diff --git a/CVE-2005/CVE-2005-100xx/CVE-2005-10003.json b/CVE-2005/CVE-2005-100xx/CVE-2005-10003.json index 967c26fd9e1..c487b421884 100644 --- a/CVE-2005/CVE-2005-100xx/CVE-2005-10003.json +++ b/CVE-2005/CVE-2005-100xx/CVE-2005-10003.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-17T14:15:03.800", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", diff --git a/CVE-2016/CVE-2016-101xx/CVE-2016-10146.json b/CVE-2016/CVE-2016-101xx/CVE-2016-10146.json index a1bc8118a60..9cba9500138 100644 --- a/CVE-2016/CVE-2016-101xx/CVE-2016-10146.json +++ b/CVE-2016/CVE-2016-101xx/CVE-2016-10146.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@debian.org", "published": "2017-03-24T15:59:00.480", "lastModified": "2017-11-04T01:29:15.787", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7531.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7531.json index 5863c8f7386..faacc763c19 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7531.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7531.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@debian.org", "published": "2017-04-19T14:59:00.473", "lastModified": "2017-05-09T12:39:15.447", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20195.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20195.json index 70d1b072f61..233e8020a59 100644 --- a/CVE-2017/CVE-2017-201xx/CVE-2017-20195.json +++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20195.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in LUNAD3v AreaLoad up to 1a1103182ed63a06dde63d1712f3262eda19c3ec. It has been rated as critical. This issue affects some unknown processing of the file request.php. The manipulation of the argument phone leads to sql injection. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 264813c546dba03989ac0fc365f2022bf65e3be2. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": " Se encontr\u00f3 una vulnerabilidad en LUNAD3v AreaLoad hasta 1a1103182ed63a06dde63d1712f3262eda19c3ec. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesamientos desconocidos del archivo request.php. La manipulaci\u00f3n del argumento phone conduce a una inyecci\u00f3n SQL. Este producto no utiliza control de versiones. Por este motivo, no est\u00e1 disponible la informaci\u00f3n sobre las versiones afectadas y no afectadas. El parche se llama 264813c546dba03989ac0fc365f2022bf65e3be2. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2020/CVE-2020-263xx/CVE-2020-26303.json b/CVE-2020/CVE-2020-263xx/CVE-2020-26303.json index 414f7c658c9..f3bd5cb5ee4 100644 --- a/CVE-2020/CVE-2020-263xx/CVE-2020-26303.json +++ b/CVE-2020/CVE-2020-263xx/CVE-2020-26303.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-26T21:15:13.460", "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-263xx/CVE-2020-26304.json b/CVE-2020/CVE-2020-263xx/CVE-2020-26304.json index bee0c19c474..b4fb3c9b964 100644 --- a/CVE-2020/CVE-2020-263xx/CVE-2020-26304.json +++ b/CVE-2020/CVE-2020-263xx/CVE-2020-26304.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-26T21:15:13.673", "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-263xx/CVE-2020-26305.json b/CVE-2020/CVE-2020-263xx/CVE-2020-26305.json index 48481cac53e..f22f61c8a6f 100644 --- a/CVE-2020/CVE-2020-263xx/CVE-2020-26305.json +++ b/CVE-2020/CVE-2020-263xx/CVE-2020-26305.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-26T21:15:13.783", "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-263xx/CVE-2020-26306.json b/CVE-2020/CVE-2020-263xx/CVE-2020-26306.json index 65bdda38884..a36a862b9b6 100644 --- a/CVE-2020/CVE-2020-263xx/CVE-2020-26306.json +++ b/CVE-2020/CVE-2020-263xx/CVE-2020-26306.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-26T21:15:13.883", "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-263xx/CVE-2020-26307.json b/CVE-2020/CVE-2020-263xx/CVE-2020-26307.json index 7185f487819..780616ba2b0 100644 --- a/CVE-2020/CVE-2020-263xx/CVE-2020-26307.json +++ b/CVE-2020/CVE-2020-263xx/CVE-2020-26307.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-26T21:15:13.980", "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-263xx/CVE-2020-26308.json b/CVE-2020/CVE-2020-263xx/CVE-2020-26308.json index 985730b7a0d..39935ae24b6 100644 --- a/CVE-2020/CVE-2020-263xx/CVE-2020-26308.json +++ b/CVE-2020/CVE-2020-263xx/CVE-2020-26308.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-26T21:15:14.087", "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-263xx/CVE-2020-26309.json b/CVE-2020/CVE-2020-263xx/CVE-2020-26309.json index 3c56d30bf0d..b0dbd8dd504 100644 --- a/CVE-2020/CVE-2020-263xx/CVE-2020-26309.json +++ b/CVE-2020/CVE-2020-263xx/CVE-2020-26309.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-26T21:15:14.190", "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-263xx/CVE-2020-26310.json b/CVE-2020/CVE-2020-263xx/CVE-2020-26310.json index 72338659cfc..3a3935d121a 100644 --- a/CVE-2020/CVE-2020-263xx/CVE-2020-26310.json +++ b/CVE-2020/CVE-2020-263xx/CVE-2020-26310.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-26T21:15:14.297", "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47580.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47580.json index 49914163d5c..70969c152c2 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47580.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47580.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:52.537", "lastModified": "2024-11-05T15:35:02.187", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4974.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4974.json index 3433cb85720..2fc8517e765 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4974.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4974.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T07:15:12.760", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-267xx/CVE-2023-26785.json b/CVE-2023/CVE-2023-267xx/CVE-2023-26785.json index af079782f84..37c1a0da26e 100644 --- a/CVE-2023/CVE-2023-267xx/CVE-2023-26785.json +++ b/CVE-2023/CVE-2023-267xx/CVE-2023-26785.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "MariaDB v10.5 was discovered to contain a remote code execution (RCE) vulnerability via UDF Code in a Shared Object File, followed by a \"create function\" statement. NOTE: this is disputed by the MariaDB Foundation because no privilege boundary is crossed." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que MariaDB v10.5 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE)." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27517.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27517.json index e7e47799e35..d482da4174f 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27517.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27517.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:47.313", "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29114.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29114.json index eb4d8e1d865..e00f3c835f0 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29114.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29114.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "System logs could be accessed through web management application due to a lack of access control.\n\n\nAn attacker can obtain the following sensitive information:\n\n\u2022\u2002\u2002\u2002\u2002\u2002Wi-Fi access point credentials to which the EV charger can connect.\n\n\u2022\u2002\u2002\u2002\u2002\u2002APN web address and credentials.\n\n\u2022\u2002\u2002\u2002\u2002\u2002IPSEC credentials.\n\n\u2022\u2002\u2002\u2002\u2002\u2002Web interface access credentials for user and admin accounts.\n\n\u2022\u2002\u2002\u2002\u2002\u2002JuiceBox system components (software installed, model, firmware version, etc.).\n\n\u2022\u2002\u2002\u2002\u2002\u2002C2G configuration details.\n\n\u2022\u2002\u2002\u2002\u2002\u2002Internal IP addresses.\n\n\u2022\u2002\u2002\u2002\u2002\u2002OTA firmware update configurations (DNS servers).\n\nAll the credentials are stored in logs in an unencrypted plaintext format." + }, + { + "lang": "es", + "value": "Se puede acceder a los registros del sistema a trav\u00e9s de la aplicaci\u00f3n de administraci\u00f3n web debido a la falta de control de acceso. Un atacante puede obtener la siguiente informaci\u00f3n confidencial: \u2022 Credenciales del punto de acceso Wi-Fi al que se puede conectar el cargador EV. \u2022 Direcci\u00f3n web y credenciales APN. \u2022 Credenciales IPSEC. \u2022 Credenciales de acceso a la interfaz web para cuentas de usuario y administrador. \u2022 Componentes del sistema JuiceBox (software instalado, modelo, versi\u00f3n de firmware, etc.). \u2022 Detalles de configuraci\u00f3n de C2G. \u2022 Direcciones IP internas. \u2022 Configuraciones de actualizaci\u00f3n de firmware OTA (servidores DNS). Todas las credenciales se almacenan en registros en un formato de texto plano." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39593.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39593.json index 4633d674729..60641564b32 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39593.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39593.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "Insecure permissions in the sys_exec function of MariaDB v10.5 allows authenticated attackers to execute arbitrary commands with elevated privileges. NOTE: this is disputed by the MariaDB Foundation because no privilege boundary is crossed." + }, + { + "lang": "es", + "value": "Los permisos inseguros en la funci\u00f3n sys_exec de Oracle MYSQL MariaDB v10.5 permiten a atacantes autenticados ejecutar comandos arbitrarios con privilegios elevados." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45561.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45561.json index 047a09798e3..2d8de6775fb 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45561.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45561.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45561", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-02T21:15:09.530", - "lastModified": "2024-01-08T19:32:10.703", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-10T02:15:13.377", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,20 +69,6 @@ } ], "references": [ - { - "url": "http://a-world.com", - "source": "cve@mitre.org", - "tags": [ - "Broken Link" - ] - }, - { - "url": "http://oirase.com", - "source": "cve@mitre.org", - "tags": [ - "Broken Link" - ] - }, { "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-45561.md", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47218.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47218.json index f71589c332b..a21a4780a66 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47218.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47218.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2024-02-13T03:15:07.700", "lastModified": "2024-02-15T06:15:45.653", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48364.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48364.json index 2dd5e9dc02a..50ff3898184 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48364.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48364.json @@ -106,7 +106,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50358.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50358.json index 922063509ad..18cdf6c43dc 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50358.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50358.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2024-02-13T03:15:07.963", "lastModified": "2024-02-15T06:15:45.960", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51370.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51370.json index c2af5033121..32224378fe3 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51370.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51370.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52044.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52044.json index cd55fd6162a..a6123d29a96 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52044.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52044.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Studio-42 eLfinder 2.1.62 is vulnerable to Remote Code Execution (RCE) as there is no restriction for uploading files with the .php8 extension." + }, + { + "lang": "es", + "value": " Studio-42 eLfinder 2.1.62 es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo (RCE) ya que no hay restricciones para cargar archivos con la extensi\u00f3n .php8." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52045.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52045.json index b8f89e80816..4aba6652362 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52045.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52045.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Studio-42 eLfinder 2.1.62 contains a filename restriction bypass leading to a persistent Cross-site Scripting (XSS) vulnerability." + }, + { + "lang": "es", + "value": " Studio-42 eLfinder 2.1.62 contiene una omisi\u00f3n de restricci\u00f3n de nombre de archivo que genera una vulnerabilidad persistente de cross site scripting (XSS)." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7021.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7021.json index db0995863ea..ce60f637f9b 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7021.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7021.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-21T01:15:34.393", "lastModified": "2024-05-17T02:34:03.620", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0105.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0105.json index 03774972d93..eeb033b6111 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0105.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0105.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "NVIDIA ConnectX Firmware contains a vulnerability where an attacker may cause an improper handling of insufficient privileges issue. A successful exploit of this vulnerability may lead to denial of service, data tampering, and limited information disclosure." + }, + { + "lang": "es", + "value": " El firmware de NVIDIA ConnectX contiene una vulnerabilidad que permite a un atacante gestionar de forma incorrecta un problema de falta de privilegios. Si se explota esta vulnerabilidad con \u00e9xito, se puede producir una denegaci\u00f3n de servicio, manipulaci\u00f3n de datos y divulgaci\u00f3n limitada de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0106.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0106.json index e643ad84bce..c0af7b1fa96 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0106.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0106.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit (DPU) contains a vulnerability where an attacker may cause an improper handling of insufficient privileges issue. A successful exploit of this vulnerability may lead to denial of service, data tampering, and limited information disclosure." + }, + { + "lang": "es", + "value": " El firmware del host NVIDIA ConnectX para la unidad de procesamiento de datos (DPU) BlueField contiene una vulnerabilidad que permite a un atacante gestionar de forma incorrecta un problema de falta de privilegios. Si se explota esta vulnerabilidad con \u00e9xito, se puede producir una denegaci\u00f3n de servicio, manipulaci\u00f3n de datos y divulgaci\u00f3n limitada de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0116.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0116.json index 3f42e36ed0b..eacae670a4d 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0116.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0116.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2024-10-01T05:15:11.920", "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10081.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10081.json index be9a95d1d45..22b6813a42f 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10081.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10081.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \nAuthentication bypass occurs when the API URL ends with Authentication. This bypass allows superuser access to all API endpoints other than Authentication. These endpoints include the ability to add, edit, and remove products, among others. All endpoints, apart from the /Authentication is affected by the vulnerability.\n\nThis issue affects CodeChecker: through 6.24.1." + }, + { + "lang": "es", + "value": "CodeChecker es una herramienta de an\u00e1lisis, una base de datos de defectos y una extensi\u00f3n de visualizaci\u00f3n para Clang Static Analyzer y Clang Tidy. La omisi\u00f3n de autenticaci\u00f3n se produce cuando la URL de la API termina con Autenticaci\u00f3n. Esta omisi\u00f3n permite el acceso de superusuario a todos los endpoints de la API excepto Autenticaci\u00f3n. Estos endpoints incluyen la capacidad de agregar, editar y eliminar productos, entre otras cosas. Todos los endpoints, excepto /Authentication, se ven afectados por la vulnerabilidad. Este problema afecta a CodeChecker: hasta la versi\u00f3n 6.24.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10082.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10082.json index 87b0997e34e..0c829422125 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10082.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10082.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \nAuthentication method confusion allows logging in as the built-in root user from an external service. The built-in root user up until 6.24.1 is generated in a weak manner, cannot be disabled, and has universal access.This vulnerability allows an attacker who can create an account on an enabled external authentication service, to log in as the root user, and access and control everything that can be controlled via the web interface.\u00a0The attacker needs to acquire the username of the root user to be successful.\n\nThis issue affects CodeChecker: through 6.24.1." + }, + { + "lang": "es", + "value": "CodeChecker es una herramienta de an\u00e1lisis, una base de datos de defectos y una extensi\u00f3n de visualizaci\u00f3n para Clang Static Analyzer y Clang Tidy. La confusi\u00f3n del m\u00e9todo de autenticaci\u00f3n permite iniciar sesi\u00f3n como el usuario root integrado desde un servicio externo. El usuario root integrado hasta la versi\u00f3n 6.24.1 se genera de forma d\u00e9bil, no se puede deshabilitar y tiene acceso universal. Esta vulnerabilidad permite a un atacante que puede crear una cuenta en un servicio de autenticaci\u00f3n externo habilitado iniciar sesi\u00f3n como el usuario root y acceder y controlar todo lo que se puede controlar a trav\u00e9s de la interfaz web. El atacante necesita adquirir el nombre de usuario del usuario root para tener \u00e9xito. Este problema afecta a CodeChecker: hasta la versi\u00f3n 6.24.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10118.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10118.json index 28c01486cff..e1d9cb67495 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10118.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10118.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device." + }, + { + "lang": "es", + "value": "SECOM WRTR-304GN-304TW-UPSC no filtra correctamente la entrada del usuario en la funci\u00f3n espec\u00edfica. Atacantes remotos no autenticados pueden aprovechar esta vulnerabilidad para inyectar y ejecutar comandos arbitrarios del sistema en el dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10181.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10181.json index eef17ac8e57..d6eabfea306 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10181.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10181.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Newsletters plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's newsletters_video shortcode in all versions up to, and including, 4.9.9.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Newsletters para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado newsletters_video del complemento en todas las versiones hasta la 4.9.9.4 incluida, debido a una desinfecci\u00f3n de entrada y a un escape de salida insuficiente en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10232.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10232.json index 902a201214c..413a5bc1e45 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10232.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10232.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Group Chat & Video Chat by AtomChat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's atomchat shortcode in all versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Group Chat & Video Chat de AtomChat para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del shortcode atomchat del complemento en todas las versiones hasta la 1.1.5 incluida, debido a una desinfecci\u00f3n de entrada y a un escape de salida insuficiente en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10367.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10367.json index 29d518e3935..be23e7aa581 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10367.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10367.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Otter Blocks \u2013 Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 3.0.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": " El complemento Otter Blocks \u2013 Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s de la API REST en las cargas de archivos SVG en todas las versiones hasta la 3.0.4 incluida debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10389.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10389.json index 13dd3660b15..260a9b25fd2 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10389.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10389.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "There exists a Path Traversal vulnerability in Safearchive on Platforms with Case-Insensitive Filesystems (e.g., NTFS). This allows Attackers to Write Arbitrary Files via Archive Extraction containing symbolic links. We recommend upgrading past commit\u00a0f7ce9d7b6f9c6ecd72d0b0f16216b046e55e44dc" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Path Traversal en Safearchive en plataformas con sistemas de archivos que no distinguen entre may\u00fasculas y min\u00fasculas (por ejemplo, NTFS). Esto permite a los atacantes escribir archivos arbitrarios mediante la extracci\u00f3n de archivos que contienen enlaces simb\u00f3licos. Recomendamos actualizar la versi\u00f3n anterior f7ce9d7b6f9c6ecd72d0b0f16216b046e55e44dc" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10428.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10428.json index 4f4559feb1b..a95a7fbdae1 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10428.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10428.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T21:15:02.333", "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10429.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10429.json index 2fcd59fc29d..f4201e8fe6f 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10429.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10429.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T21:15:02.603", "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10454.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10454.json index 465eb0ba2df..4faa714f32a 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10454.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10454.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Clickjacking vulnerability in Clibo Manager v1.1.9.12 in the '/public/login' directory, a login panel. This vulnerability occurs due to the absence of an X-Frame-Options server-side header. An attacker could overlay a transparent iframe to perform click hijacking on victims." + }, + { + "lang": "es", + "value": " Vulnerabilidad de clickjacking en Clibo Manager v1.1.9.12 en el directorio '/public/login', un panel de inicio de sesi\u00f3n. Esta vulnerabilidad se produce debido a la ausencia de un encabezado X-Frame-Options del lado del servidor. Un atacante podr\u00eda superponer un iframe transparente para realizar un click hijacking en las v\u00edctimas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10455.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10455.json index 8dd0b33ab5f..b3e5e362434 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10455.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10455.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-10-28T14:15:04.423", "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10540.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10540.json index 87e01f68c0b..11354652964 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10540.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10540.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Appointment Booking Calendar Plugin and Scheduling Plugin \u2013 BookingPress plugin for WordPress is vulnerable to SQL Injection via the 'service' parameter of the bookingpress_form shortcode in all versions up to, and including, 1.1.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El plugin Appointment Booking Calendar Plugin and Scheduling Plugin \u2013 BookingPress plugin para WordPress son vulnerables a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'service' del shortcode bookingpress_form en todas las versiones hasta la 1.1.16 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10573.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10573.json index d3120798c61..19d4ce8861e 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10573.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10573.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An out-of-bounds write flaw was found in mpg123 when handling crafted streams. When decoding PCM, the libmpg123 may write past the end of a heap-located buffer. Consequently, heap corruption may happen, and arbitrary code execution is not discarded. The complexity required to exploit this flaw is considered high as the payload must be validated by the MPEG decoder and the PCM synth before execution. Additionally, to successfully execute the attack, the user must scan through the stream, making web live stream content (such as web radios) a very unlikely attack vector." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un fallo de escritura fuera de los l\u00edmites en mpg123 al manejar transmisiones creadas. Al decodificar PCM, libmpg123 puede escribir m\u00e1s all\u00e1 del final de un b\u00fafer ubicado en el almacenamiento din\u00e1mico. En consecuencia, puede ocurrir una corrupci\u00f3n del almacenamiento din\u00e1mico y no se descarta la ejecuci\u00f3n de c\u00f3digo arbitrario. La complejidad requerida para explotar este fallo se considera alta ya que el payload debe ser validado por el decodificador MPEG y el sintetizador PCM antes de la ejecuci\u00f3n. Adem\u00e1s, para ejecutar el ataque con \u00e9xito, el usuario debe escanear la transmisi\u00f3n, lo que hace que el contenido de transmisi\u00f3n en vivo web (como radios web) sea un vector de ataque muy poco probable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10595.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10595.json index dbecfc55f83..fed8fe52001 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10595.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10595.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in ESAFENET CDG 5. It has been declared as critical. Affected by this vulnerability is the function delFile/delDifferCourseList of the file /com/esafenet/servlet/ajax/PublicDocInfoAjax.java. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en ESAFENET CDG 5. Se ha declarado como cr\u00edtica. La funci\u00f3n delFile/delDifferCourseList del archivo /com/esafenet/servlet/ajax/PublicDocInfoAjax.java se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10620.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10620.json index 8b22e960a2d..b6c63d4f455 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10620.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10620.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in knightliao Disconf 2.6.36. It has been classified as critical. This affects an unknown part of the file /api/config/list of the component Configuration Center. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad en knightliao Disconf 2.6.36, que ha sido clasificada como cr\u00edtica. Afecta a una parte desconocida del archivo /api/config/list del componente Configuration Center. La manipulaci\u00f3n provoca una autenticaci\u00f3n incorrecta. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10651.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10651.json index c8a847581d5..081436eaa78 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10651.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10651.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IDExpert from CHANGING Information Technology does not properly validate a specific parameter in the administrator interface, allowing remote attackers with administrator privileges to exploit this vulnerability to read arbitrary system files." + }, + { + "lang": "es", + "value": " IDExpert de CHANGING Information Technology no valida correctamente un par\u00e1metro espec\u00edfico en la interfaz de administrador, lo que permite a atacantes remotos con privilegios de administrador explotar esta vulnerabilidad para leer archivos de sistema arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10652.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10652.json index c2d811d91cc..71c5f6aed2e 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10652.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10652.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IDExpert from CHANGING Information Technology does not properly validate a parameter for a specific functionality, allowing unauthenticated remote attackers to inject JavsScript code and perform Reflected Cross-site scripting attacks." + }, + { + "lang": "es", + "value": "IDExpert de CHANGING Information Technology no valida correctamente un par\u00e1metro para una funcionalidad espec\u00edfica, lo que permite a atacantes remotos no autenticados inyectar c\u00f3digo JavsScript y realizar ataques de cross site scripting reflejado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10653.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10653.json index 05425ecb2fd..d0e02eda580 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10653.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10653.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IDExpert from CHANGING Information Technology does not properly validate a specific parameter in the administrator interface, allowing remote attackers with administrative privileges to inject and execute OS commands on the server." + }, + { + "lang": "es", + "value": " IDExpert de CHANGING Information Technology no valida correctamente un par\u00e1metro espec\u00edfico en la interfaz del administrador, lo que permite a atacantes remotos con privilegios administrativos inyectar y ejecutar comandos del sistema operativo en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10697.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10697.json index 5c020ac1a71..81bdb58d82a 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10697.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10697.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in Tenda AC6 15.03.05.19 and classified as critical. Affected by this vulnerability is the function formWriteFacMac of the file /goform/WriteFacMac of the component API Endpoint. The manipulation of the argument The leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad en Tenda AC6 15.03.05.19 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formWriteFacMac del archivo /goform/WriteFacMac del componente API Endpoint. La manipulaci\u00f3n del argumento The conduce a la inyecci\u00f3n de comandos. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10698.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10698.json index d5cb581a649..bf56d57582a 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10698.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10698.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Tenda AC6 15.03.05.19 and classified as critical. Affected by this issue is the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Tenda AC6 15.03.05.19 que se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n formSetDeviceName del archivo /goform/SetOnlineDevName. La manipulaci\u00f3n del argumento devName provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10826.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10826.json index 9cddae7da91..0ff2c1beb2c 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10826.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10826.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Use after free in Family Experiences in Google Chrome on Android prior to 130.0.6723.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "Use after free en Experiencias familiares en Google Chrome en Android antes de la versi\u00f3n 130.0.6723.116 permiti\u00f3 que un atacante remoto potencialmente explotara la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10827.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10827.json index c2ed7ce32c4..e567bea0213 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10827.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10827.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Use after free in Serial in Google Chrome prior to 130.0.6723.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "Use after free en Serial en Google Chrome anterior a la versi\u00f3n 130.0.6723.116 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10920.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10920.json index bc69e073c4a..889b5d77ca6 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10920.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10920.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in mariazevedo88 travels-java-api up to 5.0.1 and classified as problematic. Affected by this issue is the function doFilterInternal of the file travels-java-api-master\\src\\main\\java\\io\\github\\mariazevedo88\\travelsjavaapi\\filters\\JwtAuthenticationTokenFilter.java of the component JWT Secret Handler. The manipulation leads to use of hard-coded cryptographic key\r . The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en travels-java-api de mariazevedo88 hasta la versi\u00f3n 5.0.1 y se ha clasificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n doFilterInternal del archivo travels-java-api-master\\src\\main\\java\\io\\github\\mariazevedo88\\travelsjavaapi\\filters\\JwtAuthenticationTokenFilter.java del componente JWT Secret Handler. La manipulaci\u00f3n conduce al uso de una clave criptogr\u00e1fica codificada de forma r\u00edgida. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que su explotaci\u00f3n es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json index e3983289231..ecef92a683f 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1157.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1157.json index 5ff0976e7aa..51be2ce6eb7 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1157.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1157.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1160.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1160.json index 68d91d774c2..cae7188efe5 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1160.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1160.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1251.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1251.json index 522989e6841..f19adf307a5 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1251.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1251.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-06T16:15:51.793", "lastModified": "2024-05-17T02:35:20.240", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20104.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20104.json index 646e24a72b6..cdd23778c0f 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20104.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20104.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09073261; Issue ID: MSV-1772." + }, + { + "lang": "es", + "value": "En da, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09073261; ID de problema: MSV-1772." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20106.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20106.json index 9d63679ef4e..c515de2cb6f 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20106.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20106.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In m4u, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08960505; Issue ID: MSV-1590." + }, + { + "lang": "es", + "value": "En m4u, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08960505; ID de problema: MSV-1590." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20107.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20107.json index 795a73d3028..db203222de0 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20107.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20107.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09124360; Issue ID: MSV-1823." + }, + { + "lang": "es", + "value": " En da, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09124360; ID de problema: MSV-1823." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20108.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20108.json index ebb2f1770aa..07ffd453b8e 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20108.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20108.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In atci, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09082988; Issue ID: MSV-1774." + }, + { + "lang": "es", + "value": " En atci, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09082988; ID de problema: MSV-1774." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20109.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20109.json index ec7af1c2d5f..ffb5f0e46f7 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20109.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20109.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065928; Issue ID: MSV-1763." + }, + { + "lang": "es", + "value": "En ccu, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09065928; ID de problema: MSV-1763." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20110.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20110.json index d6dc6a792f9..c09e00af724 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20110.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20110.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065887; Issue ID: MSV-1762." + }, + { + "lang": "es", + "value": " En ccu, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09065887; ID de problema: MSV-1762." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20111.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20111.json index 23c249fd383..e541a7e558a 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20111.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20111.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065033; Issue ID: MSV-1754." + }, + { + "lang": "es", + "value": "En ccu, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09065033; ID de problema: MSV-1754." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20112.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20112.json index c0fb2b9edce..8ed92febfa9 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20112.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20112.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In isp, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09071481; Issue ID: MSV-1730." + }, + { + "lang": "es", + "value": " En ISP, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local con privilegios de ejecuci\u00f3n de System necesarios. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09071481; ID de problema: MSV-1730." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20113.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20113.json index a2c4f5194c2..543441d79eb 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20113.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20113.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09036814; Issue ID: MSV-1715." + }, + { + "lang": "es", + "value": "En ccu, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09036814; ID de problema: MSV-1715." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20114.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20114.json index 9ee58d68be1..0a8028239e5 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20114.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20114.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": " En ccu, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09037038; ID de problema: MSV-1714." + "value": " En ccu, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09037038; ID de problema: MSV-1714." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20115.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20115.json index 4eb0f4f7ea9..600383006dd 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20115.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20115.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09036695; Issue ID: MSV-1713." + }, + { + "lang": "es", + "value": " En ccu, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09036695; ID de problema: MSV-1713." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20117.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20117.json index 23e3061cd92..3052af14f21 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20117.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20117.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1681." + }, + { + "lang": "es", + "value": " En vdec, existe una posible lectura fuera de los l\u00edmites debido a un dise\u00f1o de estructura inadecuado. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09008925; ID de problema: MSV-1681." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20118.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20118.json index 9e0d33ecff6..3ce4bec2aaa 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20118.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20118.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In mms, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09062392; Issue ID: MSV-1621." + }, + { + "lang": "es", + "value": "En mms, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09062392; ID de problema: MSV-1621." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20119.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20119.json index dd6fa23d9c4..559c45efc58 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20119.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20119.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In mms, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09062301; Issue ID: MSV-1620." + }, + { + "lang": "es", + "value": " En mms, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09062301; ID de problema: MSV-1620." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20120.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20120.json index 47e703c22ae..8c321651e93 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20120.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20120.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1575." + }, + { + "lang": "es", + "value": " En KeyInstall, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08956986; ID de problema: MSV-1575." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20121.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20121.json index fb388841ade..9f866e80a91 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20121.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20121.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1574." + }, + { + "lang": "es", + "value": "En KeyInstall, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08956986; ID de problema: MSV-1574." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20123.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20123.json index be62b77b13b..c8d9b33c2ef 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20123.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20123.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1569." + }, + { + "lang": "es", + "value": " En vdec, existe una posible lectura fuera de los l\u00edmites debido a un dise\u00f1o de estructura inadecuado. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del sistema necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09008925; ID de problema: MSV-1569." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20124.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20124.json index c66948eb556..a1b94089589 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20124.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20124.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1568." + }, + { + "lang": "es", + "value": " En vdec, existe la posibilidad de una lectura fuera de los l\u00edmites debido a un dise\u00f1o de estructura inadecuado. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del sistema necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09008925; ID de problema: MSV-1568." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20371.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20371.json index c9e64735df8..16e43365dc0 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20371.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20371.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the access control list (ACL) programming of Cisco Nexus 3550-F Switches could allow an unauthenticated, remote attacker to send traffic that should be blocked to the management interface of an affected device. \r\n\r\nThis vulnerability exists because ACL deny rules are not properly enforced at the time of device reboot. An attacker could exploit this vulnerability by attempting to send traffic to the management interface of an affected device. A successful exploit could allow the attacker to send traffic to the management interface of the affected device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la programaci\u00f3n de la lista de control de acceso (ACL) de los conmutadores Cisco Nexus 3550-F podr\u00eda permitir que un atacante remoto no autenticado env\u00ede tr\u00e1fico que deber\u00eda estar bloqueado a la interfaz de administraci\u00f3n de un dispositivo afectado. Esta vulnerabilidad existe porque las reglas de denegaci\u00f3n de ACL no se aplican correctamente en el momento del reinicio del dispositivo. Un atacante podr\u00eda aprovechar esta vulnerabilidad al intentar enviar tr\u00e1fico a la interfaz de administraci\u00f3n de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante enviar tr\u00e1fico a la interfaz de administraci\u00f3n del dispositivo afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20374.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20374.json index c461147091c..c2d47dbe0f7 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20374.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20374.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-23T18:15:06.100", "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20418.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20418.json index 24d45a15f85..54557a1ce12 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20418.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20418.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points could allow an unauthenticated, remote attacker to perform command injection attacks with root privileges on the underlying operating system.\r\n\r\nThis vulnerability is due to improper validation of input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system of the affected device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Unified Industrial Wireless Software para Cisco Ultra-Reliable Wireless Backhaul (URWB) podr\u00eda permitir que un atacante remoto no autenticado realice ataques de inyecci\u00f3n de comandos con privilegios de superusuario en el sistema operativo subyacente. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada a la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes HTTP manipulada a la interfaz de administraci\u00f3n basada en web de un sistema afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar comandos arbitrarios con privilegios de superusuario en el sistema operativo subyacente del dispositivo afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20445.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20445.json index 0ef806babe3..d64cd195408 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20445.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20445.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 could allow an unauthenticated, remote attacker to access sensitive information on an affected device.\r\n\r\nThis vulnerability is due to improper storage of sensitive information within the web UI of Session Initiation Protocol (SIP)-based phone loads. An attacker could exploit this vulnerability by browsing to the IP address of a device that has Web Access enabled. A successful exploit could allow the attacker to access sensitive information, including incoming and outgoing call records.\r\nNote: Web Access is disabled by default." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de usuario web de los tel\u00e9fonos de escritorio Cisco de la serie 9800, los tel\u00e9fonos IP de la serie 7800 y 8800 de Cisco y el tel\u00e9fono con video Cisco 8875 podr\u00eda permitir que un atacante remoto no autenticado acceda a informaci\u00f3n confidencial en un dispositivo afectado. Esta vulnerabilidad se debe al almacenamiento inadecuado de informaci\u00f3n confidencial dentro de la interfaz de usuario web de las cargas de tel\u00e9fonos basadas en el protocolo de inicio de sesi\u00f3n (SIP). Un atacante podr\u00eda aprovechar esta vulnerabilidad navegando hasta la direcci\u00f3n IP de un dispositivo que tenga habilitado el acceso web. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante acceder a informaci\u00f3n confidencial, incluidos los registros de llamadas entrantes y salientes. Nota: el acceso web est\u00e1 deshabilitado de forma predeterminada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20457.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20457.json index 6f27f47222e..6a3acf38aa0 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20457.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20457.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the logging component of Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system.\r\n\r\nThis vulnerability is due to the storage of unencrypted credentials in certain logs. An attacker could exploit this vulnerability by accessing the logs on an affected system and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to access sensitive information from the device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el componente de registro de Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) podr\u00eda permitir que un atacante remoto autenticado vea informaci\u00f3n confidencial en texto plano en un sistema afectado. Esta vulnerabilidad se debe al almacenamiento de credenciales no cifradas en ciertos registros. Un atacante podr\u00eda aprovechar esta vulnerabilidad accediendo a los registros de un sistema afectado y obteniendo credenciales a las que normalmente no tendr\u00eda acceso. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante acceder a informaci\u00f3n confidencial del dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20469.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20469.json index f35d4fac043..6699d2b634f 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20469.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20469.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-09-04T17:15:13.740", "lastModified": "2024-09-20T16:58:14.327", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20476.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20476.json index a125e46c414..a169075cfa4 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20476.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20476.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to bypass the authorization mechanisms for specific file management functions.\r\n\r\nThis vulnerability is due to lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to upload files to a location that should be restricted. To exploit this vulnerability, an attacker would need valid Read-Only Administrator credentials." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco ISE podr\u00eda permitir que un atacante remoto autenticado eluda los mecanismos de autorizaci\u00f3n para funciones espec\u00edficas de administraci\u00f3n de archivos. Esta vulnerabilidad se debe a la falta de validaci\u00f3n del lado del servidor de los permisos de administrador. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada a un sistema afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante cargar archivos a una ubicaci\u00f3n que deber\u00eda estar restringida. Para aprovechar esta vulnerabilidad, un atacante necesitar\u00eda credenciales de administrador de solo lectura v\u00e1lidas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20484.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20484.json index 8830e9fbac4..fa7958237df 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20484.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20484.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the External Agent Assignment Service (EAAS) feature of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of Media Routing Peripheral Interface Manager (MR PIM) traffic that is received by an affected device. An attacker could exploit this vulnerability by sending crafted MR PIM traffic to an affected device. A successful exploit could allow the attacker to trigger a failure on the MR PIM connection between Cisco ECE and Cisco Unified Contact Center Enterprise (CCE), leading to a DoS condition on EAAS that would prevent customers from starting chat, callback, or delayed callback sessions. Note: When the attack traffic stops, the EAAS process must be manually restarted to restore normal operation. To restart the process in the System Console, choose Shared Resources > Services > Unified CCE > EAAS, then click Start." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la funci\u00f3n External Agent Assignment Service (EAAS) de Cisco Enterprise Chat and Email (ECE) podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente del tr\u00e1fico de Media Routing Peripheral Interface Manager (MR PIM) que recibe un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tr\u00e1fico MR PIM manipulado a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante provoque una falla en la conexi\u00f3n MR PIM entre Cisco ECE y Cisco Unified Contact Center Enterprise (CCE), lo que provocar\u00eda una condici\u00f3n de DoS en EAAS que evitar\u00eda que los clientes inicien sesiones de chat, devoluci\u00f3n de llamadas o devoluci\u00f3n de llamadas retrasadas. Nota: Cuando el tr\u00e1fico del ataque se detiene, el proceso EAAS debe reiniciarse manualmente para restablecer el funcionamiento normal. Para reiniciar el proceso en la consola del sistema, seleccione Recursos compartidos > Servicios > Unified CCE > EAAS y, a continuaci\u00f3n, haga clic en Iniciar." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20487.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20487.json index ad76831aabb..be2a8c1b21b 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20487.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20487.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to conduct a stored XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en la web de Cisco ISE podr\u00eda permitir que un atacante remoto autenticado realice un ataque XSS almacenado contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario por parte de la interfaz de administraci\u00f3n basada en la web de un sistema afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad inyectando c\u00f3digo malicioso en p\u00e1ginas espec\u00edficas de la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Para aprovechar esta vulnerabilidad, el atacante debe tener al menos una cuenta con privilegios bajos en un dispositivo afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20504.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20504.json index e854a2fc279..baeac9100ca 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20504.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20504.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Secure Email and Web Manager, Secure Email Gateway y Secure Web Appliance podr\u00eda permitir que un atacante remoto autenticado realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de una interfaz afectada para que haga clic en un v\u00ednculo manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20507.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20507.json index e36faa4eaa4..d7ad700e026 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20507.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20507.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the logging subsystem of Cisco Meeting Management could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system.\r\n\r\nThis vulnerability is due to improper storage of sensitive information within the web-based management interface of an affected device. An attacker could exploit this vulnerability by logging in to the web-based management interface. A successful exploit could allow the attacker to view sensitive data that is stored on the affected device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el subsistema de registro de Cisco Meeting Management podr\u00eda permitir que un atacante remoto autenticado vea informaci\u00f3n confidencial en texto plano en un sistema afectado. Esta vulnerabilidad se debe al almacenamiento inadecuado de informaci\u00f3n confidencial dentro de la interfaz de administraci\u00f3n basada en web de un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad iniciando sesi\u00f3n en la interfaz de administraci\u00f3n basada en web. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ver datos confidenciales almacenados en el dispositivo afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20511.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20511.json index 5a3e7161057..e137d274579 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20511.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20511.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Unified Communications Manager (Unified CM) y Cisco Unified Communications Manager Session Management Edition (Unified CM SME) podr\u00eda permitir que un atacante remoto no autenticado realice un ataque de cross-site scripting (XSS) contra un usuario de la interfaz. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en web no valida correctamente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que haga clic en un v\u00ednculo manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20514.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20514.json index 11a8fa36ec2..037671efa2a 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20514.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20514.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, low-privileged, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into a specific page of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Evolved Programmable Network Manager (EPNM) y Cisco Prime Infrastructure podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en web no valida correctamente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad inyectando c\u00f3digo malicioso en una p\u00e1gina espec\u00edfica de la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Para aprovechar esta vulnerabilidad, el atacante debe tener al menos una cuenta con pocos privilegios en un dispositivo afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json index 032e26d9690..87afabf1b4a 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-02T17:15:17.973", "lastModified": "2024-10-08T16:11:23.440", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20525.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20525.json index c793c6dc600..8147c05d52d 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20525.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20525.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-11-06T17:15:16.927", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ISE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en la web de Cisco ISE podr\u00eda permitir que un atacante remoto no autenticado realice un ataque XSS contra un usuario de la interfaz. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en la web no valida correctamente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que haga clic en un enlace creado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20527.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20527.json index 096e3474fe9..b04a32053c9 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20527.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20527.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the API of Cisco ISE could allow an authenticated, remote attacker to read and delete arbitrary files on an affected device. To exploit this vulnerability, the attacker would need valid Super Admin credentials.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read or delete arbitrary files on the underlying operating system." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la API de Cisco ISE podr\u00eda permitir que un atacante remoto autenticado lea y elimine archivos arbitrarios en un dispositivo afectado. Para aprovechar esta vulnerabilidad, el atacante necesitar\u00eda credenciales de superadministrador v\u00e1lidas. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los par\u00e1metros proporcionados por el usuario en las solicitudes de API. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud de API manipulada a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante leer o eliminar archivos arbitrarios en el sistema operativo subyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20528.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20528.json index 6dc6f124386..b460a848389 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20528.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20528.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the API of Cisco ISE could allow an authenticated, remote attacker to upload files to arbitrary locations on the underlying operating system of an affected device. To exploit this vulnerability, an attacker would need valid Super Admin credentials.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to upload custom files to arbitrary locations on the underlying operating system, execute arbitrary code, and elevate privileges to root." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la API de Cisco ISE podr\u00eda permitir que un atacante remoto autenticado cargue archivos en ubicaciones arbitrarias en el sistema operativo subyacente de un dispositivo afectado. Para explotar esta vulnerabilidad, un atacante necesitar\u00eda credenciales de superadministrador v\u00e1lidas. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los par\u00e1metros proporcionados por el usuario en las solicitudes de API. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud de API manipulada a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante cargar archivos personalizados en ubicaciones arbitrarias en el sistema operativo subyacente, ejecutar c\u00f3digo arbitrario y elevar los privilegios a superusuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20529.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20529.json index 071a0a60d71..04943eb4d51 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20529.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20529.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the API of Cisco ISE could allow an authenticated, remote attacker to read and delete arbitrary files on an affected device. To exploit this vulnerability, the attacker would need valid Super Admin credentials.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read or delete arbitrary files on the underlying operating system." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la API de Cisco ISE podr\u00eda permitir que un atacante remoto autenticado lea y elimine archivos arbitrarios en un dispositivo afectado. Para aprovechar esta vulnerabilidad, el atacante necesitar\u00eda credenciales de superadministrador v\u00e1lidas. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los par\u00e1metros proporcionados por el usuario en las solicitudes de API. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud de API manipulada a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante leer o eliminar archivos arbitrarios en el sistema operativo subyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20530.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20530.json index 580d8e979ab..7af5118f039 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20530.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20530.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ISE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en la web de Cisco ISE podr\u00eda permitir que un atacante remoto no autenticado realice un ataque XSS contra un usuario de la interfaz. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en la web no valida correctamente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que haga clic en un enlace manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20531.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20531.json index b7c0dc64d0f..8b9474b2124 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20531.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20531.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the API of Cisco ISE could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device and conduct a server-side request forgery (SSRF) attack through an affected device. To exploit this vulnerability, the attacker would need valid Super Admin credentials.\r\n\r\nThis vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing XML input. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system or conduct an SSRF attack through the affected device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la API de Cisco ISE podr\u00eda permitir que un atacante remoto autenticado lea archivos arbitrarios en el sistema operativo subyacente de un dispositivo afectado y lleve a cabo un ataque de server-side request forgery (SSRF) a trav\u00e9s de un dispositivo afectado. Para explotar esta vulnerabilidad, el atacante necesitar\u00eda credenciales de superadministrador v\u00e1lidas. Esta vulnerabilidad se debe a un manejo inadecuado de las entradas de entidad externa XML (XXE) al analizar la entrada XML. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud de API manipulada a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante leer archivos arbitrarios en el sistema operativo subyacente o llevar a cabo un ataque SSRF a trav\u00e9s del dispositivo afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20532.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20532.json index fc007e67425..bdc8be15ac6 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20532.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20532.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the API of Cisco ISE could allow an authenticated, remote attacker to read and delete arbitrary files on an affected device. To exploit this vulnerability, the attacker would need valid Super Admin credentials.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read or delete arbitrary files on the underlying operating system." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la API de Cisco ISE podr\u00eda permitir que un atacante remoto autenticado lea y elimine archivos arbitrarios en un dispositivo afectado. Para aprovechar esta vulnerabilidad, el atacante necesitar\u00eda credenciales de superadministrador v\u00e1lidas. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los par\u00e1metros proporcionados por el usuario en las solicitudes de API. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud de API manipulada a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante leer o eliminar archivos arbitrarios en el sistema operativo subyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20533.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20533.json index 2316e982de6..4257e41c0c6 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20533.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20533.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 6800, 7800, and 8800 Series, and Cisco Video Phone 8875 with Cisco Multiplatform Firmware could allow an authenticated, remote attacker to conduct stored cross-site scripting (XSS) attacks against users.\r\n\r\nThis vulnerability exists because the web UI of an affected device does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.\r\nNote: To exploit this vulnerability, Web Access must be enabled on the phone and the attacker must have Admin credentials on the device. Web Access is disabled by default." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de usuario web de los tel\u00e9fonos de escritorio Cisco de la serie 9800, los tel\u00e9fonos IP Cisco de las series 6800, 7800 y 8800 y el tel\u00e9fono con video Cisco 8875 con firmware multiplataforma de Cisco podr\u00eda permitir que un atacante remoto autenticado realice ataques de cross-site scripting (XSS) almacenado contra los usuarios. Esta vulnerabilidad existe porque la interfaz de usuario web de un dispositivo afectado no valida correctamente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad inyectando c\u00f3digo malicioso en p\u00e1ginas espec\u00edficas de la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Nota: Para aprovechar esta vulnerabilidad, el acceso web debe estar habilitado en el tel\u00e9fono y el atacante debe tener credenciales de administrador en el dispositivo. El acceso web est\u00e1 deshabilitado de forma predeterminada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20534.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20534.json index 4ea69517006..8f974a34ffa 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20534.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20534.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 6800, 7800, and 8800 Series, and Cisco Video Phone 8875 with Cisco Multiplatform Firmware could allow an authenticated, remote attacker to conduct stored cross-site scripting (XSS) attacks against users.\r\n\r\nThis vulnerability exists because the web UI of an affected device does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.\r\nNote: To exploit this vulnerability, Web Access must be enabled on the phone and the attacker must have Admin credentials on the device. Web Access is disabled by default." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de usuario web de los tel\u00e9fonos de escritorio Cisco de la serie 9800, los tel\u00e9fonos IP Cisco de las series 6800, 7800 y 8800 y el tel\u00e9fono con video Cisco 8875 con firmware multiplataforma de Cisco podr\u00eda permitir que un atacante remoto autenticado realice ataques de cross-site scripting (XSS) almacenado contra los usuarios. Esta vulnerabilidad existe porque la interfaz de usuario web de un dispositivo afectado no valida correctamente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad inyectando c\u00f3digo malicioso en p\u00e1ginas espec\u00edficas de la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Nota: Para aprovechar esta vulnerabilidad, el acceso web debe estar habilitado en el tel\u00e9fono y el atacante debe tener credenciales de administrador en el dispositivo. El acceso web est\u00e1 deshabilitado de forma predeterminada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20536.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20536.json index 4ee54ebcb8d..f7d318d89d6 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20536.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20536.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in a REST API endpoint and web-based management interface of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with read-only privileges to execute arbitrary SQL commands on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a specific REST API endpoint or web-based management interface. A successful exploit could allow the attacker to read, modify, or delete arbitrary data on an internal database, which could affect the availability of the device. " + }, + { + "lang": "es", + "value": "Una vulnerabilidad en un endpoint de API REST y una interfaz de administraci\u00f3n basada en web de Cisco Nexus Dashboard Fabric Controller (NDFC) podr\u00eda permitir que un atacante remoto autenticado con privilegios de solo lectura ejecute comandos SQL arbitrarios en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud manipulado a un endpoint de API REST o una interfaz de administraci\u00f3n basada en web espec\u00edficos. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante lea, modifique o elimine datos arbitrarios en una base de datos interna, lo que podr\u00eda afectar la disponibilidad del dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20537.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20537.json index f8a6b095202..b550bcb4b71 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20537.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20537.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to bypass the authorization mechanisms for specific administrative functions.\r\n\r\nThis vulnerability is due to a lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to conduct administrative functions beyond their intended access level. To exploit this vulnerability, an attacker would need Read-Only Administrator credentials." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco ISE podr\u00eda permitir que un atacante remoto autenticado eluda los mecanismos de autorizaci\u00f3n para funciones administrativas espec\u00edficas. Esta vulnerabilidad se debe a la falta de validaci\u00f3n del lado del servidor de los permisos de administrador. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada a un sistema afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante realizar funciones administrativas m\u00e1s all\u00e1 de su nivel de acceso previsto. Para aprovechar esta vulnerabilidad, un atacante necesitar\u00eda credenciales de administrador de solo lectura." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20538.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20538.json index 2d90bd15694..80bac985f83 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20538.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20538.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ISE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface on an affected system to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en la web de Cisco ISE podr\u00eda permitir que un atacante remoto no autenticado realice un ataque XSS contra un usuario de la interfaz. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en la web no valida de manera suficiente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de la interfaz en un sistema afectado para que haga clic en un enlace creado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20539.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20539.json index 6a67a3c3e47..18db55cfdb1 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20539.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20539.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to conduct a stored XSS attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid administrative credentials on an affected device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en la web de Cisco ISE podr\u00eda permitir que un atacante remoto autenticado realice un ataque XSS almacenado contra un usuario de la interfaz. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en la web no valida de manera suficiente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad inyectando c\u00f3digo malicioso en p\u00e1ginas espec\u00edficas de la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Para aprovechar esta vulnerabilidad, el atacante necesitar\u00eda credenciales administrativas v\u00e1lidas en un dispositivo afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20540.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20540.json index 8fa3a2d2b08..494adc86f9f 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20540.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20540.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) could allow an authenticated, remote attacker with low privileges to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into a specific page of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. To exploit this vulnerability, the attacker must have at least a Supervisor role on an affected device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Unified Contact Center Management Portal (Unified CCMP) podr\u00eda permitir que un atacante remoto autenticado con privilegios bajos realice un ataque de cross-site scripting (XSS) almacenado contra un usuario de la interfaz. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en web no valida correctamente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad inyectando c\u00f3digo malicioso en una p\u00e1gina espec\u00edfica de la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador. Para aprovechar esta vulnerabilidad, el atacante debe tener al menos un rol de supervisor en un dispositivo afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21489.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21489.json index 80f18f7c3bf..67b1329b404 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21489.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21489.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2024-10-01T05:15:12.227", "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21510.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21510.json index ceb82213aa6..cc359a9fe58 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21510.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21510.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Versions of the package sinatra from 0.0.0 are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the X-Forwarded-Host (XFH) header. When making a request to a method with redirect applied, it is possible to trigger an Open Redirect Attack by inserting an arbitrary address into this header. If used for caching purposes, such as with servers like Nginx, or as a reverse proxy, without handling the X-Forwarded-Host header, attackers can potentially exploit Cache Poisoning or Routing-based SSRF." + }, + { + "lang": "es", + "value": "Las versiones del paquete sinatra a partir de la versi\u00f3n 0.0.0 son vulnerables a la dependencia de entradas no confiables en una decisi\u00f3n de seguridad a trav\u00e9s del encabezado X-Forwarded-Host (XFH). Al realizar una solicitud a un m\u00e9todo con redirecci\u00f3n aplicada, es posible desencadenar un ataque de redirecci\u00f3n abierta insertando una direcci\u00f3n arbitraria en este encabezado. Si se utiliza con fines de almacenamiento en cach\u00e9, como con servidores como Nginx, o como un proxy inverso, sin manejar el encabezado X-Forwarded-Host, los atacantes pueden explotar potencialmente el envenenamiento de cach\u00e9 o SSRF basada en enrutamiento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21531.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21531.json index 27ac41f5f4f..f67a8f2f8fb 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21531.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21531.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2024-10-01T05:15:12.440", "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json index 7d6d24fb502..6bab72a99ef 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Los permisos inseguros en el empaquetado de Tomcat permiten que los usuarios locales que ganan una carrera durante la instalaci\u00f3n del paquete escalen a la ra\u00edz" + "value": "Los permisos inseguros en el empaquetado de Tomcat permiten que los usuarios locales que ganan una ejecuci\u00f3n durante la instalaci\u00f3n del paquete escalen a la ra\u00edz" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22128.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22128.json index 192f688fc72..6dc7bff0fc2 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22128.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22128.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "cna@sap.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24116.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24116.json index 52c8091c6cf..ab259d2c814 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24116.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24116.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-02T19:15:15.463", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24117.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24117.json index 5c98c6ebf4a..e68437d6e8f 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24117.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24117.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-02T21:15:13.300", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24122.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24122.json index d9815866cc5..5e3c89212b0 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24122.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24122.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-02T18:15:04.957", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24884.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24884.json index 5b2755b35cf..2c7905c6a9c 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24884.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24884.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24923.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24923.json index 5f11a816f63..9970e454479 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24923.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24923.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25622.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25622.json index a031ae4fea7..d4bb091bd96 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25622.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25622.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:03.947", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25914.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25914.json index f0c561becc2..e1e9183311a 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25914.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25914.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27766.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27766.json index fd1672b349f..bc0a855643f 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27766.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27766.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "An issue in MariaDB v.11.1 allows a remote attacker to execute arbitrary code via the lib_mysqludf_sys.so function. NOTE: this is disputed by the MariaDB Foundation because no privilege boundary is crossed." + }, + { + "lang": "es", + "value": "Un problema en MYSQL MariaDB v.11.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n lib_mysqludf_sys.so." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28052.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28052.json index c607d752c9a..68364925464 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28052.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28052.json @@ -3,7 +3,7 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:04.720", "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28875.