56366868169c4d7,2024-11-01T12:57:03.417000 +CVE-2024-10546,0,1,fe7c4bb80388357d2012de9abcf9bdb2510a4d8644b958f5e63299c9a417e4c8,2024-11-01T12:57:03.417000 CVE-2024-1055,0,0,ccc78f7d4bd63bcc448b5e62f7789de0e1a26ab036272b89eca521cba41a35e3,2024-02-14T18:59:33.780000 -CVE-2024-10556,0,0,61840ed637cbf1436634f6b358e80b28884f5ce56c38c4e75a11a9a8be92a2b2,2024-10-31T01:15:14.253000 -CVE-2024-10557,0,0,9a3a7264964edd46e0e86bc730435097e32b83a7bb59bc586db5f6b654bd7f67,2024-10-31T01:15:14.527000 -CVE-2024-10559,0,0,b15c5cef48b19793cc135dcefcd31a7ae1cf1d0b293c280fd67bc092c8b807ad,2024-10-31T02:15:03.370000 +CVE-2024-10556,0,1,f1b81be6983477c6d73a86635456da616ba2678b2a6ae2a2295373ebbcc4f1ac,2024-11-01T12:57:03.417000 +CVE-2024-10557,0,1,63bb163e8fb4b88e8710c1dd9683dbf18b96165e07411de35dcb669353981ba2,2024-11-01T12:57:03.417000 +CVE-2024-10559,0,1,8afe9350f28b84b28a2323608291668a50470fb8d0f5a33b958a978a46e81603,2024-11-01T12:57:03.417000 CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000 -CVE-2024-10561,0,0,adc1b5788a7e287d410d5756cb2c8086d994832c36b5729249aa613428559544,2024-10-31T02:15:03.680000 +CVE-2024-10561,0,1,a5546a4a2e8e33bb90afbc32c886c9a21958fa6b3a84abd94488c23a626bd54e,2024-11-01T12:57:03.417000 CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000 -CVE-2024-10573,0,0,b38ef3f6c3eadff638aac2b1e2e94dea1b67cb67b399073de7c8b41bfb551c32,2024-10-31T19:15:12.540000 +CVE-2024-10573,0,1,3b6082d7ce34ca05df1b3b4c94e7ffded318d61beedf6254adcd998de3bb698a,2024-11-01T12:57:03.417000 CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000 CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000 -CVE-2024-10594,0,0,b4f1fb29c5afe6af171160e5cc65bdd1200faadbec6a5137635be1dd3e1bc4bb,2024-10-31T21:15:14.990000 -CVE-2024-10595,0,0,2c72b19db86abaf6645cfc895e5a8fcf945fde99576d8acc26b7572d7e8e711a,2024-10-31T21:15:15.387000 -CVE-2024-10596,0,0,d5e9bc732fabeccdf454849939a8f5227fcd4ec4a195d0748f0f61b783871014,2024-10-31T21:15:15.647000 -CVE-2024-10597,0,0,e5c082b349a51a1b6f0ee07ba6030bc60245ddd1b7e068b73a97bdc4429987b8,2024-10-31T21:15:15.893000 -CVE-2024-10598,0,0,c44377b1077988455a06c0b4e2acbae274518924cc0ed44dd3e440b21fcc1734,2024-10-31T22:15:02.960000 -CVE-2024-10599,0,0,763b8efbfd0c5d284ab90275072b60fcec14f32211193fad12ef4d7af1c43894,2024-10-31T22:15:03.267000 +CVE-2024-10594,0,1,9f73b176d1fdcc28ef57fb338558f792090b1198ca431d11760ef627589079ea,2024-11-01T12:57:03.417000 +CVE-2024-10595,0,1,0a88689ef7c32a3d4e0d8655f08f243a0382909f18407bf0e0523c39f7ac847c,2024-11-01T12:57:03.417000 +CVE-2024-10596,0,1,89ac2005acfd3d8d41d0e2b8aafe285ef55fcb6b50ff7e1417f316fc9317c4a3,2024-11-01T12:57:03.417000 +CVE-2024-10597,0,1,ec144bfd42b6ee158eff368d4debef5de7c0bf99a868e7f6dbbe8e6a0cc8cee7,2024-11-01T12:57:03.417000 +CVE-2024-10598,0,1,9d876052f05d649da92bd88d359dc9871e5ab4bca9b13c74f9bd5ee238ebd63b,2024-11-01T12:57:03.417000 +CVE-2024-10599,0,1,a7bd2c060c620f474205c0a2cbcf4815069e0be4503658dbb71f1f7dd211b954,2024-11-01T12:57:03.417000 CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000 -CVE-2024-10600,0,0,1bea1a7b10b438194688009d120bfd1ff9709bd75db4bcc5ccc94bf8e5f334ed,2024-10-31T23:15:12.067000 -CVE-2024-10601,0,0,7b8255e9af3488a6a39c1d0a5dfdeb386957e032065b46d4068072fbb9667706,2024-10-31T23:15:12.343000 -CVE-2024-10602,0,0,96d2ae9bab76099abc9d680c159fbb5dc171ea7c8d49aec28979a944835cde6f,2024-11-01T00:15:02.973000 -CVE-2024-10605,0,0,e29ff38a00b23eefa1c3da967b46cee3d2cf09ab833c3586b164656be09dc238,2024-11-01T00:15:03.243000 -CVE-2024-10607,0,0,2507b7dca8d5b2aea9a1f9fa5822930e77348ecd5d0e5902894f125c3dfe0632,2024-11-01T01:15:12.153000 -CVE-2024-10608,0,0,e9ae04f74c82c272bbf6afacf6f8454552be4b3f85baa31f4b5466d0d0f65b69,2024-11-01T01:15:12.430000 -CVE-2024-10609,0,0,4a253e2de772b41bcf57400e6453748537a73b07837de06981acbd92eeb5d7d7,2024-11-01T01:15:12.690000 +CVE-2024-10600,0,1,e65342a4fe415a76d0c01f9dc427f6a36b4a8c254439fb5e7781062445e45351,2024-11-01T12:57:03.417000 +CVE-2024-10601,0,1,09965553ba64798e40e7a827da209ee34788dad4d7aa5b47619f8a21111592b7,2024-11-01T12:57:03.417000 +CVE-2024-10602,0,1,ad4e3a2b575755a16725931c01581603a09a02d4197cc00288835755bfababa4,2024-11-01T12:57:03.417000 +CVE-2024-10605,0,1,c315ce550a5a02f0527765642dbae87c4523e776fcb8c12a6fce2fe76cbae215,2024-11-01T12:57:03.417000 +CVE-2024-10607,0,1,d4f1d535c87507c67c7a41b6eff84066fe8858ae73b9785b0d4652d99a74edf2,2024-11-01T12:57:03.417000 +CVE-2024-10608,0,1,bd2102b8a140839a55ce6e1f5830b17a43f862d7a5baafd4d8f33b660692c0cc,2024-11-01T12:57:03.417000 +CVE-2024-10609,0,1,697c74cd8341e1fc242d68bfc9cd2b3441aa1c52db81cd9739ba010449fc70e1,2024-11-01T12:57:03.417000 CVE-2024-1061,0,0,b0142398cd9b9f174f90c4c080cff8303ffcef7270f68849f3de92ae586ec72f,2024-02-05T18:21:08.577000 -CVE-2024-10610,0,0,2b69dcf629a95a5c93096752e379fd396a70f9a4385e27ef639dd500f55ed8ce,2024-11-01T02:15:03.180000 -CVE-2024-10611,0,0,0dc059b8fea51edc9a4a016e1565b56716d43af624a620398442be78de0e1439,2024-11-01T02:15:03.533000 -CVE-2024-10612,0,0,473401f1413ed4c30a13b985357c004e3f0329f302fa2f793aa8c89d250fd04b,2024-11-01T03:15:02.617000 -CVE-2024-10613,0,0,db600803fea4b3598e3f2ec59b8e8089b79df4696eb14867e497c02c0ffbfc80,2024-11-01T03:15:02.903000 -CVE-2024-10615,0,0,5598bbbecea92579872d25f4594cc8e05b728268a97b59c4177392ba4af34dab,2024-11-01T03:15:03.180000 -CVE-2024-10616,0,0,3801cead4085fec79891397ca179e71b9a36f8a71a931a7164184a6091ea6d4c,2024-11-01T04:15:08.643000 -CVE-2024-10617,0,0,c115ebd9184b04fc7c1cf06aa9e26acdfffe6db202fbc33d47a11aa0aee63397,2024-11-01T04:15:09.100000 -CVE-2024-10618,0,0,a0ee98e6f2a3bb5f39d4ca6b901dbbe1976515e97aa421510e0aab57a1e74106,2024-11-01T04:15:09.513000 -CVE-2024-10619,0,0,5bf4086f57746e212e6ba5450810be6502ee6bcc7a030b63851d5cf33f5cbe7a,2024-11-01T04:15:10.897000 +CVE-2024-10610,0,1,b3a7842f20edf6bf99b6648e195fb54a824ea4836ba5e14a15be0d3bcb1ee5a5,2024-11-01T12:57:03.417000 +CVE-2024-10611,0,1,c7e35c776731b547b2d283900f2d57b96116edf5c2f9ff849428c9bf239b8d66,2024-11-01T12:57:03.417000 +CVE-2024-10612,0,1,fe6a26759d6a968a1fc65a8d80e1f3a4fe80e841f29e8e56f78d40dcb30920d6,2024-11-01T12:57:03.417000 +CVE-2024-10613,0,1,38e372ddac5abe1d7fa7c2b8c6c368bffdffde44b72777c7f77e7072444d91cb,2024-11-01T12:57:03.417000 +CVE-2024-10615,0,1,ed1dace2b5be1e4a50b6a2aa0b43e0cacb407de80ccded3354efeb4e5a914a9f,2024-11-01T12:57:03.417000 +CVE-2024-10616,0,1,2067dede8d0a92893e6f455be4bec9688683555a1e1793272c5c64c9ae15e7cd,2024-11-01T12:57:03.417000 +CVE-2024-10617,0,1,c95449e4ec8a4443e9816a904a009f93bc0def0b9678f2e916d029f89fe97589,2024-11-01T12:57:03.417000 +CVE-2024-10618,0,1,982fcc2e2734ab50b0fc7bff8693fb4a148487aca29c2f49e9ca9220a88ab473,2024-11-01T12:57:03.417000 +CVE-2024-10619,0,1,f03c03a8a0f0acea74a9964841916578eeaf025b20a2a9e6ea8eec18ccca1353,2024-11-01T12:57:03.417000 CVE-2024-1062,0,0,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f85b,2024-10-10T14:22:28.617000 -CVE-2024-10620,0,0,d1dce0a8a49845055437483033a0cc33cc86ec4dbf47498c20ffa931b77774f3,2024-11-01T05:15:05.167000 +CVE-2024-10620,0,1,724abc136e85c83fb378f9f08553f42597c7003f31982d5ab3f2f979a65abde0,2024-11-01T12:57:03.417000 CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000 CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000 CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000 -CVE-2024-10651,1,1,da59d5c0421bc86f33ebd5415c6170d0dcce4244a867c98aea962de2781dd2e1,2024-11-01T10:15:04.600000 -CVE-2024-10652,1,1,83a9abc440cfb9319a0221697c7f614d48eaa1c6fd3e7fe87154fc598f071bd6,2024-11-01T10:15:04.877000 -CVE-2024-10653,1,1,c09a5bde6c37950c4429def90de453bac730c850cdba2914bb7e431b14d8a4a4,2024-11-01T10:15:05.103000 +CVE-2024-10651,0,1,4020d234a4dc20eeefa40d62db04df21d3fc130e9d8122bd0290808c2b4b15c0,2024-11-01T12:57:03.417000 +CVE-2024-10652,0,1,e78eb78c66337c771ed734884436ae7db011d1841627efa41acd490150897405,2024-11-01T12:57:03.417000 +CVE-2024-10653,0,1,5e383a5adfaa7160f97ca81322e1250ba0a464495b4b9728e4b011300f6a4ebd,2024-11-01T12:57:03.417000 +CVE-2024-10654,1,1,b71e1c46dc877d6506cd8226e7a3f6003b53c0e286f8e1e5ecb474e19ec184b8,2024-11-01T12:57:03.417000 CVE-2024-1066,0,0,7cd919bef6acbf4a1ab59632c47efb8ac6efc2d2c9f422a5fc3bf23611a0e27a,2024-10-08T19:52:24.017000 CVE-2024-1067,0,0,54f094f38a51fcd0954e79c36caca8c799a450eda4559137980b77dd6d9caf6c,2024-05-03T14:17:53.690000 CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000 @@ -243942,7 +243944,7 @@ CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b CVE-2024-20490,0,0,35fe5d8ca4a68248677c43c34084b321931d0d2945ab4df4da8782f5e23eb605,2024-10-08T15:15:39.160000 CVE-2024-20491,0,0,a6a1b451f6dda658d800035b80719f5bd0d6502321ff1f094bbee2194c64d03b,2024-10-08T15:55:08.933000 CVE-2024-20492,0,0,2a16b24462714ef70d9e342f3dfc09a86ef4cf713f3ed6d37bd4c4f35d4f0135,2024-10-08T16:07:26.280000 -CVE-2024-20493,0,0,d069c205cbf1d306382c8ab9d06c0f657190e79e830def30d8e5e42cf6a4fdad,2024-10-25T12:56:07.750000 +CVE-2024-20493,0,1,5f248b5777a3fe81d822909ccdf6271acc7d8505c005de678ea09f960b5d41f5,2024-11-01T12:54:23.637000 CVE-2024-20494,0,0,db014ac368aeaef465010712dd8bcda762614219e10d7d7c57490c923b6a69db,2024-10-25T12:56:07.750000 CVE-2024-20495,0,0,46b2341455343adfc8802fa1cf49217376580150021f478375b2a4fc64fd9188,2024-10-25T12:56:07.750000 CVE-2024-20496,0,0,127f60097f974f24aadc62900a388547cdf18c3a62d9e6416696d085e67625df,2024-09-26T13:32:02.803000 @@ -244865,7 +244867,7 @@ CVE-2024-21507,0,0,8947ae846b77ababc3f73b93eb86705240bc1e66f68d9ab3cc4c15c2d2f15 CVE-2024-21508,0,0,91d3f4fd811265c7ae6cfbde19cc50f2a3032a6b0f431ed4f4fe4fe4037296ca,2024-04-11T12:47:44.137000 CVE-2024-21509,0,0,c5c0f08bda5d62b0c47ab11da03ee29bc34441dcd1d184acfac375982cd1fb7e,2024-08-22T13:35:00.907000 CVE-2024-2151,0,0,567e14a5be97fe288f7c22c1f514dc3379a49ed0781c50046999a25212abd777,2024-05-17T02:38:04.663000 -CVE-2024-21510,0,0,9e00d286caa4b89f7c2914a724fdce91b68b92573be43bba3e8dc44b44508504,2024-11-01T05:15:05.640000 +CVE-2024-21510,0,1,030774c6387756b7cea57499c8fa85a4e1117a3d0d74d12dc671486452c38e6f,2024-11-01T12:57:03.417000 CVE-2024-21511,0,0,034219c7f11132d003e7f8ae540b3244138c125a352f628cb71b799c63f5d2cc,2024-04-23T12:52:09.397000 CVE-2024-21512,0,0,9cbfb13f3fd71c5173001386cf9b3561f71a4fbd60ae5c210558dde9343c193b,2024-06-06T13:15:31.390000 CVE-2024-21513,0,0,2cc4921b2e7cf735a4c6ffcd0f834de9cbd6a82ef6ed4bcebed2a92ed1ba3df5,2024-08-01T13:46:45.590000 @@ -244894,7 +244896,7 @@ CVE-2024-21533,0,0,b6d94b5290ee8a666e06ea3154c21a82f3a037332835b4cbc04bf2409f97e CVE-2024-21534,0,0,3641068338a125cfc76dca395aebd37e2004a05bbcc966c1678ccbc5dcd0ba06,2024-10-20T12:15:02.757000 CVE-2024-21535,0,0,2e7744380a1db7060122e5ae23002590579ae07efcc1f1beb06e6a3a8350e174,2024-10-17T20:36:29.213000 CVE-2024-21536,0,0,ae629d9ab98963890f886285a55767a6d8dedbe865d46e575265103987fe6f1f,2024-10-21T17:10:22.857000 -CVE-2024-21537,0,0,6ce226501fa44fce47d1498f52eb45a80a7e035dfd875b934e78fc84a546bb25,2024-10-31T05:15:04.733000 +CVE-2024-21537,0,1,b5c780dab93a9075b9d24d6af4e9f73fa194b201a9c6953f660e67892e16f17b,2024-11-01T12:57:03.417000 CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000 CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000 CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000 @@ -246085,7 +246087,7 @@ CVE-2024-23305,0,0,1bec79bc4020f6ec3f876f6219b03c33047027e58293560df4d9a57dbab1f CVE-2024-23306,0,0,91f46f52d9e5de00866e9203178e37e34a29f802d826e4f6441f99c1a5c6820c,2024-02-14T18:04:45.380000 CVE-2024-23307,0,0,ce3f1c4d4ee00439ab4eb84e7304958dea526a72b7cb431c57d45239ed513046,2024-01-31T20:38:12.743000 CVE-2024-23308,0,0,ab780e3d459f30026b937323fd197ac1b2578a1b6664154111931dd5ecc07d0f,2024-02-14T18:04:45.380000 -CVE-2024-23309,0,0,f176275e78d37dd0914e06a05900ed9a19ac5ac3d8b13fe20b906d6305907b73,2024-10-30T14:15:04.153000 +CVE-2024-23309,0,1,bfa888f316f044de3ced2d8e30fe824e49e4a04b9d6d8859465bb0486951c91b,2024-11-01T12:57:03.417000 CVE-2024-2331,0,0,4ae45893d8915acf1a1828719d664bd22bca980785ca070e6d05565096dfa696,2024-05-17T02:38:10.643000 CVE-2024-23310,0,0,4179f0bf8f658e9935c63c9c35f42aea4d1771a834836f01ffe3c75ee4f84241,2024-04-02T15:15:52.963000 CVE-2024-23313,0,0,423eb5c8ce01f4dbd3ff16b47be219cc8721b4595695d3e2421bc510a6ef2931,2024-04-02T15:15:53.050000 @@ -247022,7 +247024,7 @@ CVE-2024-24773,0,0,da8b682b31febd3e2de454f238cf130a08fb6ef29c1a8b2a9f8fa2fbf84b5 CVE-2024-24774,0,0,f13aeb5a8a14a2b28434301d459936e56cbcb6271359f1132daa975be1a4e4a7,2024-02-15T18:43:22.673000 CVE-2024-24775,0,0,e8a1117081dcecbda71bf879ea5f4cf7e64e228ee31031e5b59390d8bbf84feb,2024-02-14T18:04:45.380000 CVE-2024-24776,0,0,6c7703c27939b228b8c6f0a7ac349acff88924b8a443af347b795b4df5ebf2ac,2024-02-15T18:42:25.383000 -CVE-2024-24777,0,0,56e22ca779ef43a7047331beff5bf16b9b6c0fe1b87bd0e27c519b3b15c14e81,2024-10-30T14:15:04.457000 +CVE-2024-24777,0,1,3faa57f32ca7fd7d9709582f6b4ca29ecb1cdae731b69f82d81f9de50fd6a93f,2024-11-01T12:57:03.417000 CVE-2024-24779,0,0,0775cb0ef2c25af6aeb51ccc0386a7ab6a666e4b0e03b7de868da93b3496f60c,2024-02-28T15:15:09.250000 CVE-2024-2478,0,0,d4988a5fe437e33a0f9a93c3fcdccaa9b2b8ddd55cfc6854092fb1866b11274a,2024-05-17T02:38:14.540000 CVE-2024-24781,0,0,27ebde0e33bd322521afeffa18295af93e85735697632ec97f1132c9ea5137ef,2024-10-18T19:00:53.347000 @@ -247571,7 +247573,7 @@ CVE-2024-2556,0,0,d03e7f1784653a97f31dc4e2fd10447d6f2db7c14a279d58208c6467bb9e5b CVE-2024-25560,0,0,e7b7bd3b9b2bd4e7d45c7cc73f2078dfc39996dd7babf1c9bfbdcc4206fa2bb7,2024-05-08T17:05:24.083000 CVE-2024-25561,0,0,76009d8f511bac009453b1046a38e646e70f224b7d5698b6c84d95afebbbc42c,2024-09-12T18:50:32.413000 CVE-2024-25562,0,0,691463f616aff0c576eb38540790057cbc3fed7a44a49e5b85921154797d7fac,2024-08-31T03:40:47.857000 -CVE-2024-25566,0,0,bce4d48f91d3f108155e5a85bfef4dd59d760dcc7bad1735d165b1e6f1aaf94c,2024-10-29T16:15:04.947000 +CVE-2024-25566,0,1,fedc33f774b8ac79be0e9821cfde6b2a5eddc8d9684f2a48f95a7699ed7b2609,2024-11-01T12:57:35.843000 CVE-2024-25567,0,0,312765bfd106474db1f5aba6392fe2ea9517594a364566ff599d59e6c885b134,2024-03-22T12:45:36.130000 CVE-2024-25568,0,0,1f3b68eecdadc5fc067f1c6a6f3d0aecf716d94021ea1c3d5bfe3c2dbc91ce3d,2024-08-01T13:47:46.990000 CVE-2024-25569,0,0,dea2ee3f4df79c480f034907a060b1ff1648e15e76705f9587fe4b45a7f69cdc,2024-05-05T03:15:07.033000 @@ -249629,7 +249631,7 @@ CVE-2024-28046,0,0,e317050e5191f1a9311172b20af408b0774a96cf976a07961cd105c21cd52 CVE-2024-28048,0,0,427932cc2219e9755e4267ffe9ddd33c638166ca04c44c64b94478c05d38f523,2024-08-07T20:35:15.970000 CVE-2024-2805,0,0,286efc9a19dc11ee0838ec500ba164305f2c14641c0d5856229be06ec762a801,2024-05-17T02:38:30.840000 CVE-2024-28050,0,0,0d145d7886c67ca4edf4d6c71f8ed46211449029687ca634366ee5c88b5e7b1e,2024-09-06T18:38:11.353000 -CVE-2024-28052,0,0,d104be7b0ed9c739fd6bb5e987047c06e1582f4552ccfce34a901b096e65c8da,2024-10-30T14:15:04.720000 +CVE-2024-28052,0,1,23824ff918729f93aae4f07b62892c5decec42a77b30eb7703772ba303b15955,2024-11-01T12:57:03.417000 CVE-2024-28053,0,0,c6161d8eec33d0d4874e655333f8b3d42189dbff5254c952286bcd697b2efc85,2024-03-15T12:53:06.423000 CVE-2024-28054,0,0,42bd8bafc554125a5c189382c84c5d77dd5214fa492ad959b0494172465d0aa0,2024-03-23T03:15:11.510000 CVE-2024-28056,0,0,c35a08b2cbca4e8b19728715e17e817ce4b19045fe6d73162e692c29df0fb231,2024-08-15T19:35:07.857000 @@ -250106,7 +250108,7 @@ CVE-2024-2887,0,0,c42af46d10c700fa850ea04bb590acb930d5f5fd1c428610962643eaa93a7b CVE-2024-28870,0,0,a84ad55a58fed92db4d351523f55fc3cc9d3c726377b9c2c66e3f01e6b89b3d1,2024-04-04T12:48:41.700000 CVE-2024-28871,0,0,f172a75f11a332172da0d351654b3914d8a45025ba4cca839cd83e7266151a93,2024-04-04T16:33:06.610000 CVE-2024-28872,0,0,3fa653e5c53924e4238c671e5dfa807909726d40036a16f47c2e48e10d41c887,2024-07-12T18:48:45.307000 -CVE-2024-28875,0,0,c11b48c2ce271c558919e98c2eb15ea951ab9643a605a820586146708f3747ee,2024-10-30T14:15:04.990000 +CVE-2024-28875,0,1,7da07628f5c48f9514546cc237a833c1412975c99c574bef9ff3808f3daa9309,2024-11-01T12:57:03.417000 CVE-2024-28876,0,0,289ce1f406982ef8800ef1b70fd46d0b9d5b8d9ceadfdb0734ecc8b023d71b98,2024-09-06T18:35:00.337000 CVE-2024-28877,0,0,cc0627e9c2b6ba5f30332865405b5bc76f89994c49e4e390afd92f763c7891d6,2024-06-13T18:36:09.013000 CVE-2024-28878,0,0,d059bd49c00a1fffb41c41d6dd95d1c802f748f752ac96eeef423a76a468b10c,2024-04-15T13:15:51.577000 @@ -251019,7 +251021,7 @@ CVE-2024-30132,0,0,2755ce31fca62f5cb6c9467e2e9dd0f46b1eb8e96cf72e2eba3ab725581a0 CVE-2024-30134,0,0,b5401f953dda8a57b606a9ace80dca0a0a00325ba4573c5e6f1c325a9f248829,2024-09-30T12:46:20.237000 CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919aee63,2024-06-28T10:27:00.920000 CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000 -CVE-2024-30149,0,0,fc81a04da8269ec5c01295697457cc3928396a75c7306b952a0161087440bf38,2024-10-31T09:15:02.993000 +CVE-2024-30149,0,1,02591a0af3e62f9a1c0c9302daaa416a46c0618b44514409e84876f271a3c3d5,2024-11-01T12:57:03.417000 CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000 CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f89d,2024-03-25T01:51:01.223000 CVE-2024-30157,0,0,03c40ae2d6bb5fbe19cdcb81ee9473f77e02194f7cb98d03508973afcb5f65ab,2024-10-25T16:29:11.307000 @@ -251764,8 +251766,8 @@ CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f4 CVE-2024-31145,0,0,e7458273a6fceef9fb559ad713e774e4312c2d3910ffc413a934edb45195e865,2024-09-26T13:32:02.803000 CVE-2024-31146,0,0,b342a247282dd82cf1f52d9b8502d9aab215fbb81ba82cfea4edb5bd4cfeb6ee,2024-09-26T13:32:02.803000 CVE-2024-3115,0,0,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000 -CVE-2024-31151,0,0,4af5a128b3f1c31d99168ffab664653577047d2bc396fe2a6d1bd0475c958864,2024-10-30T14:15:05.507000 -CVE-2024-31152,0,0,9beeaa01ad59bc49ba6c24cd67029f0432f770b62b5dd1e2749c431ba923271d,2024-10-30T14:15:05.773000 +CVE-2024-31151,0,1,acc3a54ea55bc094fc6bb00a4d0b0b39044bd6557aa8a2322f4991b44822958c,2024-11-01T12:57:03.417000 +CVE-2024-31152,0,1,a77f64d9803c52e22529c8797356479ce4dbb054b85ffae31d3c7b54417b111d,2024-11-01T12:57:03.417000 CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000 CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000 CVE-2024-3116,0,0,9b51187c570a5abfd3b1d9bb042dab999267b982fd372840204c0edfde974aa9,2024-04-23T02:15:48.310000 @@ -252373,10 +252375,10 @@ CVE-2024-31967,0,0,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb9 CVE-2024-3197,0,0,324c7a8dc9ccea612ec0432519a90414016d01b55429c0b6dc09fc2cc5af230b,2024-05-02T18:00:37.360000 CVE-2024-31970,0,0,dc760428323022074304e6c9bb04a280cd725057b022c5a2ca8dd65247ed99d9,2024-09-03T21:15:15.603000 CVE-2024-31971,0,0,a1f4b42965419df8f210a326f6ff82813b583045274127c94e5e4f5a032a0e1b,2024-10-28T21:15:04.253000 -CVE-2024-31972,0,0,2c7a599051ae119780338ab9b442cbeeb73197c2b9b57b59996efb3af5c48c2e,2024-10-31T16:35:13.347000 -CVE-2024-31973,0,0,3fcf6ec328427aea2123998ffb5c52b17ae76964cccc725e0871d708cc5bcf2b,2024-10-31T16:35:14.150000 +CVE-2024-31972,0,1,f9241b9f06175c965ad284b5c2136f1f7f8e377bc5d6b68f231b17656172b319,2024-11-01T12:57:03.417000 +CVE-2024-31973,0,1,c3480f733abb332799fc1f07ef143103e9de0ed931d381c037c7e12d5a9eb78d,2024-11-01T12:57:03.417000 CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 -CVE-2024-31975,0,0,7550f5c9c88af659cd8584b3c629c1cecda27b61379ae9e83844f8c870633996,2024-10-31T16:35:14.937000 +CVE-2024-31975,0,1,922e7441c75c29832cf3420140aade8ac8465d99f6c0a33af1645c47fc641e80,2024-11-01T12:57:03.417000 CVE-2024-31977,0,0,8eb0d10eae7cd02452acc4180866c19a5b8993f8851d4be772620f1837a0acf8,2024-09-03T21:15:15.803000 CVE-2024-31978,0,0,d7e67cdb6c9abfc8a281402447b24c354a9ac8bd28f05dea2bb91e1cf546ce10,2024-04-09T12:48:04.090000 CVE-2024-31979,0,0,f097e05504ac9e9ee25949ce03f6b7581ce42735e92ea4d2772041b31a214c2d,2024-08-01T13:51:19.213000 @@ -253152,7 +253154,7 @@ CVE-2024-32940,0,0,b139056212e274cc43b1d8561af3c4d12757c7b4882dc265ebef55266df1f CVE-2024-32943,0,0,fd4b837b9a53617894ef752d7ffb15062de7d93bb7a78599ea7bd4a8fd1edccf,2024-06-21T11:22:01.687000 CVE-2024-32944,0,0,d0ec70387311640eb8535227f7e724b82fb2d27427be3369ff836aae4b979014,2024-10-29T15:35:25.073000 CVE-2024-32945,0,0,9f5b696ff44fb79b838efdedc4008405b04d813372a113ffadf8b85acf95286e,2024-07-16T18:03:50.067000 -CVE-2024-32946,0,0,ecaee23cdc0940463e55e6289b98af2d22b2abaf868e06757ee200c672454daa,2024-10-30T14:15:06.033000 +CVE-2024-32946,0,1,c405c8c2919c5531852eef73c270a181c9a923aed9529f3ec77b97b7fa968790,2024-11-01T12:57:03.417000 CVE-2024-32947,0,0,f4d3388d21b25a6b8abe5d47eaf1495f0195fc32275d8a68f778018af0164235,2024-04-24T17:16:50.397000 CVE-2024-32948,0,0,acdecd5f4ed0b407d74ae76d69c5bf1c1216a53f69bd869825d06aa6433de1ea,2024-04-24T13:39:42.883000 CVE-2024-3295,0,0,7e8dc8fb7d947b5fec16ad38c2014a5b0f40e3f43acfc4125c239589a9c410e5,2024-05-02T18:00:37.360000 @@ -253550,7 +253552,7 @@ CVE-2024-3360,0,0,3109060f810d344d932ba41f8fde09186b8026142e7b2128910fcc2070ceab CVE-2024-33600,0,0,02f564f9ce52bc11d27e3e1676100dcba6eaf4079faf69e72aa377dd994c6ac8,2024-07-22T18:15:03.417000 CVE-2024-33601,0,0,1e872276284c72121f6aaeefc175b69e15bd1ff785d0661b2fa91a7a25fea337,2024-07-22T18:15:03.493000 CVE-2024-33602,0,0,86deb6f1e6a3eb7f53cef6d50563acba68abbbbc8944080d8d45f1adacf78d24,2024-07-22T18:15:03.583000 -CVE-2024-33603,0,0,5c5e35801a94aa9562e7796d018a5a81dc684755f9a5363944d51de5582c15a6,2024-10-30T14:15:06.330000 +CVE-2024-33603,0,1,c8beba2cb615346e801b1ce778716644756b2baeb9f46c197501644b6c6e57a7,2024-11-01T12:57:03.417000 CVE-2024-33604,0,0,f300ec136103721a36b6f9e3ad22fcddf48753bfae597ae6d6eb99e8e877fcf5,2024-05-08T17:05:24.083000 CVE-2024-33606,0,0,e277f7ddb9a42d3084a4fa02dbc3b1b3d63499186ceb3e463e593da1b13af1f7,2024-06-13T18:36:09.013000 CVE-2024-33608,0,0,2634f245511a2ef8bdf0a976af80480a0940742ffc95fa320a1cb750a797cfb7,2024-05-08T17:05:24.083000 @@ -253562,9 +253564,9 @@ CVE-2024-3362,0,0,d92169c3d8c5742c227b67545a8be3a4af52d45882987a88c4a23c2fb99ad4 CVE-2024-33620,0,0,e869b572e67eecaa04960c7c1c826ad66c9d71964f8469bf34eb9ac43afb5484,2024-08-13T20:35:09.233000 CVE-2024-33621,0,0,ed1eec35bbbbdea80d33a8bbcfc24d343e0426fb309b2aaa07ef1d5e8aa29271,2024-07-15T07:15:04.067000 CVE-2024-33622,0,0,d58465a4a66214b50b1796cf92386e687ba2dbe496bc818c44d1f85dc4a8973b,2024-06-20T12:44:01.637000 -CVE-2024-33623,0,0,8e2ca3456dee23f4e80d6c36a39cd406a49062d0de431060b5d08967870b8751,2024-10-30T14:15:06.597000 +CVE-2024-33623,0,1,5dc1aba0b5ec7bbdf919d2822370c96fd7d66a6f4c02bd84cb17323bb36088c3,2024-11-01T12:57:03.417000 CVE-2024-33625,0,0,645afc1357c853e892786758021f6a244aedee60fe13b747d548e0f0fed77836,2024-05-16T13:03:05.353000 -CVE-2024-33626,0,0,2401483dfda40e44456e017f9ca347173e74510b6fa5f9e1a0bdb29b99403627,2024-10-30T14:15:06.850000 +CVE-2024-33626,0,1,dabc3fdd8abc388b59695aa69ac038c8fcc0af552027965318d57e4319493667,2024-11-01T12:57:03.417000 CVE-2024-33627,0,0,739561a300c8e0c5d6e0776600829ec1cdfa9e9832b6a16afdce5ca14d9efae0,2024-04-29T12:42:03.667000 CVE-2024-33628,0,0,0d9fc47e7881c845fcfb40059b0a2f57cf834a162fc7588e1c4ae872cfbfa8b5,2024-06-04T16:57:41.053000 CVE-2024-33629,0,0,0775f88facd47182375f04c11c9fb90160e0ba716118a2c83830fab26520359f,2024-04-29T12:42:03.667000 @@ -253637,8 +253639,8 @@ CVE-2024-33695,0,0,496bc8a3b6cc06e0f2cb2ff5ef3180780eefdd07d63e68d063cf97ba79dd8 CVE-2024-33696,0,0,8adc0db7b8cce33b994e835fa3f282e25f1f4ef5644a2aed7cd50d800fe731e7,2024-04-26T15:32:22.523000 CVE-2024-33697,0,0,4a571113caa6ccf495d29be30608c42f9dddf9084d1562bed260e698c04aae88,2024-04-26T15:32:22.523000 CVE-2024-33698,0,0,757107609bb2e6f896c0b7f0b6fa39b8f34d961ef227f03387260ef6a53fe2d1,2024-10-08T09:15:10.463000 -CVE-2024-33699,0,0,205a2265e8b1b78d62f5a185c0b575bad5ceb5ae6574c2d8dcf8edd222f149d4,2024-10-30T14:15:07.100000 -CVE-2024-33700,0,0,1422c6c7bfee08f754883a7161782880572727416a93e95f58b7000bc2a4ada5,2024-10-30T14:15:07.460000 +CVE-2024-33699,0,1,a180898edc05b7de3e9844da0eb5482b49100fc0d302cb04a8f6d6a114f674f2,2024-11-01T12:57:03.417000 +CVE-2024-33700,0,1,234de02da866d2373f57253f2644155556e5f426a25b78d17ee129120814b9f8,2024-11-01T12:57:03.417000 CVE-2024-3371,0,0,d2e6ea20ce5eb692a4e48c27aedae40a56c8f7db204eed4d633cbd78a04f68c4,2024-04-26T15:15:49.357000 CVE-2024-3372,0,0,a196d1e45ccce196e4deb1ea2387c2fe4f6bf89b27a8a7cd4be5ebcd31c9a0db,2024-05-14T19:17:55.627000 CVE-2024-3373,0,0,02bb0a6a8cf1c8cb960f2645d7165e4c706cc177e4cf5e50be0530bbf35b3163,2024-09-30T12:45:57.823000 @@ -255374,7 +255376,7 @@ CVE-2024-36055,0,0,2ae48e192918df566d0d9f05622839de441a2acf51ff71e22796e7147fb8c CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915ff94,2024-07-03T02:02:43.870000 CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000 CVE-2024-3606,0,0,d0a3a8d7c3b8995b719f693dd3907a6cc0220e7bd0b5d59f68093556b8c3a6af,2024-05-02T18:00:37.360000 -CVE-2024-36060,0,0,c82de4fe53902252cbedc96b489f1959e38592d9af6f6c2389bfd01c1a6aca2b,2024-10-31T15:35:34.893000 +CVE-2024-36060,0,1,0aa7d62145c5618b7f76bb2535f9fc77a196990e59fda038d7a6d0a4665703fe,2024-11-01T12:57:03.417000 CVE-2024-36066,0,0,e5935714f53a973b510722d45f5d3bf2cba784516885d84bf43ae18c5d973e73,2024-09-18T20:28:50.313000 CVE-2024-36068,0,0,67b8dd20c17029d0df65b62ef592fd27b14aad04438209518cbf5b8f0453cf62,2024-09-05T20:27:19.640000 CVE-2024-3607,0,0,bb41f416bf193e789c6c3a3e947ee7231c896c3b9ba6bc5f3e43284359c7ea80,2024-05-02T18:00:37.360000 @@ -256427,7 +256429,7 @@ CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347 CVE-2024-3757,0,0,d3e75f8205a45aeb6c1cb5b9efd4d99998e027f23a100dabf40ce218744ea3e8,2024-05-07T13:39:32.710000 CVE-2024-37570,0,0,3d4360fa9467e8eab1b52b173ed2069d0c82ea4d63ef454bbfc16c6908108d82,2024-10-25T19:35:06.277000 CVE-2024-37571,0,0,67e7b2412f8af956bea28aab4c57aae5f7e196be8f9b19162aa5c75b5cf90c89,2024-06-27T12:47:19.847000 -CVE-2024-37573,0,0,35403d5840856e7fce6a375dc03b8fa51c5bfda7921a316c41c199622ccf5676,2024-10-31T15:35:35.677000 +CVE-2024-37573,0,1,7cf896a83bff7adb78d3c1fc14e6c4ef534e5b6ec963a5ca90d46c8aebfbcf87,2024-11-01T12:57:03.417000 CVE-2024-3758,0,0,9133e9ab6c91a5523f7a6c3075b39d739f115990ca9d090ea03db032b6c7f7e8,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,228c14dd97b4dcf6507c1901dec59f930e3b9b578ef9455bb0b7881e5199f2f8,2024-05-07T13:39:32.710000 CVE-2024-3761,0,0,bcb7ea1ac08a49551e80d8143adffef9f2599014e2b4d32b190639643f083116,2024-05-20T13:00:04.957000 @@ -257613,7 +257615,7 @@ CVE-2024-39329,0,0,5aa2655955d12cfc04b5cd596dd516d231115449b8be168ee40469f865a39 CVE-2024-3933,0,0,92b73bce365e98fcc06e62daf24ff5ae07fa4b0e34a70b4d4c68931454994bbe,2024-05-28T12:39:28.377000 CVE-2024-39330,0,0,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f309e,2024-07-11T13:05:54.930000 CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000 -CVE-2024-39332,0,0,02c815ccdcead4ab9a75b85b431c56edd6baeae5a003187d7f3998feda147758,2024-10-31T19:15:12.897000 +CVE-2024-39332,0,1,b00214e2868c3073341ee9a7d86271cced92b721836ba366ba140c2db942664d,2024-11-01T12:57:03.417000 CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000 CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000 CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c28af,2024-08-23T18:35:36.313000 @@ -257627,7 +257629,7 @@ CVE-2024-39345,0,0,f773bf4aa168ca0fb54a499af45e3e951779cc47e8e783983f66e20a08393 CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000 CVE-2024-39348,0,0,798f996b4382b8a6e782460918b5005c42ce376a9b87c3209ffaa4789fe2c24c,2024-06-28T10:27:00.920000 CVE-2024-39349,0,0,d94bdd4e2f366e0736711898b6f6670e30f7a98126cdfe514679d42f61eff674,2024-06-28T10:27:00.920000 -CVE-2024-3935,0,0,f85022c68bc9bd8133e1654bba711e705b863a2b07b0b3f9cea620d610751226,2024-10-31T10:15:04.187000 +CVE-2024-3935,0,1,34d963f4d9aeb3d0d88aaf9b804b4377ffb663811a96cc52db09a253ee86d3e5,2024-11-01T12:57:03.417000 CVE-2024-39350,0,0,933f5cf4e1e8654d4184b998e6e3d84f4d423cc036a81e5a6851a5092c592ad5,2024-06-28T10:27:00.920000 CVE-2024-39351,0,0,9b4d39161319839f1a0a214dc211a28fd92f2da777165762a051c899eb88a499,2024-06-28T10:27:00.920000 CVE-2024-39352,0,0,2125967ac59376c4e2a4b0fc39ded99823f5fb5459f0421dba32eed656bdf603,2024-06-28T10:27:00.920000 @@ -257960,11 +257962,11 @@ CVE-2024-39714,0,0,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b047459 CVE-2024-39715,0,0,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000 CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000 