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28875.json index e7c9edcfae9..a6eb7e90734 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28875.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28875.json @@ -3,7 +3,7 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:04.990", "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28888.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28888.json index fc5acdf34cd..cac56aa9614 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28888.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28888.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30149.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30149.json index ee708a1689a..edfc7543dbb 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30149.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30149.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "HCL AppScan Source <= 10.6.0 does not properly validate a TLS/SSL certificate for an executable." + }, + { + "lang": "es", + "value": " HCL AppScan Source <= 10.6.0 no valida correctamente un certificado TLS/SSL para un ejecutable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31151.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31151.json index c5072e272ff..87f1ee3f90c 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31151.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31151.json @@ -3,7 +3,7 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:05.507", "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31152.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31152.json index affd9281470..dccbbf34d7c 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31152.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31152.json @@ -3,7 +3,7 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:05.773", "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32870.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32870.json index bbdb33a01dd..f64b736e578 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32870.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32870.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-05T00:15:04.297", "lastModified": "2024-11-05T16:04:26.053", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32946.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32946.json index 908a44d159f..de378a08940 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32946.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32946.json @@ -3,7 +3,7 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:06.033", "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33453.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33453.json index 83e475fa4a5..552600d67dc 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33453.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33453.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Buffer Overflow vulnerability in esp-idf v.5.1 allows a remote attacker to obtain sensitive information via the externalId component." + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de b\u00fafer en esp-idf v.5.1 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente externalId." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33603.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33603.json index eba83a7b90a..8bd1a9d3bf1 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33603.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33603.json @@ -3,7 +3,7 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:06.330", "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33623.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33623.json index 6876dd43964..e2de952acb0 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33623.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33623.json @@ -3,7 +3,7 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:06.597", "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33626.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33626.json index 86a1da27ef6..19503f9cb62 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33626.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33626.json @@ -3,7 +3,7 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-30T14:15:06.850", "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34673.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34673.json index c04bc24deb5..68f2e1d85a4 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34673.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34673.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:03.257", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34674.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34674.json index df5d889712d..81d5840145f 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34674.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34674.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:03.473", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34675.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34675.json index b03bbc1688a..f730d5549c2 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34675.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34675.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:03.643", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34676.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34676.json index b614c5df78a..e3eb3c5ad62 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34676.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34676.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:03.820", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34677.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34677.json index 075bdc280e0..e8dc2c0c14f 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34677.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34677.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:03.980", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34678.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34678.json index a6dbc98530c..23076757c9f 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34678.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34678.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:04.153", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34679.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34679.json index 5c9e7fd2a08..23fee379056 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34679.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34679.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:04.317", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34680.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34680.json index a6fa91e8612..72620c76ec3 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34680.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34680.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:04.477", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34681.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34681.json index 49df9e2b5d8..d05424b7de9 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34681.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34681.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:04.643", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34682.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34682.json index 531838d873a..647602c36f2 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34682.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34682.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:04.807", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35146.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35146.json index 76291f2b7eb..274f8f14110 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35146.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35146.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Maximo Application Suite - Monitor Component 8.10.11, 8.11.8, and 9.0.0 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM Maximo Application Suite - Monitor Component 8.10.11, 8.11.8 y 9.0.0 es vulnerable a ataques de cross-site scripting. Esta vulnerabilidad permite que un atacante no autenticado incorpore c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37094.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37094.json index 4b5974d9fd4..520922dc3de 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37094.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37094.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Access Control vulnerability in StylemixThemes MasterStudy LMS allows .\n\nThis issue affects MasterStudy LMS: from n/a through 3.2.12." + }, + { + "lang": "es", + "value": " La vulnerabilidad de control de acceso en StylemixThemes MasterStudy LMS permite . Este problema afecta a MasterStudy LMS: desde n/a hasta 3.2.12." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37095.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37095.json index 56781d88277..c4a53b8b43a 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37095.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37095.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Envira Gallery Team Envira Photo Gallery allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Envira Photo Gallery: from n/a through 1.8.7.3." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Envira Gallery Team Envira Photo Gallery permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Envira Photo Gallery: desde n/a hasta 1.8.7.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37096.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37096.json index ad6b0473c7e..d3daee98ddc 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37096.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37096.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Popup Box Team Popup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Popup box: from n/a through 4.5.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Popup box Team Popup permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Popup Box: desde n/a hasta 4.5.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37106.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37106.json index c76bb89168c..cc4570d946e 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37106.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37106.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WishList Products WishList Member X allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WishList Member X: from n/a through 3.26.6" + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en productos de WishList WishList Member X permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WishList Member X: desde n/a hasta 3.26.6" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37108.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37108.json index 4f84fe2b465..7be759584b3 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37108.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37108.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WishList Products WishList Member X allows Path Traversal.This issue affects WishList Member X: from n/a through 3.26.6." + }, + { + "lang": "es", + "value": " Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en productos WishList WishList Member X permite Path Traversal. Este problema afecta a WishList Member X: desde n/a hasta 3.26.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37119.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37119.json index a4960a76feb..782a649b15f 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37119.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37119.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Uncanny Owl Uncanny Automator Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Uncanny Automator Pro: from n/a through 5.3.0.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Uncanny Owl Uncanny Automator Pro permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Uncanny Automator Pro: desde n/a hasta 5.3.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37123.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37123.json index b798d330ee2..e8ea86bfdca 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37123.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37123.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in VowelWeb Ibtana allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ibtana: from n/a through 1.2.3.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en VowelWeb Ibtana permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Ibtana: desde n/a hasta 1.2.3.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37163.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37163.json index 0bf471df5ba..95d552400dc 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37163.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37163.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-07T17:15:51.230", "lastModified": "2024-06-07T19:24:09.243", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37201.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37201.json index 4d2d9556624..514fc1ca551 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37201.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37201.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in javmah Woocommerce Customers Order History allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Woocommerce Customers Order History: from n/a through 5.2.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en javmah Woocommerce Customers Order History permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Woocommerce Customers Order History: desde n/a hasta 5.2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37203.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37203.json index 48a72a19893..02ce8438629 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37203.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37203.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Laybuy Laybuy Payment Extension for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Laybuy Payment Extension for WooCommerce: from n/a through 5.3.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Laybuy Laybuy Payment Extension para WooCommerce permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Laybuy Payment Extension para WooCommerce: desde n/a hasta 5.3.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37204.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37204.json index 56234704ff9..643f8b93472 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37204.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37204.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in PropertyHive allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PropertyHive: from n/a through 2.0.9." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en PropertyHive permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a PropertyHive: desde n/a hasta 2.0.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37207.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37207.json index 8c146ce55e5..379ab7871d5 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37207.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37207.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Theme4Press Demo Awesome allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Demo Awesome: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Theme4Press Demo Awesome permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Demo Awesome: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37209.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37209.json index b776928146a..c60c16cd75f 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37209.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37209.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Access Control vulnerability in Prism IT Systems User Rights Access Manager allows .\n\nThis issue affects User Rights Access Manager: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control de acceso en Prism IT Systems User Rights Access Manager permite... Este problema afecta a User Rights Access Manager: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37214.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37214.json index 16adf4f65ba..4cfb933bb91 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37214.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37214.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Dropshipping Guru Ali2Woo Lite Exploiting Incorrectly Configured Access Control Security Levels, Stored XSS.This issue affects Ali2Woo Lite: from n/a through 3.3.5." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Dropshipping Guru Ali2Woo Lite que explota niveles de seguridad de control de acceso configurados incorrectamente y XSS almacenado. Este problema afecta a Ali2Woo Lite: desde n/a hasta 3.3.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37218.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37218.json index c464429d70d..0be3c9aa51e 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37218.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37218.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WordPress Page Builder Sandwich Team Page Builder Sandwich \u2013 Front-End Page Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Page Builder Sandwich \u2013 Front-End Page Builder: from n/a through 5.1.0." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en WordPress Page Builder Sandwich Team Page Builder Sandwich \u2013 Front-End Page Builder permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Page Builder Sandwich \u2013 Front-End Page Builder: desde n/a hasta 5.1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37220.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37220.json index ea4ab0c0971..c56584204c5 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37220.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37220.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in OptinlyHQ Optinly allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Optinly: from n/a through 1.0.18." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en OptinlyHQ Optinly permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Optinly: desde n/a hasta 1.0.18." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37226.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37226.json index 2228d32d3df..08c834576dd 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37226.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37226.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Kanban for WordPress Kanban Boards for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Kanban Boards for WordPress: from n/a through 2.5.21." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Kanban para WordPress Kanban Boards para WordPress permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Kanban Boards para WordPress: desde n/a hasta 2.5.21." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37232.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37232.json index bdbba34e3ac..ef01a6d68a2 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37232.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37232.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Hercules Design Hercules Core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Hercules Core: from n/a through 6.5." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Hercules Design Hercules Core permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Hercules Core: desde n/a hasta 6.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37249.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37249.json index f6b6c4291ed..3031a41e019 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37249.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37249.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WPEngine Inc. Advanced Custom Fields PRO allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Advanced Custom Fields PRO: from n/a through 6.3.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en WPEngine Inc. Advanced Custom Fields PRO permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Advanced Custom Fields PRO: desde n/a hasta 6.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37250.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37250.json index b1b78a3b4b7..74f49b0d1d0 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37250.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37250.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WPEngine Inc. Advanced Custom Fields PRO allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Advanced Custom Fields PRO: from n/a through 6.3.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en WPEngine Inc. Advanced Custom Fields PRO permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Advanced Custom Fields PRO: desde n/a hasta 6.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37254.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37254.json index d6441730d36..ebc615c8a81 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37254.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37254.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in mndpsingh287 File Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects File Manager: from n/a through 7.2.7." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en mndpsingh287 File Manager permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a File Manager: desde n/a hasta 7.2.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37255.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37255.json index 380791dbe78..9f4cac71c66 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37255.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37255.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Wpmet Elements kit Elementor addons allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Elements kit Elementor addons: from n/a through 3.1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en los Wpmet Elements kit Elementor addons permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Elements kit Elementor addons: desde n/a hasta 3.1.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37269.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37269.json index 966c0000a44..13c2865cf93 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37269.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37269.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in StylemixThemes Masterstudy Elementor Widgets allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Masterstudy Elementor Widgets: from n/a through 1.2.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en los widgets Masterstudy Elementor de StylemixThemes permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a los widgets Masterstudy Elementor: desde n/a hasta 1.2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37276.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37276.json index a47c0873489..a2621f54193 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37276.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37276.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in fifu.App Featured Image from URL allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Featured Image from URL: from n/a through 4.8.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en fifu.App Featured Image from URL permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Featured Image from URL: desde n/a hasta 4.8.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37277.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37277.json index 25948094589..fbec25fcc09 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37277.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37277.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authorization Bypass Through User-Controlled Key vulnerability in Paid Memberships Pro allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Paid Memberships Pro: from n/a through 3.0.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n a trav\u00e9s de una clave controlada por el usuario en Paid Memberships Pro permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Paid Memberships Pro: desde n/a hasta 3.0.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37411.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37411.json index 87d89050dee..c7f56c62954 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37411.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37411.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Team Emilia Projects Progress Planner allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Progress Planner: from n/a through 0.9.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en el Team Emilia Projects Progress Planner permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Progress Planner: desde n/a hasta 0.9.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37415.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37415.json index 0ac37f05ecb..8c9acf1d91e 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37415.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37415.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in E2Pdf.Com allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects e2pdf: from n/a through 1.20.27." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en E2Pdf.Com permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a e2pdf: desde n/a hasta 1.20.27." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37423.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37423.json index 7a3fde6a052..fff5e68f416 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37423.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37423.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Automattic Newspack Blocks allows Path Traversal.This issue affects Newspack Blocks: from n/a through 3.0.8." + }, + { + "lang": "es", + "value": " La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Automattic Newspack Blocks permite Path Traversal. Este problema afecta a Newspack Blocks: desde n/a hasta 3.0.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37425.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37425.json index e7e4cbbfc6d..121f7dcde68 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37425.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37425.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Automattic Newspack Blocks newspack-blocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Newspack Blocks: from n/a through 3.0.8." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Automattic Newspack Blocks newspack-blocks permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Newspack Blocks: desde n/a hasta 3.0.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37427.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37427.json index 6a83d432b48..2c27685f8c2 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37427.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37427.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Timetics: from n/a through 1.0.21." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Arraytics Timetics permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Timetics: desde n/a hasta 1.0.21." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37439.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37439.json index 54488839468..c47bfc33b0e 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37439.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37439.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Uncanny Owl Uncanny Toolkit Pro for LearnDash allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Uncanny Toolkit Pro for LearnDash: from n/a through\u00a04.1.4.0" + }, + { + "lang": "es", + "value": " La vulnerabilidad de falta de autorizaci\u00f3n en Uncanny Owl Uncanny Toolkit Pro for LearnDash permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Uncanny Toolkit Pro for LearnDash: desde n/a hasta 4.1.4.0" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37440.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37440.json index 4e611a5e365..ff9ed4105dc 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37440.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37440.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Andy Moyle Church Admin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Church Admin: from n/a through 4.4.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Andy Moyle Church Admin permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Church Admin: desde n/a hasta 4.4.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37443.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37443.json index a76484f10cf..40d808c2a49 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37443.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37443.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Automattic WP Job Manager - Resume Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Job Manager - Resume Manager: from n/a through 2.1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Automattic WP Job Manager - Resume Manager permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP Job Manager - Resume Manager: desde n/a hasta 2.1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37444.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37444.json index e31cb8c093a..de7a70df3e2 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37444.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37444.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WPMU DEV Defender Security allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Defender Security: from n/a through 4.7.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en WPMU DEV Defender Security permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Defender Security: desde n/a hasta 4.7.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37453.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37453.json index 8cf8fc1143e..2a0386d2bbb 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37453.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37453.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in ProfileGrid User Profiles ProfileGrid allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ProfileGrid: from n/a through 5.8.7." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en los perfiles de usuario de ProfileGrid permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a ProfileGrid: desde n/a hasta 5.8.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37456.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37456.json index cfdbd4c2a89..f5b05ac81b2 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37456.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37456.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Noptin Newsletter Noptin allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Noptin: from n/a through 3.4.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en el bolet\u00edn de Noptin Noptin permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Noptin: desde n/a hasta 3.4.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37463.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37463.json index b2dd64290d1..4d6b0b77bb7 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37463.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37463.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in CRM Perks CRM Perks Forms allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects CRM Perks Forms: from n/a through 1.1.5." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en CRM Perks CRM Perks Forms permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a CRM Perks Forms: desde n/a hasta 1.1.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37468.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37468.json index 512782bcd41..db9dde3d5c7 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37468.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37468.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in blazethemes Newsmatic allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Newsmatic: from n/a through 1.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en blazethemes Newsmatic permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Newsmatic: desde n/a hasta 1.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37470.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37470.json index 11ef4f7b9f8..4c7a344af38 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37470.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37470.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WofficeIO Woffice Core allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Woffice Core: from n/a through 5.4.8." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en WofficeIO Woffice Core permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Woffice Core: desde n/a hasta 5.4.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37475.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37475.json index 72591dcf3b2..08f68c99c98 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37475.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37475.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Automattic Newspack Newsletters allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Newspack Newsletters: from n/a through 2.13.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Automattic Newspack Newsletters permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Newspack Newsletters: desde n/a hasta 2.13.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37477.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37477.json index 31cd6d20acb..b798bd127da 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37477.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37477.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Automattic Newspack Content Converter allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Newspack Content Converter: from n/a through 0.1.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Automattic Newspack Content Converter permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Newspack Content Converter: desde n/a hasta 0.1.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37481.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37481.json index 7df8f136b35..e17c5acf3ce 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37481.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37481.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Post Grid Team by RadiusTheme The Post Grid allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects The Post Grid: from n/a through 7.7.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Post Grid Team de RadiusTheme The Post Grid permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a The Post Grid: desde n/a hasta 7.7.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37482.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37482.json index 50aad8bb52f..503e85201e3 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37482.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37482.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Post Grid Team by RadiusTheme The Post Grid allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects The Post Grid: from n/a through 7.7.4." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Post Grid Team de RadiusTheme The Post Grid permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a The Post Grid: desde n/a hasta 7.7.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37483.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37483.json index d112726d3ac..8f146473903 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37483.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37483.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Post Grid Team by RadiusTheme The Post Grid allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects The Post Grid: from n/a through 7.7.4." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Post Grid Team de RadiusTheme The Post Grid permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a The Post Grid: desde n/a hasta 7.7.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37505.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37505.json index dcf5ca5534e..8eadfb3c3f3 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37505.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37505.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Rara Themes Business One Page allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Business One Page: from n/a through 1.2.9." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Rara Themes Business One Page permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Business One Page: desde n/a hasta 1.2.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37506.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37506.json index fec9f1a62b6..79b05e0f81f 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37506.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37506.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Charitable Donations & Fundraising Team Charitable allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Charitable: from n/a through 1.8.1.7." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Charitable Donations & Fundraising Team Charitable. Charitable permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Charitable: desde n/a hasta 1.8.1.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37510.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37510.json index 8baec98c290..667ea37bfb5 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37510.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37510.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Charitable Donations & Fundraising Team Charitable allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Charitable: from n/a through 1.8.1.7." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Charitable Donations & Fundraising Team Charitable. Charitable permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Charitable: desde n/a hasta 1.8.1.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37516.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37516.json index eea6e1f90aa..e4313bab040 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37516.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37516.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in fifu.App Featured Image from URL allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Featured Image from URL: from n/a through 4.8.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en fifu.App Featured Image from URL permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Featured Image from URL: desde n/a hasta 4.8.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37517.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37517.json index 2568e346705..6d0fd276d73 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37517.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37517.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Brainstorm Force Spectra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Spectra: from n/a through 2.13.7." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Brainstorm Force Spectra permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Spectra: desde n/a hasta 2.13.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37921.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37921.json index ad20289c1eb..22723e2a4fd 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37921.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37921.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Kiboko Labs Chained Quiz allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Chained Quiz: from n/a through 1.3.2.8." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Kiboko Labs Chained Quiz permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Chained Quiz: desde n/a hasta 1.3.2.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37926.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37926.json index 954b81940bf..46c0354dd96 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37926.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37926.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Alex Volkov WP Accessibility Helper (WAH) allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WP Accessibility Helper (WAH): from n/a through 0.6.2.9." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Alex Volkov WP Accessibility Helper (WAH) permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a WP Accessibility Helper (WAH): desde n/a hasta 0.6.2.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37929.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37929.json index cdf725ecb57..10fc044779a 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37929.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37929.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in solwin User Activity Log Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects User Activity Log Pro: from n/a through 2.3.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en solwin User Activity Log Pro permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a User Activity Log Pro: desde n/a hasta 2.3.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38690.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38690.json index e20fcc596ea..a30b7c0f428 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38690.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38690.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Avirtum iPanorama 360 WordPress Virtual Tour Builder allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects iPanorama 360 WordPress Virtual Tour Builder: from n/a through 1.8.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Avirtum iPanorama 360 WordPress Virtual Tour Builder permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a iPanorama 360 WordPress Virtual Tour Builder: desde n/a hasta 1.8.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38695.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38695.json index 3e05b67c487..edc430f0a98 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38695.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38695.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Martin Gibson WP GoToWebinar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP GoToWebinar: from n/a through 15.6." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WP GoToWebinar de Martin Gibson permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP GoToWebinar: desde n/a hasta 15.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38702.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38702.json index 53311855b57..06b7c515fc8 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38702.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38702.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Tyche Softwares Product Delivery Date for WooCommerce \u2013 Lite allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Product Delivery Date for WooCommerce \u2013 Lite: from n/a through 2.7.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de falta de autorizaci\u00f3n en Tyche Softwares Product Delivery Date for WooCommerce \u2013 Lite permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Product Delivery Date for WooCommerce \u2013 Lite: desde n/a hasta 2.7.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38707.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38707.json index 0444d507118..950cf1ca0f1 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38707.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38707.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WPDeveloper EmbedPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EmbedPress: from n/a through 4.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en WPDeveloper EmbedPress permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a EmbedPress: desde n/a hasta 4.0.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38714.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38714.json index 00c520cc9f8..ea4daebec0c 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38714.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38714.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Epsiloncool WP Fast Total Search allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Fast Total Search: from n/a through 1.68.232." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Epsiloncool WP Fast Total Search permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP Fast Total Search: desde n/a hasta 1.68.232." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38719.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38719.json index 299abfe5761..54899e77851 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38719.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38719.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Creative Motion Auto Featured Image (Auto Post Thumbnail) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Auto Featured Image (Auto Post Thumbnail): from n/a through 4.1.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de falta de autorizaci\u00f3n en Creative Motion Auto Featured Image (Auto Post Thumbnail) permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Auto Featured Image (Auto Post Thumbnail): desde n/a hasta 4.1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38721.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38721.json index 137464bb07a..0fb00f3a6d2 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38721.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38721.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in spider-themes EazyDocs allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EazyDocs: from n/a through 2.5.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en los spider-themes de EazyDocs permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a EazyDocs: desde n/a hasta 2.5.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38726.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38726.json index 5796b84572a..262d7eeb43a 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38726.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38726.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in PickPlugins Product Designer allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Product Designer: from n/a through 1.0.33." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en PickPlugins Product Designer permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Product Designer: desde n/a hasta 1.0.33." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38727.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38727.json index c892a0595f3..cef3d861cd8 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38727.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38727.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Seraphinite Solutions Seraphinite Post .DOCX Source allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Seraphinite Post .DOCX Source: from n/a through 2.16.9." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Seraphinite Solutions Seraphinite Post .DOCX Source permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Seraphinite Post .DOCX Source: desde n/a hasta 2.16.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38733.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38733.json index d2b5f6b1293..5880a5080bb 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38733.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38733.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Meks Meks Video Importer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Meks Video Importer: from n/a through 1.0.12." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Meks Video Importer permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Meks Video Importer: desde n/a hasta 1.0.12." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38737.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38737.json index b8de48be5cf..3935f4b602d 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38737.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38737.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Reservation Diary ReDi Restaurant Reservation allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects ReDi Restaurant Reservation: from n/a through 24.0422." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en el diario de reservas ReDi Restaurant Reservation permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a ReDi Restaurant Reservation: desde n/a hasta 24.0422." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38740.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38740.json index 34ca8f1fb50..4a1b132f2ba 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38740.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38740.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Packlink Shipping S.L. Packlink PRO shipping module allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Packlink PRO shipping module: from n/a through 3.4.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Packlink Shipping SL El m\u00f3dulo de env\u00edo Packlink PRO permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al m\u00f3dulo de env\u00edo Packlink PRO: desde n/a hasta 3.4.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38743.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38743.json index 638fb378d01..fa4cc9fa4e2 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38743.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38743.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Access Control vulnerability in Upqode Plum: Spin Wheel & Email Pop-up allows .\n\nThis issue affects Plum: Spin Wheel & Email Pop-up: from n/a through 2.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de control de acceso en Upqode Plum: Spin Wheel & Email Pop-up permite . Este problema afecta a Plum: Spin Wheel & Email Pop-up: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38744.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38744.json index 7484cc3ca36..e142dd94ad0 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38744.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38744.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Upqode Plum: Spin Wheel & Email Pop-up allows Accessing Functionality Not Properly Constrained by ACLs, Stored XSS.This issue affects Plum: Spin Wheel & Email Pop-up: from n/a through 2.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Upqode Plum: Spin Wheel & Email Pop-up permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por ACL y XSS almacenados. Este problema afecta a Plum: Spin Wheel & Email Pop-up: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38745.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38745.json index 34335e54140..52ce9d98a63 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38745.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38745.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Rymera Web Co Wholesale Suite allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Wholesale Suite: from n/a through 2.1.12." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Rymera Web Co Wholesale Suite permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Wholesale Suite: desde n/a hasta 2.1.12." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38748.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38748.json index 899da830064..ef54e417a9d 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38748.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38748.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Access Control vulnerability in TheInnovs EleForms allows .\n\nThis issue affects EleForms: from n/a through 2.9.9.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control de acceso en TheInnovs EleForms permite . Este problema afecta a EleForms: desde n/a hasta 2.9.9.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38769.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38769.json index db3593734dc..86b395dcdf3 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38769.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38769.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Tyche Softwares Arconix Shortcodes allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Arconix Shortcodes: from n/a through 2.1.11." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Tyche Softwares Arconix Shortcodes permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Arconix Shortcodes: desde n/a hasta 2.1.11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38771.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38771.json index b099522c309..f1018dfcd87 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38771.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38771.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Atarim allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Atarim: from n/a through 4.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Atarim permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Atarim: desde n/a hasta 4.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38774.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38774.json index 021494a49fb..11db67d0df5 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38774.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38774.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in SiteGround SiteGround Security allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SiteGround Security: from n/a through 1.5.0." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en SiteGround SiteGround Security permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a SiteGround Security: desde n/a hasta 1.5.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38777.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38777.json index e376ba0326a..e7383fadacb 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38777.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38777.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in CreativeMotion Titan Anti-spam & Security allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Titan Anti-spam & Security: from n/a through 7.3.6." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en CreativeMotion Titan Anti-spam & Security permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Titan Anti-spam & Security: desde n/a hasta 7.3.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38783.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38783.json index 0218bb33f34..d70a8df896d 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38783.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38783.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Tyche Softwares Arconix FAQ allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Arconix FAQ: from n/a through 1.9.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Arconix FAQ de Tyche Software permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Arconix FAQ: desde n/a hasta 1.9.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38792.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38792.json index c28db8e4b47..19420ffdb43 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38792.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38792.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in ConveyThis Translate Team Language Translate Widget for WordPress \u2013 ConveyThis allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Language Translate Widget for WordPress \u2013 ConveyThis: from n/a through 234." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en ConveyThis Translate Team Language Translate Widget for WordPress \u2013 ConveyThis permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Language Translate Widget for WordPress \u2013 ConveyThis: desde n/a hasta 234." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38794.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38794.json index a2172840fde..44aa2570b2d 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38794.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38794.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in MediaRon LLC Custom Query Blocks allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Custom Query Blocks: from n/a through 5.2.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en MediaRon LLC Custom Query Blocks permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Custom Query Blocks: desde n/a hasta 5.2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39332.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39332.json index d58288aa5ad..97c0c3163eb 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39332.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39332.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Webswing 23.2.2 allows remote attackers to modify client-side JavaScript code to achieve path traversal, likely leading to remote code execution via modification of shell scripts on the server." + }, + { + "lang": "es", + "value": " Webswing 23.2.2 permite a atacantes remotos modificar el c\u00f3digo JavaScript del lado del cliente para lograr el path traversal, lo que probablemente conduce a la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de la modificaci\u00f3n de shell scripts en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39625.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39625.json index 2ff079b1ccc..d962bd41ac9 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39625.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39625.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in icegram Icegram allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Icegram: from n/a through 3.1.24." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Icegram Icegram permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Icegram: desde n/a hasta 3.1.24." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39635.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39635.json index 4960a335658..86fb20bd546 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39635.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39635.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in KaineLabs Youzify allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Youzify: from n/a through 1.2.6." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en KaineLabs Youzify permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Youzify: desde n/a hasta 1.2.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39639.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39639.json index bf55cea5ac4..ad9c2422200 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39639.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39639.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Broken Access Control vulnerability in Nickolas Bossinas WordPress File Upload allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress File Upload: from n/a through 4.24.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control de acceso roto en Nickolas Bossinas WordPress File Upload permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WordPress File Upload: desde n/a hasta 4.24.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39640.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39640.json index e96ba9f88af..8066ca7fe66 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39640.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39640.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in QuadLayers WP Social Feed Gallery allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Social Feed Gallery: from n/a through 4.3.9." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en QuadLayers WP Social Feed Gallery permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP Social Feed Gallery: desde n/a hasta 4.3.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39650.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39650.json index 3bb1e7591ce..86ae3a8b263 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39650.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39650.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WPWeb Elite WooCommerce PDF Vouchers allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WooCommerce PDF Vouchers: from n/a through\u00a04.9.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WPWeb Elite WooCommerce PDF Vouchers permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a WooCommerce PDF Vouchers: desde n/a hasta 4.9.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39654.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39654.json index b477b7616ab..ebb7c16d747 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39654.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39654.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Fetch Designs Sign-up Sheets allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sign-up Sheets: from n/a through 2.2.12." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Fetch Designs Sign-up Sheets permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Sign-up Sheets: desde n/a hasta 2.2.12." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39664.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39664.json index 7fd638c330a..b90328b2f8f 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39664.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39664.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in YMC Filter & Grids allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Filter & Grids: from n/a through 2.8.33." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en YMC Filter & Grids permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Filter & Grids: desde n/a hasta 2.8.33." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39719.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39719.json index e499ea06212..a16bdd350f2 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39719.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39719.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Ollama through 0.3.14. File existence disclosure can occur via api/create. When calling the CreateModel route with a path parameter that does not exist, it reflects the \"File does not exist\" error message to the attacker, providing a primitive for file existence on the server." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Ollama hasta la versi\u00f3n 0.3.14. La divulgaci\u00f3n de la existencia de un archivo puede ocurrir a trav\u00e9s de api/create. Al llamar a la ruta CreateModel con un par\u00e1metro de ruta que no existe, se refleja el mensaje de error \"El archivo no existe\" al atacante, lo que proporciona una primitiva sobre la existencia del archivo en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39720.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39720.json index fb0e171eceb..63cb8e30186 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39720.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39720.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Ollama before 0.1.46. An attacker can use two HTTP requests to upload a malformed GGUF file containing just 4 bytes starting with the GGUF custom magic header. By leveraging a custom Modelfile that includes a FROM statement pointing to the attacker-controlled blob file, the attacker can crash the application through the CreateModel route, leading to a segmentation fault (signal SIGSEGV: segmentation violation)." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en Ollama antes de la versi\u00f3n 0.1.46. Un atacante puede usar dos solicitudes HTTP para cargar un archivo GGUF malformado que contenga solo 4 bytes comenzando con el encabezado m\u00e1gico personalizado GGUF. Al aprovechar un Modelfile personalizado que incluye una declaraci\u00f3n FROM que apunta al archivo blob controlado por el atacante, el atacante puede bloquear la aplicaci\u00f3n a trav\u00e9s de la ruta CreateModel, lo que genera una segmentation fault (se\u00f1al SIGSEGV: segmentation violation)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39721.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39721.json index d0a9f0813fa..40bdc058d18 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39721.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39721.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Ollama before 0.1.34. The CreateModelHandler function uses os.Open to read a file until completion. The req.Path parameter is user-controlled and can be set to /dev/random, which is blocking, causing the goroutine to run infinitely (even after the HTTP request is aborted by the client)." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Ollama antes de la versi\u00f3n 0.1.34. La funci\u00f3n CreateModelHandler usa os.Open para leer un archivo hasta que se complete. El par\u00e1metro req.Path est\u00e1 controlado por el usuario y se puede configurar en /dev/random, que es bloqueador y hace que la goroutine se ejecute infinitamente (incluso despu\u00e9s de que el cliente cancele la solicitud HTTP)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39722.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39722.json index faf47028204..44792ddf8db 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39722.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39722.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Ollama before 0.1.46. It exposes which files exist on the server on which it is deployed via path traversal in the api/push route." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en Ollama antes de la versi\u00f3n 0.1.46. Expone qu\u00e9 archivos existen en el servidor en el que se implementa mediante el path traversal en la ruta api/push." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41738.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41738.json index 8109e46b92c..d81d0046fe1 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41738.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41738.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-01T17:15:16.033", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM TXSeries for Multiplatforms 10.1 could allow an attacker to obtain sensitive information from the query string of an HTTP GET method to process a request which could be obtained using man in the middle techniques." + }, + { + "lang": "es", + "value": " IBM TXSeries for Multiplatforms 10.1 podr\u00eda permitir que un atacante obtenga informaci\u00f3n confidencial de la cadena de consulta de un m\u00e9todo HTTP GET para procesar una solicitud que podr\u00eda obtenerse utilizando t\u00e9cnicas de tipo man in the middle." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41741.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41741.json index 016a0bec001..c32af98df96 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41741.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41741.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-01T17:15:16.320", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM TXSeries for Multiplatforms 10.1 could allow an attacker to determine valid usernames due to an observable timing discrepancy which could be used in further attacks against the system." + }, + { + "lang": "es", + "value": " IBM TXSeries for Multiplatforms 10.1 podr\u00eda permitir que un atacante determine nombres de usuario v\u00e1lidos debido a una discrepancia de tiempo observable que podr\u00eda usarse en futuros ataques contra el sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41744.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41744.json index 14bd785a91f..80f323729b1 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41744.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41744.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM CICS TX Standard 11.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts." + }, + { + "lang": "es", + "value": "IBM CICS TX Standard 11.1 es vulnerable a cross-site request forgery, lo que podr\u00eda permitir a un atacante ejecutar acciones maliciosas y no autorizadas transmitidas desde un usuario en el que el sitio web conf\u00eda." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41745.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41745.json index d3601df7ecf..94034cd7a1e 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41745.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41745.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-01T17:15:16.800", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM CICS TX Standard is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": " IBM CICS TX Standard es vulnerable a ataques de cross site scripting. Esta vulnerabilidad permite que un atacante no autenticado incorpore c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42011.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42011.json index ea9445cdf84..3649d1288c4 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42011.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42011.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T21:15:05.043", "lastModified": "2024-10-30T18:35:10.283", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42371.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42371.json index f34b156a062..f23967a7bcc 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42371.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42371.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T03:15:02.240", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42380.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42380.json index 9176b4a410b..634be9804db 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42380.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42380.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T03:15:02.653", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42515.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42515.json index db6aa12e3b8..f7800b345ba 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42515.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42515.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Glossarizer through 1.5.2 improperly tries to convert text into HTML. Even though the application itself escapes special characters (e.g., <>), the underlying library converts these encoded characters into legitimate HTML, thereby possibly causing stored XSS. Attackers can append a XSS payload to a word that has a corresponding glossary entry." + }, + { + "lang": "es", + "value": "Glossarizer hasta la versi\u00f3n 1.5.2 intenta convertir texto en HTML de forma incorrecta. Aunque la aplicaci\u00f3n en s\u00ed misma omite caracteres especiales (por ejemplo, <>), la librer\u00eda subyacente convierte estos caracteres codificados en HTML leg\u00edtimo, lo que posiblemente cause XSS almacenado. Los atacantes pueden agregar un payload XSS a una palabra que tenga una entrada de glosario correspondiente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42835.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42835.json index d5f821ea7e4..2d8853a161d 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42835.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42835.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "langflow v1.0.12 was discovered to contain a remote code execution (RCE) vulnerability via the PythonCodeTool component." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que langflow v1.0.12 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del componente PythonCodeTool." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43118.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43118.json index 8d1f50a3033..d57339742ee 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43118.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43118.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WPMU DEV Hummingbird allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Hummingbird: from n/a through 3.9.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WPMU DEV Hummingbird permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Hummingbird: desde n/a hasta 3.9.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43119.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43119.json index fc6a8ba91ae..15f2e636cce 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43119.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43119.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Aruba.It Aruba HiSpeed Cache allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Aruba HiSpeed Cache: from n/a through 2.0.12." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Aruba. Aruba HiSpeed Cache permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Aruba HiSpeed Cache: desde n/a hasta 2.0.12." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43120.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43120.json index dc97fa16ac5..7b2e41be5b4 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43120.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43120.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in XSERVER Inc. TypeSquare Webfonts allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects TypeSquare Webfonts: from n/a through 2.0.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en XSERVER Inc. TypeSquare Webfonts permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a TypeSquare Webfonts: desde n/a hasta 2.0.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43122.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43122.json index 5126d05d4eb..296df317faf 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43122.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43122.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Creative Motion Robin image optimizer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Robin image optimizer: from n/a through 1.6.9." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en el optimizador de im\u00e1genes Robin de Creative Motion permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Robin image optimizer: desde n/a hasta 1.6.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43134.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43134.json index 8aab228d7ac..5e966238d42 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43134.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43134.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in xootix Waitlist Woocommerce ( Back in stock notifier ) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Waitlist Woocommerce ( Back in stock notifier ): from n/a through 2.6." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en xootix Waitlist Woocommerce (Back in stock notifier) permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a la xootix Waitlist Woocommerce (Back in stock notifier): desde n/a hasta 2.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43136.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43136.json index f71a6457c69..b35ef2c3826 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43136.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43136.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WP Sunshine Sunshine Photo Cart allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sunshine Photo Cart: from n/a through 3.2.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WP Sunshine Sunshine Photo Cart permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Sunshine Photo Cart: desde n/a hasta 3.2.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43142.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43142.json index 8dc9e269f15..9adcd0e0156 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43142.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43142.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Themeum Tutor LMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tutor LMS: from n/a through 2.7.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Themeum Tutor LMS permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Tutor LMS: desde n/a hasta 2.7.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43143.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43143.json index 79b2c78a562..0ddf9293ab5 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43143.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43143.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Roundup WP Registrations for the Events Calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Registrations for the Events Calendar: from n/a through 2.12.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Roundup WP Registrations for the Events Calendar permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Registrations for the Events Calendar: desde n/a hasta 2.12.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43146.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43146.json index 9f0289594fa..94505749303 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43146.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43146.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Ahmed Kaludi, Mohammed Kaludi AMP for WP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects AMP for WP: from n/a through 1.0.96.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Ahmed Kaludi, Mohammed Kaludi AMP para WP permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a AMP para WP: desde n/a hasta 1.0.96.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43154.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43154.json index 3fdea6b6b45..3b67ed4c91c 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43154.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43154.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in BracketSpace Advanced Cron Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Advanced Cron Manager \u2013 debug & control: from n/a through 2.5.9." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en BracketSpace Advanced Cron Manager permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Advanced Cron Manager \u2013 debug & control: desde n/a hasta 2.5.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43157.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43157.json index f897de600bb..bd8f95858d8 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43157.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43157.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in nCrafts FormCraft allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FormCraft: from n/a through 1.2.10." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en nCrafts FormCraft permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a FormCraft: desde n/a hasta 1.2.10." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43158.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43158.json index 60828eb9769..28a414646b4 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43158.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43158.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Masteriyo Masteriyo - LMS allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Masteriyo - LMS: from n/a through 1.11.4." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Masteriyo Masteriyo - LMS permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Masteriyo - LMS: desde n/a hasta 1.11.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43159.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43159.json index 8535a5f1a37..04795a9e429 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43159.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43159.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Masteriyo Masteriyo - LMS allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Masteriyo - LMS: from n/a through 1.11.6." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Masteriyo Masteriyo - LMS permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Masteriyo - LMS: desde n/a hasta 1.11.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43162.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43162.json index 2c0561ebc18..15eeff273bc 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43162.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43162.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Easy Digital Downloads allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Digital Downloads: from n/a through 3.2.12." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Easy Digital Downloads permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Easy Digital Downloads: desde n/a hasta 3.2.12." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43208.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43208.json index e55333311a6..51a99d45e56 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43208.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43208.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Miller Media ( Matt Miller ) Send Emails with Mandrill allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Send Emails with Mandrill: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Send Emails with Mandrill de Miller Media (Matt Miller) permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Send Emails with Mandrill: desde n/a hasta 1.4.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43209.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43209.json index 93c37fa8133..aa9ebfef808 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43209.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43209.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Bitly allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Bitly: from n/a through 2.7.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Bitly permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Bitly: desde n/a hasta 2.7.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43211.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43211.json index a8d86bbb4e3..666e9724a8a 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43211.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43211.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability in PluginOps MailChimp Subscribe Forms allows Stored XSS.This issue affects MailChimp Subscribe Forms: from n/a through 4.0.9.8." + }, + { + "lang": "es", + "value": " La vulnerabilidad de cross site scripting (XSS) en MailChimp Subscribe Forms de PluginOps permite XSS almacenado. Este problema afecta a MailChimp Subscribe Forms: desde n/a hasta 4.0.9.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43212.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43212.json index b71a91c5d92..6d1632c222d 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43212.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43212.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in MagePeople Team WpTravelly allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WpTravelly: from n/a through 1.7.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en MagePeople Team WpTravelly permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a WpTravelly: desde n/a hasta 1.7.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43215.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43215.json index 4208fe150ef..4f94b3fd62c 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43215.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43215.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in creativemotion Social Slider Feed allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Social Slider Feed: from n/a through 2.2.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Social Slider Feed de creativemotion permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Social Slider Feed: desde n/a hasta 2.2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43223.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43223.json index 4d43dfe7879..1c7773ed079 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43223.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43223.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in EventPrime Events EventPrime allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EventPrime: from n/a through 4.0.3.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en EventPrime Events EventPrime permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a EventPrime: desde n/a hasta 4.0.3.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43229.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43229.json index d5f468a20de..44b5c00d5b3 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43229.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43229.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Cornel Raiu WP Search Analytics allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Search Analytics: from n/a through 1.4.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Cornel Raiu WP Search Analytics permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP Search Analytics: desde n/a hasta 1.4.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43235.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43235.json index e964094ec03..5d737f5b4e7 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43235.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43235.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in MetaBox.Io Meta Box \u2013 WordPress Custom Fields Framework allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Meta Box \u2013 WordPress Custom Fields Framework: from n/a through 5.9.10." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en MetaBox.Io Meta Box \u2013 WordPress Custom Fields Framework permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Meta Box \u2013 WordPress Custom Fields Framework: desde n/a hasta 5.9.10." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43253.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43253.json index 4abdab0278f..2828186c44b 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43253.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43253.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Zaytech Smart Online Order for Clover allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Smart Online Order for Clover: from n/a through 1.5.6." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Zaytech Smart Online Order para Clover permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Smart Online Order para Clover: desde n/a hasta 1.5.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43254.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43254.json index fe4b3452145..48791e9f6ae 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43254.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43254.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Zaytech Smart Online Order for Clover allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smart Online Order for Clover: from n/a through 1.5.6." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Zaytech Smart Online Order para Clover permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Smart Online Order para Clover: desde n/a hasta 1.5.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43260.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43260.json index 7f63f906c50..47104c59cb4 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43260.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43260.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Creative Motion Clearfy Cache allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Clearfy Cache: from n/a through 2.2.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Creative Motion Clearfy Cache permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Clearfy Cache: desde n/a hasta 2.2.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43268.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43268.json index 489f5551d6f..0fcd2da6061 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43268.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43268.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Access Control vulnerability in WPBackItUp Backup and Restore WordPress allows .\n\nThis issue affects Backup and Restore WordPress: from n/a through 1.50." + }, + { + "lang": "es", + "value": " La vulnerabilidad de control de acceso en WPBackItUp Backup and Restore WordPress permite . Este problema afecta a Backup and Restore WordPress: desde n/a hasta 1.50." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43270.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43270.json index a0414d07eea..51a5f0159f3 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43270.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43270.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WPBackItUp Backup and Restore WordPress allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Backup and Restore WordPress: from n/a through 1.50." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WPBackItUp Backup and Restore WordPress permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Backup and Restore WordPress: desde n/a hasta 1.50." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43273.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43273.json index 17ba36ada31..2356bcbb176 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43273.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43273.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in icegram Icegram Collect plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Icegram Collect plugin: from n/a through 1.3.14." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en el complemento Icegram Collect permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al complemento Icegram Collect: desde n/a hasta 1.3.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43274.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43274.json index 5a2f34e6d98..d3e325b8bf3 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43274.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43274.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in JS Help Desk JS Help Desk \u2013 Best Help Desk & Support Plugin allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects JS Help Desk \u2013 Best Help Desk & Support Plugin: from n/a through 2.8.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en JS Help Desk JS Help Desk \u2013 Best Help Desk & Support Plugin permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a JS Help Desk \u2013 Best Help Desk & Support Plugin: desde n/a hasta 2.8.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43277.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43277.json index e3544ce4d96..0166301f336 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43277.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43277.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in AyeCode Ltd UsersWP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects UsersWP: from n/a through 1.2.15." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en UsersWP de AyeCode Ltd permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a UsersWP: desde n/a hasta 1.2.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43285.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43285.json index 77541749c8c..900dc53c747 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43285.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43285.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Presto Made, Inc Presto Player allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Presto Player: from n/a through 3.0.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Presto Made, Inc. Presto Player permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Presto Player: desde n/a hasta 3.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43290.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43290.json index 5c165fbd332..4366a948cb3 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43290.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43290.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Atarim allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Atarim: from n/a through 4.0.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Atarim permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Atarim: desde n/a hasta 4.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43293.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43293.json index 9a11493fb70..279876972a6 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43293.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43293.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:45.590", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in WPZOOM Recipe Card Blocks for Gutenberg & Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Recipe Card Blocks for Gutenberg & Elementor: from n/a through 3.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en WPZOOM Recipe Card Blocks for Gutenberg & Elementor permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Recipe Card Blocks for Gutenberg & Elementor: desde n/a hasta 3.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43296.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43296.json index 6e8dd684502..efea915b61c 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43296.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43296.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:45.787", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in bPlugins LLC Flash & HTML5 Video allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Flash & HTML5 Video: from n/a through 2.5.30." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en bPlugins LLC Flash y HTML5 Video permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Flash y HTML5 Video: desde n/a hasta 2.5.30." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43297.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43297.json index 2f4b26ecaa0..875042071b5 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43297.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43297.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:46.007", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Migrate Clone allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Clone: from n/a through 2.4.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Migrate Clone permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Clone: desde n/a hasta 2.4.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43298.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43298.json index 90c7b297e51..65536955503 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43298.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43298.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:46.227", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Migrate Clone allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Clone: from n/a through 2.4.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Migrate Clone permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Clone: desde n/a hasta 2.4.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43302.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43302.json index 4cb7f813278..cdb54f84f6b 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43302.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43302.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:46.447", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Fonts Plugin Fonts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fonts: from n/a through 3.7.7." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en el complemento Fonts permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Fonts: desde n/a hasta 3.7.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43310.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43310.json index 91db7d92542..6db65755e1d 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43310.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43310.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:46.670", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in UkrSolution Print Barcode Labels for your WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Print Barcode Labels for your WooCommerce products/orders: from n/a through 3.4.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en UkrSolution Print Barcode Labels for your WooCommerce permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Print Barcode Labels for your WooCommerce para productos/pedidos de : desde n/a hasta 3.4.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43312.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43312.json index 704ab158b69..455c83a5b58 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43312.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43312.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:46.893", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in WPClever WPC Frequently Bought Together for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPC Frequently Bought Together for WooCommerce: from n/a through 7.1.9." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WPClever WPC Frequently Bought Together for WooCommerce permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WPC Frequently Bought Together for WooCommerce: desde n/a hasta 7.1.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43314.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43314.json index 1ac6e358ec2..17faf183adc 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43314.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43314.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:47.117", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Gabe Livan Asset CleanUp: Page Speed Booster allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Asset CleanUp: Page Speed Booster: from n/a through 1.3.9.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Gabe Livan Asset CleanUp: Page Speed Booster permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Asset CleanUp: Page Speed Booster: desde n/a hasta 1.3.9.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43323.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43323.json index e77a53eaa77..13b20823464 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43323.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43323.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:47.367", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in ReviewX allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects ReviewX: from n/a through 1.6.28." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en ReviewX permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a ReviewX: desde n/a hasta 1.6.28." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43332.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43332.json index ae85c993619..f8eb1fbdf13 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43332.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43332.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:47.593", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Jordy Meow Photo Engine allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Photo Engine: from n/a through 6.4.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Jordy Meow Photo Engine permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Photo Engine: desde n/a hasta 6.4.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43341.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43341.json index cdeac2f6664..0909bb8f7c6 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43341.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43341.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:47.800", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in CozyThemes Hello Agency allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Hello Agency: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en CozyThemes Hello Agency permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Hello Agency: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43343.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43343.json index b99678d3cbe..441f7c16427 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43343.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43343.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:48.020", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Etoile Web Design Order Tracking allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Order Tracking: from n/a through 3.3.12." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Etoile Web Design Order Tracking permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Order Tracking: desde n/a hasta 3.3.12." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43355.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43355.json index 3fefb356fc5..2e144d57c1e 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43355.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43355.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:48.240", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in BearDev JoomSport allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JoomSport: from n/a through 5.3.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en BearDev JoomSport permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a JoomSport: desde n/a hasta 5.3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43383.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43383.json index 79b4ca88d74..0c33d489709 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43383.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43383.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Apache Lucene.Net.Replicator.\n\nThis issue affects Apache Lucene.NET's Replicator library: from 4.8.0-beta00005 through 4.8.0-beta00016.\n\nAn attacker that can intercept traffic between a replication client and server, or control the target replication node URL, can provide a specially-crafted JSON response that is deserialized as an attacker-provided exception type. This can result in remote code execution or other potential unauthorized access.\n\n\nUsers are recommended to upgrade to version 4.8.0-beta00017, which fixes the issue." + }, + { + "lang": "es", + "value": " Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Apache Lucene.Net.Replicator. Este problema afecta a la librer\u00eda Replicator de Apache Lucene.NET: desde la versi\u00f3n 4.8.0-beta00005 hasta la 4.8.0-beta00016. Un atacante que pueda interceptar el tr\u00e1fico entre un cliente y un servidor de replicaci\u00f3n, o controlar la URL del nodo de replicaci\u00f3n de destino, puede proporcionar una respuesta JSON especialmente manipulada que se deserializa como un tipo de excepci\u00f3n proporcionado por el atacante. Esto puede provocar la ejecuci\u00f3n remota de c\u00f3digo u otro posible acceso no autorizado. Se recomienda a los usuarios que actualicen a la versi\u00f3n 4.8.0-beta00017, que soluciona el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43468.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43468.json index 08d5dedd78d..481dc3a2dcf 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43468.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43468.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:09.537", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43566.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43566.json index fa64cf1a26b..dbb4915d30a 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43566.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43566.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Edge (basado en Chromium)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43578.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43578.json index 211f3fff690..982c16a60a9 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43578.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43578.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Edge (basado en Chromium)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43579.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43579.json index d31ed90f2b2..3bc167c27f6 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43579.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43579.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Edge (basado en Chromium)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43580.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43580.json index 7860cce54bc..58e2f1bc169 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43580.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43580.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad en Microsoft Edge (basado en Chromium)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43587.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43587.json index 01258e2b5b5..2ff42360692 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43587.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43587.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Edge (basado en Chromium)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43595.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43595.json index 66120fb5206..4d4465338ae 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43595.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43595.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Edge (basado en Chromium)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43596.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43596.json index 46b668bd853..fa934f33411 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43596.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43596.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Edge (basado en Chromium)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43698.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43698.json index b6aa39d2635..55505412187 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43698.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43698.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-10-22T22:15:04.943", "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43812.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43812.json index 48279209295..5c5d812f128 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43812.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43812.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-10-22T22:15:05.180", "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43919.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43919.json index d4d53f70820..829cae2cba9 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43919.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43919.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:48.450", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Access Control vulnerability in YARPP YARPP allows .\n\nThis issue affects YARPP: from n/a through 5.30.10." + }, + { + "lang": "es", + "value": " Vulnerabilidad de control de acceso en YARPP YARPP permite . Este problema afecta a YARPP: desde n/a hasta 5.30.10." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43923.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43923.json index d19c2d86ee8..7626d014728 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43923.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43923.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:48.660", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Arraytics Timetics allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Timetics: from n/a through 1.0.23." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Arraytics Timetics permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Timetics: desde n/a hasta 1.0.23." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43925.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43925.json index 8b52e58c3ef..8c5f3f975ec 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43925.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43925.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:48.863", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Envira Gallery Team Envira Photo Gallery allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Envira Photo Gallery: from n/a through 1.8.14." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Envira Gallery Team Envira Photo Gallery permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Envira Photo Gallery: desde n/a hasta 1.8.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43928.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43928.json index ec430814468..8f32666ad44 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43928.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43928.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:49.080", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in eyecix JobSearch allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JobSearch: from n/a through 2.5.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Eyecix JobSearch permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a JobSearch: desde n/a hasta 2.5.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43929.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43929.json index 639ebbd0821..b804e56e7b7 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43929.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43929.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:49.293", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in eyecix JobSearch allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects JobSearch: from n/a through 2.5.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Eyecix JobSearch permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a JobSearch: desde n/a hasta 2.5.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43930.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43930.json index eb922ed21d1..31f9a0f5e09 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43930.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43930.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in eyecix JobSearch allows Cross Site Request Forgery.This issue affects JobSearch: from n/a through 2.5.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Eyecix JobSearch permite Cross-Site Request Forgery. Este problema afecta a JobSearch: desde n/a hasta 2.5.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43932.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43932.json index ccd8925a8e5..f809ee565b0 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43932.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43932.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:49.503", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in POSIMYTH The Plus Addons for Elementor Page Builder Lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects The Plus Addons for Elementor Page Builder Lite: from n/a through 5.6.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en POSIMYTH The Plus Addons para Elementor Page Builder Lite permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a The Plus Addons para Elementor Page Builder Lite: desde n/a hasta 5.6.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43933.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43933.json index 8130bb0315a..24b79ab26ec 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43933.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43933.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPMobile.App allows Stored XSS.This issue affects WPMobile.App: from n/a through 11.48." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WPMobile.App permite Cross-Site Scripting (XSS) almacenado. Este problema afecta a WPMobile.App: desde n/a hasta 11.48." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43984.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43984.json index f06d5ad28a8..21251f83620 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43984.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43984.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Podcast Publisher allows Code Injection.This issue affects Podlove Podcast Publisher: from n/a through 4.1.13." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Podlove Podlove Podcast Publisher permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Podlove Podcast Publisher: desde n/a hasta 4.1.13." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44098.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44098.json index cee3f63ef04..a634f0833f0 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44098.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44098.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In lwis_device_event_states_clear_locked of lwis_event.c, there is a possible privilege escalation due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En lwis_device_event_states_clear_locked de lwis_event.c, existe una posible escalada de privilegios debido a una doble liberaci\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44115.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44115.json index c2000d64571..4e25b05324c 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44115.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44115.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T03:15:03.293", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44116.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44116.json index d99612fe047..a99b8d57157 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44116.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44116.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T03:15:03.490", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44117.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44117.json index 47dc1d66389..18e7b8a9063 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44117.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44117.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T05:15:11.050", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44232.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44232.json index 74326814ebe..5912b56b50f 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44232.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44232.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": " El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. El an\u00e1lisis de un archivo de video creado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema." + "value": " El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. El an\u00e1lisis de un archivo de video manipulado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44233.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44233.json index 13dc8a952f9..32372b7ceae 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44233.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44233.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": " El problema se solucion\u00f3 con comprobaciones de l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. El an\u00e1lisis de un archivo de video creado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema." + "value": " El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. El an\u00e1lisis de un archivo de video manipulado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44234.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44234.json index 769e13d24bb..304e07169e4 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44234.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44234.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": " El problema se solucion\u00f3 con comprobaciones de l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. El an\u00e1lisis de un archivo de video creado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema." + "value": " El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. El an\u00e1lisis de un archivo de video manipulado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44259.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44259.json index 6b118f894ce..a37001a7c55 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44259.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44259.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.160", "lastModified": "2024-10-29T23:15:03.663", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44261.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44261.json index 92b88c002ca..48c02a15b2e 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44261.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44261.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.220", "lastModified": "2024-10-29T21:35:17.520", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44263.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44263.json index 86381e73905..0808fc99210 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44263.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44263.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.333", "lastModified": "2024-10-29T20:35:30.263", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44275.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44275.json index 9b9181a4d94..ca993749593 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44275.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44275.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.877", "lastModified": "2024-10-29T19:35:17.777", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44277.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44277.json index 58c098f831a..66c25be8f8b 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44277.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44277.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.950", "lastModified": "2024-10-29T21:35:17.737", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44278.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44278.json index 34b983cfcc6..57604194047 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44278.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44278.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.027", "lastModified": "2024-10-30T14:35:12.077", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44280.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44280.json index 77f0c150c1b..9d38c612dc2 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44280.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44280.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.180", "lastModified": "2024-10-30T15:35:17.173", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45285.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45285.json index b170a29e0ec..e8e044aaa21 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45285.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45285.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T05:15:12.590", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45309.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45309.json index eefc9c064b7..c1cb96952e6 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45309.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45309.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "OneDev is a Git server with CI/CD, kanban, and packages. A vulnerability in versions prior to 11.0.9 allows unauthenticated users to read arbitrary files accessible by the OneDev server process. This issue has been fixed in version 11.0.9." + }, + { + "lang": "es", + "value": "OneDev es un servidor Git con CI/CD, kanban y paquetes. Una vulnerabilidad en versiones anteriores a la 11.0.9 permite que usuarios no autenticados lean archivos arbitrarios a los que puede acceder el proceso del servidor OneDev. Este problema se ha solucionado en la versi\u00f3n 11.0.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45396.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45396.json index 4a3e62a9f5e..637e2517040 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45396.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45396.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:04.457", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45397.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45397.json index fb24db4a04f..6eb74780dbc 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45397.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45397.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:04.690", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45402.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45402.json index c94b7ee395c..68073721d67 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45402.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45402.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:04.903", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45403.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45403.json index 4d48d676ebb..412c900f453 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45403.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45403.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:05.123", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45882.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45882.json index d7dad6a5101..898308090d4 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45882.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45882.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 contains a command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `delete_map_profile.`" + }, + { + "lang": "es", + "value": " DrayTek Vigor3900 1.5.1.3 contiene una vulnerabilidad de inyecci\u00f3n de comandos. Esta vulnerabilidad se produce cuando el par\u00e1metro `action` en `cgi-bin/mainfunction.cgi` se establece en `delete_map_profile`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45884.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45884.json index 3d54bd4fb6c..05af84cbb06 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45884.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45884.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `setSWMGroup.`" + }, + { + "lang": "es", + "value": " DrayTek Vigor3900 1.5.1.3 contiene una vulnerabilidad de inyecci\u00f3n de comandos posterior a la autenticaci\u00f3n. Esta vulnerabilidad se produce cuando el par\u00e1metro `action` en `cgi-bin/mainfunction.cgi` se establece en `setSWMGroup`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45885.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45885.json index ca74e1d4f17..a27b4b9b490 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45885.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45885.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `autodiscovery_clear.`" + }, + { + "lang": "es", + "value": " DrayTek Vigor3900 1.5.1.3 contiene una vulnerabilidad de inyecci\u00f3n de comandos posterior a la autenticaci\u00f3n. Esta vulnerabilidad se produce cuando el par\u00e1metro `action` en `cgi-bin/mainfunction.cgi` se establece en `autodiscovery_clear`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45887.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45887.json index 2647fb71470..05aa204e095 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45887.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45887.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `doOpenVPN.`" + }, + { + "lang": "es", + "value": " DrayTek Vigor3900 1.5.1.3 contiene una vulnerabilidad de inyecci\u00f3n de comandos posterior a la autenticaci\u00f3n. Esta vulnerabilidad se produce cuando el par\u00e1metro `action` en `cgi-bin/mainfunction.cgi` se establece en `doOpenVPN.`" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45888.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45888.json index 357997db2de..f0f6bcf38bd 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45888.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45888.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 contains a command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `set_ap_map_config.'" + }, + { + "lang": "es", + "value": "DrayTek Vigor3900 1.5.1.3 contiene una vulnerabilidad de inyecci\u00f3n de comandos. Esta vulnerabilidad se produce cuando el par\u00e1metro `action` en `cgi-bin/mainfunction.cgi` se establece en `set_ap_map_config.'" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45889.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45889.json index 5d08904e94a..4036e5e6861 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45889.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45889.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `commandTable.`" + }, + { + "lang": "es", + "value": " DrayTek Vigor3900 1.5.1.3 contiene una vulnerabilidad de inyecci\u00f3n de comandos posterior a la autenticaci\u00f3n. Esta vulnerabilidad se produce cuando el par\u00e1metro `action` en `cgi-bin/mainfunction.cgi` se establece en `commandTable.`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45890.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45890.json index 7c491224e3c..c86933a7139 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45890.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45890.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `download_ovpn.`" + }, + { + "lang": "es", + "value": " DrayTek Vigor3900 1.5.1.3 contiene una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n. Esta vulnerabilidad ocurre cuando el par\u00e1metro `action` en `cgi-bin/mainfunction.cgi` se establece en `download_ovpn`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45891.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45891.json index aaf2e886c56..bda7c39c274 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45891.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45891.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `delete_wlan_profile.`" + }, + { + "lang": "es", + "value": " DrayTek Vigor3900 1.5.1.3 contiene una vulnerabilidad de inyecci\u00f3n de comandos posterior a la autenticaci\u00f3n. Esta vulnerabilidad se produce cuando el par\u00e1metro `action` en `cgi-bin/mainfunction.cgi` se establece en `delete_wlan_profile`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45893.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45893.json index afe4fff0a85..beace1788ee 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45893.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45893.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `setSWMOption.`" + }, + { + "lang": "es", + "value": "DrayTek Vigor3900 1.5.1.3 contiene una vulnerabilidad de inyecci\u00f3n de comandos posterior a la autenticaci\u00f3n. Esta vulnerabilidad se produce cuando el par\u00e1metro `action` en `cgi-bin/mainfunction.cgi` se establece en `setSWMOption`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47013.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47013.json index 463bd5bfea9..3931b3e465a 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47013.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47013.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In pmucal_rae_handle_seq_int of flexpmu_cal_rae.c, there is a possible arbitrary write due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En pmucal_rae_handle_seq_int de flexpmu_cal_rae.c, existe una posible escritura arbitraria debido a datos no inicializados. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47014.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47014.json index a742bcf8523..c321fa94982 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47014.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47014.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Android before 2024-10-05 on Google Pixel devices allows privilege escalation in the ABL component, A-330537292." + }, + { + "lang": "es", + "value": "Android anterior al 2024-10-05 en los dispositivos Google Pixel permite la escalada de privilegios en el componente ABL, A-330537292." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47015.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47015.json index 695a68d7979..858cc521b5d 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47015.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47015.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In ProtocolMiscHwConfigChangeAdapter::GetData() of protocolmiscadapter.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En ProtocolMiscHwConfigChangeAdapter::GetData() de protocolmiscadapter.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local y comprometer el firmware de banda base. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47016.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47016.json index 9a6f7e2be55..94df0a463cf 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47016.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47016.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "there is a possible privilege escalation due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "Existe una posible escalada de privilegios debido a un valor predeterminado inseguro. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47074.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47074.json index 72e1960ade1..776ec9770bb 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47074.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47074.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:05.353", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47183.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47183.json index 222cb8efa46..e0938d696b5 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47183.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47183.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-04T15:15:13.010", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47302.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47302.json index e29bbe451ea..37d9903cc3e 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47302.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47302.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:53.547", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in WPManageNinja LLC Fluent Support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fluent Support: from n/a through 1.8.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WPManageNinja LLC Fluent Support permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Fluent Support: desde n/a hasta 1.8.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47308.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47308.json index f4da02dfda8..d1c5f05878b 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47308.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47308.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:53.743", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Templately allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Templately: from n/a through 3.1.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Templately permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Templately: desde n/a hasta 3.1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47311.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47311.json index a4949ea2e9c..f0796e64d1f 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47311.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47311.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:53.960", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Kraft Plugins Wheel of Life allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Wheel of Life: from n/a through 1.1.8." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Kraft Plugins Wheel of Life permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Wheel of Life: desde n/a hasta 1.1.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47314.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47314.json index eee3fdd151c..a98b16aac9c 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47314.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47314.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:54.170", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in WP Sunshine Sunshine Photo Cart allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sunshine Photo Cart: from n/a through 3.2.8." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WP Sunshine Sunshine Photo Cart permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Sunshine Photo Cart: desde n/a hasta 3.2.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47317.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47317.json index 8a55a69e534..c22a5d5b389 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47317.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47317.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:54.400", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in WP Quads Ads by WPQuads \u2013 Adsense Ads, Banner Ads, Popup Ads allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ads by WPQuads \u2013 Adsense Ads, Banner Ads, Popup Ads: from n/a through 2.0.84." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WP Quads Ads de WPQuads (Adsense Ads, Banner Ads, Popup Ads) permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Ads by WPQuads (Adsense Ads, Banner Ads, Popup Ads): desde n/a hasta 2.0.84." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47318.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47318.json index ab66c674226..f0b2366be6e 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47318.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47318.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:54.617", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Magazine3 PWA for WP & AMP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PWA for WP & AMP: from n/a through 1.7.72." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Magazine3 PWA para WP y AMP permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a PWA para WP y AMP: desde n/a hasta 1.7.72." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47321.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47321.json index 72e12968a5e..7586cfe7d07 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47321.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47321.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:54.840", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Fahad Mahmood WP Datepicker allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WP Datepicker: from n/a through 2.1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Fahad Mahmood WP Datepicker permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a WP Datepicker: desde n/a hasta 2.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47358.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47358.json index dc6af6c96cc..ed834042b43 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47358.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47358.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:55.043", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Popup Maker allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Popup Maker: from n/a through 1.19.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Popup Maker permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Popup Maker: desde n/a hasta 1.19.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47359.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47359.json index 1bca1add836..7d38afd3b78 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47359.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47359.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:55.270", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Depicter Slider and Popup by Averta Depicter Slider allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Depicter Slider: from n/a through 3.2.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Depicter Slider y Popup de Averta Depicter Slider permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Depicter Slider: desde n/a hasta 3.2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47361.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47361.json index 1cc914a4d8b..49acbe06b82 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47361.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47361.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:55.490", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in WPVibes Elementor Addon Elements allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Elementor Addon Elements: from n/a through 1.13.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en WPVibes Elementor Addon Elements permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Elementor Addon Elements: desde n/a hasta 1.13.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47401.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47401.json index 577ab829745..89d69bd2100 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47401.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47401.json @@ -3,7 +3,7 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-10-29T09:15:07.753", "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47529.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47529.json index 7972358caed..76bf9c74b87 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47529.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47529.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-02T20:15:11.740", "lastModified": "2024-10-31T14:15:05.980", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47604.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47604.json index e151704a02c..b7e43e51548 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47604.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47604.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-01T16:15:10.003", "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json index 8c782ac8266..9c118e84d54 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb.c: fix UAF of vma in hugetlb fault pathway\n\nSyzbot reports a UAF in hugetlb_fault(). This happens because\nvmf_anon_prepare() could drop the per-VMA lock and allow the current VMA\nto be freed before hugetlb_vma_unlock_read() is called.\n\nWe can fix this by using a modified version of vmf_anon_prepare() that\ndoesn't release the VMA lock on failure, and then release it ourselves\nafter hugetlb_vma_unlock_read()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/hugetlb.c: correcci\u00f3n del UAF de vma en la ruta de error hugetlb Syzbot informa un UAF en hugetlb_fault(). Esto sucede porque vmf_anon_prepare() podr\u00eda eliminar el bloqueo por VMA y permitir que se libere el VMA actual antes de que se llame a hugetlb_vma_unlock_read(). Podemos solucionar esto utilizando una versi\u00f3n modificada de vmf_anon_prepare() que no libere el bloqueo de VMA en caso de error y luego lo liberemos nosotros mismos despu\u00e9s de hugetlb_vma_unlock_read()." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47677.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47677.json index 1dc80d7124a..04f75a49095 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47677.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47677.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nexfat: resolve memory leak from exfat_create_upcase_table()\n\nIf exfat_load_upcase_table reaches end and returns -EINVAL,\nallocated memory doesn't get freed and while\nexfat_load_default_upcase_table allocates more memory, leading to a\nmemory leak.\n\nHere's link to syzkaller crash report illustrating this issue:\nhttps://syzkaller.appspot.com/text?tag=CrashReport&x=1406c201980000" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exfat: resuelve la p\u00e9rdida de memoria de exfat_create_upcase_table() Si exfat_load_upcase_table llega al final y devuelve -EINVAL, la memoria asignada no se libera y mientras exfat_load_default_upcase_table asigna m\u00e1s memoria, lo que provoca una p\u00e9rdida de memoria. Aqu\u00ed hay un enlace al informe de fallos de syzkaller que ilustra este problema: https://syzkaller.appspot.com/text?tag=CrashReport&x=1406c201980000" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47681.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47681.json index 9f3f8569c6c..eb343903121 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47681.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47681.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he\n\nFix the NULL pointer dereference in mt7996_mcu_sta_bfer_he\nroutine adding an sta interface to the mt7996 driver.\n\nFound by code review." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mt76: mt7996: se corrige la desreferencia de puntero NULL en mt7996_mcu_sta_bfer_he Se corrige la desreferencia de puntero NULL en la rutina mt7996_mcu_sta_bfer_he a\u00f1adiendo una interfaz sta al controlador mt7996. Se encontr\u00f3 mediante una revisi\u00f3n de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47741.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47741.json index ac4bc8625d3..c3141d499c3 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47741.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47741.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: arreglo de ejecuci\u00f3n que establece el archivo privado en lseek concurrente usando el mismo fd Al realizar llamadas al sistema lseek(2) concurrentes contra el mismo descriptor de archivo, usando m\u00faltiples subprocesos que pertenecen al mismo proceso, tenemos una ventana de tiempo corta donde ocurre una ejecuci\u00f3n y puede resultar en una p\u00e9rdida de memoria. La ejecuci\u00f3n ocurre as\u00ed: 1) Un programa abre un descriptor de archivo para un archivo y luego genera dos subprocesos (con la biblioteca pthreads por ejemplo), llam\u00e9moslos tarea A y tarea B; 2) La tarea A llama a lseek con SEEK_DATA o SEEK_HOLE y termina en file.c:find_desired_extent() mientras mantiene un bloqueo de lectura en el inodo; 3) Al comienzo de find_desired_extent(), extrae el puntero private_data del archivo en una variable local llamada 'private', que tiene un valor de NULL; 4) La tarea B tambi\u00e9n llama a lseek con SEEK_DATA o SEEK_HOLE, bloquea el inodo en modo compartido e ingresa a file.c:find_desired_extent(), donde tambi\u00e9n extrae file->private_data en su variable local 'private', que tiene un valor NULL; 5) Debido a que vio un archivo privado NULL, la tarea A asigna una estructura privada y la asigna a la estructura de archivo; 6) La tarea B tambi\u00e9n vio un archivo privado NULL, por lo que tambi\u00e9n asigna su propio archivo privado y luego lo asigna a la misma estructura de archivo, ya que ambas tareas est\u00e1n usando el mismo descriptor de archivo. En este punto filtramos la estructura privada asignada por la tarea A. Adem\u00e1s de la fuga de memoria, tambi\u00e9n est\u00e1 el detalle de que ambas tareas terminan usando el mismo registro de estado en cach\u00e9 en la estructura privada (struct btrfs_file_private::llseek_cached_state), lo que puede resultar en un problema de use after free, ya que una tarea puede liberarlo mientras la otra todav\u00eda lo est\u00e1 usando (solo una tarea tom\u00f3 un recuento de referencia en \u00e9l). Adem\u00e1s, compartir el estado en cach\u00e9 no es una buena idea, ya que podr\u00eda resultar en resultados incorrectos en el futuro; en este momento no deber\u00eda ser un problema porque termina siendo utilizado solo en extended-io-tree.c:count_range_bits() donde realizamos la validaci\u00f3n de rango antes de usar el estado en cach\u00e9. Solucione esto protegiendo la asignaci\u00f3n privada y la verificaci\u00f3n de un archivo mientras mantiene el spinlock del inodo y realice un seguimiento de la tarea que asign\u00f3 el privado, de modo que solo lo use esa tarea para evitar problemas de use after free con el registro de estado en cach\u00e9, as\u00ed como potencialmente usarlo incorrectamente en el futuro." + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: arreglo de ejecuci\u00f3n que establece el archivo privado en lseek concurrente usando el mismo fd Al realizar llamadas al sistema lseek(2) concurrentes contra el mismo descriptor de archivo, usando m\u00faltiples subprocesos que pertenecen al mismo proceso, tenemos una ventana de tiempo corta donde ocurre una ejecuci\u00f3n y puede resultar en una p\u00e9rdida de memoria. La ejecuci\u00f3n ocurre as\u00ed: 1) Un programa abre un descriptor de archivo para un archivo y luego genera dos subprocesos (con la librer\u00eda pthreads por ejemplo), llam\u00e9moslos tarea A y tarea B; 2) La tarea A llama a lseek con SEEK_DATA o SEEK_HOLE y termina en file.c:find_desired_extent() mientras mantiene un bloqueo de lectura en el inodo; 3) Al comienzo de find_desired_extent(), extrae el puntero private_data del archivo en una variable local llamada 'private', que tiene un valor de NULL; 4) La tarea B tambi\u00e9n llama a lseek con SEEK_DATA o SEEK_HOLE, bloquea el inodo en modo compartido e ingresa a file.c:find_desired_extent(), donde tambi\u00e9n extrae file->private_data en su variable local 'private', que tiene un valor NULL; 5) Debido a que vio un archivo privado NULL, la tarea A asigna una estructura privada y la asigna a la estructura de archivo; 6) La tarea B tambi\u00e9n vio un archivo privado NULL, por lo que tambi\u00e9n asigna su propio archivo privado y luego lo asigna a la misma estructura de archivo, ya que ambas tareas est\u00e1n usando el mismo descriptor de archivo. En este punto filtramos la estructura privada asignada por la tarea A. Adem\u00e1s de la fuga de memoria, tambi\u00e9n est\u00e1 el detalle de que ambas tareas terminan usando el mismo registro de estado en cach\u00e9 en la estructura privada (struct btrfs_file_private::llseek_cached_state), lo que puede resultar en un problema de use after free, ya que una tarea puede liberarlo mientras la otra todav\u00eda lo est\u00e1 usando (solo una tarea tom\u00f3 un recuento de referencia en \u00e9l). Adem\u00e1s, compartir el estado en cach\u00e9 no es una buena idea, ya que podr\u00eda resultar en resultados incorrectos en el futuro; en este momento no deber\u00eda ser un problema porque termina siendo utilizado solo en extended-io-tree.c:count_range_bits() donde realizamos la validaci\u00f3n de rango antes de usar el estado en cach\u00e9. Solucione esto protegiendo la asignaci\u00f3n privada y la verificaci\u00f3n de un archivo mientras mantiene el spinlock del inodo y realice un seguimiento de la tarea que asign\u00f3 el privado, de modo que solo lo use esa tarea para evitar problemas de use after free con el registro de estado en cach\u00e9, as\u00ed como potencialmente usarlo incorrectamente en el futuro." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47743.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47743.json index 13918c26f92..71144bbb05c 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47743.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47743.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKEYS: prevent NULL pointer dereference in find_asymmetric_key()\n\nIn find_asymmetric_key(), if all NULLs are passed in the id_{0,1,2}\narguments, the kernel will first emit WARN but then have an oops\nbecause id_2 gets dereferenced anyway.\n\nAdd the missing id_2 check and move WARN_ON() to the final else branch\nto avoid duplicate NULL checks.\n\nFound by Linux Verification Center (linuxtesting.org) with Svace static\nanalysis tool." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KEYS: evitar la desreferenciaci\u00f3n de puntero NULL en find_ametric_key() En find_ametric_key(), si se pasan todos los NULL en los argumentos id_{0,1,2}, el kernel primero emitir\u00e1 WARN pero luego tendr\u00e1 un error porque id_2 se desreferencia de todos modos. Agregue la comprobaci\u00f3n id_2 faltante y mueva WARN_ON() a la rama else final para evitar comprobaciones NULL duplicadas. Encontrado por Linux Verification Center (linuxtesting.org) con la herramienta de an\u00e1lisis est\u00e1tico Svace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47744.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47744.json index ecea2fba4b7..45b5f8a4cf4 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47744.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47744.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock\n\nUse a dedicated mutex to guard kvm_usage_count to fix a potential deadlock\non x86 due to a chain of locks and SRCU synchronizations. Translating the\nbelow lockdep splat, CPU1 #6 will wait on CPU0 #1, CPU0 #8 will wait on\nCPU2 #3, and CPU2 #7 will wait on CPU1 #4 (if there's a writer, due to the\nfairness of r/w semaphores).\n\n CPU0 CPU1 CPU2\n1 lock(&kvm->slots_lock);\n2 lock(&vcpu->mutex);\n3 lock(&kvm->srcu);\n4 lock(cpu_hotplug_lock);\n5 lock(kvm_lock);\n6 lock(&kvm->slots_lock);\n7 lock(cpu_hotplug_lock);\n8 sync(&kvm->srcu);\n\nNote, there are likely more potential deadlocks in KVM x86, e.g. the same\npattern of taking cpu_hotplug_lock outside of kvm_lock likely exists with\n__kvmclock_cpufreq_notifier():\n\n cpuhp_cpufreq_online()\n |\n -> cpufreq_online()\n |\n -> cpufreq_gov_performance_limits()\n |\n -> __cpufreq_driver_target()\n |\n -> __target_index()\n |\n -> cpufreq_freq_transition_begin()\n |\n -> cpufreq_notify_transition()\n |\n -> ... __kvmclock_cpufreq_notifier()\n\nBut, actually triggering such deadlocks is beyond rare due to the\ncombination of dependencies and timings involved. E.g. the cpufreq\nnotifier is only used on older CPUs without a constant TSC, mucking with\nthe NX hugepage mitigation while VMs are running is very uncommon, and\ndoing so while also onlining/offlining a CPU (necessary to generate\ncontention on cpu_hotplug_lock) would be even more unusual.\n\nThe most robust solution to the general cpu_hotplug_lock issue is likely\nto switch vm_list to be an RCU-protected list, e.g. so that x86's cpufreq\nnotifier doesn't to take kvm_lock. For now, settle for fixing the most\nblatant deadlock, as switching to an RCU-protected list is a much more\ninvolved change, but add a comment in locking.rst to call out that care\nneeds to be taken when walking holding kvm_lock and walking vm_list.\n\n ======================================================\n WARNING: possible circular locking dependency detected\n 6.10.0-smp--c257535a0c9d-pip #330 Tainted: G S O\n ------------------------------------------------------\n tee/35048 is trying to acquire lock:\n ff6a80eced71e0a8 (&kvm->slots_lock){+.+.}-{3:3}, at: set_nx_huge_pages+0x179/0x1e0 [kvm]\n\n but task is already holding lock:\n ffffffffc07abb08 (kvm_lock){+.+.}-{3:3}, at: set_nx_huge_pages+0x14a/0x1e0 [kvm]\n\n which lock already depends on the new lock.\n\n the existing dependency chain (in reverse order) is:\n\n -> #3 (kvm_lock){+.+.}-{3:3}:\n __mutex_lock+0x6a/0xb40\n mutex_lock_nested+0x1f/0x30\n kvm_dev_ioctl+0x4fb/0xe50 [kvm]\n __se_sys_ioctl+0x7b/0xd0\n __x64_sys_ioctl+0x21/0x30\n x64_sys_call+0x15d0/0x2e60\n do_syscall_64+0x83/0x160\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n -> #2 (cpu_hotplug_lock){++++}-{0:0}:\n cpus_read_lock+0x2e/0xb0\n static_key_slow_inc+0x16/0x30\n kvm_lapic_set_base+0x6a/0x1c0 [kvm]\n kvm_set_apic_base+0x8f/0xe0 [kvm]\n kvm_set_msr_common+0x9ae/0xf80 [kvm]\n vmx_set_msr+0xa54/0xbe0 [kvm_intel]\n __kvm_set_msr+0xb6/0x1a0 [kvm]\n kvm_arch_vcpu_ioctl+0xeca/0x10c0 [kvm]\n kvm_vcpu_ioctl+0x485/0x5b0 [kvm]\n __se_sys_ioctl+0x7b/0xd0\n __x64_sys_ioctl+0x21/0x30\n x64_sys_call+0x15d0/0x2e60\n do_syscall_64+0x83/0x160\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n -> #1 (&kvm->srcu){.+.+}-{0:0}:\n __synchronize_srcu+0x44/0x1a0\n \n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: usar mutex dedicado para proteger kvm_usage_count para evitar un bloqueo Use un mutex dedicado para proteger kvm_usage_count para reparar un posible bloqueo en x86 debido a una cadena de bloqueos y sincronizaciones SRCU. Traduciendo el siguiente splat lockdep, CPU1 #6 esperar\u00e1 a CPU0 #1, CPU0 #8 esperar\u00e1 a CPU2 #3 y CPU2 #7 esperar\u00e1 a CPU1 #4 (si hay un escritor, debido a la imparcialidad de los sem\u00e1foros de lectura/escritura). CPU0 CPU1 CPU2 1 lock(&kvm->slots_lock); 2 lock(&vcpu->mutex); 3 lock(&kvm->srcu); 4 lock(cpu_hotplug_lock); 5 lock(kvm_lock); 6 lock(&kvm->slots_lock); 7 lock(cpu_hotplug_lock); 8 sync(&kvm->srcu); Tenga en cuenta que es probable que haya m\u00e1s bloqueos potenciales en KVM x86, por ejemplo, el mismo patr\u00f3n de tomar cpu_hotplug_lock fuera de kvm_lock probablemente exista con __kvmclock_cpufreq_notifier(): cpuhp_cpufreq_online() | -> cpufreq_online() | -> cpufreq_gov_performance_limits() | -> __cpufreq_driver_target() | -> __target_index() | -> cpufreq_freq_transition_begin() | -> cpufreq_notify_transition() | -> ... __kvmclock_cpufreq_notifier() Pero, en realidad, activar dichos bloqueos es m\u00e1s que raro debido a la combinaci\u00f3n de dependencias y tiempos involucrados. Por ejemplo, el notificador cpufreq solo se usa en CPU m\u00e1s antiguas sin un TSC constante, es muy poco com\u00fan alterar la mitigaci\u00f3n de p\u00e1ginas enormes de NX mientras las m\u00e1quinas virtuales se est\u00e1n ejecutando, y hacerlo mientras tambi\u00e9n se conecta o desconecta una CPU (necesario para generar contenci\u00f3n en cpu_hotplug_lock) ser\u00eda a\u00fan m\u00e1s inusual. La soluci\u00f3n m\u00e1s s\u00f3lida para el problema general de cpu_hotplug_lock es probablemente cambiar vm_list para que sea una lista protegida por RCU, por ejemplo, para que el notificador cpufreq de x86 no tome kvm_lock. Por ahora, conform\u00e9monos con arreglar el bloqueo m\u00e1s evidente, ya que cambiar a una lista protegida por RCU es un cambio mucho m\u00e1s complejo, pero agregue un comentario en locking.rst para indicar que se debe tener cuidado al recorrer manteniendo kvm_lock y recorrer vm_list. ======================================================== ADVERTENCIA: posible dependencia de bloqueo circular detectada 6.10.0-smp--c257535a0c9d-pip #330 Tainted: GSO ------------------------------------------------------ tee/35048 est\u00e1 intentando adquirir el bloqueo: ff6a80eced71e0a8 (&kvm->slots_lock){+.+.}-{3:3}, en: set_nx_huge_pages+0x179/0x1e0 [kvm] pero la tarea ya tiene el bloqueo: ffffffffc07abb08 (kvm_lock){+.+.}-{3:3}, en: set_nx_huge_pages+0x14a/0x1e0 [kvm] cuyo bloqueo ya depende del nuevo bloqueo. la cadena de dependencia existente (en orden inverso) es: -> #3 (kvm_lock){+.+.}-{3:3}: __mutex_lock+0x6a/0xb40 mutex_lock_nested+0x1f/0x30 kvm_dev_ioctl+0x4fb/0xe50 [kvm] __se_sys_ioctl+0x7b/0xd0 __x64_sys_ioctl+0x21/0x30 x64_sys_call+0x15d0/0x2e60 do_syscall_64+0x83/0x160 entry_SYSCALL_64_after_hwframe+0x76/0x7e -> #2 (cpu_hotplug_lock){++++}-{0:0}: Bloqueo de lectura de CPU + 0x2e/0xb0 Clave est\u00e1tica lenta Inc + 0x16/0x30 Base de configuraci\u00f3n de lapic Lapic + 0x6a/0x1c0 [kvm] Base de configuraci\u00f3n de apic Lapic + 0x8f/0xe0 [kvm] MSR com\u00fan Lapic + 0x9ae/0xf80 [kvm] MSR vmx + 0xa54/0xbe0 [kvm_intel] MSR + 0xb6/0x1a0 [kvm] VCPUE ioctl + 0xeca/0x10c0 [kvm] VCPUE ioctl + 0x485/0x5b0 [kvm] SYS ioctl + 0x7b/0xd0 __x64_sys_ioctl+0x21/0x30 x64_sys_call+0x15d0/0x2e60 do_syscall_64+0x83/0x160 entry_SYSCALL_64_after_hwframe+0x76/0x7e -> #1 (&kvm->srcu){.+.+}-{0:0}: __synchronize_srcu+0x44/0x1a0 ---truncado---" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47765.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47765.json index e945d2ac135..a35fad22b23 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47765.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47765.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-04T15:15:13.213", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47768.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47768.json index d3740acc728..a399afe0626 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47768.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47768.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-04T15:15:13.323", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47769.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47769.json index bc2bf30fcda..b81e5798887 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47769.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47769.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-04T15:15:13.427", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47803.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47803.json index d11b1ec688d..cc1877ce2cf 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47803.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47803.json @@ -3,7 +3,7 @@ "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-10-02T16:15:10.630", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47804.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47804.json index 96294ec8101..18255379f2e 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47804.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47804.json @@ -3,7 +3,7 @@ "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-10-02T16:15:10.697", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47805.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47805.json index 3c688a36728..9028a035c0e 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47805.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47805.json @@ -3,7 +3,7 @@ "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-10-02T16:15:10.753", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47812.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47812.json index 805b67ef840..99388c90515 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47812.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47812.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:13.803", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47815.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47815.json index 71ed32be338..af7bc0258cf 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47815.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47815.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.023", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47816.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47816.json index 9912fb77aed..46307c091ed 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47816.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47816.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.227", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47830.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47830.json index 655c8ed9780..2e54f229ffc 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47830.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47830.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:05.613", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json index 03698a4bd67..3500de3a965 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.647", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47848.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47848.json index 03d5fdc8ba3..7af7c5c5740 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47848.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47848.json @@ -3,7 +3,7 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2024-10-05T00:15:02.800", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47854.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47854.json index 405affc2ac1..147211895aa 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47854.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47854.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-04T06:15:03.027", "lastModified": "2024-10-06T21:15:12.920", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47875.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47875.json index f21149e3445..7bd00fe38db 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47875.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47875.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:05.860", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47877.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47877.json index 53ba5823388..4fff7a6892e 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47877.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47877.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T17:15:04.450", "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47879.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47879.json index 62137f79462..151b850cdaf 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47879.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47879.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-24T21:15:12.523", "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47913.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47913.json index 0cd56094dfe..fb4912fe326 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47913.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47913.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-04T22:15:02.687", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47939.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47939.json index be64de77002..408c8c53427 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47939.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47939.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Stack-based buffer overflow vulnerability exists in multiple Ricoh laser printers and MFPs which implement Web Image Monitor. If this vulnerability is exploited, receiving a specially crafted request created and sent by an attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition. As for the details of affected product names and versions, refer to the information provided by the vendor under [References]." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en varias impresoras l\u00e1ser y multifunci\u00f3n de Ricoh que implementan Web Image Monitor. Si se explota esta vulnerabilidad, la recepci\u00f3n de una solicitud especialmente manipulada creada y enviada por un atacante puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario o una condici\u00f3n de denegaci\u00f3n de servicio (DoS). En cuanto a los detalles de los nombres y versiones de los productos afectados, consulte la informaci\u00f3n proporcionada por el proveedor en [References]." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48036.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48036.json index 7f8dab2b83a..1bc8b885779 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48036.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48036.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:13.677", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48037.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48037.json index 186d07d8698..75fdc247420 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48037.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48037.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:13.927", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48039.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48039.json index 9b676824350..35a54553651 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48039.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48039.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:55.933", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in CubeWP CubeWP \u2013 All-in-One Dynamic Content Framework allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CubeWP \u2013 All-in-One Dynamic Content Framework: from n/a through 1.1.15." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en CubeWP CubeWP \u2013 All-in-One Dynamic Content Framework permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a CubeWP \u2013 All-in-One Dynamic Content Framework: desde n/a hasta 1.1.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48044.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48044.json index 184956669be..43d8d9912dc 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48044.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48044.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:56.143", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in ShortPixel \u2013 Convert WebP/AVIF & Optimize Images ShortPixel Image Optimizer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ShortPixel Image Optimizer: from n/a through 5.6.3." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en ShortPixel: Convert WebP/AVIF & Optimize Images ShortPixel Image Optimizer permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a ShortPixel Image Optimizer: desde n/a hasta 5.6.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48045.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48045.json index 4977722ec39..976ac9c8da2 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48045.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48045.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:56.343", "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Leevio Happy Addons for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Happy Addons for Elementor: from n/a through 3.12.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Leevio Happy Addons para Elementor permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Happy Addons para Elementor: desde n/a hasta 3.12.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48046.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48046.json index cb6a76106ad..926d9c15070 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48046.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48046.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:14.170", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48048.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48048.json index da42ac9abd2..c8da058a5bc 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48048.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48048.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:14.390", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48200.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48200.json index cbbc75e3e6d..79d59706681 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48200.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48200.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue in MobaXterm v24.2 allows a local attacker to escalate privileges and execute arbitrary code via the remove function of the MobaXterm MSI is spawning one Administrative cmd (conhost.exe)" + }, + { + "lang": "es", + "value": " Un problema en MobaXterm v24.2 permite que un atacante local escale privilegios y ejecute c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de eliminaci\u00f3n de MobaXterm MSI, lo que genera una cmd administrativa (conhost.exe)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48231.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48231.json index bd1166fcc4d..4dcf8241047 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48231.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48231.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Funadmin 5.0.2 is vulnerable to SQL Injection via the selectFields parameter in the index method of \\backend\\controller\\auth\\Auth.php." + }, + { + "lang": "es", + "value": "Funadmin 5.0.2 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro selectFields en el m\u00e9todo de \u00edndice de \\backend\\controller\\auth\\Auth.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48336.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48336.json index c5e55b19a41..9107a8cc185 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48336.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48336.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The install() function of ProviderInstaller.java in Magisk App before canary version 27007 does not verify the GMS app before loading it, which allows a local untrusted app with no additional privileges to silently execute arbitrary code in the Magisk app and escalate privileges to root via a crafted package, aka Bug #8279. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": " La funci\u00f3n install() de ProviderInstaller.java en Magisk App anterior a la versi\u00f3n Canary 27007 no verifica la aplicaci\u00f3n GMS antes de cargarla, lo que permite que una aplicaci\u00f3n local no confiable sin privilegios adicionales ejecute silenciosamente c\u00f3digo arbitrario en la aplicaci\u00f3n Magisk y escale privilegios a root a trav\u00e9s de un paquete manipulado, tambi\u00e9n conocido como error n.\u00b0 8279. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48359.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48359.json index 3e40254028e..1303bc7abfa 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48359.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48359.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Qualitor v8.24 was discovered to contain a remote code execution (RCE) vulnerability via the gridValoresPopHidden parameter." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Qualitor v8.24 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del par\u00e1metro gridValoresPopHidden." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48360.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48360.json index ccd9a6fa280..40911e9f793 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48360.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48360.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Qualitor v8.24 conten\u00eda Server-Side Request Forgery (SSRF) a trav\u00e9s del componente /request/viewValidacao.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48910.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48910.json index 90bc8c50c43..8605a615c1f 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48910.