CVE-2024-39718,0,0,116d4c704ecdda3f39d6049d166eceb718bb7e8447d879858815362938f8cf09,2024-09-09T13:03:38.303000 -CVE-2024-39719,0,0,55c0fe4231ea450fd9f9bd61b34566b93becc23a462714378436cabf84a325c3,2024-10-31T20:15:04.770000 +CVE-2024-39719,0,1,28aa8200bee464501dd6940f863a288bc0b5b49bbcd186372717d925c514ce15,2024-11-01T12:57:03.417000 CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000 -CVE-2024-39720,0,0,5d12fc2ee7e4d9b3dc0b31df402e7f9ab521670e316e8f3b2d06befa43297f5c,2024-10-31T20:15:04.877000 -CVE-2024-39721,0,0,21c376a4118d478bd951a487fcc6c37edc42d010d1757ffc540bbeeccc034e6b,2024-10-31T20:15:04.993000 -CVE-2024-39722,0,0,fa0eccacaad1353a36670c74071a2f5eaaad1233da2ab863fd98dc8f49b574fe,2024-10-31T20:15:05.080000 +CVE-2024-39720,0,1,9a4d63656eecf33bb7954fd58eaabc786e4cecb60075e162ed9e0a8adb6b9e4e,2024-11-01T12:57:03.417000 +CVE-2024-39721,0,1,37c6da705e5fccf379c412d692452fba119521e51a6e237e59cac9e89d1ad7fa,2024-11-01T12:57:03.417000 +CVE-2024-39722,0,1,4fb9976388eed0332231b688cd8bc52696d12784537120c3228b062706103c55,2024-11-01T12:57:03.417000 CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000 CVE-2024-39729,0,0,bfb0ee29aaef980e2b91ef648868f4c0e36729a7e019c3fc9d2073fdf0f8ba3f,2024-07-16T14:02:53.577000 @@ -259298,7 +259300,7 @@ CVE-2024-42038,0,0,eb94dedf88ce1c88ce5bfbc4f90e50df94d98b05443b426e18ed40ec47c0c CVE-2024-42039,0,0,7c8969b8c7addbeea34acdb619551d58483846230427052a3b95bfac07270d18,2024-09-12T19:37:01.487000 CVE-2024-4204,0,0,862cae0d91d079678d989fc30b77e9abff361be6cebd83fcf5dbeecd5c0be203,2024-05-17T18:36:05.263000 CVE-2024-42040,0,0,0994275c2c474f352961ba40bdf13e3388778f56f566ec8d1d02a6ad8ef6691a,2024-08-23T16:18:28.547000 -CVE-2024-42041,0,0,9c598e53b7ae4b91b3c6f0383ea7ce7b6a0ad08df9c0057a9be758e8995e8a19,2024-10-31T15:35:35.840000 +CVE-2024-42041,0,1,87aa336e5621fe21e5090c04406279b5ccf95ebd8715978d10f1ac58ec868816,2024-11-01T12:57:03.417000 CVE-2024-42049,0,0,9abf5139ab1afe8d55de5e333c97afa73e09c57ae34abc37f55eb8e975c40df6,2024-08-01T13:59:18.253000 CVE-2024-4205,0,0,3bc679c8856618cb4acfda15e793a18c79adc1e7d27d459136a04f77802a5775,2024-05-31T13:01:46.727000 CVE-2024-42050,0,0,d2a1e67e449aa6326dde0504a879c37570d5ac7e2fe0ffc282ef9a9581af71d3,2024-08-01T13:59:19.083000 @@ -259690,7 +259692,7 @@ CVE-2024-42507,0,0,b57055df85850f2ee370e2a3273bd68424b888342bc78e94d00bb50912492 CVE-2024-42508,0,0,2c3ef74dc61a212f49afeae18d3d774e8682eccbc5f7d8b0e3beb27e142f7cd6,2024-10-29T17:38:49.330000 CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000 CVE-2024-42514,0,0,a1f5f6b924755707c5bb385a67dc5d2ee260ba09c0f77899dd6a3e1d47eee9c5,2024-10-07T19:37:19.973000 -CVE-2024-42515,0,0,d9febc8d36f1e0fec5b8c3628e4df89ea40dc83420c169fad7a81aebf15f35af,2024-10-31T19:15:12.983000 +CVE-2024-42515,0,1,55c1e1fa404f35a0c96203214fa4b20d01ecc724391bb412fa8d9d771074b2e3,2024-11-01T12:57:03.417000 CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000 CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000 CVE-2024-42523,0,0,e7f13531824456b37c381b164195bec4f01c74ddaa27da31139f6cf4c536fef0,2024-08-23T18:35:03.563000 @@ -259874,7 +259876,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95 CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000 CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000 CVE-2024-42831,0,0,81c8fba77a06683f68ef3418776fd6a90738b17ea781218e5200d9ee57eaad3f,2024-10-10T12:57:21.987000 -CVE-2024-42835,0,0,62c3bb1040503fe108596a1c1ad34679c80451382f26381de785bebf9971f9b2,2024-10-31T19:35:08.113000 +CVE-2024-42835,0,1,841b5c5b2f08ee3e9b44de5dac0b4a49ffd164bde7186ca030cd680a32de71d6,2024-11-01T12:57:03.417000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000 @@ -260194,8 +260196,8 @@ CVE-2024-43378,0,0,b201eb55fcf5e1b333e5fc1b76defa675188abfea665e05ed68f738cfa202 CVE-2024-43379,0,0,d3e4b3238a29f3c9bcdc737c17326972a39574f3fe6ee0181683ddcdcc0798d3,2024-08-21T12:37:22.800000 CVE-2024-43380,0,0,3bb4c505eaa2eb4e3ea37c153951df14b4a7ccb63e07a242ed00a1ab77df3585,2024-08-21T12:38:00.247000 CVE-2024-43381,0,0,cadf370b69704b630cecfb0fbe8ba07b198197e9a1164f2a1cf1bce7367f0908,2024-09-11T13:02:26.053000 -CVE-2024-43382,0,0,69bb0259c447ec45a97de54e2ebc230bc1fd8481e7c79e71a8e68a98dc5a0c5d,2024-10-31T15:35:36.610000 -CVE-2024-43383,0,0,c0048cb1cc56a46ac04ad661b4237b2864c488f3c9da521dfcbc4eda502fdc1f,2024-10-31T10:15:04.293000 +CVE-2024-43382,0,1,489a3828e9da2abb6275de3f075d0fc99128ad2c59b358392e6a0aebbf6d958b,2024-11-01T12:57:03.417000 +CVE-2024-43383,0,1,4e79607fae31f8f7c112296889db4fd385c2f6ad40f09497808b48c6afedac18,2024-11-01T12:57:03.417000 CVE-2024-43385,0,0,9f5d38d74a52e4aff95c66a9fe01102de802f5b76b33bec488a6c4b7e7096244,2024-09-27T19:33:08.770000 CVE-2024-43386,0,0,bc2a848fad787eef345813d2c4720d9d2393c8e1df983aa7b4f1b2025bcec15b,2024-09-27T19:33:22.077000 CVE-2024-43387,0,0,4ccf94a52793dd24dc0376add620cfdf8d8ec8b86efb2e3a9e2719aaace5a025,2024-09-27T19:33:37.497000 @@ -260587,9 +260589,9 @@ CVE-2024-43922,0,0,1bda9e09eeb9cf761058baff2572a8d05071b30f4dbb7675f13cebb74973f CVE-2024-43924,0,0,bb2efaa4f19a90f6ad938fb6ac6c2fcde87a4755a2a040a9391dc5aa61d478fc,2024-10-23T15:12:34.673000 CVE-2024-43926,0,0,afe6ba4a11196449e0acf87526616d8bc217e24dbfcd1f8bfd3b6ef863d1044f,2024-09-03T15:15:45.160000 CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000 -CVE-2024-43930,0,0,a903ad561a3dd2a4bff05443069f54a10d0607a3ba7e98e940d032c49f5c716a,2024-10-31T10:15:04.770000 +CVE-2024-43930,0,1,d2718a7bbcdfb7abf58d6762854de5ad817f0467df620e35b4e8956bc4ad916c,2024-11-01T12:57:03.417000 CVE-2024-43931,0,0,e4b487ce16111f7507cab3f7997c98054a40435c39d10d2eeeecf16baa2d636f,2024-09-13T21:22:51.923000 -CVE-2024-43933,0,0,041f2d5669667582d36c12703b37b5c3091caff1d13d64c3a7b40ab5969aa874,2024-10-31T10:15:05.020000 +CVE-2024-43933,0,1,b76fa47679dfa72a66de25f852bd969ad6a120271a2f056d41a08eee765bf430,2024-11-01T12:57:03.417000 CVE-2024-43934,0,0,4e14707da9cba5c30b08d1fee5b95a63503f58541a5f170f7bdf2957916e0033,2024-09-03T15:17:36.507000 CVE-2024-43935,0,0,507740bb6b2ff7008debdb7eb0a31d10ff2310284bc85a28c8516e97f01a540f,2024-09-03T15:19:13.313000 CVE-2024-43936,0,0,13ff2ee8ac37d656ed3cfb9bac7c332b5831e52f7ec68739f3804a7d224b4b07,2024-09-03T15:20:22.557000 @@ -260633,7 +260635,7 @@ CVE-2024-43977,0,0,8548dd346f70e10bd02563139f9662536c4c908bc4be8bbe5ccbe1834db20 CVE-2024-43978,0,0,b84c789c57b2300e5e696cc4e44909900a0446291c850df47c011342afd925c3,2024-09-24T16:44:01.557000 CVE-2024-4398,0,0,fee297010492d7a9d0bd198f00369fbc7ee85eff508879444e062d535e0abd54,2024-05-14T16:11:39.510000 CVE-2024-43983,0,0,8ea56144e7b46aa8d46319391d511f11093468f3fcd70ebf4dabea21dfbfa0ca,2024-09-25T14:11:22.450000 -CVE-2024-43984,0,0,df1c76bf27a50d74986456764dda531d59ccb3e999cb4bc8de5101a7bff86fe6,2024-10-31T10:15:05.253000 +CVE-2024-43984,0,1,70e882ed150cbff74ac91bfbe5c2f80957e9319ed7ad33a6219a403a9e0b4213,2024-11-01T12:57:03.417000 CVE-2024-43985,0,0,b30648ddb1d2b11b33385d41d42e62d1ebe2261e3847ee7222ca30a44e15ddae,2024-09-24T19:33:16.910000 CVE-2024-43986,0,0,5efaf977320cbeb2ee7ab2a0d0a051c6a0e3aea03f2d6530f85000dcba818978,2024-10-04T13:22:56.253000 CVE-2024-43987,0,0,e42ccbdb2b94d874179a0c5a29e5439a09d4ffe036d9ba2323192b8072b93dd2,2024-09-25T14:08:22.987000 @@ -260718,8 +260720,8 @@ CVE-2024-44070,0,0,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd2598 CVE-2024-44072,0,0,c15ddc9cbc2cc106650a31089cdfd669f16d12a8ad25609c42818d1d63e1458b,2024-09-10T20:35:09.990000 CVE-2024-44073,0,0,de55f1c002ffa890fb79df1a9da58802af7cfd53cb9325cc406c6e277fabf47c,2024-09-06T17:35:17.523000 CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000 -CVE-2024-44080,0,0,9bee276309c166c6facf28cf9cd30e5a6038b72ef2397f7e25826f1c9a81a8e6,2024-10-30T15:35:15.230000 -CVE-2024-44081,0,0,07bf67c5a602c2a19603ce6d7abb6b6fa1f2ddcb8427e95085138a8c0cfb2a42,2024-10-29T22:15:03.730000 +CVE-2024-44080,0,1,95cfd132c3959e5b8cee93d80afb7c4972ddf15675331913c6c2ff1c379561df,2024-11-01T12:57:35.843000 +CVE-2024-44081,0,1,0173316450abd3875ababea722e12835a4b0684bb0cfa5027f9f633539fd8a6a,2024-11-01T12:57:35.843000 CVE-2024-44082,0,0,eca3489830dade6ed42141e32f34d30f3f0c158d92e0366e9686c819b89d9a20,2024-09-06T15:15:13.180000 CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000 CVE-2024-44085,0,0,388300037fdfaaf78c002cc7963ec532b366316a773d7512847e1899154e3e1a,2024-09-10T15:35:08.883000 @@ -261902,7 +261904,7 @@ CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4 CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000 CVE-2024-46528,0,0,4d04b74cf43234afd60aee245e40ab967d12ed0a23a16922ce62a9e56a7cfb68,2024-10-31T17:15:13.250000 CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000 -CVE-2024-46531,0,0,878a7e01df4c686cd7cdf931908bd2db34d00b16932fa7e72aa7bf69654762d4,2024-10-31T16:35:16.453000 +CVE-2024-46531,0,1,80e46aa1af205da97b26d47e5414c85e306f7c6b0834a04ab14b2f7157825ad6,2024-11-01T12:57:03.417000 CVE-2024-46532,0,0,28e90e41b88b199c93bd44748203fc4edc0b214d52c53df9729e48aaafb51060,2024-10-16T18:35:05.480000 CVE-2024-46535,0,0,303f432dafe76053288b97daeba04961b685b8c5980dad6e5d762d1f5502c318,2024-10-15T16:35:08.740000 CVE-2024-46538,0,0,dfc9741b1ceb0c2e645ed8952810cc1343c34577d0526c0ae91f23ea6649c3f5,2024-10-30T20:45:35.240000 @@ -262875,7 +262877,7 @@ CVE-2024-47912,0,0,f418c53b744005b67d73cb39395cb1c2d3d904d67f2798e6e9fa7f31b3851 CVE-2024-47913,0,0,dc38cdbfa262901d16ea1ec6ec0c83500e8aa0e3d84f1c11ffa637c829ee03f8,2024-10-07T17:48:28.117000 CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000 CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000 -CVE-2024-47939,0,0,7c5e0268339806dced4a5a853811407ac862fdbc263c3cb9e688a46627070a59,2024-11-01T05:15:05.950000 +CVE-2024-47939,0,1,9f0e10dc7d087dcc37542d1b052d2cccfb921e0e15d33604932cb6fc0b122d11,2024-11-01T12:57:03.417000 CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000 CVE-2024-47943,0,0,d4d5358ab48548c04867b54233602bd267d194af91388df45333461289a48f25,2024-10-15T12:57:46.880000 CVE-2024-47944,0,0,8c2dcd259cac2bc345d70afe119d0b88c60fe63597fe98a2528a606f007cae1c,2024-10-15T16:35:09.410000 @@ -262938,21 +262940,21 @@ CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000 CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000 CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000 -CVE-2024-48063,0,0,f1898c32cb0d80af7ff886a74079ae648139d7f78816f6b5b345dcc6592ae313,2024-10-30T15:35:17.993000 +CVE-2024-48063,0,1,72e8ce12f4efb89c623e372fa478cf3fee7b0b17b907d15f1c9ee9608cf441cd,2024-11-01T12:57:35.843000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 CVE-2024-48074,0,0,bca0d6dbb462c34776a53e7a729ed3fb0634f7f2ea1bca1d6a49bf976df47741,2024-10-29T19:35:18.963000 CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000 CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000 -CVE-2024-48093,0,0,5355adce4a10da211a08d3d6118090574c30dbc48765543d5e8f54b60c67bdf4,2024-10-31T15:35:37.423000 +CVE-2024-48093,0,1,fc3d238317c807ba6077042bfa1b95e52c8e2ef3cfad3047af5ab5b8b4b30b86,2024-11-01T12:57:03.417000 CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000 CVE-2024-48107,0,0,c40d4300b831a33464aba579f0b2928bc6562dbbd091bed8c83ce565b9877e14,2024-10-30T17:35:10.860000 CVE-2024-4811,0,0,edf02d3d2820d3eb4d79512dbe6202ba3ad4c52de06ce4f4dc329075ef4f69f3,2024-10-31T14:35:19.917000 -CVE-2024-48112,0,0,b99393ccbe63d75e4cc268eae784380b2239c4159470317e34354a4c2c1781ea,2024-10-31T14:35:19.053000 +CVE-2024-48112,0,1,0592afd901a75106b8b92d93491d1cc6f955701fc0082d5356a30656fb117240,2024-11-01T12:57:03.417000 CVE-2024-48119,0,0,70720ece2ac49da334fb21cd2227183af2fff6cb7ddcb2e4d023bf820cab9ef7,2024-10-30T14:32:43.217000 CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000 CVE-2024-48120,0,0,ac048d30db75e88feb91392efffb6e9bab5a19e9dc21f5cdbbca8a6a240da1c5,2024-10-29T20:57:53.360000 CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000 -CVE-2024-48138,0,0,7066ba30968daa1d80e7eb0a2b4b354fd811d0b1bdb9289276d5694cb5caa2b4,2024-10-30T15:35:18.830000 +CVE-2024-48138,0,1,134b05c1946793288756d86b0e45f4bfb4c7d6201ecce24c932761bab1961fcc,2024-11-01T12:57:35.843000 CVE-2024-48139,0,0,4498e53310bd0f1ddf9c5f5a2ccdf773885d2c9acdbd970572ebc94239438a82,2024-10-25T19:35:12.730000 CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000 CVE-2024-48140,0,0,7bdd1e284971ed20bbd566db3c44806f986d48a3fa213bf0dc8436945e28930e,2024-10-25T19:35:13.497000 @@ -262977,14 +262979,14 @@ CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168 CVE-2024-48195,0,0,624eed9854f46ef9dafc813bcbfebca0bf2ab48de4eb64a4aa5f0a1ddeec9a89,2024-10-30T18:35:14.433000 CVE-2024-48196,0,0,06085a08add8a4f4e1622d4b148953be486d5c8e3772fc9fb5febed91d95829e,2024-10-30T18:35:15.220000 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000 -CVE-2024-48200,0,0,d522cdb51427320f6247dedfc0f6e6c39b657ec64c121a0c5e19815e9e23a09f,2024-10-31T19:15:13.150000 -CVE-2024-48202,0,0,6a991d4260ecb620082a50303e3e09368ecc201c8b57a4ee048562622acb1335,2024-10-31T15:35:38.390000 +CVE-2024-48200,0,1,f3280dca7f8ce7a6e27c454f867dfdb0228e928dacb57443846bf38fb4616b94,2024-11-01T12:57:03.417000 +CVE-2024-48202,0,1,861cdc7afab3311a194bbfaa16e833de9edd725394687ae499e071916be4f821,2024-11-01T12:57:03.417000 CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec83d,2024-10-28T13:58:09.230000 -CVE-2024-48206,0,0,6817b9ae5feb72d446c529ddcda9c3a6e3777ee388634567e44646cfb7309cbb,2024-10-30T15:35:19.677000 +CVE-2024-48206,0,1,51a08c7a6c840c5e8de5643e6450ab06ef643b50749de152ef299fab981500c4,2024-11-01T12:57:35.843000 CVE-2024-48208,0,0,4cb069f7302b809408534c2d4d84e19f7a8371042576c478cf8a47f5a05c9a1b,2024-10-28T19:35:28.037000 CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 CVE-2024-48213,0,0,5f8713bffe18994daa14febc6bb0ad9b0b79a213338e08da6c4d569a2dd47e80,2024-10-31T18:35:14.040000 -CVE-2024-48214,0,0,78cdef8b5cf77a590137f1180c767a14d73d8882d8f7bf7b4722d04546484757,2024-10-31T16:35:17.260000 +CVE-2024-48214,0,1,5874aaaec7d456eb6d016435d48c50cc4331dd332e9ba74ee7ddb7cfe9ca4716,2024-11-01T12:57:03.417000 CVE-2024-48218,0,0,4b803b4002b5edc5abb8b754e173e0e42c64b19814d1d2b7448b5a518c468f92,2024-10-31T15:44:18.777000 CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000 CVE-2024-48222,0,0,d3ace986c7defc25fde2606da008a1a682b072a0252b8970d36668d6aab75cdc,2024-10-31T15:44:22.123000 @@ -263007,7 +263009,7 @@ CVE-2024-48237,0,0,7fc4be0e37579c90650795a758e344399d21643de8b932b0003e436ed9b8f CVE-2024-48238,0,0,82a52e47a3d3b03e4d50c93edac3f04555f82b841e94f644b1bc9259903b3bad,2024-10-29T19:35:22.083000 CVE-2024-48239,0,0,adb497d48658b0187eda42678c3fa683c391f0d842af36fe4602456f703dca6b,2024-10-29T19:35:22.840000 CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000 -CVE-2024-48241,0,0,aacc600ef815beb74a707c3fa236751d2254139cc7c91a3d9b7aac729eef4b6e,2024-10-31T15:35:39.163000 +CVE-2024-48241,0,1,aa5903c89480a3424221b20138b32dc9311f9953dcf64ba190ad3c477424636b,2024-11-01T12:57:03.417000 CVE-2024-48249,0,0,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf271b,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000 CVE-2024-48251,0,0,d31074b7bd4badb1c138e8ee894c9698881e0c5446022316d3777a7df111e058,2024-10-17T18:35:12.280000 @@ -263017,24 +263019,24 @@ CVE-2024-48257,0,0,cde7b8837142e8c81fa5cdd04cd1a286ad8050551e4a13ecd4d16d52e71f8 CVE-2024-48259,0,0,05be91466999f287d7c34a7b188d482630d814bc65ce325c3824838e8ad22bcc,2024-10-15T19:35:38.413000 CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000 CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000 -CVE-2024-48271,0,0,1f888af0fe10438ec47a242ce9fd16a02912365e415ea23c0f0ffd3f5c6eb91a,2024-10-31T16:35:18.043000 -CVE-2024-48272,0,0,be1e171db2123b60b541ab0d8a703adde1bb634510b908044cddbcc264a3e1d3,2024-10-31T16:35:19.107000 +CVE-2024-48271,0,1,f1a486724163e31edae91e89dc14d5baec7425ac5626e9c57973c7569aa40cc5,2024-11-01T12:57:03.417000 +CVE-2024-48272,0,1,dbe268aef174a7c0e19118488cdbf6bd3dd4bc2a094901a22c6cf1a9597b5ee2,2024-11-01T12:57:03.417000 CVE-2024-48278,0,0,2d230a37c6a5ea93411d7a1b4293f4f461a087e46c8a9a4eaba61f8eeb3339e7,2024-10-16T16:38:43.170000 CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737e13,2024-10-16T16:38:43.170000 CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 -CVE-2024-48307,0,0,81ecd37001e0e72c6ea88f5f6ed123050a0306524d9298167287539fbf37725b,2024-10-31T19:35:09.203000 -CVE-2024-48311,0,0,d7c0370dd0b10cfc270efb9e368b85a66e3d825eb9e86a9a918e49a33499f4e2,2024-10-31T16:35:19.993000 +CVE-2024-48307,0,1,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000 +CVE-2024-48311,0,1,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000 CVE-2024-48343,0,0,6b50c2f4f6b1096ee0c17db257557835a9194bfca6ac184c217bfb38c59667b0,2024-10-29T19:35:23.657000 -CVE-2024-48346,0,0,685dc3b8b4a0617d3bba24133a1b9cfcfa941dbeb1368f1bd1acdbd1ea270b87,2024-10-31T19:35:10.023000 +CVE-2024-48346,0,1,9cadc94f91da6becfc880372821212f6fb47778feb19564283e0a19072e428a5,2024-11-01T12:57:03.417000 CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000 CVE-2024-48356,0,0,d61948bf2095cc3d150baaa31fe05023f5cd4e2dab12daf4f3dc83771432fb5f,2024-10-30T17:35:12.420000 CVE-2024-48357,0,0,dba1c026ce12a35ee6a885944cea646b76fb79069c0e7307a1deb45a88532ca1,2024-10-30T17:35:13.203000 -CVE-2024-48359,0,0,f826addd6d537acf42a92e0cbf0efa9eb4e62d83f789d88f644862fda35249dd,2024-10-31T20:15:05.340000 +CVE-2024-48359,0,1,ce38505cd083d137cfbd255ceaaea0659dc64d9e5ffc1ec633a41493da9688d8,2024-11-01T12:57:03.417000 CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000 -CVE-2024-48360,0,0,1b5a1633c2541f80a1d590704a304549571b2ffc5dedb093276c0fb3a82b0781,2024-10-31T20:15:05.420000 +CVE-2024-48360,0,1,a1cf899617f4be896e91968f566de0a3ce0e45f15a26fd6e2d38de4b31ddae31,2024-11-01T12:57:03.417000 CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000 CVE-2024-4838,0,0,18fa2348db877da11c5078171d002c78cc86239f9092091ea1ecb3106ab22873,2024-05-16T13:03:05.353000 CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e2b,2024-06-24T19:26:47.037000 @@ -263061,7 +263063,7 @@ CVE-2024-48450,0,0,95666a34e95ce7db215eaf479fdcb2c8faa15e3317995a07f85c802aa5f6f CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0f53,2024-10-25T12:56:07.750000 CVE-2024-48459,0,0,901474388331b2012a4633aead65b3a3d672e9f671a2126655443e04f1134f78,2024-10-29T20:35:32.737000 CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000 -CVE-2024-48461,0,0,47e772559a9042a6e98b64dd184102e76350db709193fde2d439d6982a70ebf2,2024-10-30T20:35:32.170000 +CVE-2024-48461,0,1,1c2083218c3c3685e23b071a99b5af3e2d4f1a943e6f041925ac67eedb8db886,2024-11-01T12:57:35.843000 CVE-2024-48465,0,0,79a85011a870c4c08986e482d9ae1db011c8d568f8e3fabc9f719daa8800b0cb,2024-10-30T18:35:15.410000 CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000 @@ -263083,11 +263085,11 @@ CVE-2024-48547,0,0,9db332cc676278e21a081b803d57f1c54b011fe5dd42093550c345ebe0949 CVE-2024-48548,0,0,ec80620fd2405092cb652dc2117913ce945d52911c33fb7583254b23a981c173,2024-10-25T12:56:07.750000 CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000 CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000 -CVE-2024-48569,0,0,363defbdf09420190878aeae0a2fca5d0c5aa0c8ac5165dd56ab5fe6856327cb,2024-10-31T18:35:14.873000 +CVE-2024-48569,0,1,24f5b9438e992b12ebb4f1cecbbc7f7ad196587f1d30e788fa23e1ad8e95716d,2024-11-01T12:57:03.417000 CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000 CVE-2024-48570,0,0,7446ae4df00f32873e4ee72b4a315b4accd5c33a83ff9b6be395bc57cb3e12c5,2024-10-25T18:59:22.033000 -CVE-2024-48572,0,0,80073f63de1b6b029056367f8422bcae6c5c4185d84c98ab62ad2ed7d0192815,2024-10-30T15:35:20.497000 -CVE-2024-48573,0,0,0a68f4420e4d1b58f44b6c5009b5c0eaf6abf127f60f5f3f3e548f76f67b8ebe,2024-10-30T15:35:21.227000 +CVE-2024-48572,0,1,8db99c709917aeac69d62aa1f513e8825eb9eed1d267b747f461956ef00f742c,2024-11-01T12:57:35.843000 +CVE-2024-48573,0,1,6397c48393e85be704a8afbf8511b9e6b2084dce91db8ec11d99cb8e2094c15c,2024-11-01T12:57:35.843000 CVE-2024-48579,0,0,753bc89d80ce06ee02f1517d3e6d38134feb41965d0a3e14286b4761046c72e7,2024-10-28T13:58:09.230000 CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000 CVE-2024-48580,0,0,cecfbaeb166c1997f85eff468048926c1d6a76c932cf18638f27e79db1bfe914,2024-10-28T13:58:09.230000 @@ -263114,9 +263116,9 @@ CVE-2024-48637,0,0,d42c2fa4f588b75285bfd9e74cf828ce6be24d319097efc6470bbe43fee07 CVE-2024-48638,0,0,93a9606c88551eca2a43d58a9a18871f8de782bd448d66dc6474dd57c860ad86,2024-10-18T12:52:33.507000 CVE-2024-48644,0,0,767bea0974441fd2cc19792b3d98e4d360220265a6636145290e8043d3dbc5a5,2024-10-23T19:35:12.593000 CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000 -CVE-2024-48646,0,0,2c72755711774d9ce5210ca99838e837ec7f18163059771ae42741fa88e99c51,2024-10-31T18:35:15.693000 -CVE-2024-48647,0,0,92cd0668411b861dcce5bb2a87a5095ba9c782585782d8cbac588c674c005357,2024-10-31T18:35:16.527000 -CVE-2024-48648,0,0,56cc0d5ae63142abad3a70ff465753bf85416d54651366afa742cc2bf17f0169,2024-10-31T17:35:03.713000 +CVE-2024-48646,0,1,aee518bd8639c2b1389bb6f84d4647d768b8d41c706ad60bcac378e227396483,2024-11-01T12:57:03.417000 +CVE-2024-48647,0,1,44c6c007236263e21117c35fb111c988b9270e6496ba7b5759e642eb67e4cacb,2024-11-01T12:57:03.417000 +CVE-2024-48648,0,1,2371cc8030e8ac186094519130fa5ca1a4f83235a8abc42b65aa3298adf54e50,2024-11-01T12:57:03.417000 CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000 CVE-2024-48652,0,0,de9357326c4ec67fec06a2f6916117e7d67385a63ec8c48f3929233398d3928a,2024-10-25T16:51:57.013000 CVE-2024-48654,0,0,b1175c42eb9b6ad703f77f6cacd261d0eb5f65c9d2e13e20c8b31a8501988240,2024-10-28T13:58:09.230000 @@ -263140,9 +263142,9 @@ CVE-2024-48713,0,0,445ad86acde4498d015f6e3ec387c87f05498a686a49f564198004eca8c35 CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d0d4,2024-10-16T17:35:06.330000 CVE-2024-4872,0,0,549af6d3c4facab0e0ed80259f11ae3b62839f464bd03f4ae7443d031f1f2086,2024-10-30T15:31:41.743000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 -CVE-2024-48733,0,0,e873e270c7250d836beb5a5d9d75c5d243594eecb9071602bcc17cc41d90fc1f,2024-10-30T21:15:14.507000 -CVE-2024-48734,0,0,95db6671e3d0be41a6b06bc9e7fabfe49fbe14fcdbfc14f9c0975bea17995851,2024-10-30T21:15:14.563000 -CVE-2024-48735,0,0,5dee0ec0e0374b22f065cb26fb1b8c24e4784dd8a396c35339c7279fbec892bb,2024-10-31T20:35:06.767000 +CVE-2024-48733,0,1,c0caa75faa45cf15403b87fe2abf98908350b83c5b90681e020375f4d98e0f7f,2024-11-01T12:57:03.417000 +CVE-2024-48734,0,1,0ff14899ff6d1f807dcb9a710add9ad55c16f2324602e4a7c0c9acd42e644182,2024-11-01T12:57:03.417000 +CVE-2024-48735,0,1,f2fcb4ead0302c73f31082e74d83a17981bd4990d8b0ebc27e4847470db75e5e,2024-11-01T12:57:03.417000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-48743,0,0,e34f375e468f7c410c7d8c60761e70f3ee3d5b15b7109d5d939d88a21b51dbc6,2024-10-29T19:35:25.777000 CVE-2024-48744,0,0,424c481c5fd1d12d1736019bf9f8804bc723e4ae30a5fde28dbb02cb380182de,2024-10-16T18:35:07.013000 @@ -263179,7 +263181,7 @@ CVE-2024-48796,0,0,1e14f7498f727da73668bbab5fa9c3e26a7526443607be49f5cc1b64f9aed CVE-2024-48797,0,0,84ec47d2f0875bb5f244804e75fe25176b42fd271e656bf8a6c457b2cefda79b,2024-10-15T15:35:21.060000 CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000 CVE-2024-48799,0,0,896d6d04e9dd29e6b7911e8a609c1f9aedfadec2fef931b761998c1ee9dd8f3e,2024-10-15T15:35:21.350000 -CVE-2024-48807,0,0,300764b96823e0f840d30e92768793ba9fbd15ee4d35e3420f8875c90597d071,2024-10-31T15:35:39.950000 +CVE-2024-48807,0,1,0d144ac83f7e3b1760f53caa259e9e3c92797a393e9f0218e5e59721fbc1c4dc,2024-11-01T12:57:03.417000 CVE-2024-4881,0,0,d7fec9dc10ea1cda5c43b7baed66b19ac106fead894074c09a02df3073ad45bc,2024-10-17T15:17:00.590000 CVE-2024-48813,0,0,b3275c3656b3f4746c55f236fa34d6d816026c088db796644a052e298f356a4f,2024-10-15T12:58:51.050000 CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 @@ -263204,7 +263206,7 @@ CVE-2024-48903,0,0,af1ee698040ee7f8c19b83dd0eb3404cde07c42231b0e3832a1aa5561c101 CVE-2024-48904,0,0,56bc56ed1722c08287266703a07bddbd88211e3eebee5fa1d299ad65c198bf37,2024-10-23T15:12:34.673000 CVE-2024-48909,0,0,67804b300a72fc34a54a9327f0b3a7a8082afb16b0051c28b942604285939f48,2024-10-17T17:56:11.130000 CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000 -CVE-2024-48910,0,0,a527611b146188896bde75e2d8a72688f718e23b50b3f8fdb5a31b4ef66d5770,2024-10-31T15:15:15.720000 +CVE-2024-48910,0,1,3816f1647056b495d61afa5f1cedd58420ed3be2fc43ab79af9751ec8cb93072,2024-11-01T12:57:03.417000 CVE-2024-48911,0,0,f147f0790cf653449e8f662255582c7c922d3f40a3d15e4b98d08b1e5fd9c969,2024-10-17T21:13:37.147000 CVE-2024-48913,0,0,06d6a212c655b7ac1bbc6f5a3509e81cf89d4f1d83017b87d6e9303af3084bb1,2024-10-16T16:38:43.170000 CVE-2024-48914,0,0,8775ce8f63d45f4e21be0399438c25117df9f166b6335c0adfec50056398fb57,2024-10-16T16:38:43.170000 @@ -263213,7 +263215,7 @@ CVE-2024-48918,0,0,37d8ea84d8110f3a600a1d2f557058b666848b057b36b01b41785c57ee923 CVE-2024-48919,0,0,a0a7ee1576689ebc33e8b3ae0ac8ebb40e27885e788e12cb9b562903133f149c,2024-10-23T15:12:34.673000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000 -CVE-2024-48921,0,0,7a337822bc8d79bfd55b0eb44f807ad13df85f056a7c48a477bfb4bc74aa157a,2024-10-29T15:15:10.593000 +CVE-2024-48921,0,1,9418c037954119f94f776186fedc1950d6a42b412ca505cda7505df134d77200,2024-11-01T12:57:35.843000 CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000 CVE-2024-48925,0,0,c9fcd7e04639957ea66d2331abf3d50745ade802e21b5a3409a8d69b208718a8,2024-10-25T14:12:18.833000 CVE-2024-48926,0,0,d45a9da5f6f1b245a6d729f168d41330fc51c968405a1c91c3b061c128e5b29d,2024-10-25T16:19:17.073000 @@ -263233,7 +263235,7 @@ CVE-2024-48942,0,0,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5 CVE-2024-48948,0,0,6468ccc34445744b46aaa46da604a8323b3afae5876966b014aee375073e1d6b,2024-10-16T16:38:43.170000 CVE-2024-48949,0,0,a2a3af77c2ec8dfe23cb3bfb50401d91f40f6be7761d017f52ac86b99455f8e7,2024-10-15T14:07:04.057000 CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000 -CVE-2024-48955,0,0,0a2a2b978cdc62d5d96adf19c8bb21d2cc19e4c4b5bc967c351e4b9474bfeb45,2024-10-31T20:15:05.530000 +CVE-2024-48955,0,1,84de7be29efb285e46fc24626f552063b1e23de7f9dbbe9943b534f430e239e9,2024-11-01T12:57:35.843000 CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000 CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 @@ -263441,7 +263443,7 @@ CVE-2024-4947,0,0,3635839d47ca4be777d1000c77c519be36c42f5d72cb0c679b358b9a41c646 CVE-2024-4948,0,0,b89edbe3d3547ee2159af9ec22fd67b98f6c6885f88dc0c929a5ea68a98b8ff8,2024-07-03T02:08:20.437000 CVE-2024-4949,0,0,5c7ef1902f4beea866d1c7d9373440674707dc0a06c9e278c0f4652ccc170adc,2024-07-03T02:08:21.370000 CVE-2024-4950,0,0,e5fcb740f07c681c8eb3b4901aae32c365007c0ebdd7c7b0ee473dbffae68af1,2024-07-03T02:08:22.150000 -CVE-2024-49501,0,0,9aa848e778f60fe9db1b1fa3af8d0466b3fa6c9448f942b1edef1bd152766d5d,2024-11-01T05:15:06.280000 +CVE-2024-49501,0,1,34e661795ed7c329d9becb8743e23a77cfe5f584b40ddeff12deceac0863410a,2024-11-01T12:57:03.417000 CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000 CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000 CVE-2024-49579,0,0,85b8fb1168559e66181366d5ecd0a3cbf5d9385b3a23eb2296d97e9422fe6782,2024-10-18T12:52:33.507000 @@ -263522,7 +263524,7 @@ CVE-2024-49670,0,0,c61a4837644d7cf5e15a855fcac7e221e729733e4300d91657fbdc9de179c CVE-2024-49671,0,0,3444bda7ece1f693d338db4cc79d717f379cdd40dbc44287f6100eec0598b12d,2024-10-25T12:56:36.827000 CVE-2024-49672,0,0,894e1f0624440e3d744307abfb9eb6064ef2e0f986134420bd1cb909f8951534,2024-10-29T14:34:04.427000 CVE-2024-49673,0,0,a91125aab1f7960fc60732cbd0b5d96ec0e4cbbc1297595b886e51864ee396a5,2024-10-29T14:34:04.427000 -CVE-2024-49674,0,0,412e6b90554f7754db775df751d1a5d866b18afe52f7f1b9b731130c9a539c19,2024-10-31T10:15:05.490000 +CVE-2024-49674,0,1,fd3d64b6e35b6eec27ee3c590860244c5a96a05725f767dbab9cf4cb455540e0,2024-11-01T12:57:03.417000 CVE-2024-49675,0,0,c6e09b39dfdaf468c89ebc29589596eee519705df1761375fc6ab1777046823b,2024-10-25T12:56:36.827000 CVE-2024-49676,0,0,dd890548fa1bcb69576eae4659e357c656125d877be6d06a44ddb178c101b43d,2024-10-25T12:56:36.827000 CVE-2024-49678,0,0,a75d300a9f5fa676504639fae81083885456f78da78e7660ba14ca16476d39c0,2024-10-29T14:34:04.427000 @@ -263532,7 +263534,7 @@ CVE-2024-49681,0,0,3b093dfd5a970f736ccea994447fae465682222fe1b4c870be33e2b5aeaae