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48910.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify was vulnerable to prototype pollution. This vulnerability is fixed in 2.4.2." + }, + { + "lang": "es", + "value": " DOMPurify es un desinfectante XSS ultrarr\u00e1pido, ultratolerante y exclusivo de DOM para HTML, MathML y SVG. DOMPurify era vulnerable a la contaminaci\u00f3n de prototipos. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 2.4.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48919.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48919.json index 1a5c8ddbb29..921d300fdd6 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48919.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48919.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Cursor es un editor de c\u00f3digo creado para programar con IA. Antes del 27 de septiembre de 2024, si un usuario generaba un comando de terminal a trav\u00e9s de la funci\u00f3n Cmd-K/Ctrl-K de la terminal de Cursor y si el usuario importaba expl\u00edcitamente una p\u00e1gina web maliciosa en el mensaje de aviso Cmd-K de la terminal, un atacante con control sobre la p\u00e1gina web a la que se hac\u00eda referencia pod\u00eda tener una posibilidad significativa de influir en un modelo de lenguaje para que generara comandos arbitrarios para su ejecuci\u00f3n en la terminal del usuario. Este escenario requerir\u00eda que el usuario optara expl\u00edcitamente por incluir el contenido de una p\u00e1gina web comprometida y que el atacante mostrara el texto de inyecci\u00f3n de mensajes en el contenido de la p\u00e1gina web comprometida. El 27 de septiembre de 2024, dentro de las dos horas posteriores a que se informara el problema, se lanz\u00f3 un parche del lado del servidor para no transmitir de vuelta las nuevas l\u00edneas o los caracteres de control. Adem\u00e1s, Cursor 0.42 incluye mitigaciones del lado del cliente para evitar que cualquier nueva l\u00ednea o car\u00e1cter de control se transmita directamente a la terminal. Tambi\u00e9n contiene una nueva configuraci\u00f3n, `\"cursor.terminal.usePreviewBox\"`, que, si se establece en true, transmite la respuesta a un cuadro de vista previa cuyo contenido debe aceptarse manualmente antes de insertarse en la terminal. Esta configuraci\u00f3n es \u00fatil si est\u00e1 trabajando en un entorno de shell donde los comandos se pueden ejecutar sin presionar Enter o cualquier car\u00e1cter de control. El parche se ha aplicado en el lado del servidor, por lo que no se necesita ninguna acci\u00f3n adicional, incluso en versiones anteriores de Cursor. Por otra parte, los mantenedores de Cursor tambi\u00e9n recomiendan, como mejor pr\u00e1ctica, incluir solo fragmentos de contexto confiables en los mensajes." + "value": "Cursor es un editor de c\u00f3digo creado para programar con IA. Antes del 27 de septiembre de 2024, si un usuario generaba un comando de terminal a trav\u00e9s de la funci\u00f3n Cmd-K/Ctrl-K de la terminal de Cursor y si el usuario importaba expl\u00edcitamente una p\u00e1gina web maliciosa en el mensaje de aviso Cmd-K de la terminal, un atacante con control sobre la p\u00e1gina web a la que se hac\u00eda referencia pod\u00eda tener una posibilidad significativa de influir en un modelo de lenguaje para que generara comandos arbitrarios para su ejecuci\u00f3n en la terminal del usuario. Este escenario requerir\u00eda que el usuario optara expl\u00edcitamente por incluir el contenido de una p\u00e1gina web comprometida y que el atacante mostrara el texto de inyecci\u00f3n de mensajes en el contenido de la p\u00e1gina web comprometida. El 27 de septiembre de 2024, dentro de las dos horas posteriores a que se informara el problema, se lanz\u00f3 un parche del lado del servidor para no transmitir de vuelta las nuevas l\u00edneas o los caracteres de control. Adem\u00e1s, Cursor 0.42 incluye mitigaciones del lado del cliente para evitar que cualquier nueva l\u00ednea o car\u00e1cter de control se transmita directamente a la terminal. Tambi\u00e9n contiene una nueva configuraci\u00f3n, `\"cursor.terminal.usePreviewBox\"`, que, si se establece en true, transmite la respuesta a un cuadro de vista previa cuyo contenido debe aceptarse manualmente antes de insertarse en la terminal. Esta configuraci\u00f3n es \u00fatil si est\u00e1 trabajando en un entorno de shell donde los comandos se pueden ejecutar sin presionar Enter o cualquier car\u00e1cter de control. El parche se ha aplicado en el lado del servidor, por lo que no se necesita ninguna acci\u00f3n adicional, incluso en versiones anteriores de Cursor. Por otra parte, los fabricantees de Cursor tambi\u00e9n recomiendan, como mejor pr\u00e1ctica, incluir solo fragmentos de contexto confiables en los mensajes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48930.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48930.json index 00fb428934b..c5913727379 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48930.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48930.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-21T16:15:03.607", "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "secp256k1-node is a Node.js binding for an Optimized C library for EC operations on curve secp256k1. In `elliptic`-based version, `loadUncompressedPublicKey` has a check that the public key is on the curve. Prior to versions 5.0.1, 4.0.4, and 3.8.1, however, `loadCompressedPublicKey` is missing that check. That allows the attacker to use public keys on low-cardinality curves to extract enough information to fully restore the private key from as little as 11 ECDH sessions, and very cheaply on compute power. Other operations on public keys are also affected, including e.g. `publicKeyVerify()` incorrectly returning `true` on those invalid keys, and e.g. `publicKeyTweakMul()` also returning predictable outcomes allowing to restore the tweak. Versions 5.0.1, 4.0.4, and 3.8.1 contain a fix for the issue." + }, + { + "lang": "es", + "value": "secp256k1-node es un enlace de Node.js para una librer\u00eda C optimizada para operaciones EC en la curva secp256k1. En la versi\u00f3n basada en `elliptic`, `loadUncompressedPublicKey` tiene una comprobaci\u00f3n de que la clave p\u00fablica est\u00e1 en la curva. Sin embargo, antes de las versiones 5.0.1, 4.0.4 y 3.8.1, `loadCompressedPublicKey` no tiene esa comprobaci\u00f3n. Eso permite al atacante usar claves p\u00fablicas en curvas de baja cardinalidad para extraer suficiente informaci\u00f3n para restaurar completamente la clave privada a partir de tan solo 11 sesiones ECDH, y de manera muy econ\u00f3mica en cuanto a potencia de c\u00f3mputo. Otras operaciones en claves p\u00fablicas tambi\u00e9n se ven afectadas, incluyendo, por ejemplo, `publicKeyVerify()` que devuelve incorrectamente `true` en esas claves no v\u00e1lidas, y, por ejemplo, `publicKeyTweakMul()` que tambi\u00e9n devuelve resultados predecibles que permiten restaurar el ajuste. Las versiones 5.0.1, 4.0.4 y 3.8.1 contienen una soluci\u00f3n para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49023.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49023.json index 29b0f90cc6f..6fb8333645c 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49023.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49023.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Edge (basado en Chromium)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49235.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49235.json index 8b018685de0..7d47fc2e15e 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49235.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49235.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:10.107", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49315.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49315.json index f8709e2a51f..8158dd05fba 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49315.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49315.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T14:15:14.050", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-494xx/CVE-2024-49401.json b/CVE-2024/CVE-2024-494xx/CVE-2024-49401.json index 7349e855b23..3660562a638 100644 --- a/CVE-2024/CVE-2024-494xx/CVE-2024-49401.json +++ b/CVE-2024/CVE-2024-494xx/CVE-2024-49401.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:04.973", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-494xx/CVE-2024-49402.json b/CVE-2024/CVE-2024-494xx/CVE-2024-49402.json index 7c53a12fd8d..0034ee80949 100644 --- a/CVE-2024/CVE-2024-494xx/CVE-2024-49402.json +++ b/CVE-2024/CVE-2024-494xx/CVE-2024-49402.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:05.153", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-494xx/CVE-2024-49403.json b/CVE-2024/CVE-2024-494xx/CVE-2024-49403.json index 9b9ba675a39..07488c1ad19 100644 --- a/CVE-2024/CVE-2024-494xx/CVE-2024-49403.json +++ b/CVE-2024/CVE-2024-494xx/CVE-2024-49403.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:05.323", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-494xx/CVE-2024-49404.json b/CVE-2024/CVE-2024-494xx/CVE-2024-49404.json index e48a35b3761..30bd9107e72 100644 --- a/CVE-2024/CVE-2024-494xx/CVE-2024-49404.json +++ b/CVE-2024/CVE-2024-494xx/CVE-2024-49404.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:05.490", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-494xx/CVE-2024-49405.json b/CVE-2024/CVE-2024-494xx/CVE-2024-49405.json index 9f8d56084db..2c54cd42807 100644 --- a/CVE-2024/CVE-2024-494xx/CVE-2024-49405.json +++ b/CVE-2024/CVE-2024-494xx/CVE-2024-49405.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:05.660", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-494xx/CVE-2024-49406.json b/CVE-2024/CVE-2024-494xx/CVE-2024-49406.json index b97d01282e3..bc18909bce2 100644 --- a/CVE-2024/CVE-2024-494xx/CVE-2024-49406.json +++ b/CVE-2024/CVE-2024-494xx/CVE-2024-49406.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:05.833", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-494xx/CVE-2024-49407.json b/CVE-2024/CVE-2024-494xx/CVE-2024-49407.json index bb3559a6c53..ae7aadbe99c 100644 --- a/CVE-2024/CVE-2024-494xx/CVE-2024-49407.json +++ b/CVE-2024/CVE-2024-494xx/CVE-2024-49407.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:05.990", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-494xx/CVE-2024-49408.json b/CVE-2024/CVE-2024-494xx/CVE-2024-49408.json index 279402e72b4..22ef4511ffa 100644 --- a/CVE-2024/CVE-2024-494xx/CVE-2024-49408.json +++ b/CVE-2024/CVE-2024-494xx/CVE-2024-49408.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:06.157", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-494xx/CVE-2024-49409.json b/CVE-2024/CVE-2024-494xx/CVE-2024-49409.json index 42e1508f9e0..c09a9c76e6c 100644 --- a/CVE-2024/CVE-2024-494xx/CVE-2024-49409.json +++ b/CVE-2024/CVE-2024-494xx/CVE-2024-49409.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:06.317", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49501.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49501.json index 33470d091a5..fc90650ed72 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49501.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49501.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Sysmac Studio provided by OMRON Corporation contains an incorrect authorization vulnerability. If this vulnerability is exploited, an attacker may access the program which is protected by Data Protection function." + }, + { + "lang": "es", + "value": "Sysmac Studio, proporcionado por OMRON Corporation, contiene una vulnerabilidad de autorizaci\u00f3n incorrecta. Si se aprovecha esta vulnerabilidad, un atacante podr\u00eda acceder al programa que est\u00e1 protegido por la funci\u00f3n de protecci\u00f3n de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49579.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49579.json index 2d0c4e75d43..63208dd5ebc 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49579.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49579.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-17T13:15:14.613", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49580.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49580.json index cebee94da13..b4430078dc6 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49580.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49580.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-17T13:15:14.853", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49646.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49646.json index 9dc995cb79a..e6efe0b34e0 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49646.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49646.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ioannup Code Generate allows Reflected XSS.This issue affects Code Generate: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en ioannup Code Generate permite XSS reflejado. Este problema afecta a Code Generate: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49647.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49647.json index 984e41ae5de..a0dfdff41e4 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49647.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49647.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Carl Alberto Simple Custom Admin allows Reflected XSS.This issue affects Simple Custom Admin: from n/a through 1.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Carl Alberto Simple Custom Admin permite XSS reflejado. Este problema afecta a Simple Custom Admin: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49648.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49648.json index 7dfda5f5363..de7e701a7d1 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49648.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49648.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in rafasashi SVG Captcha allows Reflected XSS.This issue affects SVG Captcha: from n/a through 1.0.11." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en rafasashi SVG Captcha permite XSS reflejado. Este problema afecta a SVG Captcha: desde n/a hasta 1.0.11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49650.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49650.json index c04a87aa81d..18b129cfc80 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49650.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49650.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in xarbo BuddyPress Greeting Message allows Reflected XSS.This issue affects BuddyPress Greeting Message: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en el mensaje de saludo de BuddyPress de xarbo permite XSS reflejado. Este problema afecta al mensaje de saludo de BuddyPress: desde n/a hasta 1.0.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49674.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49674.json index b3ed89b9fa8..1975d944156 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49674.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49674.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Lukas Huser EKC Tournament Manager allows Upload a Web Shell to a Web Server.This issue affects EKC Tournament Manager: from n/a through 2.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Lukas Huser EKC Tournament Manager permite cargar una web shell a un servidor web. Este problema afecta a EKC Tournament Manager: desde n/a hasta 2.2.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49685.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49685.json index 40dd911a3f0..d12700cadae 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49685.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49685.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Smash Balloon Custom Twitter Feeds (Tweets Widget) allows Cross Site Request Forgery.This issue affects Custom Twitter Feeds (Tweets Widget): from n/a through 2.2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Custom Twitter Feeds (widget de tweets) de Smash Balloon permite Cross-Site Request Forgery. Este problema afecta a Custom Twitter Feeds (widget de tweets): desde n/a hasta 2.2.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49766.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49766.json index 689d7bb4c2e..14d76c3f9a9 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49766.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49766.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-25T20:15:04.410", "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49770.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49770.json index 1bffc196fe4..e46d4d0ee43 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49770.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49770.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "`oak` is a middleware framework for Deno's native HTTP server, Deno Deploy, Node.js 16.5 and later, Cloudflare Workers and Bun. By default `oak` does not allow transferring of hidden files with `Context.send` API. However, prior to version 17.1.3, this can be bypassed by encoding `/` as its URL encoded form `%2F`. For an attacker this has potential to read sensitive user data or to gain access to server secrets. Version 17.1.3 fixes the issue." + }, + { + "lang": "es", + "value": " `oak` es un framework de middleware para el servidor HTTP nativo de Deno, Deno Deploy, Node.js 16.5 y posteriores, Cloudflare Workers y Bun. De forma predeterminada, `oak` no permite la transferencia de archivos ocultos con la API `Context.send`. Sin embargo, antes de la versi\u00f3n 17.1.3, esto se puede omitir codificando `/` como su forma codificada de URL `%2F`. Para un atacante, esto tiene el potencial de leer datos confidenciales del usuario o de obtener acceso a secretos del servidor. La versi\u00f3n 17.1.3 soluciona el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49771.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49771.json index ebaa7150d9e..eaa5ce8d768 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49771.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49771.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-28T17:15:04.540", "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49772.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49772.json index 4798ea58198..1f82e933cef 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49772.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49772.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-05T19:15:05.970", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49773.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49773.json index 0151d277263..b2af64cc24b 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49773.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49773.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-05T19:15:06.200", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49774.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49774.json index 15111e0b396..66f0f61ca78 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49774.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49774.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-05T19:15:06.410", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49864.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49864.json index 63ec981f331..76dc4bd0118 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49864.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49864.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:06.203", "lastModified": "2024-10-23T15:13:58.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49866.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49866.json index 5dda771c305..9c0bb8e9467 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49866.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49866.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:06.330", "lastModified": "2024-10-23T15:13:58.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49872.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49872.json index e362b21ed0c..73c327c6c8a 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49872.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49872.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:08.587", "lastModified": "2024-10-23T15:13:58.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49885.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49885.json index e5a960116b4..d9c09af0ec9 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49885.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49885.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:11.230", "lastModified": "2024-10-23T15:13:58.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49886.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49886.json index 6c1c1d38c6d..4eea13866d4 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49886.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49886.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:11.293", "lastModified": "2024-10-23T15:13:58.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49887.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49887.json index 3606a024fd3..0f33220abd9 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49887.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49887.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:11.360", "lastModified": "2024-10-23T15:13:58.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49888.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49888.json index 1d0e7417edb..ec0bd6201f1 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49888.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49888.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:11.443", "lastModified": "2024-10-23T15:13:58.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49925.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49925.json index 6704276cdd5..d19680ef818 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49925.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49925.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:14.540", "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49927.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49927.json index dc8509181e8..92ed1662c14 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49927.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49927.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:14.737", "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49932.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49932.json index f12ddd5e6c3..4f1b51a7f9a 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49932.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49932.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:15.140", "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49933.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49933.json index ab368105bfe..5e99b1ac51b 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49933.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49933.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:15.210", "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49934.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49934.json index 8664b8bb9dc..25eb67ec15b 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49934.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49934.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:15.273", "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49935.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49935.json index 88967161205..2228ba72315 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49935.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49935.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:15.350", "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49937.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49937.json index 808d21d378e..31f9f0b5a83 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49937.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49937.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:15.477", "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49939.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49939.json index 4d6b5699559..60c655644b0 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49939.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49939.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:15.620", "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49940.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49940.json index e6144d2a4c4..d5c7ccd7645 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49940.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49940.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:15.703", "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49946.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49946.json index a5307bad5ab..0eaf9dc070b 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49946.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49946.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:16.133", "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49947.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49947.json index 8fbadbd03a1..27a1343c386 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49947.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49947.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:16.207", "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49951.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49951.json index 1d207211d05..d00c8fb28be 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49951.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49951.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:16.500", "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50056.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50056.json index 6dea0502008..798524f8690 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50056.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50056.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:17.853", "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50060.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50060.json index 9c5015998b8..17eb5544c5a 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50060.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50060.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:18.117", "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50063.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50063.json index 3bda68e673a..f7eb8df9692 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50063.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50063.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:18.360", "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50090.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50090.json index 540654dd557..e11014b8283 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50090.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50090.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T17:15:06.477", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50091.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50091.json index 8594d06da08..4739e3e5032 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50091.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50091.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T17:15:06.533", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50092.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50092.json index f7b7b57cda2..c377202bc06 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50092.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50092.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T17:15:06.597", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50094.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50094.json index fbfa1541cf0..ea5aa5f9e13 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50094.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50094.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T17:15:06.733", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50095.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50095.json index f08fa3a4d26..63376e687a2 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50095.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50095.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T17:15:06.797", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50097.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50097.json index 75324e57cec..3fa7585ad02 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50097.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50097.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T17:15:06.937", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50098.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50098.json index 3a8e94c0d97..e338ae9f2b4 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50098.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50098.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:13.620", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50101.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50101.json index a12b53fe07b..f6d0b112e00 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50101.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50101.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:13.813", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50102.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50102.json index 3b4374e226a..d8ee757f0e9 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50102.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50102.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:13.877", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50104.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50104.json index ccdacb9b356..a4a0f2d5a5d 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50104.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50104.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:13.993", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50105.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50105.json index e7bf143726e..d400cb97c82 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50105.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50105.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:14.063", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50106.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50106.json index c1ec70b0832..450520d0237 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50106.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50106.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:14.120", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50122.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50122.json index 7f00f7019ec..42c336165b0 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50122.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50122.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:15.210", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50152.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50152.json index 081e5d4aeda..66ada974944 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50152.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50152.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:06.850", "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50153.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50153.json index 200bb683537..78b0c439f7c 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50153.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50153.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:06.917", "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50154.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50154.json index f288032bdb0..2c507348ddb 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50154.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50154.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:06.987", "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50159.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50159.json index d2beb756357..6c0f9b1932d 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50159.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50159.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:07.333", "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50160.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50160.json index f042b6520c1..fb5cfd586e2 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50160.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50160.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:07.403", "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50161.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50161.json index 8f016d02ded..b1a4d7e3ab3 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50161.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50161.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:07.480", "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50167.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50167.json index 06c57086af0..e61416532de 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50167.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50167.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:07.893", "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50168.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50168.json index 2926a72e031..d1604739d2e 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50168.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50168.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:07.960", "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50170.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50170.json index e648f351b48..f342111dfd8 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50170.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50170.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:08.093", "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50171.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50171.json index 0ed45143b3b..aafe11f8064 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50171.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50171.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:08.160", "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50172.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50172.json index e604fe4514c..9deadb02e93 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50172.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50172.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:08.227", "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50332.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50332.json index e2b9612ac77..e3ba3ec8396 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50332.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50332.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-05T19:15:06.623", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50333.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50333.json index c8b32090a3e..4be2facf96d 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50333.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50333.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-05T19:15:06.840", "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50347.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50347.json index 1522b1faa95..c564e65f9be 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50347.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50347.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. Prior to 1.4.0, there is an issue where verification signatures for requests sent to Reverb's Pusher-compatible API were not being verified. This API is used in scenarios such as broadcasting a message from a backend service or for obtaining statistical information (such as number of connections) about a given channel. This issue only affects the Pusher-compatible API endpoints and not the WebSocket connections themselves. In order to exploit this vulnerability, the application ID which, should never be exposed, would need to be known by an attacker. This vulnerability is fixed in 1.4.0." + }, + { + "lang": "es", + "value": " Laravel Reverb proporciona un backend de comunicaci\u00f3n WebSocket en tiempo real para aplicaciones Laravel. Antes de la versi\u00f3n 1.4.0, hab\u00eda un problema en el que no se verificaban las firmas de verificaci\u00f3n para las solicitudes enviadas a la API compatible con Pusher de Reverb. Esta API se utiliza en escenarios como la transmisi\u00f3n de un mensaje desde un servicio backend o para obtener informaci\u00f3n estad\u00edstica (como la cantidad de conexiones) sobre un canal determinado. Este problema solo afecta a los endpoints de la API compatible con Pusher y no a las conexiones WebSocket en s\u00ed. Para explotar esta vulnerabilidad, el ID de la aplicaci\u00f3n, que nunca deber\u00eda exponerse, deber\u00eda ser conocido por un atacante. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 1.4.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50353.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50353.json index d18f6152bcd..395c8e0a1d2 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50353.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50353.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-30T14:15:07.790", "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50354.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50354.json index 67d0a0bb2bf..c9775f8cbca 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50354.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50354.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "gnark is a fast zk-SNARK library that offers a high-level API to design circuits. In gnark 0.11.0 and earlier, deserialization of Groth16 verification keys allocate excessive memory, consuming a lot of resources and triggering a crash with the error fatal error: runtime: out of memory." + }, + { + "lang": "es", + "value": "gnark es una librer\u00eda zk-SNARK r\u00e1pida que ofrece una API de alto nivel para dise\u00f1ar circuitos. En gnark 0.11.0 y versiones anteriores, la deserializaci\u00f3n de las claves de verificaci\u00f3n Groth16 asigna una cantidad excesiva de memoria, lo que consume muchos recursos y provoca un bloqueo con el error fatal error: runtime: out of memory." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50356.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50356.json index d747acade5f..a05fae3f75d 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50356.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50356.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug." + }, + { + "lang": "es", + "value": "Press, una aplicaci\u00f3n personalizada de Frappe que ejecuta Frappe Cloud, administra la infraestructura, la suscripci\u00f3n, el mercado y el software como servicio (SaaS). Cualquiera que tenga acceso a la bandeja de entrada de correo sin pasar por la autenticaci\u00f3n de dos factores podr\u00eda restablecer la contrase\u00f1a, aunque no podr\u00edan iniciar sesi\u00f3n sin pasar por la autenticaci\u00f3n de dos factores. Solo los usuarios que hayan habilitado la autenticaci\u00f3n de dos factores se ven afectados. El commit ba0007c28ac814260f836849bc07d29beea7deb6 corrige este error." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50451.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50451.json index 0b5419221e6..4b6acd5bf78 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50451.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50451.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:07.123", "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50458.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50458.json index a23992e1be4..632e9cbeba5 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50458.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50458.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:07.327", "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50460.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50460.json index c96c9df92c3..5dd51b516d6 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50460.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50460.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:07.537", "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50461.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50461.json index cf8e44460c6..b2939ec40d1 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50461.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50461.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:07.737", "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50491.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50491.json index f840f652f28..76dad0d032b 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50491.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50491.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T13:15:06.877", "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Micah Blu RSVP ME allows SQL Injection.This issue affects RSVP ME: from n/a through 1.9.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Micah Blu RSVP ME permite la inyecci\u00f3n SQL. Este problema afecta a RSVP ME: desde n/a hasta 1.9.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50614.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50614.json index 6a111b64854..4ce18000801 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50614.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50614.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-27T22:15:03.713", "lastModified": "2024-10-30T20:35:36.237", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50615.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50615.json index d03896d2da6..8713708d7cd 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50615.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50615.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-27T22:15:03.760", "lastModified": "2024-10-30T20:35:37.310", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50993.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50993.json index 6e693f0aac7..c2ad361b9f2 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50993.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50993.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain a command injection vulnerability in the sysNewPasswd parameter at admin_account.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Netgear R8500 v1.0.2.160 contiene una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro sysNewPasswd en admin_account.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo mediante una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50994.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50994.json index 248e29b8b22..d6ed4101fe6 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50994.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50994.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain multiple stack overflow vulnerabilities in the component ipv6_fix.cgi via the ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length, and ipv6_lan_length parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160 contiene m\u00faltiples vulnerabilidades de desbordamiento de pila en el componente ipv6_fix.cgi a trav\u00e9s de los par\u00e1metros ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length e ipv6_lan_length. Estas vulnerabilidades permiten a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50995.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50995.json index 31850f8f345..073c7907d7c 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50995.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50995.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain a stack overflow via the share_name parameter at usb_remote_smb_conf.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro share_name en usb_remote_smb_conf.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50996.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50996.json index 74106d52c99..5174fb7b46d 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50996.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50996.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the bpa_server parameter at genie_bpa.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 conten\u00edan un desbordamiento de pila a trav\u00e9s del par\u00e1metro bpa_server en genie_bpa.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50997.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50997.json index 13a29d0e3a7..c7723899adc 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50997.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50997.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the pptp_user_ip parameter at pptp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 conten\u00edan un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptp_user_ip en pptp.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50998.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50998.json index 9b9924a0844..bb4f473c6a0 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50998.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50998.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain multiple stack overflow vulnerabilities in the component openvpn.cgi via the openvpn_service_port and openvpn_service_port_tun parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160 contiene m\u00faltiples vulnerabilidades de desbordamiento de pila en el componente openvpn.cgi a trav\u00e9s de los par\u00e1metros openvpn_service_port y openvpn_service_port_tun. Estas vulnerabilidades permiten a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50999.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50999.json index 6f70af0cb01..dc1279fe470 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50999.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50999.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain a command injection vulnerability in the sysNewPasswd parameter at password.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Netgear R8500 v1.0.2.160 contiene una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro sysNewPasswd en password.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo mediante una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51000.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51000.json index 990c30af20f..b17b02ca5fa 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51000.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51000.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain multiple stack overflow vulnerabilities in the component wireless.cgi via the opmode, opmode_an, and opmode_an_2 parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160 contiene m\u00faltiples vulnerabilidades de desbordamiento de pila en el componente wireless.cgi a trav\u00e9s de los par\u00e1metros opmode, opmode_an y opmode_an_2. Estas vulnerabilidades permiten a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51001.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51001.json index 774257e7d73..c0b3902a340 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51001.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51001.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain a stack overflow via the sysDNSHost parameter at ddns.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro sysDNSHost en ddns.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51002.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51002.json index e39aecf3cbb..00137f0435f 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51002.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51002.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the l2tp_user_ip parameter at l2tp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 conten\u00edan un desbordamiento de pila a trav\u00e9s del par\u00e1metro l2tp_user_ip en l2tp.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51003.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51003.json index 3d5aefc5c78..ef54c870ed2 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51003.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51003.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to multiple stack overflow vulnerabilities in the component ap_mode.cgi via the apmode_dns1_pri and apmode_dns1_sec parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubrieron m\u00faltiples vulnerabilidades de desbordamiento de pila en el componente ap_mode.cgi a trav\u00e9s de los par\u00e1metros apmode_dns1_pri y apmode_dns1_sec en Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128. Estas vulnerabilidades permiten a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51004.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51004.json index 7c4c6bc54a8..f3858144f75 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51004.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51004.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 and R7000P v1.3.3.154 were discovered to multiple stack overflow vulnerabilities in the component usb_device.cgi via the cifs_user, read_access, and write_access parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubrieron m\u00faltiples vulnerabilidades de desbordamiento de pila en Netgear R8500 v1.0.2.160 y R7000P v1.3.3.154 en el componente usb_device.cgi a trav\u00e9s de los par\u00e1metros cifs_user, read_access y write_access. Estas vulnerabilidades permiten a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51005.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51005.json index 57c56724bca..0af2e9e5743 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51005.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51005.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain a command injection vulnerability in the share_name parameter at usb_remote_smb_conf.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160 contiene una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro share_name en usb_remote_smb_conf.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51006.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51006.json index 8782e162e87..77127a1bc50 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51006.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51006.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain a stack overflow via the ipv6_static_ip parameter in the ipv6_tunnel function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro ipv6_static_ip en la funci\u00f3n ipv6_tunnel. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51007.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51007.json index 3541c0e1ea6..9e6bb809540 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51007.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51007.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the passphrase parameter at wireless.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear XR300 v1.0.3.78 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro passphrase en wireless.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51008.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51008.json index 15726597811..18167baaa2d 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51008.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51008.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78 was discovered to contain a command injection vulnerability in the system_name parameter at wiz_dyn.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear XR300 v1.0.3.78 contiene una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro system_name en wiz_dyn.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo mediante una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51009.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51009.json index 87aa9d64786..7d16f60466a 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51009.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51009.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain a command injection vulnerability in the wan_gateway parameter at ether.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160 contiene una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro wan_gateway en ether.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo mediante una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51010.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51010.json index d2e15b7a984..550ae43c209 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51010.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51010.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a command injection vulnerability in the component ap_mode.cgi via the apmode_gateway parameter. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 contienen una vulnerabilidad de inyecci\u00f3n de comandos en el componente ap_mode.cgi a trav\u00e9s del par\u00e1metro apmode_gateway. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51011.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51011.json index 42d333f6d50..90236257e85 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51011.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51011.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at pppoe.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 contienen un desbordamiento de pila a trav\u00e9s del par\u00e1metro pppoe_localip en pppoe.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51012.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51012.json index ff864eacb5a..add01389fbf 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51012.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51012.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain a stack overflow via the ipv6_pri_dns parameter at ipv6_fix.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro ipv6_pri_dns en ipv6_fix.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51013.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51013.json index a2093a95b01..0bdc94486d1 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51013.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51013.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R7000P v1.3.3.154 was discovered to contain a stack overflow via the RADIUSAddr%d_wla parameter at wireless.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R7000P v1.3.3.154 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro RADIUSAddr%d_wla en wireless.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51014.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51014.json index 87d42a2b642..2a6809e3985 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51014.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51014.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the ssid_an parameter in bridge_wireless_main.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Netgear XR300 v1.0.3.78 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro ssid_an en bridge_wireless_main.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51015.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51015.json index 201b9cbb390..1a7ebd91c86 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51015.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51015.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R7000P v1.3.3.154 was discovered to contain a command injection vulnerability via the device_name2 parameter at operation_mode.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R7000P v1.3.3.154 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro device_name2 enoperation_mode.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51016.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51016.json index 0f8d2fc7937..82932c8e503 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51016.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51016.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the addName%d parameter in usb_approve.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear XR300 v1.0.3.78 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro addName%d en usb_approve.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51017.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51017.json index cd5dca6a513..54d351f4af7 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51017.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51017.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R7000P v1.3.3.154 was discovered to contain a stack overflow via the l2tp_user_netmask parameter at l2tp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R7000P v1.3.3.154 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro l2tp_user_netmask en l2tp.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51018.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51018.json index 92b8bbf1ad4..dd821755c3e 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51018.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51018.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R7000P v1.3.3.154 was discovered to contain a stack overflow via the pptp_user_netmask parameter at pptp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Netgear R7000P v1.3.3.154 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptp_user_netmask en pptp.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51019.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51019.json index 9dc11dd0081..55f28284c99 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51019.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51019.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R7000P v1.3.3.154 was discovered to contain a stack overflow via the pppoe_localnetmask parameter at pppoe.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R7000P v1.3.3.154 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro pppoe_localnetmask en pppoe.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51020.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51020.json index 249004e1bf8..5e92fb3a9ef 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51020.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51020.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R7000P v1.3.3.154 was discovered to contain a stack overflow via the apn parameter at usbISP_detail_edit.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R7000P v1.3.3.154 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro apn en usbISP_detail_edit.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51021.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51021.json index 450aaa91a6b..e920291609a 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51021.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51021.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a command injection vulnerability via the wan_gateway parameter at genie_fix2.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 contienen una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro wan_gateway en genie_fix2.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51022.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51022.json index 5ec0137f9c7..f282dde8c66 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51022.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51022.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the ssid parameter in bridge_wireless_main.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Netgear XR300 v1.0.3.78 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro ssid en bridge_wireless_main.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51023.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51023.json index f28238092c6..535e3d9a051 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51023.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51023.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "D-Link DIR_823G 1.0.2B05 was discovered to contain a command injection vulnerability via the Address parameter in the SetNetworkTomographySettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que D-Link DIR_823G 1.0.2B05 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro Address en la funci\u00f3n SetNetworkTomographySettings. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51024.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51024.json index b1973a04de6..87c7b14295b 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51024.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51024.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "D-Link DIR_823G 1.0.2B05 was discovered to contain a command injection vulnerability via the HostName parameter in the SetWanSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que D-Link DIR_823G 1.0.2B05 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro HostName en la funci\u00f3n SetWanSettings. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51060.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51060.json index 6203b934b4c..0041c7abc97 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51060.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51060.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Projectworlds Online Admission System v1 is vulnerable to SQL Injection in index.php via the 'a_id' parameter." + }, + { + "lang": "es", + "value": " Projectworlds Online Admission System v1 es vulnerable a la inyecci\u00f3n SQL en index.php a trav\u00e9s del par\u00e1metro 'a_id'." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51063.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51063.json index e9d578054d7..04069c81fe5 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51063.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51063.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Phpgurukul Teachers Record Management System v2.1 is vulnerable to SQL Injection in add-teacher.php via the mobile number or email parameter." + }, + { + "lang": "es", + "value": "Phpgurukul Teachers Record Management System v2.1 es vulnerable a la inyecci\u00f3n SQL en add-teacher.php a trav\u00e9s del par\u00e1metro mobile number o email." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51064.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51064.json index eef2253f189..b6c264b0fcc 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51064.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51064.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Phpgurukul Teachers Record Management System v2.1 is vulnerable to SQL Injection via the tid parameter to admin/queries.php." + }, + { + "lang": "es", + "value": "Phpgurukul Teachers Record Management System v2.1 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro tid en admin/queries.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51065.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51065.json index eeb7d688877..e5faee238d6 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51065.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51065.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Phpgurukul Beauty Parlour Management System v1.1 is vulnerable to SQL Injection in admin/index.php via the the username parameter." + }, + { + "lang": "es", + "value": " Phpgurukul Beauty Parlour Management System v1.1 es vulnerable a la inyecci\u00f3n SQL en admin/index.php a trav\u00e9s del par\u00e1metro username." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json index d0f56b190cb..134bc8dfa3a 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An Insecure Direct Object Reference (IDOR) vulnerability in appointment-detail.php in Phpgurukul's Beauty Parlour Management System v1.1 allows unauthorized access to the Personally Identifiable Information (PII) of other customers." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de referencia directa insegura a objetos (IDOR) en appointment-detail.php en Phpgurukul's Beauty Parlour Management System v1.1 permite el acceso no autorizado a la informaci\u00f3n de identificaci\u00f3n personal (PII) de otros clientes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51246.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51246.json index ce056f80697..044fab8fe69 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51246.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51246.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doPPTP function." + }, + { + "lang": "es", + "value": " En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n doPPTP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51249.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51249.json index 43e590c06d9..cfec4dc29aa 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51249.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51249.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the reboot function." + }, + { + "lang": "es", + "value": " En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n de reboot." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51251.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51251.json index 3bbad2d39b6..6ca6b0f624d 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51251.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51251.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the backup function." + }, + { + "lang": "es", + "value": " En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n de backup." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51253.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51253.json index 62a10f2f47d..46793bd63b7 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51253.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51253.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doL2TP function." + }, + { + "lang": "es", + "value": " En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n doL2TP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51254.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51254.json index 65272a0f863..9349990b564 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51254.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51254.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the sign_cacertificate function." + }, + { + "lang": "es", + "value": "DrayTek Vigor3900 1.5.1.3 permite a los atacantes inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n sign_cacertificate." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json index c65a50858e4..db24ea18107 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the ruequest_certificate function." + }, + { + "lang": "es", + "value": "DrayTek Vigor3900 1.5.1.3 permite a los atacantes inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n ruequest_certificate." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51259.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51259.json index 6b21379dcfe..b735dadf4e5 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51259.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51259.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the setup_cacertificate function." + }, + { + "lang": "es", + "value": "DrayTek Vigor3900 1.5.1.3 permite a los atacantes inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n setup_cacertificate." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json index 6af9ffa99fb..69c73b9e865 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the acme_process function." + }, + { + "lang": "es", + "value": "DrayTek Vigor3900 1.5.1.3 permite a los atacantes inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n acme_process." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51328.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51328.json index 13340c985b6..c1c8732040a 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51328.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51328.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross Site Scripting vulnerability in addcategory.php in projectworld's Travel Management System v1.0 allows remote attacker to inject arbitrary code via the t2 parameter." + }, + { + "lang": "es", + "value": " La vulnerabilidad de cross site scripting en addcategory.php en projectworld's Travel Management System v1.0 permite a un atacante remoto inyectar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro t2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51430.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51430.json index 5f71641936a..e455902220f 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51430.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51430.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross Site Scripting vulnerability in online diagnostic lab management system using php v.1.0 allows a remote attacker to execute arbitrary code via the Test Name parameter on the diagnostic/add-test.php component." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross Site Scripting en online diagnostic lab management system using php v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro Test Name en el componente diagnostic/add-test.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51478.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51478.json index afa0c2d6d86..0191944bf3d 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51478.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51478.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "YesWiki is a wiki system written in PHP. Prior to 4.4.5, the use of a weak cryptographic algorithm and a hard-coded salt to hash the password reset key allows it to be recovered and used to reset the password of any account. This issue is fixed in 4.4.5." + }, + { + "lang": "es", + "value": "YesWiki es un sistema wiki escrito en PHP. Antes de la versi\u00f3n 4.4.5, el uso de un algoritmo criptogr\u00e1fico d\u00e9bil y una sal codificada de forma r\u00edgida para codificar la clave de restablecimiento de contrase\u00f1a permite recuperarla y usarla para restablecer la contrase\u00f1a de cualquier cuenta. Este problema se solucion\u00f3 en la versi\u00f3n 4.4.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51481.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51481.json index 2282745f6c4..419294492c7 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51481.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51481.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Nix is a package manager for Linux and other Unix systems. On macOS, built-in builders (such as `builtin:fetchurl`, exposed to users with `import `) were not executed in the macOS sandbox. Thus, these builders (which are running under the `nixbld*` users) had read access to world-readable paths and write access to world-writable paths outside of the sandbox. This issue is fixed in 2.18.9, 2.19.7, 2.20.9, 2.21.5, 2.22.4, 2.23.4, and 2.24.10. Note that sandboxing is not enabled by default on macOS. The Nix sandbox is not primarily intended as a security mechanism, but as an aid to improve reproducibility and purity of Nix builds. However, sandboxing *can* mitigate the impact of other security issues by limiting what parts of the host system a build has access to." + }, + { + "lang": "es", + "value": "Nix es un administrador de paquetes para Linux y otros sistemas Unix. En macOS, los compiladores integrados (como `builtin:fetchurl`, expuesto a los usuarios con `import `) no se ejecutaban en el entorno aislado de macOS. Por lo tanto, estos compiladores (que se ejecutan bajo los usuarios `nixbld*`) ten\u00edan acceso de lectura a rutas legibles por todo el mundo y acceso de escritura a rutas escribibles por todo el mundo fuera del entorno aislado. Este problema se solucion\u00f3 en 2.18.9, 2.19.7, 2.20.9, 2.21.5, 2.22.4, 2.23.4 y 2.24.10. Tenga en cuenta que el entorno aislado no est\u00e1 habilitado de forma predeterminada en macOS. El entorno aislado de Nix no est\u00e1 pensado principalmente como un mecanismo de seguridad, sino como una ayuda para mejorar la reproducibilidad y la pureza de las compilaciones de Nix. Sin embargo, el sandbox *puede* mitigar el impacto de otros problemas de seguridad al limitar a qu\u00e9 partes del sistema host tiene acceso una compilaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51483.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51483.json index e64ff7382c0..936432dcb61 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51483.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51483.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "changedetection.io is free, open source web page change detection software. Prior to version 0.47.5, when a WebDriver is used to fetch files, `source:file:///etc/passwd` can be used to retrieve local system files, where the more traditional `file:///etc/passwd` gets blocked. Version 0.47.5 fixes the issue." + }, + { + "lang": "es", + "value": " changedetection.io es un software gratuito de c\u00f3digo abierto para la detecci\u00f3n de cambios en p\u00e1ginas web. Antes de la versi\u00f3n 0.47.5, cuando se utiliza un WebDriver para obtener archivos, se puede utilizar `source:file:///etc/passwd` para recuperar archivos del sistema local, mientras que el `file:///etc/passwd` m\u00e1s tradicional queda bloqueado. La versi\u00f3n 0.47.5 soluciona el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51492.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51492.json index 4de7d491401..5ee5ce62f11 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51492.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51492.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Zusam is a free and open-source way to self-host private forums. Prior to version 0.5.6, specially crafted SVG files uploaded to the service as images allow for unrestricted script execution on (raw) image load. With certain payloads, theft of the target user\u2019s long-lived session token is possible. Note that Zusam, at the time of writing, uses a user\u2019s static API key as a long-lived session token, and these terms can be used interchangeably on the platform. This session token/API key remains valid indefinitely, so long as the user doesn\u2019t expressly request a new one via their Settings page. Version 0.5.6 fixes the cross-site scripting vulnerability." + }, + { + "lang": "es", + "value": "Zusam es una forma gratuita y de c\u00f3digo abierto de alojar foros privados. Antes de la versi\u00f3n 0.5.6, los archivos SVG especialmente manipulados que se sub\u00edan al servicio como im\u00e1genes permit\u00edan la ejecuci\u00f3n sin restricciones de scripts al cargar im\u00e1genes (sin procesar). Con ciertos payloads, es posible el robo del token de sesi\u00f3n de larga duraci\u00f3n del usuario objetivo. Tenga en cuenta que, al momento de escribir este art\u00edculo, Zusam usa la clave API est\u00e1tica de un usuario como token de sesi\u00f3n de larga duraci\u00f3n, y estos t\u00e9rminos se pueden usar indistintamente en la plataforma. Este token de sesi\u00f3n/clave API sigue siendo v\u00e1lido indefinidamente, siempre y cuando el usuario no solicite expresamente uno nuevo a trav\u00e9s de su p\u00e1gina de Configuraci\u00f3n. La versi\u00f3n 0.5.6 corrige la vulnerabilidad de cross site scripting." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5154.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5154.json index cb147a5480b..86b276199d6 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5154.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5154.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52013.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52013.json index 15009af6e50..2f9c925b392 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52013.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52013.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the pptp_user_ip parameter at wiz_pptp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 conten\u00edan un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptp_user_ip en wiz_pptp.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52014.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52014.json index 91c3e668c18..09b802058b9 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52014.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52014.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the pptp_user_ip parameter at genie_pptp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 conten\u00edan un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptp_user_ip en genie_pptp.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52015.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52015.json index 1d5b0074a55..1c3b16e0e6c 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52015.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52015.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the pptp_user_ip parameter at bsw_pptp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 conten\u00edan un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptp_user_ip en bsw_pptp.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52016.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52016.json index 704cb24b433..56af566d96c 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52016.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52016.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to multiple stack overflow vulnerabilities in the component wlg_adv.cgi via the apmode_dns1_pri and apmode_dns1_sec parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubrieron m\u00faltiples vulnerabilidades de desbordamiento de pila en el componente wlg_adv.cgi a trav\u00e9s de los par\u00e1metros apmode_dns1_pri y apmode_dns1_sec en Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128. Estas vulnerabilidades permiten a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52017.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52017.json index e094b08a92c..8efaef1f1e5 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52017.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52017.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the passphrase parameter at bridge_wireless_main.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear XR300 v1.0.3.78 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro passphrase en bridge_wireless_main.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52018.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52018.json index fc8c71ace79..9d6cc8bcd03 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52018.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52018.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78 was discovered to contain a command injection vulnerability in the system_name parameter at genie_dyn.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear XR300 v1.0.3.78 contiene una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro system_name en genie_dyn.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52019.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52019.json index 78ac2b68e04..3b3d95f94c5 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52019.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52019.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain a command injection vulnerability in the wan_gateway parameter at genie_fix2.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Netgear R8500 v1.0.2.160 contiene una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro wan_gateway en genie_fix2.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo mediante una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52020.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52020.json index 8bcdc4aaa1b..c1202a55245 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52020.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52020.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain a command injection vulnerability in the wan_gateway parameter at wiz_fix2.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160 contiene una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro wan_gateway en wiz_fix2.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo mediante una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52021.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52021.json index d4d76b1265a..e66358acd81 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52021.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52021.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160 was discovered to contain a command injection vulnerability in the wan_gateway parameter at bsw_fix.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R8500 v1.0.2.160 contiene una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro wan_gateway en bsw_fix.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo mediante una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52022.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52022.json index 10df6b91063..041558be9cc 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52022.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52022.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a command injection vulnerability in the component wlg_adv.cgi via the apmode_gateway parameter. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 contienen una vulnerabilidad de inyecci\u00f3n de comandos en el componente wlg_adv.cgi a trav\u00e9s del par\u00e1metro apmode_gateway. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52023.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52023.json index 7b1f0750928..564b99cb1f1 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52023.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52023.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at pppoe2.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 contienen un desbordamiento de pila a trav\u00e9s del par\u00e1metro pppoe_localip en pppoe2.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52024.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52024.json index 0e627d47913..8826ea6ecfc 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52024.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52024.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at wizpppoe.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 contienen un desbordamiento de pila a trav\u00e9s del par\u00e1metro pppoe_localip en wizpppoe.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52025.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52025.json index 37f9e73017c..9b9ad8f6110 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52025.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52025.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at geniepppoe.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 contienen un desbordamiento de pila a trav\u00e9s del par\u00e1metro pppoe_localip en geniepppoe.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52026.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52026.json index 7815cc96e48..89365e6f32b 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52026.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52026.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at bsw_pppoe.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 contienen un desbordamiento de pila a trav\u00e9s del par\u00e1metro pppoe_localip en bsw_pppoe.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52028.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52028.json index 92a84545b6c..6b6cd8a2c6c 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52028.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52028.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R7000P v1.3.3.154 was discovered to contain a stack overflow via the pptp_user_netmask parameter at wiz_pptp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R7000P v1.3.3.154 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptp_user_netmask en wiz_pptp.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52029.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52029.json index 4ce8f57f717..60a83f7b57d 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52029.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52029.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R7000P v1.3.3.154 was discovered to contain a stack overflow via the pptp_user_netmask parameter at genie_pptp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Netgear R7000P v1.3.3.154 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptp_user_netmask en genie_pptp.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52030.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52030.json index 7d2629379d0..ce25b09c20a 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52030.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52030.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear R7000P v1.3.3.154 was discovered to contain a stack overflow via the pptp_user_netmask parameter at ru_wan_flow.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Netgear R7000P v1.3.3.154 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptp_user_netmask en ru_wan_flow.cgi. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5982.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5982.json index ce84494dad4..9cf50ecd8f9 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5982.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5982.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:07.637", "lastModified": "2024-10-29T14:35:20.400", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability arises from unsanitized input handling in multiple features, including user upload, directory creation, and template loading. Specifically, the load_chat_history function in modules/models/base_model.py allows arbitrary file uploads, potentially leading to remote code execution (RCE). The get_history_names function in utils.py permits arbitrary directory creation. Additionally, the load_template function in utils.py can be exploited to leak the first column of CSV files. These issues stem from improper sanitization of user inputs concatenated with directory paths using os.path.join." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en la \u00faltima versi\u00f3n de gaizhenbiao/chuanhuchatgpt. La vulnerabilidad surge del manejo de entrada no desinfectado en m\u00faltiples funciones, incluyendo la carga de usuarios, la creaci\u00f3n de directorios y la carga de plantillas. Espec\u00edficamente, la funci\u00f3n load_chat_history en modules/models/base_model.py permite cargas de archivos arbitrarias, lo que puede llevar a la ejecuci\u00f3n de c\u00f3digo remoto (RCE). La funci\u00f3n get_history_names en utils.py permite la creaci\u00f3n de directorios arbitrarios. Adem\u00e1s, la funci\u00f3n load_template en utils.py puede ser explotada para filtrar la primera columna de archivos CSV. Estos problemas surgen de la sanitizaci\u00f3n incorrecta de las entradas de usuario concatenadas con rutas de directorio usando os.path.join." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6245.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6245.json index e67bb505d4d..e3518cf1b3e 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6245.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6245.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@asrg.io", "published": "2024-10-28T17:15:04.780", "lastModified": "2024-11-07T16:15:17.847", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6400.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6400.json index 1af655b0719..e40457446cc 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6400.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6400.json @@ -3,7 +3,7 @@ "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-10-04T12:15:12.930", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6442.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6442.json index 0a6c06db4aa..b30aa4dd2c0 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6442.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6442.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vulnerabilities@zephyrproject.org", "published": "2024-10-04T06:15:04.370", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6443.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6443.json index f853ee8a9fe..ec08f196840 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6443.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6443.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vulnerabilities@zephyrproject.org", "published": "2024-10-04T06:15:05.160", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6444.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6444.json index 43b014a72a2..b8e0bd97490 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6444.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6444.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vulnerabilities@zephyrproject.org", "published": "2024-10-04T07:15:02.877", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6479.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6479.json index b46314d9f3c..77938de0d9b 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6479.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6479.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The SIP Reviews Shortcode for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'no_of_reviews' attribute in the woocommerce_reviews shortcode in all versions up to, and including, 1.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento SIP Reviews Shortcode for WooCommerce para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del atributo 'no_of_reviews' en el c\u00f3digo abreviado woocommerce_reviews en todas las versiones hasta la 1.2.3 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6480.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6480.json index 4f677dfc581..921a0b441c8 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6480.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6480.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The SIP Reviews Shortcode for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'no_of_reviews' attribute in the woocommerce_reviews shortcode in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento SIP Reviews Shortcode for WooCommerce para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del atributo 'no_of_reviews' en el c\u00f3digo abreviado woocommerce_reviews en todas las versiones hasta la 1.2.3 incluida , debido a una desinfecci\u00f3n de entrada y al escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6519.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6519.json index 953bffda1e9..0bb1ed08a89 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6519.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6519.json @@ -3,12 +3,16 @@ "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-10-21T15:15:03.727", "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use-after-free vulnerability was found in the QEMU LSI53C895A SCSI Host Bus Adapter emulation. This issue can lead to a crash or VM escape." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de use after free en la emulaci\u00f3n del adaptador de bus host SCSI QEMU LSI53C895A. Este problema puede provocar un bloqueo o un escape de la m\u00e1quina virtual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6726.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6726.json index e497ddf06c0..47e0c1f228c 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6726.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6726.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@puppet.com", "published": "2024-07-29T18:15:12.433", "lastModified": "2024-07-30T13:33:30.653", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6727.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6727.json index e7db8c14f18..c43346e5f9b 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6727.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6727.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@puppet.com", "published": "2024-07-29T18:15:12.697", "lastModified": "2024-07-30T13:33:30.653", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6861.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6861.json index d489fbe24c4..77a2e652d8c 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6861.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6861.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A disclosure of sensitive information flaw was found in foreman via the GraphQL API. If the introspection feature is enabled, it is possible for attackers to retrieve sensitive admin authentication keys which could result in a compromise of the entire product's API." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla de divulgaci\u00f3n de informaci\u00f3n confidencial en Foreman a trav\u00e9s de la API GraphQL. Si la funci\u00f3n de introspecci\u00f3n est\u00e1 habilitada, los atacantes pueden recuperar claves de autenticaci\u00f3n de administrador confidenciales, lo que podr\u00eda comprometer la API de todo el producto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6868.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6868.json index 14ae80573c6..1dde2cfb94b 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6868.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6868.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:08.473", "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "mudler/LocalAI version 2.17.1 allows for arbitrary file write due to improper handling of automatic archive extraction. When model configurations specify additional files as archives (e.g., .tar), these archives are automatically extracted after downloading. This behavior can be exploited to perform a 'tarslip' attack, allowing files to be written to arbitrary locations on the server, bypassing checks that normally restrict files to the models directory. This vulnerability can lead to remote code execution (RCE) by overwriting backend assets used by the server." + }, + { + "lang": "es", + "value": "La versi\u00f3n 2.17.1 de mudler/LocalAI permite la escritura arbitraria de archivos debido al manejo inadecuado de la extracci\u00f3n autom\u00e1tica de archivos. Cuando las configuraciones de modelos especifican archivos adicionales como archivos (por ejemplo, .tar), estos archivos se extraen autom\u00e1ticamente despu\u00e9s de la descarga. Este comportamiento se puede aprovechar para realizar un ataque \"tarslip\", que permite escribir archivos en ubicaciones arbitrarias en el servidor, evitando las comprobaciones que normalmente restringen los archivos al directorio de modelos. Esta vulnerabilidad puede provocar la ejecuci\u00f3n remota de c\u00f3digo (RCE) al sobrescribir los activos del backend utilizados por el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7010.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7010.json index 4090b53d728..9e7c78fa8c4 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7010.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7010.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:08.683", "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This type of side-channel attack allows an attacker to compromise the cryptosystem by analyzing the time taken to execute cryptographic algorithms. Specifically, in the context of password handling, an attacker can determine valid login credentials based on the server's response time, potentially leading to unauthorized access." + }, + { + "lang": "es", + "value": " La versi\u00f3n 2.17.1 de mudler/localai es vulnerable a un ataque de sincronizaci\u00f3n. Este tipo de ataque de canal lateral permite a un atacante comprometer el sistema criptogr\u00e1fico analizando el tiempo que lleva ejecutar algoritmos criptogr\u00e1ficos. Espec\u00edficamente, en el contexto del manejo de contrase\u00f1as, un atacante puede determinar credenciales de inicio de sesi\u00f3n v\u00e1lidas en funci\u00f3n del tiempo de respuesta del servidor, lo que puede provocar un acceso no autorizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7316.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7316.json index 0871bcfb37d..9104835dbb9 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7316.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7316.json @@ -3,12 +3,16 @@ "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "published": "2024-10-17T22:15:03.313", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric CNC Series allows a remote unauthenticated attacker to cause Denial of Service (DoS) condition on the product by sending specially crafted packets to TCP port 683, causing an emergency stop." + }, + { + "lang": "es", + "value": "La vulnerabilidad de validaci\u00f3n incorrecta de la cantidad especificada en la entrada en la serie CNC de Mitsubishi Electric permite que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el producto al enviar paquetes especialmente manipulados al puerto TCP 683, lo que provoca una parada de emergencia." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7424.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7424.json index 96bd03cbda8..ae54327e067 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7424.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7424.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Multiple Page Generator Plugin \u2013 MPG plugin for WordPress is vulnerable to unauthorized modification of and access to data due to a missing capability check on several functions in all versions up to, and including, 4.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke those functions intended for admin use resulting in subscribers being able to upload csv files and view the contents of MPG projects." + }, + { + "lang": "es", + "value": "El complemento Multiple Page Generator Plugin \u2013 MPG para WordPress es vulnerable a la modificaci\u00f3n y el acceso no autorizados a los datos debido a la falta de una comprobaci\u00f3n de capacidad en varias funciones en todas las versiones hasta la 4.0.1 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, invoquen aquellas funciones destinadas al uso administrativo, lo que permite que los suscriptores carguen archivos csv y vean el contenido de los proyectos MPG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7432.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7432.json index 7d3dd2b20bb..90ee401c004 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7432.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7432.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-01T08:15:02.453", "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7433.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7433.json index 10f9668ad12..ac83e915339 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7433.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7433.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-01T08:15:02.727", "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7434.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7434.json index ffd752c7cd1..0483f61d8cd 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7434.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7434.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-01T08:15:02.943", "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7883.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7883.json index 3638ec256cb..c770c55a79f 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7883.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7883.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "When using Arm Cortex-M Security Extensions (CMSE), Secure stack \ncontents can be leaked to Non-secure state via floating-point registers \nwhen a Secure to Non-secure function call is made that returns a \nfloating-point value and when this is the first use of floating-point \nsince entering Secure state. This allows an attacker to read a limited \nquantity of Secure stack contents with an impact on confidentiality. \nThis issue is specific to code generated using LLVM-based compilers." + }, + { + "lang": "es", + "value": "Al utilizar las extensiones de seguridad Arm Cortex-M (CMSE), el contenido de la pila segura puede filtrarse al estado no seguro a trav\u00e9s de registros de punto flotante cuando se realiza una llamada de funci\u00f3n de seguro a no seguro que devuelve un valor de punto flotante y cuando este es el primer uso del punto flotante desde que se ingresa al estado seguro. Esto permite que un atacante lea una cantidad limitada de contenido de la pila segura con un impacto en la confidencialidad. Este problema es espec\u00edfico del c\u00f3digo generado mediante compiladores basados ??en LLVM." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8059.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8059.json index 8f6d8bd1de8..0550fbfc44d 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8059.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8059.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-09-13T18:15:06.430", "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8107.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8107.json index 1756e1c3bb3..9772a18fc0f 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8107.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8107.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-01T07:15:06.263", "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8185.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8185.json index 121527f88d8..5b0e22e8b36 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8185.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8185.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Vault Community and Vault Enterprise (\u201cVault\u201d) clusters using Vault\u2019s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.\n\nThis vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12." + }, + { + "lang": "es", + "value": "Los cl\u00fasteres Vault Community y Vault Enterprise (\u201cVault\u201d) que utilizan el backend de almacenamiento integrado de Vault son vulnerables a un ataque de denegaci\u00f3n de servicio (DoS) a trav\u00e9s del agotamiento de la memoria mediante un endpoint de la API de uni\u00f3n al cl\u00faster de Raft. Un atacante puede enviar un gran volumen de solicitudes al endpoint, lo que puede provocar que Vault consuma recursos excesivos de memoria del sistema, lo que puede provocar un bloqueo del sistema subyacente y del propio proceso de Vault. Esta vulnerabilidad, CVE-2024-8185, se corrigi\u00f3 en Vault Community 1.18.1 y Vault Enterprise 1.18.1, 1.17.8 y 1.16.12." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8278.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8278.json index 81250cea8e2..1671ebcd9c1 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8278.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8278.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-09-13T18:15:06.703", "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8279.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8279.json index de111c5a874..1dc73609003 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8279.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8279.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-09-13T18:15:06.973", "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8280.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8280.json index 92f80cb8a17..69b536415f1 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8280.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8280.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-09-13T18:15:07.270", "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8281.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8281.json index 0031194194b..45a0292aafb 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8281.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8281.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-09-13T18:15:07.603", "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8632.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8632.json index f63f41d4fdf..7baaa14e94f 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8632.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8632.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "El complemento KB Support \u2013 WordPress Help Desk and Knowledge Base para WordPress es vulnerable al acceso no autorizado y a la modificaci\u00f3n de datos debido a una falta de comprobaci\u00f3n de capacidad en las funciones 'kbs_ajax_load_front_end_replies' y 'kbs_ajax_mark_reply_as_read' en todas las versiones hasta la 1.6.6 incluida. Esto permite que atacantes no autenticados lean las respuestas de cualquier ticket y marquen cualquier respuesta como le\u00edda." + "value": "El complemento KB Support \u2013 WordPress Help Desk y Knowledge Base para WordPress es vulnerable al acceso no autorizado y a la modificaci\u00f3n de datos debido a una falta de comprobaci\u00f3n de capacidad en las funciones 'kbs_ajax_load_front_end_replies' y 'kbs_ajax_mark_reply_as_read' en todas las versiones hasta la 1.6.6 incluida. Esto permite que atacantes no autenticados lean las respuestas de cualquier ticket y marquen cualquier respuesta como le\u00edda." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8739.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8739.json index cbe400675ba..0b370dd3dde 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8739.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8739.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The ReCaptcha Integration for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El plugin ReCaptcha Integration for WordPress para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 1.2.5 incluida. Esto permite que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8934.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8934.json index 6b29244636b..f80ba60cda1 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8934.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8934.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A local user with administrative access rights can enter specialy crafted values for settings at the user interface (UI) of the TwinCAT Package Manager which then causes arbitrary OS commands to be executed." + }, + { + "lang": "es", + "value": "Un usuario local con derechos de acceso administrativo puede introducir valores especialmente manipulados para la configuraci\u00f3n en la interfaz de usuario (UI) de TwinCAT Package Manager, lo que luego provoca que se ejecuten comandos arbitrarios del sistema operativo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9137.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9137.json index 341e3c5182b..55cbff53fe8 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9137.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9137.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@moxa.com", "published": "2024-10-14T09:15:04.403", "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9139.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9139.json index a582be5690a..1cf0cf4cd7a 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9139.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9139.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@moxa.com", "published": "2024-10-14T09:15:04.693", "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9341.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9341.json index 3c5dd3402f2..467bf2a7368 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9341.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9341.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-01T19:15:09.500", "lastModified": "2024-11-07T08:15:13.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9355.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9355.json index 0565c03d79c..5b8fc600674 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9355.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9355.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-01T19:15:09.793", "lastModified": "2024-11-05T08:15:04.413", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9410.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9410.json index 0de5363710d..6dcae8923be 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9410.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9410.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-10-04T14:15:05.577", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9440.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9440.json index 9d993e911a1..6a9f3d647d8 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9440.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9440.json @@ -3,7 +3,7 @@ "sourceIdentifier": "disclosure@vulncheck.com", "published": "2024-10-02T19:15:15.880", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9441.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9441.json index 4c22ab6e16e..1fad553790e 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9441.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9441.json @@ -3,7 +3,7 @@ "sourceIdentifier": "disclosure@vulncheck.com", "published": "2024-10-02T19:15:16.100", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9459.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9459.json index 6b1937d76a0..fe8f56b7ac4 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9459.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9459.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Zohocorp ManageEngine\u00a0Exchange Reporter Plus versions\u00a05718 and prior are vulnerable to authenticated SQL Injection in reports module." + }, + { + "lang": "es", + "value": "Las versiones 5718 y anteriores de Zohocorp ManageEngine Exchange Reporter Plus son vulnerables a la inyecci\u00f3n SQL autenticada en el m\u00f3dulo de informes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9470.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9470.json index 48869f54826..881533849e3 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9470.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9470.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:20.907", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9513.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9513.json index b80f99d67b6..442393f5236 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9513.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9513.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-04T13:15:13.343", "lastModified": "2024-10-07T21:15:19.450", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9576.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9576.json index 3ed6da604b5..aa48fe0e72c 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9576.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9576.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-10-07T15:15:10.467", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "cve-coordination@incibe.es", diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9655.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9655.json index d33a4d5ecb5..041213ce1b8 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9655.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9655.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Icon widget in all versions up to, and including, 6.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Gutenberg Blocks with AI de Kadence WP \u2013 Page Builder Features para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del widget de \u00edconos del complemento en todas las versiones hasta la 6.6.2 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9781.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9781.json index 5dfc1062496..2500def5359 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9781.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9781.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-10-10T07:15:04.100", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9792.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9792.json index 8a948f23d6b..a8830526fc8 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9792.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9792.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T15:15:15.710", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9823.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9823.json index bfa256f4270..a2d46b578a1 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9823.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9823.json @@ -3,7 +3,7 @@ "sourceIdentifier": "emo@eclipse.org", "published": "2024-10-14T15:15:14.560", "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9837.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9837.json index 67a566a3861..f80b41a4354 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9837.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9837.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-15T08:15:02.910", "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9868.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9868.json index 96ff5c769c9..63769117633 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9868.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9868.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Age Gate Widget 'url' parameter in all versions up to, and including, 5.10.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El plugin Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'url' del widget Age Gate en todas las versiones hasta la 5.10.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficiente. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9896.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9896.json index 59626c0dd36..577d61e4fc2 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9896.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9896.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The BBP Core \u2013 Expand bbPress powered forums with useful features plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El plugin BBP Core \u2013 Expand bbPress powered forums with useful features para WordPress es vulnerable a Cross-Site Scripting Reflejado debido al uso de add_query_arg sin el escape apropiado en la URL en todas las versiones hasta la 1.2.5 incluida. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9902.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9902.json index 1e2cb94cf00..32bd4b5909a 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9902.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9902.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en Ansible. El m\u00f3dulo `user` de ansible-core puede permitir que un usuario sin privilegios cree o reemplace silenciosamente el contenido de cualquier archivo en cualquier ruta del sistema y tome posesi\u00f3n de \u00e9l cuando un usuario privilegiado ejecuta el m\u00f3dulo `user` en el directorio de inicio del usuario sin privilegios. Si el usuario sin privilegios tiene permisos de navegaci\u00f3n en el directorio que contiene el archivo de destino explotado, conserva el control total sobre el contenido del archivo como su propietario." } ], "metrics": { diff --git a/README.md b/README.md index ce91dbdf6c5..00233f42283 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-10T00:55:20.181260+00:00 +2024-11-10T03:00:19.108307+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-09T23:15:13.563000+00:00 +2024-11-10T02:15:13.377000+00:00 ``` ### Last Data Feed Release @@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-11-09T01:00:10.108416+00:00 +2024-11-10T01:00:10.082902+00:00 ``` ### Total Number of included CVEs @@ -44,9 +44,33 @@ Recently added CVEs: `0` ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `590` -- [CVE-2024-7059](CVE-2024/CVE-2024-70xx/CVE-2024-7059.json) (`2024-11-09T23:15:13.563`) +- [CVE-2024-8279](CVE-2024/CVE-2024-82xx/CVE-2024-8279.json) (`2024-09-14T11:47:14.677`) +- [CVE-2024-8280](CVE-2024/CVE-2024-82xx/CVE-2024-8280.json) (`2024-09-14T11:47:14.677`) +- [CVE-2024-8281](CVE-2024/CVE-2024-82xx/CVE-2024-8281.json) (`2024-09-14T11:47:14.677`) +- [CVE-2024-8632](CVE-2024/CVE-2024-86xx/CVE-2024-8632.json) (`2024-10-04T13:51:25.567`) +- [CVE-2024-8739](CVE-2024/CVE-2024-87xx/CVE-2024-8739.json) (`2024-11-04T13:11:14.613`) +- [CVE-2024-8934](CVE-2024/CVE-2024-89xx/CVE-2024-8934.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9137](CVE-2024/CVE-2024-91xx/CVE-2024-9137.json) (`2024-10-15T12:57:46.880`) +- [CVE-2024-9139](CVE-2024/CVE-2024-91xx/CVE-2024-9139.json) (`2024-10-15T12:57:46.880`) +- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-11-07T08:15:13.577`) +- [CVE-2024-9355](CVE-2024/CVE-2024-93xx/CVE-2024-9355.json) (`2024-11-05T08:15:04.413`) +- [CVE-2024-9410](CVE-2024/CVE-2024-94xx/CVE-2024-9410.json) (`2024-10-07T17:48:28.117`) +- [CVE-2024-9440](CVE-2024/CVE-2024-94xx/CVE-2024-9440.json) (`2024-10-04T13:50:43.727`) +- [CVE-2024-9441](CVE-2024/CVE-2024-94xx/CVE-2024-9441.json) (`2024-10-04T13:50:43.727`) +- [CVE-2024-9459](CVE-2024/CVE-2024-94xx/CVE-2024-9459.json) (`2024-11-06T15:29:04.917`) +- [CVE-2024-9470](CVE-2024/CVE-2024-94xx/CVE-2024-9470.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9513](CVE-2024/CVE-2024-95xx/CVE-2024-9513.json) (`2024-10-07T21:15:19.450`) +- [CVE-2024-9576](CVE-2024/CVE-2024-95xx/CVE-2024-9576.json) (`2024-10-07T17:47:48.410`) +- [CVE-2024-9655](CVE-2024/CVE-2024-96xx/CVE-2024-9655.json) (`2024-11-01T12:57:03.417`) +- [CVE-2024-9781](CVE-2024/CVE-2024-97xx/CVE-2024-9781.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9792](CVE-2024/CVE-2024-97xx/CVE-2024-9792.json) (`2024-10-15T12:58:51.050`) +- [CVE-2024-9823](CVE-2024/CVE-2024-98xx/CVE-2024-9823.json) (`2024-10-15T12:57:46.880`) +- [CVE-2024-9837](CVE-2024/CVE-2024-98xx/CVE-2024-9837.json) (`2024-10-15T12:57:46.880`) +- [CVE-2024-9868](CVE-2024/CVE-2024-98xx/CVE-2024-9868.json) (`2024-11-04T13:44:51.370`) +- [CVE-2024-9896](CVE-2024/CVE-2024-98xx/CVE-2024-9896.json) (`2024-11-04T14:10:06.287`) +- [CVE-2024-9902](CVE-2024/CVE-2024-99xx/CVE-2024-9902.json) (`2024-11-06T20:15:07.820`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 95517c24286..63edbbc7b56 100644 --- a/_state.csv +++ b/_state.csv @@ -11997,7 +11997,7 @@ CVE-2005-0999,0,0,ecca03fc38e9f5ae3e58e3725ca38d3553d21cd1060d462173b32ea09b9c08 CVE-2005-1000,0,0,876733ec970e875daec33609ebf439cfdd17ab98e8699b5ea8b6434b457f0939,2017-07-11T01:32:28.970000 CVE-2005-10001,0,0,2693db2d9b06c7ac36b92ee416e4e3effc2afa7e0b62b3415561be1db7294514,2024-08-08T00:15:23.127000 CVE-2005-10002,0,0,dc6fd831307ffcb4928dc15e5f0d4bca55123aa5ffaf8e97bc126f60e3f9b493,2024-05-17T00:24:26.580000 -CVE-2005-10003,0,0,28071fafeeccb75b8c30f71d271a6483af2dbee501f9b6bd00e7d5e0acfd5788,2024-10-18T12:52:33.507000 +CVE-2005-10003,0,1,44493880725cd8839360edfe510264f0a320784d6ddba11287efa4e03d5d872b,2024-10-18T12:52:33.507000 CVE-2005-1001,0,0,15f915129c529eb106d656586fee07bf3a049367ce9223cf255e6d44dfb5abdc,2017-07-11T01:32:29.047000 CVE-2005-1002,0,0,9c4a3a87f279404d6b0eb0a64f730f2b1c061844b6065693972fceeec1e57e20,2016-10-18T03:16:25.287000 CVE-2005-1003,0,0,a961fab12b3a0362183c5cb7e641f0b1d0fc1fc8dc55e4a55bb9ee3700911bfa,2017-07-11T01:32:29.110000 @@ -83467,7 +83467,7 @@ CVE-2016-10142,0,0,ef0621fcec1497763bfe129efe28b498ec891f1c4e995754ceefd4ddc2240 CVE-2016-10143,0,0,c9281f523f56ceee5ed579abb3bfb67203d358bc79cf466532b0ce83a10ea20e,2017-03-14T01:59:00.333000 CVE-2016-10144,0,0,237c80d7c8016be1d43b0ae87fea34d37a380688c12421738ba6cbe399a00793,2024-11-04T18:48:46.350000 CVE-2016-10145,0,0,c3fc1d11655b4d3a65e85cfa6c2d486f58dba5f751f72d51cec4501755c3ef46,2024-11-04T18:45:24.470000 -CVE-2016-10146,0,0,dc530eed2010ae83edb60518ce68eacdd83dd3d5ba5b1e0b5367935ac4b0ee01,2017-11-04T01:29:15.787000 +CVE-2016-10146,0,1,5a72793a9b0eb84cec075db76da6951d1b3f5a72976ee94a451f4b38508a3a9c,2017-11-04T01:29:15.787000 CVE-2016-10147,0,0,14848770473e2f0cdc7f6d0b11ad5ca9a287cc99358656e1997db28569d707a1,2023-02-12T23:16:49.557000 CVE-2016-10148,0,0,0b93c7f6a79f52f11ed2692aa806523f9eaa05a4289d5f4bb5c3568ab83403c9,2017-03-16T01:59:00.887000 CVE-2016-10149,0,0,24d5633821119c73ffb02882d67e791e26f471e2a12bc085005e366c1ebd992e,2018-01-05T02:30:31.603000 @@ -90458,7 +90458,7 @@ CVE-2016-7527,0,0,95861de21872f14f8012815df306132ca4c4ec0ee42221e09d57528c086234 CVE-2016-7528,0,0,c16129d2462881b38bc83868468c620340a98142b2c9d4ae0116ffa0131b6255,2024-07-03T15:22:10.600000 CVE-2016-7529,0,0,815c7fdada9f9e2bc75a51b9f5d1bf734db049324d2d75ffe30ad23eea1b27df,2024-07-03T15:22:20.367000 CVE-2016-7530,0,0,6492e65bbb8672ec847a4514447a6f39c1d56b13a2cf7c79ef9c970546f67022,2024-07-03T15:22:34.133000 -CVE-2016-7531,0,0,c15056ad0b2cfe60b5b6e425711faabdbd0d18e669e26e61664e67468a59b7a2,2017-05-09T12:39:15.447000 +CVE-2016-7531,0,1,c54f90bd6cd7db0262da3b68f7b1266d4217dac2d1f029b8b72a0d42e4366111,2017-05-09T12:39:15.447000 CVE-2016-7532,0,0,2c355ffc793fc8d79b23839d2327b5134d031a650ffe2d95f63e871231ba72e6,2024-11-04T18:55:38.580000 CVE-2016-7533,0,0,0b5c1dbe1976d2fc2f4abf252703deacc66d9d8030522be17c5c1c20eb40fb1b,2024-07-03T15:23:17.167000 CVE-2016-7534,0,0,1d15b6b809a00df4dfaaa24cd210f52122b7bfacbd0bd967b9c1a2a0a459bd8d,2024-07-10T14:33:13.477000 @@ -102532,7 +102532,7 @@ CVE-2017-20191,0,0,c82081004c307230c99856cdb3a9bea1dbe477fc9056adce103f7b0450353 CVE-2017-20192,0,0,191924c7b50d8cb8c53e91be3aa258ea86148b635680fd267b3908bb01e9fafd,2024-10-16T16:38:14.557000 CVE-2017-20193,0,0,faab4d0a1d4b2a9b5dee967664140b9d21a195927a9eb0bcf572ec40ea8eb80b,2024-10-30T20:46:34.060000 CVE-2017-20194,0,0,00f649d6962a877d88b2bd204a4cffa3843d32fbf3daf782360741fdc5745147,2024-10-30T21:00:25.973000 -CVE-2017-20195,0,0,0347c3e96eed90daff75208ff8f9b7246859178d6ced2549c1b28fadca74e6e3,2024-10-29T14:34:04.427000 +CVE-2017-20195,0,1,7a6b1095f1ca9ef74aaf846ae7819e0b680bdc89064b314d1b7aa6944e6868d8,2024-10-29T14:34:04.427000 CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000 CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000 CVE-2017-2022,0,0,9f249157715bb01a33c6885e22f286efa78b6a3306959a78f30cb9dd84a9f46c,2023-11-07T02:43:31.413000 @@ -155393,15 +155393,15 @@ CVE-2020-2630,0,0,55c052ceb44e906402d424b428a53a26a499d5bc86258d9db4f283a91646e5 CVE-2020-26300,0,0,fe9afe8065364d3aef6c20ebb23c3acf13eea52cf63f3554734347554d8be57d,2022-04-26T15:33:28.443000 CVE-2020-26301,0,0,c0ab10801dfad109b457d8d67eb3760a35e8e44a9a35112332153f49a2f1e630,2021-10-01T13:55:37.663000 CVE-2020-26302,0,0,cccbe212d762d8caa8ca1ef52e070c9c901dd98471ee54c85b8967c5cbe6736b,2023-11-07T03:20:33.117000 -CVE-2020-26303,0,0,9f45856e59e59f54518fe06f49be26469b04ae35ae46b05c424d073b52de25c5,2024-10-28T13:58:09.230000 -CVE-2020-26304,0,0,c67e9165d80821fa97e5b658dd7bdc808e629f362426cf9cd9ee3e8e51b19ecc,2024-10-28T13:58:09.230000 -CVE-2020-26305,0,0,e4a3dac6f5655291aa2521759d312c3ea665eff878199375da4b1a7bc06e53b8,2024-10-28T13:58:09.230000 -CVE-2020-26306,0,0,6887791a785e0fd2747817d55f7ac856090c2bc42c4930fa868493835004144a,2024-10-28T13:58:09.230000 -CVE-2020-26307,0,0,e45919b8e7c9cbe7c60da4d43e64b4cafb2343d144b0e1afd35f4cb58999e02d,2024-10-28T13:58:09.230000 -CVE-2020-26308,0,0,35eec3a4d43d6d258408be26f3e5e27703d47e5d4c6dc9dc58836423c2a6b91d,2024-10-28T13:58:09.230000 -CVE-2020-26309,0,0,28d8896b5e2ba2f2b59d664e6455e0c04ccaaf9f4d4ff03dafdab67098b23194,2024-10-28T13:58:09.230000 +CVE-2020-26303,0,1,c7846b4ecd9d0267a94ec317a2cf0ad0453e1c47a806ec5f9d2c8c154d7c4529,2024-10-28T13:58:09.230000 +CVE-2020-26304,0,1,cee15f0ba2fc10b9a1c8eb8ae68653941b4d7ca78c7f8ed0ddb27871b3a56efd,2024-10-28T13:58:09.230000 +CVE-2020-26305,0,1,cb73aaf0e11ca37692b21161ea95da041372aecc5b2ed2488cce635f40df0b33,2024-10-28T13:58:09.230000 +CVE-2020-26306,0,1,320d8d406e4d9f80bc366d1249d7c386f835f67a144bca148e6923fd04a2e4d4,2024-10-28T13:58:09.230000 +CVE-2020-26307,0,1,486bd4812a94616355663dbcf12102b1b19064bb422b53da2e5a025866d98cba,2024-10-28T13:58:09.230000 +CVE-2020-26308,0,1,7c5f6d6d7775e46e3e0a6b82796cffa83f73f358e73f33f92b718cb73c8afab5,2024-10-28T13:58:09.230000 +CVE-2020-26309,0,1,4f1cfe2934ddec38e2555dd459ad34e12aa00a6c654c15ca528464a1a8fe4632,2024-10-28T13:58:09.230000 CVE-2020-2631,0,0,5046699c80d5cb83a63f5d20bab67d0b0c4bb7840b215c085c94d5784e64e79d,2022-04-29T02:28:10.417000 -CVE-2020-26310,0,0,68317d741363e03351a68d6825549282c0a005cf43e75712db88f36039f1622b,2024-10-28T13:58:09.230000 +CVE-2020-26310,0,1,e6b4a45f467d52c9d8b4bcf4a12f0d0088787b6f2af43eada49a06b44f38a730,2024-10-28T13:58:09.230000 CVE-2020-26311,0,0,ebb672b904f408e12ccbd2d17f1f11978cc23475eea635244eea5b3c9bb0ee0d,2024-10-30T18:07:38.110000 CVE-2020-26312,0,0,80fc0fcbc2d04eee4c3076f3daa90ef7f4deb9af9c8bfbb2495ec991be3de55d,2024-05-15T16:40:19.330000 CVE-2020-26313,0,0,4f8438affbb47b619adf4b6ba484d05206ac16511e81ced9ddd5162b1bf025fd,2023-11-07T03:20:33.210000 @@ -187518,7 +187518,7 @@ CVE-2021-47576,0,0,a79375be9dd000b3d3216a61a3add24004d37015bfda8f4d6c5d95373a50f CVE-2021-47577,0,0,d0face38e2762beb7e28363ee5ff98795dd4f46c8e6afb2c345789d3f1fe5542,2024-06-20T12:43:25.663000 CVE-2021-47578,0,0,2b81563df18159ccacdf1d60c9b3e336ea801dd9f67b5d514205223d8fb7aa4e,2024-08-27T03:18:45.253000 CVE-2021-47579,0,0,214fa59c33ed22b9398868c401e997995a9f0f8c8cbab8497c48f31736b1004e,2024-06-20T12:43:25.663000 -CVE-2021-47580,0,0,9203b9569f1af3364c196ec8be7ea8cd3d74fe51d6ff896c43aa2e1a1a0d8aa6,2024-11-05T15:35:02.187000 +CVE-2021-47580,0,1,14c7b6af35db3400d905d88ed27d72cd05f25fa024d858922b9c9e2686549945,2024-11-05T15:35:02.187000 CVE-2021-47581,0,0,8787010fa1b837c9433128d0d20bbbc5cc367d055ada39f1bbe864fed14da829,2024-06-20T09:15:11.057000 CVE-2021-47582,0,0,a303bc490ed932a1afc5bb4b5129633bc3034bcabff4864f9a509289f08af77d,2024-06-20T12:43:25.663000 CVE-2021-47583,0,0,c5ad835aee47b95f02903b0b317ea04ceb81d1a4eedf818baa3f67b776d2d943,2024-11-07T17:41:01.250000 @@ -212760,7 +212760,7 @@ CVE-2022-4969,0,0,6da77d75911b6f9f4d4eed5e8e9a02ef51bdb2636c0fddb313d49f06fb600e CVE-2022-4971,0,0,f6ff69e7ed7e1feffcfd40ec8ecc2dace723d01c8e8dee7c8441179db44a8395,2024-10-30T16:37:33.237000 CVE-2022-4972,0,0,b59aab7940af7df89b4a4014b803c15ac567db0b0d743fb31ad6d103cfe2de78,2024-10-30T16:34:55.117000 CVE-2022-4973,0,0,c846697ac57e999699ffcd63f1eb7690000d94006aa238932cc11138832eecb6,2024-10-30T15:58:30.907000 -CVE-2022-4974,0,0,14764381bacd12db5e2c67438cb3bfc3f3c80d088b68fde09bb3a022a5cf379e,2024-10-16T16:38:14.557000 +CVE-2022-4974,0,1,9af226e59a1a9b1d22b1ed026ed7c9aa488d8215209d77546e12dbf23051da97,2024-10-16T16:38:14.557000 CVE-2023-0001,0,0,89cc7c25326dd5727e94c3abe5ce2365a868c05aa8d47b4c236024303b20e03e,2024-01-12T22:10:50.817000 CVE-2023-0002,0,0,85151726e26db3dd412b666129cc1146d77d486c542304fa6aa1433f4f16452f,2023-11-07T03:59:26.433000 CVE-2023-0003,0,0,0f4cd63b6620e63a4c26b7158c334115eb4a14a033fde970e1fda8144d0dfe5d,2024-02-16T17:04:22.737000 @@ -220277,7 +220277,7 @@ CVE-2023-26780,0,0,0a2bfcd02f53c6ac093d58cc180c519d2a43ad99184c7df9862b088ff00e7 CVE-2023-26781,0,0,3d02952edb170d494b0504990360825f38e92e8848f6f4f4ff91401983c48890,2023-05-08T17:11:51.063000 CVE-2023-26782,0,0,6ca5eec4beaebf1734dc236d1b0623f906fb3ba71dfe85419b666b3dea09a594,2023-10-06T17:20:59.803000 CVE-2023-26784,0,0,071c60b6740633a44aaf2a0e60f7735e8a7dfcdee0c5b5c97016b37b97b20983,2023-03-22T16:06:24.767000 -CVE-2023-26785,0,0,e01827a328f466db922ba8562f17cce15ac2247d68ab38d799a621157859f6a7,2024-10-21T00:15:11.947000 +CVE-2023-26785,0,1,4b97fd9255a3bce8ecaac46b372dc5da3e886b2ece25712c6d2d48a2f9df3d77,2024-10-21T00:15:11.947000 CVE-2023-26788,0,0,7fa325a41419317b85b7654551d6158f8e6dd92063a11f6ab58476d4fa9c0e85,2023-04-14T03:53:02.843000 CVE-2023-26789,0,0,693ac4c06e973f2dddf5d5b7c84f39948ad2e205bbc59cc3058702f8b55394cb,2023-04-11T14:46:38.527000 CVE-2023-2679,0,0,d6c7eed4f9e9442e83b78abe9cd8db657b80acb7e841ef6db23187abd84f1550,2023-05-25T19:38:25.710000 @@ -220816,7 +220816,7 @@ CVE-2023-27513,0,0,b3909d355a45c29768d6d3588756ebdc0703583e6bfc9494fea688a90e11f CVE-2023-27514,0,0,a8f3deb06eb1b094f727e739825338602c69e32028bb8afb74753aa90dc12f03,2023-05-30T15:40:15.907000 CVE-2023-27515,0,0,7961ec6057a97c321fa3030f91cfd3ceb78cd11ea25af47b85e53bc3ff9f85fa,2023-11-07T04:09:58.700000 CVE-2023-27516,0,0,bc20dc49ace1afa87bc3e3c0e0d3451d6a65dbc158a7bdb8cc712f05694ee758,2023-10-18T16:35:39.283000 -CVE-2023-27517,0,0,52a544caff45b76967b1c707526bd00332f0b2e7e3d289617dace328683e77fe,2024-02-14T15:01:55.963000 +CVE-2023-27517,0,1,26a00a9a6cb4f7f4a109d17379c20f4e1a176cf37494ac0249df0d334becf668,2024-02-14T15:01:55.963000 CVE-2023-27518,0,0,0c064bb07b7646946fe0d7a52abf5dbb2b55719dba10f75674f23e952b478a04,2023-05-30T15:40:26.997000 CVE-2023-27519,0,0,a391ebab6444406e7a3b8b418ece9eed27e3ed5b38569a1f2acc3c7e30c1506d,2023-11-29T18:15:41.620000 CVE-2023-2752,0,0,70c18716b0ce17d99cdd18556a1bb6fc4f3b8c301b80b04f13ae0f7949ffb99a,2023-05-24T15:18:32.437000 @@ -222260,7 +222260,7 @@ CVE-2023-2911,0,0,3fc28f7a4cce78cf57f2ccc28f9bf08ea8c3a6108ae5315a84cc972f7d468e CVE-2023-29110,0,0,e37bb302c7b6004f62f64bee739dd60b80269d9ec3f18ab7f6c08f6573c4f4cc,2023-04-18T01:54:42.050000 CVE-2023-29111,0,0,b1bc07eb6200b4ea5e40e4e2a49487651690d8b4c4386b24b857eb7e95dc144f,2023-04-18T02:00:17.197000 CVE-2023-29112,0,0,9f6533a766719bb5d00054122744481c4bc7f510d1a6deb7263cc259df740967,2023-04-18T02:09:33.777000 -CVE-2023-29114,0,0,76076058dcbe332e33c66fbf066bdfb8f382055f672fdd2b1c8ce3b503fb6ffe,2024-11-05T17:15:05.277000 +CVE-2023-29114,0,1,6796a49843143ec000adfa6236ba91977ea03ea64c4c11904015e2208c03ed21,2024-11-05T17:15:05.277000 CVE-2023-29115,0,0,6704c3c787477e728d9c495ab496d41e233d1d01c5dff87ac9be1d189ec1c0f4,2024-11-08T16:08:01.997000 CVE-2023-29116,0,0,9d5c8addc8427aa6d5366c27c17c3e0a1b3a15611e145ecbe94d61e19050a6e5,2024-11-08T16:08:20.573000 CVE-2023-29117,0,0,3bd098986e25f72dbd195b0e2679c29d3e6bc87f218bce19788c3a0c507a9615,2024-11-08T16:08:40.510000 @@ -230170,7 +230170,7 @@ CVE-2023-39582,0,0,4e3c94d04c3d71f1e7474e48a5e9e5802cb614cc5caaae178c9bf4c6db83a CVE-2023-39583,0,0,682c5456d8be8d30f587ea2f337fa4ba505b49c39d80ddcb554520ba90068870,2023-11-07T04:17:33.040000 CVE-2023-39584,0,0,2c91b4e9916e8396a565550f0b2e78bd69e8dd806951ec541bdabb6ac33bc11e,2024-09-26T18:35:04.523000 CVE-2023-3959,0,0,1c8cb0b9580f83318b0c36d8bc8f73fb342f7d0f0a71af399cdaffe0ab2960a8,2024-08-02T07:16:07.870000 -CVE-2023-39593,0,0,0669f9e3530262a87a6ce00403249b070f5e70ebdca5c3feb3d329b8bdd0afd5,2024-10-21T00:15:12.103000 +CVE-2023-39593,0,1,39b5d512b2b49ce49098db12e9ce32815ff1c7743d61713124be947adbfc8d23,2024-10-21T00:15:12.103000 CVE-2023-39598,0,0,472be8949d4750c193fc0e79e3373ee8040069ae06201b9dbce78c66cf7f4d8a,2023-11-07T04:17:33.097000 CVE-2023-39599,0,0,d846bb2751315746765d628aac10470828469ee3fe731d77fb8a34e1cea0bd8c,2023-08-28T19:08:09.323000 CVE-2023-39600,0,0,7f58febe003b75ab66793e4055525f6c3c139aad235a05622e6f81527de7c5e2,2023-11-07T04:17:34.073000 @@ -234303,7 +234303,7 @@ CVE-2023-45558,0,0,4a1dc757642cdb9b4c93c1211083aa2bf811b1c4b3add2184580e895527d3 CVE-2023-45559,0,0,720f8b84c0f7c56dc9144358c5610b670d7113ae5edca03b6ed0b37249523ad6,2024-01-10T14:31:19.180000 CVE-2023-4556,0,0,5748749c8f599409eef990839edc42760a57148e868c649fa3a4cccdfc0802a0,2024-05-17T02:31:39.290000 CVE-2023-45560,0,0,df7c39ec288278203e2f002c283cfce071944984c49c0d6b60874c92f1430d3e,2024-09-03T16:35:02.247000 -CVE-2023-45561,0,0,0d0d372219ce69780a8216cca3f10434818ded1d45225f97d1b5059604c443c0,2024-01-08T19:32:10.703000 +CVE-2023-45561,0,1,ce24aa012409f141eb0e59bd620c23cb2b562a0a62866bae75972a4849446237,2024-11-10T02:15:13.377000 CVE-2023-4557,0,0,c682f8e4cb27add8ecc058eea7cc020afa90b141a50536741e3282b5edbb2ad8,2024-05-17T02:31:39.397000 CVE-2023-45572,0,0,9b6409a61d21cb9278322e7d00148b13379cd12429eaac8256cf576a20169172,2024-02-20T21:16:22.087000 CVE-2023-45573,0,0,000d8632f26e570b9ca63ee109cb9a26c684c29fec848b9deb744588f520c53a,2023-11-03T19:04:46.640000 @@ -235586,7 +235586,7 @@ CVE-2023-47213,0,0,e1665793a7e455f8be34ca60069d1730a8c4691047ad1438b3110f4360ef8 CVE-2023-47215,0,0,006d9d9019e9ff1126e65cfcfae215acec8da92d10c418bb98436ab346f3aaf6,2024-01-02T19:54:38.503000 CVE-2023-47216,0,0,1fe7473bc827bf89e0f3ef200cf4756515ab5473901af2e88d806c60ed3889b1,2024-09-09T12:21:53.383000 CVE-2023-47217,0,0,7eef44a7d9f6d218718d72d8b5c96cb9291c8af3386df309c7148738c54dbb54,2024-09-09T12:21:53.383000 -CVE-2023-47218,0,0,30457d26e06aa724b25c5a4b9d6476fae0be0d9f5e891121bba03fd312401546,2024-02-15T06:15:45.653000 +CVE-2023-47218,0,1,06a4250e41d42f4a397202260446d21eadf8e0d648e3922b9f9c8f538775b97c,2024-02-15T06:15:45.653000 CVE-2023-47219,0,0,a845c0a8d1bfc9cf141ee0c900e85121b5fc4658af37f297283d28e9af383d45,2024-01-10T16:53:51.923000 CVE-2023-4722,0,0,050d75834ba5d36040e291bbeac7a2653c684d1bb6c4133b220d26a5da2ecae9,2023-09-06T00:15:42.687000 CVE-2023-47220,0,0,4f25430c2852c70bc18d5a1028605ff03b27c1693f70d4759bd38c0b7b91333b,2024-05-03T12:48:41.067000 @@ -236323,7 +236323,7 @@ CVE-2023-48360,0,0,1cee215649e2f3611e49749f15a579a397dce0eab526eaa9428c04eb47a10 CVE-2023-48361,0,0,701aa49f3b16a164b735a81d4d623a8ffd5c026193f7af621d2581e771bce02f,2024-08-14T17:49:14.177000 CVE-2023-48362,0,0,aa7c79d9729bc0eae9e4c52e702f3bc0e3ed649e03f1eeffd24cbde95d7bcf93,2024-09-10T16:31:49.033000 CVE-2023-48363,0,0,5e7d5894919f37cd1dd75c2b773515b7ef72d87c04d7a333a7cb6b2e76418939,2024-10-18T17:26:54.187000 -CVE-2023-48364,0,0,f4cb198fe14ce590a0791655340d64abac737fb734a030f3045e088d076947ae,2024-10-18T17:26:22.937000 +CVE-2023-48364,0,1,f73a0b82e85c7e3826a56400a13449ef03c686f92a39b6f6eddfa46add7aad7c,2024-10-18T17:26:22.937000 CVE-2023-48365,0,0,08ac0336d1b7c8130bf42658d4f4f8599137b51618c91dfe4765b7deedb1fc3a,2023-11-29T20:43:54.133000 CVE-2023-48368,0,0,14fc972e365681825e25968bdbe284b3728808e51453cd80c5c505a8e3ca41c3,2024-07-03T01:42:20.450000 CVE-2023-48369,0,0,fb4821cbffd4fdd6238c01ffc944749b9b86986102171f62f2538d2be65e0aa3,2023-12-01T21:37:48.153000 @@ -237808,7 +237808,7 @@ CVE-2023-50351,0,0,8b5e0ddbf8f02b84d512f227e1927e5797e4a7a06ad179af091819fe71ae8 CVE-2023-50355,0,0,938f2ab87a0409f74b1e1e988e7900a8bfd53b99cec45f16a83ed1ec5b29543a,2024-10-31T15:18:27.160000 CVE-2023-50356,0,0,afc5a7e88cb3a2a29820a92eb33919ca114eed7ff54c11165c52a68496c27451,2024-02-15T11:15:09.127000 CVE-2023-50357,0,0,c49fba6a6b8ae43153115bdc180d0a50fda6badb9bd287f826717a708c649d3b,2024-02-15T11:15:09.717000 -CVE-2023-50358,0,0,affeae249fec946895d3bef4063e720c758024b3343a9b8cb10accf20047afe3,2024-02-15T06:15:45.960000 +CVE-2023-50358,0,1,71b4d354d62612f2f84bb3d20530f3679a64f0b441262892299a9b567bd5382b,2024-02-15T06:15:45.960000 CVE-2023-50359,0,0,017df15c1e36b7a4da9c2a548d3a19bcce6cc2270ecdf18aa860e29b8b47570d,2024-02-06T20:18:14.547000 CVE-2023-5036,0,0,142ff7c8f9f78ca5371b9c6802e1971802347d9f04e927ee76b2acbd83ef8ec5,2023-09-19T13:18:54.193000 CVE-2023-50360,0,0,27634f79a715ec48d12d4c3552f14cf2df45a967ec21f459defca999b97ed253,2024-09-28T23:44:50.720000 @@ -238314,7 +238314,7 @@ CVE-2023-51367,0,0,13b08a852d09d8daf57b0e20f60b8fc85ad6b982827c91530f85477131fd5 CVE-2023-51368,0,0,1f0ffb08dd881989ff3b55d03503deb5ea351f39f777f97943993d6ba81a24b0,2024-09-11T13:33:30.853000 CVE-2023-51369,0,0,8f265df3d4e40621d656fb0071a5c62084dc6119e0f3ed735a9b7c50f66b4c96,2024-03-15T16:26:49.320000 CVE-2023-5137,0,0,f4d50157363ee87d922395d6d0725c0ab84d476da7eb0900b229c1c7873d5b05,2023-12-07T20:19:29.557000 -CVE-2023-51370,0,0,6e6b5b56007c8db394c24055b9b02396fb8c72cbeed1cbdd563182be18b17f4c,2024-10-10T12:46:36.377000 +CVE-2023-51370,0,1,c8d5ed6d4a45852d1e96da90dff53395457d035d65a5bfdd5297d31722e1bd3e,2024-10-10T12:46:36.377000 CVE-2023-51371,0,0,6fc6cfff5efd510bfe565bfd71837dcd3a396b9cdaa4c11f70c269e7153fae75,2024-01-05T04:52:43.767000 CVE-2023-51372,0,0,f1acbf37f7ee8dc789954d63180d2a87833e0abc434fd9bb8ceb7f3fa8ae236e,2024-01-05T04:53:29.053000 CVE-2023-51373,0,0,b699256bffda18b48a2fa9c65a0d974a60f132fc74dac2aabf14ed3ac782bb13,2024-01-05T04:53:36.090000 @@ -238844,8 +238844,8 @@ CVE-2023-52040,0,0,762939d11515580f100465151a16fe161b0f305136b11d8c988a24ca3b912 CVE-2023-52041,0,0,d822171150327a12062651891084a07154ed2e15efb3b51e285b66f24f49d7e8,2024-01-19T20:39:37.587000 CVE-2023-52042,0,0,d63c4bc544afb86a58bb15680099cbb76d2fb1c561f2e9993a893dae4d480107,2024-08-30T19:35:04.953000 CVE-2023-52043,0,0,2598b3da2f921eccbd3a41321ff24953e0fd67e0dc8e0987c81c7b871cbfaaa7,2024-09-06T17:35:03.427000 -CVE-2023-52044,0,0,85572b1128b12e136809ed883e801031beb0a62607fa23de9cbf67ed856a3295,2024-11-01T16:35:05.760000 -CVE-2023-52045,0,0,6a31d1842391f4f2ebe474ae0c882e8830b22e30f0ba518a951b0f4011892ee0,2024-11-01T18:35:02.070000 +CVE-2023-52044,0,1,c2842a63033a28821b1404a591be3ee5a98337c82519ac7ab4593becbcd6fa47,2024-11-01T16:35:05.760000 +CVE-2023-52045,0,1,a99fdb6ed6dd53c3612ae102f376c0cb095563f1131d545b86adf7bf3070821a,2024-11-01T18:35:02.070000 CVE-2023-52046,0,0,9b8f5c0f61db55c891d556798c9c9da378945fb25af6cd3feea31d7ec4cb7ccf,2024-02-13T16:05:49.580000 CVE-2023-52047,0,0,0a58a1c6d75330480a1c8c9c493c63f296c64ed482e86c7d753ecc6c013c567f,2024-08-13T20:35:05.050000 CVE-2023-52048,0,0,e51406b0a7e0f54ab5f0d8fcca043edf25903f6ec066c183786088e2dc13a5e3,2024-02-29T13:49:47.277000 @@ -241249,7 +241249,7 @@ CVE-2023-7017,0,0,aa895f7622a9e9487e48d598147c82444bd79284c2bfbb4573f1fd908bd954 CVE-2023-7018,0,0,9438a9ef02cb6b14eeff26492e18c6b4314ac91317f5ba8b28b4a172250c35b2,2023-12-30T03:13:12.367000 CVE-2023-7019,0,0,25421d5b7b02bc2542949247708020c3ce3a00d66a261d8b3c79bad4af5b1cd1,2024-01-17T22:28:36.323000 CVE-2023-7020,0,0,7d3304d8f230cb46404a5f4e0c7dfc242c13c646702476b3fd55147c8232dd5a,2024-05-17T02:34:03.503000 -CVE-2023-7021,0,0,1aa4841dd8e7700a4fdf5d1d59133fd43a28e10ca0acc2da658113bd1089fcfd,2024-05-17T02:34:03.620000 +CVE-2023-7021,0,1,13f7e7ae86ecabec5f0c158c684f80931d3cf647fc713fc4c7429a7b8cd243d5,2024-05-17T02:34:03.620000 CVE-2023-7022,0,0,a5bf663ae888760c3945c3e7e6b7c7f3902b4cf3082a95e3b34bee19baa2faee,2024-05-17T02:34:03.727000 CVE-2023-7023,0,0,a1983a52849971321c6d6bcd51bf7e3e4f9582599a9e202abb2fdee6a0ee2bcd,2024-05-17T02:34:03.827000 CVE-2023-7024,0,0,0b0d6e2cd8a55b4494cdd2b77e9f647f33c47f79573c34c6c5e8c28805a72b2e,2024-06-10T16:24:22.793000 @@ -241577,8 +241577,8 @@ CVE-2024-0101,0,0,6c543091c34f4a748deb2ce2cce2816a258ea3dcb0e0560ed0bed55e86ee09 CVE-2024-0102,0,0,aac583927adc7db5e6a95a28a1f19367ab609db53a34bc65219a25c1bce42b64,2024-09-16T19:37:37.487000 CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf05,2024-06-17T12:43:31.090000 CVE-2024-0104,0,0,ea7f385fc9a8d99548e260cd2bb85f1591e8d85d5187529e2ca94577bba79fd1,2024-09-11T17:40:35.430000 -CVE-2024-0105,0,0,cce9e2f103bec09a2d31121c0f1d48e620d7a6c8f6113fa3cf5900488ee9f9f4,2024-11-01T12:57:03.417000 -CVE-2024-0106,0,0,f8c44d268dd9e8e1e9deec634292fcea0dcd1ecc62e186568f74c2f8dc08695a,2024-11-01T12:57:03.417000 +CVE-2024-0105,0,1,e0f94104567de95aefe3b52dfea4c70520ff634cf47362e41589a4997df66e4a,2024-11-01T12:57:03.417000 +CVE-2024-0106,0,1,12c200d3ba0fa56ed8d1459900d7141773a5b06295a04966f394870abdc49ca8,2024-11-01T12:57:03.417000 CVE-2024-0107,0,0,825deb4e82dfaf0b98f1fe2772df92223b06ae0e932511c6a748f272f8b997c9,2024-09-17T12:10:22.063000 CVE-2024-0108,0,0,66f975a41bb5f0143618b7229f9a8d90fdad314725e86f6c633b765a762e46f3,2024-09-16T19:27:19.833000 CVE-2024-0109,0,0,e71ce20ade0f58519f6e876bddeb521bd39d5584f365e91fb0be43461eeae6aa,2024-09-18T15:18:06.117000 @@ -241586,7 +241586,7 @@ CVE-2024-0110,0,0,9d3ea028d3dde672136c07e8d052ddc3ffee906b5f050cc97127e00fa31f77 CVE-2024-0111,0,0,745fe4fa8ac2297a871814d16ec0cf5bf56a98c3501448d82308b7dc75a74f20,2024-09-18T15:22:14.727000 CVE-2024-0113,0,0,30ea5d78769c707d77ab5e88a1087a3bf4be86e316909498095d743b94b19e08,2024-09-11T17:34:37.667000 CVE-2024-0115,0,0,90525cb6d1df6f268f81b58c98763d2a78ce3017a9779cdc04eec9f2dd2bca4d,2024-09-11T17:24:27.393000 -CVE-2024-0116,0,0,a6cbe3db55579100922047f237b056c0420ed7fe26ca2d3a7e613c461d344341,2024-10-04T13:51:25.567000 +CVE-2024-0116,0,1,2d10fec59332399ff83463e0097f1df31f61c75866201d4562570e4cacf5b02f,2024-10-04T13:51:25.567000 CVE-2024-0117,0,0,ed903d9eab72e014428187668cdac0700efad53cb2a86b1e7f1ccfaa16e20c09,2024-10-28T13:58:09.230000 CVE-2024-0118,0,0,52f256ce70cdacf4f4a6ce0c982fc6d1b28d0ae1d97a8e1fbd2b9b453c221077,2024-10-28T13:58:09.230000 CVE-2024-0119,0,0,016d848834e212013377651138e9d68c5705bb0be2ffa2f07e178776813350ba,2024-10-28T13:58:09.230000 @@ -242435,8 +242435,8 @@ CVE-2024-10078,0,0,2a32e11049e01066fde7387ca375ea057ecc9dffb9aee4dba521fe1d1cadf CVE-2024-10079,0,0,373e7888db951070e423ef6d1503b855c013868b3575c214d882cd52c4cf0816,2024-10-22T16:27:54.577000 CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000 CVE-2024-10080,0,0,e70a3cc8d8ca25d9e3db818c04f9b2eeee833bf342884de7579048a734fce30e,2024-10-22T16:27:38.840000 -CVE-2024-10081,0,0,02bb4630f1bd07592e1673b83167b1b74439f6fef64e9edeb4466adb088e4166,2024-11-06T18:17:17.287000 -CVE-2024-10082,0,0,1353fffccefb1e0d8d603c4a74d221b2e582bea5f6338afcbdcf09cc3484503a,2024-11-06T18:17:17.287000 +CVE-2024-10081,0,1,14217bd03615dbdc848c24f804f725719f4cb401721050cee242b46b725d8ca4,2024-11-06T18:17:17.287000 +CVE-2024-10082,0,1,a77f85c14be3d21b6122c3eab7274725cbb6ca09e82633e000b635d4c833ac76,2024-11-06T18:17:17.287000 CVE-2024-10084,0,0,6c35f4b944eae2a74d6ccb26affd7a86ccbe9f319e73f030b2b1f9dd7533693e,2024-11-06T18:17:17.287000 CVE-2024-10086,0,0,bb0c9c733730fbcd6f0c59463025ead649d9d15215867cba1a9fa60c54710618,2024-11-08T15:49:52.087000 CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e3b,2024-05-17T02:35:09.780000 @@ -242454,7 +242454,7 @@ CVE-2024-10112,0,0,3a01d2baa33f19e143abe5aabe181ccab32faac99effca8d7325142fe7220 CVE-2024-10114,0,0,16b8947ff2e570aff6db4fc1326409cd8691db8a310b773c04315751bc454909,2024-11-07T17:04:09.203000 CVE-2024-10115,0,0,2f48f8fc2fb64e7eea0f8a197e6ea039f4addb791184326175f5bf3196ca43c6,2024-10-18T19:15:13.600000 CVE-2024-10117,0,0,7266808fb250241ee6ed4b7bcd7ffe295a81bef2421c05c5f9197e6a33b75e8d,2024-10-28T13:58:09.230000 -CVE-2024-10118,0,0,20c350d413130c355373caed8d6cb5911ff957b85489cebdf58c361a0299d81f,2024-10-18T12:52:33.507000 +CVE-2024-10118,0,1,1b15206221b8f64585272a12ccd987439e0446dcad9b58c5df824babeaf00a21,2024-10-18T12:52:33.507000 CVE-2024-10119,0,0,49edb44a36719c29f8ad406ee8678c1d6a57c817986d9e175ffebf1849d7239a,2024-11-01T18:40:58.367000 CVE-2024-1012,0,0,261f4dda24c2aefd44892a1e7cff84e275a6853943a2bba059238594bb202f50,2024-05-17T02:35:10.090000 CVE-2024-10120,0,0,877872300e701fe4a1efb68fcccda192535f4ea8d014c4745e6d765239ef8603,2024-10-30T20:20:46.010000 @@ -242505,7 +242505,7 @@ CVE-2024-10173,0,0,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef CVE-2024-10176,0,0,142987a8f419783b163ba6354525e6bb8e3054620537017112986773c0d037e4,2024-10-25T12:56:07.750000 CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000 CVE-2024-10180,0,0,eeda8a52eb376af37ac54d80ec17aa95c78c556dda331af160350bff0915b632,2024-10-25T12:56:07.750000 -CVE-2024-10181,0,0,e508d85fb29127dc9615d55a59c4f686aa113b77b39ab8d7dcfaa4fd4cd2c82b,2024-10-29T14:34:04.427000 +CVE-2024-10181,0,1,1545b5e92aab580204c085811e002ea8b0b09666646d30a334a87ed0d4fa275c,2024-10-29T14:34:04.427000 CVE-2024-10183,0,0,120f83031d6b056b9464662cc23a397a8370d5b6b85b4ebf16896e12042e7ae6,2024-10-23T15:12:34.673000 CVE-2024-10184,0,0,82e323cdb696d7fc911e7053501b005fcd00bb282537fcf739cadb894187d0e9,2024-10-29T14:34:04.427000 CVE-2024-10185,0,0,ca6dfd9088b0219f97894c0990b4ec594d404f7f2fe7b73023fa5dc239e3eb40,2024-10-29T14:34:04.427000 @@ -242538,7 +242538,7 @@ CVE-2024-10229,0,0,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca5 CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000 CVE-2024-10230,0,0,5b2eed7a3522d994daba36d504e121d06d38d6b2f8f6bed6dcdcf2e92eeba1bb,2024-10-31T08:35:03.010000 CVE-2024-10231,0,0,eb0443e51721212742591278ce3f179ecbfdd0bb144d3d1886157523275588e9,2024-10-25T17:01:55.633000 -CVE-2024-10232,0,0,d054c4d1183fe7691dd9a4e63b1aec9db3ebb5d59eabdf67dbc07306ca037c57,2024-11-01T12:57:03.417000 +CVE-2024-10232,0,1,98e97f86e77c9008185f9ff2c9f54dab5146c7a71a0b7823df9bcfdfb1c8892d,2024-11-01T12:57:03.417000 CVE-2024-10233,0,0,ae75a6902cbd361dba7f0db59261b7e58fb8ced87e17031187e0bfd405b07086,2024-10-29T14:34:04.427000 CVE-2024-10234,0,0,29441fe4cd8bfbe6b6cb2ad55d7c2d2c9161b1369f9e713c11aec1dfec3e0850,2024-10-30T18:50:59.883000 CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000 @@ -242613,7 +242613,7 @@ CVE-2024-10355,0,0,2602c2076153349e7adf5f2683fe39bdc0cb3abdcbf15a26de13daaf9ad9d CVE-2024-10357,0,0,c001d8d64b65c4e55da5d7861409d0c563d6d1b141b88d9a7700fd93b48c7a3c,2024-10-28T13:58:09.230000 CVE-2024-1036,0,0,aa65a53beadc56e4dda3efe9acb5802f242935c19973e66e0ff7f62d01b276fd,2024-05-17T02:35:12.357000 CVE-2024-10360,0,0,3576dc079f058e2dd67b489fd947e85df4509a4862ebce17e71112c47cb76c6c,2024-10-29T14:34:04.427000 -CVE-2024-10367,0,0,f94e0205b3e2911f09f101b8fd32b52728d2ea656c27463b12aaaae3408f1e01,2024-11-01T12:57:03.417000 +CVE-2024-10367,0,1,547b3c1385167e643f44f204c281f5898850caa0e5c0b7e1f18c8aec4af5d4c6,2024-11-01T12:57:03.417000 CVE-2024-10368,0,0,c8e0d6969c93ffe96acf5e0ee7b5c26394eeb4c801dc04ebad8a62cf1ce3fd82,2024-10-30T16:46:30.783000 CVE-2024-10369,0,0,5a59dc320150c27565cde3d9105528beaf16a536e1981e9f54165bf31963ac02,2024-10-30T16:50:32.567000 CVE-2024-1037,0,0,dc80ea945a1c7339fa73e61584161c3f0eb5c7e682984c3146b230e695ed7de9,2024-02-14T19:09:45.253000 @@ -242630,7 +242630,7 @@ CVE-2024-10380,0,0,251c7695ebdffe14f2a561bb3be22f7946019d2ec5c5cf9081e853969f103 CVE-2024-10381,0,0,63addd0f8191b1c4cfb4d8f0e97d60f16153f091ecece1db9c0d0bcf5f8350fa,2024-10-28T13:58:09.230000 CVE-2024-10386,0,0,92094aeb70b25026044a453c13f522af4eb391b2229044481dc021518acdc439,2024-11-05T20:07:59.487000 CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332018,2024-11-05T20:05:55.323000 -CVE-2024-10389,0,0,7f50d02831ec0c7210e3e958315c008e60e035592678e929be937e615de9b81c,2024-11-04T18:50:05.607000 +CVE-2024-10389,0,1,5c3e383a622dd2c962c1328ad97e7119997516337f3c204f5e02dea9bf077b56,2024-11-04T18:50:05.607000 CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000 CVE-2024-10392,0,0,6e1e37299a52c0d29351f7b918b5ce63e7a851a7204714ad635a0d36b7f4f628,2024-11-01T12:57:03.417000 CVE-2024-10399,0,0,3874273dcd61d00780364abd4b80bff26291db4f2fcc766c950b26117fafe39a,2024-11-01T12:57:03.417000 @@ -242660,8 +242660,8 @@ CVE-2024-10424,0,0,0082f2c9329da5c28dc61d90822e77e972ce57e5080d3ba52361d4d460b44 CVE-2024-10425,0,0,8adfa31fd985d4bc27743db745ec868540b0820dcf6294ef53f1f23cb0898627,2024-10-29T13:14:31.863000 CVE-2024-10426,0,0,5ad177c0aa589104250414c1a9e7a84c375bf9be397449c0145d8fd6bc1c23f4,2024-10-30T18:16:03.617000 CVE-2024-10427,0,0,993865614f672d9f73abb587f40fb0798131c7167c970fe2a7009412d84b464c,2024-10-30T18:21:48.327000 -CVE-2024-10428,0,0,da4ce94fc5734b784cd3dc14f57a304ad2272c949dac6a2208ebece092333393,2024-10-28T13:58:09.230000 -CVE-2024-10429,0,0,f4e1ec2360cded360300a57b36833fea93401789c82301c0be7d9ae66b51ac51,2024-10-28T13:58:09.230000 +CVE-2024-10428,0,1,953ccf731ef66068e88e2cab2fdcf52b68ed1f1042aec47f52d4675c0139b4d3,2024-10-28T13:58:09.230000 +CVE-2024-10429,0,1,80161aaec8ae1dec81fb5852d14d27da2abcb47aa1bb9342f64d90ddb87c996f,2024-10-28T13:58:09.230000 CVE-2024-1043,0,0,413776c522ad3bf5006fcc461919529b065f700723f9f41e7759ea485749a4c3,2024-02-29T13:49:29.390000 CVE-2024-10430,0,0,9c27f96e65330f12f06f69b793b04930685373858718245ee6072afa271bb3e9,2024-10-30T18:48:43.473000 CVE-2024-10431,0,0,767c9cfd95147af4cb155f3df94b6fb3e42f7cfb738998eb48c8c9953386c8f2,2024-10-30T18:10:49.883000 @@ -242681,8 +242681,8 @@ CVE-2024-10448,0,0,321c290fa10bd947d8b384a53dafbe5d4ff4b7a0a6522b833253529007c67 CVE-2024-10449,0,0,8607f328e6ad15d8ca267c31a328033a0fcda88d731c3cb315537e91214fb44b,2024-10-31T12:47:08.810000 CVE-2024-10450,0,0,173344ccdd09f6157ee138e9e87d5e1e2468de9e6dcf03f6fb5d2387fc884b09,2024-10-29T14:34:50.257000 CVE-2024-10452,0,0,ed604eafa80afc4a63191e6b23b310319c51a3ea5f05d4778d6940fe709d8eb6,2024-11-08T17:59:10.977000 -CVE-2024-10454,0,0,52aabb7e4033c13d6c0cbb6c18bbcbf12ecd563307e135d1c792e1d8c4be1291,2024-11-01T12:57:03.417000 -CVE-2024-10455,0,0,9f18b197c1829a5ecbaa5a69cd0dd4162e3d6f6c6818ccd45083d33b92cd8ac7,2024-10-29T14:34:50.257000 +CVE-2024-10454,0,1,dd0e74f9d392ab946c7b6f7aeffd7ff784877230499478461cce6257457d6098,2024-11-01T12:57:03.417000 +CVE-2024-10455,0,1,4708a4e95039fa6be7a40adf8b8a4cb22b291f3f8a6eb1cc86d44045eb8e8342,2024-10-29T14:34:50.257000 CVE-2024-10456,0,0,4a9ecb31f2661ae18403e7eb3623dabef12268f04b4de73b98309d52aed70779,2024-11-01T12:57:03.417000 CVE-2024-10458,0,0,74ca3b5ff0d83b1a9172f91e6aeac1c2c334f5a37d9d050a2b4a8dbda73ae0a5,2024-10-31T18:35:04.080000 CVE-2024-10459,0,0,41e5d3d1c5717bfbf938efdb318a0912b0d67ff5e837610ea3b33ef2a35c4dbe,2024-10-31T18:35:04.883000 @@ -242726,7 +242726,7 @@ CVE-2024-10526,0,0,0fa46d8ccf5c219359a0535980da66887fa2b5cd7efbd75d68b15fd2b882e CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000 CVE-2024-10535,0,0,14a566633b856f0bcfd07185d246772590c919ba8cb5a244786d38adaffa8830,2024-11-08T21:19:27.540000 CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000 -CVE-2024-10540,0,0,1885d17d6b705045d75944e7bfd00755cc43fa534a9308c6cf91207b99518e74,2024-11-04T13:18:27.017000 +CVE-2024-10540,0,1,d72994b8ce256d6087bbd8c05a3cb9446a5f50c733a3ad70b615c2d8dd4c3c0c,2024-11-04T13:18:27.017000 CVE-2024-10543,0,0,78e6de226aa4ccb5cb5b260268ce156b234621147350989dafddd9817bf9323e,2024-11-08T21:19:02.700000 CVE-2024-10544,0,0,d84fa7aeaabdc2cfe5861efef74c5b30022ed51487865228c56366868169c4d7,2024-11-01T12:57:03.417000 CVE-2024-10546,0,0,fe7c4bb80388357d2012de9abcf9bdb2510a4d8644b958f5e63299c9a417e4c8,2024-11-01T12:57:03.417000 @@ -242738,14 +242738,14 @@ CVE-2024-10559,0,0,f02de87419b06f79046e87a4e20909e93937f86137fa0aad3ef812234236a CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000 CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000 CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000 -CVE-2024-10573,0,0,3b6082d7ce34ca05df1b3b4c94e7ffded318d61beedf6254adcd998de3bb698a,2024-11-01T12:57:03.417000 +CVE-2024-10573,0,1,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000 CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000 CVE-2024-10586,0,0,4d6520bd1c85d54279217ed01b0f9632afaae4b997de3b4135c6f012b1448377,2024-11-09T03:15:04.940000 CVE-2024-10588,0,0,34f43523478fa177a22f3a91e9410e634e0ee30af99b181178f91eb4e90c0a0d,2024-11-09T03:15:05.210000 CVE-2024-10589,0,0,439df34c8c00a8dd47d21707d56d1cd2053ad38b3ba48b5ebc30ce5b8b7c231d,2024-11-09T08:15:03.910000 CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000 CVE-2024-10594,0,0,015abb205f2a621c92b02e8c535085d082f03901ef52c99004ce024df21aac90,2024-11-05T17:05:10.533000 -CVE-2024-10595,0,0,713412cb3481e40d2727869bbf69e43a9603569843cd3c3208811998499997f6,2024-11-01T20:57:26.027000 +CVE-2024-10595,0,1,d179e6b790ca43e523540de6b39a763d6d0e5ba29d81ee639fa2f43517880b37,2024-11-01T20:57:26.027000 CVE-2024-10596,0,0,e577a1bc49113e32decc51f28cd54bd130c95b97448380193826560332b3fbe2,2024-11-05T16:20:13.623000 CVE-2024-10597,0,0,586f7e6419aca9573421f10f5561b525da7bb97b4cb4d10c23f61ebdf726d862,2024-11-06T16:28:48.520000 CVE-2024-10598,0,0,660edc51f4fc2fa9935095811accaae31a6c26005b25bae3073af9a24ccefd47,2024-11-04T19:44:05.513000 @@ -242768,8 +242768,8 @@ CVE-2024-10616,0,0,94f55ed4bd0faf50e0891f64e2b5ea20ec640d29892974759f9c3551daa23 CVE-2024-10617,0,0,48b23a1a9f67b2d6b1e5c5b67deed264e7e8de26c1992ee93609edc3bcb03f73,2024-11-04T16:44:40.280000 CVE-2024-10618,0,0,93149fe02b452b3955b6d6ea5aee1a2a6f14d11cfd7cac8e8631e7490dd201ad,2024-11-04T15:11:29.697000 CVE-2024-10619,0,0,a69d9e7a25ac11fb3b1ab17e7ce2294adef4cd488803cb21c60293a84d322259,2024-11-04T15:11:44.627000 -CVE-2024-1062,0,0,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f85b,2024-10-10T14:22:28.617000 -CVE-2024-10620,0,0,724abc136e85c83fb378f9f08553f42597c7003f31982d5ab3f2f979a65abde0,2024-11-01T12:57:03.417000 +CVE-2024-1062,0,1,53c2a4b70765879dede7c2b012e736d65206f674e39d16fefc7ae9d1f40809b4,2024-10-10T14:22:28.617000 +CVE-2024-10620,0,1,4dd83ed220196cf5b3c219f5184483daa552d936ba95729fb226d3ff120308e1,2024-11-01T12:57:03.417000 CVE-2024-10621,0,0,be1e03a4177ce290a2933b649deef1a5a206c547833b9b659dec2fc68dba2fee,2024-11-08T19:01:03.880000 CVE-2024-10625,0,0,ac9f0284f5366764c9df01038411c49f3c63b154d35cb37a59a194bc59a8311d,2024-11-09T04:15:03.393000 CVE-2024-10626,0,0,6d58889cc1776c251fcff5acafd40468c012021cde62e83a4f58b9ed3fa5d589,2024-11-09T04:15:03.747000 @@ -242779,9 +242779,9 @@ CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec5 CVE-2024-10640,0,0,a9e3d9a3ce710c425ce59b20e7e4410457c782cd914e20dac6b7d92fec114068,2024-11-09T12:15:17.460000 CVE-2024-10647,0,0,d9ba6608fa541fc383d43441f89db693ddba6534bf6884ce75536f94bd98d4ae,2024-11-08T21:20:50.847000 CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000 -CVE-2024-10651,0,0,4020d234a4dc20eeefa40d62db04df21d3fc130e9d8122bd0290808c2b4b15c0,2024-11-01T12:57:03.417000 -CVE-2024-10652,0,0,e78eb78c66337c771ed734884436ae7db011d1841627efa41acd490150897405,2024-11-01T12:57:03.417000 -CVE-2024-10653,0,0,1b2d26feb706600b9c41b1333f6a03988902fcf9ecda5a5dffeb928661e3db01,2024-11-04T07:15:03.743000 +CVE-2024-10651,0,1,27e099c503dc290e7aac94cd4c1c6b71240bd597597b5702eaef779ee4808c6c,2024-11-01T12:57:03.417000 +CVE-2024-10652,0,1,fd88ae5af497c82622713cdc01c4e1520725e77bf69e17817b277fa38e3f3aef,2024-11-01T12:57:03.417000 +CVE-2024-10653,0,1,c0d6ec216ec495c541cb62fd571b99d2ddaea1cfcf4f1e6abad2fce080485112,2024-11-04T07:15:03.743000 CVE-2024-10654,0,0,3c3d86b25c4e4fce7f35177184960c29ab2f4ed9ae30cd26cffab608365c3cce,2024-11-05T07:15:13.730000 CVE-2024-10655,0,0,4a39173efe85c13de7825496903f8eabd930fb258764390bce3ef665db358080,2024-11-04T19:47:40.207000 CVE-2024-10656,0,0,18b5e609f97649677e5109dc16530200dc01ab85577b2f860b138b1af32e903c,2024-11-04T19:47:22.733000 @@ -242805,8 +242805,8 @@ CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5 CVE-2024-10688,0,0,b87010fae9ede3dbc09789e0772582c4276000ac6cb27b14936b5c62cabc817d,2024-11-09T07:15:05.720000 CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000 CVE-2024-10693,0,0,0d972d4fb67fabef178798fca42d506d87be385cb4dc04f7a4ba35154ff77347,2024-11-09T04:15:04.943000 -CVE-2024-10697,0,0,c210e0a7c96b4c6551ebb9dd7b279713876560210bbe9f32a7466490c29614ea,2024-11-04T14:18:20.337000 -CVE-2024-10698,0,0,c6fff0a917aa28b4221d1a4fc53f59759c6661844fad58814502b8ae26d0a5a8,2024-11-04T14:20:58.853000 +CVE-2024-10697,0,1,5ee797b1e2524fad720ed5d33aa07ee55b1575ecedb30200e209173b28d177f2,2024-11-04T14:18:20.337000 +CVE-2024-10698,0,1,a92f2679f791986edabfcd01d7de3581b39e330ef0fdfebb28883ec3d8b768c2,2024-11-04T14:20:58.853000 CVE-2024-10699,0,0,34f3ee81b53049f9113d5634ca7220c0a13ff33a1cbb6ebcca291fb5d022be13,2024-11-05T20:15:56.417000 CVE-2024-1070,0,0,945eeccf4f5ba232f5b58cbe0a0fb277520149997c332f988c0ef3d652aa0c5c,2024-02-29T13:49:29.390000 CVE-2024-10700,0,0,31233b8d64f3c9c8e4fb3c67b64a1725548271e95821d774cfaec82689cc694a,2024-11-05T20:15:39.427000 @@ -242874,8 +242874,8 @@ CVE-2024-10810,0,0,24dc4cb4af16bbf52a3428afcf948782067630e0ddcd0604e4c08419e6e83 CVE-2024-10814,0,0,44af1a778ed4507983588c6ec64d19fcb1dbff2b0871b8ede73f85e842303d30,2024-11-09T05:15:08.533000 CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000 CVE-2024-10824,0,0,6eb650dcc5948040831c411456d27fae52cd783d32ad30faaf04938565b810b8,2024-11-08T19:01:03.880000 -CVE-2024-10826,0,0,e7caea17df9e50303e84eb12f606f4531bb8bb9449a87b4576ba355c7a719f34,2024-11-06T18:17:17.287000 -CVE-2024-10827,0,0,c533f4c70607df301dc68c381588fa8b3325a3d893bbcbb9a6092f250e2c41fa,2024-11-06T18:17:17.287000 +CVE-2024-10826,0,1,6aa37fdb16b5853a7b5472e25a8ac0220ff66e617581e203df39439d12ed70ca,2024-11-06T18:17:17.287000 +CVE-2024-10827,0,1,6577ad366fcac00efbf959f7905ba60a1d9c696b896b68d8b10d38d71dfd5e3b,2024-11-06T18:17:17.287000 CVE-2024-1083,0,0,f65354685ac9d5e6ec0c7d89ef33fa98a96cad0e23da0316206039cbd9c94fda,2024-03-13T18:16:18.563000 CVE-2024-10837,0,0,3839d7b67701f0472781da38593edcf1ecea3aba141955aa03c60ab7658fd081,2024-11-09T13:15:04.737000 CVE-2024-10839,0,0,959999d7d9e7ad6c83b2a659b5f94ea06306dfe2c58a8ebc0b6485e885f4cafa,2024-11-08T19:01:03.880000 @@ -242899,7 +242899,7 @@ CVE-2024-10915,0,0,b06bfc4427bf3f30a98b7ce390941759d780f67755e284354baa2af5087ff CVE-2024-10916,0,0,bc544f9bd284df1d2cb2c93c5b72a85d457acf8720f73da6b50b8a164264f036,2024-11-08T20:11:37.567000 CVE-2024-10919,0,0,e8fbb923eb829e965254205b876d7ef672d5aac59877ea419609aa8d8f6bb3e9,2024-11-08T21:07:58.383000 CVE-2024-1092,0,0,4e514cbeb8cbdb0016fe4cb374f3dffe448e95b35a82b13ed7cb7be1b7fe61c2,2024-02-13T19:43:06.247000 -CVE-2024-10920,0,0,2a084f5df50e8d62344f7fb5574910af35d9b3838be955d3bbcc07e777ed2e3c,2024-11-06T18:17:17.287000 +CVE-2024-10920,0,1,2cf9a2b6fa319444c301d4d5e50d2260546d202b9ce9ceed0622f3257443827f,2024-11-06T18:17:17.287000 CVE-2024-10922,0,0,2e8ad1bbe2c22b2f860e82caba9eca723e865a4e9bffae87682e3cfa53e59e0d,2024-11-08T19:01:25.633000 CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976123,2024-11-08T19:01:25.633000 CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000 @@ -242988,10 +242988,10 @@ CVE-2024-1151,0,0,4bd96d45d8577f9810851348ab4eeb008c26399957744dd5c6d2cb4a43cb17 CVE-2024-1153,0,0,ef044a07a9d08d9e4b985a54be5b7192d28514cd606cdbcd1ece01d4ab3f4a43,2024-09-16T17:39:45.023000 CVE-2024-1155,0,0,d758d36f3a75477090d9513d8ce1d0fb91b0226929e863bd461e737f3d8138d1,2024-02-20T19:50:53.960000 CVE-2024-1156,0,0,d72992d03594c16afadbf16a64f145c65aa8548416754605a40b83a0941682ae,2024-02-20T19:50:53.960000 -CVE-2024-1157,0,0,001990078fff7096490bf70ba6c297a0b4693b99849d8bff3e34fde8c569a855,2024-10-09T15:20:50.540000 +CVE-2024-1157,0,1,b2a4c38395c259edc9de63be3363f457cdfc3ed23febeb4ceb3c18d34f71a1ae,2024-10-09T15:20:50.540000 CVE-2024-1158,0,0,3f0844fda5c657ec14fc878f4ca458f05346302835336ebfa8e7bba85b29f7d9,2024-03-13T18:16:18.563000 CVE-2024-1159,0,0,6093cf6c5c8fc4abf001ccc0f4d05ab0de1f6859d26926dcd40937cbf24b911d,2024-10-09T13:22:23.253000 -CVE-2024-1160,0,0,895b8a1484864a7446dc0dad2cc1b1d7457042a73872ab53e023b0e471ba9cb5,2024-10-09T13:30:12.563000 +CVE-2024-1160,0,1,085b82908f6b87beff38b7f8c7254bbc834479faa1a73be56bbaab017ffb8dfc,2024-10-09T13:30:12.563000 CVE-2024-1161,0,0,17300377fb9940d2e98cf1b56279a3b48a0607eeac56262a31a73cab7a59f6ad,2024-06-06T13:57:52.483000 CVE-2024-1162,0,0,6517ec14e6db831ee5a33abab5e0e4729a77c306548683589462e3183aa8cdb4,2024-02-08T14:22:37.180000 CVE-2024-1163,0,0,23d47391c7884329270abc739e0d42e17852ac69017fc11ff4fa38853ad7cf71,2024-11-03T19:15:04.143000 @@ -243077,7 +243077,7 @@ CVE-2024-1246,0,0,bae361ec2199c296e9eb42286d004d4ea449bda022dc81bc8d1a618b1ea77a CVE-2024-1247,0,0,ad13c4508cd2b9ad59f5a34066c1d77babbded3f93134b8023e8816a14672d55,2024-02-15T04:44:09.247000 CVE-2024-1249,0,0,c029d8648930e597dad5091ea499bf6ac8603cb50190f00c5c96eef7c5351442,2024-06-24T06:15:11.003000 CVE-2024-1250,0,0,293f809aa95735f78043efd04f7d9c3bae3b92df67c9d1211343a1641b0bd852,2024-10-03T07:15:28.840000 -CVE-2024-1251,0,0,c093c0742b0dadf39d8ff30a3af96ecd32edffdb5665c14f85ddb41cec96cb37,2024-05-17T02:35:20.240000 +CVE-2024-1251,0,1,02444a905e7ac567521cbc70f8cd52719ab7e89bbed99104ac13abd3809457eb,2024-05-17T02:35:20.240000 CVE-2024-1252,0,0,894946f7990f4b0d4e8e729f5c80d578ede8a5cc89cb1b0207337463cfc1bdd9,2024-05-17T02:35:20.353000 CVE-2024-1253,0,0,8bfba5c3cfc6068acc522bb62466a7737c255c501465d1f15c6bd989e3bc9e98,2024-05-17T02:35:20.460000 CVE-2024-1254,0,0,8fc3880011dc06df70485eea9b53ac787059b8ad5152ad593338b8eb17e21998,2024-05-17T02:35:20.567000 @@ -243886,27 +243886,27 @@ CVE-2024-20100,0,0,6232a5e349fb938dfde44a6272036d8fcab6eb82e3b395e905d1ef444c94e CVE-2024-20101,0,0,4ab31b8617124baf5a584f677af857db4f34ad707839e76bd0c5af95515b24c2,2024-10-07T19:36:43.247000 CVE-2024-20102,0,0,3cb6582406cbe14406fe81e42fc867d6348c8d6360f05e88e94b0e4d501c8f03,2024-10-10T18:20:31.820000 CVE-2024-20103,0,0,db42d95d798d4c29343c261aa8a039b0877035c0ce319208cb5d6e304467accf,2024-10-07T19:36:43.530000 -CVE-2024-20104,0,0,0eb0f6cec63790bfe271dccde21717eef40ef09e4c0ada0a9bf3281e03a25b78,2024-11-04T18:50:05.607000 -CVE-2024-20106,0,0,e802badf719ee91193f39dabfeacc6f7402cce3fb9882581725eeb664eb99531,2024-11-04T18:50:05.607000 -CVE-2024-20107,0,0,ea573850b5f7813350717c222c9395da828f3387988dd71fe57f2afa8cfb7bd2,2024-11-04T18:50:05.607000 -CVE-2024-20108,0,0,51ff38ef9a8e206454f1a52cdc9dd02a8ef9e6b5f51f357d4ca22814a544ffd1,2024-11-04T18:50:05.607000 -CVE-2024-20109,0,0,329be716d8c17779a789d6c54f4067532328a67503ee51f1f4b82135d7e12d0a,2024-11-04T18:50:05.607000 +CVE-2024-20104,0,1,cf0dd4bafca682bb21769e10e729a2702b4ae0f3b5c865f2e2f97d30db2fb433,2024-11-04T18:50:05.607000 +CVE-2024-20106,0,1,6d2cdb5795feebdc249e86da695a8f1abda81e228293f51a13c7a523b51d72ea,2024-11-04T18:50:05.607000 +CVE-2024-20107,0,1,e6ac0169357452ba0b64b141dab6c63eb27e53b5879a1d1f77dd6e817c85f1f0,2024-11-04T18:50:05.607000 +CVE-2024-20108,0,1,dd8beaaf8fcf6d650eb5bef3069795fb706c3ff859201d21c2f27c1b6a6632b0,2024-11-04T18:50:05.607000 +CVE-2024-20109,0,1,a16d4561da14ce07e4b63e8115c46c058ebb187895fa774ba3746ba3fd6ca12d,2024-11-04T18:50:05.607000 CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000 -CVE-2024-20110,0,0,d13a75bdef54b371678ab968b24e1cb1378ea02b8b1a291a79a5da9527360805,2024-11-04T18:50:05.607000 -CVE-2024-20111,0,0,3844afaec43e3f605de336de14e66397c560619827b4d232056aa90853fd8817,2024-11-04T18:50:05.607000 -CVE-2024-20112,0,0,aec8632268d53801bf3178030c0292363106fc55fd291b0c2de72254739cc579,2024-11-04T18:50:05.607000 -CVE-2024-20113,0,0,4b3e3a28a486c5a45ce9574225e84f39bc329878375ecc2f9f9de82a6e46dcff,2024-11-04T18:50:05.607000 -CVE-2024-20114,0,0,3efe24a62aeea3fc8b2e884ea31ac9448dfa0f4522a596328d0e0fce067bbef2,2024-11-05T19:58:15.577000 -CVE-2024-20115,0,0,c210a51884bef6a1021f758530f4f2a5de02bc2b0a43406dea8d3ae0d73674a7,2024-11-04T18:50:05.607000 -CVE-2024-20117,0,0,7c37e16d78d22bbe6f6d816bf60aa223bf61c98fcf370ee47f184ded8c807678,2024-11-04T18:50:05.607000 -CVE-2024-20118,0,0,de415887ee6c076f946c02490cb02f573f7494398e53c6bece76bed9a2427926,2024-11-04T18:50:05.607000 -CVE-2024-20119,0,0,8a55961b12bffbd749551c2a476d60889049504d4a0fed2b30ad593cc3811eea,2024-11-04T18:50:05.607000 +CVE-2024-20110,0,1,1f4ebd5ef139d788b8ff4433fca999fde538896316def5652da73b98f7bc3c6a,2024-11-04T18:50:05.607000 +CVE-2024-20111,0,1,ef1a309e2d7f2a994a7b91597b8970a0b9ca4cb8230c19859a1a002cde22fc04,2024-11-04T18:50:05.607000 +CVE-2024-20112,0,1,f1fecda0bbefb7976a2e5c2d965f45756c3c554b6bb2aece34ce5311395c4e55,2024-11-04T18:50:05.607000 +CVE-2024-20113,0,1,1e9f0bb5dd8b46cb9c193f293f4e7e65c1c4f4218a8b5da37a81aedf61132d39,2024-11-04T18:50:05.607000 +CVE-2024-20114,0,1,972dbefe1dd7e2ec5c449b6a55d8a48edf191f12736d3b5ac984afdda696c6ff,2024-11-05T19:58:15.577000 +CVE-2024-20115,0,1,e0fbbff01a0fa518c41d64f625797efefd6cdce39d74e0c13995ea3dfe394456,2024-11-04T18:50:05.607000 +CVE-2024-20117,0,1,6baac420d96eb73610546cd262e04d3589f97187f02f3401eb7616db3fa8d745,2024-11-04T18:50:05.607000 +CVE-2024-20118,0,1,f196c02d943f7181a2b543f340de54479a6ac9433fa46d02a1108eafa392e84d,2024-11-04T18:50:05.607000 +CVE-2024-20119,0,1,b9d1b34a5ac7be8b5a9ce604f28b7c94e37c0f79b74ec7f206945e209ae81009,2024-11-04T18:50:05.607000 CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000 -CVE-2024-20120,0,0,abdf5fe0d9826449777afa803e667b5ff503d4bb09586c1271d9e77a7810a3dd,2024-11-04T18:50:05.607000 -CVE-2024-20121,0,0,64ee137ec6d4da89e8765ec85d8ed9256cab3d56dc912845aa26341810bbd9fc,2024-11-04T18:50:05.607000 +CVE-2024-20120,0,1,5b679d5c9552836088db4bbe8d851f78e987164ac45cdb9237f51ad023406112,2024-11-04T18:50:05.607000 +CVE-2024-20121,0,1,4938115c914642adef5ea2985a500e819409d2c7aa3a5388330765c060ef6754,2024-11-04T18:50:05.607000 CVE-2024-20122,0,0,744b016dd77bf1d3925336cb7504cc81d1bda83c1655bf764225b09f6b0227e4,2024-11-05T08:35:19.593000 -CVE-2024-20123,0,0,a6fa45d61f9a55f13ce8b7b5374adc77483c99447c1733b2f283a6b6bfd3450c,2024-11-04T18:50:05.607000 -CVE-2024-20124,0,0,f0fd554760cd299dfc56b4ac50a1e92ea4b3de134a0428b7867adeb4defad70e,2024-11-04T18:50:05.607000 +CVE-2024-20123,0,1,bdf62a4af5c1c1ed58a1e235ea3a69d58e2afa0181d5f68baf40f699c0511aac,2024-11-04T18:50:05.607000 +CVE-2024-20124,0,1,1799547edf556e9de06685a9fcdc4c8ef9057ff40c9829ccf5d3b3aa46605f16,2024-11-04T18:50:05.607000 CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000 CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000 CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000 @@ -244048,9 +244048,9 @@ CVE-2024-20367,0,0,0d59cd325b5448a23ac62ba4d011225bdec20c6d4a20e9044f14a66801d96 CVE-2024-20368,0,0,11ba77e6ca928b43fcf33bd9b64c67655ca382b15bfec85a328bbca787a43cf3,2024-04-03T17:24:18.150000 CVE-2024-20369,0,0,e23910e4adf6ac7fe444b246c85eb12e2e56e7b12054f1339b9256c8ec4ec112,2024-05-15T18:35:11.453000 CVE-2024-20370,0,0,9c8d802e115773847851e6a87a7c6331398027635ff6abdb8c313a21d8306cc9,2024-10-25T12:56:36.827000 -CVE-2024-20371,0,0,f7251c015fa79c9d7d243427b41ccc67f0c799dd1ba47a0c8956938a3685f62c,2024-11-06T18:17:17.287000 +CVE-2024-20371,0,1,5b763c21f0dad7933d07cd6f6f6dc5ca9ec50c488ae19c36eb22a1fb95a945ae,2024-11-06T18:17:17.287000 CVE-2024-20372,0,0,feaf3b98a24bdcf61707d881e5427a56c3f9e9ebde0774029fc1bd7580a0df31,2024-11-05T16:04:41.993000 -CVE-2024-20374,0,0,638aea96f5a8f2793180f79bfbc09147af2cc1875a0c35f4bdc3fa0fc97f0c14,2024-10-25T12:56:36.827000 +CVE-2024-20374,0,1,e0c9fc3f494f29ebf625a888aaf98651649c668b7d5475f4297a0435038e214e,2024-10-25T12:56:36.827000 CVE-2024-20375,0,0,a4ae364a987d406a5046b71b718fe2e5ce4da208cd9db67ac24eb19997b1276b,2024-08-21T17:24:59.627000 CVE-2024-20376,0,0,616e740c2ab9d6be811f96c68e43db8bad88fc7cef9833f2acf95234fb3cc478,2024-05-01T19:50:25.633000 CVE-2024-20377,0,0,be952c7ea7a0531389d372ba68887da6c7789ca96d45ca408e42f93ea391da94,2024-11-01T17:30:14.350000 @@ -244097,7 +244097,7 @@ CVE-2024-20414,0,0,18adcabc3ea83c021e3e42e80805abb0da254bdf76c23740c5471d9c9fa12 CVE-2024-20415,0,0,877e94faab6d2266c2faaa313bee5ba7676639f7c6928a7d38493bfe98132d17,2024-10-31T19:17:54.273000 CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000 CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000 -CVE-2024-20418,0,0,8554e8735b42833c9e69f407f99e9fca8c7a15d7b058a2209f0efe8e333cdf1c,2024-11-06T18:17:17.287000 +CVE-2024-20418,0,1,f7db38ceaa7c5ae5faffa2b8f315d4b44d2d75c27432cae3a97a883ad82d6efb,2024-11-06T18:17:17.287000 CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000 CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000 CVE-2024-20420,0,0,bf5b2e28728b393dc4c68ac30d4f5934f5f4c3a252f289a6ace4b087b2c80ce0,2024-10-31T14:35:05.980000 @@ -244122,7 +244122,7 @@ CVE-2024-20441,0,0,d55f8099b608b8adfd1a6d0d43acd3f45d687b76b8525513869a95df6ac3c CVE-2024-20442,0,0,805aefb18c510621a81c52eaa48c4a81152e7d64b4a9afb06dafc5cccb2f219c,2024-10-07T20:11:48.687000 CVE-2024-20443,0,0,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000 CVE-2024-20444,0,0,a12fb2570a5698911d0cc6e07bb095dabf95fbf72a3c4e45b591e21f1703dac8,2024-10-08T15:26:38.527000 -CVE-2024-20445,0,0,f698b1f5f5f92fa31b51c02a4a24e272a198b648b861319cc1020d6804265773,2024-11-06T18:17:17.287000 +CVE-2024-20445,0,1,06ed49c1153408705127351aed7b4e1dcaa554f2eae73c96ac1fed3cb66a4d0a,2024-11-06T18:17:17.287000 CVE-2024-20446,0,0,e9357eb0aa4f61946fea3c9e67283cca574773e1e525326f07a38ede4840249f,2024-08-29T13:25:27.537000 CVE-2024-20448,0,0,565fdf482c77d5556490294526189aac22203bda3136e1e644d46324e48508c6,2024-10-08T15:25:47.053000 CVE-2024-20449,0,0,316480c4331efb1b0699079802002acf63f93477d88f4712b7f6bca9f927ba75,2024-10-08T15:33:29.210000 @@ -244132,7 +244132,7 @@ CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53b CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f75e5,2024-08-23T18:13:47.510000 CVE-2024-20455,0,0,0eab0e0d21dc4342feafbdcb7840d45bd73b5886ce73a3d40c40f5d3f5d5114a,2024-10-24T19:47:49.750000 CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 -CVE-2024-20457,0,0,44b4e7457c5e3eb4faf4a234e69906a47c5c6fd5679e00398bf4bfdce3c9182b,2024-11-06T18:17:17.287000 +CVE-2024-20457,0,1,0648a00bf0ec25a81dd25fc0dcccb43d45d4f377e4e692b3f26324b776a36765,2024-11-06T18:17:17.287000 CVE-2024-20458,0,0,7fb1e55e612ee6c8cc09ba5c55e99526661fa33e17c363c55add3406c5a053f4,2024-10-22T18:03:09.777000 CVE-2024-20459,0,0,5cd54a48218e6b57b046cb69743cb297e897ffabcfc93cde2b5b5db91e60d9df,2024-10-22T18:06:48.333000 CVE-2024-20460,0,0,1680f4feb024550f85cfbc4af79437ce465cc993fb1f24de2a76ac8f316389ea,2024-10-31T14:35:07.573000 @@ -244143,7 +244143,7 @@ CVE-2024-20464,0,0,f24579468ebdb84e5fe9b1671318293b6d5b473cae484edf3392abda0d117 CVE-2024-20465,0,0,58c61302cfd8374a2de79b49d5aac585902b54820b0fbcf82d9f704341c07483,2024-10-24T19:46:15.007000 CVE-2024-20466,0,0,d0329ee630c2b2a6ce426800fea8982bf585a45fc72abad0a547b583e87462bd,2024-10-31T14:35:09.360000 CVE-2024-20467,0,0,c1af58980ccad99499fcb95639264b5a0614f69936f5a7ffc5edb35f8fbf6c29,2024-10-03T20:09:50.970000 -CVE-2024-20469,0,0,394110c2afcd5812c9d147805c76bc56d743563b5c07576e0d27ad32427aafe0,2024-09-20T16:58:14.327000 +CVE-2024-20469,0,1,b9971d55e656fcc395e246fd73197c0a60d153f4d9e5665b0650956ba8decc51,2024-09-20T16:58:14.327000 CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 CVE-2024-20470,0,0,f40c5f3d443e730674f42085e42ea8d2de51e3f4830b15dca54c9f67812afae9,2024-10-09T16:55:23.887000 CVE-2024-20471,0,0,ba403b13a094d810ef4a6de5fa69f66459f450072398cfaff33ef019f3455bc2,2024-11-01T18:16:35.227000 @@ -244151,7 +244151,7 @@ CVE-2024-20472,0,0,528b72f3e675c671bcc155955345e40804d792fc1b7521db35acf6a179fc6 CVE-2024-20473,0,0,5ef4807597fe5f900b04e5d005ca94a4800c4e9c9e7b53afbf025fd1374f1a09,2024-11-01T18:09:35.813000 CVE-2024-20474,0,0,810ef346e3194cf6f907da41410620e853cd9a901344bc18179275f363afe6c6,2024-11-01T18:14:56.790000 CVE-2024-20475,0,0,3f291467cc737decf2fac9adb4dea13bddd59923e910f2a0d4abb07dc30557b9,2024-10-03T17:49:17.797000 -CVE-2024-20476,0,0,ec888cc0402f94d8a7068bc8fc574dd4cc5e7fb37d811ee6dbe894f77891cf20,2024-11-06T18:17:17.287000 +CVE-2024-20476,0,1,ccf5fa7575f966c2e5994aee41dc64a657d6319e92e6c5d1d412c5f6118d4868,2024-11-06T18:17:17.287000 CVE-2024-20477,0,0,546baafd3f9cb181a62a5bf8f2d6a935693c1d9566bac043856053043d6e851c,2024-10-08T16:00:30.167000 CVE-2024-20478,0,0,7159d6f0353997233b844f180b9acaa4a22410a663dfe8445f14235dd4611029,2024-08-29T13:25:27.537000 CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000 @@ -244160,10 +244160,10 @@ CVE-2024-20480,0,0,1929c3dc705e1e48392e67050891180fdb659aa9ab6d1d255c10d5b0e58c7 