CVE-2024-49682,0,0,4e47b24b4ccb89d6b9391034a4d9fd92d4e065ca66c40176951d133f1432962c,2024-10-25T12:56:07.750000 CVE-2024-49683,0,0,bc1a3474e846828fd29db41c7bd81aa13fff7d9cc09d32d534f0bd6429a79990,2024-10-25T12:56:07.750000 CVE-2024-49684,0,0,e9a627af5ddca9b4822ee6da7152da731788ee6f4ca218c2e1132330b65bb6b3,2024-10-25T12:56:36.827000 -CVE-2024-49685,0,0,f31647f73958128ce4b6538e45194e49dc058b12b6c6b4c78f5872d8bfd6413a,2024-10-31T10:15:05.710000 +CVE-2024-49685,0,1,d03d1488884d684d264c935249debd3fe17de9fede434aad11316faaf37e0e95,2024-11-01T12:57:03.417000 CVE-2024-4969,0,0,ab0804889b5a888b9b65e9fe2bbd8691478393df4e0fc992e2c82c7a1daa3f54,2024-07-08T14:19:14.173000 CVE-2024-49690,0,0,f8519a1e374a57a825b896cd1faf37ef6f9748445cc3d9105d4f22d925afe4f1,2024-10-25T12:56:36.827000 CVE-2024-49691,0,0,8a34c0fdaee81aff7458f4efa7a33cb09c53971e5ca42eec6727b794ae5c88cf,2024-10-25T12:56:07.750000 @@ -263561,8 +263563,8 @@ CVE-2024-49761,0,0,91dbe3ae22d59346162697cdf21d954a80519158ed01f8f13e3e3e00f37e4 CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000 CVE-2024-49766,0,0,5a8c5c0a2bd94e828f2c3a22888613b17d32cf5a4207ce143b3606496d9774b9,2024-10-28T13:58:09.230000 CVE-2024-49767,0,0,ef1423fe811e432f28d0c3f95d411793ec90858ffbf4947a2737bd5fe1b70dce,2024-10-28T13:58:09.230000 -CVE-2024-49768,0,0,8b43ec3e180036c3aca9d7dd6d01385965f11b81903643de2b418280062390c8,2024-10-29T15:15:11.440000 -CVE-2024-49769,0,0,6e0e0b59d53b97879b39c29d5eb2735eeb78be9d68c4ab745f2b599da8813ebe,2024-10-29T15:15:12.030000 +CVE-2024-49768,0,1,1713142d84abea3f4123ff49075a3750cdc85263c21701291f81ce3b5f05dc4c,2024-11-01T12:57:35.843000 +CVE-2024-49769,0,1,d49161a5652c2ef7170a42137ef51a74f4d05dba80251037705703249ce14223,2024-11-01T12:57:35.843000 CVE-2024-4977,0,0,f1472b15d6219c627718fd70559881283845ced10173940d62dfa6e1d38696a9,2024-08-01T13:59:37.487000 CVE-2024-49771,0,0,e1b8e33c9beff5e15c760e02f136747e5a30aef91dfde0840d1776c2c5b9964b,2024-10-29T14:34:50.257000 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 @@ -263844,15 +263846,15 @@ CVE-2024-50311,0,0,a911784e609d4ab74e0290e5d915dbb7b1471b8d97b5435937a13bc8c9811 CVE-2024-50312,0,0,8b68d956a110cf88efd2db7bdd6fdd3dc5b02186497d9ae2cbca0852915a398f,2024-10-30T18:35:56.753000 CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000 CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000 -CVE-2024-50334,0,0,e5afd12be3769678c4d0afd24ca9f86adfc7c8adcd7a12eb57abf0e3b514a033,2024-10-29T15:15:12.560000 +CVE-2024-50334,0,1,15b97ca0de89b7422ca1338a576d4ef71067410db416afc03dccd883f0aa73cd,2024-11-01T12:57:35.843000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 -CVE-2024-50344,0,0,93395b02a9e3e381ddc8a3070f13b915f9e8cd62d8e0f5a4556777cec89a5a2b,2024-10-30T16:15:04.763000 -CVE-2024-50347,0,0,ed16d14b70cf3d7686a2254299d7869880decc6158040c4e8ffd6c4d37591aca,2024-10-31T18:15:05.600000 -CVE-2024-50348,0,0,08d996230fa601a51dc4ce7290dfd8c5c344e9cd2fb7716f4e499eeaa4bf6b24,2024-10-29T23:15:03.863000 +CVE-2024-50344,0,1,01bf6c563fd2a47d8f1655926ebf620cef86a1d975ff50e33bcc2ca54db6ff27,2024-11-01T12:57:03.417000 +CVE-2024-50347,0,1,09b35c9108a453337442f172c0c30bea977424cb455f7f1c26e8c5268b8f2c51,2024-11-01T12:57:03.417000 +CVE-2024-50348,0,1,a2f7dd4541b70b31a296cb052041997e29eba359a31633491ab548fa5e708765,2024-11-01T12:57:03.417000 CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000 -CVE-2024-50353,0,0,ce993db7dd8b2e688fe3051b6a9bf88cf5e983902433f1fe7fb795b54f262c07,2024-10-30T14:15:07.790000 -CVE-2024-50354,0,0,1f20ca590c38e43a7f364e4a76d630df65540096d85e4f8894633db095556fa8,2024-10-31T16:15:05.763000 -CVE-2024-50356,0,0,1c3aa41523b3d8fc957ae37821a636851ed23c168cf4d4bfeac1115b833bd28d,2024-10-31T20:35:07.840000 +CVE-2024-50353,0,1,c270322657a2173bb388f1746e651fd5c3e3613c7dc6a2e8967074d0cc432797,2024-11-01T12:57:03.417000 +CVE-2024-50354,0,1,71c165210065e28f3056b772ab098428406844612dc3279d15bcac1af858ffbc,2024-11-01T12:57:03.417000 +CVE-2024-50356,0,1,6c6252f878e5604c2268241ecd78f6a9f7c918d1436d657bc43c62af2bb61558,2024-11-01T12:57:03.417000 CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000 CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000 CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000 @@ -263872,17 +263874,17 @@ CVE-2024-50414,0,0,746272a7c7dd2879b6476bd50d3580f414214c743026233c5a8a443eadcc6 CVE-2024-50415,0,0,3bae710664bb232f209cea02e6f0f5a3beb85a13b624cf1c6525fd9727938bc5,2024-10-29T14:34:04.427000 CVE-2024-50416,0,0,d6fa8ee755917351e975e2572b208d1eff8656e05d108ea493511ed3f6bbfdc0,2024-10-29T16:02:10.660000 CVE-2024-50418,0,0,9f03d934805840cc103a686a0254fefcc5de3e5598fc5ddc4ea79fd3cdb6c2ef,2024-10-29T14:34:04.427000 -CVE-2024-50419,0,0,d5e1d88e0d77245c4f86e43f425967a0a1eba5d52f9c69ee2ce122923f3c0b76,2024-10-30T15:15:19.360000 +CVE-2024-50419,0,1,3fb627afa7655517c113f13c4ae938758403eba2805cb207934b97acae41014f,2024-11-01T12:57:03.417000 CVE-2024-5042,0,0,94f87ab7ec94fdfd62be1f748dc3eabc441b5ca85cd66d27e43bb6f6e1a4ec28,2024-07-17T16:15:05.160000 CVE-2024-50420,0,0,9d07ec5963eb0da6d255e05be4967cacf836cf4fce5748c19509f40aea254b9d,2024-10-29T14:34:04.427000 -CVE-2024-50421,0,0,98ac1ae0ba7f04515a38743b156e0486e07d82e9611d46b2b591ba50ee1df54e,2024-10-29T22:15:04.083000 -CVE-2024-50422,0,0,ec1b429a4e86b54e612ba7c29d656ebe036a3b660d2a113753c7f492db61ba60,2024-10-29T22:15:04.290000 -CVE-2024-50423,0,0,272c867d28091da0c692b59753a49352f4ec1930f17fb01c9b808150533ac309,2024-10-29T22:15:04.500000 -CVE-2024-50424,0,0,16cb4bdb497e0b5edebd34f6b3cfb60d8d4329dd41aafdebea72e54745282114,2024-10-29T22:15:04.703000 -CVE-2024-50425,0,0,ed6e0073c8e5d904bc7253e9aa22d359791a952a15a41ff51dfc6d4a3eb029ee,2024-10-29T22:15:04.917000 +CVE-2024-50421,0,1,947ff01d7d464fe6aa435ec9d7f48366924a38ae1e89fcd3d992b31842f8b510,2024-11-01T12:57:35.843000 +CVE-2024-50422,0,1,8a4972d65656c9a0c021556468a5eae9c37adc96ab7b2478b8dd7fd33ff37429,2024-11-01T12:57:35.843000 +CVE-2024-50423,0,1,bfcc4e928d2d8b0a0ceeba89db9e2fe0e3889f5a8859ad918bbeda4623044e5e,2024-11-01T12:57:35.843000 +CVE-2024-50424,0,1,17d1165635d2a7dc6a2501991313ace27b86c86a0f85ee525147a017d68b40c7,2024-11-01T12:57:35.843000 +CVE-2024-50425,0,1,6d31f2999bcfa7dad3de7290d3ef5706468c6694c0382174af2f5bc85222848a,2024-11-01T12:57:35.843000 CVE-2024-50426,0,0,8c5b315a447e6f468e14c6e3c0f3b3dad8b0380a565a9ff8ab2bba148da55efc,2024-10-29T14:34:04.427000 CVE-2024-50427,0,0,c947d7dd64ae860e517413b4b81860fbb1384b9bd6793051f54c5fcec86b216e,2024-10-29T14:34:04.427000 -CVE-2024-50428,0,0,6858433cca8538a788c6893fa9d4f4865eed5d0742bdaee3c4885741a6499166,2024-10-29T22:15:05.133000 +CVE-2024-50428,0,1,ab02f271bec38fb2e67f0c1f04f0709647eb8e847661c05f0a181f06e07adff3,2024-11-01T12:57:35.843000 CVE-2024-50429,0,0,5b7b3cf65b98ce6ba120d1c668accfcc3a79e322ba032a3171f1e988fa226234,2024-10-29T14:34:50.257000 CVE-2024-5043,0,0,e8af684a96b52a20f139d3c6a27bd63fd7606ea9b2bbde97322bc475920cc410,2024-06-04T19:20:57.007000 CVE-2024-50431,0,0,23389882ec4121935e05df0356e494c78e8d1268608baa8c1c5a53c8f4335929,2024-10-29T14:34:50.257000 @@ -263908,12 +263910,12 @@ CVE-2024-5045,0,0,2cc3bc060710a5f4f076b17bfc4c763ffc9b4201a30a5ba725a69c9c0d38be CVE-2024-50450,0,0,7fc26bfa183b8562e84f6ef3fdd2ced88c72fd71cbb7684963fe6a0f34f112bc,2024-10-29T16:05:40.250000 CVE-2024-50451,0,0,9e10a2730d4d224fc008f74af7e4e87adb7173c98f4e87f05a6cb935f28f1c9e,2024-10-29T14:34:50.257000 CVE-2024-50453,0,0,e89d52ae701410acfefb72264206cd0820e07df81338b3098b8559b944b0ec5e,2024-10-29T14:34:50.257000 -CVE-2024-50454,0,0,ef9aaf62581715dc7953260c2408a29847fcd126da0ebfde0c9842b1159fbfed,2024-10-29T22:15:05.350000 -CVE-2024-50455,0,0,c71e601a8d02ba1800509cf9b5a4899c3bd2f87fba3eb7b822eef97ec2f404a1,2024-10-29T21:15:04.440000 -CVE-2024-50456,0,0,fb4644ded6c4ddfe614b20793512db4cc7b697ac041ff2d901ae47effbaf8608,2024-10-29T21:15:04.673000 +CVE-2024-50454,0,1,9d16a2e4356dbdfef4286c8b0e4629708aeb8f7938cb70a2ff3217cf54b560a8,2024-11-01T12:57:35.843000 +CVE-2024-50455,0,1,021d33e0b3503c2b180a3db47f65a2c825b51a85f1c803439648aa3715b31ead,2024-11-01T12:57:35.843000 +CVE-2024-50456,0,1,d847efa2d7b6b6e341b75f3f012d5a27edc2134c82e8510805e1a71e5c38a8d9,2024-11-01T12:57:35.843000 CVE-2024-50457,0,0,b84fdbe3b1d8ff69f56f7c8a32f23f6e8146042c72bee30b99bdcba52b7fe0e2,2024-10-29T14:34:50.257000 CVE-2024-50458,0,0,a843b6f3ada563d8daf61990461bdb89f598755b6880d14df2bc84efdc8206c4,2024-10-29T14:34:50.257000 -CVE-2024-50459,0,0,eea4813483e9d2e8960b2a9dc9cf62e677f3b1f5e321cd5005ec12a761726039,2024-10-29T17:15:04.423000 +CVE-2024-50459,0,1,277cf8ea35708a34da8905bc8452b22c79474baa7e3046ccc5868ed2bb5da8ab,2024-11-01T12:57:35.843000 CVE-2024-5046,0,0,61eff6fbe16c762ff136f32fbf7c7454761f98bd61a41d7bf57a3431cdb819c7,2024-06-04T19:20:57.247000 CVE-2024-50460,0,0,82d4ab7fefa246ce57a72383ca35008e1c66070e05dd2e7ddad07c6838704d66,2024-10-29T14:34:50.257000 CVE-2024-50461,0,0,e926adc646135f96a8c30b094b43a59a8c4d2ffe68507adf959cf049381e29b7,2024-10-29T14:34:50.257000 @@ -263921,7 +263923,7 @@ CVE-2024-50462,0,0,4ccfb8409add318d1d381a3ba39c166e299f826cc0027453ac31d88195954 CVE-2024-50463,0,0,41f5357ec154cc687872e4ff2451d70da03c70ee2d1be893e9fa2dcf4c51e71e,2024-10-29T16:25:01.827000 CVE-2024-50464,0,0,cf609d0bd47c8857d574d513c156d84098d01d1e1d4103f4808d20a068af8082,2024-10-29T14:34:50.257000 CVE-2024-50465,0,0,097e179489956305a27910d70c101d7ea5e4303159e4ab9b514ad21722dd01b4,2024-10-31T01:27:11.423000 -CVE-2024-50466,0,0,28d02b3d6bf24b3bb895029fd1d597a0dbe23f51eb3bd7b79c96bee1ce74f4ef,2024-10-29T17:15:04.640000 +CVE-2024-50466,0,1,28986574ee3560910af8c8226f9831d84e7481711b56149d6ce9e494d2f6bc85,2024-11-01T12:57:35.843000 CVE-2024-50467,0,0,4552ef78134a17bc23e57cbfd601f4e3eea4839d3e1dfc8a1846ef7af61ace53,2024-10-29T14:34:50.257000 CVE-2024-50468,0,0,dcb5fc7c0ad36e7911e6c02d0d96134d3b094fc419a37a9b5d1969d6d7f9c083,2024-10-29T14:34:50.257000 CVE-2024-50469,0,0,abcf4835413ee0cc04940d284cf5f3c90b0ebd44c44430c8cbae403d769d726a,2024-10-29T14:34:50.257000 @@ -263959,16 +263961,16 @@ CVE-2024-50498,0,0,33bc7bd73e04ec5df59dd34db418e6cd48c39a64b196d0dbfa582dde1e112 CVE-2024-5050,0,0,619081545361528557d824107c37f32918188d04adf33ba524a4859e2e6341a3,2024-06-04T19:20:57.457000 CVE-2024-50501,0,0,9730280cc1123cc5def2850ac443e575973aeb1d6cf344927e14d300de189cc9,2024-10-31T13:51:19.780000 CVE-2024-50502,0,0,9ddcb622b0ed4b183c8b5d25d4afba00562ea225fa79fd5c791293fd23c03b19,2024-10-31T13:43:03.177000 -CVE-2024-50503,0,0,13c77bbea684ac03d6c9bb023e29846b9a7ca81d92cfeb2c350eb96545279306,2024-10-30T08:15:02.813000 -CVE-2024-50504,0,0,64e9ff9f208d92ea57b05e1aa61760bf3f7128f163c70b67451830c2c24c1ee2,2024-10-30T08:15:03.077000 -CVE-2024-50506,0,0,9ed5dec08bae9cc3d4b760cfa2f2e993be26ea625e5a3d4e0a6ef704f5e10724,2024-10-30T08:15:03.323000 -CVE-2024-50507,0,0,a87b3c4c07539e00d3edcded9e7bc5328323c18176a8c7a3f5626b2b98c5668e,2024-10-30T08:15:03.533000 -CVE-2024-50508,0,0,225cd80948161b700d1e6d063c91852e77d3f7d687857095bedcbd61efc94264,2024-10-30T08:15:03.750000 -CVE-2024-50509,0,0,fe645504bb0178a52621c212ec9bf6dfc1abdf7d2a6371ca44e2f67b9948f6ae,2024-10-30T08:15:03.967000 +CVE-2024-50503,0,1,3e72a1edc49d96faef6718f95c3757ae663d964a405e1a0ab275f56345771735,2024-11-01T12:57:03.417000 +CVE-2024-50504,0,1,3ad326e4227c4af7a32d219b0beaed44862f99ee32a10ab1fa756d14d6880758,2024-11-01T12:57:03.417000 +CVE-2024-50506,0,1,f9925969c6bd7558693156147ed6b8ad5dddd5f8595c0e0631aee9a85acc4949,2024-11-01T12:57:03.417000 +CVE-2024-50507,0,1,a110f84485e607dedca47e465b4774bc63d0a87851a8fe5613cd14088502dd0b,2024-11-01T12:57:03.417000 +CVE-2024-50508,0,1,948d0183db082e79d16603c0af478ec1528a8915e8c02210f07d212cd8021270,2024-11-01T12:57:03.417000 +CVE-2024-50509,0,1,f328d3bbeff37225285d78859ce41a4da9182a5d4ea1f81ca5be5711d06a5a95,2024-11-01T12:57:03.417000 CVE-2024-5051,0,0,f233f4614a9daf0499b6db53ac9877312730fd59d85cfffcfb1c75738230a757,2024-06-04T19:20:57.557000 -CVE-2024-50510,0,0,b217865630195402f1e348cef95a2046d24b1140d35fee00d02a8c0d721fe4f7,2024-10-30T08:15:04.180000 -CVE-2024-50511,0,0,1c65aeaa4a10836e9b9b661f11e7a9c589f88e597e53220dcf4635e2c93e186a,2024-10-30T08:15:04.397000 -CVE-2024-50512,0,0,fc9a03daec07d793194c989111c49ebd0b75c0666a1289dbf20ab5130c4ba9d6,2024-10-30T08:15:04.610000 +CVE-2024-50510,0,1,c20bcf79645964cfe7d1f097e44f43edf8fcb1f8c86258043a8f25edf3a0b988,2024-11-01T12:57:03.417000 +CVE-2024-50511,0,1,d2405bceb5490caa25d48c9eaccd1b135c0f31fb2801d8eda1baf830c34ba921,2024-11-01T12:57:03.417000 +CVE-2024-50512,0,1,d3eb5beba15659e24233a17e23ff12b2ae18a8a0e2a2662e84998527ef3378d4,2024-11-01T12:57:03.417000 CVE-2024-5052,0,0,1db4612270fc4085b1cc808dfe93eaa2dc99045707c3296716068fcb2c40c936,2024-05-17T18:35:35.070000 CVE-2024-5053,0,0,85ba036ea0ce8a641df5f4bb0e9116ce37b7603e5543e179441180f635dd17ca,2024-10-04T16:02:22.037000 CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635ebd,2024-05-17T18:35:35.070000 @@ -264016,8 +264018,8 @@ CVE-2024-5076,0,0,de640e02cf3b45a3c273aa587ea62260b6bf3eea8d977ac9f3e7280d3f5d4b CVE-2024-5077,0,0,58d61679dec16d0807ee3c6d8f70abda23dd3b8ef542c3a47286601f3d544039,2024-08-01T13:59:40.333000 CVE-2024-5079,0,0,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62ab7,2024-08-01T13:59:40.517000 CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000 -CVE-2024-50801,0,0,b8874f741b3ac3d4e0411e961bf871ceba705f8f639471838bd72ebc36785c6d,2024-10-31T19:15:13.313000 -CVE-2024-50802,0,0,f24e292e6e8704f5d40bd8576e7700ff6bc9c2fbf554c1d2d83e9f06d65c1a14,2024-10-31T19:15:13.413000 +CVE-2024-50801,0,1,12fa6528480d09a9fa2eaa4a50b664a633a931b105b820fffeb1f93e9a31cbe8,2024-11-01T12:57:03.417000 +CVE-2024-50802,0,1,b78140282d8abd4ee47c0fd36ce8ab925c5b94864ec0fb29c78063d87402e2c9,2024-11-01T12:57:03.417000 CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000 CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000 CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000 @@ -264042,11 +264044,11 @@ CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc14,2024-06-04T19:20:59.397000 CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000 CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000 -CVE-2024-51060,0,0,6954fe4f4c979bac5ff347a737765282b77d34b22daafc7cbe923362e4a739b4,2024-10-31T19:15:13.500000 -CVE-2024-51063,0,0,83d14fce1e9aba85cc79c57d7ea6b3af3164f1724c2fc0eca657961c44180c77,2024-10-31T19:15:13.610000 -CVE-2024-51064,0,0,aede5da59a3b7d23cb6f435a779455219269bdbc5b84078b53f3427c0165d351,2024-10-31T19:15:13.700000 -CVE-2024-51065,0,0,2e7b751ebd5e167556d945b03efd6c3f054ad6056d4c14633dc247533df24b1c,2024-10-31T19:15:13.780000 -CVE-2024-51066,0,0,ee9694dead26536b4b5b9f9e8adea8e7ec593b9553bbcff0acf6476edcf63459,2024-10-31T19:15:13.860000 +CVE-2024-51060,0,1,bf09948e7c7aaa115f875dd56f82d9b08a132a90b53f54e59365b0e941e5cd6a,2024-11-01T12:57:03.417000 +CVE-2024-51063,0,1,9ac137b15c36c36c8687421137f7776a77ee7bd95646a530d7b141d282743b89,2024-11-01T12:57:03.417000 +CVE-2024-51064,0,1,fd364ea5ab09977e6f42450b168297e63b00e7c0029b3e49f076ec5de86c3852,2024-11-01T12:57:03.417000 +CVE-2024-51065,0,1,bba90206f55da00e50e4983588683ea1652bb1cf0748eacd12da8632f7735bb1,2024-11-01T12:57:03.417000 +CVE-2024-51066,0,1,0e2c33e48e0dc22833765e297fdd7a6d7e542ba858ca22fb6ec801bfcb7cc675,2024-11-01T12:57:03.417000 CVE-2024-5107,0,0,f5453befe05d8931f9c9a9c4f41bacf3f3f4a7efb50cfd25019760201fcefc62,2024-06-04T19:20:59.600000 CVE-2024-51075,0,0,552465fb7c055ecfb398f22c9432551758d85e6dc6767f3b187c510f15761dd9,2024-10-29T20:35:35.130000 CVE-2024-51076,0,0,3a12fe30660d75d0270cdd7bd56ceece76ba34d3765c2f273f497b6ff97fc1c5,2024-10-29T20:35:35.890000 @@ -264069,25 +264071,25 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000 CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000 CVE-2024-5124,0,0,c7015fc65f4e276c0cbb38596091155495fc50548eef3d0d6bdd3dfed4992761,2024-10-17T18:32:52.030000 -CVE-2024-51242,0,0,12f705da9022a8e38ebd9ee7e7e6ac01dfd058f24c1a03edec744b643eba3520,2024-10-31T16:35:20.873000 -CVE-2024-51243,0,0,800270ed7103621b26b8eae536fb3a8968dff426a0791be494e93fac6c2df32a,2024-10-31T15:35:40.967000 -CVE-2024-51254,0,0,f20ab585f3fe372c65595856805921bb8d2b22af7824679356ebca594f108d37,2024-10-31T15:35:41.800000 -CVE-2024-51255,0,0,235a83f99ee2b484c839d657b09596aa17973f52fcb5a6a16e0bbd6f5eafb8de,2024-10-31T19:35:10.837000 -CVE-2024-51257,0,0,29ad8b0137a8baebd65102b3b2a8b1d79f8cad235c4dd225c313b0295438f266,2024-10-30T16:35:28.993000 -CVE-2024-51258,0,0,8552984991114543bb72db401d789b000ecda7ab1e49c15b21f3ab9c1d4b407b,2024-10-30T18:35:17.040000 -CVE-2024-51259,0,0,6ece1df8b0d21af9bb887582666dedab51f593b9a20998980ded2314d5db896a,2024-10-31T19:35:11.680000 +CVE-2024-51242,0,1,e088a83b7d97849945ef8e4d907ce1041a9c29e696b96e8d85eb2989ae73aa7b,2024-11-01T12:57:03.417000 +CVE-2024-51243,0,1,dc9a3bcceef7b79b773664e490e9177d288abe6b5bfadf448f185196016ec54c,2024-11-01T12:57:03.417000 +CVE-2024-51254,0,1,223d23065b28f9aecf516c7169cb923513ae1f39fc52963cc50e2cab41350206,2024-11-01T12:57:03.417000 +CVE-2024-51255,0,1,09c7dedf943104113335c71594438f15e0e67937d27a8d621ad19f82c6566163,2024-11-01T12:57:03.417000 +CVE-2024-51257,0,1,5bc43acf86cf6a149a1c82df6d74466de1800bed5ebde1393a814b2e71c1f732,2024-11-01T12:57:03.417000 +CVE-2024-51258,0,1,c1cefb6c70fe6675982414c5eaf69eafb9b739883e94accc88d419fbdbb5fedb,2024-11-01T12:57:03.417000 +CVE-2024-51259,0,1,148c0baee08a2358bc69890e6575da5d28ddd9b53f460f8d3b0168da0da3cad1,2024-11-01T12:57:03.417000 CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000 -CVE-2024-51260,0,0,586901ac7a360d1796cf0d0876f6961325f47aad5a0d2fd09476e3b6ab8c144d,2024-10-31T19:35:12.607000 +CVE-2024-51260,0,1,184097b0812d41a9488367ecf34995f6d8c0d60329587b4279f6d99cf1c6831f,2024-11-01T12:57:03.417000 CVE-2024-5127,0,0,3b08ea85b89bf08b7ac589e3aa718857524fafebf4ce0fa847d24755edc03403,2024-10-09T13:38:49.307000 CVE-2024-5128,0,0,9fcc5cef7e8f556e2bf8719670c94f779c2307d32f054ea85c0fee175fdcf878,2024-09-23T15:11:09.923000 CVE-2024-5129,0,0,775c71113c1b7299300ab83c8a34b391b75dc55b55486fb0ef4553cde0b68e06,2024-10-03T16:56:02.837000 -CVE-2024-51296,0,0,e87a8f03521ab40cf91ec0c397a12cf5de3692de4daab1e7a503649d69b18f0f,2024-10-30T18:35:17.830000 -CVE-2024-51298,0,0,514609b543458b7816356ece778427649461627c080a99a1f018491e8c0ee256,2024-10-30T16:35:29.790000 -CVE-2024-51299,0,0,b495c4d03e184ceb460e9abb4d4a30397c91e555675c36d59fcd8a863b3c8db5,2024-10-30T18:35:18.640000 +CVE-2024-51296,0,1,83178416fc7af6245e0be6f0f1c3587dae934e80b6cc414d0d0d976fb33eab1e,2024-11-01T12:57:03.417000 +CVE-2024-51298,0,1,f64a6a85f736a981deb18799c28f2c5bbe25eba736f9516799160aeaa076c8e8,2024-11-01T12:57:03.417000 +CVE-2024-51299,0,1,e447971268f42489fba6b87f7e8f54c048b15ce4ee3fcc22b899a68070b96d10,2024-11-01T12:57:03.417000 CVE-2024-5130,0,0,08201be0ef3110b3d4a5f221adfbbc30fa234732006b6518b80f0c4870c61cea,2024-10-03T16:57:19.050000 -CVE-2024-51300,0,0,5500ee6d0844febb48bc884ecbc7a3a29671e7ac84bd188005f2cbc32f652446,2024-10-30T18:35:19.433000 -CVE-2024-51301,0,0,6b3b113e104cce5cf7a33904773509ba1b10780786214d76654fc313fa3aa896,2024-10-30T18:35:20.227000 -CVE-2024-51304,0,0,29809ef6fdb39fcf531622b627c18c1616566b9408d3e297584b398d1c92c0c7,2024-10-30T18:35:21.050000 +CVE-2024-51300,0,1,868f1886a949c37035ea29147eb7a984307d20acbdb0ff40d416bb21bfe75047,2024-11-01T12:57:03.417000 +CVE-2024-51301,0,1,50e23c850160cb1168fecb7636516cc977715139705058d2de9e569c4aa7d849,2024-11-01T12:57:03.417000 +CVE-2024-51304,0,1,7a3dee26145f52820ecad3ae3aa1a89e8c75c8ec87878c3a22e391c73ebfd301,2024-11-01T12:57:03.417000 CVE-2024-5131,0,0,e128e407b1f44dbf47d9ef9fd7ec5fd0648bd27c90b8180b437c118e29f83c77,2024-10-03T16:59:22.137000 CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000 CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000 @@ -264095,24 +264097,24 @@ CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000 CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000 CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000 -CVE-2024-51378,0,0,f6b847436d6454318a22bddb787fe79bac14b8796ff39c09e4001e54682664f0,2024-10-30T15:35:23.600000 +CVE-2024-51378,0,1,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000 CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000 CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000 -CVE-2024-51419,0,0,f2bde5a2b16d5461a757a11654dd9683461b76fa6cebc43eb41c4882c16408c4,2024-10-31T15:35:42.590000 +CVE-2024-51419,0,1,e145fdc3d6134b228049cf2c0ec561624aa79dc4de0c1da7a3c5f83de9d39a5f,2024-11-01T12:57:03.417000 CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000 -CVE-2024-51424,0,0,2316737ebdeb7c3600cea83652a5e9f46db8a616640d2d08a07bccc51b0ca59f,2024-10-31T16:35:21.660000 -CVE-2024-51425,0,0,833bdc625e1a738ada7ad7d5f55c83a7b1c7a93226be1681295fc3cb6fe3b978,2024-10-31T16:35:22.463000 -CVE-2024-51426,0,0,e6101206ecf4337bb6318e551c0f2f3f51553eecbb2541547a51b5d27151fe70,2024-10-31T15:35:43.373000 -CVE-2024-51427,0,0,fcfe3e7677db4a7b336b2247c857e7519564993e67b9bed1d6a6e1e171a8c15f,2024-10-31T15:35:44.180000 +CVE-2024-51424,0,1,dd3331cfa90af7cfa9808e4057a4744fa2a2c8a9c4f5b22acc2aa8be623b5524,2024-11-01T12:57:03.417000 +CVE-2024-51425,0,1,0987dd66b2c95d211cc2ea7b276f94ce04cf8e7e088627bbf9f13ba5f991a45a,2024-11-01T12:57:03.417000 +CVE-2024-51426,0,1,3d7a3e5c360b90e2d784277cfccac6afd1d2cb042190aff9772e8c297d0478b0,2024-11-01T12:57:03.417000 +CVE-2024-51427,0,1,ffcdc2905c6d5efd4ba06681e6f523d640c47f2a505a411a696ff606bb21ff58,2024-11-01T12:57:03.417000 CVE-2024-5143,0,0,5ac39d02075c8e32566e12e6b75645e72f6b53d1cd5d8a84d8661f31cb199459,2024-10-31T15:35:44.950000 -CVE-2024-51430,0,0,3157d8015fa87efc2891316f9d6d859c0d52a688a574b364f2c6e2727bcd1cc2,2024-10-31T17:35:04.600000 +CVE-2024-51430,0,1,ff23326a74158832e3c36a3da3cf40ac4ba003ba8db91bd39e91a6a5bd9de288,2024-11-01T12:57:03.417000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 CVE-2024-5145,0,0,e9d5b011678068f9e46540aba9b4c166c9546581cf81cda6f6984ec899d8b7b6,2024-06-04T19:21:01.520000 CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe738f,2024-05-22T12:46:53.887000 -CVE-2024-51478,0,0,acd4bb31c48b5a4cf83924eba9a0379b0f9346e05b21361d2a15e88f0862bf56,2024-10-31T17:15:13.500000 +CVE-2024-51478,0,1,25e14e056c5c89fe676748fde64f00a33c4819db8e746c89acfb29d48ca9cb59,2024-11-01T12:57:03.417000 CVE-2024-5148,0,0,bd5836562cd7c4456364427f29f33cc1c67447ccbfc1a9320a1023f854c7eb77,2024-09-03T12:59:02.453000 -CVE-2024-51481,0,0,f2651a488920fe3fdbbcf0e515a1d10e5430b723396d938341b75258b7a7411d,2024-10-31T17:15:13.723000 -CVE-2024-51482,0,0,5178c636b46c83fa7b2098922ca9a091994ec1b35ba1dadca37cf3d150c89227,2024-10-31T18:15:05.997000 +CVE-2024-51481,0,1,f64631b2131fa64c23f138efaf5fa4f6bfc9240002644a0600a58343fe7fe57b,2024-11-01T12:57:03.417000 +CVE-2024-51482,0,1,c6930600bc9a358c2eaaceb6359ce33e8b91d291eb6f1a47728b73730e6ffd5e,2024-11-01T12:57:03.417000 CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000 CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000 CVE-2024-51506,0,0,aeb585d1723ff2c89aafbc7f5be7b06442a99eb384784bc9840750395f547af1,2024-10-29T19:35:28.723000 @@ -264125,8 +264127,8 @@ CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2 CVE-2024-5154,0,0,dd9543d1b55e95fe68ef2cbce657bf493d3cb20e7ff1b13c6f72f3406df71c74,2024-09-25T06:15:04.890000 CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d764,2024-07-03T02:08:34.117000 CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000 -CVE-2024-51567,0,0,e7505ae3358d66960630383be47fb6ddc4035689f49b6ef72a3dcdc49e767450,2024-10-30T14:35:14.933000 -CVE-2024-51568,0,0,ad9515ac8c61f410f67864bce41921abbf48528c73d6a5ad446656424928c9ef,2024-10-30T14:35:15.670000 +CVE-2024-51567,0,1,fb22eca2665672d2aff69a30826055432e216f3624d9c34f21d445174b67e450,2024-11-01T12:57:03.417000 +CVE-2024-51568,0,1,ef96c64ab696ce1dd0f4d9f421838b3895b55219506da5bc264e22e1b5e0e5b2,2024-11-01T12:57:03.417000 CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000 CVE-2024-5158,0,0,b58e7eaee1d1dd9c5e85390b8596c36aa736d240ceb0715ad1a8e256309daea1,2024-09-15T19:35:04.757000 CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000 @@ -265294,8 +265296,8 @@ CVE-2024-6471,0,0,09d48a1225aac8158aa4c1ca2c8aef77a523ae62ed5b11e34f01b64da625d3 CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e25867,2024-08-06T16:31:05.780000 CVE-2024-6473,0,0,9d329dd670917bde4dfbebd26b87a1f0ac64a0b550d97fba6854ff35150aadd6,2024-09-05T14:19:45.153000 CVE-2024-6477,0,0,095ad8bec127bb97feb0819e6df5852cd52601b6cc4ba1d92128a3b9897811f6,2024-09-06T17:35:19.087000 -CVE-2024-6479,0,0,b187a9b2ebc95c66d0576f80651a80571f113b65201ba6de3354308e4193d4b5,2024-10-31T22:15:03.577000 -CVE-2024-6480,0,0,8745763e9470610e8729645e8e5b11a85f4d1024e9db27de60ed15c1f6e3c043,2024-10-31T22:15:03.817000 +CVE-2024-6479,0,1,7d605cde1573dc70949af8a1b8fd2bd526b74a20cc82318fcfc2dbd6e88542bb,2024-11-01T12:57:03.417000 +CVE-2024-6480,0,1,ab898b28b663e4888c0e2e84fc34c5f9d5fe27b8b49bc7bd9a9fb2d6c1e644c6,2024-11-01T12:57:03.417000 CVE-2024-6481,0,0,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000 CVE-2024-6482,0,0,72bf8f43b51dedcbd3503b13fb1098e532f5e135aadff3ebc844afe2ce28381d,2024-09-27T13:54:53.837000 CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000 @@ -266061,7 +266063,7 @@ CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc0 CVE-2024-7421,0,0,4b103fff50da4b09038f9929ad3e23e3be25f08bd3025dbf87bd771ab41116d2,2024-10-01T18:36:59.117000 CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d62,2024-08-19T13:00:23.117000 CVE-2024-7423,0,0,683032207cd0b1b10abe49d0a408feb34a406022ce5c9940510e7ae64734c49a,2024-09-26T20:08:31.863000 -CVE-2024-7424,0,0,a5be6e0eb0636ef17810581d3d0e44463aa0f37467006df96791ddc29bf14501,2024-11-01T08:15:11.647000 +CVE-2024-7424,0,1,c4d34c59ba9eb26fe878d9523fc5b774c87ba48b87c351fd74cd788fb738c24f,2024-11-01T12:57:03.417000 CVE-2024-7426,0,0,6a71007700c4116b380e5f6e6a7f1695f7459185616f96253328245521427764,2024-09-30T14:17:51.317000 CVE-2024-7427,0,0,db7ee0ecad2784af038bf44c17fdbe281451988802f60a362e8cf5f513055a51,2024-08-23T18:46:31.730000 CVE-2024-7428,0,0,6dbc394d0d800a640022319856b0e52c143a4490c0eebfb1fe7dd2cce04fb45f,2024-08-23T18:46:31.730000 @@ -266089,6 +266091,7 @@ CVE-2024-7452,0,0,9b0d7a5910a43cd09bce0b4f25c71bf821fcb49ab8aff5df5dd61e0e89344b CVE-2024-7453,0,0,f2c4667c8170dc75e7077d140353e4eeaf477c703ac59ccb9e7527c380af5025,2024-08-20T15:50:32.013000 CVE-2024-7454,0,0,4712572b581c0f95ec507820dd6ae54db95b8cd6f012b1428bd88c89e3f08a9e,2024-09-07T12:56:42.300000 CVE-2024-7455,0,0,601db2e3c344f8919ac22403f9206b02f1ef01887e912751e702c2d237802e62,2024-08-29T02:57:57.903000 +CVE-2024-7456,1,1,9bebeb737974c119b377b339d20f1cc393d1a9056a3e8c14f031b3609e646e5e,2024-11-01T12:57:03.417000 CVE-2024-7458,0,0,2c9d4dd630ee9d646df3107c9eafd0e6cad217e61388b41410f8713d27f85974,2024-08-06T17:12:28.250000 CVE-2024-7459,0,0,53c79cef732ccbff6adb36bb342854abc83915346c054d98b70903c7c6347372,2024-08-06T17:14:16.667000 CVE-2024-7460,0,0,d48d1421ea3ce9fda403f952725d01106181045f180d1b45462656996088205d,2024-08-06T17:19:25.597000 @@ -266436,7 +266439,7 @@ CVE-2024-7870,0,0,2836216d393e794b4828cb37dfdee043bfdf58d1b6ab4bb6d4918022aecdc9 CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000 CVE-2024-7873,0,0,206d8282726d748a6a41b367b674a966213f9d6e3053dc261b740ef29ffe8ab7,2024-09-20T12:30:51.220000 CVE-2024-7878,0,0,1d855258734eb9301ec3064cb052aacfe2a08aa75ea8a20fdcb8aa8f30181ac0,2024-10-02T17:41:44.133000 -CVE-2024-7883,0,0,a0d02461ab906696f5db8c8f3e3571e988cb43aab47f453d7c53bf3a19ae3b1f,2024-10-31T17:15:14.013000 +CVE-2024-7883,0,1,a3a2b3516fa75baae0f9793ea599317aaafd583c850715f7d93bc13d6d1cd9ad,2024-11-01T12:57:03.417000 CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000 CVE-2024-7885,0,0,e2150db115995e6873d7f6cbf78400b2118c17b58478683565f8b50d49fc70e9,2024-10-07T21:15:19.217000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 @@ -266526,13 +266529,13 @@ CVE-2024-7978,0,0,32f4e05559c2808de89ac0caea53fb83c96439d90c95d7208a9711199924c2 CVE-2024-7979,0,0,7197dd548ee44d45e84f2f2c61d6a52a80bd0fd2ed16f305497f42e667362bae,2024-08-26T15:13:19.383000 CVE-2024-7980,0,0,cda5d0604d61479305f3aa6d24c7a46f2d1d2a7e936538d9b59a5f61a8d4d4b3,2024-08-26T15:14:10.730000 