CVE-2024-20481,0,0,767ae1c0f6a7066da50f07948c514a10ef87b2b329ab72db1baf3efae941c3eb,2024-10-29T17:47:44.083000 CVE-2024-20482,0,0,39fabe22066d4edd345c69477b6bf9c7a8eabc0b196d3e7b7cf7589c1a519042,2024-11-01T19:49:21.493000 CVE-2024-20483,0,0,7bbf4d5b1e3697b5bad7f81531333e630361007007985921b04d8f51e2bedc77,2024-10-03T01:44:17.827000 -CVE-2024-20484,0,0,e77577dbb2df65a85cfa5d177121893af0c70cf5a44d88b590a9450fffeb3252,2024-11-06T18:17:17.287000 +CVE-2024-20484,0,1,03b2c371d378f0d5ceaa33e13ed3cf984c86f8f5dfd835faf34b332925a9f395,2024-11-06T18:17:17.287000 CVE-2024-20485,0,0,5c9cf5bc0a34e04e4f600a44d27d5c4447132843175c261a9064b9d236bc0028,2024-11-01T19:50:11.107000 CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000 -CVE-2024-20487,0,0,5d105c186c0511a8fbb7462c76d5e26b4b0e38ad622f579048fba4f4636a1e86,2024-11-06T18:17:17.287000 +CVE-2024-20487,0,1,cc4b580ddb2e562d397674ea06559d67caceb88b706e040433a79d7c0fc275b0,2024-11-06T18:17:17.287000 CVE-2024-20488,0,0,b3c319abc05ee7d52fc498f08ba4c2d91fe7b6f1527a7957b5c4a113170ee559,2024-09-06T17:18:11.813000 CVE-2024-20489,0,0,d68cce5506ad42f67e500e952ef8846db91b43a7e51bd083fc776681145c15d8,2024-10-03T01:40:11.637000 CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000 @@ -244182,19 +244182,19 @@ CVE-2024-20500,0,0,18d63ed549bd4b7192e6c6df79ac972fe597dc59b5724f10b9411d9013e65 CVE-2024-20501,0,0,9b36cf8076d19f9cac9b6d21a8fd8d36733d3f9e22e985de521e4b0062887c7c,2024-10-08T18:28:51.753000 CVE-2024-20502,0,0,571c0a1b63e5c4f466f480825d57e0f49b71734cd1ce5842562738b67cc11255,2024-10-08T18:46:38.437000 CVE-2024-20503,0,0,e85721e4e1cede24d93f2a47467ca55ab63c155dde7e0c41a923091bcc7e874a,2024-09-13T19:24:37.420000 -CVE-2024-20504,0,0,86aa79ce7b404716d99a870970404f9aa62af0456894b1d366eda5f315b95661,2024-11-06T18:17:17.287000 +CVE-2024-20504,0,1,51d652ad61445af9411851f612f6b4502a0a11f17ae6ca06c1c21a5c9496624e,2024-11-06T18:17:17.287000 CVE-2024-20505,0,0,3cc28c634084a10df250df318d1f65f6c920a21d5650beb89eb991b35e09151f,2024-09-12T17:28:47.010000 CVE-2024-20506,0,0,b3839959ba904d7db54237791da3f84bfa0eea3b79a536a06b85b587186e3413,2024-09-12T17:26:37.643000 -CVE-2024-20507,0,0,296cc58e6fa4f77e5d58b986cc3093edf65ffbbbb779781b38c28a0e199f2d8a,2024-11-06T18:17:17.287000 +CVE-2024-20507,0,1,ab065278780469a5ddb8ada93f32807d87313584114addc83c594bcb351c2de6,2024-11-06T18:17:17.287000 CVE-2024-20508,0,0,0768ac64a8260ad45d8462ad7e41dbfa97c47e8f324d81868ad4103c1f94fdd9,2024-10-03T14:43:23.810000 CVE-2024-20509,0,0,5f3f949e87da33ae8e05af8dd043b1b8c4558497e54d60a20d025b6437380c68,2024-10-08T18:45:52.513000 CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000 CVE-2024-20510,0,0,6fbdd0fde11e7a17f48951ee8a4206d5b5c8d1dcebb95035b098d9f8dc980dca,2024-10-03T14:52:22.627000 -CVE-2024-20511,0,0,2e050831add3e16fa2be1449a7b64ae30c44a7d9aa509ad0013cb1f9b80c40e0,2024-11-06T18:17:17.287000 +CVE-2024-20511,0,1,8610456b5736159da62f13356929a6c85cd46e57ae4ec6c8bc159b8f0be10faa,2024-11-06T18:17:17.287000 CVE-2024-20512,0,0,32d210efc259ab5a4a0ffbd125c9a1d01fe465030a671f22a6529c28c3c31d4f,2024-10-18T12:53:04.627000 CVE-2024-20513,0,0,59340ca02e9ac8b2ce467c4f6ba3d60a9250b41442bd8318c0745e7df94f4acd,2024-10-08T21:16:54.820000 -CVE-2024-20514,0,0,7007e1b0cf182bb4695a9ca4218edb4a0b6c2ee1653ecda1228d3bdbcd4136f2,2024-11-06T18:17:17.287000 -CVE-2024-20515,0,0,a97b9b776cc799ee1ad03753f84b5adbde8d922a71a988fa6a481a074da42b1e,2024-10-08T16:11:23.440000 +CVE-2024-20514,0,1,e9b5d465c618f00a182b89bfc803a2d59d7dcc6a3e18634b06803e49efd69117,2024-11-06T18:17:17.287000 +CVE-2024-20515,0,1,d5302a30a4decf72ae71e801d0626e50dd996bcf7f53abcd1c1e0f3953997c3b,2024-10-08T16:11:23.440000 CVE-2024-20516,0,0,38173375d3e97a2ca4a3ada633aa8363dffa90658c88f70a1b4706a56888fef7,2024-10-08T13:44:10.840000 CVE-2024-20517,0,0,e16ec70f044330107de46d11fc56880c1e349bbc113ae734e245e91f648488a8,2024-10-08T13:47:52.483000 CVE-2024-20518,0,0,8e8380063b7bae86a06b52e48e7b616d3efda15d98a84f667c17186639d1ad43,2024-10-08T13:50:14.730000 @@ -244205,23 +244205,23 @@ CVE-2024-20521,0,0,1256f22cccdc014ca7c6dcaf50cda0cfa20b26ee2ae968d316f808a9bafa0 CVE-2024-20522,0,0,4751fc0b46eb3f3442a4302d9aa0da06e525e7320f0f9f33ce2b1091dde97b23,2024-10-08T13:48:19.060000 CVE-2024-20523,0,0,c7bf45998c89086dd758eb4d3eeb25d63406d90c0a145566280d2888a4fab120,2024-10-08T13:48:29.500000 CVE-2024-20524,0,0,1ddae342fccf4faf6880cbe25cc035c1903428edec9e63909e1d89933e06b31e,2024-10-08T13:48:58.273000 -CVE-2024-20525,0,0,c2a0dd06c4506d4603e425d2a7d21eafef99e197e9a0b2db6259e843e1cca6ad,2024-11-06T18:17:17.287000 +CVE-2024-20525,0,1,569ab15ba2fce3ad477aade622bc1ad19f87d2ff2737862dcb05ba2ff4915cfd,2024-11-06T18:17:17.287000 CVE-2024-20526,0,0,d5fdba07e116955c599b0e877c602ebb6ff11ffa39621c07ebd427a3890514dc,2024-10-31T01:08:26.047000 -CVE-2024-20527,0,0,7a21a0e10bb4a9041d4526c7f7316d7ad10fbc3c5e75b8422c2e62f0336c0608,2024-11-06T18:17:17.287000 -CVE-2024-20528,0,0,feea343663cfd0deaa3316143f11c5ffa04761b9f686af213a719a8822a5c467,2024-11-06T18:17:17.287000 -CVE-2024-20529,0,0,8a4a0f3a3023fd4512fa4a28ed7e5d6f615843cdf41243db46e7557658cff118,2024-11-06T18:17:17.287000 +CVE-2024-20527,0,1,5b97cad145233ee1321aefca8fa73ee586d624b90987cf4c6ada4d285abb361e,2024-11-06T18:17:17.287000 +CVE-2024-20528,0,1,b3c3f841fc75125a5205a35ff3690af41e74ca1d30b8dfbe0ccd5e301de276b1,2024-11-06T18:17:17.287000 +CVE-2024-20529,0,1,96076969e5241dc9fe05d14b6dc343ccece848b95762ec4c7d4c240c2fed43ff,2024-11-06T18:17:17.287000 CVE-2024-2053,0,0,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000 -CVE-2024-20530,0,0,7c9646f24c62d54ccf03c82187b6a87770657dd6b000827b7e72ececf1471b10,2024-11-06T18:17:17.287000 -CVE-2024-20531,0,0,723e0c23d02f9f3e0050077c138946d891cb15b20bc9c86ffac9ad5f2eadce1c,2024-11-06T18:17:17.287000 -CVE-2024-20532,0,0,be342e3ff68be849f4d1baefcaaa598c9771c7d7b53fb3ffc1f61ed44ea9b89c,2024-11-06T18:17:17.287000 -CVE-2024-20533,0,0,baaba7262fe1e661bdb92db6e175afe049daf61c214cfe3502b79e881824a0d5,2024-11-06T18:17:17.287000 -CVE-2024-20534,0,0,192aa3c4a2d69352d402cf728070d6a163b3a46dd1c219466c4479b268ee3e1d,2024-11-06T18:17:17.287000 -CVE-2024-20536,0,0,93d71667b63bbf2ca04dae2ef39cb23b3d0792444c57d2d491559da9ab61293b,2024-11-06T18:17:17.287000 -CVE-2024-20537,0,0,3e764b19183672785bcd6a1364d67fb269a85543171b7edc8249850eacf04888,2024-11-06T18:17:17.287000 -CVE-2024-20538,0,0,7f80303f6cba98d48ba00b7277cad0549444ba24766011cd8a4c9b961827be71,2024-11-06T18:17:17.287000 -CVE-2024-20539,0,0,0b9d8c4b97de633b5e90d45bcedbe086483cf12614aa1a35220be14aacce4a11,2024-11-06T18:17:17.287000 +CVE-2024-20530,0,1,ce91c12c1b86c44918a9066ecb5a6e14b54b70dcc76a6a0affa2ddbf5651429d,2024-11-06T18:17:17.287000 +CVE-2024-20531,0,1,6c47548426c85d1bdb50569a12a60b6cfceaa285b2a5d2165ec17eda1f431f0c,2024-11-06T18:17:17.287000 +CVE-2024-20532,0,1,c5e3b86428a883a005ddfeab54408d38b0aa49969c41244793809439d0629a98,2024-11-06T18:17:17.287000 +CVE-2024-20533,0,1,2d986cd55ad911e02b6bda820adc74cdaa2d545d64c7c4f647bb7a6457b580de,2024-11-06T18:17:17.287000 +CVE-2024-20534,0,1,4f609adec9e97ecff790786fa44ffb0444b615de359923a987bca63ffbcafec7,2024-11-06T18:17:17.287000 +CVE-2024-20536,0,1,92a69429348f505a2f19cddc24c074862025ce005e80fdfc6c493e8025ca7175,2024-11-06T18:17:17.287000 +CVE-2024-20537,0,1,8eb54de049a25db81afc091e04bd2d7999434d41275b165cf1444fcf31d57296,2024-11-06T18:17:17.287000 +CVE-2024-20538,0,1,d3ec081680e8110d616ef631755f3861235961769fb7ab4a001026017157c8a8,2024-11-06T18:17:17.287000 +CVE-2024-20539,0,1,6e27ce1f08f4699f40ff9b4c4b8e67f82d60924ed0624143d18142d08e653aec,2024-11-06T18:17:17.287000 CVE-2024-2054,0,0,5af7272a2140be959232b9c889b5facdacd3c4cf8342e14293010d7ec8d01b60,2024-08-05T20:35:09.723000 -CVE-2024-20540,0,0,efa9a20fada26cf282c7de3b10a2db59432834ebb21c905e50af63eb12d2f227,2024-11-06T18:17:17.287000 +CVE-2024-20540,0,1,a0c0570bee7ec580676398059fb604cec9f30d8b31bae7978e74a064fbdb94ec,2024-11-06T18:17:17.287000 CVE-2024-2055,0,0,07b933beaff1c6c6636c1d85ffcd111ff83285195075526678d7cb747831ae01,2024-08-26T16:35:08.047000 CVE-2024-2056,0,0,2a38346454eb98b80a7eb163969274208e164120f1a109d344c6cace07c18d78,2024-08-23T21:35:04.537000 CVE-2024-2057,0,0,0c49b54a58bbfae398bea92bd4d174b8750b0b7b8229721504febd8a399d51de,2024-05-17T02:38:00.550000 @@ -245087,7 +245087,7 @@ CVE-2024-21483,0,0,ddfb5ce914fa1ff56560fa86379b92a602e5ea04b740e3571ddfa8961d666 CVE-2024-21484,0,0,170e730118f02f10a6e5229db7c5eef4d192db3745e0e44dbc53ab2277157f67,2024-03-06T14:15:47.533000 CVE-2024-21485,0,0,5dac3ea1a637c42101b33e62955da26f7c5ea3ebfcf697d6c5d1918b66c865e0,2024-03-06T14:15:47.760000 CVE-2024-21488,0,0,83c39f70c0498b72911f550d6611f69059c8c9cdf3b0f0904578cd793bad095a,2024-02-08T13:15:09.700000 -CVE-2024-21489,0,0,6e86fec7408d381a4d3031befda9d6c352fa47e8cee94c50201daa0dfff4032f,2024-10-04T13:51:25.567000 +CVE-2024-21489,0,1,1a93dad9018029060119f73b7d19b469e0b7fce768b8d0a11621c573bef6cb28,2024-10-04T13:51:25.567000 CVE-2024-2149,0,0,63aa7f0d2a03697c39fae7a40d96338e0e86a5e57c9276eb9e14dee434e327b9,2024-05-17T02:38:04.480000 CVE-2024-21490,0,0,8fef65cf0f770a0e61ceff38aa6805ccb146d3ccd992f46918345da0115fd835,2024-10-10T13:51:02.213000 CVE-2024-21491,0,0,8b3f805634bd0202a6da1c84d9cc592601351153f9b1f8af4e7e32c9715d19c2,2024-10-16T13:25:47.870000 @@ -245111,7 +245111,7 @@ CVE-2024-21507,0,0,8947ae846b77ababc3f73b93eb86705240bc1e66f68d9ab3cc4c15c2d2f15 CVE-2024-21508,0,0,91d3f4fd811265c7ae6cfbde19cc50f2a3032a6b0f431ed4f4fe4fe4037296ca,2024-04-11T12:47:44.137000 CVE-2024-21509,0,0,c5c0f08bda5d62b0c47ab11da03ee29bc34441dcd1d184acfac375982cd1fb7e,2024-08-22T13:35:00.907000 CVE-2024-2151,0,0,567e14a5be97fe288f7c22c1f514dc3379a49ed0781c50046999a25212abd777,2024-05-17T02:38:04.663000 -CVE-2024-21510,0,0,030774c6387756b7cea57499c8fa85a4e1117a3d0d74d12dc671486452c38e6f,2024-11-01T12:57:03.417000 +CVE-2024-21510,0,1,62f733de1ca9d62bff906ed9984a444f0907d70d38f9042d497521730a3361af,2024-11-01T12:57:03.417000 CVE-2024-21511,0,0,034219c7f11132d003e7f8ae540b3244138c125a352f628cb71b799c63f5d2cc,2024-04-23T12:52:09.397000 CVE-2024-21512,0,0,9cbfb13f3fd71c5173001386cf9b3561f71a4fbd60ae5c210558dde9343c193b,2024-06-06T13:15:31.390000 CVE-2024-21513,0,0,2cc4921b2e7cf735a4c6ffcd0f834de9cbd6a82ef6ed4bcebed2a92ed1ba3df5,2024-08-01T13:46:45.590000 @@ -245134,7 +245134,7 @@ CVE-2024-21528,0,0,20243e12426582c16920a0ab3a8036a5493484e122893e1731a0b03945a2d CVE-2024-21529,0,0,664e585ecfec877dc16e4d09f63918fa2af81f0c56860c291a634c3448dac725,2024-09-11T16:26:11.920000 CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849d9,2024-05-17T02:38:04.867000 CVE-2024-21530,0,0,1cd9789884a1ce72dfeb1a860d1947cabd2b932563c54dc2308d1b3820957324,2024-10-04T13:50:43.727000 -CVE-2024-21531,0,0,556b4244c50c270222e18b4d703d3656d63fc81c95a1cab5391fb75a68df3d26,2024-10-04T13:51:25.567000 +CVE-2024-21531,0,1,5cf47c591b7ac812976da2aea07f525fa384780c0c8ea5ef19705c9df1aef524,2024-10-04T13:51:25.567000 CVE-2024-21532,0,0,a24d27f47c5298fab706ab72282873a260fc61d5e510f460d432a2b7b9c38bac,2024-10-10T12:57:21.987000 CVE-2024-21533,0,0,b6d94b5290ee8a666e06ea3154c21a82f3a037332835b4cbc04bf2409f97ee11,2024-10-10T12:57:21.987000 CVE-2024-21534,0,0,3641068338a125cfc76dca395aebd37e2004a05bbcc966c1678ccbc5dcd0ba06,2024-10-20T12:15:02.757000 @@ -245482,7 +245482,7 @@ CVE-2024-22025,0,0,406801ebb77c0f478ae790b105f0ef32ae0e1c63c545379a378b4040163af CVE-2024-22026,0,0,4dc42eff10a0d63d4e6e79a7c42e9e031c3e8b304b1fa21458db78beb14efdf7,2024-05-23T15:17:25.833000 CVE-2024-22027,0,0,3d0c96b5121d14ad5b07896a4ad450229eb856557bf96a12fbaf8cb06d56efe7,2024-01-18T20:02:46.993000 CVE-2024-22028,0,0,7e34c9a53475d80dd7b3a13cb26dcaeaa9e734352ade695587a986ff6e9dab0d,2024-01-22T20:22:47.847000 -CVE-2024-22029,0,0,0bcb039f58eb9f12c07b11d3517bf111026a5b2f37e513a1afd59bbb586fef6a,2024-10-16T16:38:14.557000 +CVE-2024-22029,0,1,1a9b93b8377dd1bb245bb57ffdd1421d09fc29ae0d154ac2a7e08f10cc5c67eb,2024-10-16T16:38:14.557000 CVE-2024-2203,0,0,cca61da8371c28bd3605593db7eee591bd978cef090651cb80384fffb6a3ec59,2024-03-27T12:29:30.307000 CVE-2024-22030,0,0,7649f8df839cdf611109a205f6f81a40cc0f118aa33ecdb05d4f85150a39b6b9,2024-10-16T16:38:14.557000 CVE-2024-22032,0,0,c2c6c9c7bc0fdf424ca78b54ebc4b1d682818afecac9558e9d76eeb541db4116,2024-10-16T16:38:14.557000 @@ -245562,7 +245562,7 @@ CVE-2024-22124,0,0,ae727126e60d9cde8ef5e51668c38a883080195512277d1a80e4217d8781f CVE-2024-22125,0,0,45e3a9c2ec5632f05c6eeeb6aeaaf2c6d04ed3da2f62c2fdc1ffee6c0b199240,2024-01-12T19:42:36.637000 CVE-2024-22126,0,0,d8d1a9364c6ab71905a9fe572b018a67040d0b71e6ce4efc9f545461184f6d37,2024-10-10T15:56:49.207000 CVE-2024-22127,0,0,a93c2036d31e75652d8f4eeafd412b70336432f9ad8255c87f034d5f74373945,2024-09-26T19:15:06.897000 -CVE-2024-22128,0,0,5c2f4f68aec037896792302688929eb45edce1e42bf909e54d29490c2869b86b,2024-10-16T21:30:47.157000 +CVE-2024-22128,0,1,c24930bbcd32f58b7696b366a113fc6382c36a6615fb7c66e560ffe1670898ac,2024-10-16T21:30:47.157000 CVE-2024-22129,0,0,fe1510f76eb95c83d9587c1d8d12faac9a49d36b11a4ee502daade66f08986b0,2024-10-16T21:16:47.470000 CVE-2024-2213,0,0,f67e62c176cc50eea5691c81fd80a750d99ec2626a8cb82c5910f3ff3bb4b956,2024-10-11T15:34:13.917000 CVE-2024-22130,0,0,18f066fc0e68b22fd8abeef456a14a855f6e3ae59162fde48d34b391703764cb,2024-10-16T21:29:12.880000 @@ -246957,10 +246957,10 @@ CVE-2024-24110,0,0,b91e0667b741539acf0bc7d56bc991a8af3faad432f643fce10a70024996d CVE-2024-24112,0,0,e05a2ccd4a40e41b3c6d79bc1f9770cc005c79fa7de82e88e339324b8fc41d91,2024-02-12T17:36:55.950000 CVE-2024-24113,0,0,f7b5b4db5df224f9c2c197ed33da223fb2b18c71499ac4c36636a1bea8905e79,2024-02-15T03:07:46.013000 CVE-2024-24115,0,0,959ac6be43ec58da6f6ede6694d707dcfda2d4bcc05d8a9e959ca4fb89f11460,2024-02-15T16:01:23.457000 -CVE-2024-24116,0,0,5d6d27153b18e38eb00032f23817768e279d10ef41bee1a2219740d5db7f2ffc,2024-10-04T13:50:43.727000 -CVE-2024-24117,0,0,2d10b248c1e27793764d33b55451a8b7892073aa7be5781d64ecd822caf24f75,2024-10-04T13:50:43.727000 +CVE-2024-24116,0,1,a9a95d68bec21b801f39814af20285488e4f18e7ed9b318bb0e1bbcfa25e63a1,2024-10-04T13:50:43.727000 +CVE-2024-24117,0,1,52a9ad5662ca3df7e6a6ed409b1b737efcafeea09d3fc00f0e789249ff51a1d6,2024-10-04T13:50:43.727000 CVE-2024-2412,0,0,11fa9d7139e1164e0979e6f0b56eef9171d0f8f5c5255493e6d6a7a6c9fa3ed8,2024-10-14T07:15:02.793000 -CVE-2024-24122,0,0,088e2aeb4d3917a1b2e3f1f837b20a38954e4a435f2397d89aae32252b8cb826,2024-10-04T13:50:43.727000 +CVE-2024-24122,0,1,a1840b415ecbbf2cddabad5b5ce1a7f57938515a90d5986d589587d411ff01de,2024-10-04T13:50:43.727000 CVE-2024-2413,0,0,bcce963a476349e5182596e9d4a6b2abe57a4b3c6a7908768bff05824ae06fd2,2024-03-13T12:33:51.697000 CVE-2024-24130,0,0,3711a524e7aaabb83e56488f8a369c6a69a909641f1667882c43871af5a9c3a7,2024-07-03T01:48:12.487000 CVE-2024-24131,0,0,8a34d68fbe59589499b97058e1cc5501abd20303216cfd95ea1911115864db68,2024-02-12T14:32:43.777000 @@ -247389,7 +247389,7 @@ CVE-2024-24880,0,0,417f1620a783691d55294b271631d28b4b974c4f2048f45d9f97fd0cbadb6 CVE-2024-24881,0,0,83232d9aad9f81c612eac50a505c74c916726b151a429d494f39905108d0a162,2024-10-09T16:28:32.153000 CVE-2024-24882,0,0,381ab78a9a0af97941fd74c6df8e310e9ebd0e71a36f326d7eada32431ec60f2,2024-05-17T18:36:05.263000 CVE-2024-24883,0,0,da5a0962c7cfdbb418c545bab7733305dd100d1fcb6e77a25a1017edf709a327,2024-04-11T12:47:44.137000 -CVE-2024-24884,0,0,af55aab316537bd504b6b6ea3895403cc0d0c1e7e14595579898db1923b7122d,2024-10-10T14:04:13.600000 +CVE-2024-24884,0,1,ee675021128daf43828b801bf4354085c2c5b9aa3d647741177efc8a9a41c6a6,2024-10-10T14:04:13.600000 CVE-2024-24885,0,0,7a43d600d033d18ff5a631d3c78e01918ca77dcf41ffa14f3f93f7c9b4bb4ad4,2024-08-02T00:15:23.523000 CVE-2024-24886,0,0,07792f7aa43278f631451e24100471b838930227e2960a56c45baad7e36474f5,2024-02-15T05:03:32.117000 CVE-2024-24887,0,0,b91ba2c15170dd37eb83644d09105b152fe9fce4832e88e978eca355fc6a4e64,2024-10-08T16:48:35.663000 @@ -247420,7 +247420,7 @@ CVE-2024-2492,0,0,2a7e9d0078f8f6d5c7b41a8cd7a38292965c10ef2c1b0101ecaacc57a35817 CVE-2024-24920,0,0,61abb1c907d053d7f028d3f747f0092a3b739771fb6fcc1ff65eeec7b87e4a0e,2024-10-03T17:20:18.263000 CVE-2024-24921,0,0,3a6d9d1565d42019ac1b9358626ef1e0fecec7411946ed82b70804210e497c21,2024-10-03T17:21:15.290000 CVE-2024-24922,0,0,bda94a90d640ecd2ba7e34e12527eb389478913d2fdef4a7a40374a4459c29d7,2024-10-03T17:21:29.620000 -CVE-2024-24923,0,0,2914d41786fe2dec7ff522f5f2eb706270f4aedc4780a4e38cc90811caf537b3,2024-10-03T16:39:00.273000 +CVE-2024-24923,0,1,3fd090b87b1fe432f12d67453d04e577f9e482b2e89808c2579bceec3edc18c0,2024-10-03T16:39:00.273000 CVE-2024-24924,0,0,0ded0a4e17e2540ae000f279a251d379404cfd6f06868e1f4d673fd4a0ac484a,2024-10-03T16:33:41.047000 CVE-2024-24925,0,0,cc8cb8a23e7dd73ee9a6766a6472337f9951d5bd5f10e6b3d86cff9f9a8fd3bb,2024-10-03T16:32:47.193000 CVE-2024-24926,0,0,38295bea3bda789c344cd170567452e0ad7a8fd29b84ef3b8c3e070c73711095,2024-10-08T16:32:41.983000 @@ -247879,7 +247879,7 @@ CVE-2024-25618,0,0,521c40d6483be23c844eadaa045ad9d81526af9d0f0bb15136fa0c5a206a3 CVE-2024-25619,0,0,8779b5460540f75c401ccd25f8dbe7701a4130884fad041c3d9ce354daffff0f,2024-02-15T06:23:39.303000 CVE-2024-2562,0,0,19a87309d0aee720c095694c940b1c491bc221c82ab64cac6db44d1a3b485bf7,2024-05-17T02:38:19.323000 CVE-2024-25620,0,0,300c4d5071efb47a78a0fb6f763869e8a3b4f9eb84a3a8b58578d91ae7032adc,2024-02-15T06:23:39.303000 -CVE-2024-25622,0,0,f2a5329af5cd209b4e18843d05ddb38961d1673868f0917f591975c2cbbf9f39,2024-10-15T12:58:51.050000 +CVE-2024-25622,0,1,4958207198bbe12d25d2b9c23a4cd611f0cde9ef679b8e5e520c417c92c218d6,2024-10-15T12:58:51.050000 CVE-2024-25623,0,0,f8aa2dcefcad5cecc7d7e57a874064d3a0b27ee38334e8a58338063ed42280e1,2024-02-20T19:50:53.960000 CVE-2024-25624,0,0,f71711e300e3eaed808809e7a9b2c0205a6a35fe783a8ef447c3f23895a43c9c,2024-04-25T17:24:59.967000 CVE-2024-25625,0,0,aeab25de3fe3426b54f1a4e56db1601e91367a113c3d5e8c5bad9b4b6dbc113e,2024-02-20T19:50:53.960000 @@ -248070,7 +248070,7 @@ CVE-2024-25910,0,0,928d48dc594e744f5fa97c70afcd77c815a0c3c31658eabf2781fdbf263d0 CVE-2024-25911,0,0,f9465290d28dcba85e6fa4f87ecd37cd0b8e17c3025445c3165a61ba0e85426f,2024-04-17T12:48:31.863000 CVE-2024-25912,0,0,9372b7ae5090799ba3301728cf8f4fbb7d0bd389adff9daf4b1e1d1a7bf7cf41,2024-04-11T12:47:44.137000 CVE-2024-25913,0,0,2eca2aef8ac97b5a992d9aa3c1345031dda8501c8ce091779f4e2778ef8c6417,2024-02-26T16:32:25.577000 -CVE-2024-25914,0,0,60b1b3c6a773bff9103aa6fa8644965c2c36b3e0f49444784ec5e0e3fa8c3f55,2024-10-10T15:57:37.980000 +CVE-2024-25914,0,1,c0beeb6e93dbe3c8094690d00e1d17bc04fb770acbaa1625712241ea95573ec1,2024-10-10T15:57:37.980000 CVE-2024-25915,0,0,6af4fccf980af39bb585f399c964cef04631f1cb23395cd472ba3e09ce83a91a,2024-02-23T16:14:43.447000 CVE-2024-25916,0,0,7c2094a0e33d9af2c6dae0b5fb17a51d90fad41de0a9f2cea5d22b783ccd08e6,2024-03-15T16:26:49.320000 CVE-2024-25917,0,0,8f1b78603cfc0f16aac41bf1a9d05d825248337645d9c39cfce4e7524b120c6e,2024-04-25T13:18:13.537000 @@ -249624,7 +249624,7 @@ CVE-2024-27758,0,0,ba2c7d76bfd93e40eb7f7d926c194a5a790033558362c55118c9cf0ef65f7 CVE-2024-2776,0,0,62c920cc6123160df22ca75c69a8df7e03cd4eccbdac81567ba3cd3f226ecbcc,2024-05-17T02:38:29.783000 CVE-2024-27764,0,0,16ee34fde6f52e835f6174856b223e8f8048a1141bc56e5919f75be066bd1b81,2024-08-29T20:36:33.003000 CVE-2024-27765,0,0,946f1ae3b42eeddef53163b64360f4980758030270d5c196b145f2c4061e3615,2024-08-08T16:35:07.573000 -CVE-2024-27766,0,0,f24b56b44cb2d737c1daa5a7d4c1417b2824b6e6c4bdc70a98d9fb6e2a3e7e16,2024-10-21T00:15:12.173000 +CVE-2024-27766,0,1,6fe70ceeb89dc872edad2cd60e122701962c93e83a01f40160ff352f1beb59cb,2024-10-21T00:15:12.173000 CVE-2024-27767,0,0,588021191ffc186f7dafcc065bb8b722083fff47f2715dec13cceb116744ce43,2024-03-18T19:40:00.173000 CVE-2024-27768,0,0,2a172611cfb3cb531839add9d871259e9ae7004ba84244aa574347493f81c01e,2024-03-18T19:40:00.173000 CVE-2024-27769,0,0,40c08942e7bc0a364e2e9393c4316622b03ce4f4c87f0140fc357e25906e47fa,2024-03-18T19:40:00.173000 @@ -249892,7 +249892,7 @@ CVE-2024-28046,0,0,e317050e5191f1a9311172b20af408b0774a96cf976a07961cd105c21cd52 CVE-2024-28048,0,0,427932cc2219e9755e4267ffe9ddd33c638166ca04c44c64b94478c05d38f523,2024-08-07T20:35:15.970000 CVE-2024-2805,0,0,286efc9a19dc11ee0838ec500ba164305f2c14641c0d5856229be06ec762a801,2024-05-17T02:38:30.840000 CVE-2024-28050,0,0,0d145d7886c67ca4edf4d6c71f8ed46211449029687ca634366ee5c88b5e7b1e,2024-09-06T18:38:11.353000 -CVE-2024-28052,0,0,23824ff918729f93aae4f07b62892c5decec42a77b30eb7703772ba303b15955,2024-11-01T12:57:03.417000 +CVE-2024-28052,0,1,78876409d42be92eb5d0bcb3ca6acd61b614ad0125280eea7db4ff4e2bf14e6f,2024-11-01T12:57:03.417000 CVE-2024-28053,0,0,c6161d8eec33d0d4874e655333f8b3d42189dbff5254c952286bcd697b2efc85,2024-03-15T12:53:06.423000 CVE-2024-28054,0,0,42bd8bafc554125a5c189382c84c5d77dd5214fa492ad959b0494172465d0aa0,2024-03-23T03:15:11.510000 CVE-2024-28056,0,0,c35a08b2cbca4e8b19728715e17e817ce4b19045fe6d73162e692c29df0fb231,2024-08-15T19:35:07.857000 @@ -250370,7 +250370,7 @@ CVE-2024-2887,0,0,c42af46d10c700fa850ea04bb590acb930d5f5fd1c428610962643eaa93a7b CVE-2024-28870,0,0,a84ad55a58fed92db4d351523f55fc3cc9d3c726377b9c2c66e3f01e6b89b3d1,2024-04-04T12:48:41.700000 CVE-2024-28871,0,0,f172a75f11a332172da0d351654b3914d8a45025ba4cca839cd83e7266151a93,2024-04-04T16:33:06.610000 CVE-2024-28872,0,0,3fa653e5c53924e4238c671e5dfa807909726d40036a16f47c2e48e10d41c887,2024-07-12T18:48:45.307000 -CVE-2024-28875,0,0,7da07628f5c48f9514546cc237a833c1412975c99c574bef9ff3808f3daa9309,2024-11-01T12:57:03.417000 +CVE-2024-28875,0,1,e646550a1ce30d018d27e9130d87cf1ddf05b0ffb0e0c54a35f4729da890a66f,2024-11-01T12:57:03.417000 CVE-2024-28876,0,0,289ce1f406982ef8800ef1b70fd46d0b9d5b8d9ceadfdb0734ecc8b023d71b98,2024-09-06T18:35:00.337000 CVE-2024-28877,0,0,cc0627e9c2b6ba5f30332865405b5bc76f89994c49e4e390afd92f763c7891d6,2024-06-13T18:36:09.013000 CVE-2024-28878,0,0,d059bd49c00a1fffb41c41d6dd95d1c802f748f752ac96eeef423a76a468b10c,2024-04-15T13:15:51.577000 @@ -250380,7 +250380,7 @@ CVE-2024-28882,0,0,c1fb7fe1ed5bd3e8a38fb634c7592f77c8d6a5edfc3f3375a5b593f79fbe5 CVE-2024-28883,0,0,7608553831e95dbd64a1629b16235d631ce647c64db4d36e5f31f95004223611,2024-05-08T17:05:24.083000 CVE-2024-28886,0,0,c5e838328be71c5eb5c783cfb3d7b29e0393c19c1f2fbf543fbfcbc9ad011077,2024-07-03T01:51:54.130000 CVE-2024-28887,0,0,02788ece8fafa84414db815e90d6fbdcb64e36e799546da1d80bab49ab148ef2,2024-09-12T18:51:49.010000 -CVE-2024-28888,0,0,0ce7c4f34166b44c7b4d23f6df0c163925bca0768a3984a15ef4f99dab43af91,2024-10-08T14:14:55.637000 +CVE-2024-28888,0,1,ae6e6114831c183954a3ca2ab2fd4722d2fcbbd18a0d2ca68d3103846864fbf7,2024-10-08T14:14:55.637000 CVE-2024-28889,0,0,75e96a359aa914e62263deca001066e2c2cef2ce9a8bba57feb8d1aeb144a69f,2024-05-08T17:05:24.083000 CVE-2024-2889,0,0,28ef4975b1d9f79ab7d0703313acc039b0acfd9d3a75a1a425d92dbe5c73a986,2024-03-26T12:55:05.010000 CVE-2024-28890,0,0,75d08f12fbd468307e29dd7cbe4c7c3d5acf11ae18647e40fe18f61a37a2bd23,2024-07-03T01:51:54.973000 @@ -251286,7 +251286,7 @@ CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3 CVE-2024-30140,0,0,b3c4fb8c1d29ea34afb0e390d01039ba8eaac2e7ea5dacc80cc363ebbeaac67d,2024-11-08T19:01:03.880000 CVE-2024-30141,0,0,7677b4b819f540e508dc538e83037a46a64b1797a2f49d99f9df83f8d58e7bda,2024-11-08T19:01:03.880000 CVE-2024-30142,0,0,d7c5a99f96a99459cc95ea19245c72a72fc1658d5ebaf7ed7579722d3c57dc4c,2024-11-08T19:01:03.880000 -CVE-2024-30149,0,0,02591a0af3e62f9a1c0c9302daaa416a46c0618b44514409e84876f271a3c3d5,2024-11-01T12:57:03.417000 +CVE-2024-30149,0,1,0c4bf3227abff6da4e26c614b60d68f5cf638a399df98ecf689c30e63d04c169,2024-11-01T12:57:03.417000 CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000 CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f89d,2024-03-25T01:51:01.223000 CVE-2024-30157,0,0,03c40ae2d6bb5fbe19cdcb81ee9473f77e02194f7cb98d03508973afcb5f65ab,2024-10-25T16:29:11.307000 @@ -252035,8 +252035,8 @@ CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f4 CVE-2024-31145,0,0,e7458273a6fceef9fb559ad713e774e4312c2d3910ffc413a934edb45195e865,2024-09-26T13:32:02.803000 CVE-2024-31146,0,0,b342a247282dd82cf1f52d9b8502d9aab215fbb81ba82cfea4edb5bd4cfeb6ee,2024-09-26T13:32:02.803000 CVE-2024-3115,0,0,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000 -CVE-2024-31151,0,0,acc3a54ea55bc094fc6bb00a4d0b0b39044bd6557aa8a2322f4991b44822958c,2024-11-01T12:57:03.417000 -CVE-2024-31152,0,0,a77f64d9803c52e22529c8797356479ce4dbb054b85ffae31d3c7b54417b111d,2024-11-01T12:57:03.417000 +CVE-2024-31151,0,1,94d3de04ef17b152ec84c327c812d543ef81001796ffac74583bc31f37122a30,2024-11-01T12:57:03.417000 +CVE-2024-31152,0,1,387965231dc34774b4b7e123b4c8d15d4eb7d0495b5023630335517e18099af0,2024-11-01T12:57:03.417000 CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000 CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000 CVE-2024-3116,0,0,9b51187c570a5abfd3b1d9bb042dab999267b982fd372840204c0edfde974aa9,2024-04-23T02:15:48.310000 @@ -253352,7 +253352,7 @@ CVE-2024-32867,0,0,5753d2fa0aea693f0e3bd6a10cde5e73ef612564cad64279a88ae35cadec2 CVE-2024-32868,0,0,2b261352b98ef068e4c3a1dc7bd9890450dc7582cc1875b68d4f6675a70c87c7,2024-04-26T12:58:17.720000 CVE-2024-32869,0,0,69becb8131b51a67986aa1e24b4ccea1d69cd7e659280280f6d26b43d75dfd33,2024-04-24T13:39:42.883000 CVE-2024-3287,0,0,81c3e92cb525adf74a229ae8f4dc096d97ad8021a63134e1a741f1327c99a33a,2024-05-02T18:00:37.360000 -CVE-2024-32870,0,0,6f50b4eea270a89df82ab1282d6914886c6a1cff983ad4bbe482447c12f130da,2024-11-05T16:04:26.053000 +CVE-2024-32870,0,1,756188f83e1ad6536eb6cdae9fd2e15c0d6865e574c827eebedc27f227bb8af3,2024-11-05T16:04:26.053000 CVE-2024-32871,0,0,c0389a284947a3f025a08761a37fdb67fc665da6d219972d0c888cc5d32f0801,2024-06-10T21:07:12.030000 CVE-2024-32872,0,0,dd2fffea9672a216dbcdde4c4a274554beaeb36e5143b921e2a822ba0dc44c31,2024-04-24T17:16:50.397000 CVE-2024-32873,0,0,0ff9ac0dc6e337547d76cd6798c23a9cd2a1d3d981e083768193a558e753694d,2024-10-15T19:22:33.647000 @@ -253426,7 +253426,7 @@ CVE-2024-32940,0,0,b139056212e274cc43b1d8561af3c4d12757c7b4882dc265ebef55266df1f CVE-2024-32943,0,0,fd4b837b9a53617894ef752d7ffb15062de7d93bb7a78599ea7bd4a8fd1edccf,2024-06-21T11:22:01.687000 CVE-2024-32944,0,0,d0ec70387311640eb8535227f7e724b82fb2d27427be3369ff836aae4b979014,2024-10-29T15:35:25.073000 CVE-2024-32945,0,0,9f5b696ff44fb79b838efdedc4008405b04d813372a113ffadf8b85acf95286e,2024-07-16T18:03:50.067000 -CVE-2024-32946,0,0,c405c8c2919c5531852eef73c270a181c9a923aed9529f3ec77b97b7fa968790,2024-11-01T12:57:03.417000 +CVE-2024-32946,0,1,e2d3bad215f935094d580fa05b3c309769b4f022f8dabfa8cdf03e9ac77fc09e,2024-11-01T12:57:03.417000 CVE-2024-32947,0,0,f4d3388d21b25a6b8abe5d47eaf1495f0195fc32275d8a68f778018af0164235,2024-04-24T17:16:50.397000 CVE-2024-32948,0,0,acdecd5f4ed0b407d74ae76d69c5bf1c1216a53f69bd869825d06aa6433de1ea,2024-04-24T13:39:42.883000 CVE-2024-3295,0,0,7e8dc8fb7d947b5fec16ad38c2014a5b0f40e3f43acfc4125c239589a9c410e5,2024-05-02T18:00:37.360000 @@ -253708,7 +253708,7 @@ CVE-2024-33445,0,0,6e7e4efc8ec4c00f5a4d8586fbcb92cabc92474cc1d9f3d59cf859cedc450 CVE-2024-33449,0,0,65f31ebf7cac3fd744da219853727b760d519b14a5a3f0dabbd6197ba25b1997,2024-08-01T13:51:58.900000 CVE-2024-3345,0,0,636931b54021c23b6b8befb749ba186f8411eca702348865e4d3d050c16c6125,2024-05-21T12:37:59.687000 CVE-2024-33450,0,0,4e09c623b6101225f314d1df53358088e879f8d91a1a16fa51d690b1bfa25901,2024-05-29T13:02:09.280000 -CVE-2024-33453,0,0,9b5eca0cee93c3990b9b5733248d61c79e61ca2177049a5169a2cd8ade87bf14,2024-10-18T19:35:03.713000 +CVE-2024-33453,0,1,ee8307bc16f0334fcb036f86f2efb133b763f33188f4d6656c6f632a1740033b,2024-10-18T19:35:03.713000 CVE-2024-33454,0,0,74b0a1930570ffdd0fe139f1c45084400e123a1a6e46097c3427b727b87e14aa,2024-07-03T01:58:17.097000 CVE-2024-3346,0,0,5fe2388e7081d85802d7eeef70ad8fdaa632fc14126ef86b4921587d73e76418,2024-06-04T19:20:19.553000 CVE-2024-33465,0,0,7dc8798fe71a3f778010ed5d146c9c87c91ee3709364cd2f1c6196073e9c2579,2024-08-01T13:51:59.690000 @@ -253830,7 +253830,7 @@ CVE-2024-3360,0,0,3109060f810d344d932ba41f8fde09186b8026142e7b2128910fcc2070ceab CVE-2024-33600,0,0,02f564f9ce52bc11d27e3e1676100dcba6eaf4079faf69e72aa377dd994c6ac8,2024-07-22T18:15:03.417000 CVE-2024-33601,0,0,1e872276284c72121f6aaeefc175b69e15bd1ff785d0661b2fa91a7a25fea337,2024-07-22T18:15:03.493000 CVE-2024-33602,0,0,86deb6f1e6a3eb7f53cef6d50563acba68abbbbc8944080d8d45f1adacf78d24,2024-07-22T18:15:03.583000 -CVE-2024-33603,0,0,c8beba2cb615346e801b1ce778716644756b2baeb9f46c197501644b6c6e57a7,2024-11-01T12:57:03.417000 +CVE-2024-33603,0,1,51cdabbfbfa1d400baefb300a4281370152783b5110a3da58893773e9a5130f3,2024-11-01T12:57:03.417000 CVE-2024-33604,0,0,f300ec136103721a36b6f9e3ad22fcddf48753bfae597ae6d6eb99e8e877fcf5,2024-05-08T17:05:24.083000 CVE-2024-33606,0,0,e277f7ddb9a42d3084a4fa02dbc3b1b3d63499186ceb3e463e593da1b13af1f7,2024-06-13T18:36:09.013000 CVE-2024-33608,0,0,2634f245511a2ef8bdf0a976af80480a0940742ffc95fa320a1cb750a797cfb7,2024-05-08T17:05:24.083000 @@ -253842,9 +253842,9 @@ CVE-2024-3362,0,0,d92169c3d8c5742c227b67545a8be3a4af52d45882987a88c4a23c2fb99ad4 CVE-2024-33620,0,0,e869b572e67eecaa04960c7c1c826ad66c9d71964f8469bf34eb9ac43afb5484,2024-08-13T20:35:09.233000 CVE-2024-33621,0,0,ed1eec35bbbbdea80d33a8bbcfc24d343e0426fb309b2aaa07ef1d5e8aa29271,2024-07-15T07:15:04.067000 CVE-2024-33622,0,0,d58465a4a66214b50b1796cf92386e687ba2dbe496bc818c44d1f85dc4a8973b,2024-06-20T12:44:01.637000 -CVE-2024-33623,0,0,5dc1aba0b5ec7bbdf919d2822370c96fd7d66a6f4c02bd84cb17323bb36088c3,2024-11-01T12:57:03.417000 +CVE-2024-33623,0,1,af9d801f94575cfbc506d8b2b277a5fa3fb7f47ec426935e2a2f2d970140dcc2,2024-11-01T12:57:03.417000 CVE-2024-33625,0,0,645afc1357c853e892786758021f6a244aedee60fe13b747d548e0f0fed77836,2024-05-16T13:03:05.353000 -CVE-2024-33626,0,0,dabc3fdd8abc388b59695aa69ac038c8fcc0af552027965318d57e4319493667,2024-11-01T12:57:03.417000 +CVE-2024-33626,0,1,485afa6985b63198443260dd6a21d8ec078d8af93edd08209806832b27a19236,2024-11-01T12:57:03.417000 CVE-2024-33627,0,0,739561a300c8e0c5d6e0776600829ec1cdfa9e9832b6a16afdce5ca14d9efae0,2024-04-29T12:42:03.667000 CVE-2024-33628,0,0,0d9fc47e7881c845fcfb40059b0a2f57cf834a162fc7588e1c4ae872cfbfa8b5,2024-06-04T16:57:41.053000 CVE-2024-33629,0,0,0775f88facd47182375f04c11c9fb90160e0ba716118a2c83830fab26520359f,2024-04-29T12:42:03.667000 @@ -254661,17 +254661,17 @@ CVE-2024-3467,0,0,cacb4fff60c492ce28d24c855ee87196a20d1b51cff8acadb6d43f71f0e4e4 CVE-2024-34670,0,0,c7f7a5e478bc1a10ace61979abf21c947b061684824f9606c72fa122e8a61c6e,2024-10-10T12:57:21.987000 CVE-2024-34671,0,0,a08598303b7cc44bc7ce36474bf6973e3d3c57f08611bad7aa18ef971deedc26,2024-10-10T12:57:21.987000 CVE-2024-34672,0,0,5b999fcfa370bba972f9e6370e3179075f4c5c678a82b2140b4d119a0d64c655,2024-10-10T12:56:30.817000 -CVE-2024-34673,0,0,9de9124b3e6733657b2f439d2108f71ea5d98405c070045bb8baf4be7a7657f0,2024-11-06T18:17:17.287000 -CVE-2024-34674,0,0,b89c12295bfc8c7cf5cbf2125dc337a0e4f98189bf73a6af476d0918d33896b1,2024-11-06T18:17:17.287000 -CVE-2024-34675,0,0,ad6a63c1fd7ea32c1d80296a27be8f7af3e820ae9345ac14db43da41b1a37431,2024-11-06T18:17:17.287000 -CVE-2024-34676,0,0,86f9716a9dde97bf2579aedaf124d499a0782fe0815dbf5d45c08bb8cad56b92,2024-11-06T18:17:17.287000 -CVE-2024-34677,0,0,e8c86fea3b3a848bd1a9ca1e58b9562e2cb3f458b4fa89648319950ca5818a83,2024-11-06T18:17:17.287000 -CVE-2024-34678,0,0,5f7318e86be23e86f8886d280846ec52d56cf2e8d72c724a85baba890b9bd9fa,2024-11-06T18:17:17.287000 -CVE-2024-34679,0,0,dea06bd12b0a9ea94ac70075c28aaf6d5c35b585cd9bbf2981c58d2cdfc3404b,2024-11-06T18:17:17.287000 +CVE-2024-34673,0,1,7f83fbf08444ae07cde3023a5310d65400d5764991b6b85a9db840c7c7fb62e3,2024-11-06T18:17:17.287000 +CVE-2024-34674,0,1,8f6ea897ef696c85f2cf32a1e78457ae5fcaadee9dc149785dc200ced2ccbe68,2024-11-06T18:17:17.287000 +CVE-2024-34675,0,1,85e77a124c9b0930a000cb7d1e6b21287199f1e516871f519122e7a8a39d8d6e,2024-11-06T18:17:17.287000 +CVE-2024-34676,0,1,d6fe8dfa4b37d0857cd8f59029314a2e3ff2a9e56606612918be8977a523c53f,2024-11-06T18:17:17.287000 +CVE-2024-34677,0,1,645ed887e5e44e5044e8437d4b35871309ff8b8879bc60727f65682c38fae2a6,2024-11-06T18:17:17.287000 +CVE-2024-34678,0,1,c41b03686431110896396e26f8c1185638cf9d2bc67169ea8d59a1f475b3ce26,2024-11-06T18:17:17.287000 +CVE-2024-34679,0,1,6f77efdf9879de749b3809311925a7aaec602488efc2814b41f6d652ca61d54f,2024-11-06T18:17:17.287000 CVE-2024-3468,0,0,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45e0,2024-06-13T18:36:09.010000 -CVE-2024-34680,0,0,b15b7a995cb28b4fb17ce582b201e97b2bde890a698c3eaf0e3657e2dd0f53ca,2024-11-06T18:17:17.287000 -CVE-2024-34681,0,0,c40d2bef6103cfdc5c3bdcef7f64079880f481f862165fed2ff7a0daf469c79a,2024-11-06T18:17:17.287000 -CVE-2024-34682,0,0,c6fce8ee8a33bc0c9947fa150cb1376c7ae2c452b9c50ddd14146ff1bf1e37f6,2024-11-06T18:17:17.287000 +CVE-2024-34680,0,1,8025c4524d7c2d250fc1e7f9d788bf2e3baff70aab679db3d27ab73933cdd22d,2024-11-06T18:17:17.287000 +CVE-2024-34681,0,1,74e83c108d86c9c111ba1513170d8663aad0047805851f01eef53e1e70cada33,2024-11-06T18:17:17.287000 +CVE-2024-34682,0,1,7f365da8ccb9669e20a136ed19bf8c74956c08dd18722ca07ecd4a5371d1f200,2024-11-06T18:17:17.287000 CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000 CVE-2024-34684,0,0,e8c75614bfdf726402b2e2e5ba5b4d9d3d56d8e0e55be88a08ea86e305e764ec,2024-08-09T19:15:17.677000 CVE-2024-34685,0,0,7b2238e6c0d6ba01f5b0c43be9387a7356e22cab609b2b92ef07aa910b7a9a4c,2024-08-29T19:29:14.440000 @@ -254929,7 +254929,7 @@ CVE-2024-3514,0,0,3ed2667128afb9e047ea43d977eb1ed71e90bed358f504ad5e2322f1a22b19 CVE-2024-35140,0,0,f651bda48ef3720086b4e55e66eab6a11168ee8b067c959fc6ebc63397794d8e,2024-05-31T19:14:47.793000 CVE-2024-35142,0,0,eff9915c7a0945f0e06d680eabc808e5d5a4e4e1bca0bc89129e9dc0c0bf4eef,2024-05-31T19:14:47.793000 CVE-2024-35143,0,0,91b6eeb88ab78f0a68d664e29510e254e5a4274c3ef1d98eec625c8db65a7df1,2024-09-11T14:34:13.590000 -CVE-2024-35146,0,0,677d9601db9ab67d985a537039948f286c2d846a8ec76867b2d02896d2828cd1,2024-11-06T18:17:17.287000 +CVE-2024-35146,0,1,52ad961708eef9b7acad6f4e3b8812380a61b2bcb7b24e889f4c16611e65795e,2024-11-06T18:17:17.287000 CVE-2024-3515,0,0,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4cf4,2024-07-03T02:06:19.180000 CVE-2024-35151,0,0,50c46c119b543968ed958ecfb5b487a6d2fa4303602c68e6298210cebc9f30c1,2024-08-23T15:32:15.270000 CVE-2024-35152,0,0,6405a901c2a07c460de1a6dfaec77aa83ec13bcce14e649bd5403dd2210dc6bc,2024-08-23T18:57:54.717000 @@ -256367,18 +256367,18 @@ CVE-2024-37089,0,0,4079e469a0b9c8eff7513f19c004b5889c685b5a744b48949620385f99d2c CVE-2024-37090,0,0,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000 CVE-2024-37091,0,0,b626c72d25f84f9219d28a104cd2d18472b59c6cd0ed8347ffeee08b9e2b4719,2024-10-20T12:15:02.977000 CVE-2024-37092,0,0,5d6ec5440d10a9301dd3905013853ef3f8ec0563d3da8d9c4e2e50eb50e7d655,2024-08-20T20:15:40.147000 -CVE-2024-37094,0,0,3b9bbb05ead624ffbbc9ccc7afa23706189f99653a227bfe7db9c87bcba57d8f,2024-11-01T20:25:15.673000 -CVE-2024-37095,0,0,fab5c606d09eb8057e73cedb3720369971cc5b097b0f07e0bac6156224931273,2024-11-01T20:24:53.730000 -CVE-2024-37096,0,0,f734c92b0ab9c9bb83cd756fd9da6c275ccb8daaa0ef196069cd587669f610b2,2024-11-01T20:24:53.730000 +CVE-2024-37094,0,1,ef233695a6a80fd922f10cdfe834e8d6286309c179c3fb1db378bb268430d7d2,2024-11-01T20:25:15.673000 +CVE-2024-37095,0,1,3408bf6ac4dd919459f933e8f521bf6c518da1c069e237e80314c34a9f6761a1,2024-11-01T20:24:53.730000 +CVE-2024-37096,0,1,23220101781d6f82b516c48f773cc5677aa7466abd0e4fbb5bfa71b95dd859f9,2024-11-01T20:24:53.730000 CVE-2024-37097,0,0,2ff654ed870e28098ff61d9863b817bf82788553fa15e646afcc390727bd15fb,2024-07-26T12:56:05.293000 CVE-2024-37098,0,0,206a1546b741bc07a86d9ba244975f767c816d0e758aea47c5cb3f103694aa58,2024-06-26T12:44:29.693000 CVE-2024-37099,0,0,15a45661c6a1e6029d3804f32a134a3defdb0a087d2db36e721ede1e2e0ab582,2024-08-19T18:36:20.123000 CVE-2024-3710,0,0,b54f7b8999ad064535445b5fd4766a137ffc70ceb349f28f8c5f7d65dfa1d3ae,2024-08-01T13:56:40.053000 CVE-2024-37100,0,0,2b3fe9b89db247c6739af47c680e25c99c767f88c107eecdb29b2289fcbaa161,2024-07-26T13:27:50.583000 CVE-2024-37101,0,0,97e2e32c34ae252be2daf95c15efc1d10b3c02ed553eff869e9373b422ad3f71,2024-07-26T13:28:35.413000 -CVE-2024-37106,0,0,1d15c58f2a86f711a28a69e4f2be667174b974112208ffdd26a04c23606af771,2024-11-01T20:24:53.730000 +CVE-2024-37106,0,1,1cc26f5592d022ba707d56350a685e3de81a115a9ac52b0b66116574370aef96,2024-11-01T20:24:53.730000 CVE-2024-37107,0,0,f6151dfeaef735d98ee2a1964bf7a62bf00cbaffb6872b2c666a0538498bf195,2024-08-20T20:13:48.467000 -CVE-2024-37108,0,0,5290c846d04301791af56ba847c8cc344db396478a26a7352afa9ef8cbfd26d9,2024-11-01T20:24:53.730000 +CVE-2024-37108,0,1,c8813ae501dea57a202a2d30315a71542b6ed5ae4dc2a60d5151c11d91f5cd83,2024-11-01T20:24:53.730000 CVE-2024-37109,0,0,59c880e2cd3e38e3a3c7de833017795e6e64fa002daefd66d3ca656f3048b37b,2024-08-21T13:49:47.070000 CVE-2024-3711,0,0,3b2dc1b2087adfd05ceebf60dbe737e15dd78bf5f431af93b3b9e5c8041fab21,2024-05-24T01:15:30.977000 CVE-2024-37110,0,0,22f8d158d06eab5c827b62e4e01a4e15ed273058bbfba1db2001625565816b18,2024-07-11T13:05:54.930000 @@ -256390,11 +256390,11 @@ CVE-2024-37115,0,0,c4756c61d3182bc7983d562b038bd1b97c9dd3293a1a84c5b8fb1495fbe9c CVE-2024-37116,0,0,ca1b19d39a4bc6b70f51489c38c2a0b8ac4fce9555d79bb6d33e3b3564731292,2024-07-25T19:25:25.243000 CVE-2024-37117,0,0,01ed17acd0a2e0df794ba8c2912eec5f0be16c5be324049f1b5f69b2792ef0eb,2024-07-25T19:25:44.650000 CVE-2024-37118,0,0,639faf33c2a8fb2c740912abc8d53c596f87fe9441b8656fdd69a32898ac5358,2024-06-24T18:55:07.707000 -CVE-2024-37119,0,0,acfdc2ae8ce03c98ce038597762805aaa25ee99836029f593562e6a6c5b5a363,2024-11-01T20:24:53.730000 +CVE-2024-37119,0,1,8a59447e5a1cbe42bd908584ca40164f835fc4eebba77a5554fa0d2f11779a6a,2024-11-01T20:24:53.730000 CVE-2024-37120,0,0,e217f7fee1fd744744a6e451bd7bab1af64ac11cf693c5332902861bc57f3a1c,2024-07-25T19:26:03.773000 CVE-2024-37121,0,0,f38dd3795bb34ab592f0837185cc69e5390fe6be6ea0a7f8fed8aebfe54c3ef5,2024-07-25T19:27:44.087000 CVE-2024-37122,0,0,b311939d15bf048863cce658485cfe0a8e332201062bbe989c7fc9c6113ec98e,2024-07-25T19:28:05.110000 -CVE-2024-37123,0,0,3e5474b25fa2ff5d6602038acafdf0ad39a988f313bcc1e39edeefcc1e13e658,2024-11-01T20:24:53.730000 +CVE-2024-37123,0,1,328c8b42797a7e1aefb8f62555a88a31230bb1f4b153ee44b8fd5cd675cf7937,2024-11-01T20:24:53.730000 CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000 CVE-2024-37125,0,0,c3a964a559ab27819f31020b758acab28f92a62819c1ba1ac4d044bd4955ee74,2024-09-30T12:46:20.237000 CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000 @@ -256433,7 +256433,7 @@ CVE-2024-3716,0,0,645c39d852b6d0900252700ce7c6aa7da7b0e8e8528414b76049b939646330 CVE-2024-37160,0,0,244bd54ee6562bb7c87780ac681fb6725c85e3313649f8ee9d22f3f6a28cc85a,2024-06-11T18:22:50.097000 CVE-2024-37161,0,0,2a94f421c449e5230ce5f6bf577049502e74931a566a6f5900713655d6199d0d,2024-06-13T18:36:45.417000 CVE-2024-37162,0,0,d187b793c58199cbc2898a7a072f3ac3c5ef9e78e8300197de9218f7bf28c884,2024-10-31T19:43:26.800000 -CVE-2024-37163,0,0,e299ba511d4c0e736a670743e9375ac75a6321837800583d9d327792c0552ded,2024-06-07T19:24:09.243000 +CVE-2024-37163,0,1,55f722564027f8fd1d489ef3069ebd4284a17fedf10d7751d357f09c99a32b7e,2024-06-07T19:24:09.243000 CVE-2024-37164,0,0,9bb663a219137e8dd0a97eda1376d9c5548e255ee1c6292d4793648cf6ed6f5f,2024-06-13T18:35:19.777000 CVE-2024-37165,0,0,6480a9385974854bcbb243b4e0731864b039fe2224efee48b2a5f08ca4ebe426,2024-09-11T13:52:20.730000 CVE-2024-37166,0,0,15923f4d71b858dea01152d79e68f82a58596fdbbe5a6eccf92b2866fed36e33,2024-06-11T13:54:12.057000 @@ -256460,40 +256460,40 @@ CVE-2024-3719,0,0,e1388f5d62a0fd4143182e88b2e1e453aac0737837b6c91a5acc29cfca6701 CVE-2024-37198,0,0,bf34a330875867b427d853b7c401fbf1da6acf891d942b32d41eff0d38e81318,2024-06-24T18:55:25.417000 CVE-2024-37199,0,0,e0bc94ff3ffb2d447b176c847adbfd46c016cf032811bab5a07d3d759b2c5626,2024-07-25T19:28:39.857000 CVE-2024-3720,0,0,82c3bb173e3de3257d537b2361ecb5114d79232c1cdd8a69a91c00ebc4e15c61,2024-06-04T19:20:23.660000 -CVE-2024-37201,0,0,73c27f828b5e9abf215b063815142b130b318bc04f771ad0f39849030bd1659a,2024-11-01T20:24:53.730000 +CVE-2024-37201,0,1,a6e44ad4a0c3c7ed0300cfb689344d54654f76018ab258960fc6ce60a25bd8a9,2024-11-01T20:24:53.730000 CVE-2024-37202,0,0,d602ef0ddb16b8e29c81df413412da887af66f3f137715e5f410be87522e0f2b,2024-07-12T16:34:58.687000 -CVE-2024-37203,0,0,598509b7178edba12629b1a3aeaad11db4a18c832b77ab68cc52916001363bbd,2024-11-01T20:24:53.730000 -CVE-2024-37204,0,0,56a1065a1ff372ffa7e025e82d9d6283a04c70fc8ebf9709226b3ae8cce128af,2024-11-01T20:24:53.730000 +CVE-2024-37203,0,1,25c296959d7563e5e579ee5d04ce081e772e28ac4b0ed15a749158f09de11f92,2024-11-01T20:24:53.730000 +CVE-2024-37204,0,1,cef90382712da45777f57e703c831cf451ad7fc706df6d71e93a9efe89305861,2024-11-01T20:24:53.730000 CVE-2024-37205,0,0,536e384912a3e40e30cd6e5099a5bb49f28b5542a5391ea994ed78796c432e37,2024-07-11T13:05:54.930000 CVE-2024-37206,0,0,46ac9f4747acb5cf6d0e122662eeaf70d40f95b8f37de2a774873a1f69e6b09e,2024-07-25T19:29:03.367000 -CVE-2024-37207,0,0,ae62c3b02bd3782abb029808399bfaafbc7f11457f91462b1c6f8d0292fd12f6,2024-11-01T20:24:53.730000 +CVE-2024-37207,0,1,3786b87719e18181cfb757d7aa82ff5307bdb8f6b283e4c0a81af5bda26b5273,2024-11-01T20:24:53.730000 CVE-2024-37208,0,0,88780676ffe1ae9fd897090b91bc042de66f491603ea11b382a3765c84e6e5c8,2024-07-08T15:49:22.437000 -CVE-2024-37209,0,0,b80848f9c77638df0af3fe52e05d55af18762c4bc00bbc19c458b00eb9be5817,2024-11-01T20:24:53.730000 +CVE-2024-37209,0,1,de1bdd5ca45270aa8999a4ee33f521770066474019e1f93eb2887f8155373b05,2024-11-01T20:24:53.730000 CVE-2024-3721,0,0,58ef520bee338b66c67331907f685fbd7c92e0aff6743a2585cf1054b1f5f57c,2024-05-17T02:40:05.290000 CVE-2024-37211,0,0,804dfe5c77920eae215c30d95b5818ba0350c8deeead690be1d9e697dbe2c926,2024-07-25T19:29:34.573000 CVE-2024-37212,0,0,1da1545884710cf41d492815f0c054f5d2977dca844bcd810f9fc3aadcdd7172,2024-06-24T18:55:34.983000 CVE-2024-37213,0,0,76ad8bbb2fef0724c442abba2bc1429ee5e0a6713c9dc7102d6ccc47a5af0f2d,2024-07-12T16:34:58.687000 -CVE-2024-37214,0,0,50deb759e59a5d14b335c9ae64c7be421f249d4f5c77d32241ec83d728e0867c,2024-11-01T20:24:53.730000 +CVE-2024-37214,0,1,5d95317a5bc68d1a4ab56791e0617eae7276474ee99b88802b347fdae057e196,2024-11-01T20:24:53.730000 CVE-2024-37215,0,0,7290332384116f158511fbcad0f3f768d5480402606bc52700e73d9a46114359,2024-07-25T19:52:28.650000 CVE-2024-37216,0,0,bd0defd93cf4cb7599ac41da3b3dbb29d5664881bdf7e68849687fffd4d23e8b,2024-07-25T19:52:47.640000 CVE-2024-37217,0,0,d84f58845a226533ef88f91cf51665f892cb6ef69eece77705675de91e238de2,2024-07-25T19:53:13.373000 -CVE-2024-37218,0,0,7b4f732096c74df4f3070a764ba8a86b33dd014ee2c2b795d773053539cfd4d5,2024-11-01T20:24:53.730000 +CVE-2024-37218,0,1,8c7f4b11dc6091649268107359295b7d999776cfe14557f48ed9f124ba67518c,2024-11-01T20:24:53.730000 CVE-2024-37219,0,0,2c7aa3d9d28d409130ff5d5c9044f317e12d5479911f280bc49e4b7347bc39fd,2024-07-25T19:54:15.207000 CVE-2024-3722,0,0,9dc3cd0859a6ddeaf0632839a465d86a9a29445f6ee77561de6f569ccc572620,2024-05-14T16:11:39.510000 -CVE-2024-37220,0,0,976888b49fc23d2007b1d1d74536d250e9793e04b702bd9513293c78ebdcbda8,2024-11-01T20:24:53.730000 +CVE-2024-37220,0,1,cbeddc0cbf6b6f0602a8ee945527d10ec74ebe42aa5987ad390f38033c74faae,2024-11-01T20:24:53.730000 CVE-2024-37221,0,0,766b26a6d803c271d220b490262ae06d61dd1cac4959ca103a3955d50aae4081,2024-07-25T19:54:36.480000 CVE-2024-37222,0,0,635e8498a543c26c1589880d4834a9aa974ef1739df3bbdce179ff0012928442,2024-06-20T16:07:50.417000 CVE-2024-37223,0,0,1b179be7f48ae398eff4c7b9081bfdf2225b8f28307188d3d690d5b4d2479983,2024-07-25T19:55:36.420000 CVE-2024-37224,0,0,b2f8fad8babf6390a899ffcab59d19933dbf25ebcd20a23724248733d817a051,2024-07-22T11:15:02.487000 CVE-2024-37225,0,0,e634e29bdfd8f33d6fb58b1247a306b89896a25e66a2742b460eb0dbb8d917be,2024-08-02T20:54:57.277000 -CVE-2024-37226,0,0,687dc39a179945d251095d4744f0cb31aac59364aef02d3bbb80bb48fa7b0b97,2024-11-01T20:24:53.730000 +CVE-2024-37226,0,1,ea87bd6b3d3db586cfa3677c71432fb4edb3d30f3aa129e50e9a3638f6e71ff5,2024-11-01T20:24:53.730000 CVE-2024-37227,0,0,8976611308ba369d49147eef8d8ea5d2a5131539396f1b2753e8184974920298,2024-06-24T18:55:44.513000 CVE-2024-37228,0,0,50dbfc0262e032fcd024e283ea4d2f5dc7a22bd356a2985f5a28238a3bd731e1,2024-06-24T19:26:47.037000 CVE-2024-37229,0,0,d93698612f70a0d6adcd99183027f5f231f7f88f4c04c3f165919775d594874a,2024-07-25T19:55:16.460000 CVE-2024-3723,0,0,a8e51847c0e05dbc58ee135e3d4343a67158cd8e9c477d43225f41c0c8d46584,2024-06-11T13:54:12.057000 CVE-2024-37230,0,0,8d57084619240a2b3f54ba5d96719baa3aef26c1c67da001b7c6bb1de46aca2f,2024-06-24T18:55:55.037000 CVE-2024-37231,0,0,7cedd2f54fa716c699a1c60eb2e9af475e40da1bddd52f14ac45e518038037ee,2024-06-24T19:26:47.037000 -CVE-2024-37232,0,0,b4760417a3214b9b21de694240badfd8ddcfcdc3c835cf83dd80743efa0b9fd1,2024-11-01T20:24:53.730000 +CVE-2024-37232,0,1,63249670301f4354faa93cbcc822fc8ecc291d523bf7e3f4d949b5b79f7b506c,2024-11-01T20:24:53.730000 CVE-2024-37233,0,0,3d06a561c7c4bf48fe1d918a42317c7306b54bdb3fc391a8195af9e48aea7616,2024-06-24T19:26:47.037000 CVE-2024-37234,0,0,fea6d0a90424156a06bdb00d769e0d960a6f376259af6537661bd5a3b2a1e166,2024-07-08T15:49:22.437000 CVE-2024-37239,0,0,5b727df215b62007b7ee68dcb9c09558ce3936f55a528ebecf8aa0bd9468a8d7,2024-07-25T19:55:02.207000 @@ -256503,13 +256503,13 @@ CVE-2024-37245,0,0,8626e25882ebd198de3d6126617dae182d8919ea6f8ef7871e0dcb2fe24a1 CVE-2024-37246,0,0,f9f8bdafd1958cb5c1daa37efa79cd775cf389b1f9af5ac8e8eb74aad2cdac69,2024-07-25T13:57:08.393000 CVE-2024-37247,0,0,8228dfcf5cae02c0a86d645ad30e042bbfe31c09ad0d308292ed19a0aff45168,2024-06-27T12:47:19.847000 CVE-2024-37248,0,0,02a07ebeaf12f56a9f57d183dc0eb9a1b36d4373e8e10165c77133b909c93eaa,2024-06-27T12:47:19.847000 -CVE-2024-37249,0,0,95f25bb88c114fadd7d005161a070cf3dff87f1c0b655151f004535b774a0357,2024-11-01T20:24:53.730000 +CVE-2024-37249,0,1,d43456128f7b42b997b9e54ed3cd9b8b1ba14ea8fc4f99a76d1cc86395d97575,2024-11-01T20:24:53.730000 CVE-2024-3725,0,0,b3b29463d0daa3afb9af3d4851601af4b7e3fe7bc65e993937cf3285f5f421a7,2024-05-02T18:00:37.360000 -CVE-2024-37250,0,0,3899e389158c2b65e95ea85edce4e45e987b3042c3a29526af8e46acd0e00689,2024-11-01T20:24:53.730000 +CVE-2024-37250,0,1,a16286dc3bfded13444f266d423cbe941b4abd2295b318e90a738996db1670b7,2024-11-01T20:24:53.730000 CVE-2024-37252,0,0,666ab75f24718a9ee651c100748889c59e85a940dd5a4bd4a0cf762d4dd4918c,2024-06-26T12:44:29.693000 CVE-2024-37253,0,0,e8b3ddb7f0f7d9b21f3fd58f2a666ff68cda618f6bf43670f9bccbbcd9bf1b79,2024-07-09T18:19:14.047000 -CVE-2024-37254,0,0,a4d4a80d13c4b399d2a4624e18c7290cdb1aa2ba7f1d742dc3f164d7543c4d3d,2024-11-01T20:24:53.730000 -CVE-2024-37255,0,0,5c372fcafeb0f57953ed08705eedf2286c7188d5f531662ccdd475cdb500a8ed,2024-11-01T20:24:53.730000 +CVE-2024-37254,0,1,ec2cd3a2768f2dae112a41ce6039732d976ed15a1180555656af815c1cb530a2,2024-11-01T20:24:53.730000 +CVE-2024-37255,0,1,ece2ac2e5116e347271c168bbdf4bfb915a02b13d2f318404064e05d88a60e8a,2024-11-01T20:24:53.730000 CVE-2024-37256,0,0,cff2886e3af555625594e5c3650ef260ce093bbac525640c43f2f906ae3c9089,2024-08-02T20:35:48.813000 CVE-2024-37257,0,0,ba955a777c88a8e4bf980877123b29fac72ab541a5d5656beccb5196c1267e18,2024-07-25T13:55:53.217000 CVE-2024-37258,0,0,a3e04350d6cb7fadaa45f136e4648b756f0e9bc09851b1fa2971daab74eb824a,2024-07-25T13:54:49.790000 @@ -256524,14 +256524,14 @@ CVE-2024-37265,0,0,15f68b41e4db6ae6ccda7f80b0a70abe19004015dbcf0d1246d37335388c5 CVE-2024-37266,0,0,44943b1bec747c3c4ecddbc943aaff365210584d2dac21ff41065ed54e40dcb1,2024-08-29T18:59:40.057000 CVE-2024-37267,0,0,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000 CVE-2024-37268,0,0,32108042cd6042edb5d9a980c4bc9e7e171800cf8a42366d53d95c0b76a50314,2024-08-29T18:56:01.267000 -CVE-2024-37269,0,0,cecf84ab95096d0003337912b7ad1048564f9685df01c8e8cb97f00c1e2d5298,2024-11-01T20:24:53.730000 +CVE-2024-37269,0,1,5492c3e2784c69694729387dab80db99196a2883d5d6034e825fece97f9e6e31,2024-11-01T20:24:53.730000 CVE-2024-3727,0,0,b4ce865f62bafd3dc815d8549b0ea67d6c2ff3d32f651a7a8608e4dfd0460fa5,2024-10-31T05:15:05.160000 CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000 CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000 CVE-2024-37273,0,0,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000 CVE-2024-37275,0,0,ed16fc8bc6c608f35a8b7d5acc4e01aceb7115e810ed76f0ef20187fdb243170,2024-07-24T02:52:01.253000 -CVE-2024-37276,0,0,82318265c768f1054b52b5011d52e270a8ea714a829b7f82558840982c7978a4,2024-11-01T20:24:53.730000 -CVE-2024-37277,0,0,d37729d458f271c36711876ff2ffb94ac6c41ca611f8a3af2bc2ca141fb789ac,2024-11-01T20:24:53.730000 +CVE-2024-37276,0,1,dd9f8ea4b9c2ea84828f8cb4aaf04f411b323a85b4d34f61e3d81e4af0247df6,2024-11-01T20:24:53.730000 +CVE-2024-37277,0,1,d578390f95b51e1f6576a892aed775dadbacdaa8095f23f57f24f19151705590,2024-11-01T20:24:53.730000 CVE-2024-37278,0,0,f099ad6e686108b7aa0982a8f779de2fbae21e6d456841af0260dad64229b388,2024-07-24T02:51:37.857000 CVE-2024-37279,0,0,0ed70538096e88f242c2535f9f14ae38e1c70c213aeb30a2a3a679f79534d3e0,2024-10-03T17:33:47.477000 CVE-2024-3728,0,0,49e6a5f26d01c7fceec7c4bf5478901bb5f23d6a3c9a4cf291a1c58fdb13c184,2024-05-02T18:00:37.360000 @@ -256647,19 +256647,19 @@ CVE-2024-37408,0,0,31eb8b44dab60578fd668270e5d026543c06afc296d259b359783119f5ef7 CVE-2024-37409,0,0,82c50e49bf5ddfbe2b556ca4db6eaf6873d58da7b8ce0001c708890dc09405da,2024-07-24T02:51:28.287000 CVE-2024-3741,0,0,231d682398a3bf0f8cb6feca9827b9102f1ffa57c5e9d698f993641c4b470f98,2024-05-28T17:15:11.327000 CVE-2024-37410,0,0,6f138b458017933864015fe3876b3f0b04a0ae638cd49a95963575c29007c829,2024-08-29T18:54:42.557000 -CVE-2024-37411,0,0,de0bb04d207633b1650c3b59959b9f40b03984379527dcf3859c288e1cded6dc,2024-11-01T20:24:53.730000 +CVE-2024-37411,0,1,3727a70b7fd6f476dc3b2004c7ba5bd922ded37f8c778b8cc47046eaf5a7047a,2024-11-01T20:24:53.730000 CVE-2024-37414,0,0,e255520203a4f5d84d75bf3505da1cb94be51cf3e35e5b7fb1e1de0f910d513f,2024-07-24T02:51:12.940000 -CVE-2024-37415,0,0,5aec3d18aa027be93b848c8abb458658d052bda3303969f70a13bbb8ae62f62e,2024-11-01T20:24:53.730000 +CVE-2024-37415,0,1,8a9d0fcd2a279dc3c322703bbc7c451dcd84cb2d5ae43e683923fa6d4716e961,2024-11-01T20:24:53.730000 CVE-2024-37416,0,0,909797ad9de53e2985d3ead9abdb7cc3591d223a14593d05f8844b56ab1aa84f,2024-07-24T02:46:20.357000 CVE-2024-37418,0,0,675b821ef8240dd93d22c5ac9b8f3319c41da8d55da693dece471e9353913d05,2024-07-09T18:19:14.047000 CVE-2024-37419,0,0,709cc4bfd88eb8c8be44e1e65fadfdc620ddd44133aef0f5d9579ff4ff1356f9,2024-08-29T18:52:55.357000 CVE-2024-3742,0,0,070fab29ddad5d13a23ad47122f745631dbb00aff0bcf6b77107130b4d71f112,2024-05-28T17:15:11.450000 CVE-2024-37420,0,0,fa4fba43610346a4c73a6f42b596dded3d6dc6de3bdef2d0e568f5534a8bec1d,2024-07-09T18:19:14.047000 CVE-2024-37422,0,0,1548d48870de86cc62e20da69fa08aade3d9d83f2ffb2a88548607a6025e893d,2024-07-26T14:17:26.487000 -CVE-2024-37423,0,0,55681df180ce7d7198f4fe2af3188715ddffea65cc2a5c8e37997a7fc9d05692,2024-11-01T20:24:53.730000 +CVE-2024-37423,0,1,80931c014218effff9192c5317fe29b065db1c096c6f412bb4c622e0f0e4a7e8,2024-11-01T20:24:53.730000 CVE-2024-37424,0,0,fb16d4de8ec78b8ec08d294a6bed2c6089434892d86f157d76124906952fff11,2024-07-09T18:19:14.047000 -CVE-2024-37425,0,0,157a4f5f7b098e82ac18c0e8ccc7ce6c34de8d950648b671571d968a1717faa9,2024-11-01T20:24:53.730000 -CVE-2024-37427,0,0,1558c02108a9dcc7b470f0da364204fb7d9f90c9e46c8952ccdccabdab1b9f96,2024-11-01T20:24:53.730000 +CVE-2024-37425,0,1,085574c500938f270adf813e7a8abc93a262395f73b2b0b87ffbdccdb46c0542,2024-11-01T20:24:53.730000 +CVE-2024-37427,0,1,a4dde23bf03f9f75fd0fc5aae9e0db5f4de9bb956b8e81b1aa29a89a895d8a33,2024-11-01T20:24:53.730000 CVE-2024-37428,0,0,f146442dabd264be77a227ba9b03dccb9706269373ac507a457054f3345b0e91,2024-07-26T14:21:55.163000 CVE-2024-37429,0,0,8530fe972ccd63731e61144bb487cee540e4e955b2b0d75c0f1ca3a60c119021,2024-07-26T14:26:23.967000 CVE-2024-3743,0,0,0a3db480b628076d3c70c79465806357c94d138ddc8641e01236cf34e89a1520,2024-05-02T18:00:37.360000 @@ -256669,46 +256669,46 @@ CVE-2024-37433,0,0,f4d9d33bda34bb62246368c517e537f865851d3bb09f759ca915a13f45136 CVE-2024-37434,0,0,de4220350ea1caf8aa2bab268d0d3ea23f7a5950515fa1138c50016e02cca0dc,2024-07-26T13:34:09.707000 CVE-2024-37436,0,0,f37bb6580351b266494b62ab4b6ddbe460804af39dfcf5264b74592c431d17c6,2024-07-22T13:00:31.330000 CVE-2024-37437,0,0,c34569ebdf3980c627d537003b61e423555eda0f054838c464a60a524bfcbe86,2024-08-29T18:51:10.020000 -CVE-2024-37439,0,0,c529816e94d3cc1462524abac1c03aae33d9fe091a133e3b5828a2e4caff72a6,2024-11-01T20:24:53.730000 +CVE-2024-37439,0,1,534279fbefdcf1b6d66f80573354108b9d070dad7505195ea7888d93ef01edc1,2024-11-01T20:24:53.730000 CVE-2024-3744,0,0,40b0f0c765c7a4ad7df2de19ce2eb9519fa9c2af93a33399e8c5730df134e208,2024-06-10T16:15:16.980000 -CVE-2024-37440,0,0,d9b801c8c7e5cd1dc2ffd21e0d4bdb9a492b8315ad4f15fb2fb12e0675c85b35,2024-11-01T20:24:53.730000 +CVE-2024-37440,0,1,d7fb3110aae6f1b0613831f4bacd7243c36260b472fcb43a4744c0fd296f31e6,2024-11-01T20:24:53.730000 CVE-2024-37442,0,0,c474575ef42cd5d41051f16739e42f67a50eb96f1df1b11f016db27b13ac1a7f,2024-08-29T18:49:03.207000 -CVE-2024-37443,0,0,211c2a4dba916ba46bf0ad264c51557ac85a673698948f8fafb7a998ba340acd,2024-11-01T20:24:53.730000 -CVE-2024-37444,0,0,8ff21a221d61bb67ed2fdfb1b8e583a13c24335b6e1703a29176ef6e1d2c41d4,2024-11-01T20:24:53.730000 +CVE-2024-37443,0,1,76167c7ec5ef92241d3cfe1d1d54f6872659029c3e61638ea0300757ecc10723,2024-11-01T20:24:53.730000 +CVE-2024-37444,0,1,6182394b322d6d1dc68f24ffb4fae538c75cb4cdf59a486bccbdb2b0b3e875b2,2024-11-01T20:24:53.730000 CVE-2024-37445,0,0,2e2366ed85bee36ece7ba5ee8a10de227c3dcaeb0e7e29b28396fb9ecfc70d6b,2024-07-26T13:35:34.630000 CVE-2024-37446,0,0,1c700fcd72ccaacb11c87eb1bade8d322d02aa58b87826f2e4b6fe02da4c6bd0,2024-07-25T15:49:38.057000 CVE-2024-37447,0,0,f10e9afe37ccb297979ef745150f8f06fb020e18b5d41aa2bacde586c100172c,2024-07-25T15:49:15.190000 CVE-2024-37449,0,0,9ade33135d3f6ca7bee3f73339a7862f6048411651fc6c5c343f59025cd80bb0,2024-07-25T15:48:38.073000 CVE-2024-3745,0,0,6c9edfff9e79c22a28b880b426148983da8f8a5db27e4bfd2a1dfcfd3cb4de8f,2024-05-20T13:00:34.807000 -CVE-2024-37453,0,0,45edeea66933502595f55437449c4382bc0679a198da16e061f9065da9acc22d,2024-11-01T20:24:53.730000 +CVE-2024-37453,0,1,3269e9409041faf4ccff7ee7a7d1107fbd5dc521c8ce7272d44434ed38ebb97a,2024-11-01T20:24:53.730000 CVE-2024-37454,0,0,543010294de061e34c604dd2bf7aa7fde10e93a8a432b7cfee001949fcf4e13d,2024-08-29T18:45:12.317000 CVE-2024-37455,0,0,62a969c1b6ba46ba07b28b33d3177d227e852a588aebf30f6c3272d0de5b3459,2024-08-29T18:42:30.400000 -CVE-2024-37456,0,0,38048964560d4799dcc5609bd5fb19f96af8e364997a322fb537e2c917de8346,2024-11-01T20:24:53.730000 +CVE-2024-37456,0,1,a8bd31855847ad49417e91fb50e0db14390059fd4edb6c98f6fe47c9c674d9d1,2024-11-01T20:24:53.730000 CVE-2024-37457,0,0,006d76ca2f7945a4e0f15c9687c3bbaa281863365a376188dfa2e9189c67a677,2024-07-25T15:47:55.217000 CVE-2024-37459,0,0,cbe90287ef2be027d1aa251600e674d79c2f79c2676eb4ad36f7ef9d7b69050d,2024-07-25T15:53:49.883000 CVE-2024-3746,0,0,b404a3f5af28975fb4e5d0eb577c67fe9710274ad0c55beaeeb6ef81bbf0e35b,2024-07-03T02:06:31.490000 CVE-2024-37460,0,0,02e09703912f0037e6a7b662748ea365f6bf750e1f1d9f187949e93a57c95d4d,2024-07-25T15:53:23.317000 CVE-2024-37461,0,0,ded408d38861fcbe6b63893f573a02e34c5f7c2b0c402d651fb6d6421f9f6ea7,2024-07-25T15:52:32.877000 CVE-2024-37462,0,0,cad64247feae7f9612226534addea8bce3646425783d879f460a4125c6bd3239,2024-08-29T16:05:11.203000 -CVE-2024-37463,0,0,9b7712697af5788674250cd3fff024fb4e5b2e9cbeaac8d529ce0c901e445161,2024-11-01T20:24:53.730000 +CVE-2024-37463,0,1,c13b3b07731ecfc4732d05bad69623063541ab728da701351fcacab4985bedfc,2024-11-01T20:24:53.730000 CVE-2024-37464,0,0,d5dd0cd8721de83e6db957b2a4c4526c848f707b5f4204dfeac1e6b719416e1f,2024-07-09T18:19:14.047000 CVE-2024-37465,0,0,b54ac5c991ae137e4db857985d832ab77f2e3f11dd17ec4350b94108ecaf4a17,2024-07-25T15:52:09.033000 CVE-2024-37466,0,0,bfd79fbf2cc8fe5f4b671c7b28aed23901ff778f5b74f12d79e3146f6452b737,2024-07-25T15:51:50.863000 -CVE-2024-37468,0,0,8a4e558ef0778fead8d56adbe43b1dd29b26725fda258f1fdcc0b5587274b413,2024-11-01T20:24:53.730000 +CVE-2024-37468,0,1,22d858139b7f56fd4d516e3f3ad3e8a9ad0f6a1dec51e2626b4fb75ff50d0507,2024-11-01T20:24:53.730000 CVE-2024-3747,0,0,3219ce820822d72e46103b803901087d25784fb8e92da6509df83502f94f1ce3,2024-05-02T18:00:37.360000 -CVE-2024-37470,0,0,dbc297890bb4b781e28d6e3f9405a239413541a23392109541cd079f51b911c8,2024-11-01T20:24:53.730000 +CVE-2024-37470,0,1,dac47745240308a493c2c483c59909f5c7695f1e975833f3fe96d7f437f77cf4,2024-11-01T20:24:53.730000 CVE-2024-37471,0,0,d465bdcae3c1ad0d7280b371addcc2292b7e76a7a90d8614a04cd4784c1cba62,2024-07-19T17:02:31.163000 CVE-2024-37472,0,0,0212378c488764d33b1d17de1bc88a5356a23ba19a78046e8c133cfbba541862,2024-07-19T17:04:42.343000 CVE-2024-37474,0,0,cf61b09860754eb2ef791cdf4ca372725ff10acc72703ca0f7e6cbc23292744a,2024-08-01T03:18:10.487000 -CVE-2024-37475,0,0,e42baffd7e4bafcb9e10a5a8d6413ad3988a24bb636086c3f1f14e0c430a89b7,2024-11-01T20:24:53.730000 +CVE-2024-37475,0,1,94f9a2f527e1a4176c7efbb7771a8ea5cb0553ef43e7fe87b09cb3efc372e81f,2024-11-01T20:24:53.730000 CVE-2024-37476,0,0,f4f56020021f539e4e21fd6b1ce7e80b53fd7a48dfe2a10c97d67df688be64bc,2024-11-01T14:35:17.177000 -CVE-2024-37477,0,0,fe9d2f2bccfced94d56c59371760a6304caaef5c984438fa3a2177e432be05a2,2024-11-01T20:24:53.730000 +CVE-2024-37477,0,1,5c146991b75b69a97416386496a8ca1d50253e138692bc76e36011913c6c31c0,2024-11-01T20:24:53.730000 CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000 CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000 CVE-2024-37480,0,0,e29cc7c72f9882ed3de055148476e2a1c36aa1c43c58b1a0300753d9c3833c44,2024-07-25T15:51:31.297000 -CVE-2024-37481,0,0,8d51fc800c12c27e065b46feb03e608937a2a951358f549672f4c26f5b9fcbd3,2024-11-01T20:24:53.730000 -CVE-2024-37482,0,0,8503924395cc1280102cdb2d58c0bc124bce014134e2bea2c590aafd09b5b942,2024-11-01T20:24:53.730000 -CVE-2024-37483,0,0,2fa1cb2b4ee9ab437ae61cf4d096a2d478452d1eb5eff53879f116de3961409e,2024-11-01T20:24:53.730000 +CVE-2024-37481,0,1,1c9b579cae936fb0814b714279c416e1c9c436a252f7bbe3e6b0fda3bda57913,2024-11-01T20:24:53.730000 +CVE-2024-37482,0,1,ad96a896fc60695351de6c3eeebb5d650e93f4308dd9bcf2f57102237dc6da95,2024-11-01T20:24:53.730000 +CVE-2024-37483,0,1,b54d7f8d1dec024cb1dea3471dac6ca4fe846a0227ba41e6146c0dd3774fcb26,2024-11-01T20:24:53.730000 CVE-2024-37484,0,0,5aa19fbeade225427f8be4047b53cf5aa423ef4d4466f797804f490d4e5cd642,2024-07-09T18:19:14.047000 CVE-2024-37485,0,0,a28d87feb836359698fd84c975d93a2c25e461c295a0332494f41ca668e6a305,2024-07-25T15:51:09.387000 CVE-2024-37486,0,0,cf55487adcabeafd4a4ef78235d46e39d7a0cbef985b2f1b50f1d6c8b1afa29e,2024-08-02T20:35:14.243000 @@ -256727,18 +256727,18 @@ CVE-2024-37500,0,0,af9a402301620aae5f482809384a634d075d13e1ff48e81edb8eaaa117db7 CVE-2024-37501,0,0,5ecb58b46cb9dfffffc738dc981f07d5bb389ccd62d90c017a24f4cdd2a17935,2024-07-09T18:19:14.047000 CVE-2024-37502,0,0,d47167ecc1dd174282378f6124abb3b4511994970b4449ae0fee9b8869d0d91f,2024-07-09T18:19:14.047000 CVE-2024-37504,0,0,2a3faccc5709d6d76660e0c6665b85f6d694f97e133b19d81d3b770a0ec3dd08,2024-07-11T13:05:54.930000 -CVE-2024-37505,0,0,601e718155160301ddf9c4322397560a93c4457e2eb07a751e444b88bab25499,2024-11-01T20:24:53.730000 -CVE-2024-37506,0,0,c964f1fa0c974c49b28439347873dd4e1864e311ad9702dc9f0208f8c7a59e91,2024-11-01T20:24:53.730000 +CVE-2024-37505,0,1,b1fe193dc6c7126759136e4a3c2225717174b8d86274f4cbd7f170983b2df194,2024-11-01T20:24:53.730000 +CVE-2024-37506,0,1,a289bc382f4390a9de7327b55e6f27eafb9f3e061db47cfbfbbeab3a8c8661bf,2024-11-01T20:24:53.730000 CVE-2024-37507,0,0,4e09e288241de45505be5c9a204dc926ba463ec216fa96f5e2157f7702b5635d,2024-07-22T13:00:31.330000 CVE-2024-37509,0,0,f9e93ade29c9918317e48d188ce4960d290a72c7e104c763985255a9648c8a2e,2024-08-30T21:20:09.367000 CVE-2024-3751,0,0,ba887ac321a2bfaf7155c820936f84a156f9ef9329c91d46297abdea58a2350b,2024-08-01T13:56:40.890000 -CVE-2024-37510,0,0,fa60961fed63afd7a00fd705555f56ef45a377d4dbde485a016610628edcadab,2024-11-01T20:24:53.730000 +CVE-2024-37510,0,1,3b3574d9d3c683fc5412b3bc70e6d79d2523d947bf218bf7b9b77979d44738da,2024-11-01T20:24:53.730000 CVE-2024-37512,0,0,b154a0241cfb0d8ca130eab910ec84648220c774892017c20117684126ece261,2024-07-22T13:00:31.330000 CVE-2024-37513,0,0,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6cdb,2024-08-16T14:30:47.543000 CVE-2024-37514,0,0,017431762cd806034c0397e7ba3b52966faa01f09615fd1c323b7b13e5887081,2024-09-06T21:26:30.600000 CVE-2024-37515,0,0,04cc8ac0f8833e2b36939b6215917d15f9cb9e17391e30434c678ba392c11039,2024-07-22T13:00:31.330000 -CVE-2024-37516,0,0,7a29dcf5c55ba3f8fc0a1f5c128dc0df5b8874a68f6efc9e58e43320f33c99c9,2024-11-01T20:24:53.730000 -CVE-2024-37517,0,0,34801b5c41debe6c2d1b5e78f7ec4149ec33b7d231e3a528b48f67ca4a507ff4,2024-11-01T20:24:53.730000 +CVE-2024-37516,0,1,6b781bbd01f8a424210414aeb18c7ed4e89b39a908a4784ce4e0380fcd19ac74,2024-11-01T20:24:53.730000 +CVE-2024-37517,0,1,9b3cca04dbde5a6e788180067741475cebf60a1353a5c561cfb4ab4178449d32,2024-11-01T20:24:53.730000 CVE-2024-37519,0,0,06297c4f20b9cadb68ce894a717e27e20a04a06c00ca9b94ef586bc751ac8651,2024-09-06T21:29:28.770000 CVE-2024-3752,0,0,a5efb5effc0a5c4e1d6b4c1affd3679917ceb564b80faf8557eca4784ede510d,2024-10-30T16:35:17.613000 CVE-2024-37520,0,0,1cad459c20e2d875630bdc07513eda15868aad6421fe450388baf16c360c4642,2024-08-29T18:39:02.407000 @@ -256949,14 +256949,14 @@ CVE-2024-37918,0,0,6673dbc8a8909fcbe3d7fcf2914a8f9e3012ce2a80753d8813e12c06150ae CVE-2024-37919,0,0,c8769a1d0c82ad0e3a52e5fc9303605bebd5a9d75185a0d263d89b0fda4b5a49,2024-07-22T13:00:31.330000 CVE-2024-3792,0,0,b2d7f7e579eff1bf3cc457c41f5782185342411a77aac1022f0e4393ef1fd163,2024-05-14T16:11:39.510000 CVE-2024-37920,0,0,841ece9aa1ea243835cd263b19315e4e373408e20d05486ce82b531c5a2511e0,2024-07-22T13:00:31.330000 -CVE-2024-37921,0,0,d0797330f34d001d36b93c724b081613434c6cea71e4fac01bdb6ba28d8648b2,2024-11-01T20:24:53.730000 +CVE-2024-37921,0,1,a74be46d76ced025039e3609c3a6c3111bb38ceab38efc4b4c652efc779999da,2024-11-01T20:24:53.730000 CVE-2024-37922,0,0,2f4d0819be87ffb0bb4af4138b7ceba5a758a2030a859f8658eef95358ab0782,2024-07-22T13:00:31.330000 CVE-2024-37923,0,0,0f277f016f5fbeb4c94053f1c3c5921e348aa14bf063918224f804db2fff94d1,2024-07-09T18:19:14.047000 CVE-2024-37924,0,0,53c6dab68f6e42b1c1e2b7a31c30eca693902824ec6cf4edd11eb8223d0cbca7,2024-08-13T12:58:25.437000 -CVE-2024-37926,0,0,053dab8243c7849d049de3176404843c5fa131055f8a73c0cb30354f4f0a33e1,2024-11-01T20:24:53.730000 +CVE-2024-37926,0,1,fea9b7eab99273c4a65258295b7d1ca9f4498da9166d81a4d4c0ba754ac57fc6,2024-11-01T20:24:53.730000 CVE-2024-37927,0,0,560584f6e7ef315723501d3c62881a4e0c9b3ad1204b52ebcac93863b05e014f,2024-07-12T16:34:58.687000 CVE-2024-37928,0,0,d7c23cfa28358062117e75a096fd1b2a1412e40b95d290b44dda94129c8901b3,2024-07-12T16:34:58.687000 -CVE-2024-37929,0,0,b694633d61d737f0e7860808e78555ef00edfff6a3fd39acd90725039a512ed8,2024-11-01T20:24:53.730000 +CVE-2024-37929,0,1,09f67e3c64877af6410e8e0d996aa67cea9afbf172a01256e4edaf303935e13a,2024-11-01T20:24:53.730000 CVE-2024-3793,0,0,45180ff35ea2c7285cdd371de1244c7a4424d1261f14c1bf7f3ac3169f3ba4b9,2024-05-14T16:11:39.510000 CVE-2024-37930,0,0,0a2ac4ef7b4814e86f44ca394ed951cf784994afd8744847ce673663accca51d,2024-09-12T21:24:59.393000 CVE-2024-37932,0,0,a3ce9ecce9fdf6d7e055cae05e400292dfd3fd5ac50cdfaa9f84e0caa41c69f3,2024-07-12T16:34:58.687000 @@ -257658,11 +257658,11 @@ CVE-2024-38687,0,0,f0cff34686afd44d154a8ccd7570e1d62449845a805d2513aece2d14a15ff CVE-2024-38688,0,0,c5b30a411c671b0fd64a758fbbc25ac95f365e054aa5766ce55f55714b200b96,2024-09-12T07:15:04.813000 CVE-2024-38689,0,0,0d7351b68eb1ca333a04fe4331d97d8f3d9e657db2a8d3347ae1c4f5a70fdfb8,2024-07-22T13:00:53.287000 CVE-2024-3869,0,0,48f9071a6f5d125b2c43fec069da722b087f824997b9c50ca7b95aad4aebfb77,2024-04-16T13:24:07.103000 -CVE-2024-38690,0,0,d7b01034a1983442a392d6f9dfd7e92e8c70e589820d1071887338056fc09a2f,2024-11-01T20:24:53.730000 +CVE-2024-38690,0,1,4a4fdb779e5629efe49098130b17b92d7e657aa1a220d61e73ab1af4da402547,2024-11-01T20:24:53.730000 CVE-2024-38692,0,0,761911cf70aa71c41ae3228fdbacf4aede8e08f3f941d9d59231e75b06896f24,2024-08-14T16:48:07.087000 CVE-2024-38693,0,0,6be8c0dff3a09be819e7261d8207b032e4fbf654937faa0d2a10aa9d4306d780,2024-09-13T20:35:41.127000 CVE-2024-38694,0,0,1103efc1e9ce360d7ec82a8f19753cbf3cd40623925b6ee52c38a61d5ffa04b9,2024-07-22T13:00:53.287000 -CVE-2024-38695,0,0,5b38002389b71fe0d966da032882094a9daf0401500a63fdff39d4bdee9e37b3,2024-11-01T20:24:53.730000 +CVE-2024-38695,0,1,c4b92d579c60921107f58f14e21c1f5e5290c8b682fb7afc650fbfbabd21e49c,2024-11-01T20:24:53.730000 CVE-2024-38696,0,0,35a6f879eecff675c7fba5d08cbcc5ee7b43f7f2731c3465b1a4e88bbc0e1ff7,2024-07-22T13:00:53.287000 CVE-2024-38697,0,0,a46892050e5f82faaa0e187700d3448b5b1a8ffbf648c825fc5ce00de9ddfef8,2024-07-22T13:00:53.287000 CVE-2024-38698,0,0,1edde839f5f793082457812b7b588da594d6a461cdc498477c0986a7fe004fb1,2024-07-22T13:00:53.287000 @@ -257670,12 +257670,12 @@ CVE-2024-38699,0,0,9dc4fb3a23a1923eb67c78f835c6ee925e5259f92c5225e080635609ea46d CVE-2024-3870,0,0,0a94fe58f68a2a55a9a615e303c503c3189a8068ab169c2fe45504536e49912a,2024-05-02T18:00:37.360000 CVE-2024-38700,0,0,5e4bd50c4e7369161e2cd3ff2af0ba7e11eedddf0da3736808759ae69637e2f7,2024-07-12T16:34:58.687000 CVE-2024-38701,0,0,4bca1704192ef9e39c1475283bdb143258f111b519a11e0997d7488545cc6fb9,2024-08-14T16:49:23.597000 -CVE-2024-38702,0,0,83c3aaee06a5eca412e542782b7fb799724f21fcaa15f7601d397cb3743bd2ad,2024-11-01T20:24:53.730000 +CVE-2024-38702,0,1,56f111c37abf80d1484041f84bcc8aabeb3496990a2f2a16562dca0cc64fbdfa,2024-11-01T20:24:53.730000 CVE-2024-38703,0,0,8da97de0eca44bd630905a264a2fe68c0dbed2aad3e387fa9180d6556b76dd3e,2024-07-22T13:00:53.287000 CVE-2024-38704,0,0,4481bf9663cf5e761072281a274978c9f28d3f8732259ca9cf6564c05d952ac8,2024-07-12T16:34:58.687000 CVE-2024-38705,0,0,454c37d79b58c27d480acbf5ccc7aa1886c7d7f6890fe90bac7c475c560994d3,2024-07-22T13:00:53.287000 CVE-2024-38706,0,0,bc1c6120656b22417bfff35be04bf89c603493fd07851685ec21a31d616a8700,2024-07-12T16:34:58.687000 -CVE-2024-38707,0,0,498cf07d4ce1e307f43f839428e0935fa8bb36fb83a234b937640df313699297,2024-11-01T20:24:53.730000 +CVE-2024-38707,0,1,e502e90a4e2fb3a1268f0d9c70c11e8a6c23a043266104020d117d232829a6fb,2024-11-01T20:24:53.730000 CVE-2024-38708,0,0,9491f4aec83e28b6dadf9df80e51e433f3e787a830bfa056ed5744b70915fade,2024-08-14T17:32:21.527000 CVE-2024-38709,0,0,4f9ae4266ff30a5d962097245ce5637fb8a4595bd9581e2dc5c03a51bc1e32fa,2024-07-12T16:34:58.687000 CVE-2024-3871,0,0,90287ad4f5985e2858c6a2871acc4eb3b54c9c754d7a17300cf2ed0c74400b4f,2024-04-17T11:15:11.403000 @@ -257683,41 +257683,41 @@ CVE-2024-38710,0,0,57bfb9c0df270cdc78308371ffb37ecaae72fa7be7107b59ee89b200339db CVE-2024-38711,0,0,65b913f1865b41e251ebff073eaba7d540f0c3b2e1a4e5c4e9f5d798ee303beb,2024-07-22T13:00:53.287000 CVE-2024-38712,0,0,1bceae55b243c4b105208926a5e8d701ccf37b3edffb498e077f0429c98936b8,2024-07-22T13:00:53.287000 CVE-2024-38713,0,0,52f475ed9675b5d3686d5a1f6469eeb2d093d6aa37de8882a2cba543b41c0426,2024-07-22T13:00:53.287000 -CVE-2024-38714,0,0,8d1a89689f116373430eac4d715487b037e056d939f814c8ae25132f7a280b4b,2024-11-01T20:24:53.730000 +CVE-2024-38714,0,1,c1a5a9996055c174d855fefa5da06ae27476ea0935a15a75278ed581ccf30549,2024-11-01T20:24:53.730000 CVE-2024-38715,0,0,6a4b0207630d22f555502a79b9d38431487553537fdd58b26869148c10d2c74a,2024-07-12T16:34:58.687000 CVE-2024-38716,0,0,93b87aa6a5434ab35c066f1f5f5280484f33d7da1d3c52148bf5d7be904d084b,2024-07-12T16:34:58.687000 CVE-2024-38717,0,0,acb267f01eee4f1340adddc7b42d754b24ea4236ff7c8a186093245f81a99250,2024-07-12T16:34:58.687000 CVE-2024-38718,0,0,828a00a40684b646175ed51d0f4ab199fc804d7ae13acb77ad0392494802860c,2024-07-22T13:00:53.287000 -CVE-2024-38719,0,0,b9409fd0cf7f2c6b333247df377046d72b57ce66ab2072a2899acba748db5cf4,2024-11-01T20:24:53.730000 +CVE-2024-38719,0,1,558fc9d0489eed79224a7a156a4475c1211eb31a6805d4078e9344637015ec88,2024-11-01T20:24:53.730000 CVE-2024-3872,0,0,e0746b0ccf3c2bc5c1cf6b271b7bc58e10aa7c45ec1e77f360e4d291ead633b8,2024-04-16T13:24:07.103000 CVE-2024-38720,0,0,f9b8c8ed2efe93225496b04ed9fba739cb8ba9d99b25a127d2bb4233a5d4753d,2024-07-22T13:00:31.330000 -CVE-2024-38721,0,0,cc95e910eb3095552e7824daca971456bd6574fa20e1527adc53bd4b74527e81,2024-11-01T20:24:53.730000 +CVE-2024-38721,0,1,2e39a341657432ab51cfa2280e807b11c781728c410c172e5938f39e251a5072,2024-11-01T20:24:53.730000 CVE-2024-38722,0,0,ac4063575d52a48f994e5dc466d71dd1e5a91f3a1145c47a0fe2a10e4850fe33,2024-07-22T13:00:31.330000 CVE-2024-38723,0,0,ff56077abc772a5329f8a4b28abcc48d9fa281551515b5769c556be9215b98f3,2024-08-14T17:30:44.340000 CVE-2024-38724,0,0,1ec6d6cc6d6ec23c8a02c2229b4b2deaffe5da0718c0874d1d97b5cb58cc0119,2024-08-13T12:58:25.437000 CVE-2024-38725,0,0,7ebdb10d062cd40a3fc7776e923871f38820bab7217d8965a48109a6cbce5191,2024-07-22T13:00:31.330000 -CVE-2024-38726,0,0,13729ce25223c7ecfc657bb887e0ce5797d240f822dc6527f3ff6833e6a2ba15,2024-11-01T20:24:53.730000 -CVE-2024-38727,0,0,e56cf485003159b6ed22ab9b35d7093021e96c5af5582f46a6d799ec83919857,2024-11-01T20:24:53.730000 +CVE-2024-38726,0,1,c0d65f860751e9bf7573721bed1e7db030445e2d6ac76b00dd3c8b6dd088c159,2024-11-01T20:24:53.730000 +CVE-2024-38727,0,1,84e8c6749e3fee367fae09feea83894db8a0199d21ce0973e634152f98ba278a,2024-11-01T20:24:53.730000 CVE-2024-38728,0,0,ed1a3c6d96df209d3dbe4327cab38879537ea764c5a5560f4fbbe49aa55b6d6b,2024-08-14T17:29:32.207000 CVE-2024-3873,0,0,9f41cb948a87fde9385789dcbf920beb2d5b41b44037ffd26229becab16e904c,2024-05-17T02:40:09.627000 CVE-2024-38730,0,0,8cee75324e6a06c36bb6d74cc95dbdbcd51c1c467632b743407139f82be2d75e,2024-08-14T17:27:52.020000 -CVE-2024-38733,0,0,ea56a7e3300ad830666f7dcb1f0ddd0b1eb944fd559d84acb8a2c91536faedbf,2024-11-01T20:24:53.730000 +CVE-2024-38733,0,1,3b6ee99a70a4074dc6480971524cdf1237255b2b06037e962d5691acb022a049,2024-11-01T20:24:53.730000 CVE-2024-38734,0,0,5e5550db423206b3287eb8b98f339756ec6892a560808172d7fddff22ce9bf70,2024-07-12T16:34:58.687000 CVE-2024-38735,0,0,24ba375c9d2a8ca94f43acbd644f165374c601f6a3733ad0666240f60a2fda04,2024-07-12T16:34:58.687000 CVE-2024-38736,0,0,d4f391e3a04aa95a3cf803b6f35b1a54184a4c778cbb381888222678b6215e99,2024-07-12T16:34:58.687000 -CVE-2024-38737,0,0,d35d37b1b90aa920eeeb131a1d9a061ec0e8c391f18ccc28675ea2836d03774e,2024-11-01T20:24:53.730000 +CVE-2024-38737,0,1,95a79c640c70bfb9b32940cbfb71cba4ccd728a1c8eb6cb796544c899e876baf,2024-11-01T20:24:53.730000 CVE-2024-38738,0,0,bc587636026bafbf557ab7ba8ec07e058c1701d82e90dc0010a07705f8e614fc,2024-07-22T13:00:31.330000 CVE-2024-38739,0,0,e943ba897b18a5e605971ababc29ec37d438434e3cdbca441e7fccf03f6560b8,2024-07-22T13:00:31.330000 CVE-2024-3874,0,0,f386620c295e4adf2d0e1bcb131bf4999519006b93485a0a9655b1dc65db42b9,2024-06-04T19:20:25.697000 -CVE-2024-38740,0,0,a2f6f4cdd13489972321e971350935c8d4538d1f5e85d6b13e938a9494a6800d,2024-11-01T20:24:53.730000 +CVE-2024-38740,0,1,bfc198cfc14fcfed37504b5933ff3d4843282b22eccb9791d952d84626c8a963,2024-11-01T20:24:53.730000 CVE-2024-38741,0,0,ba8ea7a8f0396a64e75e460984ae328b0142ace4ad761010bd9470b3238b8238,2024-07-22T13:00:31.330000 CVE-2024-38742,0,0,2b2ff40c9390eb16cbb6b77bc0e5766c5b98a76fcc9a9cfec9c6d2178301313a,2024-08-13T12:58:25.437000 -CVE-2024-38743,0,0,4aa7cf7d6f375e5c2981059f501609cf73b844b928799844d07668411cfe30c0,2024-11-01T20:24:53.730000 -CVE-2024-38744,0,0,253f1aab8978688cebebb007e34e6d1d254379034a0ae1bd3fedefdc246669c5,2024-11-01T20:24:53.730000 -CVE-2024-38745,0,0,61968266657e415f7f21a1cbe3f9c8b5a6455e2d86cdc88f44e918b512ef9ea5,2024-11-01T20:24:53.730000 +CVE-2024-38743,0,1,29342e1f3a7b7d6ace9f86d538b4d658c5936a300db2ac0b314f5e09bb9d85ea,2024-11-01T20:24:53.730000 +CVE-2024-38744,0,1,cd77ad7de85745b2d1c53b5918f813d67938a973ac2da5228b88fc3122a97ce4,2024-11-01T20:24:53.730000 +CVE-2024-38745,0,1,1b9ee745c6656efe8f455ac398dee0b3a7cd61c2a8e20e24828a667f5d33b138,2024-11-01T20:24:53.730000 CVE-2024-38746,0,0,988faa32e10f00cdfc73197d6a4b5a9effdd55c479491e986d878e425b43dc75,2024-08-02T12:59:43.990000 CVE-2024-38747,0,0,3874f9efc241c8f3e8f92c15ce348563d04094148c87fa7b90ecfd1eb8c132ac,2024-08-13T12:58:25.437000 -CVE-2024-38748,0,0,ca6ae3e436365d70fd0fa2b5f7a55d2614685ea97a930d9a3e01b2e335618841,2024-11-01T20:24:53.730000 +CVE-2024-38748,0,1,25e073f7e676d298ff2630a03ffa9173446081a0376e8918569761a13800cea9,2024-11-01T20:24:53.730000 CVE-2024-38749,0,0,8b120704f3be801c93af8a7f70020f2a9f2f3f2d6c5d0aafef24936c2473abf8,2024-08-13T12:58:25.437000 CVE-2024-3875,0,0,089beeefeb959936719f61ddb82cb79408bd763795142eb9b4bb9ae3be3050ea,2024-06-04T19:20:25.807000 CVE-2024-38750,0,0,222ab97d7171c5f5aa490a3c05e43069eeeb208df63406b1a04c82e08ae0bf5a,2024-07-22T13:00:31.330000 @@ -257732,21 +257732,21 @@ CVE-2024-38760,0,0,9f3088d6f98471745807377f5377a76fd5b9da26d9f3232072524fbe01c9b CVE-2024-38761,0,0,163d643979adbf8920122e6726130a646970ec33787f98daf4f56c619ee9308f,2024-08-02T12:59:43.990000 CVE-2024-38767,0,0,a9b15a0ff3a2a53c65d6a5d7f54955d34e929127b2676eac528e66287825a41e,2024-07-22T13:00:31.330000 CVE-2024-38768,0,0,95304e2a98b024fab4e11f928777fafec4b510f27612acafcf61c70a99635beb,2024-08-02T12:59:43.990000 -CVE-2024-38769,0,0,dfe5ea0f8c5ac7c0ee3f6d2f9f347f84dc4d594a310d6ae801aab7e8c5aa1683,2024-11-01T20:24:53.730000 +CVE-2024-38769,0,1,a3493757362c764ee602b4d2baa2773ed05309c7f69e6cf54e259f5a672e9e2f,2024-11-01T20:24:53.730000 CVE-2024-3877,0,0,4a72fb3a60020d6583c10cb3aed384330279f0439794d97578698eb4f04c72aa,2024-06-04T19:20:25.903000 CVE-2024-38770,0,0,cf282eb6e9250000d24e24f7eba0abf43d7572a51eec979555e27d06072363cd,2024-08-02T12:59:43.990000 -CVE-2024-38771,0,0,7c6e462c3236bf1f7265e8b677859476f46e7a46e650f4db1de270b8946386c6,2024-11-01T20:24:53.730000 +CVE-2024-38771,0,1,f813b4bd42240f88d415893896c22a8518e6ef659938b91add38965906c76d12,2024-11-01T20:24:53.730000 CVE-2024-38772,0,0,2088a6ca56eba9b1c70dbd09c25d2208191078c7b2e89f244ac70d58bba164bc,2024-08-02T12:59:43.990000 CVE-2024-38773,0,0,5d394704183bf3113439eae0fcd28f045140d75f19cf8a77fe07b6f63944fbc7,2024-07-29T20:07:57.597000 -CVE-2024-38774,0,0,ce17c0033fceeb4e3dbc48c2fa3b3893f8b08e172547eb38fec0d8b7fd37b2ba,2024-11-01T20:24:53.730000 +CVE-2024-38774,0,1,efd698f8a630c43eebbffd6a8ef23c152735264b9bb1c54d421d11d7de4003b1,2024-11-01T20:24:53.730000 CVE-2024-38775,0,0,b20640c6b5960355c14d80910406570e8b8f2cce152133e48f99df05d828829b,2024-08-02T12:59:43.990000 CVE-2024-38776,0,0,5c790265ce1d2f44ffb1719eda7949bf68f0a7026da70e2bf9162286b38f9c58,2024-08-02T12:59:43.990000 -CVE-2024-38777,0,0,1b04abcef48fdc7a258bab98619a00025dcc2d8fba41b42be58e44afab61b127,2024-11-01T20:24:53.730000 +CVE-2024-38777,0,1,140db25b3daf18ea5b316bae6ba8a30a3dac92ae6be3b7765454316f4415957a,2024-11-01T20:24:53.730000 CVE-2024-3878,0,0,5053df083f23b6f337fe4f8fdf53fe0df42d421dbd3425cfd92b488e4629a9db,2024-05-17T02:40:10.087000 CVE-2024-38780,0,0,ae16337cc2f7b6345cfbc91dc7be992225f0e3cd48711d005c1594aad3b12d58,2024-07-15T07:15:14.603000 CVE-2024-38781,0,0,ad20639ae5229215377edc21882efa4f51ee03e1681dfd2ff9bba433bb35e6ce,2024-07-25T15:50:29.157000 CVE-2024-38782,0,0,6a0be8e9b82da765a38c168f9379b39fb33153476e0513dd2ae6a8ab51f61d6f,2024-07-25T15:49:56.380000 -CVE-2024-38783,0,0,ee1923a7738e6377082d98fcc0d0c370b06f93bd1c32b4cc81d8a3307ec1f66a,2024-11-01T20:24:53.730000 +CVE-2024-38783,0,1,3c8965a958583f42a9c5c9e778d774f9cd54cd3b57edf18c0817e52638a63db4,2024-11-01T20:24:53.730000 CVE-2024-38784,0,0,68643de9ae936963f628fb861e48c54d8865838667917b2af37f3e4b54727ab7,2024-07-25T15:55:31.213000 CVE-2024-38785,0,0,1449b2ac862365f3baee2eb77470d4db33740002d25748517f05870fff11903e,2024-07-25T15:54:37.577000 CVE-2024-38786,0,0,23327703659ded3b4e2e8a097a9d1da3633ff8f92d32364fd6984503c0102bb5,2024-07-25T15:54:12.073000 @@ -257754,9 +257754,9 @@ CVE-2024-38787,0,0,0f1e7f4afcb5fbe9535514f1a824c8730251f75282d7daebf1c4763462ac4 CVE-2024-38788,0,0,d7426c90cb2d8e681f652bb3f7653d0e61fa19ddfa46c34abe44c6c5e4e37176,2024-08-02T05:15:30.283000 CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000 CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000 -CVE-2024-38792,0,0,96f4202774d84f4cf0718c1596ea2f492e8fbba7688eb5232460819ec032c4bd,2024-11-01T20:24:53.730000 +CVE-2024-38792,0,1,5b519dd0c92964123f827781527184beafd48bba42a30bc8682cb043da48da22,2024-11-01T20:24:53.730000 CVE-2024-38793,0,0,8ad7655f99bb4b3fa4f36342468e0b68d719584b816ac8effce8d0ff63e4b98c,2024-09-13T20:57:16.150000 -CVE-2024-38794,0,0,f30a08e442f5951d447fcf3f1894cd0e35c779650d3ae0cd0aa6a2f2fbe3d2aa,2024-11-01T20:24:53.730000 +CVE-2024-38794,0,1,a1751b8cf7a38a8fd06679d7156a15e060095904b59bf6ad6d0a13d5b62cdfb0,2024-11-01T20:24:53.730000 CVE-2024-38795,0,0,83e6ed558db6ed1b1b849abb4b7528bc0fb3b0856b9448de9d080b54c41c3121,2024-08-30T16:31:03.887000 CVE-2024-38796,0,0,3d9cb4aa62a4ae6711850289216ae812a45627870de9e62adff5833551edb19a,2024-09-30T12:45:57.823000 CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26 @@ -258013,7 +258013,7 @@ CVE-2024-39329,0,0,5aa2655955d12cfc04b5cd596dd516d231115449b8be168ee40469f865a39 CVE-2024-3933,0,0,92b73bce365e98fcc06e62daf24ff5ae07fa4b0e34a70b4d4c68931454994bbe,2024-05-28T12:39:28.377000 CVE-2024-39330,0,0,9e7895019524ddb3aaf7c3e3c807da6e11fc30081c4029c811ea260ab40a545d,2024-11-01T15:35:16.783000 CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000 -CVE-2024-39332,0,0,c45d3a16d900c3a32f364ec197299d9fa083202fb226adfaa80ac6e38be0413c,2024-11-01T16:35:21.290000 +CVE-2024-39332,0,1,39f11a9824b5cd6a22916be79dd1f3a78a1c3b52470c401f6240e6f15d8b8a55,2024-11-01T16:35:21.290000 CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000 CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000 CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c28af,2024-08-23T18:35:36.313000 @@ -258274,7 +258274,7 @@ CVE-2024-39620,0,0,8135803ed41925e53730b72fe1e4456337953372d2cdda9216648b7c8361f CVE-2024-39621,0,0,0c249e1c45f38e7803d96351e629758e9c24acaebc0fdee9ecbe6f2310164e1b,2024-08-02T12:59:43.990000 CVE-2024-39622,0,0,5e7d7bcbe4d60960bcc7d0a35a948631371ae2277c1c9eb9831f372ee1fb98f9,2024-08-30T16:30:11.797000 CVE-2024-39624,0,0,61c5c17120773e760fbae9a7958d22954be8f7c181114c13133411959f35ed43,2024-08-02T12:59:43.990000 -CVE-2024-39625,0,0,f47d79fd2b9a70b551124e8915c9560752872133a203ad833bb0e5912ccec7bc,2024-11-01T20:24:53.730000 +CVE-2024-39625,0,1,c16d06699f30876d66dd3abca2ed47c177880c898d92dd8ca3d7fc3654b4a455,2024-11-01T20:24:53.730000 CVE-2024-39626,0,0,1b1d91def172e0cc6e757efcafa7943028f614721770775c3d1407b25fc30784,2024-09-17T15:07:49.433000 CVE-2024-39627,0,0,07e13c8e7805345d34bba365100ff9d8fb4b41c5994c06908b9aa5fcd6462ce6,2024-09-11T17:35:37.523000 CVE-2024-39628,0,0,fece6d900508fba18ce7bea4ae0cb4961aa1689bbd1f1c60153782b6282efec8,2024-10-20T12:15:03.160000 @@ -258284,13 +258284,13 @@ CVE-2024-39630,0,0,b9a415bc4650f8f2437ab21ad7881d5052dc8b427d419e2888cd7dd33acce CVE-2024-39631,0,0,ea38a64cfbcf13f28ceac2f9bda87bb53247f9431226fe4a5a08c9a522115fc3,2024-09-11T17:34:08.967000 CVE-2024-39633,0,0,fc0971d1bc8793039b4953353803c462b62ac233474e83dd34dde3ab5704290d,2024-08-02T12:59:43.990000 CVE-2024-39634,0,0,b68dbc093c134ffec6acb55cc59fb6f5bc0edd749d548af565529e002e00c7c7,2024-08-02T12:59:43.990000 -CVE-2024-39635,0,0,de70c45d07db6614d3e443df9460115ba902119a62dfce68d14c6216ecaf4985,2024-11-01T20:24:53.730000 +CVE-2024-39635,0,1,c3cfc4825d55542ffdabb5876ed832ae733b667289d696db0cc2e5fba08126be,2024-11-01T20:24:53.730000 CVE-2024-39636,0,0,356132dd8c4585470fbd20a2862e8961fed4fe21f88d52a87134f7776cb4d243,2024-08-02T12:59:43.990000 CVE-2024-39637,0,0,80fe3bc57b73ad9ac108a5a969d2217482f3be0bb280f01a4b7e247941a392f8,2024-11-04T22:35:05.700000 CVE-2024-39638,0,0,cf36aae6a91cc72ba13b071b9e149e2fa798a9f572f58ede9d761408ecfcdde9,2024-09-13T21:00:44.173000 -CVE-2024-39639,0,0,c892bca8e5f4fff4c1ed6dadeda295fe8620f9e4f2c22d8b274a7931f62cf1d0,2024-11-01T20:24:53.730000 +CVE-2024-39639,0,1,b60079a59d91bbe0087d51f2024abea78c89ac8651b74f784f28ae10668ff983,2024-11-01T20:24:53.730000 CVE-2024-3964,0,0,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000 -CVE-2024-39640,0,0,f9b577656c273fa995ae303d96d69c4abcc7d9d986726ddaf878678abc61986f,2024-11-01T20:24:53.730000 +CVE-2024-39640,0,1,08f07fe087d4f35c2561a075325dc841919ccfb64e7d029a117a3c8c3b30308d,2024-11-01T20:24:53.730000 CVE-2024-39641,0,0,ca72e5c4e3f4eb62161dc132924c5912f001d38eb9b77d0e12deb21361b22d88,2024-09-18T16:57:25.417000 CVE-2024-39642,0,0,a5907a7ba9601cb47d5213c09a225012a1c028d8945a3fe4fa6d61abfa537ebb,2024-08-13T12:58:25.437000 CVE-2024-39643,0,0,1dded6874da74e5afbb63537b6a34aae6868db25023597eaaaf8ae23d994ee0d,2024-09-11T17:33:14.787000 @@ -258301,11 +258301,11 @@ CVE-2024-39647,0,0,76302d6bbf2afe03f0e6f6bafa6326bb4eb55afa326a015b16287c96fa3fb CVE-2024-39648,0,0,ab9faea09f5f33bcf9880e5ab21b0ae5b90092067a818bd60c5199b0cda605b7,2024-08-02T12:59:43.990000 CVE-2024-39649,0,0,fbd73aadfe0b4a459c28dd4d378a42dbf18f4c17162b2c287c459e7740d56ebe,2024-08-02T12:59:43.990000 CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000 -CVE-2024-39650,0,0,7eb8e71cded7700e42b06732692c3a861eb8da3851e24c01bb8572966f49e498,2024-11-01T20:24:53.730000 +CVE-2024-39650,0,1,1b392b26582e57894ecfd542df898fd3f8efa2ee0d0207cf724a4803238a754d,2024-11-01T20:24:53.730000 CVE-2024-39651,0,0,7d85dfbdb174a6f544eaa1e3819a7aaa062f2afb0dc7664ef14d20fe53cd5df3,2024-08-13T12:58:25.437000 CVE-2024-39652,0,0,f0c2e1305e128fc4254bcfdadc56a769f26cdafb9e9828cd6a3d3d5cb0f0b69f,2024-08-02T12:59:43.990000 CVE-2024-39653,0,0,0026393f263db329d590d78b1320546a7038443749754db62f750d848ebdd5ca,2024-09-13T21:03:21.327000 -CVE-2024-39654,0,0,d911c42748e2432c640422d0f49422a8c96915339425f409a17c7dbe01235879,2024-11-01T20:24:53.730000 +CVE-2024-39654,0,1,5111cc0c9bc720d25ca0f35cc18557f09a04664855934f1d6f11050bf90ef926,2024-11-01T20:24:53.730000 CVE-2024-39655,0,0,e8990ae109997ce183e7ec6503e4dae3b8dd97111e423903b7d9d645e6d064e4,2024-08-02T12:59:43.990000 CVE-2024-39656,0,0,41595071b9c98d363bce33f052284f93eb7b68d4fe24b85d68eae6cad1c3cf98,2024-08-02T12:59:43.990000 CVE-2024-39657,0,0,c6d102523d8502c5965e9c05065be9a6968ad4f166e3ac731a39908b2a4154bb,2024-09-18T16:25:32.703000 @@ -258316,7 +258316,7 @@ CVE-2024-39660,0,0,2b50deef651f27c87abd29110a94a6037b7dd1c45da64101f17c9a9b365c5 CVE-2024-39661,0,0,3f1668a68073bea87fcbf672ceb545c5a59db448343e0d059e706cf687088fcb,2024-08-02T12:59:43.990000 CVE-2024-39662,0,0,ecb8cd04dc8c581f4fd22cff35dcfdcc1a520a4f1c785762e812b3c3e81a9d07,2024-08-02T12:59:43.990000 CVE-2024-39663,0,0,5485eaa9a0e5d035b45ebfad60ac233472860db52699a29a8033be0ed950f5c1,2024-08-02T12:59:43.990000 -CVE-2024-39664,0,0,e368236b7cc39e76e13fb74a6e3c0d92679aa29273055ab59944fa02e7d6bef6,2024-11-01T20:24:53.730000 +CVE-2024-39664,0,1,d7f731af7117289c4b9f80cc36d16b203fe0ad54e6080b01d38a9f7f8b19d7ed,2024-11-01T20:24:53.730000 CVE-2024-39665,0,0,09032edffccd86a516bf404f98ff59a6b17bdff21bd482e1c39e1f40936a2fc5,2024-08-02T12:59:43.990000 CVE-2024-39666,0,0,2d74731055b1802e66cb9880637b8ec2f4b01b3ccc50d23530357b4d0b70fed0,2024-08-19T12:59:59.177000 CVE-2024-39667,0,0,483e2b41258c01952d1dfafe22eec63feafc1e77df76287d6f99eb2cf4ad80bc,2024-08-02T12:59:43.990000 @@ -258367,11 +258367,11 @@ CVE-2024-39714,0,0,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b047459 CVE-2024-39715,0,0,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000 CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000 CVE-2024-39718,0,0,116d4c704ecdda3f39d6049d166eceb718bb7e8447d879858815362938f8cf09,2024-09-09T13:03:38.303000 -CVE-2024-39719,0,0,0f05bff4371078efa287bdb1a9c4c43754f1365517c29a0a2dd5fa9b922a1cab,2024-11-01T16:35:22.233000 +CVE-2024-39719,0,1,7f53132ba87957a1b69279db122d5873b1c55ff16837696c4f26be1266973594,2024-11-01T16:35:22.233000 CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000 -CVE-2024-39720,0,0,fee0a5164f2473098226ac56f56c488d29ab9633ba3beface24944fe1dc0ce10,2024-11-01T16:35:23.210000 -CVE-2024-39721,0,0,04ba6fd9f98b72aab927f9c82f103ee46c215a7f4e75f2e684ba9a7645888cc0,2024-11-01T16:35:24.357000 -CVE-2024-39722,0,0,2502eff6afec518c66a2a39d0205d6f1717cbc436dfd7e88b0ecee4ab19862c1,2024-11-01T15:35:17.693000 +CVE-2024-39720,0,1,d0abcb66b33d9eb5538e2c3f6b1c0a5ec90e4231fb92eae0b5bdb3698a665b56,2024-11-01T16:35:23.210000 +CVE-2024-39721,0,1,a53f4a408292484f4e31830b23f4d1e9fa44faea82210aef0c3385e6a6ce66da,2024-11-01T16:35:24.357000 +CVE-2024-39722,0,1,08a96543a5db4fbd3fecc413584aca3682c28f3fb47ec14ffd29adb20a7fbede,2024-11-01T15:35:17.693000 CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000 CVE-2024-39729,0,0,bfb0ee29aaef980e2b91ef648868f4c0e36729a7e019c3fc9d2073fdf0f8ba3f,2024-07-16T14:02:53.577000 @@ -259501,11 +259501,11 @@ CVE-2024-41734,0,0,ee1445b5a6c50fe46a456bea41ccb696f4523dbb75f2650033b52fcf021a5 CVE-2024-41735,0,0,9b1bcbea87f6f37440d1c449d6340c711ae945b18c9cda4029f4e601f348537e,2024-09-12T13:53:32.993000 CVE-2024-41736,0,0,f12f0374fcc58eb9fac9e1d169220d47e16a0e5ad6c2e28256d8df041476b834,2024-09-12T13:51:42.727000 CVE-2024-41737,0,0,bcc2c31b9f08a899ad8c6d2953a09d2c0889e7eb08f1011b3147192ea690de38,2024-09-12T13:49:41.953000 -CVE-2024-41738,0,0,dd50dd40a5d2c286cfa84a115e87885b051c737bd68d32367c930fe77f1e5407,2024-11-01T20:24:53.730000 +CVE-2024-41738,0,1,4efab88de529d1709dd37e7b4c462899323e09e9f1086b1299191256308a84b4,2024-11-01T20:24:53.730000 CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000 -CVE-2024-41741,0,0,ce823f6874f4ece383e879fe4aa1516f177a3f6d96e744537fb3ea24353197c5,2024-11-01T20:24:53.730000 -CVE-2024-41744,0,0,62f8bbe8744716e3ce96e92b566f11d2e04fbb3f31f4c73367daff55d19c2364,2024-11-01T20:24:53.730000 -CVE-2024-41745,0,0,ead2009c0932b09b7f172c90092a0055af855786ebbc505aff14d0b60fbb24b0,2024-11-01T20:24:53.730000 +CVE-2024-41741,0,1,a5849c0737a5fc5cdca9a5fab4a979a4e60039d70cf014b49f4fd62777760773,2024-11-01T20:24:53.730000 +CVE-2024-41744,0,1,fc4eedd1a4bbdd823b105499b0a912c465f8e205cf09b2d4f8519632cc3e2fd2,2024-11-01T20:24:53.730000 +CVE-2024-41745,0,1,33b6213f3cdb5e0742b91b08da2cfb6951f537645032e7c87f4be371dc6d2024,2024-11-01T20:24:53.730000 CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000 CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000 CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 @@ -259687,7 +259687,7 @@ CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000 CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000 CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000 -CVE-2024-42011,0,0,780f257b76975d0fa98da03e1cf55c93a899ebb5f320ce83ce248dea2ed98368,2024-10-30T18:35:10.283000 +CVE-2024-42011,0,1,a3ea4f6f0f3e7208f0962f4deb8e685068a3141be0a2f4cf4792277b3bdd2d30,2024-10-30T18:35:10.283000 CVE-2024-42017,0,0,88bb092060ad69b0ffe1434d2d5d47cfc3d35d9b74da347db32bafd31660675d,2024-10-29T15:35:30.713000 CVE-2024-42018,0,0,d36c2d25618197055a9fa3c5f3f119418108bcdef04b170d040ef1fa8d21ed3f,2024-11-06T20:35:23.377000 CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 @@ -260003,7 +260003,7 @@ CVE-2024-42368,0,0,de4f48ab04f32dd7f3db383df19cc416867f89e8ecae60c2fdd0bef001ee0 CVE-2024-42369,0,0,2db0203d9e1c9ed86d7e5fe91c7527c5d07f66504aa58aae16d195697c2bea11,2024-08-21T16:01:03.147000 CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000 CVE-2024-42370,0,0,62e839a91edcd64bb21dabf32c60522dd52dc9540883662a6d8c03c0ecbecadd,2024-08-12T13:41:36.517000 -CVE-2024-42371,0,0,690b804c480d5cc3628aea98aecc9c85059a86da335e85ba28cb0b52a05b1474,2024-09-10T12:09:50.377000 +CVE-2024-42371,0,1,f8671ba77e17492262f6b6323bd0f75755bc55999a70f1247a3b42a51bbd5e7a,2024-09-10T12:09:50.377000 CVE-2024-42373,0,0,0a911f8c7b65a5ac6f64a8e43f34010f8e931ac83329dff9f7884c56f10ce33a,2024-09-12T13:26:37.753000 CVE-2024-42374,0,0,f269e9c4776cdc5b8dc54432285004e2049939b4c19e5a365ffb07a0c87786a3,2024-09-16T16:25:54.430000 CVE-2024-42375,0,0,f88914f78c046f57acc08161978ed742ad9df5262df6fb06ce5cd75ac24c71ad,2024-09-12T13:46:39.527000 @@ -260012,7 +260012,7 @@ CVE-2024-42377,0,0,9face528ce5b147140c71d88d734a9d4c3870323279e5a3837b9bee3a938b CVE-2024-42378,0,0,ed3c29cd04dad91d13a86cdbb0dce43700fdc4ea711c91735e1103cb6c6b554c,2024-09-10T12:09:50.377000 CVE-2024-42379,0,0,3df4e462d3527273fa2a98871af6d02d089a425040231b6521435b06449dcc55,2024-08-30T20:15:07.623000 CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000 -CVE-2024-42380,0,0,d411311e0f8faeba8e1e2c014780bbffd7dd4ccddf85bd3299ae54305bf6f4ef,2024-09-10T12:09:50.377000 +CVE-2024-42380,0,1,5abd276ef303a0a04718583183567bd8e789e2a4185f71fabf777d854e3f8a5a,2024-09-10T12:09:50.377000 CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000 CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000 CVE-2024-42393,0,0,dccd6d06051b1376b790b00ce1bb00ad00ff605de076bb7cd98815c096883960,2024-08-12T18:22:45.023000 @@ -260107,7 +260107,7 @@ CVE-2024-42508,0,0,2c3ef74dc61a212f49afeae18d3d774e8682eccbc5f7d8b0e3beb27e142f7 CVE-2024-42509,0,0,7e5e766d42629dcd17e93fc89359fde8ceec919dd272a7a267959d151cfe5121,2024-11-06T18:17:17.287000 CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000 CVE-2024-42514,0,0,a1f5f6b924755707c5bb385a67dc5d2ee260ba09c0f77899dd6a3e1d47eee9c5,2024-10-07T19:37:19.973000 -CVE-2024-42515,0,0,66dcceef311373a35ba4e831215995cdb4f7e029306e1c3ea8202ae369fa7137,2024-11-01T16:35:25.690000 +CVE-2024-42515,0,1,6b856ff2d3ccc27e778833e71d8a7ce0e53b4b0dcad0a943624f8a95e51fdc26,2024-11-01T16:35:25.690000 CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000 CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000 CVE-2024-42523,0,0,e7f13531824456b37c381b164195bec4f01c74ddaa27da31139f6cf4c536fef0,2024-08-23T18:35:03.563000 @@ -260291,7 +260291,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95 CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000 CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000 CVE-2024-42831,0,0,81c8fba77a06683f68ef3418776fd6a90738b17ea781218e5200d9ee57eaad3f,2024-10-10T12:57:21.987000 -CVE-2024-42835,0,0,841b5c5b2f08ee3e9b44de5dac0b4a49ffd164bde7186ca030cd680a32de71d6,2024-11-01T12:57:03.417000 +CVE-2024-42835,0,1,fb2d538cbd8f88f1ce5aec6568bdd53758673ed888c26df71bdc646cb1d289fd,2024-11-01T12:57:03.417000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000 @@ -260407,12 +260407,12 @@ CVE-2024-43113,0,0,7e6f0ba01b475bb6cfca73e8eda2423288e38b8146984d081803bef7596c3 CVE-2024-43114,0,0,00a7e03d6d46ea413486af76a04e2163909eb9aea862c173dd501cac60ab9e3d,2024-09-11T19:11:11.257000 CVE-2024-43116,0,0,cc0346e2fffb3d2e9e7819fd9105c9b799a7ef170e103991490ffc5ef5ca8367,2024-09-18T16:22:14.880000 CVE-2024-43117,0,0,745d28d8f65b32535ad91ee9bfd0009d1fb808a4a68c830aa6c4c6c97d69d777,2024-09-18T16:15:04.373000 -CVE-2024-43118,0,0,4406b434e00deb45d4b2916176b6c5c4271776be18f84ad83900983175a8ca66,2024-11-01T20:24:53.730000 -CVE-2024-43119,0,0,790841271f4a20bf7433b8fcbfc255dc81e88017f4740c22040cf43c13b2b4ed,2024-11-01T20:24:53.730000 +CVE-2024-43118,0,1,aa1d0e4031a001fe13739b8077c927c24c49ae01e0cf2b441b18df9a628c1053,2024-11-01T20:24:53.730000 +CVE-2024-43119,0,1,1f7c4f96dc048235ad2bc707109b3605fb00884afaf0638cca452643c8e05aaf,2024-11-01T20:24:53.730000 CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000 -CVE-2024-43120,0,0,afdfe0e82b180e591cf32480500d10d4e50c85358a6df31f430c8e2f6e10e5fc,2024-11-01T20:24:53.730000 +CVE-2024-43120,0,1,109ce35c840ca229ff0ec37b30c46d61a5dfc493ed37f3849f23846288df0818,2024-11-01T20:24:53.730000 CVE-2024-43121,0,0,884448e43dc9ae9d5a0252fdc685aaca71ba0c463694388bbaecb1cd420cb155,2024-08-13T12:58:25.437000 -CVE-2024-43122,0,0,a23d19a545dd6c49e506d0a62610bb48226cf7e0deec28ae89720957526607d5,2024-11-01T20:24:53.730000 +CVE-2024-43122,0,1,6b4c49b9be94d763192973aedabd31f115f3e4d08877bd89f85df2f99f1bd4bc,2024-11-01T20:24:53.730000 CVE-2024-43123,0,0,c02677ef8b7b9e2229cb24b37119fdc9650c80bd850d720e8d21ae9a3d07a645,2024-08-13T12:58:25.437000 CVE-2024-43124,0,0,82efe1cf7c5aac99cc7503f40d4a726894cb3279ffd5307e4b90d041585abc0c,2024-08-13T12:58:25.437000 CVE-2024-43125,0,0,3fc7b165d0b22ffdf2958ea6c32e8649751db80047e2fbb2103d92bc85834d10,2024-08-13T12:58:25.437000 @@ -260425,20 +260425,20 @@ CVE-2024-43130,0,0,8ac60d1cc8aa75b0576e9410e6684738dc0975304323a1567a1f0eb99e4d5 CVE-2024-43131,0,0,8591ee6c3e77a5a691612e6bee62ebc0760a7b8123e10043f1c0be2a86a8517c,2024-08-13T12:58:25.437000 CVE-2024-43132,0,0,566a428fb342c55bf96d728992c0ba1abe24d9b08743bc091833fb8ba6425381,2024-09-13T21:07:55.330000 CVE-2024-43133,0,0,9e3f4ff9c8102da720c262ea41d7de033957edff3ff57332662b4c6a475cc118,2024-08-13T12:58:25.437000 -CVE-2024-43134,0,0,26a4fe894bef26b48da84b10e4a09bbb62a26ed121b40451387b67b7200365f7,2024-11-01T20:24:53.730000 +CVE-2024-43134,0,1,b6533f9951c385a076a65a30f5d6c5dd25f55dcbbb9641167eeab9413fd3ca7d,2024-11-01T20:24:53.730000 CVE-2024-43135,0,0,9e1390b4681a88a793f63ee56207a69860368bf533a4caeabe71ff44d1a36298,2024-09-12T21:18:15.773000 -CVE-2024-43136,0,0,57f4df453644f6c062c9befd9775821164128b0dc784d00d534268381c7c7978,2024-11-01T20:24:53.730000 +CVE-2024-43136,0,1,66889bfdc4b5b9a1b82426cdfeb1f4ffae15838e86e6cafc91920ab300b05928,2024-11-01T20:24:53.730000 CVE-2024-43137,0,0,8de1b2565c6057c436104ee14f3d6e8ca057aac92c9a82c9e40b213e90604b29,2024-08-13T12:58:25.437000 CVE-2024-43138,0,0,8eba5d2d2a30225112b1ebdb78fff1f2989bc3bfe5bca894a7175474a471de10,2024-09-12T21:11:23.463000 CVE-2024-43139,0,0,c74c0f3dde7756ee6f145dfa944df2bddeeb719e29cd3b22fb911239d76917df,2024-08-13T12:58:25.437000 CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000 CVE-2024-43140,0,0,ddd9555407bf13c17882395b6a58ab3090224c7fbcadd5faeeb830d264aad29c,2024-08-29T16:04:30.370000 CVE-2024-43141,0,0,f29f7de7eae578d120c59b0305acaad325acb97a127ccd6d6289a33a71c747b6,2024-08-13T12:58:25.437000 -CVE-2024-43142,0,0,bbaa673d9c2d0c201e22c5ec94f33462fabca5ef34d0822893b95e06c44add41,2024-11-01T20:24:53.730000 -CVE-2024-43143,0,0,354935f8898493f0b01c5d297023ae84372fc128a205b484f011714ee1e8475e,2024-11-01T20:24:53.730000 +CVE-2024-43142,0,1,badc92287fd305c665b9c4657d7d2f80b83ed3e9d77602abb93ac5aaa4bc7b8d,2024-11-01T20:24:53.730000 +CVE-2024-43143,0,1,d3791e904930c6ad92ae69c42c9211db6373ec9b93ef90103a13cf23910dc56d,2024-11-01T20:24:53.730000 CVE-2024-43144,0,0,c20057596840dd1a8f603137843000e2e0f183226721451fd208a34176a83c3f,2024-09-19T21:47:24.613000 CVE-2024-43145,0,0,7ccb83b884d8dc58ceb4932d45768a752924d5c2938e5a3f671a778aaba995f8,2024-08-19T12:59:59.177000 -CVE-2024-43146,0,0,020ad9363d702a16d1b47a098fb81f4e69a823307578ae0f91e8bda76973253b,2024-11-01T20:24:53.730000 +CVE-2024-43146,0,1,5fd52bb0fced77a29e1c535823400fd5bc6807113663228bd63a0f3bf0778de6,2024-11-01T20:24:53.730000 CVE-2024-43147,0,0,667e4e165f9113b4fe4ef729d1c96bbd751ca2d031ec283022e85cfd98eae7e3,2024-08-13T12:58:25.437000 CVE-2024-43148,0,0,cff5965efef0a90e2b87f245b5b8084669061ce4646f39e1c94e0f70b2166d42,2024-08-13T12:58:25.437000 CVE-2024-43149,0,0,b80bf672b131435d7d08c3c95203fc8f832a533dd6a8944c2404b2b39520a185,2024-08-13T12:58:25.437000 @@ -260447,16 +260447,16 @@ CVE-2024-43150,0,0,5fae4ac9f99bd9e90fa5e0f46b6f0cceeb8647f439df51e26618f2f6c421e CVE-2024-43151,0,0,118ca2fe7977350e9b3b39b661cae07f892edb3c786df7d77be47cd62432964b,2024-08-13T12:58:25.437000 CVE-2024-43152,0,0,85c34359c81b3f8574fb4f2f49d2364107c7757f547ac6729435c669aaf086fe,2024-08-13T12:58:25.437000 CVE-2024-43153,0,0,c4b94c694d2405df8496166234b2e0912e73765099712b4c0e39b1d8565bc92c,2024-08-13T12:58:25.437000 -CVE-2024-43154,0,0,ea3a9ce1bdcc3dacb33701731f5317563f6367a5e593a853a311025c4548cef2,2024-11-01T20:24:53.730000 +CVE-2024-43154,0,1,c100ef6bac14fca0b13f67f25734bdc46a5e04d407ac1c80891674ee72135af4,2024-11-01T20:24:53.730000 CVE-2024-43155,0,0,62e08a67c3eb165fcdd7255389c42a96bd4103ace9dfb0216419c6872e4dba54,2024-08-13T12:58:25.437000 CVE-2024-43156,0,0,efe1c5ead78c52ebd3b0ca7df5af37947c055f5024df3ce6789642415756e658,2024-08-13T12:58:25.437000 -CVE-2024-43157,0,0,3559f9a5529a177371139796a34b81f3fbf0cb8f7287032ebd17e4488efb60fb,2024-11-01T20:24:53.730000 -CVE-2024-43158,0,0,bbd2e94630f14a65200992b4c58b8a6ff6a792cde713a9b2e36c07fd0f3a8225,2024-11-01T20:24:53.730000 -CVE-2024-43159,0,0,37805aefe9f72d8e340605120a02bb80d734772723d967908bddfd18d5cf7503,2024-11-01T20:24:53.730000 +CVE-2024-43157,0,1,fd8deeb687a4300e419640e5ef5839d1e937932fbf70f54d01871cfcc2298d8f,2024-11-01T20:24:53.730000 +CVE-2024-43158,0,1,67840cd1086120a952e7897b66993765b77964f860b9d2fd8e74f037b0055705,2024-11-01T20:24:53.730000 +CVE-2024-43159,0,1,de521b3affa12f90840c5ea42966284e10e5bcbd6557218d15bfa3cb7ca01140,2024-11-01T20:24:53.730000 CVE-2024-4316,0,0,1f2d235ec208ef46fe57643aa08db6f0cf549b33584dbdea1429e6bdf8a86d5e,2024-05-14T16:11:39.510000 CVE-2024-43160,0,0,f45c38a4c53384bcad0792b9ff6ff100e5bd428c32bf153eef26427bc7a3183f,2024-08-13T12:58:25.437000 CVE-2024-43161,0,0,f37be14abc8091c71cde7262837d69279328cabb479eb142cdf3874611ffd6ce,2024-08-13T12:58:25.437000 -CVE-2024-43162,0,0,db46ff19fa903a1d0e522d75d827162b52f76de39a935edd1b4eec72908077d5,2024-11-01T20:24:53.730000 +CVE-2024-43162,0,1,616d0c6a2eb8b3756856e0c91d711e14108ca8c257e9c81a71b35a429f30de76,2024-11-01T20:24:53.730000 CVE-2024-43163,0,0,37bfbcf03c9dab4ca7e97266471b7b8dae4977f26d227e4b5cbdc4808f3a597c,2024-08-13T12:58:25.437000 CVE-2024-43164,0,0,7fbbe7ee9aa78038cf3c84e491a5f4242c8267e5471c6fb174f927d6da6e8164,2024-08-13T12:58:25.437000 CVE-2024-43165,0,0,8125472d7e20e379acd67d29cc7075b43b03a71223ce60c46b14d0ffb4bd9a07,2024-08-13T12:58:25.437000 @@ -260475,15 +260475,15 @@ CVE-2024-4320,0,0,d32cd221b1351d4cbff9a2ad97006a4790c788690d50cf3d504900a3063ad2 CVE-2024-43201,0,0,7e96b5c7a529af9864170f10f2d4ed0205422d478997957170bbef8405d06316,2024-09-30T13:55:38.390000 CVE-2024-43202,0,0,9ce3457395226f6b2d3e3ae28bae28adde4e9867d0df01a0022666c3aba587f5,2024-08-20T15:44:20.567000 CVE-2024-43207,0,0,e22c5710770b6cfc075b06ecdaad97a6d82c458382d84efdd62d5cddbde66f6b,2024-08-19T12:59:59.177000 -CVE-2024-43208,0,0,3468bba415fe3c6b87429e7591b654bc1c11104376db822b30c735b7e18f4bb4,2024-11-01T20:24:53.730000 -CVE-2024-43209,0,0,29ba8828ef03b2f2005ada73e8978143bfadc6e7d836aaae565abfa513bc2ed1,2024-11-01T20:24:53.730000 +CVE-2024-43208,0,1,5c30b47f372701b19c3798c6edda10b53def4204bd1e63434fe81a5cebd374c7,2024-11-01T20:24:53.730000 +CVE-2024-43209,0,1,2e6fec08119c7f25606e0845f64f2e36898fbf4a24008c928454f1d49de400d7,2024-11-01T20:24:53.730000 CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000 CVE-2024-43210,0,0,38b1ddd569737ddf84a414c75c09c54bffe5570d779b3b2b7d84160c7c88ff6c,2024-08-13T12:58:25.437000 -CVE-2024-43211,0,0,44f0c3e69ff3c9846d960abb3cb15a623ca1bfbf8001f83a8a12efdc8337ed44,2024-11-01T20:24:53.730000 -CVE-2024-43212,0,0,0d242d4fba8a7ee4eb375c66c843daafe7ae27fb2133104b9f88f6141612a627,2024-11-01T20:24:53.730000 +CVE-2024-43211,0,1,b4dd38a7b496fb5c53f575dd52e2d13b4dceb495c9fb1875f82476afdb8c0f0f,2024-11-01T20:24:53.730000 +CVE-2024-43212,0,1,2b9baa35f5b011b2d502f49285641d213dc9565eca7e90117a74bb9fff34b226,2024-11-01T20:24:53.730000 CVE-2024-43213,0,0,6c696e57f95479918ef25ca22ce88cf027f14ad7abeabc2f23e004d6693a5cce,2024-08-13T12:58:25.437000 CVE-2024-43214,0,0,e772b18793672d06b1bfe4d88f116d9521d26ae1727a72efbef192814b0907e8,2024-09-12T14:17:59.390000 -CVE-2024-43215,0,0,15390efad35bd2a01311dea4438957c98492751e843e8108533ed6c197f9d8a8,2024-11-01T20:24:53.730000 +CVE-2024-43215,0,1,75bb63728460994f3bdf4981a78f97585a67710934e68167806525beed9ea2e0,2024-11-01T20:24:53.730000 CVE-2024-43216,0,0,b986dc9a8b3b2203463866beb8a53631207ae789a2b2f2fe22846d054a89bfa2,2024-08-13T12:58:25.437000 CVE-2024-43217,0,0,f82c4fc5d8211638ca35d56d40ca602f216f2cb77b05fbf9169296f7ea83635e,2024-08-13T12:58:25.437000 CVE-2024-43218,0,0,7211cf498c311837d292e9f824bafb9f3bdd8538b1ebf61d4a91523261453a7b,2024-08-13T12:58:25.437000 @@ -260491,18 +260491,18 @@ CVE-2024-43219,0,0,bb9039f99b9e847bafc9b875f5b746aeade643fe89a0502306f5dcc96fb76 CVE-2024-4322,0,0,1d1748b4ac4d92a791836ec730671d75744c804cc2e9189accf3943e4e00efc0,2024-05-16T13:03:05.353000 CVE-2024-43220,0,0,fa30aceb18b0a5400afb1d9d2f0e9c09b643520e811ea7731a8ad416203ea5f1,2024-08-13T12:58:25.437000 CVE-2024-43221,0,0,be7cf87a0f2e297fe600b0384a764990ed288199ff9a99c586d81ff8f37e2e9e,2024-08-19T18:36:20.123000 -CVE-2024-43223,0,0,5b8203584fb91dd97aa7bcf2a9a1dc819956690729bc8339b0cecd4df3a0dd4d,2024-11-01T20:24:53.730000 +CVE-2024-43223,0,1,91671aabc8adf45ee6e6012fc4f21ef90fd51d1e835dc81d6b1f7f38ed02319b,2024-11-01T20:24:53.730000 CVE-2024-43224,0,0,14cde466a8ca3b1bf8974de78502b35cfa4d5ca1d10dafe2a4d04ac6c673d0a4,2024-08-13T12:58:25.437000 CVE-2024-43225,0,0,785bc4278a6946ee9d6c10021191a3cce1fc98e617438c82e5e4e3f2e0cd03b3,2024-08-13T12:58:25.437000 CVE-2024-43226,0,0,a338b4ee27e9fc08682f17c2b31584264a82f90f5a7fca9fd60ce6764ef33c2e,2024-08-13T12:58:25.437000 CVE-2024-43227,0,0,ad1f6a93845342802a80b9924c653d05f8aded241d8c4fe476abc24eaae6fcd1,2024-08-13T12:58:25.437000 -CVE-2024-43229,0,0,32d03e05641fb4e8f9cde5b0945c5de0fff7a5b1ea6520353e4e6cc244af9dff,2024-11-01T20:24:53.730000 +CVE-2024-43229,0,1,3089da579d9531c4ecd442cbfb7597ea4579ebc3539ae00556a28f913d690817,2024-11-01T20:24:53.730000 CVE-2024-4323,0,0,8795dbc0ef00377d638f97794032c86e045103be19a16a47714b9d0a60088551,2024-05-20T13:00:04.957000 CVE-2024-43230,0,0,6e32073c9e6e9999512638555ce6fd7c64bd9478a9ea47e2925b530a1a97b393,2024-09-18T16:10:30.317000 CVE-2024-43231,0,0,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b580379a,2024-08-13T12:58:25.437000 CVE-2024-43232,0,0,c4f0a290d3d0b6195154848d04103c9516440693673d84bd0355907b0f850350,2024-08-19T18:36:07.297000 CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000 -CVE-2024-43235,0,0,bfd08910a432b1b85cf287a832fb752c61438acd2b632a81f4dbfadc2c35df2c,2024-11-01T20:24:53.730000 +CVE-2024-43235,0,1,9ebdad3d0901c2d4595c916cd1eb94c0bc6ba286bed69da9be093344776ada20,2024-11-01T20:24:53.730000 CVE-2024-43236,0,0,023011a32949e87f6bc318354cd0a34190696d548e7018a1624254d686b58e3b,2024-08-19T18:36:07.297000 CVE-2024-43237,0,0,c00da4e683c657cd86e70190f5fc4f76014c7e3914a5edd04f0b8f0bbb6eca6a,2024-09-26T13:32:02.803000 CVE-2024-43238,0,0,55a9737df7d3a7bb29b80dc0b631f8b007fbdc439de2c352cd0a0288d492e84f,2024-09-17T19:27:03.220000 @@ -260521,15 +260521,15 @@ CVE-2024-4325,0,0,89689cb57f32d08c6aded07ab6ed668978bcfa22d6491cc76a7248b12f0174 CVE-2024-43250,0,0,a841443f689b24b465816a01f105b6a5bcdc875b6da892ea807eb0553baf62d4,2024-09-06T16:02:16.067000 CVE-2024-43251,0,0,7154911118b81496671cf51187ef674b23ebccccdab2c0d297eb1629baa691c4,2024-09-17T18:10:36.453000 CVE-2024-43252,0,0,b771f9e76d477a6b132719a51019c908bb6489774cbaa7cda1dfd67b307e9d1d,2024-08-19T18:36:07.297000 -CVE-2024-43253,0,0,6c098c83f864cffa7a7356d47bf1654f376e5747b3ed18ef4e8d9366e882030d,2024-11-01T20:24:53.730000 -CVE-2024-43254,0,0,6b931bd8448e63779602f9c60296644c61f991875de4c736b05795cc7f72f79c,2024-11-01T20:24:53.730000 +CVE-2024-43253,0,1,d7f6d00a288995fef2eccc9c0e903752da7ae07c0ca224d6bb3a3184d6e59c61,2024-11-01T20:24:53.730000 +CVE-2024-43254,0,1,bdad0f813e7bb148d9f01e1b95f636d11fddb1a5118ca1a80f981337ee5fbb59,2024-11-01T20:24:53.730000 CVE-2024-43255,0,0,aaca36022a4723e66eba0421c46a3b8c92a4b08a6a20bb4a3211673b2b520f30,2024-09-17T18:08:50.847000 CVE-2024-43256,0,0,9b32c5c8838f182333dfeb7852659a728b05e24f477fd863931dcda117b0499f,2024-08-19T18:36:07.297000 CVE-2024-43257,0,0,f0c79a7747157f0e00f7f413a5da255733f6bd31800fc0087efe67e7afe88d11,2024-09-12T21:09:58.707000 CVE-2024-43258,0,0,d57814356657cd8acff5874321f29ff4a0404beb5cff61e8c6619c1a12a7ad70,2024-09-12T21:11:46.190000 CVE-2024-43259,0,0,4f6aa4649d97fa3052d1dd20993e8b97ffa0ef53f5bc8a3a59119dc2fd3e8e10,2024-09-12T21:14:50.043000 CVE-2024-4326,0,0,d965aff3554882d9e9e5ba1861fcd18121a605b5a6347dc41a19bd090bda9a65,2024-05-16T13:03:05.353000 -CVE-2024-43260,0,0,9cbe068d02891f6661b38aef83a7e88f8bd4f526c7372f53b084d82809ac3ddb,2024-11-01T20:24:53.730000 +CVE-2024-43260,0,1,09b2f7fcb689a205fe01a2e7f4c32206d9f61c87ea7d662bccbd26de59e2eee9,2024-11-01T20:24:53.730000 CVE-2024-43261,0,0,7e3a09c15994d8b37652b6cbdd566fcd6029259bdaea29b270586a7bb2f271dc,2024-08-19T18:36:07.297000 CVE-2024-43262,0,0,ee2d00bd7b26cdad642ada4c4b2d7bc02c0ccfbce8aef1634bfd7f75ad8dd06b,2024-08-19T12:59:59.177000 CVE-2024-43263,0,0,cf9b7583314454065255b112c0283ce49c3cc8a3b709e9840e4d308ff741cc3e,2024-08-19T12:59:59.177000 @@ -260537,17 +260537,17 @@ CVE-2024-43264,0,0,b88bb3d3a4de20d0209617126f4d0e47ca340d513ed1b239990af72b80309 CVE-2024-43265,0,0,527f9fd6cc444d70166efc550c19f98c3c244fc61a469fd91b10ae3de5e63993,2024-09-12T21:17:31.657000 CVE-2024-43266,0,0,751fa9ab2a13f701be885e7a1662c496db49511ced127e99a8ff80c20e1ffede,2024-08-19T12:59:59.177000 CVE-2024-43267,0,0,5b844fafa4776837e860aa27df30c3483f35542b577634e0b86bc9628cc0c001,2024-08-19T12:59:59.177000 -CVE-2024-43268,0,0,c4c00e28ab3fd550741765c0fe56ba0d6487bd5f32fce14918454edfeac87c86,2024-11-01T20:24:53.730000 +CVE-2024-43268,0,1,350ec9cb9c8fa3e5d3e6d505d0b79d7d22bb4a02fcb36f2d5c0a75bad9a42c3a,2024-11-01T20:24:53.730000 CVE-2024-43269,0,0,1924afd54fafda347d2fced7ae260f59ce16f4db4d0963ba1d5326bbf76c0824,2024-09-12T21:18:17.913000 CVE-2024-4327,0,0,9a5f942b6958d2271ac79f44a3dfa6f019a91702ea5bf4b7c110b804ce763bfb,2024-05-17T02:40:22.673000 -CVE-2024-43270,0,0,d852b865651dd524fedeae30b836331e58f11e12b1df2f718a23832fef72b9ee,2024-11-01T20:24:53.730000 +CVE-2024-43270,0,1,4fbec5fda84234568a4b00976770ecc6337f1e11c28da30a0d0c8501e94ebed6,2024-11-01T20:24:53.730000 CVE-2024-43271,0,0,3852afcf0359f6cc86523739d67c2c354f1f5e6dc92c419ef339ef64322d3b04,2024-08-19T18:36:07.297000 CVE-2024-43272,0,0,e5c0ccec3dcf5a8380148a5313d6f966ea5609aaef234f6a5af2f197acc8f34c,2024-08-19T18:36:07.297000 -CVE-2024-43273,0,0,3f1ee204546516c4a6cbe834656bdae0d3f8f4077a562627069cfd3f97a70714,2024-11-01T20:24:53.730000 -CVE-2024-43274,0,0,15385705ab39966aee27e38c7565eb04d26efd1b0c8b213d27c3d77710397539,2024-11-01T20:24:53.730000 +CVE-2024-43273,0,1,3ecb74d531d8bd83447698dbf3b86988b65883bae75bb4e6058eb9c92f6919ca,2024-11-01T20:24:53.730000 +CVE-2024-43274,0,1,adc3684b7e3820187d383722d8380dfe88d4ff207c2ab96a6a09910f50aaccbb,2024-11-01T20:24:53.730000 CVE-2024-43275,0,0,f94aa35e0baff5e9986092a090ce1e8de11bc4f581ead148df83dfd46fa583e2,2024-09-11T12:33:23.387000 CVE-2024-43276,0,0,20fea6c1084924fc9c4e436124995a3a5cc382be23337a940bb2e5f3df58f8db,2024-09-17T20:00:47.713000 -CVE-2024-43277,0,0,5cb4c67448e8484f2515698bd40254b3be8e83d26aea9e935d91bcc35e1b6577,2024-11-01T20:24:53.730000 +CVE-2024-43277,0,1,16a1da2b94600e4d5cce9f19840b63c97077b0276b851f70f4befd6272451895,2024-11-01T20:24:53.730000 CVE-2024-43278,0,0,ce315fd6df2c7c03732ec4666e0eb8df6d4b7eb3d4a28c76f708a96fbe277c0a,2024-08-19T12:59:59.177000 CVE-2024-43279,0,0,e987096db9ded741b69a195b2928ea4cd7001885008ed57560d4daa954a47390,2024-08-19T12:59:59.177000 CVE-2024-4328,0,0,243566e1cc6bca4cb71823d7b7f30591e3ccaa89bb4c9ba718cf8de1f025e822,2024-06-12T19:33:00.527000 @@ -260556,26 +260556,26 @@ CVE-2024-43281,0,0,7ab1ca3ec60651be88171d7cc08689c4da1b6b9190bde15c636f0937ce762 CVE-2024-43282,0,0,51a1b7b60973a964536d725b46eb7f27a1885c2e782a5c2cec51a4dab10a1bb5,2024-08-19T12:59:59.177000 CVE-2024-43283,0,0,dcec842bdd94f55475de15ef134249f9ae0edb11037a699786338e74816d0571,2024-08-26T19:10:18.890000 CVE-2024-43284,0,0,9ec27cbbaa1c9c776151f787875b1a5263af16803ae4108b77758144ff0ef781,2024-08-19T12:59:59.177000 -CVE-2024-43285,0,0,e996474e042d660953b2c2a7cd18bff83278896eedefe256d3f893236a8243b2,2024-11-01T20:24:53.730000 +CVE-2024-43285,0,1,d0e104551210a81eec3882422e1486c609b30ca02192c06f2e22d8380f0d193d,2024-11-01T20:24:53.730000 CVE-2024-43286,0,0,8d445c08837bc0d69bb39f698d927b03a1da9d91e0d6c24aee947cb16e9db230,2024-08-19T12:59:59.177000 CVE-2024-43287,0,0,0f772c5e7015096b1b8986bee8890e23ad101e6c5c793ec59d98841278da0fe9,2024-09-12T21:19:51.183000 CVE-2024-43288,0,0,cb601481b4f7f99c135ef7b3e4ee49c8b3bc97950f1eeb07b9266e26ebe0290d,2024-08-19T12:59:59.177000 CVE-2024-43289,0,0,23852b8ba3878f496e75285825c5c6f357318473772187df9e2fcc50f8afe3a5,2024-08-26T19:10:18.890000 CVE-2024-4329,0,0,915fdd462793e35dddcb6a188ef6774a9ebc56a526b1b0698bddaf3c23ba3b77,2024-05-14T16:11:39.510000 -CVE-2024-43290,0,0,16ed339e1f1f17accfd6e90bb8c7c911fe37c3dfa6dfe1371784924a50dd7fcb,2024-11-01T20:24:53.730000 +CVE-2024-43290,0,1,893e4306374e98783736e0e99f9ba013f142eb7accd94641c67d5be4dd981fb6,2024-11-01T20:24:53.730000 CVE-2024-43291,0,0,fb50f3403a5239357eaa4233d35fbbdf0287b954bbd3c034bc45e3a17c6909ae,2024-08-19T12:59:59.177000 CVE-2024-43292,0,0,a73011f291a9642d1b2f2b537dc2970614132291a2af4b6cb40910bb0d866545,2024-08-19T12:59:59.177000 -CVE-2024-43293,0,0,7c8aa54ad2e16512617c96ac2c1ead8a28442e525ce49b5e6f0d3ef1b2160ea7,2024-11-01T20:24:53.730000 +CVE-2024-43293,0,1,ea99d848f861d6f31061c53143538f8fb8f5ddb987130b14e8d689d482c52154,2024-11-01T20:24:53.730000 CVE-2024-43294,0,0,115da993f44036adfff3784c8efce939e5d53bb4f7ab07ebab66e86a98521dda,2024-08-19T12:59:59.177000 CVE-2024-43295,0,0,4c992084e199b514575e8ec2d873a4ef1cccca3f4f5df0b2e67e418aab98a634,2024-09-12T21:20:43.847000 -CVE-2024-43296,0,0,7c349243196327fe82d4895c67ddd4059c3d8f007430f57520cdb83da5db4d81,2024-11-01T20:24:53.730000 -CVE-2024-43297,0,0,d1a7b05a800bce0a205ae254ee9e3204a63a85cbc8e416c5798517fd1d8a8244,2024-11-01T20:24:53.730000 -CVE-2024-43298,0,0,21642c131430c0365be8f4b4f204bdcdee5709f061640750d17aad2250fdf8c6,2024-11-01T20:24:53.730000 +CVE-2024-43296,0,1,ed00175dd0bc5aa8523510871abe141bea84430c3bab4d1f2b5c38d7136a92e4,2024-11-01T20:24:53.730000 +CVE-2024-43297,0,1,f467e7eeaebd15c75980a356625d3548436c8f502f9174e1a768eab2d97dadb0,2024-11-01T20:24:53.730000 +CVE-2024-43298,0,1,93782a8df44332afda89e97733c6b093ec7d8894e7960391fba028c8375e1ddd,2024-11-01T20:24:53.730000 CVE-2024-43299,0,0,519d081700ab3294f398a4287727657f1b1d3ae45286cab56afe1bc9702f1fca,2024-09-12T21:23:30.647000 CVE-2024-4330,0,0,fc15b5e6e8f2f0c0d6f88562ddea62a293dcb49ee86f17536355ec11fc8680c3,2024-05-30T18:19:11.743000 CVE-2024-43300,0,0,0e255468708543d303383e85dfb9e37cc538bb4005cde3896a7b317de3630d96,2024-10-22T15:35:24.050000 CVE-2024-43301,0,0,36517c64264e25162f6a8960592c6f8ac4f28ee2609d1e9f07cf9e006ea49e2a,2024-09-12T21:24:20.563000 -CVE-2024-43302,0,0,4c670250d41b61d77ffacd35e6b51e0bb959e35ea20f1d21f8efa27dc0dbeafe,2024-11-01T20:24:53.730000 +CVE-2024-43302,0,1,edca45c0df82637ec4eb7ea89f0f0283d326b28e53fe9ece344aed5f65c1bf39,2024-11-01T20:24:53.730000 CVE-2024-43303,0,0,11d9501682f62a268ea8fd6f03971205e43f433af8e58b9f115735076a0f4308,2024-08-19T12:59:59.177000 CVE-2024-43304,0,0,0198c9c448bd60be5feef590d21005c81d3809f24efdc4b5ed5165051bdc5338,2024-08-19T12:59:59.177000 CVE-2024-43305,0,0,6bccf6d377d1be8be62035a992eba5e29974b8b5e3f639507282b3c5fef7f322,2024-08-19T12:59:59.177000 @@ -260584,11 +260584,11 @@ CVE-2024-43307,0,0,756435dd685e6ec1730a305e988ba2e01786ffce6cef7ad1c53c4b8372b4d CVE-2024-43308,0,0,a877913f6f52f25f4de880fc802fae074159a8e8758942c49b34a7aeae2ea006,2024-09-12T16:30:02.100000 CVE-2024-43309,0,0,b5ff7496a58101d5fd9edfa847ee5a94e2e6a966282e37cd22c76f6492329cd0,2024-09-12T16:39:09.187000 CVE-2024-4331,0,0,f83a1d11dfb2c744e38bc97e75352f54247538f697e111d3b125724e343ab75a,2024-07-03T02:07:25.070000 -CVE-2024-43310,0,0,cb467b93d9bb409b62ddd255d9689af2e875e2d0ce7b14710cf1f3cf0a82bab8,2024-11-01T20:24:53.730000 +CVE-2024-43310,0,1,d5384af0b885e6a7988dd5bb255c7f476691e397a8b1e7cdd89805ccccfbb7af,2024-11-01T20:24:53.730000 CVE-2024-43311,0,0,a0f8b12007c335b7c931dc515cccbc7b0ce9a673d7ae4a860b8788ba11cdc88d,2024-08-20T15:44:20.567000 -CVE-2024-43312,0,0,331239f19d221383d626031db11e2627eb5a9e7495b78562c5b0bde7ae5d31f7,2024-11-01T20:24:53.730000 +CVE-2024-43312,0,1,d47eb3cb3af6e25f8905b855b49e55697ce905601116b6174c1039f4b23c609f,2024-11-01T20:24:53.730000 CVE-2024-43313,0,0,28b2739b642f0c4b535269ec6c48c2b0871041982feec101264e49bbd04e2f69,2024-09-12T16:40:07.057000 -CVE-2024-43314,0,0,507166755dd005e364df3fa0eb4623fd2cfc7e91a86c71c93a926629e1d7df17,2024-11-01T20:24:53.730000 +CVE-2024-43314,0,1,2ee408226f50d14d97c00b14fb21a8af50963ed7f92efa31a871206beeffee79,2024-11-01T20:24:53.730000 CVE-2024-43315,0,0,e6014d85dffd349f3b2ce7320cc3098b6f662e4bd5c45fdcd4617c84b6eaae10,2024-08-19T12:59:59.177000 CVE-2024-43316,0,0,ed52c19e4beb9313ac8dbea5b947eba79a590b5b5c5d674a4a07af1ca308d254,2024-09-12T21:26:12.670000 CVE-2024-43317,0,0,deae729303ac5b60aa6b622a0415dd60fbdfaaee209a8500c7d589c2c68b55ac,2024-08-20T15:44:20.567000 @@ -260598,7 +260598,7 @@ CVE-2024-4332,0,0,229e2a44f62342d9fecf4d77bd1ae1368633da9c89a437515cafc4b1ffcbd9 CVE-2024-43320,0,0,ccee38afc2a835bb009830c4531368282e9727bc0052e4d4c17d31bfd55ad002,2024-08-19T12:59:59.177000 CVE-2024-43321,0,0,bb703b2de13a267b8724635b0dde06893a82d0524de00aebee7a6b84161b8d61,2024-08-19T12:59:59.177000 CVE-2024-43322,0,0,e2ca647ab771c590c5e49dd4792b17cb2a82d2c1efaab05806782389dbebd2e3,2024-08-19T12:59:59.177000 -CVE-2024-43323,0,0,3ef76f708267bc6726a67e2f5e0f79fb586aad561bef9e1546afef712bf9b594,2024-11-01T20:24:53.730000 +CVE-2024-43323,0,1,95efc4b57322e0fd6389019ab318aa484bc9f7a7b9378524b162ed0516213fb3,2024-11-01T20:24:53.730000 CVE-2024-43324,0,0,3fca11ef3a0d0aca94e1720b1500c02c9dcd66fee91e5ec95a4010a171418c83,2024-09-17T20:04:28.360000 CVE-2024-43325,0,0,c7e71f31efef4adfd7b652340fa8f95169ea702400525766f98d28f2dbed3aec,2024-09-12T21:28:20.137000 CVE-2024-43326,0,0,4b4201c18581215a5b56fb12e75b3d09f6bbdb92546d9bf78577651d9ba94f8c,2024-08-20T15:44:20.567000 @@ -260608,16 +260608,16 @@ CVE-2024-43329,0,0,2d889991c7054adfc3510a6f2a36341cd1187c790fca1d7653a4d88b7b618 CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000 CVE-2024-43330,0,0,292f3679d217f19b4d90b8fcf1aedfdc57b505addc17d70d5b69292c5274be95,2024-09-17T19:53:40.987000 CVE-2024-43331,0,0,6d28b8bc0904e0c3dd60c41d48cef3313c73e3f7ea773d2fece6fad186c8439a,2024-08-22T12:48:02.790000 -CVE-2024-43332,0,0,f8e44476a3d1b7186fb53b7a9b9ad09fd435587123097ce67faac735c8795d68,2024-11-01T20:24:53.730000 +CVE-2024-43332,0,1,cb80ebe2fb8df97e485771c69e695c86025cbcebf0fa86cd393159ae24cc5c51,2024-11-01T20:24:53.730000 CVE-2024-43335,0,0,3dff6fb5a934fb330e842040b60a43d630834d9fc8b273f121537efea122bdd4,2024-09-13T14:25:12.027000 CVE-2024-43336,0,0,01d8580ca263b1fc31791415195a5d129d6d58e08f3205c4e1eb6ed293dbb6d7,2024-08-27T16:00:25.177000 CVE-2024-43337,0,0,40b1547653629694d1f87683cec28c4d4ed17401d650c003966fbaf0b12fa6fa,2024-08-27T15:59:57.127000 CVE-2024-43339,0,0,66db28fe32caa7fdc3de193b1cfb8a374b117ab7f2a1a8dfd67efebf0a0a78c8,2024-08-27T15:58:31.840000 CVE-2024-4334,0,0,0bbc9e9de57a0c229384d6d19ec0f1942ba088838a67e65a09daa4455a2054dd,2024-05-02T18:00:37.360000 CVE-2024-43340,0,0,3a709bf24dd21009275a410f31b11d212b86c9058772b39f8b8f29b2ecf58b5c,2024-08-27T15:56:00.043000 -CVE-2024-43341,0,0,551acc1859a959b3a8ccc35bba64f07477c34c6e0406b1956f501884442a6ef9,2024-11-01T20:24:53.730000 +CVE-2024-43341,0,1,040b20b8c864ff2d1bb8a6f579aa73dca838e23503478adf08ecbb92cbc20ebb,2024-11-01T20:24:53.730000 CVE-2024-43342,0,0,118ec632b5b960b115e679c2e48ccfa8b9cf544f6f75353017c100801fb2817c,2024-09-13T14:11:31.850000 -CVE-2024-43343,0,0,721b31de6048822b2889e41e524d3c7cee57091a86cdd280d3fc082f105ea963,2024-11-01T20:24:53.730000 +CVE-2024-43343,0,1,6257bf0b5897468d6837e493b6d89b5f47f4b7f324cf2d2c2403d34017a9c783,2024-11-01T20:24:53.730000 CVE-2024-43344,0,0,379496d95a40a85d8ca980cbd671a249672d41d04bb66c9b9dcaac6246ede174,2024-08-19T12:59:59.177000 CVE-2024-43345,0,0,556fa7350890a25a21bcc01fdb9aa5e355db1c5d283d4a3a13c75236275d6c79,2024-08-20T15:44:20.567000 CVE-2024-43346,0,0,570d0cbe7918a4fb4c0a3bd9c07365439742f024e036e2f65c29c7f9160e1fea,2024-08-19T12:59:59.177000 @@ -260630,7 +260630,7 @@ CVE-2024-43351,0,0,4f1a44dd0b092b1cbc40294ea3c1e20ba66e414acc7c7ec139aec5d1c68e6 CVE-2024-43352,0,0,07311db07e42253e292f873208eb8f7da45aad78c36050ff71f1c14b42155a03,2024-08-19T12:59:59.177000 CVE-2024-43353,0,0,63ba11fd8c07de3459ae027affa4265b156cbb90703f59d7d8cf9f7e3e549de4,2024-08-19T12:59:59.177000 CVE-2024-43354,0,0,7fe0d70c3381bc58752b4a1e37f29b9d4db102b7222c66e8c7dfaaf7ee6ee2c9,2024-08-20T15:44:20.567000 -CVE-2024-43355,0,0,d9a9b6bf570e9441c331f4e4c2bf80628d5b5f2c3527ed5bbbf0b08da9a9858a,2024-11-01T20:24:53.730000 +CVE-2024-43355,0,1,1fac8e92c9eef4758e724e7ac0b69caf52b3e5f26d72e774878f5a1ca9575e19,2024-11-01T20:24:53.730000 CVE-2024-43356,0,0,002a4b5d4af1e8f0e94c64130aea08271a5645ee7876954a410a13e10d80fd71,2024-08-27T15:54:45.650000 CVE-2024-43357,0,0,843c188c76220c12bbff3ab3d1983437698ada4d60a6933ff05615bf550f6a01,2024-08-19T13:00:23.117000 CVE-2024-43358,0,0,f13bf774ce7b4c63763f4e38f0e32b38260bf7ed8ec364046e3e65c356bf22cf,2024-09-04T21:41:06.457000 @@ -260658,7 +260658,7 @@ CVE-2024-43379,0,0,d3e4b3238a29f3c9bcdc737c17326972a39574f3fe6ee0181683ddcdcc079 CVE-2024-43380,0,0,3bb4c505eaa2eb4e3ea37c153951df14b4a7ccb63e07a242ed00a1ab77df3585,2024-08-21T12:38:00.247000 CVE-2024-43381,0,0,cadf370b69704b630cecfb0fbe8ba07b198197e9a1164f2a1cf1bce7367f0908,2024-09-11T13:02:26.053000 CVE-2024-43382,0,0,489a3828e9da2abb6275de3f075d0fc99128ad2c59b358392e6a0aebbf6d958b,2024-11-01T12:57:03.417000 -CVE-2024-43383,0,0,4e79607fae31f8f7c112296889db4fd385c2f6ad40f09497808b48c6afedac18,2024-11-01T12:57:03.417000 +CVE-2024-43383,0,1,730182012830b8cbfd493716f271b20e694a228899f5e55c7c2aabdff9c281b8,2024-11-01T12:57:03.417000 CVE-2024-43385,0,0,9f5d38d74a52e4aff95c66a9fe01102de802f5b76b33bec488a6c4b7e7096244,2024-09-27T19:33:08.770000 CVE-2024-43386,0,0,bc2a848fad787eef345813d2c4720d9d2393c8e1df983aa7b4f1b2025bcec15b,2024-09-27T19:33:22.077000 CVE-2024-43387,0,0,4ccf94a52793dd24dc0376add620cfdf8d8ec8b86efb2e3a9e2719aaace5a025,2024-09-27T19:33:37.497000 @@ -260721,7 +260721,7 @@ CVE-2024-43464,0,0,42956114f68b1d67be14842639914b420d38d850d63203f2075370bc159d7 CVE-2024-43465,0,0,5d9250aa7e038ca65d71b1061a2d776c0916a5a9d4039f0bae2a50bea6fdecc1,2024-09-13T14:46:33.210000 CVE-2024-43466,0,0,b946ecd1f88611673cbb3be558d8f8e03be741959edeb8309467094a9d78f0b9,2024-09-13T14:44:16.013000 CVE-2024-43467,0,0,06c9c5b2eced8d091ee4cd0089976d978adbc50aa9ed4a3fe075bf3facc90f85,2024-09-17T16:06:44.170000 -CVE-2024-43468,0,0,860662e0ec5738d977b6b5b40485fd533aa5f310df9379be52abde8b90843616,2024-10-10T12:56:30.817000 +CVE-2024-43468,0,1,296aeb867a6dce413819e9e6eab14b15d98d7d33591c90223495f52c30560722,2024-10-10T12:56:30.817000 CVE-2024-43469,0,0,e36b9f8f055a7485db37cb8b3b3c3e478802be4653464a62886fa61cd048c55e,2024-09-17T16:05:54.650000 CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000 CVE-2024-43470,0,0,fe528548c21195498b66ceb7663311572a15469603d70a62099c3f6f55f69948,2024-09-17T17:35:02.157000 @@ -260814,7 +260814,7 @@ CVE-2024-43562,0,0,7ee00b143cbbc80d6197bd252054172ca74e7b7e23ec4a3bd5be51dd0aebb CVE-2024-43563,0,0,b92202e85ddb689d8e2080c0b2e4f8691903175d8ae92490b5f5bc783e2569cc,2024-10-17T19:01:21.967000 CVE-2024-43564,0,0,f2ffbbcb18f764264f291a6fd4382a8b6dd34491b19e7483f2ed8e3798b073af,2024-10-17T19:00:23.577000 CVE-2024-43565,0,0,b2269f62c87a0809e334aa6ab353a7e51f47ad605159a6c55f950a2f73369b2e,2024-10-17T18:59:41.177000 -CVE-2024-43566,0,0,67dad0168969b854ffbd09134e0e30cf84815678167250b245788ba8e21c7872,2024-10-18T16:49:47.340000 +CVE-2024-43566,0,1,69ba7063cee4a5f457c070b15c138f99550234e2f7b95b938dad8a1ea0a3b40e,2024-10-18T16:49:47.340000 CVE-2024-43567,0,0,b1aa8d4eda561d64c2d6cb4a7fbba0f5a1685cba00aff4889ad4b33556da9802,2024-10-17T18:29:15.913000 CVE-2024-4357,0,0,86e4d24bdc3dca7ecac9fc1438972a4a1617b1654b394ca919ca67f001ce2742,2024-05-15T18:35:11.453000 CVE-2024-43570,0,0,cb1ebdbcc9f463b489680ee7f906a1b002e658802f44b1edfc93e77479cd3deb,2024-10-16T21:53:41.207000 @@ -260825,24 +260825,24 @@ CVE-2024-43574,0,0,27cb32f4bd91a68a1d79359c4fa56d2ab297703b1b8d3a2c872a415c852b6 CVE-2024-43575,0,0,24f2c5a591586cc897a2d8a6a2db6f48b0fde505b74f11c59d7d9cf153abc125,2024-10-16T21:53:59.407000 CVE-2024-43576,0,0,fe1fcad43644aa438f5b12fd73a64989a355f1461202f1bc35d3359c0344ca8c,2024-10-16T21:54:24.047000 CVE-2024-43577,0,0,9ad14dcefbd030fa0688c88dbbfc5058326bcc0356d042cfd158d58c49892f41,2024-10-23T19:15:18.673000 -CVE-2024-43578,0,0,6e078fa937e90c65f5f983f7a227c4832334de65ca7467e3741fe920a590572e,2024-10-18T16:59:29.557000 -CVE-2024-43579,0,0,75408e79b417f23da70191f7a80539f890575fc25e973282afc3f46a6611c497,2024-10-18T16:54:06.810000 +CVE-2024-43578,0,1,ed64fa85e9fca499f516dd625304e53a7e67c7d2826f7874fa876875778da56f,2024-10-18T16:59:29.557000 +CVE-2024-43579,0,1,0e022f4c209be9340a03004739acb4fd6185a10455a53336daa144f097b7819f,2024-10-18T16:54:06.810000 CVE-2024-4358,0,0,947921f329844fe043b805245fd7e3c28f7c0f168bb436200605d302b39b1665,2024-06-14T17:59:33.993000 -CVE-2024-43580,0,0,6dab8bb2472a28fa486cb31f9d290ad064a926779abd7fe786f46e2fb0034a04,2024-10-18T16:49:06 +CVE-2024-43580,0,1,7cc870ec2fb5774b045ff9cc36587cd4e09ebc2792f2cee4b2e8d095cbcdf750,2024-10-18T16:49:06 CVE-2024-43581,0,0,a22e98e422ecc04b0ca934a31973c1276568d5ce765f25976494433393f91166,2024-10-16T21:54:44.573000 CVE-2024-43582,0,0,293f560c4e09b299c2e18ac66941327f15925f69b715064473f34607ebe9fe26,2024-10-16T21:35:49.927000 CVE-2024-43583,0,0,644d57ca5c0876327fd1914bed083468117306cb0e7b162159599db8c7b2795a,2024-10-16T21:36:59.847000 CVE-2024-43584,0,0,362ea5a413c7ba1c32a6fee99bf2388c9e5eb62bbecc3bdbb75267eaeaf9dea9,2024-10-16T21:38:33.867000 CVE-2024-43585,0,0,6e4f086b3b625aa729537cada88bf0b054983b8ff5768ed654837466a18e4381,2024-10-16T21:38:57.467000 -CVE-2024-43587,0,0,0ba55dc8bba29a226390cf1df11aa1a48b87238df192b6c505cf2d579dfa9a20,2024-10-18T16:54:36.267000 +CVE-2024-43587,0,1,7ee7a5a1a5f2a7782ef73832cec95eb55e2fdd2eff4b8e420bac23d47225ff7a,2024-10-18T16:54:36.267000 CVE-2024-43589,0,0,a22527ce3cbd74a3b78112c354a29e2c2eb35fd8af838f6bb3f8e8573ce240e6,2024-10-22T19:29:53.660000 CVE-2024-4359,0,0,14ae9b130c152b886b9b21ff0fc5d35432a1812b898a1bc13704faab705127c7,2024-08-12T13:41:36.517000 CVE-2024-43590,0,0,152277bbadbbed56789e7a47dd749f0ba30af86c181629a529a65bb7827133a9,2024-10-16T21:44:50.927000 CVE-2024-43591,0,0,21af6b0df980a2fc5a207f146dfd7c6553b24177efdeb611a01147c3bfe2bcf4,2024-10-16T21:46:38.153000 CVE-2024-43592,0,0,66ef8868710faf1076b1b13051f2c75eebafbfe5976017df5a4f00073c2c60d7,2024-10-22T19:30:02.777000 CVE-2024-43593,0,0,7e17c95f595bed9729f21273d821a92cb32423e919d0faf83c37ed5dcd8b802f,2024-10-22T19:30:19.870000 -CVE-2024-43595,0,0,49c8ef8ffb75a5ec70699cc795d1609c79911425d9af876685f5afb587ecdf8d,2024-10-18T16:55:06.487000 -CVE-2024-43596,0,0,4d0eab859578b1da1191993d8733ffb2c2af60ce5eb8286215da588a379a8b9d,2024-10-18T16:59:08.667000 +CVE-2024-43595,0,1,c9530dd7915099d4a86e6d6506504fdd984e781ac89cb128030fa646bffdb2c0,2024-10-18T16:55:06.487000 +CVE-2024-43596,0,1,0f30448ecbbf09d34768a5a54fbdb251259ce851c310b81f9cbc1d14d274f939,2024-10-18T16:59:08.667000 CVE-2024-43599,0,0,46d81ec2898b49efc1d06eab918dd819a14dff6d746dfc96a1846004d908dfe9,2024-10-17T20:03:28.687000 CVE-2024-4360,0,0,ecc9c2c2d55d835e0dd1d5a0ca496992d866a587cb1717ba0b6dc8cd29acfd1c,2024-08-12T13:41:36.517000 CVE-2024-43601,0,0,70d1af092a29e0256385b0b1eb94d28b1b04d755b5d71c8bb3ee4a255fe9335f,2024-11-08T22:15:20.270000 @@ -260880,7 +260880,7 @@ CVE-2024-43693,0,0,86a2418e4d1748f5ff1d2c010cf8ecb2f43f15c3955c5a628ff84ac9fa94c CVE-2024-43694,0,0,1f38ed43c98bb35b4ccdf138bc4e0fc802b17a5cb43658b2fe1564d43a70cd61,2024-10-07T19:40:04.147000 CVE-2024-43696,0,0,b6d21f30f715b52776ec1b781c5995bbebea0d00d95a94042a058b4d46e17c62,2024-10-16T17:38:48.517000 CVE-2024-43697,0,0,aafe4540255caf8b19befcf934243317e12360bb6a3de5ba411c529a9341265a,2024-10-16T17:42:54.640000 -CVE-2024-43698,0,0,9b448123aeeb7ed29d501dfc299ad522a922eb920dddeed66edfa1a9523d2df8,2024-10-23T15:12:34.673000 +CVE-2024-43698,0,1,9e6aaeefdd041f9881f7e87adb25bf5508d197b685354237269da3292e62e8bb,2024-10-23T15:12:34.673000 CVE-2024-43699,0,0,78534d33d290678062dddcdfe24e803feecb99e21dbcb3ac97f746608e5c52e4,2024-10-08T15:44:29.183000 CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000 CVE-2024-43700,0,0,0a06b833e6fd1b1e874ef27bf2dcddebe6eeed2fb3b70101d743561cb29959e0,2024-10-15T14:35:01.987000 @@ -260934,7 +260934,7 @@ CVE-2024-43808,0,0,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3 CVE-2024-43809,0,0,83732ae5b37d299f4c52d51b00d231c62060b5df8f6e1ebed9668263f47472ea,2024-08-19T21:11:28.327000 CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000 CVE-2024-43810,0,0,3423aa76d2322965ee6b2f07b882867425d31c3e78ec55c0a16ed8dcb25e9221,2024-08-19T21:11:45.823000 -CVE-2024-43812,0,0,8445c0bb98fe421a145baa8e4fefb35001079c5ee434022c7741c5503def09e8,2024-10-23T15:12:34.673000 +CVE-2024-43812,0,1,8aa47820466f64005bd049ce50cadb7965d38b1c829888e72e7a5cb027c97850,2024-10-23T15:12:34.673000 CVE-2024-43813,0,0,0eeebfc2e52232a1c410e398d59e84b3ed93d69c2f86a7c29afdb248f4d5f622,2024-08-23T15:35:12.617000 CVE-2024-43814,0,0,b022b6b7d9befe8326620161e5277981bd50c9c9b0cb53fa808760ab38d38b85,2024-10-17T18:15:04.773000 CVE-2024-43815,0,0,982a00e3a03355b9c82b813d4044e6da96d5259d4a40715b1b2b57e8056ddfef,2024-08-19T12:59:59.177000 @@ -261051,22 +261051,22 @@ CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad CVE-2024-43916,0,0,31042afa408fe94b440478a73ae72a8d0da3ebc3aa7dccb541b916eb98fd8b0e,2024-09-12T16:21:19.030000 CVE-2024-43917,0,0,acabaf456c8dfd741a78efbcd42603884b1ece437ab7a578f9853b1f227cbc3a,2024-09-19T21:46:19.713000 CVE-2024-43918,0,0,c621e202cc81a6d6dbad623e8f3084e3f87e287c74f6e6ceb67128fdca645998,2024-10-10T13:01:57.573000 -CVE-2024-43919,0,0,e3ec96d30731ce123e31195ffa7b5452b17e7d9d16f28afd4e258978e053892a,2024-11-01T20:24:53.730000 +CVE-2024-43919,0,1,3c4c5b2fb75cac96df722b566fb81bd09fdc4bd8ba1619b42099e87f34763186,2024-11-01T20:24:53.730000 CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000 CVE-2024-43920,0,0,4fe0b9b4bdc3c773cef62ba0a55678a848520d2f26b7c394fdfed7064f320ada,2024-09-04T14:06:43.780000 CVE-2024-43921,0,0,8cb3a8317d91fe8c86f2a088d9aae7d066ad8cdfd297a2cc1e6c90830f46e738,2024-09-04T14:12:12.957000 CVE-2024-43922,0,0,1bda9e09eeb9cf761058baff2572a8d05071b30f4dbb7675f13cebb74973fb9f,2024-09-19T21:44:49.453000 -CVE-2024-43923,0,0,f3c6428e712e5ddffcaebb42dad83fbe64d10e843af076eec47526ecb719be88,2024-11-01T20:24:53.730000 +CVE-2024-43923,0,1,2b5b5078806af11e754bee3b220c94f3a77bd497e53afc47bf4a0bf326cd34eb,2024-11-01T20:24:53.730000 CVE-2024-43924,0,0,f4c232d5f7541d1030f4431c6fd8b2d52bd38910980d7fed5b8d5cc784463639,2024-11-06T17:03:52.480000 -CVE-2024-43925,0,0,fa212103d9cf9e4356950a14068757395285300b22b90ac9f0be4ad0dcd1cf41,2024-11-01T20:24:53.730000 +CVE-2024-43925,0,1,c253e5ed20f0a643cb01db8c4b79c3d736f9b8dfe996ec3bb51f7a049aa375f0,2024-11-01T20:24:53.730000 CVE-2024-43926,0,0,afe6ba4a11196449e0acf87526616d8bc217e24dbfcd1f8bfd3b6ef863d1044f,2024-09-03T15:15:45.160000 -CVE-2024-43928,0,0,a1c9eb78c1947c002cdd99d49ac8524997c196b334f44cf893d6df2a11b17b3f,2024-11-01T20:24:53.730000 -CVE-2024-43929,0,0,1e8b9fcfa9d130a58f7912f785c2133ed0debc937c0d78ca7a33efcaef9a0b42,2024-11-01T20:24:53.730000 +CVE-2024-43928,0,1,7b16271e011bba3c6b61f0b00b9867b2efe89ae06ef30e674103c1844067f327,2024-11-01T20:24:53.730000 +CVE-2024-43929,0,1,ff7bc69258fa862ed9f4b94806b3d5bb00ce2fac23c31cc802c83c022c85aaad,2024-11-01T20:24:53.730000 CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000 -CVE-2024-43930,0,0,d2718a7bbcdfb7abf58d6762854de5ad817f0467df620e35b4e8956bc4ad916c,2024-11-01T12:57:03.417000 +CVE-2024-43930,0,1,f483102c3decb002ca0bdadbf9f33ed6833d5e2a40470492f9988e5387a99518,2024-11-01T12:57:03.417000 CVE-2024-43931,0,0,e4b487ce16111f7507cab3f7997c98054a40435c39d10d2eeeecf16baa2d636f,2024-09-13T21:22:51.923000 -CVE-2024-43932,0,0,f14a83c6a26bdd3c97b03c4d014198268e158b28b9562058172091e71029572b,2024-11-01T20:24:53.730000 -CVE-2024-43933,0,0,b76fa47679dfa72a66de25f852bd969ad6a120271a2f056d41a08eee765bf430,2024-11-01T12:57:03.417000 +CVE-2024-43932,0,1,4f2597f4efef30dfe656fadd1c982449a2a1f8fc70c04618f9d1260415cf11f5,2024-11-01T20:24:53.730000 +CVE-2024-43933,0,1,2ccf4142889368fda000e8d9ad98e7c7d7b4cb225d8f5222cbb3534dc557358d,2024-11-01T12:57:03.417000 CVE-2024-43934,0,0,4e14707da9cba5c30b08d1fee5b95a63503f58541a5f170f7bdf2957916e0033,2024-09-03T15:17:36.507000 CVE-2024-43935,0,0,507740bb6b2ff7008debdb7eb0a31d10ff2310284bc85a28c8516e97f01a540f,2024-09-03T15:19:13.313000 CVE-2024-43936,0,0,13ff2ee8ac37d656ed3cfb9bac7c332b5831e52f7ec68739f3804a7d224b4b07,2024-09-03T15:20:22.557000 @@ -261120,7 +261120,7 @@ CVE-2024-43980,0,0,22cda8749b625b8ea71e2a354c1b75a165c8f5e69a4274355c271d14c7022 CVE-2024-43981,0,0,d9306d4f7bd01cab2e5f656db221ad8e082b4b67c177eb125f1137a5ab240607,2024-11-08T21:10:35.093000 CVE-2024-43982,0,0,3db88bc6f20f8a644e647b0a66efeb4f729e7d15a50f395d92ba94a89434ba74,2024-11-08T21:11:11.747000 CVE-2024-43983,0,0,8ea56144e7b46aa8d46319391d511f11093468f3fcd70ebf4dabea21dfbfa0ca,2024-09-25T14:11:22.450000 -CVE-2024-43984,0,0,70e882ed150cbff74ac91bfbe5c2f80957e9319ed7ad33a6219a403a9e0b4213,2024-11-01T12:57:03.417000 +CVE-2024-43984,0,1,a9748532c1a53d568f9a3c97c663d22fa0a8ba93e94ae10713f5f90aae37ec26,2024-11-01T12:57:03.417000 CVE-2024-43985,0,0,b30648ddb1d2b11b33385d41d42e62d1ebe2261e3847ee7222ca30a44e15ddae,2024-09-24T19:33:16.910000 CVE-2024-43986,0,0,5efaf977320cbeb2ee7ab2a0d0a051c6a0e3aea03f2d6530f85000dcba818978,2024-10-04T13:22:56.253000 CVE-2024-43987,0,0,e42ccbdb2b94d874179a0c5a29e5439a09d4ffe036d9ba2323192b8072b93dd2,2024-09-25T14:08:22.987000 @@ -261226,7 +261226,7 @@ CVE-2024-44094,0,0,745c42fe2d315a5bcee63bacf45ed85a137f90126e69b7519e917691efb99 CVE-2024-44095,0,0,b00dc9986da442410ed4230403c0d5027e748adf40134501c33f35c9b4d16312,2024-10-15T14:35:04.083000 CVE-2024-44096,0,0,9e10fae26ac71a12ed9f5239ac873ac3368309ebde15657c2661c84b3db39f54,2024-10-15T14:35:04.383000 CVE-2024-44097,0,0,965cf9d05fda49947baa77cde6164ca7e937d7f38563ab41cd3e9e9bd0e5a36b,2024-10-04T13:50:43.727000 -CVE-2024-44098,0,0,1168004266a8f5e54e269c18ca4a45508b8876128dba4e929319900254f0936c,2024-10-25T17:35:01.100000 +CVE-2024-44098,0,1,6649d49e201f261536002e7aed047e988f5e5a47cc1ab09f44123dc1a7c87fcb,2024-10-25T17:35:01.100000 CVE-2024-44099,0,0,4225e962ab30bccafe3791f0d606bbec04f80a361f6ed22909e224c17cd46669,2024-10-28T13:56:37.530000 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 CVE-2024-44100,0,0,55add0e1d3c482299f51180f43855e3b3b24a13213cd2d9c6f34e5bde5fa49b1,2024-10-28T13:50:50.743000 @@ -261240,9 +261240,9 @@ CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea CVE-2024-44112,0,0,0b8bf5761fae1061c83dd7332f5b3027481f791877934ad1d55322c5110d025b,2024-09-16T14:19:24.917000 CVE-2024-44113,0,0,74d2cd3604829033f201ba9d0769b1dcbd2b028e1d8a51bacee7bb51b45ebac7,2024-09-10T12:09:50.377000 CVE-2024-44114,0,0,e71ec68d461cf2cf2e20a4b8b8ef302465dd6c421d7e2af13fcf9594cce3daf1,2024-09-16T14:09:10.170000 -CVE-2024-44115,0,0,d84fae05a6712dddd87cc316adac1dfa053d6e65bd4621d5f3163024d845e7e4,2024-09-10T12:09:50.377000 -CVE-2024-44116,0,0,f539024555f2c30aff387b07786f96ec82aa197562db4318d2a4d0edb7b5099e,2024-09-10T12:09:50.377000 -CVE-2024-44117,0,0,e1e7d2c07b8cb4271ea5948f1fafb7d04df2168a6fe40662a14c8cff93dd2ef2,2024-09-10T12:09:50.377000 +CVE-2024-44115,0,1,2a30ea5add688d45659eca100982c864d46c6ddd00dc5e9bc49831df26f18590,2024-09-10T12:09:50.377000 +CVE-2024-44116,0,1,e864e012d0e5d96cbfc054f4369e58e067ed8cb636bcf383d653a5b759dea479,2024-09-10T12:09:50.377000 +CVE-2024-44117,0,1,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0fb1,2024-09-10T12:09:50.377000 CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000 CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000 CVE-2024-44122,0,0,1e9fa52c3aa8426c7e5b8d77a9c61659bbf7250c9743ea15e0507a8d110f05fc,2024-10-29T17:38:18.457000 @@ -261333,9 +261333,9 @@ CVE-2024-44222,0,0,2d1c9506aa01928c94a245f74651f0e477458ddd815a4bd143998351ecb56 CVE-2024-44228,0,0,4d366f4ca03e1f210ca17d40371d7f0002d4d2fd25c7288f272f27e0c556885e,2024-10-30T20:35:27.570000 CVE-2024-44229,0,0,459366a3ff6ef76a99d08535a28f4f2b6e8f55a20bc19afc8ece1fec95aa44c2,2024-10-29T23:15:03.437000 CVE-2024-4423,0,0,0715bc9caf3e0b170ca2968c721bdd1e236908d8891315bb75fdf772bdc9c875,2024-07-03T02:07:32.943000 -CVE-2024-44232,0,0,3fbe44e4234d017eaf06dfe11500106b1c1f27817b9da3c7498cf923d0b31bc7,2024-11-04T21:35:07.233000 -CVE-2024-44233,0,0,4e116c60e2f8b4a4de222c448ec0b2dd784509714d36dcce11a20af58c7b5f7d,2024-11-04T22:35:07.613000 -CVE-2024-44234,0,0,82408897d48c8a47124992d1c94da051dd820e10264980d21bbc3dd678fe407d,2024-11-04T21:35:08.147000 +CVE-2024-44232,0,1,f33203a0b1bd6fc9e799e804233560f59ee711e2b6d158960cc1814d0a1f662b,2024-11-04T21:35:07.233000 +CVE-2024-44233,0,1,75d270396aec35e61f452689aa282f94991935a66847320f16cee14f260ce6c8,2024-11-04T22:35:07.613000 +CVE-2024-44234,0,1,7ccaea3031465eb8d7f8b49c9f2f5deb5715b7b0d43e5d4e689772c1d0588aee,2024-11-04T21:35:08.147000 CVE-2024-44235,0,0,f6b12e29f9914b58eea41bdafe0e4148ebdbea0c9aa9cac7f81ae35deb7df419,2024-10-30T21:35:06.987000 CVE-2024-44236,0,0,2596c988781ee3ffb6a2ddc6dda4e4baeacf8834e38bce0c324b3d9abc20481c,2024-10-30T17:28:52.077000 CVE-2024-44237,0,0,0ccb96caec122e6d60ce17ba18063b0a9447d8c20c9511ccf57f0112e5d3846b,2024-10-29T21:35:16.563000 @@ -261353,12 +261353,12 @@ CVE-2024-44255,0,0,89e692fbabe1ac868aa1386f1241f7c919e5ed3a9076044380cfc36ec3d5e CVE-2024-44256,0,0,17aa03a2ed4c3fc9cc6050efee4584273e8e878058b24cc398dd2574b5d0db34,2024-10-29T20:35:29.053000 CVE-2024-44257,0,0,fbfaa04f8cbb781c7b5c9b4d7e31917aa6b40ea53153adf50b1bee22b30132a9,2024-10-29T20:35:29.240000 CVE-2024-44258,0,0,8ab03e966a595d486d0092627a33702077a9f3d63331ec096ff5f3f8ee57fb7b,2024-11-06T14:35:02.583000 -CVE-2024-44259,0,0,34e000c43f89f1c6e41f971ae05cc2648b135b80ff70f0cd9cdfe5676f091511,2024-10-29T23:15:03.663000 +CVE-2024-44259,0,1,47e11f71bad037261fde3e21d5ccb8f1b947f85ae79456545459126997c2e50a,2024-10-29T23:15:03.663000 CVE-2024-4426,0,0,438c7e77bba5537169c045ba2dc210873849174945e68052d5a8bbbd94b93b11,2024-05-30T13:15:41.297000 CVE-2024-44260,0,0,5a4143b47f6bb680997cf416c6ec19c71d6b161de490b20adc7ab8ee10998409,2024-10-29T21:35:17.343000 -CVE-2024-44261,0,0,63f4f56282555d6400339aacb88699660f2f51148f97c24f4e2f1148936767b9,2024-10-29T21:35:17.520000 +CVE-2024-44261,0,1,ac5c2319d7141c33f35111ae54461f835f5b380aa698ee56f2c7145d41149eb8,2024-10-29T21:35:17.520000 CVE-2024-44262,0,0,e62c07827f858b9863b4323af3353229b04c4a4968ada1b6681be2f9942c7e0c,2024-10-30T21:35:08.940000 -CVE-2024-44263,0,0,a819848c86eae35a801a866c7cc8c7d5416433f8b99a5a8aa14e7494fd1ec8c4,2024-10-29T20:35:30.263000 +CVE-2024-44263,0,1,ac2472a17b6d70365d0e3aa72b52204af3f68594a177b222a7cd47927a494c99,2024-10-29T20:35:30.263000 CVE-2024-44264,0,0,33fcf42e2fcb995d42ddbd345714bacb26a882080544a1c74471572aa6f67948,2024-10-30T18:37:01.203000 CVE-2024-44265,0,0,0e016ac5591729bc817ef1ed825e4214d2d87c630068f126a9532f43be1ca75a,2024-10-30T19:35:20.800000 CVE-2024-44267,0,0,54e307259fdf9faf2d295558cca35d928ee749fcbb69e49a19893e000b272151,2024-10-30T18:39:55.167000 @@ -261367,12 +261367,12 @@ CVE-2024-4427,0,0,80d5c9824f4d390f5c719cacd09f3ea81ff1def48bdeaace03a047150cb666 CVE-2024-44270,0,0,7089433a6c538cdb3d5ca719fb3a428260ae4bb28b57a76008743dcdfdc4dc2b,2024-10-30T18:44:35.083000 CVE-2024-44273,0,0,9b52f6442241f191e6f7734f08bf3bd3c66642dbeb46beac22ef1f1f71e24ebd,2024-10-30T18:45:10.080000 CVE-2024-44274,0,0,878c12bc0c5ed088224693c4fee5c136b2b242acfaa1215e679b88984cc54c8e,2024-10-30T21:35:09.203000 -CVE-2024-44275,0,0,d8e06bb43c158fcc4281797d1ccceef0155ebbbf771c23024f0bfd1184657b41,2024-10-29T19:35:17.777000 -CVE-2024-44277,0,0,61d2c2a1458817cc145742f3d2eca621b243ba7bf6807dd615d1ca055f76ebe4,2024-10-29T21:35:17.737000 -CVE-2024-44278,0,0,6a7f9872d82db0bbf03957c1afd6ecbea3f2f06c40db6f23a06b217454e0d632,2024-10-30T14:35:12.077000 +CVE-2024-44275,0,1,01ad5fa6b9f60f7a76d41cde8e45623975ca1693de43edcacc61dab5aca5b7d0,2024-10-29T19:35:17.777000 +CVE-2024-44277,0,1,34bc3836eeee1a48b6ce3afb77b9f2b3fe097bdac58fdca1993a4e7caf0100b2,2024-10-29T21:35:17.737000 +CVE-2024-44278,0,1,7db1971b5d3bc4f56946c84303c1abaca693dd8953b7d5a65e2d89973dc11158,2024-10-30T14:35:12.077000 CVE-2024-44279,0,0,46b4a70284608cd623dce4bf8f315595524d7e7caa51dbade793fd08dea3ec38,2024-10-30T15:35:16.063000 CVE-2024-4428,0,0,a6da5e3db14ee64a55bd0d7000ef1cdcb0310671965cf729d94b935d780a379a,2024-08-30T15:49:16.927000 -CVE-2024-44280,0,0,3c88d828a58a14a85e8e2703993f405717fc468f11000fa1c0be5028b7b08202,2024-10-30T15:35:17.173000 +CVE-2024-44280,0,1,41b65734e005935a63a73c2d6bb5940a5f361c3e840e164e9d593c3c38ce6ea2,2024-10-30T15:35:17.173000 CVE-2024-44281,0,0,4304f0ed1bae84755cb47b4e9b510fcf879fe5817db8b63f9bbc9d6227dbd4a0,2024-10-30T21:35:09.543000 CVE-2024-44282,0,0,5f8c798b4d9d0ea2d7f04997e606b856022096ee97d357274135c89c18674756,2024-10-30T18:47:21.447000 CVE-2024-44283,0,0,3ac88c7ddb1fed650f2454e0ae10df8bc4c84ca583c6c661ebf37603888b15af,2024-10-29T21:35:19.207000 @@ -261890,7 +261890,7 @@ CVE-2024-45281,0,0,4f2ade81d2de9a248b89bed024c68ca3f1f270cca613f61913da466a03b91 CVE-2024-45282,0,0,b4d5f6cb555bc9da0672beb58aff1d2b216f5435ade907efa8bebd45466e7d96,2024-10-10T12:57:21.987000 CVE-2024-45283,0,0,ce8f369ffea2eeffc8857e4ab9cb42ea251415aa793afc61b47185622611c31e,2024-09-10T12:09:50.377000 CVE-2024-45284,0,0,ca1d56addf4d46503c4bb1131dd4827ad4650a2366176451f90717aebb949b1c,2024-09-10T12:09:50.377000 -CVE-2024-45285,0,0,b2db186183a77f57502b548a09c0878cfe427bf8d75e893164614e4df391cff9,2024-09-10T12:09:50.377000 +CVE-2024-45285,0,1,432443f16f3bc2cd7fd6662743de8a85c2d23de3c5e8c63d8a475d82e46b6f7b,2024-09-10T12:09:50.377000 CVE-2024-45286,0,0,8f2e1da507766dacf9e0cae8531253d3a4901ee6705aefce0b8c842c2e03783f,2024-09-10T12:09:50.377000 CVE-2024-45287,0,0,045bfb0d53167c55abd32c57163028c51920368f50e2cf76774839485016e81f,2024-09-06T16:26:26.303000 CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000 @@ -261914,7 +261914,7 @@ CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a CVE-2024-45306,0,0,492d01bc755bef5620391aaeab10cbcbbc187e7fb0b5fdfef32f617ff36771b7,2024-10-01T15:20:29.533000 CVE-2024-45307,0,0,453e354c13ea082f71f784fb99af4cdeb162dcc05e43b9c9b2e7febafaebfb7b,2024-09-07T01:34:05.907000 CVE-2024-45308,0,0,700e0eb4024a102ed71899877978cfb0e434a318435f3d46acfc9659de5f360b,2024-09-03T12:59:02.453000 -CVE-2024-45309,0,0,37b1b6516a2eba33c3ab3ba214ce5f9d1c13f014d2b6ba3988d0b90f4c60c88d,2024-10-21T17:09:45.417000 +CVE-2024-45309,0,1,ccef45c69697c06d2e18f0c2778de8d0d49f29cfcf182bfdc484e40f1c83f2df,2024-10-21T17:09:45.417000 CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000 CVE-2024-45310,0,0,b4f994e38147edf9427b72be6b743ed0caed3e55fb540eb2ac96b6f81ac208e0,2024-09-03T19:40:46.783000 CVE-2024-45311,0,0,31e4f90acb3914bc5f26ccdbeff62c6d2144f0789887b6397c99591eab2befc3,2024-09-25T17:03:36.817000 @@ -261957,15 +261957,15 @@ CVE-2024-45392,0,0,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb CVE-2024-45393,0,0,6f436bc32d420db4f8aef33efc64d5a86243ff621c73802c298c0db31d80b7a3,2024-09-10T15:50:47.237000 CVE-2024-45394,0,0,087a53dae86480e9cc9b0f35c92b2e1955ad080485b753f37f05c38b033a4e79,2024-10-09T15:15:13.600000 CVE-2024-45395,0,0,5d56a4af61ec059101686b1e7cb37e5e2b811fdef7d02e3f80cc3ab9c9de60ec,2024-09-24T16:50:07.930000 -CVE-2024-45396,0,0,6dd675c87b2e1227fcfe3f31ed5f824cb6c1442cfdf5adf443dadd8dc96e6a55,2024-10-15T12:58:51.050000 -CVE-2024-45397,0,0,976f4825b8c3f8426e18867ba9ae6d9acb68fa74d718c807376a8714ae877bc9,2024-10-15T12:58:51.050000 +CVE-2024-45396,0,1,145ce5f64a797314ac414fa4a42e9f18380b9e63de2ac05958f9cc66510f8155,2024-10-15T12:58:51.050000 +CVE-2024-45397,0,1,bd4e925f6bae33bb58cb9795a2fc96e40b6eaa1ce454f86da9c061615ab217e4,2024-10-15T12:58:51.050000 CVE-2024-45398,0,0,7d0ffef7297178b253d2c7dc1d3134ea1f5d20b5e1c2ba29b34a3e96958f60bb,2024-09-25T19:20:52.527000 CVE-2024-45399,0,0,00e25ddf2914c9fa87aad2e5386f06040c0acda61d936c8ae5f89b710f3a24c9,2024-09-24T16:48:10.083000 CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000 CVE-2024-45400,0,0,23d149ef7bada976fce9d2c89ea0cb38e5ff315577519b49e805da7db09942df,2024-09-19T18:04:36.627000 CVE-2024-45401,0,0,954ab622986edfe93d770dee5aae8a96aecaff4645097c85021d65007f0d9f05,2024-09-19T18:12:52.220000 -CVE-2024-45402,0,0,7483978a1da40c4cf710372cbf23c94319b8b6cc4f6b68f7409c7b0607520da8,2024-10-15T12:58:51.050000 -CVE-2024-45403,0,0,2e861be4c43e672b345b681bbb08a740e6626269bb63f02e9c136edde83231da,2024-10-15T12:58:51.050000 +CVE-2024-45402,0,1,9d902c2d69fb49278ebc5190705073700ab0450b4465734030e07e0f3939ad50,2024-10-15T12:58:51.050000 +CVE-2024-45403,0,1,e43a1e7c6c164fe7f8bff8a27a689ee237d6db2840de66a15a2d5e071e7270b4,2024-10-15T12:58:51.050000 CVE-2024-45405,0,0,fcb9dae5692e8d4d27671ebdd5ac9faa600b717293c20df4e46e96d26ca1730f,2024-09-06T16:46:26.830000 CVE-2024-45406,0,0,fccecd6532f18f7e1ea06f6cc62abb2faeaefa7fcd57ba441a0597b2a31370da,2024-09-13T15:30:45.380000 CVE-2024-45407,0,0,761b4924e4b46db1752cf42f388ca76c7e573211ea8b116cb02c0d2e460e33eb,2024-09-20T16:18:46.717000 @@ -262230,16 +262230,16 @@ CVE-2024-45873,0,0,c49a27b891c2cba5f20315647687fde4c837ff4206eca9eaffb57a4f0d790 CVE-2024-45874,0,0,2e0e68e484da1ec476bcb0982736db7f6eddfb72b06a902a4960817b887d973a,2024-10-10T12:57:21.987000 CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000 CVE-2024-45880,0,0,cea99cab279728fefb1cf99178e03e8166f7f71fb61ca1ac6100aefdaeff9258,2024-10-10T12:56:30.817000 -CVE-2024-45882,0,0,4a977af8fdd839cd4f9ec7d626404754a20e280136cd0957d74d6ce36952a6fa,2024-11-04T18:50:05.607000 -CVE-2024-45884,0,0,4248abe1b6b5044f680879e90513283a5706ec504fd510f598fa028423e0546c,2024-11-04T18:50:05.607000 -CVE-2024-45885,0,0,c7673dac95f2e274f0c52351a0724f70812d1f0f53eb28fd104408c9752ab424,2024-11-04T18:50:05.607000 -CVE-2024-45887,0,0,ad0f4d71217154c00e00009f5378adccb0c580a79b8d13e096670b39627ca3af,2024-11-04T18:50:05.607000 -CVE-2024-45888,0,0,b79efdd075a61a01f7126c4c1da549cf5602389dbc7aef8dc7b2347a51647d3c,2024-11-04T18:50:05.607000 -CVE-2024-45889,0,0,512ef2d3caaade1639f221d9a87472c7147b7a39f2b32d901ecfd06ba58ed97c,2024-11-04T18:50:05.607000 +CVE-2024-45882,0,1,a14449ffa2d1f7de4757ef5afa74eb71a4d5e2837a9c3cf521070ed5cd905c99,2024-11-04T18:50:05.607000 +CVE-2024-45884,0,1,e7cb95d31d6ab550de8dfbe190fccbd8e46929c3d5c073be56affcf89ff16fe3,2024-11-04T18:50:05.607000 +CVE-2024-45885,0,1,58ed5d69545d86625397589d2c9148a73a7593337014ad6cfbc0940de64f72af,2024-11-04T18:50:05.607000 +CVE-2024-45887,0,1,9572c200b0adedd530201b518e044cb80045414c537aa7e95f45d7f479af2834,2024-11-04T18:50:05.607000 +CVE-2024-45888,0,1,92023c7990280b45239f8b917025a16d8b4e96bd9aadab007018775fcc36dbe6,2024-11-04T18:50:05.607000 +CVE-2024-45889,0,1,cd9e7531c228369c4cd5373452f6e43a0e06e2ff6d0a472a158e471ab5027a50,2024-11-04T18:50:05.607000 CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40c9,2024-06-04T19:20:43.257000 -CVE-2024-45890,0,0,9691f342b540a5c558f2871c8e7e44faa16ec59d64e890b9fbf5fea35d30b539,2024-11-04T18:50:05.607000 -CVE-2024-45891,0,0,50fff6697f014ddbc5f2b6ba55857b27bdd1629ef94c1d57793dde287bc51282,2024-11-04T18:50:05.607000 -CVE-2024-45893,0,0,5f10b85050f43cff47e43a959f8c7947ba6467dcbd117fb999c03d320bfccf01,2024-11-04T18:50:05.607000 +CVE-2024-45890,0,1,c542a45da5800b9bf070465b938286cb14fb29efd3dd7dad08549516b77cd8a3,2024-11-04T18:50:05.607000 +CVE-2024-45891,0,1,56567b56a9d3c3f88f0920d683da3bd5f2224a241c99109d192e99e45770b58f,2024-11-04T18:50:05.607000 +CVE-2024-45893,0,1,fd5db6b3d0fca1b7c42fbd6eb93b25e78d90980aef0f1cc7dadfc28f9d661733,2024-11-04T18:50:05.607000 CVE-2024-45894,0,0,740550dc5a86649aa0fe59728cae8a43ea99cf049e7478afa6af433b67b6e7ff,2024-10-10T12:57:21.987000 CVE-2024-4590,0,0,8ca402987898b35fa6dccf6a68bedf09dff404f8ccc3b30e4b5d3617c810458c,2024-06-04T19:20:43.350000 CVE-2024-4591,0,0,932b05f4c05f6cec282455aa1d3695481031502fa6f9d1dddbe95851cbcfc0be,2024-06-04T19:20:43.450000 @@ -262787,10 +262787,10 @@ CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba386 CVE-2024-47010,0,0,ee58b9d0b7d45ffa465af597d034eab50b110dc72368e1b0d3bbec3fe3bad3d6,2024-10-16T13:28:07.393000 CVE-2024-47011,0,0,834715db0c973116652eef0dcc6e7b991e8d6c4d096b7d3fa0496c73f0d11b86,2024-10-16T13:28:40.480000 CVE-2024-47012,0,0,2098857b14366711fd60b64f2734eb82b6e22fb76d2f66209eec549e8e9a7d39,2024-10-28T13:58:44.983000 -CVE-2024-47013,0,0,c79edd60fa0cb1b64b4333b41bac8a25c3b687d03a9279b3c4a732c53b04973e,2024-10-25T19:35:10.947000 -CVE-2024-47014,0,0,2588aa48a53d7f12c66f0a23d0984f4a68a355479a0bdb5afb4d6899e7323bbd,2024-10-25T19:35:11.740000 -CVE-2024-47015,0,0,ff96cfa0d9f88263fbfdd79733732a9ff330d97dcf8ab9375596378f10ba09df,2024-10-25T15:35:13.317000 -CVE-2024-47016,0,0,5bb480ec0e9fd631ee64eb7e86f79fadf399ca14a987be83ebc334f12731b432,2024-10-25T15:35:14.487000 +CVE-2024-47013,0,1,d8ff9af6a0ce96f0f752ccf1d135bbd3f9b992791588007a1f6f6c96983d8fb3,2024-10-25T19:35:10.947000 +CVE-2024-47014,0,1,0afee497105b16e988115a43a5f0c7ba2896e979540f4ef84e94bd205976cb07,2024-10-25T19:35:11.740000 +CVE-2024-47015,0,1,18beaafa8ecd7ebf9ee21da21cf9a9fecd16652fb9e872df7a26690e0c84cf36,2024-10-25T15:35:13.317000 +CVE-2024-47016,0,1,53e3d70c451e3688eab1318d8f3ed44bb4995ff677ababa46b77b8411c51ede0,2024-10-25T15:35:14.487000 CVE-2024-47017,0,0,a5557233255d4bd505de69713c12556f70a27edd6b6c9c1d268d9c6b01372b54,2024-10-28T17:56:37.110000 CVE-2024-47018,0,0,39938e073aba1879564133666a5d99d27c975e4d54ef0f9ae9bbf722dc0132ec,2024-10-28T18:00:49.030000 CVE-2024-47019,0,0,27843711eeafcddf5fb53ec00ad055bad90d9d74d592dd44525c51953b90d31b,2024-10-28T18:00:37.587000 @@ -262838,7 +262838,7 @@ CVE-2024-47070,0,0,eb4e046cb0db7f50fe7115a81e47e9b3e2a8d6720f2cc6fa65783765e5390 CVE-2024-47071,0,0,2a2727cf2aa9f31ddc31166413e132f87e7e569f257fdb08eb6f77a7cd1bf2ac,2024-10-04T13:51:25.567000 CVE-2024-47072,0,0,0e35b2a8d8fc5d55d46fabe70f892995ce54782bcdf9f6055325a82c63d5f14b,2024-11-08T19:01:03.880000 CVE-2024-47073,0,0,5e9a39ce407ce0e80790a37166780ab582a628936b21fe14c192cef183ac3468,2024-11-08T19:01:03.880000 -CVE-2024-47074,0,0,c235393b42c4b6df5eccda6c9c87286d920054a08fd0159e7304cbc69442da06,2024-10-15T12:58:51.050000 +CVE-2024-47074,0,1,85b0d20db18cba6f1618ee108f15353bb747058cd84a8ac0cfd5d8f3f78ff07f,2024-10-15T12:58:51.050000 CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000 CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000 CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa9ea,2024-09-30T12:45:57.823000 @@ -262904,7 +262904,7 @@ CVE-2024-47179,0,0,d53006137adae685c7c1c2137c456714ed89b092428bbe15520d76109ed40 CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000 CVE-2024-47180,0,0,657c5516ab8b6145e58c8aac2b3c60b2287f164333060e376b2fc3a8acbd6fb3,2024-09-30T12:46:20.237000 CVE-2024-47182,0,0,e5cdb75305d71a5fc3653b4e9f8414538656f5f17a6a2cce9e83d34199d18380,2024-10-04T18:31:29.027000 -CVE-2024-47183,0,0,0b76031324ee2fb120db4824ba5dbb2c20e3fad1aa53ab61ba1485112276da67,2024-10-07T17:48:28.117000 +CVE-2024-47183,0,1,2d93a6d91526534b2f43da34f9a4d27531a4d7b8af9e57604ca83d1b510d6fd9,2024-10-07T17:48:28.117000 CVE-2024-47184,0,0,ec4f2d4aa381d6be3b04a5d96e034e76004fe037b3abeb496a459d57a9fce134,2024-10-04T18:19:26.240000 CVE-2024-47186,0,0,039f38f277124d2a0772e43f534fb151851ccf4c65185f4966f7e81d742991ce,2024-10-07T13:30:55.640000 CVE-2024-47187,0,0,817b13d1e8de6a39f3ef47c843dc5a93e7afef448e0409c2b2ed1c1bad0aac52,2024-10-22T13:48:59.893000 @@ -262955,28 +262955,28 @@ CVE-2024-47299,0,0,69ddc217eb16e2f207164d9621a98f8efcecc43a8fd19b4abba37eee03e8e CVE-2024-4730,0,0,055c30f8bd03259d264f17e44955582c75615e93d958180e12436700bac392ab,2024-06-12T20:15:13.300000 CVE-2024-47300,0,0,e5260e77ae485ce7444a2bca3985a3a48c649071ed7d73d1439a6a493c414714,2024-10-07T17:47:48.410000 CVE-2024-47301,0,0,ac90c43742dd943ad9767aa191ce247a301b3e33f4d7e439daf4f0d3b09b6647,2024-10-07T17:47:48.410000 -CVE-2024-47302,0,0,968eaa5421bb0fdac98f4767cefa9f247af869e25a1fa4e85806d5e60091dcf7,2024-11-01T20:24:53.730000 +CVE-2024-47302,0,1,68601654804cd386279abcfe312b7a3da5310b899cbeabe8c72587ec15fee3f7,2024-11-01T20:24:53.730000 CVE-2024-47303,0,0,bf8d75e01dd1aa85338666dfdc484b4a62ecc62745a2e39a6913339b9fa92fed,2024-10-02T19:00:24.750000 CVE-2024-47304,0,0,7406b4c650ebd707369265ef4b8f5066b713c8b353b6dde674c1a19490c8893f,2024-10-18T12:52:33.507000 CVE-2024-47305,0,0,7c018d03a71f28200e41a87d693293b1e365b3b52710d7dc9c8bc548afdcc447,2024-10-02T16:35:40.077000 CVE-2024-47306,0,0,eaf32b36bbd3f14919162085488bb2ae7d4855fa0c613850748fc5c60d229a8c,2024-10-07T17:47:48.410000 CVE-2024-47307,0,0,487f26513afaa1868dd378174c9d3f7237a2ae92bed0d1dfde1647ea1d3fe506,2024-10-07T17:47:48.410000 -CVE-2024-47308,0,0,7a02b82fcfe3a8905e5442a1f9ac9f3fc22bfab63984ddb017bdb7bbc1c550ca,2024-11-01T20:24:53.730000 +CVE-2024-47308,0,1,7fa912fe904d28b80557bb11620cf88a92ab3fb60d26da1aad4da68874ac7b92,2024-11-01T20:24:53.730000 CVE-2024-47309,0,0,21dcfe3c0636d6932b8735e4db0f75a20433cb361cb491f225d3cc92dcd30979,2024-10-07T17:48:28.117000 CVE-2024-4731,0,0,ff0f4697afac2eb26d16b700c40cb0a3947b6039ec9b762c8c08a8e49bc998ce,2024-06-04T19:20:48.130000 CVE-2024-47310,0,0,8663484ee2c5b72222f0e4f9365fdd142731c8f04d18b42bdd48041cae516b98,2024-10-07T17:47:48.410000 -CVE-2024-47311,0,0,e970b3cc51ad6ac5a7d4aa44c93c55fee6f6d6bb97b461af890b1baddfb87f5d,2024-11-01T20:24:53.730000 +CVE-2024-47311,0,1,6edea16e58f1d66319cb3fc63bf218fa6561b7f8bd0127eda8f886e232db47ab,2024-11-01T20:24:53.730000 CVE-2024-47312,0,0,21a9fd1102fbd401b51ac00c291ad86e50be8ec9dc455fe13fa5a7d20b8d0b36,2024-10-18T12:52:33.507000 CVE-2024-47313,0,0,bc2ecdde437531f392b35f4f3c15088fd858be1b53245b6e08dfe84901b6ce9a,2024-10-07T17:47:48.410000 -CVE-2024-47314,0,0,d97654301fe6e38939afde6ebeacccbdbfb8d2c79e7ed1b03cec6e4d2e186adc,2024-11-01T20:24:53.730000 +CVE-2024-47314,0,1,4ac6a9af466af4dcd964460471f5c3cd12275f47cae951e74da6e632352349f1,2024-11-01T20:24:53.730000 CVE-2024-47315,0,0,f8fc8e04ef461f394697878d14c77fa20555585c6db931561c38f9edd4a9ab5c,2024-09-30T18:06:36.060000 CVE-2024-47316,0,0,4bb4520f5213b3c8bde177c73e6a9c0ba6ad3dd3b6425b0d46c411f50cc87fcb,2024-10-07T17:48:28.117000 -CVE-2024-47317,0,0,7168a460cf8a8dd6907188de0a397782dc2d30a512c16cdf03f774b0dbb3e3e3,2024-11-01T20:24:53.730000 -CVE-2024-47318,0,0,03a6ae2e2a78bdb905a65eef085ce53c29086336a2804d6dfae67a303ac03318,2024-11-01T20:24:53.730000 +CVE-2024-47317,0,1,dcba996ede8836de97a65fb2f5096e95053eb84a750816c636affd589a3028bc,2024-11-01T20:24:53.730000 +CVE-2024-47318,0,1,5faf119e2cdac99b50b5ef6c13fbc3f976ac60433ba7701d85d2e475fc69d81a,2024-11-01T20:24:53.730000 CVE-2024-47319,0,0,ec119580ae92baaeaa77fbe02b724f0292ddb7d31e4363cd49fd4eca14bb6e47,2024-10-07T17:48:28.117000 CVE-2024-4732,0,0,2f9d1622a74bcf5d144d47d69a297d840c0353e903036f272ef15e7560aa5dbf,2024-06-04T19:20:48.237000 CVE-2024-47320,0,0,34657895a2dc740604de3ed70971ec71840d6f541e4b1dab5738b65bfae578d8,2024-10-07T17:47:48.410000 -CVE-2024-47321,0,0,96ef013a66871efe96fee1dc276b9c624f4937e0e8199809de24caab2bf433db,2024-11-01T20:24:53.730000 +CVE-2024-47321,0,1,a802fc0151aca378c223559d333005ac13c9b40eed20f659ac68779146b5c386,2024-11-01T20:24:53.730000 CVE-2024-47322,0,0,8b232be4cdc689515d55262ec30fa58411c26ba1e6f796e82a1afc447dc811dd,2024-10-07T17:47:48.410000 CVE-2024-47323,0,0,9437c7effa68c712270b139ca11dd61e48e93b311d9f840ede69c45aa4843c11,2024-10-07T17:48:28.117000 CVE-2024-47324,0,0,9d0a8be9058b908dcef652c569e8b2141d19736e2ee3f4e8dc4463e949bd1e2a,2024-10-07T17:48:28.117000 @@ -263016,11 +263016,11 @@ CVE-2024-47354,0,0,6134434fa97da25d9165870f5853ccace7086e06da2c04b706195994fa4c1 CVE-2024-47355,0,0,12a7099a9d6cdd27b256bc5c48c3a41afec28615356ab2b2ea1493ea2e2ae12f,2024-10-07T17:47:48.410000 CVE-2024-47356,0,0,ca86bef3a64488bb151757babe27aa9ffdd4ef292d24e939d9d6f108a98fd589,2024-10-07T17:47:48.410000 CVE-2024-47357,0,0,ef34fc816e0519499aa111866aaf198aae04b83f86c74c4b0f6800883576b819,2024-10-07T17:47:48.410000 -CVE-2024-47358,0,0,32d5ae04c333282ebc135e9b05452bcca37053f87ecd58fcf021e286fa15a3ba,2024-11-01T20:24:53.730000 -CVE-2024-47359,0,0,c34c4650204e6d07d6f308c980141469d9fb3614dd4e457e3b13a9296a45e254,2024-11-01T20:24:53.730000 +CVE-2024-47358,0,1,fb1c0d5431500381806be62467b46d27c49742db04b30578754d9383f65032b4,2024-11-01T20:24:53.730000 +CVE-2024-47359,0,1,395bb3ca2488f71881e174a1ec2d8ff9e7b11f78f741cf7bdd8a30a3b3ff2512,2024-11-01T20:24:53.730000 CVE-2024-4736,0,0,d66d2cb2e0afad57d9d4fb0dd29db1ae480425b093ff5e46c35972ad67bf1599,2024-06-04T19:20:48.497000 CVE-2024-47360,0,0,1370af71473e797c73fb7a35ee179cd61bb339e10b621d15447efd016876e9dc,2024-10-07T17:47:48.410000 -CVE-2024-47361,0,0,f79d65bb5fab4dede8fad8b5cd70d7bd537aaa825f5c80187439276582dc793e,2024-11-01T20:24:53.730000 +CVE-2024-47361,0,1,a35554c430fd5881cea143f1982deb8f9726bf40b4f9b226dba8719d6401a16f,2024-11-01T20:24:53.730000 CVE-2024-47362,0,0,7148f12e08f02f92c2e045d4f1bbb54866ce118ab050ff910f9693d1b2c46836,2024-11-05T21:44:55.657000 CVE-2024-47363,0,0,18825c79d1c9c0244e45a7e0436baf5e08868c270732d6301d9ac1e64471bf85,2024-10-07T17:47:48.410000 CVE-2024-47364,0,0,4910605e0fad6d4d34926b035fe4ababa3ed531d70996b5e931af1da39a2cb00,2024-10-07T17:47:48.410000 @@ -263060,7 +263060,7 @@ CVE-2024-47394,0,0,daa2fa23b6202a7be1b9a64f30715f76657ba6704579065bb397454b5369f CVE-2024-47395,0,0,90e43e7601880e084e28158fd0f757d2c1e8d3077c69265838f948abdb4cd942,2024-10-07T17:47:48.410000 CVE-2024-47396,0,0,6e476c6cf26f38283e3d61fa442a94302635b62a84c847a353123b5fa4f97bed,2024-10-04T13:51:25.567000 CVE-2024-4740,0,0,439bcc64d74362dfc2e1f6f7e2fb88748e7e0a568332807fb055a46f95bae835,2024-10-18T15:13:42.123000 -CVE-2024-47401,0,0,8a5e86c64c6250f94cf1f6a4606f4c5ff007b348a25f8869f6f018d7119e028e,2024-10-29T14:34:04.427000 +CVE-2024-47401,0,1,31b67194c0f423565ffde74a81facf6073de0389fd9b73eaa3e0f5427ff3b840,2024-10-29T14:34:04.427000 CVE-2024-47402,0,0,7317d7851c48d928403b85ae519b306bf5cf2471e643c5955156c069ced0d83a,2024-11-06T15:26:23.290000 CVE-2024-47404,0,0,803edf639eed2c823e89b500bd8828e4b5948de9457114b2a2c12c0006396574,2024-11-06T15:25:24.887000 CVE-2024-47406,0,0,84061db2b724de731237f8782f9c677d123be7cab95d085f5d8375f0a77ff4a6,2024-11-05T19:36:13.840000 @@ -263128,7 +263128,7 @@ CVE-2024-47525,0,0,8339d8a4218b69cc82268cff155d0d4fed2713f73ada7785c822ea6568feb CVE-2024-47526,0,0,eb16a10d8f74cde3579603749ff3cfb381488e1ecf42d3c0633b2eaac9e4c5e1,2024-10-04T13:50:43.727000 CVE-2024-47527,0,0,6448adfc6fe781d292ba5a9887205495de1e6ae1fd7107635f3ac2f0d1da5da0,2024-10-07T19:08:41.467000 CVE-2024-47528,0,0,f8a40bc5f3a1abfe246d4cda70316c63fc753979863ed711468abfa611b23cd8,2024-10-04T13:50:43.727000 -CVE-2024-47529,0,0,31311b0fa29b7b41c64bdb815a27dee29e2a143468e05f041223859f38dd766c,2024-10-31T14:15:05.980000 +CVE-2024-47529,0,1,58cb0f5ea31927c05a1bd12ecc4546045bc1b895a82bfa96be08ea6125d7d170,2024-10-31T14:15:05.980000 CVE-2024-4753,0,0,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be144,2024-08-01T13:59:33.903000 CVE-2024-47530,0,0,fed1c84544c0e51056ec77fc5d6317c40fbcbb8ff2284050a11260f26a3d0c29,2024-10-04T13:51:25.567000 CVE-2024-47531,0,0,3c1eac025448da4ef56a64b8782ce45f8d883f9cb11cc38200fa63f6c47d35ec,2024-10-04T13:51:25.567000 @@ -263157,7 +263157,7 @@ CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da7348723 CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000 CVE-2024-47594,0,0,1ae534f7a3c1c97ead2076790a49a30a6aebae2067756e88afe36b9237831ffa,2024-10-10T12:57:21.987000 CVE-2024-4760,0,0,b4849d754e19ff5b62ce1dfa55ef4652903c511172eef769e0d0e48dc2803d03,2024-05-16T15:44:44.683000 -CVE-2024-47604,0,0,5221b4094b7a2bae2ba329933c1485a57bd9421ad0d112c374cd4d8ea378e664,2024-10-04T13:51:25.567000 +CVE-2024-47604,0,1,b0efef5184edb4bd92f957620365342f5c009f62a58e0b01524e6418b748fe0c,2024-10-04T13:51:25.567000 CVE-2024-47608,0,0,6780a5cb01bdd639af89827da283834e6f19c572d8e127e2ec22fed13c61e1be,2024-10-07T18:51:05.650000 CVE-2024-47609,0,0,a40985fb9367be25d25953301cdaaaedb4fefdc923900e20947726055b93b1f1,2024-10-04T13:50:43.727000 CVE-2024-4761,0,0,490aec64931f999440aa7ba804cefb45baa762d4b1b18a12f1a0ce61a5d54b49,2024-08-14T17:06:52.260000 @@ -263228,13 +263228,13 @@ CVE-2024-47672,0,0,5b4bc20298f8db8160ec4cb5e1e723ceb997b45246485e1402781ba2fc18b CVE-2024-47673,0,0,191c5dd6c1e2e4c466371004e05d7c18d06a27aea3da7d37d6ddd6f44f42a46f,2024-10-23T20:19:03.650000 CVE-2024-47674,0,0,ccf2fbb001cd457f745bd73687c669526f6ac4c48744d9ffa4c0420999ebd866,2024-11-08T16:15:24.737000 CVE-2024-47675,0,0,624f315494e47c95b1269b56800071e724c94a3629173e26cf42531c4b63e4de,2024-10-23T13:39:38.647000 -CVE-2024-47676,0,0,d31d6f56ccab7b160561fa0b3c682aa5c75e9dbbe155592bcb66f3a4628abbed,2024-10-22T16:12:39.830000 -CVE-2024-47677,0,0,e6b5dc6058dd7bfb77cd62ce948de0b274ef953046c0e021bc136fd28c5143ad,2024-10-22T14:55:45.950000 +CVE-2024-47676,0,1,d6b0223af2ab7c06e22deb02a6b1285ba50d919656824213b4a8db3dc2e66b66,2024-10-22T16:12:39.830000 +CVE-2024-47677,0,1,c58b378a638516009a31c7b0fba7e2bee781fdfef7d54bbb99478b1a2d9956e0,2024-10-22T14:55:45.950000 CVE-2024-47678,0,0,15331914c6780ab092c41bd83df4ddc0c2577572736b4bdeb76d32ddb58569bc,2024-10-23T17:58:08.720000 CVE-2024-47679,0,0,1ecaf740f37d92673b5339edf65ded19cc2bced3546d140bbca7407db16c9bcc,2024-11-08T16:15:24.843000 CVE-2024-4768,0,0,eca965b33b3bb965dbc6e4fa576e2b459dc24fb57cb15a91596443aba7e291e4,2024-06-10T17:16:33.883000 CVE-2024-47680,0,0,85b7bbd97d74c47a9aa92c2d94a2f61310bff87569833c13313a2d001955242c,2024-10-24T13:28:28.393000 -CVE-2024-47681,0,0,bcb480aef1983b0991a4a45d2e94e32a59322fc6073af2e0d422ea34ecd87573,2024-10-22T14:57:47.973000 +CVE-2024-47681,0,1,456f47baf5535a368d9b51863c171d715c129b97212c8cb928a3ecd95abe60a4,2024-10-22T14:57:47.973000 CVE-2024-47682,0,0,46fa66ba51047277cbea09ed5154dc9b7e2d2f32e222256eb9a1726a2684da5f,2024-10-23T14:57:12.700000 CVE-2024-47683,0,0,7ec7028bb740304f208393a68c6cce367ef86fe45c0c6df398de986d9b0bace8,2024-10-23T15:02:12.800000 CVE-2024-47684,0,0,e54097bed50f9d64cda1553ee36108c8c798afe9e9cc9ff02f927faef73dd773,2024-11-08T16:15:24.967000 @@ -263300,10 +263300,10 @@ CVE-2024-47738,0,0,c8da1d6e208510b444e7c3df3abc6a9bb3c9c6ecd809183a7e4224d7b179e CVE-2024-47739,0,0,e6e0a492029d3fb19a9a4e9cd0586875e46e9d018e544231fa7b5cba2e661da0,2024-10-23T16:58:37.707000 CVE-2024-4774,0,0,a30e3c0a9681e5745664b5a7d21e43f4931cba5ae0f7ac5d13f7a53db899f70a,2024-05-14T19:17:55.627000 CVE-2024-47740,0,0,fee4db0fc8250ad866ae9615c00703616e55d3140e6cb547085ac1bb866fdba3,2024-11-08T16:15:27.477000 -CVE-2024-47741,0,0,6ddcafc76d251052b6321b11f6923b552520825ece0df192060dc5729a30db6d,2024-10-23T22:14:34.090000 +CVE-2024-47741,0,1,6b2b9aa4d3cc6dedadbd01e90cdf2cb85e19175f24296ea76c751d04850761da,2024-10-23T22:14:34.090000 CVE-2024-47742,0,0,7a543ea1cef78027d46c06df837413abe3e631619190c5f7ddef560c1bdb436d,2024-11-08T16:15:27.613000 -CVE-2024-47743,0,0,6b4acbe7a7043ae54c1f28957f686ffc42acda1a8ed60d34df4a0d291938201c,2024-10-22T15:45:15.463000 -CVE-2024-47744,0,0,99166239884b034553d12d8945cc60c036dfa495284cc2c4bfa4dd05b603e080,2024-10-22T15:44:40.393000 +CVE-2024-47743,0,1,723fb4caee8b0147f141c7ed5ba401b223def8a7e47aedf08ecd8b28437a2019,2024-10-22T15:45:15.463000 +CVE-2024-47744,0,1,3c34154f2a4da47d65182e9c05f43094259bd74c1d545e3e3958cd5e3b58fbd7,2024-10-22T15:44:40.393000 CVE-2024-47745,0,0,c7b92baa4d45cc2fb4fb2eb6cde3f0f6e977a7a8941cf2bba229f794ae1dde12,2024-10-23T17:25:19.657000 CVE-2024-47746,0,0,bd1d3998772b7b97367eddbd4c0f1f3e8c206783f1078083a98d6f055ddbde21,2024-10-22T16:00:35.703000 CVE-2024-47747,0,0,9e82b663527784b5017085d2a2ebcc9b6015b54f21ce4d35c5b931a7d0105154,2024-11-08T16:15:27.837000 @@ -263322,11 +263322,11 @@ CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e0 CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1ecf,2024-10-04T13:50:43.727000 CVE-2024-47763,0,0,0009d92633a66a995666b904976a3f571897c7b107ff706ed2173ff97f66c3ef,2024-10-10T12:51:56.987000 CVE-2024-47764,0,0,b7aba4870e1203663c4fa6abc120a30e41523fde8e72997d929896b167fbbd57,2024-10-07T17:48:28.117000 -CVE-2024-47765,0,0,a65b089ee1fbe8158413dce3d4bb6a7a005d6b3f8045c2a8b0cf8a91ea4da578,2024-10-07T17:48:28.117000 +CVE-2024-47765,0,1,ef180d30b603d51aeba69897d3a4c36eec84b8af819f2e58d00fb6ca7fa7fb71,2024-10-07T17:48:28.117000 CVE-2024-47766,0,0,59d1cafa97bbe3c507ee281e2420a2565da94f1f4cb02db911bf7e696c9937ad,2024-10-17T13:48:40.240000 CVE-2024-47767,0,0,f76f72b4bf5318a9be9574bffe5372ec8ef5f4dad0f6382ddd16a807c2769b9e,2024-10-17T13:50:45.307000 -CVE-2024-47768,0,0,f403a0de6ad99844ca2cbb93a58b82a840eb5e868f9e8f1d631547e4814a24ea,2024-10-07T17:48:28.117000 -CVE-2024-47769,0,0,89e2e7df1b1b68f8d9732f48769437016eda3284d5a81e91e9482d5022e6eda8,2024-10-07T17:48:28.117000 +CVE-2024-47768,0,1,2d58335123e154161b36bd74870a62d52190767d2af362a93587ef8a3e259c84,2024-10-07T17:48:28.117000 +CVE-2024-47769,0,1,cfa0073cc2ec1df641a5e5cb7f159c15ecd616d56fd3bbf44e689739a8387e83,2024-10-07T17:48:28.117000 CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737be4,2024-06-10T17:16:34.070000 CVE-2024-47771,0,0,c2cc2e4162d5c6e4f811bab9afb437dc72be4e038984be37caa0528862aa918c,2024-10-16T16:38:43.170000 CVE-2024-47772,0,0,93ca3579d4342831fe2d471a4caadcb35a70b0d6469fc266411c3792b3d90e0a,2024-10-19T00:58:21.947000 @@ -263343,17 +263343,17 @@ CVE-2024-47793,0,0,9908766d9802c80c9f07e38bc1dd6d38dc8823614346066184a43b3d9b28a CVE-2024-47797,0,0,33c4997ae4057f3ee3a7a27f532a8c67312598a72be5d687fb49b6e9959476d3,2024-11-06T15:24:53.210000 CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18cc9,2024-07-16T13:43:58.773000 CVE-2024-47801,0,0,e103685798e8b2dbc73e6876d080a93ca119ff0fe2d3b72153089026c306290a,2024-11-05T19:34:53.927000 -CVE-2024-47803,0,0,e1d97b5f24ae71b6bd2435048764e12dedac3de98ce838d43be96ca9d7087e5f,2024-10-04T13:50:43.727000 -CVE-2024-47804,0,0,a4af3b64d3fcfe309769ac07755d247ecf7636977262b35234365d56289d52aa,2024-10-04T13:50:43.727000 -CVE-2024-47805,0,0,22ba52af9df34d0a80a1165aace8dfa18730f593f709643a29e4cd8d37bffd53,2024-10-04T13:50:43.727000 +CVE-2024-47803,0,1,c5fc789c0abab09fdf5d93ade8e681a0cefd26750cb76c66db7bdbaf646effcb,2024-10-04T13:50:43.727000 +CVE-2024-47804,0,1,b396c78511f759659afac343048b57f2d8797b9724cc7a1ccef3ee3198778577,2024-10-04T13:50:43.727000 +CVE-2024-47805,0,1,cbdd25fce45aa799e9910f10ad3a10b0c588c33ed8f87431100693f0e37d8bb1,2024-10-04T13:50:43.727000 CVE-2024-47806,0,0,7da0bb8e7fc9c3b1d389ccbc624a09ba22b5eddfdda079b80b993589f773a85c,2024-10-04T13:50:43.727000 CVE-2024-47807,0,0,6f73fcbd170bbcb4214e07d010ddde34567b580923105f0e5418ba9615969635,2024-10-04T13:50:43.727000 CVE-2024-4781,0,0,75b4bbbeaedf32c6df964ae89a5896455d04ecbdf24f849877528cd42d17cfaf,2024-08-19T13:00:23.117000 -CVE-2024-47812,0,0,ea18101fb5a2a10bec15eb933d7c14e1241ab94196b326a10d9c0654fde435f2,2024-10-10T12:51:56.987000 +CVE-2024-47812,0,1,397cf931cad747f9187f7df48c5f8098bd69901273af0ea8d48fb67c933d46b4,2024-10-10T12:51:56.987000 CVE-2024-47813,0,0,48a41eb36e488d083cd1f60a29be681cee836eceff483fa252745c12924671c8,2024-10-10T12:51:56.987000 CVE-2024-47814,0,0,c7cab541ca8df7a147747a1437099f1208747a6b637b4c4929d52961dcc18d9b,2024-10-10T12:57:21.987000 -CVE-2024-47815,0,0,843559a4031eaee974816014150940c4f18b7f6d93739de5a1866ac2ce670dbc,2024-10-10T12:51:56.987000 -CVE-2024-47816,0,0,c0bf0d33ec35192d4154926a2f4d5d81b042bde4dbbd41d5e4618f5e20416892,2024-10-10T12:51:56.987000 +CVE-2024-47815,0,1,81255b48d5277378beff1383e77e64aa261245477d97f4d0b1ea73e945f9424f,2024-10-10T12:51:56.987000 +CVE-2024-47816,0,1,1da39b970be1186c496f95f178fe995ed489c1ba7a2eb7cbd4306440a49cdeb6,2024-10-10T12:51:56.987000 CVE-2024-47817,0,0,e954b96b63862e883b53cd879b63811973adbf39f1f221652228e04e702c2294,2024-10-10T12:57:21.987000 CVE-2024-47818,0,0,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a504,2024-10-10T12:57:21.987000 CVE-2024-47819,0,0,62c26271cc7e827b67a56b805c4044787ed1a2ccfbdbca2087660524d24c77f5,2024-10-25T14:24:36.823000 @@ -263367,9 +263367,9 @@ CVE-2024-47826,0,0,227f5de2bbfb082dccecbb42efbc7003b1edab4fa7b7573bd2f95a3320505 CVE-2024-47827,0,0,ecc916f5d4aa49e00574b51201e7140af48e7555de60eae2b6bb64bb43bee3fd,2024-11-05T16:50:27.330000 CVE-2024-47828,0,0,a6b81ff1073f19581e05e8c790863d706cba88272fb227df996495bf444dca26,2024-10-17T13:55:23.577000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 -CVE-2024-47830,0,0,457ed410238dd49134235c9291fcb215f555d7bf33b38d5e70e7cf82b4377f0f,2024-10-15T12:58:51.050000 +CVE-2024-47830,0,1,0a3e7634a8f6db5c685ec1dd760fec41a52917e4b5692587972274bc64e8a754,2024-10-15T12:58:51.050000 CVE-2024-47831,0,0,3f99b5fb6f2a0f82d4c4aa41364a72b96237a6105ba799e35540a2ef86af0ccc,2024-11-08T15:39:21.823000 -CVE-2024-47832,0,0,2db718b13b3751bc3ef92e2930bbfe31f27f0a24beb6f2f6f579c1ed94f36d1a,2024-10-10T12:51:56.987000 +CVE-2024-47832,0,1,6eaf4cba1d0f1ac09d634a837b942c4a4d31fbca5ff514618ce9cde402d23db0,2024-10-10T12:51:56.987000 CVE-2024-47833,0,0,6fec3debcf8c22e7cca5edd580a7219cef06b49b718a5106f83d6e8ff52a9663,2024-10-16T16:33:34.493000 CVE-2024-47836,0,0,9820902057ffe0b868812f79151bb5dbded2f7cf0e121917a52aed0157f4d3b8,2024-10-18T12:53:04.627000 CVE-2024-4784,0,0,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000 @@ -263378,11 +263378,11 @@ CVE-2024-47841,0,0,5965eb4de1da8f2a0dd0895a3f88b849e9e6237b2cba12893d6c98b9d53e6 CVE-2024-47845,0,0,fba2bd4658014e4d6aa7611c4102700faa491de5557f836f104a3695e65a150f,2024-10-23T15:00:11.853000 CVE-2024-47846,0,0,5053ec96b1964ec4cf07752f40f0383acb21d284ff73eb672d6eb88ec2b7aeb5,2024-10-16T16:42:58.513000 CVE-2024-47847,0,0,2c1e2e1c851a4a516d6696b28107e81902c0df1fd1f8d5a493124b40cda48e2d,2024-10-16T16:42:05.567000 -CVE-2024-47848,0,0,dc9eb429b1aadadb7717ca6bfd0505a99cdb374dc0fa769de0a8c407aae9a86d,2024-10-07T17:48:28.117000 +CVE-2024-47848,0,1,e467c746656c205712610e09c41e44af0db3330d8c12283483797c5a60ee7bff,2024-10-07T17:48:28.117000 CVE-2024-47849,0,0,de2bc9d37c4c436919cea14cdc9e234750104bad56196fb793061fe483bbccd8,2024-10-16T16:34:40.490000 CVE-2024-4785,0,0,86459565331431d4effe5c5baf904159b952a2a7d490db9da0fcd3795764e799,2024-08-20T15:44:20.567000 CVE-2024-47850,0,0,9d437471ee4f1be7fe8d8f91eb2162f8d4a45526c516c7abe8fcc5930f99b89e,2024-10-07T16:15:05.753000 -CVE-2024-47854,0,0,31b9ee1e6861649c0043a7af7c7a50d8ef5e295b98593959cd182d2901e547c2,2024-10-06T21:15:12.920000 +CVE-2024-47854,0,1,a8f80b8e1dae30b2f133aaa097092fad2189dc64e1ccb9c31cf18cd76dbc63b7,2024-10-06T21:15:12.920000 CVE-2024-47855,0,0,55506bc59fb300d34c632b3a5f880b3df3b3b2206fd15f460c6853ba7eb245ef,2024-11-07T20:35:11.733000 CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000 CVE-2024-47867,0,0,ab930a5134ec2749c4c7aeddae39ca362d9631d50a282f941fbaca32a5ca7733,2024-10-15T12:58:51.050000 @@ -263393,11 +263393,11 @@ CVE-2024-47870,0,0,47413a893f4ee24bb29f98fc5c2c7d3ab7293a7a6ecf19104fdd8d7d231ef CVE-2024-47871,0,0,7ae10d9c898e10fd96a36b863761d4f1496d2b2d2ee06f5429addce2956bb34b,2024-10-17T17:11:31.150000 CVE-2024-47872,0,0,5b1fcd45035abc51968e43b1b48eb83b72a045b411e8ee076143bafbf44d6c2a,2024-10-17T16:54:34.383000 CVE-2024-47874,0,0,88e5d0bddb2eed021dc78650aabb938bda29c8272245d4971b4c42756e899edc,2024-10-16T16:38:43.170000 -CVE-2024-47875,0,0,7d3f699a2dfd28fae24f11f0ffebcb02477b8963ab93d8f474f9ee88d14cf58e,2024-10-15T12:58:51.050000 +CVE-2024-47875,0,1,bd9cd1419cecd0ec07512540f0b28f5750b0eeb4aa868d3df9a9d592f1a958d0,2024-10-15T12:58:51.050000 CVE-2024-47876,0,0,1c9291ffcd100f5445236e1c704211e20624e03c95916aeaee6676900242dcd8,2024-10-16T16:38:43.170000 -CVE-2024-47877,0,0,42d52e9a067bcb9f8cadc0b4324eaa32d4b8c11c11d62f0e9296f0c93d92bc00,2024-10-15T12:57:46.880000 +CVE-2024-47877,0,1,a83574776fecde80269c37c84be1e2d09064c67a96d82c17d0d8402491aa23d0,2024-10-15T12:57:46.880000 CVE-2024-47878,0,0,81812ac8cdd3af1a71a439326705b677a4426a66fc37dcc26d70cbb43db62172,2024-10-30T18:01:44.277000 -CVE-2024-47879,0,0,59b45feaaf4a8cf57e9effd22946f68b574db079cdbae5f200b89c2ed52ddf0f,2024-10-25T12:56:07.750000 +CVE-2024-47879,0,1,2b449b59a1e022ee3c4ffd66f4c297c76762cef24b323ae4b5325b65715adf40,2024-10-25T12:56:07.750000 CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000 CVE-2024-47880,0,0,38d66998eddc8a45b06eca84ae7adabad76e5e8eed046ff5c46acdc3902d4511,2024-10-30T17:42:42.737000 CVE-2024-47881,0,0,0ca7d0c4ea2ef98dc6fa44b67e25e5f8500f3dd12648b54a5ed0735593ea5d45,2024-10-28T14:14:02.157000 @@ -263418,10 +263418,10 @@ CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985 CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae106b9,2024-10-07T19:37:43.677000 CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000 CVE-2024-47912,0,0,f418c53b744005b67d73cb39395cb1c2d3d904d67f2798e6e9fa7f31b38510fd,2024-10-23T15:12:34.673000 -CVE-2024-47913,0,0,dc38cdbfa262901d16ea1ec6ec0c83500e8aa0e3d84f1c11ffa637c829ee03f8,2024-10-07T17:48:28.117000 +CVE-2024-47913,0,1,7cee4e2f0a703b60f4905ba90942e3ad4333a4649dfd698a2259843e49767bfc,2024-10-07T17:48:28.117000 CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000 CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000 -CVE-2024-47939,0,0,9f0e10dc7d087dcc37542d1b052d2cccfb921e0e15d33604932cb6fc0b122d11,2024-11-01T12:57:03.417000 +CVE-2024-47939,0,1,fb0122088811efc1ccf3ce2b970c428eb00ae94db66e7aa25ff544122afe9a3d,2024-11-01T12:57:03.417000 CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000 CVE-2024-47943,0,0,d4d5358ab48548c04867b54233602bd267d194af91388df45333461289a48f25,2024-10-15T12:57:46.880000 CVE-2024-47944,0,0,8c2dcd259cac2bc345d70afe119d0b88c60fe63597fe98a2528a606f007cae1c,2024-10-15T16:35:09.410000 @@ -263472,20 +263472,20 @@ CVE-2024-48032,0,0,92e1368c161f45b5a86e429306c8963eaf241c22633e36f2aca105bc8a933 CVE-2024-48033,0,0,8f5c8e0edb7dcfae09a626cf6444750e299103bc74d1c2eb25573eea6cddec47,2024-10-15T12:57:46.880000 CVE-2024-48034,0,0,a66406ee752af69b89f348feafdbf9b7a9a6f1909f9deb511bf73f2159884dc4,2024-10-16T16:38:14.557000 CVE-2024-48035,0,0,e68cff1c3b4467623505240b899441f36617f8650c6218b92feb405d25770b55,2024-10-16T16:38:14.557000 -CVE-2024-48036,0,0,1335eb269b2e09be86e757e41f1f9eb0f4166fc97d81e03e41272d1b8793a6d0,2024-10-18T12:52:33.507000 -CVE-2024-48037,0,0,af7f6d150f03a9ea7d06eae0cb148af2070972458b6f26fc03a935e4b80ee230,2024-10-18T12:52:33.507000 +CVE-2024-48036,0,1,0e5d36c7e8d79e7170bf0e902578cd40c5ea8bc74ec9d0bf50eff28cbc052a76,2024-10-18T12:52:33.507000 +CVE-2024-48037,0,1,eefb86fc22b519932d0b4d73d4ca283fa1f4be728f6e8326447ce0f2bde0525d,2024-10-18T12:52:33.507000 CVE-2024-48038,0,0,c6e31c7f591821e9f6b478f515431fcf0cbc068549b1cf9f8fd564dc7ab1be57,2024-10-18T12:52:33.507000 -CVE-2024-48039,0,0,9a8fc7e25bde4ad4bb62370bce14c2a0331bba6679238eab5e767c51dc295aac,2024-11-01T20:24:53.730000 +CVE-2024-48039,0,1,65adf87a6225528ed3566a660ec1fd4e29ca56785f5d58828df45023403d2b6a,2024-11-01T20:24:53.730000 CVE-2024-4804,0,0,27889f6e71f31f5b5cb9daf7c221df1ea26a19e5d20319852f304f02b73ccaf6,2024-06-04T19:20:50.450000 CVE-2024-48040,0,0,75285ff1778ed53ff4f87c50cadf2623354cdbd73a2ea1e7e03f15540cde1f0e,2024-10-15T12:57:46.880000 CVE-2024-48041,0,0,9636470c5937ff2a206ba0bfcba752cadd8615816ee98049f50969b87891e79a,2024-10-15T12:57:46.880000 CVE-2024-48042,0,0,16ddb03b6545634bd517237c4d290ddf5fe66d3a89fdb471199006c76048a6ac,2024-10-16T16:38:14.557000 CVE-2024-48043,0,0,d7022e96ce1ce67c4f59e004a095bf6b87f052300567a30fb9f9fb2d5938ddb4,2024-10-18T12:52:33.507000 -CVE-2024-48044,0,0,90469184502661b6e67b8eef470ab5646749bc1a51f5819a203f0f723c7be38d,2024-11-01T20:24:53.730000 -CVE-2024-48045,0,0,d42f4dc2965a8c5bfdbfc3adccf45aa8606abd6adc8551fd525871bd10392384,2024-11-01T20:24:53.730000 -CVE-2024-48046,0,0,423091e4b5e8d6a105e8bdc778f5cf951b1df2d4a2635710b325a5130f1d15ea,2024-10-18T12:52:33.507000 +CVE-2024-48044,0,1,cba2d00a503b53c56494302f700fe91269b3bf7b45a516df6b8d8ad1fb7d6823,2024-11-01T20:24:53.730000 +CVE-2024-48045,0,1,dff9c1550ec36e2112c8d00d85002e2e74c32a7e970b7ccc482dd72726064d9b,2024-11-01T20:24:53.730000 +CVE-2024-48046,0,1,04aed5c78403da3f425e2296b8b94e2508d82466d3b66a34a6b1829f1e002f4a,2024-10-18T12:52:33.507000 CVE-2024-48047,0,0,3283398b8a8a75e7e31eaa0ac97fe84164a0704ec4cafc99d8da73b654c081f8,2024-10-18T12:52:33.507000 -CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac13e,2024-10-18T12:52:33.507000 +CVE-2024-48048,0,1,ecb6c25e58b0b57ec982d2ab7b52c52839cd1b0f9ac36bf0ba79fb6dbd6da779,2024-10-18T12:52:33.507000 CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000 CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000 CVE-2024-48050,0,0,efe925e5e80ddffc7c6c5a86aa417aaf629e499121448166a60f26bea5bdb8f9,2024-11-06T21:35:07.863000 @@ -263535,7 +263535,7 @@ CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168 CVE-2024-48195,0,0,624eed9854f46ef9dafc813bcbfebca0bf2ab48de4eb64a4aa5f0a1ddeec9a89,2024-10-30T18:35:14.433000 CVE-2024-48196,0,0,06085a08add8a4f4e1622d4b148953be486d5c8e3772fc9fb5febed91d95829e,2024-10-30T18:35:15.220000 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000 -CVE-2024-48200,0,0,d02b89c45d4b17d15ce8a5992ba917ecfe2d5d7fc0d7f8251b8e268b19bec6fe,2024-11-01T16:35:27.710000 +CVE-2024-48200,0,1,84d235ec158767fe3c3646cfebb13f9f11e8076e031a9a0e05be0837ffb50afa,2024-11-01T16:35:27.710000 