CVE-2024-7981,0,0,558a7e30af48c73a27172093229eee673e34b504c9731b910b5af4369614c86c,2024-08-22T17:36:24.803000 -CVE-2024-7985,0,0,0ccddadc1691019ae8034fc6395191a1e6135cc582660ad5f7e788c298ddf873,2024-10-29T16:15:06.180000 +CVE-2024-7985,0,1,5f4478821784f8170e1101652bcb7e731e6b6321633685574b8d89452a7cee9e,2024-11-01T12:57:35.843000 CVE-2024-7986,0,0,a43751c0931e4929788be7df13e0b692f335646e8ba6bbd66f7625d734a5daf5,2024-08-23T16:18:28.547000 CVE-2024-7987,0,0,76927c94eae9954117a932c513da8aebd30f47001e85e588d746e509b6294d24,2024-08-26T18:35:13.553000 CVE-2024-7988,0,0,f1ca0f1a43359526a6c9585e72942b31e1455ffa80a01c452c09ecf831a670e6,2024-08-26T18:35:14.617000 CVE-2024-7989,0,0,cd26af6c9ba19e6a7e0856f5be7c1437b90e54abd28d7f811499d7cb8cc81786,2024-08-26T21:15:29.777000 -CVE-2024-7991,0,0,757c5a26f045f80a1fc66d1d2fda65e36ad9865f2a3df0be0661f9cba3a7042f,2024-10-29T22:15:05.560000 -CVE-2024-7992,0,0,62258be25490042a0f237ef2c3abed99d2d3693bd018a8c655d378ba91a469cb,2024-10-29T22:15:05.760000 +CVE-2024-7991,0,1,76454fbc80025693c03453b92ba0c97080a3a2d7f92e9d807dee64fbc79ad9b8,2024-11-01T12:57:35.843000 +CVE-2024-7992,0,1,f69f0524fbc01facb3f32f8e93d24821240e6f531202281a8ff6d78988526f22,2024-11-01T12:57:35.843000 CVE-2024-7993,0,0,f5d8ce4e740e416affd8e0aa81b49c04864f17ee770befacf4a96c4d9988583c,2024-10-21T18:27:01.950000 CVE-2024-7994,0,0,5869f45b11df8c023b86ee171f284a639849bded2dfdba799d5d6a2b878c2a64,2024-10-21T18:35:55.397000 CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000 @@ -266663,7 +266666,7 @@ CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf56 CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000 CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000 CVE-2024-8184,0,0,d48d558194844a1f751cae7594bf18c33ea7d327e56afa5866ea86b36313537e,2024-10-15T12:57:46.880000 -CVE-2024-8185,0,0,26704d16d6950ac2c758a400464a9f1d09ede441b55dd42cb676694c324d261a,2024-10-31T16:15:06.267000 +CVE-2024-8185,0,1,1368b09c94284d9805fb106103e314ec00232d14fe5e3fdffd2fddd8d80126f8,2024-11-01T12:57:03.417000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 CVE-2024-8189,0,0,63668eb3e5fc8ff94f956bfec9b936178c3cdc9b685d09571c582433c179a1da,2024-10-07T15:44:45.110000 CVE-2024-8190,0,0,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000 @@ -266849,7 +266852,7 @@ CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae5 CVE-2024-8440,0,0,8dcfa58740a8b45172e18897b2d796d55a68f35b9034374864c3da0c6b77c079,2024-09-25T19:34:19.683000 CVE-2024-8441,0,0,0efac0f95475c5b753f85a6e07784bad0c26116c06bdd47c81e7d9e5f2143687,2024-09-12T21:53:43.387000 CVE-2024-8443,0,0,17e8697863032f9317d28c5eea98e22f13f55f27fe238e6efc059b214854b50f,2024-10-01T13:15:03.110000 -CVE-2024-8444,0,0,13c2ceb7a5411c83a2510e0feab52decafe9feb98c83381f93a3363dddeb0381,2024-10-30T14:35:18.373000 +CVE-2024-8444,0,1,647e6594397afdd524827ac7952e2d7dabc6d6be364beb8813944df5943d7ed7,2024-11-01T12:57:03.417000 CVE-2024-8445,0,0,a7f7ba812fc058686a7ce9617c544a5ef0aa1db28a47ee616a0e4041709a6c78,2024-10-01T06:15:02.650000 CVE-2024-8448,0,0,ae18a026c0067b7078869d24f3685b0421255cde0e4de17dbd7702d3e9741f7f,2024-10-04T15:07:22.160000 CVE-2024-8449,0,0,a8e7eabde222d61aae43a8862e23d72e8db76b0b518b635548832e684fcc6091,2024-10-04T15:08:22.733000 @@ -266899,7 +266902,7 @@ CVE-2024-8505,0,0,1c04e90354babae2df3035dc354852183330b8445c04d1f2331a89a32b3e4a CVE-2024-8507,0,0,f8ab6ca415f5a0161413ce7f662341ea541aaee581333ff12dda1758c919ad13,2024-10-17T18:20:13.153000 CVE-2024-8508,0,0,095cff01fb00165e2108ed0a6b3f940edeffb7916515f1cc0f2ea48f2031a7c8,2024-10-04T13:50:43.727000 CVE-2024-8509,0,0,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000 -CVE-2024-8512,0,0,dd2902edc8baaa2462a4f8cb4b2213b16da52f669ae88c8584b52bb6683dd9da,2024-10-30T11:15:15.963000 +CVE-2024-8512,0,1,9dd3ceaae5959b219bbddb3dcb1837a359b44048d6d66b21e021476c4a9218c3,2024-11-01T12:57:03.417000 CVE-2024-8513,0,0,910ae7d47a27f3be55b8ebbee4133c06edee61ebde300e418feb96105acdd2ce,2024-10-15T13:33:14.333000 CVE-2024-8514,0,0,c58a76f0057441ba23f8e2f32e326770fb9d4e75db425aee0ab9e343556d5997,2024-10-02T19:59:17.080000 CVE-2024-8515,0,0,2860d4fc2403ef731ebb5d2e3d51ef0155fe3387c99bac76ffcaa85980c8d253,2024-10-02T19:22:00.953000 @@ -266925,7 +266928,7 @@ CVE-2024-8547,0,0,a5c726f624e35e2e38ae2311e7ed395da023cf1c888c1c750584ab5f9e8492 CVE-2024-8548,0,0,79d6b79af13a38bbe8eb976675ec8fe70e73bfe199b20619eaaa02e33fc56380,2024-10-04T13:51:25.567000 CVE-2024-8549,0,0,9d15342b3eb4ac6ebd08188bbf5727cd19e2d1db961fed83db600a8a3150700d,2024-10-02T16:04:41.970000 CVE-2024-8552,0,0,ab7cb4c880b3ec4297f7ff802068bed1b689ce05b544a01cb748e0f63a229aea,2024-10-02T17:00:45.083000 -CVE-2024-8553,0,0,91afd0faecdead23bced3ff961746a4a8aa65aa3664ec7c5dc2e48d3087a4345,2024-11-01T02:15:03.870000 +CVE-2024-8553,0,1,be58c50525a9502948bfd7fc4471f823e1b0474a0abbdee430c4c54ee6da9fd0,2024-11-01T12:57:03.417000 CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000 CVE-2024-8555,0,0,0c0685cb1cca90ba97dbbe7724af46b71d0ab057cb41b6cc62e81df56a2985b7,2024-09-10T13:53:11.847000 CVE-2024-8557,0,0,86ab04a42076aa0fe9f792cba1f27d54b98becfc358809b664a63ce528fde776,2024-09-10T14:19:36.280000 @@ -266957,20 +266960,20 @@ CVE-2024-8583,0,0,1afec7fcc1c6ffb2f3d78350dc0e6e06f846d7be3a9c3c1e504a5706419361 CVE-2024-8584,0,0,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473ab7,2024-09-13T10:15:17.263000 CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000 CVE-2024-8586,0,0,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000 -CVE-2024-8587,0,0,92c19023ed3a0aef21cbb42b21a2cf92f6fed0390245e5ec88d3b2d2dad94375,2024-10-29T21:15:04.990000 -CVE-2024-8588,0,0,982afb02aad9aca2b6ef7952198971591b03ab1c67c8a581de1ffb951eac0ef3,2024-10-29T22:15:05.950000 -CVE-2024-8589,0,0,7e53cac6315dbec96472d9aa53bb492c6fce4c6c198ad9d40d3ccc21372d43c7,2024-10-29T22:15:06.133000 -CVE-2024-8590,0,0,7e838961696a82830a45b846f4f08ee9bf489c82acc586201339a763e243d274,2024-10-29T22:15:06.340000 -CVE-2024-8591,0,0,9012b03b7d43a7e70fb4975b18b5c20a24bbca0491ab7eeb4b25741b50bd40fb,2024-10-29T22:15:06.537000 -CVE-2024-8592,0,0,e3ad780bc8ad3f8b1cd9b580c98089832d27031b9cf70aaf5dd96f812e91f313,2024-10-29T22:15:06.713000 -CVE-2024-8593,0,0,ac5cecaca48d866b022d0c508e9cb0e3f4d3bf316a5fde878b3dfe45029811f1,2024-10-29T22:15:06.907000 -CVE-2024-8594,0,0,060c9f82eef4047a469a23dab29b97578d685ae774338715ce0d80463a529ab8,2024-10-29T22:15:07.103000 -CVE-2024-8595,0,0,24c3829751f60e54e529714b36dcbff97ea08c78995f5ac658e376bf1b2c3647,2024-10-29T22:15:07.300000 -CVE-2024-8596,0,0,66391933e44c16aec3dec4c096cb8b3cbc32cba379c2809bce4f823f0c36e093,2024-10-29T22:15:07.510000 -CVE-2024-8597,0,0,141d3061f1716b903d1f8bdd7fd99803002c682bf9df021d8544a77197da4175,2024-10-29T22:15:07.703000 -CVE-2024-8598,0,0,a61e79c4a73b638b1ea4810a51f81490b77a42e8d431148546d19e4cefad6b2d,2024-10-29T22:15:07.917000 -CVE-2024-8599,0,0,114f61919ee54834a67a03cf04380123799f9e9e86d0d3a4d48a96f04fb52ed2,2024-10-29T22:15:08.130000 -CVE-2024-8600,0,0,52f11658a750df1a8bc9d978cf9698909144dca2badd9434a8faed346e462141,2024-10-29T22:15:08.330000 +CVE-2024-8587,0,1,2f68591d292411de910db25ed917cb14b296f3ef63f87659d4039f12e7fdebc7,2024-11-01T12:57:35.843000 +CVE-2024-8588,0,1,4b543071f722cc2b67444c10fe6a055bcfc5d9ea90c5026da7c62f5b37d04838,2024-11-01T12:57:35.843000 +CVE-2024-8589,0,1,6aedb840328ea3f42005d7e6b91aa148f16c19b6b807ecb5fddfa48865afcd23,2024-11-01T12:57:35.843000 +CVE-2024-8590,0,1,6cca291b1e72e10539423de65655c13a09a972a64922cf9e6b4a56602ca84e12,2024-11-01T12:57:35.843000 +CVE-2024-8591,0,1,e77e24a7205f3d18ad519ea4c36b3c0440994218ce6ed22019fcf94190b9862f,2024-11-01T12:57:35.843000 +CVE-2024-8592,0,1,8d90750f1f16631da56cd6572de33f6013e599e57dae512c22e4a003ae30500e,2024-11-01T12:57:35.843000 +CVE-2024-8593,0,1,9faf78b59db7a9570b8d2a0c2509e115f1e28af314d2b3696825e0e34bfbfcba,2024-11-01T12:57:35.843000 +CVE-2024-8594,0,1,103eefb6d370611812515ce605169922864c9e4614777e40c33ca6999134ac87,2024-11-01T12:57:35.843000 +CVE-2024-8595,0,1,fe953a98a13c0e9c9f43939420bed0c09c0935cb6d817596ca0d5010d899df12,2024-11-01T12:57:35.843000 +CVE-2024-8596,0,1,0956e9a598a1dca327c495844e81940886de797005cebe4f4dd42c1024ea2c94,2024-11-01T12:57:35.843000 +CVE-2024-8597,0,1,fb91dd468eeea8c6cc9d184a23bba1d721fdf41e1ebccbcd5c056e463b922ddd,2024-11-01T12:57:35.843000 +CVE-2024-8598,0,1,ff45b67a8c7dcc87aae20595ab9a9f610576a9ede34b7166a621481162190ea0,2024-11-01T12:57:35.843000 +CVE-2024-8599,0,1,7a98ce6d09af10e471c671971fdff448342b8c5199cf0c9929ecfd932ff1ed8c,2024-11-01T12:57:35.843000 +CVE-2024-8600,0,1,2e4843a603a50c2b8fd6cc4ec6f7cd676e07a2828f7925fef1b3d1b4b1859cd8,2024-11-01T12:57:35.843000 CVE-2024-8601,0,0,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b36e,2024-09-17T17:54:39.767000 CVE-2024-8602,0,0,26fdf37285981a60690805f7d4493045b3ed4389334ade9ac0bbb8a88e3fc190,2024-10-15T12:57:46.880000 CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000 @@ -266988,7 +266991,7 @@ CVE-2024-8623,0,0,b38d11e5ea040f7d1c1df76eb8b329847342918d3746a88d315f2eac790411 CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec06617,2024-09-26T16:45:40.470000 CVE-2024-8625,0,0,f79ace646c1451369693b1b55d98f664dd2f063ae53ec6e9cd8ea8f5cea7ce35,2024-10-24T13:56:29.230000 CVE-2024-8626,0,0,0a3a6a067accd62c7f1e4362c07a97c5507716edc2a0ef32e9c35b5c51ec20a4,2024-10-10T12:56:30.817000 -CVE-2024-8627,0,0,2742a6efa451b45c28d6643275d527fe01f9196c77200c91fcabcbf65528712c,2024-10-30T03:15:04.360000 +CVE-2024-8627,0,1,ac4e218e13635698da2f0d9cd9530e83cc943aaa9477bdbc47831682773e3b7a,2024-11-01T12:57:03.417000 CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102be,2024-09-26T16:42:16.700000 CVE-2024-8629,0,0,6c9063bb86e9be09fbe263c2afa91e0d043c7779d47db076384be2da04357d8a,2024-10-10T12:56:30.817000 CVE-2024-8630,0,0,c5e92ea3475e7fdf4ce18793c10b7cc1fb102a32792867098f992a914ab99d4c,2024-10-16T13:15:59.997000 @@ -267108,7 +267111,7 @@ CVE-2024-8787,0,0,697959dd00ebdc9b4d866bc462eeca4254ff62268820b8cc5f18a9f4531e0e CVE-2024-8788,0,0,109bf9bb3aa314390f1c0b3dee4d54ea5d0e02bbb648b956ffff0a9dad06b2f6,2024-10-03T17:25:41.467000 CVE-2024-8790,0,0,c35e20798e104d347809d26eec2137cb82ecdc52b92a3f74d2215cdbc40f5b61,2024-10-29T14:44:59.497000 CVE-2024-8791,0,0,fb5b0ac36efac34bc9b2b46a1f471f8bc629f8b19dafbbe4161ffb4834ecffd5,2024-09-26T16:25:34.120000 -CVE-2024-8792,0,0,74e5a132063a8e877d62f04206c399f8620c3aa8ad04865f02910ca59a5a9340,2024-10-30T03:15:04.583000 +CVE-2024-8792,0,1,e7f8aff638f10f3549ed8940a7a7008d474e5ba05f37e2e34c5dada696d056c9,2024-11-01T12:57:03.417000 CVE-2024-8793,0,0,959b266c850b42df4ff44733c3776bf7c1d0fcf64b78d7cab419106b5de40dbb,2024-10-07T16:04:08.490000 CVE-2024-8794,0,0,71d6f226610d884ee512fa4051f8594e0cafa29b4878c9ac672c3de2ccd4c022,2024-09-26T16:23:46.740000 CVE-2024-8795,0,0,f7b3fc89482c22947a1a26e63d2f04d7dee1f77ad827021897b332709b04072d,2024-09-26T16:46:55.587000 @@ -267134,7 +267137,7 @@ CVE-2024-8867,0,0,379e34cf940a9b1358241a2155237c1f9d3d38d48143e1ed89b8af75caf7d4 CVE-2024-8868,0,0,90fb6fa23c2a5505d69614ac49fd1c537f25b76ba9e82d49d07e437e4df1c667,2024-09-17T10:59:28.233000 CVE-2024-8869,0,0,eaa7c70f03f38bcd808caaf5c9917ef912247cecdfb7f5fef4110fc2bf4de330,2024-09-20T16:59:22.560000 CVE-2024-8870,0,0,a8ca41609dd570e7dbf6ada5503a957f6d86f9197ffc9ad53e763e24ea54852d,2024-10-28T13:58:09.230000 -CVE-2024-8871,0,0,fb3102ceadcef4987d1e6484ac512d8d56bf2e3ec83fdb9e09fe731dcc4cf594,2024-10-30T06:15:16.460000 +CVE-2024-8871,0,1,9aa028ea04226a6cf84eebdd2f1bc09b571137b587a5afcc0e34e041e00067b3,2024-11-01T12:57:03.417000 CVE-2024-8872,0,0,a59fbf98e5a02680c9463d07c5c7731b213fd42229816cc8689de00fdc1cc0eb,2024-10-01T13:42:57.860000 CVE-2024-8875,0,0,285b537766851a72a752adea85efa81abdeba3e4c5af2afdcf8485ecb658237e,2024-09-20T22:44:16.077000 CVE-2024-8876,0,0,adf401fb4b8b2c24f06ac7d28fd2360497bd835317abc655be39e3ccb04a97b8,2024-09-20T16:58:24.333000 @@ -267150,7 +267153,7 @@ CVE-2024-8889,0,0,47ebe4e7e88282b92868239007944fdd0eaf70654178d70e20d6079607f76e CVE-2024-8890,0,0,853fdfae0cb7e409cedb2bfde6ac5084d9565e6d8770bf21e4fc31a9e1d858a1,2024-10-01T15:46:33.750000 CVE-2024-8891,0,0,aa12a440054ffbd9bbb7dd25787b2c9efe1fc6e33a09eaeb1daa5594da775bc2,2024-09-26T18:50:56.827000 CVE-2024-8892,0,0,b5404a9c6df12d8f66b57eddda13f138d35d7b48bdd71ae1e8b3a805c49716e0,2024-10-07T17:10:26.673000 -CVE-2024-8896,0,0,a0c605576448a2e11080223e5dd725b3d72b9db8a933f1d2fd38560e97af6299,2024-10-29T22:15:08.513000 +CVE-2024-8896,0,1,d5fb07af88d00ed00a8ddccb3228f76296e2b65147a9c6a2d98da31b149bd0fe,2024-11-01T12:57:35.843000 CVE-2024-8897,0,0,73bf9affb964d11dd95d3adbb34f86a16b9ae0fd786e64b4bbd48b1e4387bb49,2024-09-25T19:49:02.493000 CVE-2024-8900,0,0,d930082a3862c99b4e58aa6993c3377fe493c46938169528591b4cc486e72a25,2024-10-30T15:35:26.207000 CVE-2024-8901,0,0,c42abead2f721e44cbad55763c07a3fd24e0a842c194ee61580274699db985ca,2024-10-23T21:15:14.950000 @@ -267175,12 +267178,12 @@ CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc5 CVE-2024-8920,0,0,42fc84557f46536ee5298e40d09a285310a4aead85db529ff9c7f89249448d09,2024-10-18T12:52:33.507000 CVE-2024-8921,0,0,284c01e369230b6750ee6b9940d65eaadc6d5f92caf4598fee3000ae2f72d29e,2024-10-16T16:38:14.557000 CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000 -CVE-2024-8923,0,0,1a1c008c7cd10c982e2e742709b2930fd5916241742fc2a1b2a9a4a46bfb6b34,2024-10-29T17:15:04.870000 -CVE-2024-8924,0,0,329d97b4ddecec7a888f06c50c8c22d832c133b4f48330aff42c5aebe55b0404,2024-10-29T17:15:04.983000 +CVE-2024-8923,0,1,f110fcb47d72a354578cbdc6b17e353a16a43939522b48205aee6ac09107a2f7,2024-11-01T12:57:35.843000 +CVE-2024-8924,0,1,5db34675e94eca041ff834f7e1dfb6132422da3b83ac3b8aa1520b858620e7a2,2024-11-01T12:57:35.843000 CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000 CVE-2024-8926,0,0,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000 CVE-2024-8927,0,0,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000 -CVE-2024-8934,0,0,4476715996367104e5b45ab5e682dea180869422f2a6c8aa1565264f21f9aec1,2024-10-31T13:15:15.040000 +CVE-2024-8934,0,1,789f8344b6df6edb5211621d37606fc9508b8d9f2a3341baf4696f0f5274b977,2024-11-01T12:57:03.417000 CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000 CVE-2024-8940,0,0,8c62b13b4d198a54cb56580861e41476c7bb8758f7b9eb8762dc3ff8a4d7701c,2024-10-01T17:21:01.550000 CVE-2024-8941,0,0,92a203d8a6a94e9c82aca27b5b4eb25cc17b0659508e43ff25edbb70a0d6f393,2024-09-30T19:45:43.223000 @@ -267295,7 +267298,7 @@ CVE-2024-9105,0,0,0cdbd87fc1daf91e234d9d55d0a069fe1f153017fe382631f31d8e30d34561 CVE-2024-9106,0,0,e27db71c396a4ccaf2c72a333395893b81bc19abafa7c4f380f448da576e2d26,2024-10-04T13:51:25.567000 CVE-2024-9108,0,0,a5bd0d20b10740e2633e894f79cde5eedf60bb1d894cbb8ab0abf2750035a6b9,2024-10-04T13:51:25.567000 CVE-2024-9109,0,0,92ffc81317d04a5f58ae681583509b482d53f08c836f7e996194793f616d35bb,2024-10-25T12:56:07.750000 -CVE-2024-9110,0,0,83da4389515507c44e2c5e707c8635b39d7fcc581e881ed5b53ecf8aec62e678,2024-10-30T17:15:14.177000 +CVE-2024-9110,0,1,1a461867668dc133a20a6da6763cb89c61062d9d68bd15e880bd01b64cd8f13f,2024-11-01T12:57:03.417000 CVE-2024-9115,0,0,1c4e70138ee9590ca65c2e328b29e5a87d064a3f49c7286913d14c3952d00fc4,2024-10-01T13:47:25.403000 CVE-2024-9116,0,0,6ad6ee3b57ea62c4d5b3e8fc83d1f8a6dcbcd94ec854a42b3db11ddd2d087efb,2024-10-28T13:58:09.230000 CVE-2024-9117,0,0,77f0703e7ba19b3d087cb3250573807a507cc3ac6f6e62f26867d41b190dba74,2024-10-01T13:56:55.893000 @@ -267326,7 +267329,7 @@ CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b CVE-2024-9161,0,0,b475702d9da1cd18a82129e88647b71b0425c30925f01e0c024257c76be8d651,2024-10-07T17:48:28.117000 CVE-2024-9162,0,0,19849f839379b431640de2681a2a308ff729e739d32bd6a2055cb38e03920edd,2024-10-28T13:58:09.230000 CVE-2024-9164,0,0,22a852044a02fa2bf2a1f004c8f4e0e1dbd359605b1a68593f6ac0ec4a57bdec,2024-10-15T12:58:51.050000 -CVE-2024-9165,0,0,f337596c37d4ab7b3610520649818b2985f2d19cbbc255664771eae7e89fce61,2024-10-31T07:15:02.647000 +CVE-2024-9165,0,1,ea3f0f55660903ccb5b8258083c04d454fbc2904c6c551c0c30cae6774f4ac71,2024-11-01T12:57:03.417000 CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000 CVE-2024-9167,0,0,c76cdd3c3965eaf83c5e43b4dbbb850b39e5a19995695c4b4450dc70c8263305,2024-10-10T12:56:30.817000 CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000 @@ -267462,7 +267465,7 @@ CVE-2024-9382,0,0,9974cbae3b65aba95d0b7e51ea5485cc9f96ba1c03eee8eb0122ba4567d68e CVE-2024-9383,0,0,bcbb779641918c0449c8c1e715b100b70d4ebd612997069770f4fe494807a125,2024-10-22T14:27:13.377000 CVE-2024-9384,0,0,a6a408c481cce62ffd2afe76e175a7a94a46c764ed46cc8221ec17248ad3b62d,2024-10-10T20:52:33.333000 CVE-2024-9385,0,0,0d2e28a3f2481a04ce784fbf885d088010920135683d5ffb6adf8001c8688dc2,2024-10-07T17:48:28.117000 -CVE-2024-9388,0,0,009230a12615f1bb2e717bad5419f25943ec085386cae195436492e6c2697f58,2024-10-30T11:15:16.297000 +CVE-2024-9388,0,1,764a304573576a5fe1426e0fe465ec61e821b8474424dcb9c99282c3b30b6587,2024-11-01T12:57:03.417000 CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000 CVE-2024-9392,0,0,beca44e590b21e5502ca4e733f60749ac893cd13053addd71013500d8f613300,2024-10-04T13:51:25.567000 CVE-2024-9393,0,0,db59aa733a962fd145e1e4784b7a62c0f1f699599f513fdc3af9c19b1068eebf,2024-10-30T17:35:18.107000 @@ -267483,13 +267486,13 @@ CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ff CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000 CVE-2024-9414,0,0,5c21f14ec376abe57dfce5e862247c317429afdd9c8e1a9c0b90f9672b7f519b,2024-10-18T12:52:33.507000 CVE-2024-9417,0,0,c74a648d5508a7a2c2d3e505619e54040658d58791e6150e9a0fe8cbf972b416,2024-10-07T17:48:28.117000 -CVE-2024-9419,0,0,de7d0cde54d42021a802d6b7be3bc5b8e5ef5abf6921100f08965fc41996e730,2024-10-30T18:15:08.260000 +CVE-2024-9419,0,1,a3f1d241a393213976f2495a35f5bc1427a284fa16c4a0b19d1f7c056beff495,2024-11-01T12:57:03.417000 CVE-2024-9421,0,0,c9b1d003792a28014f7a9846d6ca15c83ef06308c8117d3bc2489a9bd808c180,2024-10-10T20:59:01.600000 CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000 CVE-2024-9425,0,0,bc1d05d29533f5db80147aca0ebcf5dcf1807c002307822e9b1efd4c274ae327,2024-10-22T13:55:04.537000 CVE-2024-9429,0,0,39a47d098a68b52cf32f59e1969df9e75a8cf523aa1e072e6df455fffe62a5c0,2024-10-07T20:15:10.567000 -CVE-2024-9430,0,0,343ab8e698e5a824bffdf21f0a8f67e282aa8c553610a87865769cb1446aee98,2024-10-31T07:15:03.253000 -CVE-2024-9434,0,0,0956ea1d79e0dec0894f68509ef66e1915d7cba46bc05c559aba7189ce79508f,2024-10-31T07:15:03.497000 +CVE-2024-9430,0,1,4fa81a8d136df8ffb8922ab0d9024692836b1e78be97844ec16b810f0e03dd76,2024-11-01T12:57:03.417000 +CVE-2024-9434,0,1,79d9ee229ea07912fe660d5aecc73644854130ed033cb358b3e5a09b73a525ac,2024-11-01T12:57:03.417000 CVE-2024-9435,0,0,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40cd6,2024-10-08T16:22:40.780000 CVE-2024-9436,0,0,e30b504278d7461ced9f3cdf7218be31f384e3265b531ba87e7d14e133fbe3e1,2024-10-15T12:58:51.050000 CVE-2024-9438,0,0,f23988b383ffc7b9a8be3f13a0e81848cd3463f82ea0b782cf2d1c7c8dbf0f4a,2024-10-29T14:34:04.427000 @@ -267497,7 +267500,7 @@ CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b9 CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000 CVE-2024-9444,0,0,5871ece6e08e2e034d7a3616fcef31689e8667809591fe9662a10d21d3c836c0,2024-10-16T16:38:14.557000 CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000 -CVE-2024-9446,0,0,f27c54afd2fa97720ca1e3d59ee381addf697bb4244685d9109c9accbdbcf0fe,2024-10-31T07:15:03.740000 +CVE-2024-9446,0,1,ce212af157adf5dba66ecf45f7719333badce295758f6451954bbe4734f3b969,2024-11-01T12:57:03.417000 CVE-2024-9449,0,0,cfb15c20f0e2d2639784936ce05b9d4995f794dc20e1235b71d532f9a502b8fe,2024-10-10T12:51:56.987000 CVE-2024-9451,0,0,bfba756188c29e076bb119887d9bdf6d3874c705a9d59100000802c164b86caa,2024-10-10T12:51:56.987000 CVE-2024-9452,0,0,7eb2217e5eb4f5560cd9b75a09c78b5c11eea85f09a819264a7f744adf0ba17a,2024-10-22T16:23:59.420000 @@ -267525,7 +267528,7 @@ CVE-2024-9484,0,0,3f1e4bdc376cc95b97b5c0150a8d7b1a17051d92adc32b058eb06edb62f443 CVE-2024-9486,0,0,1369350ab2629110ffa188dbd15b41ead2245f88a49115aa36147be3bd87c74e,2024-10-16T16:38:14.557000 CVE-2024-9487,0,0,e3a385658c66fc500363f16f3c27f6fce25e7b265fffe42414ebb85b7cd7e9a7,2024-10-15T12:58:51.050000 CVE-2024-9488,0,0,3154f25401247f46098357ebd2d84fe95bb2164e861af1c275743e022d6c3976,2024-10-25T12:56:07.750000 -CVE-2024-9489,0,0,09fd4a2a95dcd03917f853a7ea1dba8bde73b0fceba3df1b093f3994b7368ff9,2024-10-29T22:15:08.703000 +CVE-2024-9489,0,1,47cc0b037485844e12885e29f2eecdad57e77211d7b348f322773585ef7dece6,2024-11-01T12:57:35.843000 CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b604,2024-10-28T13:58:09.230000 CVE-2024-9505,0,0,134fdf0964e1ec52ef4b47c0af3083cd4691e60ed884fd2512ddc6dbb615a8df,2024-10-31T16:39:41.193000 CVE-2024-9506,0,0,fc042b04aa147d17b390b33fa64fff12c26897968128764931f8bf3b1a3e0722,2024-10-16T16:38:43.170000 @@ -267615,7 +267618,7 @@ CVE-2024-9627,0,0,2b255751ca76c819864c389a91dcfc3f65321be83e43cc5abce958b149b5f5 CVE-2024-9628,0,0,61a27472b9da741357728e2747c61581a42641370f854cfe14defa2dd6861d0b,2024-10-25T16:15:10.160000 CVE-2024-9629,0,0,31c72e7d62d8dbf8ba1681676a61a2f04680ade1749c367b775242f4864b6d17,2024-10-29T14:34:50.257000 CVE-2024-9630,0,0,95cf42fc9d833aab63558caaeb38c94fd9570f2d1a1e45300ec7feb07db9cd04,2024-10-25T12:56:07.750000 -CVE-2024-9632,0,0,ed390500d64d28144352bd51532046d99e58de965fb58088f03e235e81497f9a,2024-10-30T08:15:04.830000 +CVE-2024-9632,0,1,c65471194f9c278496869fb2170801215125ba6abbbfc188d9646b5701135912,2024-11-01T12:57:03.417000 CVE-2024-9634,0,0,d64c376a2cd176bba19f7a8121026bf8ac88c7cb95243ab4e56bfc5d5fa1c1d3,2024-10-16T16:38:14.557000 CVE-2024-9637,0,0,bfd23401e1c5bf70ae99ee491fd04ce8ab223b8247ed87e78ca84ed9446a1b72,2024-10-28T13:58:09.230000 CVE-2024-9642,0,0,647a46d1d1e49bfca6a77d0bd6bf95c53250c168d1d2756cdcd405ced420913f,2024-10-28T13:58:09.230000 @@ -267623,7 +267626,7 @@ CVE-2024-9647,0,0,6da0b5c2c888d90e6f29cb1f98cdc0c7a4315eaaa058e1c781c3c46d5b8615 CVE-2024-9649,0,0,f2ab83afff02bfae827ac0ac8958125c0d2707e9b7d72806aa0e09daf73ca0d7,2024-10-16T16:38:14.557000 CVE-2024-9650,0,0,c785e5c8b40ec3a7d0b9a0e25f6978363c5dcc2fc6507b9c6a2c03a208ac34e9,2024-10-25T12:56:07.750000 CVE-2024-9652,0,0,096af9c07df6f24ff5a9459bed95d6ce45b4a430b6f907d5bc85c0d2be3b93b5,2024-10-16T16:38:14.557000 -CVE-2024-9655,0,0,bd7102085fae8d08a785f742ef0c0b0c3f0acc32ec2662bdb03ce71482a86442,2024-11-01T08:15:12.047000 +CVE-2024-9655,0,1,3320de4caba420aff675473bbcf46fc1de59a784259a889e904f3cf6e797add0,2024-11-01T12:57:03.417000 CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 @@ -267638,11 +267641,11 @@ CVE-2024-9686,0,0,04f98af9d8ec4af01a3d35842aedc3b86f9dda8a517693baa9ea958d531796 CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000 CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000 CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000 -CVE-2024-9700,0,0,86d43e3258814c9b3221f4a7cef6a637c42eb7641d5049f13c88b2bc609e1e95,2024-10-31T06:15:05.350000 +CVE-2024-9700,0,1,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000 CVE-2024-9703,0,0,dd5db55cccdddcc3b58f6b494a8ef777447f72688cd0a2c60dac8e42fee7b6a9,2024-10-22T15:25:27.887000 CVE-2024-9704,0,0,44ebf677ae69495b92126e2eb8d9d17c07544c8235e40f4412f83b24b48e2f3a,2024-10-15T12:57:46.880000 CVE-2024-9707,0,0,cde0816a76e7682ea9f7dc3a69f12238a4d95599cfec418d205198361a6879cf,2024-10-15T12:58:51.050000 -CVE-2024-9708,0,0,72aa52c75c8710790c61daf5c470f02558b14e6542fbc68dae657f839c85ee2e,2024-10-31T03:15:02.737000 +CVE-2024-9708,0,1,08bc1437568decedc8d133fc5b87f480913bc1f7eb502b0ca93b4d7f941cdca2,2024-11-01T12:57:03.417000 CVE-2024-9756,0,0,8173cad728731052b89b4b59f3b4da8665b01e9fe6a8b575d907d967b2da6473,2024-10-15T12:57:46.880000 CVE-2024-9772,0,0,0d1b30d428fb6796ba367d377c6619e6bf9b25cc03796237a99e8a8d275b84f3,2024-10-28T13:58:09.230000 CVE-2024-9776,0,0,82a616b68a2c5818c813f35d61772c622935aa1b119f178b9eaa21355bac63d9,2024-10-15T12:57:46.880000 @@ -267688,11 +267691,11 @@ CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000 CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000 CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de713790a,2024-10-29T14:34:50.257000 -CVE-2024-9826,0,0,f055ba36c13c64a3425af7e05687af44ba51a02833bdf92ca35753b6555971c8,2024-10-29T22:15:08.900000 -CVE-2024-9827,0,0,0ce926864705d882b9206f44ad5850e01c01381e4edb18a7c9d371fbfbb84269,2024-10-29T22:15:09.100000 +CVE-2024-9826,0,1,b087b422da2416777c8b68209b6d3a807c42b630a2acb5e1a75466df1ba87a35,2024-11-01T12:57:35.843000 +CVE-2024-9827,0,1,03e9f19029398ef5bffaac2accc7a89b2675d319165459aa48f6c95aa101a52e,2024-11-01T12:57:35.843000 CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000 CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000 -CVE-2024-9846,0,0,4cda348acaf5217ad89446643756920fc691c3a328063ad1ca6c9a149040f6ee,2024-10-30T03:15:04.820000 +CVE-2024-9846,0,1,7644f2fa32130ead06ade64ae6a493e411607d75c38a603491e302093a4e9ecb,2024-11-01T12:57:03.417000 CVE-2024-9848,0,0,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000 CVE-2024-9853,0,0,b003ea260222d309866f9bc6bcac4c0549c1930cf36d8d49eac92c8d99d9053c,2024-10-28T13:58:09.230000 CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000 @@ -267707,9 +267710,9 @@ CVE-2024-9864,0,0,ecd679b570a8abacc1db8d694db02ae1ea10c97942981b05302fe359da1cbf CVE-2024-9865,0,0,767ca346f0a1ff11496989a87fd401620d0792dff4b8ce54d6dd2bc8cbb6f984,2024-10-25T12:56:07.750000 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000 CVE-2024-9873,0,0,54e1b937a83aa8c512a9ce3ab381594073150b73716fb01cf60c5f6e4db0c415,2024-10-16T16:38:14.557000 -CVE-2024-9884,0,0,417fcaeff665ce444be5271328c7156afe396eff19491d0c993e59dfd89fa283,2024-10-30T03:15:05.067000 -CVE-2024-9885,0,0,41e036b784dfedf39935804874e04e659e2fc01345a78ac0bc53175e7144eee8,2024-10-30T03:15:05.283000 -CVE-2024-9886,0,0,c545b419b55e23b8837eadde37947a09b52060fa1f2d86998305777359f737c7,2024-10-30T03:15:05.507000 +CVE-2024-9884,0,1,757f98f3275a3bf4e9b1e819bb018e139225ae1ebee044e7c027a7c44897e089,2024-11-01T12:57:03.417000 +CVE-2024-9885,0,1,eba2ae86e119460d513882eefada4208486dcdf1501994be9aa95d7bb726e2cd,2024-11-01T12:57:03.417000 +CVE-2024-9886,0,1,2d0240a7ec94642b6f1f1ed4572b40ffdd3dbdf8ae33aee8a7b267be1166a129,2024-11-01T12:57:03.417000 CVE-2024-9888,0,0,de5de1e3177c72ea1d0a5d19aa48b1693390bd1baf1f85524c962ffa2c18433f,2024-10-16T16:38:14.557000 CVE-2024-9889,0,0,ae2d8b3ae5ea45b7bf6ef4fc45ab8d1cf63876d506d81aa02cc186300793ec67,2024-10-21T17:10:22.857000 CVE-2024-9890,0,0,d7f68ba62671a34c8b89dcbd3c5c40cfcc4d5decfd7c261059a9e135d650d182,2024-10-28T13:58:09.230000 @@ -267790,9 +267793,9 @@ CVE-2024-9984,0,0,8e8b1dff68b77e14ce417f91873fee227d0458654a790688014355062c7539 CVE-2024-9985,0,0,35f031595deb3bfd21882874fada51cff590c3c6a37f03f4259fa4136f5b9157,2024-10-16T22:02:08.117000 CVE-2024-9986,0,0,f83b3609bd670a0cfc3a1c687a45465cc896c6d69e9f1c37efb33a43ca882e79,2024-10-21T13:07:47.700000 CVE-2024-9987,0,0,b4e78fb8d0c1bab610593085dcb79fb387a1d85dc24b4ac387edaf5184ee7742,2024-10-25T19:06:35.350000 -CVE-2024-9988,0,0,58433c05029d9c569d3f28a63e34b08c51240dd4434ea3e597388fdae5562825,2024-10-29T17:15:05.227000 -CVE-2024-9989,0,0,320ed77d3aa97170fc244ba74fe5ddfc3438f8cf8230ad18b3c7ebec643706e9,2024-10-29T17:15:05.463000 -CVE-2024-9990,0,0,94018f02836bf5c840641be68f5ed07996d46dbd4d58aab5bb268a59dd3443d9,2024-10-29T17:15:05.707000 +CVE-2024-9988,0,1,c243e43c539a1af40101279b7bf824df81ff81ed3e6c8d5b3950660925db94b9,2024-11-01T12:57:35.843000 +CVE-2024-9989,0,1,e44fe8a521d704879a2684ca6365ce0fa640e4051bcdadeb4c76d0ba2d840b15,2024-11-01T12:57:35.843000 +CVE-2024-9990,0,1,b12d53ed12c75a4e26c17e1e627829c6fd6bf5915791461646780acfa9bf76ca,2024-11-01T12:57:35.843000 CVE-2024-9991,0,0,adb978eaa002da8be608de3b4e550af4ed1a2d2f51d6542eb9fa168b402820e2,2024-10-28T13:58:09.230000 -CVE-2024-9996,0,0,64f8f89330045e44ed8468f5426ce137d6022ed1b04246d695447a5dc9050ca3,2024-10-29T22:15:09.287000 -CVE-2024-9997,0,0,c3de828b3b7e9bbc594b33269214027fccbac53a06f73c20bcf87f3bcebefc15,2024-10-29T22:15:09.490000 +CVE-2024-9996,0,1,4957fcd72591bb71766edb5c22eef3af3c9271b398618d3aa853cb7963bb239a,2024-11-01T12:57:03.417000 +CVE-2024-9997,0,1,406c009354070afd98f41fbc14ccc6f0486b8461e760950359351117fa429bc3,2024-11-01T12:57:03.417000