CVE-2024-48202,0,0,861cdc7afab3311a194bbfaa16e833de9edd725394687ae499e071916be4f821,2024-11-01T12:57:03.417000 CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec83d,2024-10-28T13:58:09.230000 CVE-2024-48206,0,0,51a08c7a6c840c5e8de5643e6450ab06ef643b50749de152ef299fab981500c4,2024-11-01T12:57:35.843000 @@ -263556,7 +263556,7 @@ CVE-2024-48228,0,0,1c4d77fabacb4a82899495e465bceea2a6892f50bf763c9498fd122637b26 CVE-2024-48229,0,0,c034dac056fe316e898e0e12aabd510a4c4e7b0f910ac0f1e3183eb239af7f2a,2024-10-31T15:49:11.533000 CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000 CVE-2024-48230,0,0,fd569f1c227395142830dc48ede080b764a75bcbfa62596aaf8cdd88a155dd80,2024-10-31T15:57:23.693000 -CVE-2024-48231,0,0,937449141a6aa1a64ac6ee0f623969ee8c2a56a4e76a3e216a9b1fafdd881546,2024-10-21T19:35:06.217000 +CVE-2024-48231,0,1,9f993298d1b8d914d4a73fc74d69551322c63c1f0813d6f4d0aa340b53e2fb3e,2024-10-21T19:35:06.217000 CVE-2024-48232,0,0,55b3d875fb2079a43d88dbfcab6e65c9a2a11ed364000ed48670de5e42022263,2024-10-30T19:35:26.257000 CVE-2024-48233,0,0,5079087488de765c44b2e5efadc3adcfed6b8eb841374ab16026cf622181f848,2024-10-30T19:35:27.360000 CVE-2024-48234,0,0,1a8d3e559037bd1781a9cae98ca9ac055b21e9cc548e55db5056102c863a9c6e,2024-10-29T19:35:19.743000 @@ -263591,7 +263591,7 @@ CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0 CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000 CVE-2024-48312,0,0,ed565171c6e4291e871155bd5278a308c07670573cfb5e604423e67b93f19726,2024-11-06T18:17:17.287000 CVE-2024-48325,0,0,e332aafd0b1c5c187131f74a886273143993554010ab80fd42869ff8b361baa6,2024-11-08T19:01:25.633000 -CVE-2024-48336,0,0,ceb20642f87b45ae345232a2a331752a7382b0137ef1494f458e4bcdd5d57c2f,2024-11-04T20:35:10.193000 +CVE-2024-48336,0,1,fc603531e511f454d9e88137c47d1879fc0b1949207c95b33f03f4156054a935,2024-11-04T20:35:10.193000 CVE-2024-48342,0,0,cab27a7526b8debabab042631051135b3c12f9f8dc84e657f2f251a3750f9436,2024-11-04T07:15:11.437000 CVE-2024-48343,0,0,6b50c2f4f6b1096ee0c17db257557835a9194bfca6ac184c217bfb38c59667b0,2024-10-29T19:35:23.657000 CVE-2024-48346,0,0,9cadc94f91da6becfc880372821212f6fb47778feb19564283e0a19072e428a5,2024-11-01T12:57:03.417000 @@ -263600,9 +263600,9 @@ CVE-2024-48352,0,0,f04d59b541d5699b8de8794b84ad2e51eaa889c3176fcdae05ff882fa8ae1 CVE-2024-48353,0,0,d73573776f5d71e92b960f87a81cb22d9dd9ca287373000ba01bb48829c4268b,2024-11-05T21:09:34.780000 CVE-2024-48356,0,0,d61948bf2095cc3d150baaa31fe05023f5cd4e2dab12daf4f3dc83771432fb5f,2024-10-30T17:35:12.420000 CVE-2024-48357,0,0,dba1c026ce12a35ee6a885944cea646b76fb79069c0e7307a1deb45a88532ca1,2024-10-30T17:35:13.203000 -CVE-2024-48359,0,0,8df9ae599ad0c75d9ebea2cb7738c60b3ab89b2623d3937af1d6a36ffadedc5e,2024-11-01T21:35:04.220000 +CVE-2024-48359,0,1,f84c3ae0329ecc726e7cb26c01eac3e4fa0252f107b038cf5f834fd7bbe8fe83,2024-11-01T21:35:04.220000 CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000 -CVE-2024-48360,0,0,fa6cdf2034ff7007f899798ebd487716a17991fe18b25b9aa35dd58e4516518b,2024-11-01T21:35:04.963000 +CVE-2024-48360,0,1,ffca8c0c416184883cfc0c1c2e7363b2f5c687e61af765126ce09d41eedbb371,2024-11-01T21:35:04.963000 CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000 CVE-2024-4838,0,0,18fa2348db877da11c5078171d002c78cc86239f9092091ea1ecb3106ab22873,2024-05-16T13:03:05.353000 CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e2b,2024-06-24T19:26:47.037000 @@ -263777,13 +263777,13 @@ CVE-2024-48903,0,0,af1ee698040ee7f8c19b83dd0eb3404cde07c42231b0e3832a1aa5561c101 CVE-2024-48904,0,0,56bc56ed1722c08287266703a07bddbd88211e3eebee5fa1d299ad65c198bf37,2024-10-23T15:12:34.673000 CVE-2024-48909,0,0,67804b300a72fc34a54a9327f0b3a7a8082afb16b0051c28b942604285939f48,2024-10-17T17:56:11.130000 CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000 -CVE-2024-48910,0,0,3816f1647056b495d61afa5f1cedd58420ed3be2fc43ab79af9751ec8cb93072,2024-11-01T12:57:03.417000 +CVE-2024-48910,0,1,85d67f88c66a050e3e4d1bffa3acd3af0d99d02c5b3940cf55713c8db676db57,2024-11-01T12:57:03.417000 CVE-2024-48911,0,0,f147f0790cf653449e8f662255582c7c922d3f40a3d15e4b98d08b1e5fd9c969,2024-10-17T21:13:37.147000 CVE-2024-48913,0,0,06d6a212c655b7ac1bbc6f5a3509e81cf89d4f1d83017b87d6e9303af3084bb1,2024-10-16T16:38:43.170000 CVE-2024-48914,0,0,8775ce8f63d45f4e21be0399438c25117df9f166b6335c0adfec50056398fb57,2024-10-16T16:38:43.170000 CVE-2024-48915,0,0,53434c02f8cd9e61d046160183bd56a99da2a89b0bd423c79e06c9bddd2f90b1,2024-10-16T16:38:43.170000 CVE-2024-48918,0,0,37d8ea84d8110f3a600a1d2f557058b666848b057b36b01b41785c57ee923776,2024-10-18T12:53:04.627000 -CVE-2024-48919,0,0,a0a7ee1576689ebc33e8b3ae0ac8ebb40e27885e788e12cb9b562903133f149c,2024-10-23T15:12:34.673000 +CVE-2024-48919,0,1,b4835085314d02d946ecf516d8ab680a3e6708d7b01c7d7f850bfce3249ad4a7,2024-10-23T15:12:34.673000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000 CVE-2024-48921,0,0,e9387d1d6c60f59e6d5a6f7c28c82620f8f1647520cac034f065894573414562,2024-11-07T17:20:34.160000 @@ -263793,7 +263793,7 @@ CVE-2024-48926,0,0,d45a9da5f6f1b245a6d729f168d41330fc51c968405a1c91c3b061c128e5b CVE-2024-48927,0,0,23a6232a362c7fb17e2b0c22da571a466ad2d8607917844c1edab564eae3beac,2024-10-25T16:15:13.327000 CVE-2024-48929,0,0,9634f8a920413f581a19c3b63c79c0b9d222c6607f7ac0361bee3f54dbad7500,2024-10-25T16:12:15.897000 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000 -CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9c48,2024-10-21T17:09:45.417000 +CVE-2024-48930,0,1,c1a192fd9c97215d1de4d5aa3b7bb2f86c106fadd1df30f1153e726085631d6a,2024-10-21T17:09:45.417000 CVE-2024-48931,0,0,fb2b6f83ccc13e29cf0e7d7cf443e6c383726c0fbd9501334dffcc637e70cfac,2024-11-06T15:46:23.067000 CVE-2024-48932,0,0,df43e7a2728142dec482ddfa8a1eb9613cccf01c9d35289d409ad4e755574ae8,2024-11-06T15:25:41.470000 CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000 @@ -263824,7 +263824,7 @@ CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b3544 CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000 CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000 CVE-2024-4902,0,0,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000 -CVE-2024-49023,0,0,9f037b5f7ba370d94cf43694c94339d7393d2d61a5cb700dc6fe38d18df30faa,2024-10-18T17:01:32.803000 +CVE-2024-49023,0,1,af47ee9dc5b34537abe1e2a50e9a1a6dd7bec2ff89d9910cf199b8b7e8fc3c1a,2024-10-18T17:01:32.803000 CVE-2024-4903,0,0,9834633a0ed5c23d729720f750c23f97a9d35acd2a8ef750805e2c39c4f8bfe7,2024-06-07T20:15:11.967000 CVE-2024-4904,0,0,e08155723dc24ff1bcb5adf9d2f839d33f4e022ac557667a35564764380e5202,2024-06-04T19:20:52.380000 CVE-2024-4905,0,0,acf7154e104fe12ce44ad2e90ccc9d1c19899bcc28d8f8bfc61002cc40187062,2024-06-04T19:20:52.480000 @@ -263872,7 +263872,7 @@ CVE-2024-49231,0,0,f1bca784a02483c4e1958c6dd7981ec9ffd6a01b629138db999d0ecc3e3b5 CVE-2024-49232,0,0,d337b3c0fd7bcdd2693f8827f33e9eb4cde9ba740bd8fa3f7d8cf28d739d91c8,2024-10-21T16:39:15.407000 CVE-2024-49233,0,0,d15701a736a720d91ce7a393cddc119d365e279a269d1078a3d62a0f44c1eecb,2024-10-21T17:17:17.680000 CVE-2024-49234,0,0,00d6361d85da44a4fa5e98b0b1923a417577ef114f956e9a3a98833720c5555c,2024-10-21T17:16:51.053000 -CVE-2024-49235,0,0,81b65049d9913937f83fbb02a460f07035b9a9b3cadf729eaa07645e1a8a845f,2024-10-18T12:52:33.507000 +CVE-2024-49235,0,1,54c32a03ade0dd3e15984c664def74e67e407cbb4f583de789197d4f671ee3f5,2024-10-18T12:52:33.507000 CVE-2024-49236,0,0,a834af1459ab83c1993774b31ad0e95a9120429d91f000710053f11c8b77484e,2024-10-21T17:12:00.583000 CVE-2024-49237,0,0,7c921f1ff6e06cda49ce0b96aba5ad95d5b8d4cbec93e4fa528982e38f3e12f5,2024-11-06T20:33:52.403000 CVE-2024-49238,0,0,4f7144ebb272524e891d29605f6262832b81db89d137d3761af7eafcb87405b6,2024-10-21T17:02:51.280000 @@ -263955,7 +263955,7 @@ CVE-2024-49311,0,0,655b8f0f0fd2801ebee62c4cab2c3c056128130684611e0692ceaea589cba CVE-2024-49312,0,0,1e3e36eafcd069a7fe79509ad96d7f4dd02c8e2f5c7599561b4842ee8e36495c,2024-10-18T12:52:33.507000 CVE-2024-49313,0,0,b81d49e40540ec5decbacf6cb1d50e1df2e38b8d0de9f78131c7efe307877a35,2024-10-18T12:52:33.507000 CVE-2024-49314,0,0,e28782638c5532f3ac8c67770b689db44caf307d15977e296c2eba897b4800d2,2024-10-18T12:52:33.507000 -CVE-2024-49315,0,0,1b3f19eb4b90d8f93047e1e5f0210df48030df55d8d2939457cea7437b801dbb,2024-10-18T12:52:33.507000 +CVE-2024-49315,0,1,2c18fc98df8b341e687b2367440398a07c77f63d2b8e90480ff4290b5bdeaebd,2024-10-18T12:52:33.507000 CVE-2024-49316,0,0,7cdd2abd122139bc397b355c43efbc35a76d0da902df6527526bb87216599011,2024-10-18T12:52:33.507000 CVE-2024-49317,0,0,8f495e600596eb867e38ff50605f0ee7782c606acca5a9734932378036e27158,2024-10-18T12:52:33.507000 CVE-2024-49318,0,0,02cca54ff58508f7015bdc78b225c5402ac891d24584c9a2512f1a35e3987ddd,2024-10-18T12:52:33.507000 @@ -264011,15 +264011,15 @@ CVE-2024-49398,0,0,1964f2918f2b62a12a26449777ec3d512771c9e0a90e6a92142f1221cf2a6 CVE-2024-49399,0,0,280599d675596d0a62f92142e8a452afef09a7da5cc6b00dfa86815a1f9a12f9,2024-10-18T12:52:33.507000 CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6ff0,2024-06-24T12:57:36.513000 CVE-2024-49400,0,0,4447b6d98624a8004ac0954b08a6ad26989e2084cf92d73c9f3d9262ea896967,2024-11-01T19:35:28.673000 -CVE-2024-49401,0,0,07acd0ec6492ef4a6a2d576dd24e9c5a48cd8fb488b0956928cb7230e66cff25,2024-11-06T18:17:17.287000 -CVE-2024-49402,0,0,20e8fd539de047331e4c2368c92cd069528abe840aa6623391c5926836e0f3b1,2024-11-06T18:17:17.287000 -CVE-2024-49403,0,0,fe40e78f5676aa63e5a493c73d9420579ad681e2182836e702fb22f09e253b4d,2024-11-06T18:17:17.287000 -CVE-2024-49404,0,0,f0b4f7f48050585ae9f5cd035aabe0fcde338a70982a3394ab5a57f9336c45ed,2024-11-06T18:17:17.287000 -CVE-2024-49405,0,0,4f3e580c378048f9b3aef0e712982e33d84f5471bfc9f28046d4e4633525cf7f,2024-11-06T18:17:17.287000 -CVE-2024-49406,0,0,075282cbd5b281b1a2c35af43b944dd1b9c094fc1531e5ff905e3db1afda183b,2024-11-06T18:17:17.287000 -CVE-2024-49407,0,0,2f1fe7535aef1ec5401881558c20c865bb7467e76bd156c1a2d63f1673f8f81d,2024-11-06T18:17:17.287000 -CVE-2024-49408,0,0,44bc469226d0fcdf008f2192d16cb7dcedf12b3f14011cccf665fc3342c4d28a,2024-11-06T18:17:17.287000 -CVE-2024-49409,0,0,b94fd5e8c7d42ca2210066cc68305f148c2abec12636112d2a2515554c597138,2024-11-06T18:17:17.287000 +CVE-2024-49401,0,1,3427810f268e9c731630e7d9a328bdd18c263d346c722a4e166cf53fee136a63,2024-11-06T18:17:17.287000 +CVE-2024-49402,0,1,ad5715c8063772fc057279f9ec58007b11662ce6d89cea8bfc5c55b820d68240,2024-11-06T18:17:17.287000 +CVE-2024-49403,0,1,30ab3381faa6d7588cea33834cd2f42484461ab2cf4edefed13e4f5f8acd0e2a,2024-11-06T18:17:17.287000 +CVE-2024-49404,0,1,a007566a9da4c28e8f8777017a12bdcea2903129c7189e896131b83a0527aebd,2024-11-06T18:17:17.287000 +CVE-2024-49405,0,1,1bb2048dae8ed8362c07dc596854188d431500a6863f51793b048857c1e63321,2024-11-06T18:17:17.287000 +CVE-2024-49406,0,1,c4b88509871cc306d4ca7d7c302bf70d5f150dd4073b94feddc4cd830f3db394,2024-11-06T18:17:17.287000 +CVE-2024-49407,0,1,db3c7fa36a30c309b31c3509c10ee6b5167e6507718e595d9cc2dd65919c6cba,2024-11-06T18:17:17.287000 +CVE-2024-49408,0,1,fd8d7dc399132a34b371e7a88372dd70f156ea89f74edec592760c4b869167dd,2024-11-06T18:17:17.287000 +CVE-2024-49409,0,1,4b58cba0769eb04797a27726cebb2edbc03ace2b92166884d71d43b806006eb5,2024-11-06T18:17:17.287000 CVE-2024-4941,0,0,4a44b53eeef21b9bcc4a70f0f12e019011a282ac818fbf5410cd9bce445ce09d,2024-10-09T16:24:24.433000 CVE-2024-4942,0,0,ec40ecb2c6f2c92030124cf4a899658443926a41ec90982de736f0fdfba6bcb7,2024-07-23T21:09:15.900000 CVE-2024-4943,0,0,c3255ca69e7d3076031772cbfca36198fc76d9c4ad7b4e1b0b2d1944b2bfd408,2024-05-21T12:37:59.687000 @@ -264030,15 +264030,15 @@ CVE-2024-4947,0,0,3635839d47ca4be777d1000c77c519be36c42f5d72cb0c679b358b9a41c646 CVE-2024-4948,0,0,b89edbe3d3547ee2159af9ec22fd67b98f6c6885f88dc0c929a5ea68a98b8ff8,2024-07-03T02:08:20.437000 CVE-2024-4949,0,0,5c7ef1902f4beea866d1c7d9373440674707dc0a06c9e278c0f4652ccc170adc,2024-07-03T02:08:21.370000 CVE-2024-4950,0,0,e5fcb740f07c681c8eb3b4901aae32c365007c0ebdd7c7b0ee473dbffae68af1,2024-07-03T02:08:22.150000 -CVE-2024-49501,0,0,34e661795ed7c329d9becb8743e23a77cfe5f584b40ddeff12deceac0863410a,2024-11-01T12:57:03.417000 +CVE-2024-49501,0,1,b68f4d3131dd45c8240c685b13eebbf7042a3a95ee975ccc7d0b4e65e2269371,2024-11-01T12:57:03.417000 CVE-2024-49522,0,0,b49aefd5a73ccd26563c8b91d3f2d98c089948509c56be654cf3171337fc2496,2024-11-08T18:06:01.930000 CVE-2024-49523,0,0,f80724f56253226f78ea56271ee80d62b3ba148e1878999be1900b25d2719668,2024-11-08T19:01:03.880000 CVE-2024-49524,0,0,e7793eab2fff9b59c976da4b69592a395e034319e6c39d07f8b75673444fce47,2024-11-08T19:01:03.880000 CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000 CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000 -CVE-2024-49579,0,0,85b8fb1168559e66181366d5ecd0a3cbf5d9385b3a23eb2296d97e9422fe6782,2024-10-18T12:52:33.507000 +CVE-2024-49579,0,1,4674118b21cb39ebeef2b4743f0ed75dcd0002fe01b9b902589f8dc4995b5f10,2024-10-18T12:52:33.507000 CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000 -CVE-2024-49580,0,0,2a4b2f9ee960712197ef0f3776cc1a15f015ed4f9adbe3a24755a9ff67152fdc,2024-10-18T12:52:33.507000 +CVE-2024-49580,0,1,58d42ce80f49f44500183a1a00e208025f481699c4f078e6c8ff15ecab46fe22,2024-10-18T12:52:33.507000 CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000 CVE-2024-49593,0,0,28b8568333d09b89b040a623f287dcf302e51d7008368ee150b7fde946577e54,2024-10-18T12:53:04.627000 CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000 @@ -264086,11 +264086,11 @@ CVE-2024-49641,0,0,0c76c83cf503f374bc615797049759b6f98944a9c823b145687554c637514 CVE-2024-49642,0,0,66a7bd2ec5779bc9317ec59e62fed4a534ea42c063a1c8a996c562b60f66eacd,2024-11-07T20:59:18.593000 CVE-2024-49643,0,0,6284c6900c7970034a8944b3460134452480aca131e8b373807c5239438cf826,2024-10-31T18:48:20.883000 CVE-2024-49645,0,0,ca9e8de021aa76294f349f1480f6770ba9607afe63354f1726992ea9d42eab18,2024-10-31T17:59:25.867000 -CVE-2024-49646,0,0,494afe5cb42a3659410b30eebe3ebd4867d873db4432f980b767a7abcb0bd3a7,2024-10-29T14:34:04.427000 -CVE-2024-49647,0,0,e60b9143544a8c8127edc259fcd544ebde14e3b3a21fa4bf3041175f98777227,2024-10-29T14:34:04.427000 -CVE-2024-49648,0,0,882728f062a6477fd5d5596cbadd02c75634cd7d8a2e421ad711333bc5f1d005,2024-10-29T14:34:04.427000 +CVE-2024-49646,0,1,40a9ff8256323fa7b02ef9505d2d50abc60332260aec8c257c3ab6d8accc78aa,2024-10-29T14:34:04.427000 +CVE-2024-49647,0,1,dba5179fa37ad0843a2c0928d3bcafb3820a51b697bd8bbb326a4b99ac771af1,2024-10-29T14:34:04.427000 +CVE-2024-49648,0,1,7a8f372de064d6f9510531150a54889a9c0c26c7149c1631055e3cced57304fe,2024-10-29T14:34:04.427000 CVE-2024-4965,0,0,5bd9bf33c1ad1b27237ab2761363d4d9817c8f50155c84d844f98b12772718a0,2024-08-08T15:15:18.730000 -CVE-2024-49650,0,0,113f1d8fcd4a91401a9e7eb21542e0be268f44720e90bf593259606093fc1561,2024-10-29T14:34:04.427000 +CVE-2024-49650,0,1,0629a02591e89f890a06adbaf6657863eead3ade20ea5ba5eefeabccd04668c2,2024-10-29T14:34:04.427000 CVE-2024-49651,0,0,1edacf084cdefffa26ac3807966d7d18f8180b6d50fc65ed04b1a3c042648f2c,2024-11-01T16:39:52.677000 CVE-2024-49652,0,0,58dff88968ac6ebf50ac5ee5e6f0dbbe476efcb65a1763b3700d032abe2d574d,2024-10-25T12:56:36.827000 CVE-2024-49653,0,0,44403c7923c745007b13c40f85dd660179917ab02fffac37cb7e731d1660569b,2024-10-25T12:56:36.827000 @@ -264114,7 +264114,7 @@ CVE-2024-49670,0,0,7a6a4becdb612ea34a04cd6446000cea2a971c2ba217059528db183a283f0 CVE-2024-49671,0,0,3444bda7ece1f693d338db4cc79d717f379cdd40dbc44287f6100eec0598b12d,2024-10-25T12:56:36.827000 CVE-2024-49672,0,0,c17ef3fc02e224c4822894694f8910a345115c79300fbed40435886665aedf90,2024-11-08T15:16:00.327000 CVE-2024-49673,0,0,c48a16a9e43c058c1d476ef384589f6df3f8ace54912d46110eb4037f41883c1,2024-11-08T14:57:27.190000 -CVE-2024-49674,0,0,fd3d64b6e35b6eec27ee3c590860244c5a96a05725f767dbab9cf4cb455540e0,2024-11-01T12:57:03.417000 +CVE-2024-49674,0,1,5b7f19408722c71eee96c2a73f3a223f52468cc543bd14d6e6be2bb4ba429588,2024-11-01T12:57:03.417000 CVE-2024-49675,0,0,c2223000da0c4ff77fd421192850d7f215252c939d91090d90395539c22636a9,2024-11-06T22:24:22.907000 CVE-2024-49676,0,0,dd890548fa1bcb69576eae4659e357c656125d877be6d06a44ddb178c101b43d,2024-10-25T12:56:36.827000 CVE-2024-49678,0,0,a75d300a9f5fa676504639fae81083885456f78da78e7660ba14ca16476d39c0,2024-10-29T14:34:04.427000 @@ -264124,7 +264124,7 @@ CVE-2024-49681,0,0,3b093dfd5a970f736ccea994447fae465682222fe1b4c870be33e2b5aeaae CVE-2024-49682,0,0,4e47b24b4ccb89d6b9391034a4d9fd92d4e065ca66c40176951d133f1432962c,2024-10-25T12:56:07.750000 CVE-2024-49683,0,0,bc1a3474e846828fd29db41c7bd81aa13fff7d9cc09d32d534f0bd6429a79990,2024-10-25T12:56:07.750000 CVE-2024-49684,0,0,e9a627af5ddca9b4822ee6da7152da731788ee6f4ca218c2e1132330b65bb6b3,2024-10-25T12:56:36.827000 -CVE-2024-49685,0,0,d03d1488884d684d264c935249debd3fe17de9fede434aad11316faaf37e0e95,2024-11-01T12:57:03.417000 +CVE-2024-49685,0,1,f3b8ae1ad03944a12b96081a13924998f9afeb3b883435b9311f148cd0231ff1,2024-11-01T12:57:03.417000 CVE-2024-4969,0,0,ab0804889b5a888b9b65e9fe2bbd8691478393df4e0fc992e2c82c7a1daa3f54,2024-07-08T14:19:14.173000 CVE-2024-49690,0,0,f8519a1e374a57a825b896cd1faf37ef6f9748445cc3d9105d4f22d925afe4f1,2024-10-25T12:56:36.827000 CVE-2024-49691,0,0,8a34c0fdaee81aff7458f4efa7a33cb09c53971e5ca42eec6727b794ae5c88cf,2024-10-25T12:56:07.750000 @@ -264151,16 +264151,16 @@ CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9 CVE-2024-49760,0,0,ab1d2b1d3d6f87001d0ec0c674554d145fba544f43978860ab9f315317a9615d,2024-11-06T15:01:01.013000 CVE-2024-49761,0,0,cc77d1f33b16264261b43a7d1baebc02063ded1f31c9ab42da049e2bed05a708,2024-11-05T16:41:46.660000 CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000 -CVE-2024-49766,0,0,5a8c5c0a2bd94e828f2c3a22888613b17d32cf5a4207ce143b3606496d9774b9,2024-10-28T13:58:09.230000 +CVE-2024-49766,0,1,555038e30b17856b98b1634207b04f50d3fce08a3c00047a5f41e29a9d10d5d9,2024-10-28T13:58:09.230000 CVE-2024-49767,0,0,b1abfb6c942255ecba6af733c92d4d0cb5e1d316b2b9040982ab9c6769c6893b,2024-11-05T20:03:04.847000 CVE-2024-49768,0,0,d1c7bee24c60a7682e6a57ee28bfb0a2fbc48c379b23053fbff091516cb1e066,2024-11-07T17:28:02.853000 CVE-2024-49769,0,0,6340e3adda9a030cec825cc1b119266a40aee36b3725d18d2443db4b549f4b36,2024-11-07T17:29:04.053000 CVE-2024-4977,0,0,f1472b15d6219c627718fd70559881283845ced10173940d62dfa6e1d38696a9,2024-08-01T13:59:37.487000 -CVE-2024-49770,0,0,e139253d4206279d60332f6c15cf6c38eaa01808a4afba5b24efe9b5918d6e65,2024-11-01T20:24:53.730000 -CVE-2024-49771,0,0,e1b8e33c9beff5e15c760e02f136747e5a30aef91dfde0840d1776c2c5b9964b,2024-10-29T14:34:50.257000 -CVE-2024-49772,0,0,cd4964aa097caacdaf510147a3d3d38eb66383df99969ecbfb54a28b854a3c5a,2024-11-06T18:17:17.287000 -CVE-2024-49773,0,0,9dbb622b65d5b87f341e7e02f26bc3444ff5c980c220269a8a504f537cb800c1,2024-11-06T18:17:17.287000 -CVE-2024-49774,0,0,a5850576ecdb582b3fbf7765a4612b8882742fa42a454af93fab760ba3a926df,2024-11-06T18:17:17.287000 +CVE-2024-49770,0,1,e2e01292ac48137aa79ebdfca2085c29776f677dd6b7adccfc7d6881fc7a09e9,2024-11-01T20:24:53.730000 +CVE-2024-49771,0,1,160fc663912b069ef891129905ae1be73f75e83c8368c487931bd9ae946e0692,2024-10-29T14:34:50.257000 +CVE-2024-49772,0,1,cb93334dc03018200cdac43aa1d88bc0073e862fa33084d8a7b59366c0fae7de,2024-11-06T18:17:17.287000 +CVE-2024-49773,0,1,5ad0c2ed2331b7ef4c48a52a8483db17cff6011cd96f99adc19a09525fadee17,2024-11-06T18:17:17.287000 +CVE-2024-49774,0,1,8771823e773446120aff7f266cd44503f4563e8df5f5f8fb93668822468d1e77,2024-11-06T18:17:17.287000 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000 CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000 @@ -264180,15 +264180,15 @@ CVE-2024-49860,0,0,17fe611effe450c501a6e79c52b617bb3e9dfa115b03751b67c402dcff4af CVE-2024-49861,0,0,1653e7df85a45b515fcdc441f9cb9f122cb6f11d500f6cbca9f4d9d62723f07c,2024-10-23T16:48:47.573000 CVE-2024-49862,0,0,e0b25be7c75d96f390f553fe793605e2691bfb34c1e389879a3cd9200ce6c511,2024-10-23T16:53:51.050000 CVE-2024-49863,0,0,41eb15cefa65add4e21060b9ff62fd64839f2e02cd81a7af8fe6b7da8453fc42,2024-10-24T19:43:56.103000 -CVE-2024-49864,0,0,11ee8b000b9a62890a75dd63920e4a33890ab9d058f73a94a2fe3382caeb81d2,2024-10-23T15:13:58.783000 +CVE-2024-49864,0,1,9f2c33587c02498558736f9884f607deedf289e4cbad6e1db32689f10f5dc61d,2024-10-23T15:13:58.783000 CVE-2024-49865,0,0,c4cae66eab62f15595d2364d0fa9447b0b6ab33d31dbe60340c7ef0ef852d1c8,2024-10-24T03:44:33.947000 -CVE-2024-49866,0,0,64fdfad45770d631f65ff417b8e0b441a9ced54aafec781f55abff0506219420,2024-10-23T15:13:58.783000 +CVE-2024-49866,0,1,71c9e7f7b56f787e6cb934db96522f008f6ebfb1bdfc706451c3ae5064e0d3bf,2024-10-23T15:13:58.783000 CVE-2024-49867,0,0,8cf0edae8c53a5633dfdab99e974869bd44d9ce40d8ab9b187966727a0a7f801,2024-11-08T16:15:29.037000 CVE-2024-49868,0,0,37c62afa96c12b59911ddae25d514351b0179ee480e85deb28aec35b35f691a5,2024-11-08T16:15:29.227000 CVE-2024-49869,0,0,1ef7e6775f5061caa7e4dead4df8426a79419a75af385b7d702a23087606b23b,2024-10-24T20:28:21.597000 CVE-2024-49870,0,0,e81833aefea057b5823d9cca085dcd9c92f3e703d9544affbcd6126d5d085f70,2024-10-25T12:55:03.577000 CVE-2024-49871,0,0,c02508465ea9d0c1ce0cc95a6cd2e44aadfbb3634ea87e7cb860d1d87e5795b7,2024-10-24T20:22:19.530000 -CVE-2024-49872,0,0,f6cbcd97baebde3f8280c71cb6b25b64732424c878389d8a2470cbdc55168647,2024-10-23T15:13:58.783000 +CVE-2024-49872,0,1,d90f395eba70fbfcfdd0e9ed49eb61a1f3167662fef79caf0064b8136901364f,2024-10-23T15:13:58.783000 CVE-2024-49873,0,0,9dd0affda433e9ea1287a2619ec66001c95cda8669905ec1e1e5816fb33b6e00,2024-10-24T20:22:42.387000 CVE-2024-49874,0,0,bb64364be843ef37eaa2e7e28e1c1f68871769861f3b1beeca2cf5035cca4de4,2024-10-24T20:27:51.700000 CVE-2024-49875,0,0,752d21cda2ec448a67a51c1316311354be9fdd8594fd8f17251472d1e3b8d00b,2024-10-24T20:13:50.927000 @@ -264202,10 +264202,10 @@ CVE-2024-49881,0,0,41bfec3db47cc7ee33c25f1fd4197d6bd3c02983ee19fdf43f55930238a4d CVE-2024-49882,0,0,3dcd0b215e26c09aad074a08de7a7f1c715786114c06c918026bea9f1be4a757,2024-11-08T16:15:30.123000 CVE-2024-49883,0,0,2c66ff49435c643d701d54b779db4b72f2d86174ffd0e6b20242c6bd37032340,2024-11-08T16:15:30.293000 CVE-2024-49884,0,0,672dc800dd919ccc283f73a865977706d4443e02c2105d5c38e649f3ced202d9,2024-11-08T16:15:30.453000 -CVE-2024-49885,0,0,7454dd4079942ea8aa368264550142902e9d91264028a0091b5e06c3e31015df,2024-10-23T15:13:58.783000 -CVE-2024-49886,0,0,d058b0110cc7ae718a3f90fe7bd717654f8b8374ccdac41e3166fd761799644f,2024-10-23T15:13:58.783000 -CVE-2024-49887,0,0,e6db44b39cc00cffa6a621a85bfcf2139e4599af1b439fcb766e3952fb2c09b3,2024-10-23T15:13:58.783000 -CVE-2024-49888,0,0,3f840da09cb58e8af69d24768fab0f04d52756c1cab879ffca1acbd8ff14327a,2024-10-23T15:13:58.783000 +CVE-2024-49885,0,1,61849fb2cebfaf1aeb287bc88c85834d34ffdf37722783d124896fc0350a436a,2024-10-23T15:13:58.783000 +CVE-2024-49886,0,1,c5ceecd46af5aada472ca13e665580e403163c2a688b2a3e24dfecee16e313d2,2024-10-23T15:13:58.783000 +CVE-2024-49887,0,1,40a2c00675758ea0a73c40b10f3af450413456df8381febf3a8b24a1b86c2796,2024-10-23T15:13:58.783000 +CVE-2024-49888,0,1,7e01a06ce4159ef4f1767a53f8005a3467665f337e7cbae9f2b1de0d5a59edae,2024-10-23T15:13:58.783000 CVE-2024-49889,0,0,3c863e63fd48c3db3419430a21a4d8c911f6ac7efa3158f64cf41f494445bbca,2024-10-25T14:37:34.400000 CVE-2024-49890,0,0,585d995237d21981fb3b6b01c85816c0030dcc831f475278287062aff66de7b2,2024-10-25T14:41:41.680000 CVE-2024-49891,0,0,d4a8cbcb6210dfe0148e3c78f189f223e8712de66bdeaea637d3f10c8e45cc0d,2024-10-25T14:42:27.193000 @@ -264244,34 +264244,34 @@ CVE-2024-49921,0,0,bb51ef53024220ee2e44a825027a51bf6c5ca654c7f83eb27ef904e27babd CVE-2024-49922,0,0,f7dbe3bddb75bb3ea2b5380d42f021bcf9f8034ec34fcdbbeecea2d0b58e774d,2024-10-25T14:56:06.057000 CVE-2024-49923,0,0,09ac36e1842b66b81133b68e0fa1454145946558f64c3262440b063666a332ca,2024-10-24T19:43:27.327000 CVE-2024-49924,0,0,17d9abaaf5ff60bcbedf9c94f1debba174e9547890147781369e3335305a4c01,2024-11-08T16:15:31.683000 -CVE-2024-49925,0,0,6717452f4abf1a8f70ff5a0320447c3ada5e06f5537ce54743f004253e0476ee,2024-10-23T15:13:25.583000 +CVE-2024-49925,0,1,2ca64f6d4798cdb2d8009d030db641481f821fbde2eefcd416526239180575c5,2024-10-23T15:13:25.583000 CVE-2024-49926,0,0,e23cdfc4ebc2c086b6a6ca6069549ad859d308d07df75b82618cde1a1942e57b,2024-11-08T16:15:32.017000 -CVE-2024-49927,0,0,80092bd69a60e7db046e7721161bd2b361d15ecd0245c57dbfc59dd407a5dd94,2024-10-23T15:13:25.583000 +CVE-2024-49927,0,1,b531a24240c3cd6fb26f420e9fa0443c4bdc603ec465600e09638fa0986a04dc,2024-10-23T15:13:25.583000 CVE-2024-49928,0,0,8e84a2aa26c14268cca8858510196348b8604528002bd2f6ac4bef54b852d76f,2024-10-25T15:22:31.013000 CVE-2024-49929,0,0,409fff6f1c13ae1c406792ee7f9444fe8bf4ea113f439e03b8d1297690597cfc,2024-10-25T15:22:53.763000 CVE-2024-4993,0,0,e0839a9575413089a3f10a1147258f2a987a3e24cb291a41fcab67561670893d,2024-05-16T13:03:05.353000 CVE-2024-49930,0,0,4f6d566d38e98cfef81aa3c468e55508e5ddacca4ab92a3aa3e190b5b39ab22e,2024-10-25T15:23:14.283000 CVE-2024-49931,0,0,c64e6a507a81e93e0a0fbd52f6d868b83dce69bbf375c0c8265267d61314b728,2024-10-25T15:16:07.980000 -CVE-2024-49932,0,0,e5188c7ee1c1972b05d3687d2846a4c04fb0ddad3d4fdc696a14fd6fd5b3f9da,2024-10-23T15:13:25.583000 -CVE-2024-49933,0,0,19c189adea2c51f30368218900eaf8147078b0b49ef8fa469c43040d096ea648,2024-10-23T15:13:25.583000 -CVE-2024-49934,0,0,e37c6ce2db6489d7950418452ae8950ea036544ab18fb721f3040d7c2ecacadd,2024-10-23T15:13:25.583000 -CVE-2024-49935,0,0,47ec8d85e946423f2b5a7d6f760f5940e7dec7c60deca4cdde6ceadd824a68c0,2024-10-23T15:13:25.583000 +CVE-2024-49932,0,1,9ad306c9b6999a1d9bd8e334c022a9167b549c6e355bb68659fd9917b2f7d129,2024-10-23T15:13:25.583000 +CVE-2024-49933,0,1,ef9c6d48b62588ec991b1347b1a9b2e0b50b5a319851efb06433034b15dafee3,2024-10-23T15:13:25.583000 +CVE-2024-49934,0,1,892a4908e6d4bdab57ef889f57d9f97c871828bf58c1bd51a5b8528eb1697580,2024-10-23T15:13:25.583000 +CVE-2024-49935,0,1,6f6f7eb0ffe3c2c9944cd7aeecc7564a3baef5c8a400fc6fe25bd1ded2cd8719,2024-10-23T15:13:25.583000 CVE-2024-49936,0,0,53b60eee50934e6330711ceaf5c84de680cbe1bc85ba946b907431818ed4e720,2024-10-25T15:16:22.713000 -CVE-2024-49937,0,0,fbe6451c8c5411e80e94bbe8a5b20cc7de2c60b897db9c68851607b7663313dd,2024-10-23T15:13:25.583000 +CVE-2024-49937,0,1,1a0040bc48552b7133c2e4ffaca4b44b158ed31499780bc9bf8c84e62d68eac8,2024-10-23T15:13:25.583000 CVE-2024-49938,0,0,9c303f1020130b3b132ffe4f4bfa15af521193c2ea7539bad83adb435dbb8a0b,2024-11-08T16:15:32.180000 -CVE-2024-49939,0,0,402d43d358a15010064d110767edefebd01db49ff6b25ef8d93e0a2b850281ad,2024-10-23T15:13:25.583000 -CVE-2024-49940,0,0,2e190a7774264c10f5b4bfb57ed4ea08bed9643d1920281d3d935207593158d9,2024-10-23T15:13:25.583000 +CVE-2024-49939,0,1,21d57d98623c68bbef39b3f489d950d89fedd53e80836af32f90f06d36ce1873,2024-10-23T15:13:25.583000 +CVE-2024-49940,0,1,e386e5600900e54ffa64c0341b8a966ed59cfe63c6e9dc6502d7bf83523fa7f1,2024-10-23T15:13:25.583000 CVE-2024-49941,0,0,b3da1a021545935ffaca2b9847684775ba3cc9b8435719cbf248706bcb1aa694,2024-10-25T15:17:30.543000 CVE-2024-49942,0,0,29368c54b2560ed8564591b764785ef1f8b272b1a5154512293cafb7aaf5bb26,2024-10-25T14:56:59.397000 CVE-2024-49943,0,0,5c5d21fde5bb87f93303742087e99f64eef62ec323a6c541d2b8b56acbaacf7a,2024-11-01T14:54:07.897000 CVE-2024-49944,0,0,256cc1f8edd24409c2fcb76bf7d7ae3d2feac16b12ee6f7516809a64a6fb45d4,2024-11-08T16:15:32.473000 CVE-2024-49945,0,0,370e1b90eb36e7c52066b46d04a3bd2521828574dc9ada50c02ab529ecffcdfa,2024-11-01T14:52:59.240000 -CVE-2024-49946,0,0,13a5d5811bf383f61044a773b4a572cf961b77975d398bb5002b0e276f496ca5,2024-10-23T15:13:25.583000 -CVE-2024-49947,0,0,5b75f252b800589f5cd5dfe41ee5a2f61df4165d1873b84f7f83f4b0ed7467aa,2024-10-23T15:13:25.583000 +CVE-2024-49946,0,1,c55b1f2d30c092621495acabbe1c8e06852cd54a03943f4f0239fd88a4a21416,2024-10-23T15:13:25.583000 +CVE-2024-49947,0,1,9aa4fbb2d314234ee60a94df103a61c5998334f3e2c4b62b73580fecb85af1bb,2024-10-23T15:13:25.583000 CVE-2024-49948,0,0,8344559274a875ff9bfdbf7f8fb08249fb586cb8d4c91681414e7af7ff4f56fd,2024-11-08T16:15:32.667000 CVE-2024-49949,0,0,90064b15f4a70b9c7101d9da289355e38cd410f04e3b4b1cdf1a49220604d6c8,2024-11-08T16:15:33.020000 CVE-2024-49950,0,0,2ddbedfd38f23d93ceda398a82953a6283207fe13e3d074351d245c80eecd7dd,2024-11-01T15:05:46.640000 -CVE-2024-49951,0,0,b8f60d5ef8bd84dfe50bdc427eded9132dc5d0565199c187e518a0aa431c0f98,2024-10-23T15:13:25.583000 +CVE-2024-49951,0,1,9632297aa1089a108a4ffc184c9aa4ab38691bcf23505230574da1379ac67732,2024-10-23T15:13:25.583000 CVE-2024-49952,0,0,442fa9aa360d351af0dbcde0d4bc082c6711e6cf13ba0ba0cf596374b0dbc4ee,2024-11-08T16:15:33.403000 CVE-2024-49953,0,0,a14ff01abf17243413548e3a025639bd82a01ce0626a40567d5dfe8c35143d81,2024-11-07T17:44:28.297000 CVE-2024-49954,0,0,a9ae3dc7c06c6a4cf8fa3c4ae8c3d36aaa164203073d3e4084338cba03b97554,2024-11-07T19:16:01.590000 @@ -264382,15 +264382,15 @@ CVE-2024-5005,0,0,28bdb1683e492d24b33087981d0823dd42f49eeb8c271eabba28b1e925e506 CVE-2024-50050,0,0,66652f02df241336011c1992f267ec2c5372a9547dcd28fcca3e67d65a218700,2024-10-24T19:35:08.107000 CVE-2024-50052,0,0,bf2b7a67576b83d69e87d14ac4239bf8784a5a388f0a9d54bedc6a322c97af62,2024-10-29T14:34:04.427000 CVE-2024-50055,0,0,223ed98e7a7f4160f8634a62679e487b1296c8eb2d61be84de5731c91a2cb49b,2024-10-23T21:45:15.137000 -CVE-2024-50056,0,0,67d5758c0ace6615570a11511305d2b63ab44abb1709d3f0417dc90e404e22ad,2024-10-23T15:12:34.673000 +CVE-2024-50056,0,1,862ab8ad8b5ca0def367c55982bb2c45b4f93bd3f7f7c0124b0eb400352da0b7,2024-10-23T15:12:34.673000 CVE-2024-50057,0,0,ba05620682b6a9a556450ee0eed48c115fc6212d5ab9174ae69859e3d6638159,2024-10-24T16:12:52.007000 CVE-2024-50058,0,0,62ecfd8d486a96be612bd84ae6d7050123a99c1eeef7fe7df02a5c30cb36a532,2024-11-08T16:15:45.117000 CVE-2024-50059,0,0,653291e9f66f3aebf5c844ab31fcc818fd9067a2f5f994c3daf2f8308b7dfe88,2024-11-08T16:15:45.267000 CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24 -CVE-2024-50060,0,0,01f3d5625dc49ef407dd1399459de4e55c9dc18499ec441f495a2f6b728ede8c,2024-10-23T15:12:34.673000 +CVE-2024-50060,0,1,eb351b3ab760e96eb16cafe62aff8422358fe64e2442d5ba785b82df12fcb827,2024-10-23T15:12:34.673000 CVE-2024-50061,0,0,adfa4c7105f2a2d6ac6001b08865d994315eaf40295441d8499676332f52333c,2024-10-23T21:48:29.030000 CVE-2024-50062,0,0,fb76c5d17773e9b99ba2a7f2c28322bbec6aca19454d77f6ffd53fa694af65b4,2024-10-23T21:48:57.737000 -CVE-2024-50063,0,0,1d1881a47d554fc29d203efb6c8521669e1b28611f2bbf99ab231399dab599e1,2024-10-23T15:12:34.673000 +CVE-2024-50063,0,1,335825fddda843a4f3cb56868f3f1152d45953fe44c5ec530af3e8acfafdbb95,2024-10-23T15:12:34.673000 CVE-2024-50064,0,0,0fbb48f98a0eb4f4ff5ac7ecc0e869de5fbcd36b7eb760b827cf0f646f0d7eab,2024-10-23T21:49:29.423000 CVE-2024-50065,0,0,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000 CVE-2024-50066,0,0,b3bb02ba0974e5b5a24b8679fabb6bb49ad893447f49a1e1929628709c3f45f4,2024-11-05T20:19:07.983000 @@ -264419,24 +264419,24 @@ CVE-2024-50087,0,0,d932d9a6f4bd94c5995e2295fafce534f1c32d33268701370882a6d9c7fef CVE-2024-50088,0,0,ea08007d0f6bf2f5d06a9203c599c43ba3b7b13f77698553a8827e36297f21dd,2024-11-01T16:05:44.403000 CVE-2024-50089,0,0,3b58daedc5b4f60456cb3b13ba375c68351ad07eea1153d2d27bc6dd4d43fa4a,2024-11-08T16:15:46.337000 CVE-2024-5009,0,0,4fd7bfd86519955de695550b550ff6287bae2637bb330aab0edb8e0b318761f0,2024-09-06T22:43:04.747000 -CVE-2024-50090,0,0,4083762ea13756f29eafd801049837164a3eafa89ab15688019a97f8f91bb3d0,2024-11-06T18:17:17.287000 -CVE-2024-50091,0,0,78a39fb3c465e28c120508c287c54f842efe7fbd3389c5d4e97feb6ecbd6f07d,2024-11-06T18:17:17.287000 -CVE-2024-50092,0,0,2c6c6a03a0610f9267ab15dc07e85e396a8491e91788cec83b413ebdcc3753b2,2024-11-06T18:17:17.287000 +CVE-2024-50090,0,1,c49fba6e5f6e1f022b52123664cb4ae5ffa605d7ef8111f6d17391fa1c85d256,2024-11-06T18:17:17.287000 +CVE-2024-50091,0,1,82381c2b9504f7dc7c838a67c6e3fb93acdf98ec96453d78bb976e75e873cf11,2024-11-06T18:17:17.287000 +CVE-2024-50092,0,1,1bae9326eae1f879c38112725312fe16a36edc58131a09667f9f496857ede197,2024-11-06T18:17:17.287000 CVE-2024-50093,0,0,419eb8dddfe2833bb713253843fa8eb7e9c480ddcfa4547a406e999eb86f6dab,2024-11-08T16:49:33.143000 -CVE-2024-50094,0,0,2b94d4e661b5e2db0b85e820583c74624edd363a99a1f36ca793811b4261d399,2024-11-06T18:17:17.287000 -CVE-2024-50095,0,0,bb2eeffa59fce47b91c742fc8aef17b9bbd010b7f06c8f719c7cb64fc1f627c8,2024-11-06T18:17:17.287000 +CVE-2024-50094,0,1,8d554d91d10f3417f68354112f98d683c81490048baf5a5ec9ac8bffadb7c106,2024-11-06T18:17:17.287000 +CVE-2024-50095,0,1,7be15323a65def7978ea05e4974ba938ad3e79e6f92c2da07d665bf4a6736f61,2024-11-06T18:17:17.287000 CVE-2024-50096,0,0,909d09d3b77fc484dfec9c5eb1212f48d60cd31f438f53b3a699d71d9c453549,2024-11-08T16:15:46.477000 -CVE-2024-50097,0,0,293694d387dc428847db645177fd1a702bb10103f939b46e01f2e6f02df39ec7,2024-11-06T18:17:17.287000 -CVE-2024-50098,0,0,9f927047e2c9a61071315643d6b3b2dbd5c97c589b2f7becd2a6a2850be36cd1,2024-11-06T18:17:17.287000 +CVE-2024-50097,0,1,1e19c3b9c1e2e37e95df9d9009f79edaf0220dd0d6934058e29be2c02535695a,2024-11-06T18:17:17.287000 +CVE-2024-50098,0,1,cf431c67b59033618fb36a658b582ea62152d8b19728778d1421d727c45b83a7,2024-11-06T18:17:17.287000 CVE-2024-50099,0,0,906337b2a070500172e6dc4c08f3da4632025da5e255074bab057bfa7a726529,2024-11-08T16:15:46.590000 CVE-2024-5010,0,0,3c850c266940942fbe09adbb4c98bc7afc61c3edf80ecba9d04f15eeefca6109,2024-09-06T22:42:39.017000 CVE-2024-50100,0,0,5654c0f6f18aa5f41d3b7518bf7fef3b01b08f13cbb7c525d5501ca1ceae4571,2024-11-08T16:15:46.740000 -CVE-2024-50101,0,0,fa0723d276731ae4f9c6398e7f18fa6e4ecfe8b02f442a187cae950f0ddfdeb2,2024-11-06T18:17:17.287000 -CVE-2024-50102,0,0,c6e0521547f3a6ed3061ec53619a2691370708c6b90985b641fa8cb86c983ba1,2024-11-06T18:17:17.287000 +CVE-2024-50101,0,1,2f2b16a128c18e2575b05358b34fb81bcc8de19eed1cc050ccae26a3d646a064,2024-11-06T18:17:17.287000 +CVE-2024-50102,0,1,8fd44c4a8d660d019b8c0f66cb6904e5a1c8e3a17fcea236b7b7019c992ceb8c,2024-11-06T18:17:17.287000 CVE-2024-50103,0,0,f7388d1b8248faac199af938c5b063ca25ea4a29439f14300925ad8fea65924b,2024-11-08T16:15:46.900000 -CVE-2024-50104,0,0,7ad334838874ace6dda2aa5d94076b1692e1c5b0f3ba16cf1870b81d95a6f617,2024-11-06T18:17:17.287000 -CVE-2024-50105,0,0,895ed21531906d4a6a12490debf36b6629a6c140958d0b80c03e5b2f0e03364a,2024-11-06T18:17:17.287000 -CVE-2024-50106,0,0,00665ac9b5911056fa611c9e33a8f920343d35dc5ceabef255c34799f5345e46,2024-11-06T18:17:17.287000 +CVE-2024-50104,0,1,0a03fa8616f24786fc437645bd296ca0d38abe7ace79a2ca8ba72fe2582f7777,2024-11-06T18:17:17.287000 +CVE-2024-50105,0,1,ebcb68f88678e4c8d85a22decf4b0f24e8f4a103c214c492268d0e1167ee68dc,2024-11-06T18:17:17.287000 +CVE-2024-50106,0,1,10cb92f800d3539f7667fd27745ea897b092c4e1dd4e560332eb31f585d132cf,2024-11-06T18:17:17.287000 CVE-2024-50107,0,0,c3e237eae128528ae6608a26b966efe022ddebd6d0c53a652e91aaf0e9101d42,2024-11-08T21:27:32.240000 CVE-2024-50108,0,0,61f04b1d5ef9c1df693048d65fcbe3cda602cc0f45d0d93919c517d1234dcd46,2024-11-08T21:28:02.227000 CVE-2024-50109,0,0,0ebe5d7138c22e8bf3233a37f05b45ad5ddc39f30de8d0d87fc7fb2741661abb,2024-11-08T21:30:11.820000 @@ -264454,7 +264454,7 @@ CVE-2024-50119,0,0,3992f94156457909776d9f78b1e74d5acc4ac20116cfe1d9f562db596b4ec CVE-2024-5012,0,0,5697b5fa6ba20e1501d7704fc1f19cf57893d5f71753b80662113f567a057a81,2024-08-21T13:34:41.107000 CVE-2024-50120,0,0,a7535e2e4a67c5d1ea4cc0faacc9771d148428f249d6d1871dd7774a53ec7613,2024-11-08T18:04:08.080000 CVE-2024-50121,0,0,f5d79ce4a5c66ed82e292027b7f627836da6acad873692ee370a889fbd82446a,2024-11-08T18:05:13.947000 -CVE-2024-50122,0,0,ebd98f84f7130eac7bd8c59889d8d2e18bd993f9e28f00cb4c13176d017714bb,2024-11-06T18:17:17.287000 +CVE-2024-50122,0,1,e6d7b726b2490f1f6f69aa0a5cd5c989d6aca72907c22735c57d8a66ff77ca31,2024-11-06T18:17:17.287000 CVE-2024-50123,0,0,47c50f926b815dddbd61627f3fd9f8fef8c8286dd5ab3c1e24f64c53dbadadc8,2024-11-08T20:03:49.163000 CVE-2024-50124,0,0,e0909d43069998015b15f2c2be1ecc325d5e7a282d97ea9e2301837a24362cf7,2024-11-08T20:04:05.847000 CVE-2024-50125,0,0,bc2ac1b7c523093f36f85867236818ba62e375028e47aa90f5c1f2b06727a050,2024-11-08T20:04:33.913000 @@ -264487,29 +264487,29 @@ CVE-2024-50149,0,0,d7c6740c56276f915bd62b11e0e57a6dcbeeb44de647591594fe9c7c101a2 CVE-2024-5015,0,0,57e7561ea7b4a22dc47e95fb948c2e633eea845a4a10c36b8de173108bb8285f,2024-08-21T13:37:02.370000 CVE-2024-50150,0,0,4196baec43f7736780778c168a778671c8558d06a0e2cf6ab733073a0abb416a,2024-11-08T19:01:03.880000 CVE-2024-50151,0,0,d9ce0dc9cc067e6fa22cf39a277f3e88a2611e6930bd9b5641d4f23f2714aae3,2024-11-08T19:01:03.880000 -CVE-2024-50152,0,0,5da7dbab5ae471c886bf7f5055d852dbc93df394968cae213d2e5970a5267d79,2024-11-08T19:01:03.880000 -CVE-2024-50153,0,0,b0c2677ebc8c95663d6869ad15f2b6912e0be0c8b45a4232f60edadf4926cb96,2024-11-08T19:01:03.880000 -CVE-2024-50154,0,0,fa87e33bac3a0c9928c6068d3502ee1d12c76d8e0af4c64979f0b99c13d931b8,2024-11-08T19:01:03.880000 +CVE-2024-50152,0,1,5cb9a9daf9006470c93bc37b9df8d46054672b8deb5767cfe3c30af595242c3f,2024-11-08T19:01:03.880000 +CVE-2024-50153,0,1,ca36e6203194a2cd8539b801d5956d1f638695e1b357e9c14e59807ff5f32919,2024-11-08T19:01:03.880000 +CVE-2024-50154,0,1,ffdb226c8220f1620eb81b2c5b72b35fd57877cd678436e4a556d0089c0a2f92,2024-11-08T19:01:03.880000 CVE-2024-50155,0,0,5747f9cf1aa53c1e6a78fde055a5d938a23ef7a9d8e0d83af3e149b9b3f45e42,2024-11-08T19:01:03.880000 CVE-2024-50156,0,0,ed997ebe9a2b402a27fae0483970aab9a25073ff36ff717ae62fdc40d861b7ba,2024-11-08T19:01:03.880000 CVE-2024-50157,0,0,831c798ea992786f323335d193dc3ef349a34b53fcca1479c8f7474757c08c4f,2024-11-08T19:01:03.880000 CVE-2024-50158,0,0,9a6dda59860d55e42f9cf894dffd100a5d82221731fe812097f3aaee313e0486,2024-11-08T19:01:03.880000 -CVE-2024-50159,0,0,27640372bc8482ccfeb9381ad2cf427f2839cc26e1aed3ef753a274a1ad414f0,2024-11-08T19:01:03.880000 +CVE-2024-50159,0,1,d8015f040766e5f8a45be47b2d395632d0d7ab0054fde218f59f31e1ca52cc73,2024-11-08T19:01:03.880000 CVE-2024-5016,0,0,99504ccb587052e75d99d9fcbf07f0a52b025e8122dba2c854727d3b50b1c62e,2024-08-21T13:38:32.480000 -CVE-2024-50160,0,0,fb7cee56d461f12f3b9db44a684021f9a46d5e1f010283855c1c98f2de52f063,2024-11-08T19:01:03.880000 -CVE-2024-50161,0,0,1e3abc1ee107275fee1577742dfc96a77f0ebede08c55d745c2758735a0921b7,2024-11-08T19:01:03.880000 +CVE-2024-50160,0,1,17a40e0306b9df216e0e6f03af4d9e0b807e011f89ea8281a97806273dc8946f,2024-11-08T19:01:03.880000 +CVE-2024-50161,0,1,a21f2bd416c04bddfdd4c0110905ca95f60d06b9db5cb19fa6ca35583034576e,2024-11-08T19:01:03.880000 CVE-2024-50162,0,0,4d9dd15197774f489e9675bd267efb5b7e91f0415fd39f1a663770cf6f148fd2,2024-11-08T19:01:03.880000 CVE-2024-50163,0,0,562c5969b9730284f8bc6b2e5c8a8ed9f48638aa96e75e1456e73ba5df058365,2024-11-08T19:01:03.880000 CVE-2024-50164,0,0,98153fff4a296b20fa93165bce652e5fa8bd7d0919d058627d479c9b9aa62b93,2024-11-08T19:01:03.880000 CVE-2024-50165,0,0,d66f1a8a78fd7bee0c737f5810df1bd636f57bae2483e39bcbb9543128d709fe,2024-11-08T19:01:03.880000 CVE-2024-50166,0,0,5d415e5148ceb4bd02933fda8bd3542d6ef94233d11b7d0407e223e89b4a218c,2024-11-08T19:01:03.880000 -CVE-2024-50167,0,0,0fb917bd90a1c864bc4615776382aff90011ad9719de323fc37c1381a5012e46,2024-11-08T19:01:03.880000 -CVE-2024-50168,0,0,f6eeb96bba0908e9aa4ab0659b8d8724b9362b13d83a3bc7ff3aa435590473b1,2024-11-08T19:01:03.880000 +CVE-2024-50167,0,1,89e9c4c139c4206e925d3367587a0906ddc76664e61bbec4657b0b4a56482ac2,2024-11-08T19:01:03.880000 +CVE-2024-50168,0,1,8a85aa195ce641afddc0b8f64cf012a4af52082ba2f9ee507c05e1ae08cdb36f,2024-11-08T19:01:03.880000 CVE-2024-50169,0,0,71ebc371e37f5115cefa0d50394251542c39c050ba2e08435dde4a10f5e5462b,2024-11-08T19:01:03.880000 CVE-2024-5017,0,0,4bf66f9149c1825eb6053785aae4f79372d6014d70aef068fefc59f9d5142f99,2024-08-21T13:40:49.903000 -CVE-2024-50170,0,0,6a2d3089a1a1d8ded28500127b007dc5f5a55b4a3fc31f05b25097f9e2a82dd9,2024-11-08T19:01:03.880000 -CVE-2024-50171,0,0,e3a02851fa0a350372170c2d1b672a853453a68f63562c2a73f2e9b790c06dc1,2024-11-08T19:01:03.880000 -CVE-2024-50172,0,0,dccaa2ee40757919e0ad5cf492956a878e6623c1a283d1f313819b3135789b58,2024-11-08T19:01:03.880000 +CVE-2024-50170,0,1,1d7786b1696d8e7fda3eaca44084eb44ed043685449d90cf7585d7dc4b7c9b31,2024-11-08T19:01:03.880000 +CVE-2024-50171,0,1,68485bc3416b9e19b07df2ea3f0808a0ef21c1ec9e029729c02ad46cf6bc04c8,2024-11-08T19:01:03.880000 +CVE-2024-50172,0,1,96fe67f6a7121a839db877b4d954aa1de14121fb47b7e41ca5c3b5a13f86b876,2024-11-08T19:01:03.880000 CVE-2024-50173,0,0,4c970d12dd754ccb8104b90e1d492ededf628513a4a2ae610793a1225bf473a7,2024-11-08T19:01:03.880000 CVE-2024-50174,0,0,2c26938b83def25026558593a8de95056553d3b183731913b33322f9bdb4a9f2,2024-11-08T19:01:03.880000 CVE-2024-50175,0,0,c267b836a166805894a4c37ebf72dd55d9843a0ad632ba7edf4fdc2d3e0169a2,2024-11-08T19:01:03.880000 @@ -264615,8 +264615,8 @@ CVE-2024-50312,0,0,8b68d956a110cf88efd2db7bdd6fdd3dc5b02186497d9ae2cbca0852915a3 CVE-2024-50315,0,0,4cc2faf3d8c489bc195ea9b1b71e3db71fb7f18259f91c4f6bf82e911f7ad06a,2024-11-06T18:15:06.173000 CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000 CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000 -CVE-2024-50332,0,0,1a42ed8004554770ddf6287db232f683a70aa788adf4f5377695a69da9577e8f,2024-11-06T18:17:17.287000 -CVE-2024-50333,0,0,dec570600936fbd1d13d82c721e514d60fa6e5733b1c9746045163c28aeb4e6b,2024-11-06T18:17:17.287000 +CVE-2024-50332,0,1,9656d38bcfb11514c440d951a58b16e4a5fcba542ce41e8a3824831aeb409389,2024-11-06T18:17:17.287000 +CVE-2024-50333,0,1,4401ab12299711f5c870abfc6cd15c77232e2aa5f01bc8c09f095498f866c9c7,2024-11-06T18:17:17.287000 CVE-2024-50334,0,0,f1904bf4f599c0615877538d390ce8a4f2f074393bfa4b43c380ab7ec9b0624c,2024-11-08T19:51:58.433000 CVE-2024-50335,0,0,30b0738ceedc1a1fb3bb1288fecf67aef4015dca447e6a6bbd65ec5d7cafcbc2,2024-11-08T15:09:07.440000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 @@ -264627,12 +264627,12 @@ CVE-2024-50343,0,0,9aee7878545f6eae1646b297d9ae34768aeb5669a62a009ff413ffe484533 CVE-2024-50344,0,0,01bf6c563fd2a47d8f1655926ebf620cef86a1d975ff50e33bcc2ca54db6ff27,2024-11-01T12:57:03.417000 CVE-2024-50345,0,0,120f42c313995ee571dc5826f119cf5f875da86aa283b5167f30198f30ea112c,2024-11-08T19:01:25.633000 CVE-2024-50346,0,0,fb25cbb7b8a23f8bc4a8f048afe511d7d942fe5a9bb027a602dbfa956ec82a3d,2024-11-05T16:04:26.053000 -CVE-2024-50347,0,0,09b35c9108a453337442f172c0c30bea977424cb455f7f1c26e8c5268b8f2c51,2024-11-01T12:57:03.417000 +CVE-2024-50347,0,1,27f16939f93088b46ca4735812513cca765a91a390b88a1aa60491d8fb6217f3,2024-11-01T12:57:03.417000 CVE-2024-50348,0,0,fa8a8e9e48d227df1afdc378e4ee00ffda2dd051bb15c8b477e290549096cb45,2024-11-06T14:49:46.073000 CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000 -CVE-2024-50353,0,0,c270322657a2173bb388f1746e651fd5c3e3613c7dc6a2e8967074d0cc432797,2024-11-01T12:57:03.417000 -CVE-2024-50354,0,0,71c165210065e28f3056b772ab098428406844612dc3279d15bcac1af858ffbc,2024-11-01T12:57:03.417000 -CVE-2024-50356,0,0,64f0da8e0b7e6e4d5658fd7d480220251668db371d4ec71f8643d1fa5f1ef922,2024-11-01T14:35:08.330000 +CVE-2024-50353,0,1,c9a50181bc0403c3a3fc6ea2769936cf1180aab72223cab0848a096e189ab860,2024-11-01T12:57:03.417000 +CVE-2024-50354,0,1,5fe2cfed42eb75a8865a8b156fa958f7af02063c60312ccd6714684eb18cee96,2024-11-01T12:57:03.417000 +CVE-2024-50356,0,1,1007ed397ecbfac0c7e4779187113696b4d36207eb77ee96ff22c8fde6a29757,2024-11-01T14:35:08.330000 CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000 CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000 CVE-2024-50378,0,0,363ccac602ebd2db0e355ee3adb0fa1db2db17fafd04c23325c4255122e790c6,2024-11-08T19:01:03.880000 @@ -264687,17 +264687,17 @@ CVE-2024-50448,0,0,a4aae285def62dfc159373743f4d99acc40877008825e97cbd7f370ea4bc8 CVE-2024-50449,0,0,26fffa3096de1c72fa85583c6f33c30c5d75f53bfa92f375276b4f61f8be205f,2024-11-08T20:32:59.137000 CVE-2024-5045,0,0,2cc3bc060710a5f4f076b17bfc4c763ffc9b4201a30a5ba725a69c9c0d38befe,2024-06-20T20:15:20.153000 CVE-2024-50450,0,0,7fc26bfa183b8562e84f6ef3fdd2ced88c72fd71cbb7684963fe6a0f34f112bc,2024-10-29T16:05:40.250000 -CVE-2024-50451,0,0,9e10a2730d4d224fc008f74af7e4e87adb7173c98f4e87f05a6cb935f28f1c9e,2024-10-29T14:34:50.257000 +CVE-2024-50451,0,1,7d7e395c4bc169b7c5edab9be5982baeea1032a7e6d13511909479c08c98dd3d,2024-10-29T14:34:50.257000 CVE-2024-50453,0,0,e89d52ae701410acfefb72264206cd0820e07df81338b3098b8559b944b0ec5e,2024-10-29T14:34:50.257000 CVE-2024-50454,0,0,9d16a2e4356dbdfef4286c8b0e4629708aeb8f7938cb70a2ff3217cf54b560a8,2024-11-01T12:57:35.843000 CVE-2024-50455,0,0,25a99d146bd13580e40d11adab73e854fc31a7bcfbaee49909033fc23a6c8b5e,2024-11-07T17:01:30.937000 CVE-2024-50456,0,0,cce324d6198e8843e2938707f71fdd53169cdbd8bc5ec8c5079417c4b3dcdb32,2024-11-07T17:02:03.653000 CVE-2024-50457,0,0,b84fdbe3b1d8ff69f56f7c8a32f23f6e8146042c72bee30b99bdcba52b7fe0e2,2024-10-29T14:34:50.257000 -CVE-2024-50458,0,0,a843b6f3ada563d8daf61990461bdb89f598755b6880d14df2bc84efdc8206c4,2024-10-29T14:34:50.257000 +CVE-2024-50458,0,1,f552232f23baadebdc58c3fd11a2709c091e87e06ee0aebdaf5f8f140cf50be4,2024-10-29T14:34:50.257000 CVE-2024-50459,0,0,6641e61426a818cff44eec6500fc0b034294e17c7fdf43b3c69786d675e07ca7,2024-11-06T23:11:17.687000 CVE-2024-5046,0,0,61eff6fbe16c762ff136f32fbf7c7454761f98bd61a41d7bf57a3431cdb819c7,2024-06-04T19:20:57.247000 -CVE-2024-50460,0,0,82d4ab7fefa246ce57a72383ca35008e1c66070e05dd2e7ddad07c6838704d66,2024-10-29T14:34:50.257000 -CVE-2024-50461,0,0,e926adc646135f96a8c30b094b43a59a8c4d2ffe68507adf959cf049381e29b7,2024-10-29T14:34:50.257000 +CVE-2024-50460,0,1,60daab12b903ca1484d257e5d4ada950e4141cbedd29ce47bd9f86a935c12403,2024-10-29T14:34:50.257000 +CVE-2024-50461,0,1,7f78e7b55b603cc73c858220732fc1f0e7f64987518728fdb283a12b7a8a7216,2024-10-29T14:34:50.257000 CVE-2024-50462,0,0,4ccfb8409add318d1d381a3ba39c166e299f826cc0027453ac31d88195954a9c,2024-10-29T14:34:50.257000 CVE-2024-50463,0,0,41f5357ec154cc687872e4ff2451d70da03c70ee2d1be893e9fa2dcf4c51e71e,2024-10-29T16:25:01.827000 CVE-2024-50464,0,0,cf609d0bd47c8857d574d513c156d84098d01d1e1d4103f4808d20a068af8082,2024-10-29T14:34:50.257000 @@ -264729,7 +264729,7 @@ CVE-2024-50488,0,0,92b5881a6f09aa9100cab7be6bd104b49f594c60708054bde44c913395051 CVE-2024-50489,0,0,052390e832091de8b4e86a61a6aab7bbd00e0054fa2778c6e9529e093b8eee4d,2024-10-31T00:16:07.977000 CVE-2024-5049,0,0,5a3f3841afc31b2308320d9a79229ff3b2e78886b62ff0b6a021008032b5bd1d,2024-05-17T18:35:35.070000 CVE-2024-50490,0,0,df5308d43aea0811e64f7f34c1741602a9a3be24440d41ba19ac9b091f537e4b,2024-10-29T14:34:04.427000 -CVE-2024-50491,0,0,d45e80298b2cd498e088c8e8fd696359aaf1f4ee17096c915de4f90118bf6c0d,2024-10-28T13:58:09.230000 +CVE-2024-50491,0,1,6112dc8ba05c685af506d3800b888cb8c80e65bdede023d4574281e0d20eb326,2024-10-28T13:58:09.230000 CVE-2024-50492,0,0,f159cac56066cb0613fe7474254cab2a396f1953a0559edf2bfc816cec9b09e6,2024-10-31T01:12:02.283000 CVE-2024-50493,0,0,1b86e41beced3d67b90f334d27db11237a706dc3447bbfcf4216e988a60b9a9c,2024-10-29T14:34:04.427000 CVE-2024-50494,0,0,9569aa1d34f7229fbd2091c58d08802086f733f20697c3538e6874d12444dba9,2024-10-29T14:34:04.427000 @@ -264794,8 +264794,8 @@ CVE-2024-50610,0,0,2336f18018549d31226ad5c4df53b32342f6a9adf12b0e16f4241999fbebe CVE-2024-50611,0,0,b7b71f84afa520bfc084b6a09c3810b4876c4c81fbfb17c3b55f0862f176f6f3,2024-10-30T19:35:30.853000 CVE-2024-50612,0,0,a56d3511a352387d1c5ea7e2d6e4e4fe93f9223e53299cde611512d2527248e1,2024-11-05T16:14:55.550000 CVE-2024-50613,0,0,bf676b3a43077a0ee34fb8417ceaef37dc50ebc7743e99afa1aa7876f584a20d,2024-10-31T00:58:54.497000 -CVE-2024-50614,0,0,58fc61c3561083518ba20d0c6298423e4c7c149ae93e39c4b741966c5b5d683c,2024-10-30T20:35:36.237000 -CVE-2024-50615,0,0,edb24b44339da7b63cc1e067bf2709cb5d14555e24295a1bc3757208997ee938,2024-10-30T20:35:37.310000 +CVE-2024-50614,0,1,e4dbc17db42a0c42579ba77a146705a8445a75f90546cb7b4c3dc14d7adb712b,2024-10-30T20:35:36.237000 +CVE-2024-50615,0,1,b7e43b47cd429a59ea1e65cb3383a96641f8d8401c0e7577999bdb52f4f71fe1,2024-10-30T20:35:37.310000 CVE-2024-50616,0,0,e123de96868e8818da5b7d193dee2e816ee0e81fabf6e652a87cb9726aad9098,2024-10-30T20:35:38.380000 CVE-2024-5062,0,0,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb76013f,2024-08-20T14:14:35.717000 CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f546,2024-10-30T21:35:11.373000 @@ -264842,41 +264842,41 @@ CVE-2024-50966,0,0,17999db3c119b65097d64bae028974d0e6d4cf5d6910c7a7a211536c5ff5b CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000 CVE-2024-5098,0,0,51bb68a404444dbad57c4444d3880f6dd34c8b10fc09ab7783a9da02fb8f5608,2024-06-04T19:20:58.887000 CVE-2024-5099,0,0,c449033239abbf7fd2bba4f64694ff77374623f364f0fa141d0a92a151a3ab2c,2024-06-04T19:20:58.993000 -CVE-2024-50993,0,0,89f566097ed90136c4ee84d7f34768da1e449fdf98882d21cc15ce97af503f51,2024-11-05T17:35:19.567000 -CVE-2024-50994,0,0,e900dd51ed765d5c24439e64fa1ddd28e99334ac73a9b1b60e2957e951b03384,2024-11-05T17:35:20.363000 -CVE-2024-50995,0,0,3180333f0ef2057bf92e976c04fd2dc51cf8a9381d7422a62de657a4b1ed8d78,2024-11-05T17:35:21.167000 -CVE-2024-50996,0,0,de6165dc752470590ce7feff9f7a9907876a672d34de86d838f3ba8546c78816,2024-11-05T17:35:21.940000 -CVE-2024-50997,0,0,23e109b61e57e318a5ba5182a3cfbdbf16dac72a0d465a7af40c9e3818b96efa,2024-11-05T17:35:22.727000 -CVE-2024-50998,0,0,ede398e97170fb1fc451111e64fae6fe8d5bda0fabd65be70083eb2608214544,2024-11-05T17:35:23.530000 -CVE-2024-50999,0,0,d46c7ee286214267b834f7a38c30bd73541b2b9fe90a3eeebf0631bb724a7ad5,2024-11-05T17:35:24.530000 +CVE-2024-50993,0,1,a9de4dd48dde3ac3fa9f8b5743f41b5b56dac32227b8c8bf2e6472e6c2af5c67,2024-11-05T17:35:19.567000 +CVE-2024-50994,0,1,a5cc8cf1e738761f065a4f27d82e61f2db641d34c682578fe3c2a1afe6ece327,2024-11-05T17:35:20.363000 +CVE-2024-50995,0,1,60f0d71d86c3ab99e9e53c92c51f008106e52e339b3ed722bcfbc442b7e04dd9,2024-11-05T17:35:21.167000 +CVE-2024-50996,0,1,2309bcd1530e363eb174f7443a5072080b3034dd3d1ae15750a4e1bfc844e46a,2024-11-05T17:35:21.940000 +CVE-2024-50997,0,1,a0557e6b07dab052d1a4026eb892ec071328887f1bff146130021852939b2624,2024-11-05T17:35:22.727000 +CVE-2024-50998,0,1,739821d7e35aca7404b031674f7d180fd3aaaf6c9128d2d6a3201d576b4478dc,2024-11-05T17:35:23.530000 +CVE-2024-50999,0,1,107b36538fa775533e5b733d494d40d184cc68c03abf78b1fc879618e90f6caf,2024-11-05T17:35:24.530000 CVE-2024-5100,0,0,842bb8c3f2a4f79bcb8941b679c783a037b46fd7fbe0cd4c121e0f442f26dd34,2024-06-04T19:20:59.100000 -CVE-2024-51000,0,0,1183cd4cd4de1c7648a3485b75e4d188e2937e0ee895371954419544352608cd,2024-11-05T17:35:25.467000 -CVE-2024-51001,0,0,c979839a015377f26d6143330eb1ce8cd17e08dfb915dede41d0427aba1af319,2024-11-05T17:35:26.337000 -CVE-2024-51002,0,0,2726059a7bd9a5f3e1b898ddbd6293774ead5d932b6c387746ea9075ae398fc2,2024-11-05T16:35:18.260000 -CVE-2024-51003,0,0,4c917655d27f85813dc3d05d9b157ec7f06f42dd69dfa12767557420e6e0e45b,2024-11-05T16:35:19.093000 -CVE-2024-51004,0,0,75154919385d198778b33c8803f553cc086a37d235b06d707e83e331bd306930,2024-11-05T16:35:19.883000 -CVE-2024-51005,0,0,ed1b3d564daed2138ca178f761b47cf837ba49475203dcd06d178eef19dc67b1,2024-11-05T16:35:20.680000 -CVE-2024-51006,0,0,7d6a6a32e3acd962086449786c117dbd353bdd1f40a48a12d2da9f01310694bb,2024-11-05T16:35:21.467000 -CVE-2024-51007,0,0,4c2446b110ea757e221358f4dae5c4d7959a3a58afb181733299cb3187c49cca,2024-11-05T16:35:22.247000 -CVE-2024-51008,0,0,38817c25967adc3d23bc32df7dc7be60747473ebe5a85f0992391e4688ed23f6,2024-11-05T16:35:23.023000 -CVE-2024-51009,0,0,2c1e1a33ec03567b647e02c06b809e7fd5fb16d596b315b514f119ef28c10672,2024-11-05T16:35:24.040000 +CVE-2024-51000,0,1,6b803a6dbeb06ca615a544b4ae3726a4b465ad277ea2bef40499153cc5d170c8,2024-11-05T17:35:25.467000 +CVE-2024-51001,0,1,1beee68af0963e2047e9f4db3ec35e055c2cd4aa8906b25b5fad2dcc1d0c29b0,2024-11-05T17:35:26.337000 +CVE-2024-51002,0,1,7e2f357af3fd5b1e411e06e34f1533cdd51e979a89dd3da3306d022dfaa8f791,2024-11-05T16:35:18.260000 +CVE-2024-51003,0,1,16cbc0088bae2e3ec43010d8ec92a19ead63d317b8e97d7bfdeb19af3b1b5ec3,2024-11-05T16:35:19.093000 +CVE-2024-51004,0,1,b57f570f53429ac2312ea7cf940a3529efaaf32b846ef2b9c57e204ab9e097d5,2024-11-05T16:35:19.883000 +CVE-2024-51005,0,1,5eb5940bdcaabd069fddb2c03e8b7bacab6851c3a0fc1df70f575feecbaa2c5b,2024-11-05T16:35:20.680000 +CVE-2024-51006,0,1,715d6dc30ae2b6c3b5d1acc4fc4bbba82813fa91b58e68a3c1930ed475732cbc,2024-11-05T16:35:21.467000 +CVE-2024-51007,0,1,b646e42839c6b34e29bc95724db90678cd6a9ba565900f705c57eeda5126a1fb,2024-11-05T16:35:22.247000 +CVE-2024-51008,0,1,93f79698cf4093b0762699f735331b49cb14db534a16f08329c139cf291ccef5,2024-11-05T16:35:23.023000 +CVE-2024-51009,0,1,663bc469e8e2e1df2729bb8c0ee7b38473ded7ca6905b73fb97134273b585278,2024-11-05T16:35:24.040000 CVE-2024-5101,0,0,977c4b0a494ead2cda93339fc7970eceffc0abbcf59e3d381e30d6e368ea2037,2024-06-04T19:20:59.200000 -CVE-2024-51010,0,0,1f7cdf3f5cafc3c598350516e4495aa16de3395109683a90b86eb949713bbe8b,2024-11-05T16:35:25.043000 -CVE-2024-51011,0,0,0fd49844853bc3b57efae32d036b3880bf371ce435a4d7040372081e90dbabae,2024-11-05T16:35:25.910000 -CVE-2024-51012,0,0,c60b63b2568f01988bcb41b8c07d9d776f9b947cd836bd4e377144b62f824bee,2024-11-05T16:35:26.760000 -CVE-2024-51013,0,0,b37cce47e58b3ecedbc6957f08f378157329843044d1d8015151416d559b2ec3,2024-11-05T16:35:27.573000 -CVE-2024-51014,0,0,20cf8a48afbb909026b03bc11edacf0be097f72c1c4cf7e04c4d7a12c602d551,2024-11-05T16:35:28.387000 -CVE-2024-51015,0,0,28c51e4636a91623ccd5ab0e605eb5bdfb369047071a7406c94e8e179f14be05,2024-11-05T16:35:29.203000 -CVE-2024-51016,0,0,d15da7ddc92cce5f32e286aa415780743570bbd5d0ad868b48f7a261cf591599,2024-11-05T16:35:30.037000 -CVE-2024-51017,0,0,89352508471f00167aac9cf7d514d297a817333f7739910488e0859afae89533,2024-11-05T16:35:30.870000 -CVE-2024-51018,0,0,57a18bfca8547d2ba3ff726acfd06ade83287c319db484a34057e32e4d5457f3,2024-11-05T16:35:31.680000 -CVE-2024-51019,0,0,d21fd4ed5b5e879e28f251ffd46310415b392084e31bc7835374e7cddfb378a9,2024-11-05T16:35:32.493000 +CVE-2024-51010,0,1,e0bcfd5f74d8914e7290494d4470a3775f394c29ad4da7c7c78562271c624ea7,2024-11-05T16:35:25.043000 +CVE-2024-51011,0,1,e72d14c98a57973e1ab2e3654918105abe1334d4462cd3878859080c960dc51d,2024-11-05T16:35:25.910000 +CVE-2024-51012,0,1,b34c0dfcdd3222d11af962bac82707143f2dbda253db0054b77289f64ee54de0,2024-11-05T16:35:26.760000 +CVE-2024-51013,0,1,32286e0e23f9580dbbc1c64f0cd7b38fc05d55675f098a29f05714c76dcc2609,2024-11-05T16:35:27.573000 +CVE-2024-51014,0,1,9445f62ff47cc262e7934132e2e8e97ba63f360bc10f269ca9d18c72912060a6,2024-11-05T16:35:28.387000 +CVE-2024-51015,0,1,43d20bd70a9bdc738accc71d881af0b5d1ebcccdbbeb80309817dcff2d8143b0,2024-11-05T16:35:29.203000 +CVE-2024-51016,0,1,8283bb7fe26f61211b28bd6a1e4054319ccea83ec77a6acd7c0d55d0049a2583,2024-11-05T16:35:30.037000 +CVE-2024-51017,0,1,fa0b5d0b8ac07834d02a247ff3a79f1838adfd554554cde70d6dbbc8d193cfd1,2024-11-05T16:35:30.870000 +CVE-2024-51018,0,1,e2e2256d6576ed8160f8c488b45331dfb31e0aeb5750e0a7a8e6cb1fd32e4d5d,2024-11-05T16:35:31.680000 +CVE-2024-51019,0,1,0bd7eabaf2b0c8ff6d74a29e782c2d0a5875f12e54c5c0cdc2a04a8e32691e09,2024-11-05T16:35:32.493000 CVE-2024-5102,0,0,08e8b63df4b027b442c085d0304361be120cbd743be1bc28f89310b2b36153ae,2024-06-12T18:12:01.453000 -CVE-2024-51020,0,0,7591f39b0872f7dfeb4660955429b5fa50f3f186cb06ab909bfd42c03a761280,2024-11-05T16:35:33.313000 -CVE-2024-51021,0,0,6e51b7c5f3d907f6d97f021ab2ed3d5f090c7d031555ccb5bb9b22d4120ac6a1,2024-11-05T16:35:34.170000 -CVE-2024-51022,0,0,0ece03150b358676db07247d8d7b2f159d764688f80f628fe39259199c6eedc3,2024-11-05T16:35:35 -CVE-2024-51023,0,0,ebaa10a6cf97ea0a8d3a78af01fa457d59d2482b7e77a284c65cb29a479cdc11,2024-11-05T21:35:11.923000 -CVE-2024-51024,0,0,6f5395792b8172ecfa32aa76f0d11406773a932eea25e8edfc3d7b1b44837d82,2024-11-05T20:35:25.253000 +CVE-2024-51020,0,1,c7800ff4a5768a3fe60dc2bd50282360c3da6baf0e411d79d12715a50261f0d1,2024-11-05T16:35:33.313000 +CVE-2024-51021,0,1,b06ad1dc7caa63f0b78f2a692ebfbc7dc3db4861942e25ad61d65ea6408ad932,2024-11-05T16:35:34.170000 +CVE-2024-51022,0,1,9c971f391f021663a674f6ebedab01c215349ea525c288aa5349243311884419,2024-11-05T16:35:35 +CVE-2024-51023,0,1,b12f806c39027dd585f6605b170e48144a3513f557c323acb9850f669a22caef,2024-11-05T21:35:11.923000 +CVE-2024-51024,0,1,2602616b46cde149e40ad1ec2305c8463ebfa9f137264738865d2534ea931b9c,2024-11-05T20:35:25.253000 CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df46,2024-06-04T19:20:59.297000 CVE-2024-51030,0,0,8864f5f848b4bd116cf6c117fc9413494345870c652480a21b492e7685b9b04b,2024-11-08T19:01:03.880000 CVE-2024-51031,0,0,1e5ab5cf9c7a25d9afff4cfa33f3918bc3dcf7d5460284d217623f0076ca881a,2024-11-08T19:01:03.880000 @@ -264885,11 +264885,11 @@ CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000 CVE-2024-51055,0,0,053fa0edaa4b935312f10d8abb53700d4933be42c7e135561c5e89740c1394ed,2024-11-08T19:15:06.190000 CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000 -CVE-2024-51060,0,0,ddd21612647112f5890d80f7e9a66af0aa0242bb00299a6e578d6a3caed1ae4f,2024-11-01T17:35:08.443000 -CVE-2024-51063,0,0,04525a4216d664978c53553ccbf14c3bb10809c1c7ef530045d2d00523e40e57,2024-11-01T17:35:09.657000 -CVE-2024-51064,0,0,3a24e0e67b1e32350dab39d0cee4153852370ff0850d9044ade96ae9154c1193,2024-11-01T16:35:28.140000 -CVE-2024-51065,0,0,cdccc621d56c3af1614027f465ca4dd3958c1ea87123eef561594ec053158958,2024-11-01T16:35:29.133000 -CVE-2024-51066,0,0,010bc283a10d76807a0ff72156b96ff9a3fd50116fdb40e43ae56cc160f8609f,2024-11-01T21:35:05.747000 +CVE-2024-51060,0,1,402a659a58502cf6652d1569d08a8e1bb7141b9ef84b5e613167d10864e0cd4d,2024-11-01T17:35:08.443000 +CVE-2024-51063,0,1,9e69a8a911d8071b54e4574d5d702b1952770d32179ac558a313a9f533d2704b,2024-11-01T17:35:09.657000 +CVE-2024-51064,0,1,ece811d6bc4d0a8a39ffb1295a05e98aa14ea4b37a609a0a704291f46ae22c1c,2024-11-01T16:35:28.140000 +CVE-2024-51065,0,1,13eba658de2ad8a597e121d04159d33db90d11b073dc40f03a99a360d854cd46,2024-11-01T16:35:29.133000 +CVE-2024-51066,0,1,43893f00c972f583b870a001430879894062f80987f31522bd1f9ce18500c0dd,2024-11-01T21:35:05.747000 CVE-2024-5107,0,0,f5453befe05d8931f9c9a9c4f41bacf3f3f4a7efb50cfd25019760201fcefc62,2024-06-04T19:20:59.600000 CVE-2024-51075,0,0,65ae3c5f839d1343cfe96d616d54dd3277e3aa60c8e36fb4e4a98f4465a848c0,2024-11-04T13:41:29.567000 CVE-2024-51076,0,0,cd339191f7270b925031f2e79ccdef36faac89c073f1d7fece38ee50c55aeb1f,2024-11-04T13:41:48.267000 @@ -264925,20 +264925,20 @@ CVE-2024-51242,0,0,e088a83b7d97849945ef8e4d907ce1041a9c29e696b96e8d85eb2989ae73a CVE-2024-51243,0,0,dc9a3bcceef7b79b773664e490e9177d288abe6b5bfadf448f185196016ec54c,2024-11-01T12:57:03.417000 CVE-2024-51244,0,0,1da847cb94e7afadbe7e923335974b45b31004bfdcaa7db1bb1325dae7dc5743,2024-11-05T19:28:09.403000 CVE-2024-51245,0,0,cd8e624bcae522cb4f78ad168083d005c448f6c799522055b493c751305761a5,2024-11-05T19:28:18.903000 -CVE-2024-51246,0,0,90f14622f67d4bb93742ef4444188b35626331bc6bf6eef7e29707c6ff25b53c,2024-11-04T18:50:05.607000 +CVE-2024-51246,0,1,aa194fa853a376377fe6819071cfa2916e0d00edaefe6d104071b5230b5ba59a,2024-11-04T18:50:05.607000 CVE-2024-51247,0,0,6f763214fc728651cee8f49e7f9d3466af02b1a87bcb320803295d2391bcc8af,2024-11-05T19:28:25.143000 CVE-2024-51248,0,0,24dce655c534c26b0b67ea327bc58bc6e5d7937e725965feb96bf75ba11def28,2024-11-05T19:28:29.730000 -CVE-2024-51249,0,0,3d0cc9c67b7b5023c7f9e10f06a152021d08c28671660933aadd4bf75e0be323,2024-11-04T18:50:05.607000 -CVE-2024-51251,0,0,c4c34718f73bd23a2f11b62312d57fb9837cb268511a72fa7d6e908990a99a5e,2024-11-04T18:50:05.607000 +CVE-2024-51249,0,1,23dd85f23924e75ce199438298671d7b20ece05b7ee21f636e4f3929eb3f65e7,2024-11-04T18:50:05.607000 +CVE-2024-51251,0,1,63152562fe66f261ed3205b0767b9a859ea9c0ff927b599c5c96705e6967a8f8,2024-11-04T18:50:05.607000 CVE-2024-51252,0,0,bf357f6855609c81237cb444d332859dc7316dc50aaeed6006dd85a3ea82ebf7,2024-11-05T20:54:38.960000 -CVE-2024-51253,0,0,096fa2cabcaa44b92f571ac0967480e4fabe4fb9873c51a9dbe9e95ead4dc4ec,2024-11-04T18:50:05.607000 -CVE-2024-51254,0,0,223d23065b28f9aecf516c7169cb923513ae1f39fc52963cc50e2cab41350206,2024-11-01T12:57:03.417000 -CVE-2024-51255,0,0,09c7dedf943104113335c71594438f15e0e67937d27a8d621ad19f82c6566163,2024-11-01T12:57:03.417000 +CVE-2024-51253,0,1,bd6b7c4e24728199770eb9a14af1e277c7168d7d6f853e011077c74df42885e3,2024-11-04T18:50:05.607000 +CVE-2024-51254,0,1,4d642ec452abe6cdba5c262373e2aab09d79d6769674c820e370762f9161e773,2024-11-01T12:57:03.417000 +CVE-2024-51255,0,1,a624dcdb94d97c48f4dca96a54582f03958adf8163a6448adb9e86af917199ad,2024-11-01T12:57:03.417000 CVE-2024-51257,0,0,5bc43acf86cf6a149a1c82df6d74466de1800bed5ebde1393a814b2e71c1f732,2024-11-01T12:57:03.417000 CVE-2024-51258,0,0,c1cefb6c70fe6675982414c5eaf69eafb9b739883e94accc88d419fbdbb5fedb,2024-11-01T12:57:03.417000 -CVE-2024-51259,0,0,148c0baee08a2358bc69890e6575da5d28ddd9b53f460f8d3b0168da0da3cad1,2024-11-01T12:57:03.417000 +CVE-2024-51259,0,1,3be4521408d268c1be067cc143163725d8c9558cb88f083748a088d60dedb199,2024-11-01T12:57:03.417000 CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000 -CVE-2024-51260,0,0,184097b0812d41a9488367ecf34995f6d8c0d60329587b4279f6d99cf1c6831f,2024-11-01T12:57:03.417000 +CVE-2024-51260,0,1,3748a881395cf498c7913b8453c3ae82f16b8b07e10a31a47e659f2dc374ae1d,2024-11-01T12:57:03.417000 CVE-2024-5127,0,0,5d050a550f47de0de6a2700ac8157688ac6a9d343b4828aa3a29d3075e37fd77,2024-11-03T17:15:14.280000 CVE-2024-5128,0,0,42a870f009e751c5fdc69853a0302af4b5630246045f8cff158e54fb4e3edd9b,2024-11-03T17:15:14.427000 CVE-2024-5129,0,0,775c71113c1b7299300ab83c8a34b391b75dc55b55486fb0ef4553cde0b68e06,2024-10-03T16:56:02.837000 @@ -264953,7 +264953,7 @@ CVE-2024-5131,0,0,9b223a3704656a88e804c16f004e4517a5aad70b85be149c86a7a2071dad55 CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000 CVE-2024-51326,0,0,86a38e3ec445ab1743629a943074bd136cc3a19613d33223b8410daa71b7467f,2024-11-06T15:02:12.403000 CVE-2024-51327,0,0,6dff1d9ddb8570601185ec672ddf11cc5295d3cdce074e30aa360a3024bc5c57,2024-11-06T15:02:55.710000 -CVE-2024-51328,0,0,768f8be19425d8bf4cf9b5b89b937b298b5cc7b18ce12eea5265b64902006bbb,2024-11-04T19:35:16.150000 +CVE-2024-51328,0,1,2b00b7365b3324739a77fda3a7b20dd87707f9d87480b5fe651b2c4602f0e7fd,2024-11-04T19:35:16.150000 CVE-2024-51329,0,0,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000 CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000 CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000 @@ -264984,20 +264984,20 @@ CVE-2024-51426,0,0,5d33521d8b96e38633b5f868464693826d0cf60bba0992fdeeaa0d9e10eb5 CVE-2024-51427,0,0,8620fe2fe9783598011162ebda7f5b78a4941fc646ad43a32bd7b2f439c18153,2024-11-04T06:15:04.340000 CVE-2024-51428,0,0,fb1653bd6cd8ce3434ea4834244ca24b448fe538e8f0e6838c3f9a7c85caa59b,2024-11-08T19:01:03.880000 CVE-2024-5143,0,0,5ac39d02075c8e32566e12e6b75645e72f6b53d1cd5d8a84d8661f31cb199459,2024-10-31T15:35:44.950000 -CVE-2024-51430,0,0,ff23326a74158832e3c36a3da3cf40ac4ba003ba8db91bd39e91a6a5bd9de288,2024-11-01T12:57:03.417000 +CVE-2024-51430,0,1,e23bc166e946ed09c1e6208a39c8c621a64715374dbb4e27957dcbd11ccc25de,2024-11-01T12:57:03.417000 CVE-2024-51431,0,0,8caf7bc329d5a006462692c4b8ce6c1d5bb12741ba8426c8ae4bc6b34727dbe3,2024-11-05T21:37:16.943000 CVE-2024-51432,0,0,06d0d3316848cec870b03db5c1c503efe28d2aee8f81e4282d342a754853942f,2024-11-04T22:35:10.037000 CVE-2024-51434,0,0,8c68c9ee35eceb55bbf1a98e98603282050fe997d32967086380b48530b1bb99,2024-11-08T19:01:03.880000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 CVE-2024-5145,0,0,e9d5b011678068f9e46540aba9b4c166c9546581cf81cda6f6984ec899d8b7b6,2024-06-04T19:21:01.520000 CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe738f,2024-05-22T12:46:53.887000 -CVE-2024-51478,0,0,25e14e056c5c89fe676748fde64f00a33c4819db8e746c89acfb29d48ca9cb59,2024-11-01T12:57:03.417000 +CVE-2024-51478,0,1,9c645c867780dc62421ca357104dcf5de15f7abda4e26eccd09e0b3312ae61a8,2024-11-01T12:57:03.417000 CVE-2024-5148,0,0,bd5836562cd7c4456364427f29f33cc1c67447ccbfc1a9320a1023f854c7eb77,2024-09-03T12:59:02.453000 -CVE-2024-51481,0,0,f64631b2131fa64c23f138efaf5fa4f6bfc9240002644a0600a58343fe7fe57b,2024-11-01T12:57:03.417000 +CVE-2024-51481,0,1,79865ece5695e59d21a71c5242cb6b84c6582b835d3ed06315b12ef5cbe5ff4e,2024-11-01T12:57:03.417000 CVE-2024-51482,0,0,bfd63cd113518065a1bebad51613f86054f6e228acaf54013add2bd0a434c523,2024-11-05T14:15:14.840000 -CVE-2024-51483,0,0,c5a29f482fccda0bbec81ed3810d60d0c6db87bfa31f80af39598738138d1407,2024-11-01T20:24:53.730000 +CVE-2024-51483,0,1,f70c42f235544d305181618bf39f85a2958b60e254bcd1640771f1e1cba85c88,2024-11-01T20:24:53.730000 CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000 -CVE-2024-51492,0,0,f7707382e20ae0a5d0691f1765aba2ab231ce799ae0324009e67aec7e287f95a,2024-11-01T21:15:15.080000 +CVE-2024-51492,0,1,0a58c7013d2cd1abea36461b62b0843b3a8fe747b96ce2f6ac388e3c542b0b6c,2024-11-01T21:15:15.080000 CVE-2024-51493,0,0,905ca061a7e2249944cb0aec37c9054b75e237343bc05a733cf47492ea8f9f1d,2024-11-06T18:17:17.287000 CVE-2024-51498,0,0,a215c64a461c357224f24d4e16a3f3f3214ac081278e197bc9556945ad303f5e,2024-11-05T16:04:26.053000 CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000 @@ -265033,7 +265033,7 @@ CVE-2024-51528,0,0,7facae14a405d1cb6b0f061ca5849c9312c5771584c4c9518b3caefbdebe2 CVE-2024-51529,0,0,4cdd480ac021e0810a5ec103f351b7d12468311fbc3059650aaa3d8118f05311,2024-11-07T19:56:41.723000 CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2d6,2024-07-24T17:56:55.923000 CVE-2024-51530,0,0,b223f2f9d54a795ec6226988140b76c544409eb01507942db54f2fb02451e725,2024-11-07T19:56:10.187000 -CVE-2024-5154,0,0,dd9543d1b55e95fe68ef2cbce657bf493d3cb20e7ff1b13c6f72f3406df71c74,2024-09-25T06:15:04.890000 +CVE-2024-5154,0,1,2c602e8d6f655148c2efcba24fc906682fadb9d86fedb847d157c6b41556db54,2024-09-25T06:15:04.890000 CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d764,2024-07-03T02:08:34.117000 CVE-2024-51556,0,0,1e86278f9e8270f54394249aeb1bdfa29554113bb25d1314d36a2d05a34caa50,2024-11-08T15:20:14.800000 CVE-2024-51557,0,0,74a03cd5399390ac4d2657bbafb433e9e98d03e5bbcfda661e7117caa589d23f,2024-11-08T15:19:48.557000 @@ -265224,25 +265224,25 @@ CVE-2024-52004,0,0,cda7bdd0c7053528436526e0da817c10d7e6af192f07823de4d6867cac000 CVE-2024-52007,0,0,558684c27d15319c50b5e15589845bf68997788625835337a2a9a90b00337341,2024-11-08T23:15:04.757000 CVE-2024-52009,0,0,d9ff4e43168f72e2b7b99a8124dfd6827e82914c022b4175d78287967eaad806,2024-11-08T23:15:05.030000 CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000 -CVE-2024-52013,0,0,d9e82ae91803da33afed578345dc1a358b894658d92808fa986ec4533aa8b6bc,2024-11-05T16:35:36.337000 -CVE-2024-52014,0,0,bf660c78013825ab133590fbd2d4d926551058021d148525516ea24d33d017c6,2024-11-05T16:35:37.113000 -CVE-2024-52015,0,0,0c1fc663eb1e52f598b8081aab47181e5aa1ac1153810ee1ad9394759e57e8f1,2024-11-05T16:35:37.890000 -CVE-2024-52016,0,0,997db2f344b80e32a42929e03770e58a7d4c86fbc0ef2ecc7d2666c100ccf32b,2024-11-05T17:35:27.993000 -CVE-2024-52017,0,0,4ae96bacec4ca834dfab51acf7ca202255eef33956404100e8fff6d179efc73d,2024-11-05T17:35:29.290000 -CVE-2024-52018,0,0,89bb1c49446f77e0e17cbbdb91307964ed22119bba530ebb0e15a8611c43aed6,2024-11-05T17:35:30.507000 -CVE-2024-52019,0,0,6dc71c6b273cc0db4e2c9b8e857f468950802c07e0f33c4666d7b9a45da2bb4b,2024-11-05T17:35:31.593000 +CVE-2024-52013,0,1,dc6fa1208648c6e0d094b332c10d38b0f7c8c8c6d93ae518d64f679a86a6ec4c,2024-11-05T16:35:36.337000 +CVE-2024-52014,0,1,545c92489d8cb508f0bdcb65d9f6b19ac8bf6a61dd5add79060ed642cb14b442,2024-11-05T16:35:37.113000 +CVE-2024-52015,0,1,a5e53232b1f16aa28db7ce5cbb2aada710eba0b2a30b6ad4f54922682b071803,2024-11-05T16:35:37.890000 +CVE-2024-52016,0,1,7d947276cdbbd8a337187958d526168033b927693243bd875327e2d3799e5b77,2024-11-05T17:35:27.993000 +CVE-2024-52017,0,1,d1ee936c7b6b7fe46eebb54e2ea4ead10b463f0413cce3f893f5a67abe4ca557,2024-11-05T17:35:29.290000 +CVE-2024-52018,0,1,20845ee5c76a46f370f629f52226bf2d04169ae85a091ae9397f3edef8da9cbe,2024-11-05T17:35:30.507000 +CVE-2024-52019,0,1,2bff641d1d2382b1552bc47a2cdc2c315c54be68edf9f78499dca930de06496e,2024-11-05T17:35:31.593000 CVE-2024-5202,0,0,506e1bf31418d031771b54eb5cec35a7698867910819f07cfbd45cd0a9a0bcc0,2024-05-24T01:15:30.977000 -CVE-2024-52020,0,0,f4e5ef7e008d4e707ade2e25ae6dee1536b27ca045ccf82ff9ac529dab51cd80,2024-11-05T16:35:38.663000 -CVE-2024-52021,0,0,819cb94edd2ef23f794f36d33f45d248435cacbb3931d1673f745777b35fa341,2024-11-05T16:35:39.440000 -CVE-2024-52022,0,0,2788a51909bc763c60a338337ae72fd14fbc42d428ea38b58cb8706e28179fa1,2024-11-05T16:35:40.237000 -CVE-2024-52023,0,0,dee96b320ca79da3e6e2bfe0f71305f65396b060c74c530ec6b2dfb488ceeacd,2024-11-05T16:35:41.013000 -CVE-2024-52024,0,0,e6c64beb8a63d2ff668d6d826378537e5ac8a7c579625fefe4ea925e1d28305f,2024-11-05T16:35:44.920000 -CVE-2024-52025,0,0,b0a0d75114b545b546ebf6eb6a3878668de5a32dd39d5bb12bc69ee9870f2a23,2024-11-05T16:35:46.960000 -CVE-2024-52026,0,0,6b87793284d102dff308f0a7c6e31c5027eb5f661ff264827d071b04b2cfbfa0,2024-11-05T16:35:48.997000 -CVE-2024-52028,0,0,cb789b63e14ce0f7c5eca7ad05eebe3c70b2171ac91a6f4ce79fa256019c24d7,2024-11-05T16:35:51.053000 -CVE-2024-52029,0,0,6604d73dfa925d8021d81d835bc825971fe44d6336112cf5acceb9e667d92f34,2024-11-05T16:35:57.397000 +CVE-2024-52020,0,1,8194cb8da1d1f95cbbc891dd4b2ca06b3ad2ff748bce11cfd25b6c5c0996df92,2024-11-05T16:35:38.663000 +CVE-2024-52021,0,1,af68ad52e84b1db6dc6d47095929710f0b69074ec59a4b73c92a2b727cfb4df8,2024-11-05T16:35:39.440000 +CVE-2024-52022,0,1,5108a72a2f5c1510c40f379522044607384c313a397ef112b3f83dca04eba363,2024-11-05T16:35:40.237000 +CVE-2024-52023,0,1,ee04ae3aeaad4cf5d489cfa64e35068a45f0c2f27eb4be9ddf38c49ead2ba9d4,2024-11-05T16:35:41.013000 +CVE-2024-52024,0,1,e7720216e3728e43b4bbb333b155de2d0bbe96a5c143d5d194994cdc88cb3a57,2024-11-05T16:35:44.920000 +CVE-2024-52025,0,1,6ee795babbe6346147a7e1a82b3103c8790c5011baffc007212a1aa01c949288,2024-11-05T16:35:46.960000 +CVE-2024-52026,0,1,85051efc7a03ec0d4b898556b20a839ce76bdc039202b306ce41d2a42538a5ec,2024-11-05T16:35:48.997000 +CVE-2024-52028,0,1,4d053166f6459b35dbc5abb28e4fc3b18b596ce5d1996232d90ecaad96322f46,2024-11-05T16:35:51.053000 +CVE-2024-52029,0,1,45a0bf857ef5def84cf99a7ced23782d689f019eff53b1ace413b47c193dc284,2024-11-05T16:35:57.397000 CVE-2024-5203,0,0,e867d44b31fa735ecaef1844aba382841138e742c9b7e957e6089969316cab00,2024-09-13T11:15:10.197000 -CVE-2024-52030,0,0,f299083111a88bfbb33be7c61ad60009afd7ae12eaace08cfe4a696ed0f18397,2024-11-05T16:35:58.320000 +CVE-2024-52030,0,1,dbd783f66b9834ef61aedd9eab2874c798fdd9f590b76fb0f940976162a98a15,2024-11-05T16:35:58.320000 CVE-2024-52032,0,0,8f6686422ff6c15d5d8174385c663fb356859b0009e1d6e990398e58bcfd7a2f,2024-11-09T18:15:15.203000 CVE-2024-5204,0,0,87eb5b753d379a1bd1ef79b260f2b73c84b7ff9a4b79082cf351323e04c98a6d,2024-05-29T13:02:09.280000 CVE-2024-52043,0,0,f628a95ee6f27b518880b39a2d7b1dea019d91185e307729da648217b18fdef9,2024-11-08T20:39:36.233000 @@ -265940,7 +265940,7 @@ CVE-2024-5977,0,0,4e816ebc7667057f83765d2758ec72f0b5ebf68f5f0bba511fae25da758158 CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000 CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000 CVE-2024-5981,0,0,ef1af743cedf4b6b2a243e8210155140211219a91ac8483d52ff9c2f041ab697,2024-08-16T20:29:35.287000 -CVE-2024-5982,0,0,78ec85d4df3ef45b07a13b2648b7689e9ed03986d3be24189eaad8006d2fd855,2024-10-29T14:35:20.400000 +CVE-2024-5982,0,1,9761b23b97ef06bc8681224d594e125a2e6c44279adaa69ba22f6e826585fde1,2024-10-29T14:35:20.400000 CVE-2024-5983,0,0,e453627058811c95a94483155fc84de41a398cc957b204d5491729f060f018a7,2024-07-24T02:39:24.200000 CVE-2024-5984,0,0,02adfef3fce737b6a79614009e0e348625eec114041041ad04a7ccaf8be7e88b,2024-10-09T18:37:10.747000 CVE-2024-5985,0,0,4b7f0c13c1d049ea5b2816f8e8132ec8aee9a2fb74d5d00bf96c05e553a08b22,2024-07-24T02:34:43.900000 @@ -266173,7 +266173,7 @@ CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654d CVE-2024-6242,0,0,3710863ac72ff4e84ea0fd78a36f5e9434d67cfe63e5360760beb47932695486,2024-08-01T16:45:25.400000 CVE-2024-6243,0,0,af3e968f15710e52d1218645566e4f111ef2efb93699a091cf90e62d1a93b4e5,2024-08-01T14:00:17.580000 CVE-2024-6244,0,0,4cbb950433f554609a829b59a39adf424a1ad2c2835842fe2854036e922c35b5,2024-07-25T15:15:39.890000 -CVE-2024-6245,0,0,c97328ae92566469f49b66a6ded055bff810b7ef64e07618f35de9c576ab91b2,2024-11-07T16:15:17.847000 +CVE-2024-6245,0,1,e48826e87d0e10a8467fd20e296daac9746383aaf35d52d0b16d73e3b0640cbf,2024-11-07T16:15:17.847000 CVE-2024-6250,0,0,65144edeea3f44f34a4643fe614f57e1f379d6c9ac265963a9d3e1dd464fb73c,2024-06-27T19:25:12.067000 CVE-2024-6251,0,0,16b10e1cddc7eff45d98af1185a636a3580f45224711e6588b6edb55d20841be,2024-09-19T16:50:07.723000 CVE-2024-6252,0,0,422fd4c7b8f89267d92d3bf66ac85edf294b5267c233f79a68b2879491fdff76,2024-09-19T16:51:12.527000 @@ -266312,7 +266312,7 @@ CVE-2024-6395,0,0,8949d2f54703284d3b545906a65282811d0c7a0bd7bd2d1ca2dc3e2d333d4c CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000 CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000 CVE-2024-6398,0,0,5e78ff46f697643e5cc753102552fe7954080f3b71babda50e4591659f0fb988,2024-07-19T18:25:44.247000 -CVE-2024-6400,0,0,8197ece32bcb0305f8428a663c1a4a5495ec77ab638d96c062f891b5b405ccd1,2024-10-04T13:50:43.727000 +CVE-2024-6400,0,1,b97035774591a9d32c9bf3734c287bce2a61e9a927e81befdb11994d85a94f4b,2024-10-04T13:50:43.727000 CVE-2024-6401,0,0,75f35c467a7667b8ee07e8ffaab5805a621ce217810e5427bec74047890dc99b,2024-09-20T17:07:55.740000 CVE-2024-6402,0,0,2dbb843b8ac3a7858f42e0a7205d0fe42cc4e1a6d0db6e5033a007b00a2a1ef3,2024-08-30T21:08:54.327000 CVE-2024-6403,0,0,9d6874f85ed8785db48c417cc57cf1b425db80cf3f43ac931de3a37049d75945,2024-08-30T21:08:04.557000 @@ -266347,9 +266347,9 @@ CVE-2024-6438,0,0,dda5c3ef0b29175f6296e0b89d7c12c3e07fe51c2f0cc30ea59ffede8f2663 CVE-2024-6439,0,0,17c8c0dedf84f798cc0f5ae1eb12bcfee8d03a9530b75eee07a6ecb983f8a09a,2024-07-02T17:58:39.773000 CVE-2024-6440,0,0,2c5be04f311531a7679fd469afc24458b735968d4c5b698cdcf03804f39d3eef,2024-07-02T17:58:15.410000 CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c2118,2024-07-02T17:44:45.700000 -CVE-2024-6442,0,0,9c7a03186b45510e4939cf2e764b5b80238aa4f7cc9afa3a78f423db731157b9,2024-10-04T13:50:43.727000 -CVE-2024-6443,0,0,4e6b0fe4059bb5ecd8ac3df1a83f32cede722c6321e038a24d1c8747eeecbd13,2024-10-04T13:50:43.727000 -CVE-2024-6444,0,0,426e5ebc3ff6079b12c546567d5ec063ff859edfdb7814539da7b9519506d9bc,2024-10-04T13:50:43.727000 +CVE-2024-6442,0,1,d58033de190f84c06f1911337c55c18136c198fda1c9e49c55dd45b4e125c45f,2024-10-04T13:50:43.727000 +CVE-2024-6443,0,1,1f5e0feb68edb28ac0a64952477896f97a6bb02f3f5df169ea05c0e678838b96,2024-10-04T13:50:43.727000 +CVE-2024-6444,0,1,ba0e95ea1c09a59af91663628d86e511ed5245425b381e9bbc862266cbfae283,2024-10-04T13:50:43.727000 CVE-2024-6445,0,0,d4bd07ae9eba462d90eb79dcc7204c56bd4679ce8063eb2ebe32db5f30ce9fc7,2024-09-12T16:14:51.480000 CVE-2024-6446,0,0,40ba33596a31d7c54c56d318bcab067473a99b16234df2e24accf4e6227c9e31,2024-09-14T15:17:11.720000 CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000 @@ -266377,8 +266377,8 @@ CVE-2024-6471,0,0,09d48a1225aac8158aa4c1ca2c8aef77a523ae62ed5b11e34f01b64da625d3 CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e25867,2024-08-06T16:31:05.780000 CVE-2024-6473,0,0,9d329dd670917bde4dfbebd26b87a1f0ac64a0b550d97fba6854ff35150aadd6,2024-09-05T14:19:45.153000 CVE-2024-6477,0,0,095ad8bec127bb97feb0819e6df5852cd52601b6cc4ba1d92128a3b9897811f6,2024-09-06T17:35:19.087000 -CVE-2024-6479,0,0,7d605cde1573dc70949af8a1b8fd2bd526b74a20cc82318fcfc2dbd6e88542bb,2024-11-01T12:57:03.417000 -CVE-2024-6480,0,0,ab898b28b663e4888c0e2e84fc34c5f9d5fe27b8b49bc7bd9a9fb2d6c1e644c6,2024-11-01T12:57:03.417000 +CVE-2024-6479,0,1,c8f8d548256983f37f1a1f914a4517a4b6525cba3baa0c1cf39c2a4bf229f79d,2024-11-01T12:57:03.417000 +CVE-2024-6480,0,1,7bcb03d66a5fa0166ee462f7c92d213eea433092d03296e333b90f9f0f0fccdd,2024-11-01T12:57:03.417000 CVE-2024-6481,0,0,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000 CVE-2024-6482,0,0,72bf8f43b51dedcbd3503b13fb1098e532f5e135aadff3ebc844afe2ce28381d,2024-09-27T13:54:53.837000 CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000 @@ -266411,7 +266411,7 @@ CVE-2024-6512,0,0,906938fa7a056c51f95f91dd79dd34ac36ca181a28b11365ac04b0f9d5c622 CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000 CVE-2024-6517,0,0,f170167d48def43eb19df077ff3ef68c655e06896ed245e4dd4a412fc6b98463,2024-10-02T17:15:56.760000 CVE-2024-6518,0,0,7382529f36b9b37e0acec24889e25676a677588945f854438be53c4cb8bd58b0,2024-08-27T13:15:20.033000 -CVE-2024-6519,0,0,073f743ba20119be7a27ef571c7b0b153e0acf051fc8b85888a98b5c92e22d0a,2024-10-21T17:09:45.417000 +CVE-2024-6519,0,1,abf9f0a3aa081ff5a2a08978dcc7886639047fab432ae7dabef37ac5254be60f,2024-10-21T17:09:45.417000 CVE-2024-6520,0,0,788783a471766cea8e4d7400c47ef97ab3609f9b749a996b82510813b15dd35e,2024-08-27T13:15:39.697000 CVE-2024-6521,0,0,3aa5a2c2ac838fced00e2bfb97108d19e91480ed8940bd254983de5af0ee5d87,2024-08-27T13:14:02.300000 CVE-2024-6522,0,0,57b6846d29921e8cee4fe4e801365e7e03862527d6b402bc781bfd457598eb8d,2024-08-07T15:17:46.717000 @@ -266586,8 +266586,8 @@ CVE-2024-6722,0,0,fb8aa2f2ca0cae94e615feba9b69d9262c8617acede8a2b74221595d706785 CVE-2024-6723,0,0,89ebec83340ae368fccf6f870b3378a75d74772673809cf534be51c70b5921e8,2024-09-27T18:50:00.913000 CVE-2024-6724,0,0,4c62a72c14d0d54a44bd529f2e1e2cb1bbf7b4dd7ab83d5409a9b7e23529f22d,2024-08-13T15:35:30.033000 CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000 -CVE-2024-6726,0,0,621910a16f038707208b9fac8c1b14a6e027bea27425c1a5b6bcbabbd78641b0,2024-07-30T13:33:30.653000 -CVE-2024-6727,0,0,a50264c4016614ca4e3bc7e7cf84ef4e3b966e267308af70051ed4e6ca2f9bfa,2024-07-30T13:33:30.653000 +CVE-2024-6726,0,1,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000 +CVE-2024-6727,0,1,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000 CVE-2024-6728,0,0,89e66778f2b381ea7c063797a9902e44dbd60e43d41df6b9b479954aa8b57128,2024-08-21T18:08:50.630000 CVE-2024-6729,0,0,438e935b071d38757a3034c4a57a4b8df633022c3869f5091a76615478d88f37,2024-08-26T05:15:05.533000 CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000 @@ -266688,12 +266688,12 @@ CVE-2024-6853,0,0,bfc770724a0cf755cd219c2fcd6258a625eb83bca7472f15162225f6a8c2c1 CVE-2024-6855,0,0,747d35631c84525ad9c2f1282cefb607972b06ed8ec8bcfcc6cf90db5747a736,2024-09-11T16:21:38.833000 CVE-2024-6856,0,0,19b5d479e1e69973e8f497d2ae00f38aea8ffd7644169a9718f707450440aae4,2024-09-11T16:20:45.503000 CVE-2024-6859,0,0,5a84bd798224932fef849d8b4793f644b651b362a6172317aad467bf1bad3991,2024-09-11T16:19:18.517000 -CVE-2024-6861,0,0,314cf52e1bceec4bfa3d7c50fb27ed38d7472e968b12b542f08309921098668a,2024-11-06T18:17:17.287000 +CVE-2024-6861,0,1,cb4dcc8be40e8d4e66ceb528dce570d6d3458e26caa1631b2b20279dcdc501e4,2024-11-06T18:17:17.287000 CVE-2024-6862,0,0,073f5a8c1f8e2bec8087db878aed60d70af4b3c11209547716a8f3a82485e7e6,2024-09-19T18:37:20.910000 CVE-2024-6864,0,0,469a0ad039e39ca71e90d0d65b529134e06346783388106a10d2fa7d0b356379,2024-09-03T20:22:16.433000 CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000 CVE-2024-6867,0,0,97784f08d4711dc358ee536a5af5e617f34cad9ff3713963d54758397f7f7f62,2024-09-19T18:28:05.477000 -CVE-2024-6868,0,0,d5104475e31e0fb90cc1d3df44800cd264971d04228c9c8702fdfaa233a7a0b4,2024-10-29T14:34:04.427000 +CVE-2024-6868,0,1,97df8408b7c43170ef1c7897184c70b5514ab60b6a5fc3bcdb4486106c27c098,2024-10-29T14:34:04.427000 CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000 CVE-2024-6870,0,0,b8787438d65804a2db5bbc8c04084c34ae58bc1819956a7afefdca8ed2b91985,2024-09-27T00:52:03.737000 CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000 @@ -266823,7 +266823,7 @@ CVE-2024-7006,0,0,e9b22d94c1d987f14202223e075626537518a066054d4c98d0331f98649e69 CVE-2024-7007,0,0,6c2603aae32d52f56620cb62e82bb337e026d3d4a4716b72dab9674c5cf4b216,2024-08-26T16:40:44.500000 CVE-2024-7008,0,0,e9008eac80639f6b75fc8244a6b0baab3d6a7fa095b7e9aa58d7626a117a490a,2024-08-19T17:19:25.390000 CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400e2,2024-08-19T17:18:50.290000 -CVE-2024-7010,0,0,e8197466fb2c1bac0f4d4a1323b7c9da17e9a3898507a8699fc4886432b9e8aa,2024-10-29T14:34:04.427000 +CVE-2024-7010,0,1,2a14823919caaf2f9102e696637f6c9a02f8062a6b12cfb003c09ffb948f8f5b,2024-10-29T14:34:04.427000 CVE-2024-7011,0,0,99ce7f2b3659c5d531a27a1468b259c3a2cc0e8369192e731629993addf70828,2024-11-05T20:35:26.370000 CVE-2024-7012,0,0,a44bf28aa4086113e2305dbe5b19c7911be8e5988385565b873f36daf3fb0872,2024-11-06T09:15:04.187000 CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000 @@ -266852,7 +266852,7 @@ CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c76 CVE-2024-7054,0,0,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830add6,2024-08-20T15:44:20.567000 CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000 CVE-2024-7057,0,0,a6551db1efaa6d27001f0a9bd261718973ddbbed12b7a664704cb76182efd9f6,2024-09-05T17:33:21.630000 -CVE-2024-7059,0,1,3a27a148befadf16acee7ebedbac795471021949159ba2ee559288c712f4b824,2024-11-09T23:15:13.563000 +CVE-2024-7059,0,0,3a27a148befadf16acee7ebedbac795471021949159ba2ee559288c712f4b824,2024-11-09T23:15:13.563000 CVE-2024-7060,0,0,99f05c9e70d96dfd810da0f220a22b8ca1f2d257118941ef3fe99789faa8dacc,2024-09-05T17:30:34.897000 CVE-2024-7061,0,0,c3926c914ac99fe62f5bebfc1891b2d96043768b2289b704236ec0dafd824355,2024-08-28T18:25:38.217000 CVE-2024-7062,0,0,95520405d89c9e85e2e20b19a5c4882dbc79fcc2537e689d2c94915f74a470cf,2024-08-27T14:00:21.543000 @@ -267053,7 +267053,7 @@ CVE-2024-7312,0,0,dc3f367e0f0a86ec8a8ee4af9b89c7ef895e4bddfa2b420824b06225d6049f CVE-2024-7313,0,0,d7b0f37e48710e5f5a7b78ed26ce477c46ecddb143fdd8dc8ca6d6152120ce70,2024-08-26T18:35:13.207000 CVE-2024-7314,0,0,64aaecd133deeb35ae51feed7f4d71099832a2945a1861cec1e5be771eb8caf9,2024-09-17T15:45:01.970000 CVE-2024-7315,0,0,4dd3ca2ac679da492124ce5590c090ad17a93d64696dae4628c710dd311ef4dc,2024-10-04T13:50:43.727000 -CVE-2024-7316,0,0,5990a2a50740417de26e4a43998b50af37cfe2f1f726e85198059b2db0d2b164,2024-10-18T12:52:33.507000 +CVE-2024-7316,0,1,996b41c06431ac843ce9fb0b6d3ff36096268a6b0fafb19858a5a1d1d43bba19,2024-10-18T12:52:33.507000 CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000 CVE-2024-7318,0,0,2ca5990770924d7ddfe581f7904232372b4075f7ae4cad66d6ebd58d8212e872,2024-10-07T20:15:17.153000 CVE-2024-7319,0,0,d4986d9efc8d814183831640de70bbfefdbb6a9fdd92447199ee22066cfb4c77,2024-10-07T19:15:11.090000 @@ -267147,14 +267147,14 @@ CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc0 CVE-2024-7421,0,0,4b103fff50da4b09038f9929ad3e23e3be25f08bd3025dbf87bd771ab41116d2,2024-10-01T18:36:59.117000 CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d62,2024-08-19T13:00:23.117000 CVE-2024-7423,0,0,683032207cd0b1b10abe49d0a408feb34a406022ce5c9940510e7ae64734c49a,2024-09-26T20:08:31.863000 -CVE-2024-7424,0,0,c4d34c59ba9eb26fe878d9523fc5b774c87ba48b87c351fd74cd788fb738c24f,2024-11-01T12:57:03.417000 +CVE-2024-7424,0,1,702af9adc2e8ebd9ee52113e261419fca970219a9051190ebe6e895196a1a116,2024-11-01T12:57:03.417000 CVE-2024-7426,0,0,6a71007700c4116b380e5f6e6a7f1695f7459185616f96253328245521427764,2024-09-30T14:17:51.317000 CVE-2024-7427,0,0,db7ee0ecad2784af038bf44c17fdbe281451988802f60a362e8cf5f513055a51,2024-08-23T18:46:31.730000 CVE-2024-7428,0,0,6dbc394d0d800a640022319856b0e52c143a4490c0eebfb1fe7dd2cce04fb45f,2024-08-23T18:46:31.730000 CVE-2024-7429,0,0,e1fe9d25f23e037844626c0b6da1fab0082ffdd4c01a063605b40af5a6f86d47,2024-11-08T15:26:30.457000 -CVE-2024-7432,0,0,06ce9c1cbd8443e59c80d69c50990173994e92cd340505bacc0020ac005b3ca0,2024-10-04T13:51:25.567000 -CVE-2024-7433,0,0,88cc22c884af0a011e39ba6cefd1774b370a9f1a083127fd4a7e7b453c6c4431,2024-10-04T13:51:25.567000 -CVE-2024-7434,0,0,146e57103ba15fea35b0d41b1c4675678835d36f1618fb7bf108dc690f2ab2db,2024-10-04T13:51:25.567000 +CVE-2024-7432,0,1,13135babfb87de08fb97fa3ca4b200d1190b4ae7a5228aae922cb4ea6640c25a,2024-10-04T13:51:25.567000 +CVE-2024-7433,0,1,145a01941d4042116e5a937072d3053aecb632cb4495eb0ea7b13b550891eaa7,2024-10-04T13:51:25.567000 +CVE-2024-7434,0,1,05b93f69df2eed6186da86f7d6f49fc155672933849f90803016b00bc34fb660,2024-10-04T13:51:25.567000 CVE-2024-7435,0,0,66fc1a447d06c1e8d0a9056fadb7b0070b6d69677ecdcc565c829d3d11041847,2024-09-03T12:59:02.453000 CVE-2024-7436,0,0,77bc4c95d4063144d84cdea1af238ebd00099087f7001defb370c91c51096e64,2024-09-11T14:41:56.753000 CVE-2024-7437,0,0,246b693ce6552391d868b958ff9b746dcace18b15d81fb9e08c275fb53819b64,2024-09-11T14:39:10.557000 @@ -267527,7 +267527,7 @@ CVE-2024-7876,0,0,418e778940cf36c6f7e6078b70d86315614007666b7ea0a8bc25c85e567b15 CVE-2024-7877,0,0,dce2620877837bcc0dca592338bde1c9c5eec5ebfb08768a28ba3c2724236802,2024-11-06T15:42:19.343000 CVE-2024-7878,0,0,1d855258734eb9301ec3064cb052aacfe2a08aa75ea8a20fdcb8aa8f30181ac0,2024-10-02T17:41:44.133000 CVE-2024-7879,0,0,5601310bab32c84a1e3bb5570938b6febfd0ace49dd9b8bc2f0b84fa27f77423,2024-11-06T18:17:17.287000 -CVE-2024-7883,0,0,a3a2b3516fa75baae0f9793ea599317aaafd583c850715f7d93bc13d6d1cd9ad,2024-11-01T12:57:03.417000 +CVE-2024-7883,0,1,9dbe10ad609d397b45dbe44d386409ca6d82cced9db5143da41ce7467f4bc6da,2024-11-01T12:57:03.417000 CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000 CVE-2024-7885,0,0,e2150db115995e6873d7f6cbf78400b2118c17b58478683565f8b50d49fc70e9,2024-10-07T21:15:19.217000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 @@ -267663,7 +267663,7 @@ CVE-2024-8051,0,0,b71bf2ca4f8ce5e1c295954092599db477d1b1f3bcba16081ac3f611e48934 CVE-2024-8052,0,0,d36ff2157e56024767ea82c9c1b8c76ab39601d237dbfd50c7fb1e6eeba7daeb,2024-09-27T16:55:57.383000 CVE-2024-8054,0,0,f7372d07d80e2782b99a1ec78381d10ed3eddb2361d69efd0f5544951feb686d,2024-09-27T21:29:57.607000 CVE-2024-8056,0,0,7d94e922f5f6064358baece439e000bb5b536e03070693d567d210e7b17a441d,2024-09-27T21:29:42.600000 -CVE-2024-8059,0,0,482c2d88bed6d2c3d18d0eb9b4a25df0984892184060aaaf02ca55bcd3858567,2024-09-14T11:47:14.677000 +CVE-2024-8059,0,1,bdae740e9708e98c12d1deb7f7b4958a4e9e21cc3d70a47ecc6f19d9246061d0,2024-09-14T11:47:14.677000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 CVE-2024-8067,0,0,21c0729ad9dc772677b9fbf75bb24db3bcf4512001a88b1eef9d39bf31f69153,2024-09-26T13:32:02.803000 CVE-2024-8070,0,0,fe9b454067f74b13c9d22e1bfea14cc77320169fffe5e56dce182517c870c1a6,2024-10-15T12:57:46.880000 @@ -267693,7 +267693,7 @@ CVE-2024-8103,0,0,77d380cca7da7a9ea520d1266aaf7f8f8fa25bf0cd8d701002339aafa2f0f3 CVE-2024-8104,0,0,e0dd7af2b8170ad0cb122178cc67d0512cc1eb1562d671a3c4e0173a78c8b550,2024-09-05T13:28:06.817000 CVE-2024-8105,0,0,fdab1a8bdde46d997c9a9800b483d676df23e449425d94531660960b3c42e376,2024-09-09T21:35:17.320000 CVE-2024-8106,0,0,918839130e1d38968c976a0bfdbedb93d4d38744e55b3c51d6882ceb90663b73,2024-09-05T13:05:52.540000 -CVE-2024-8107,0,0,b1bf7ed1156c0ba2bfe8d084bf99ae07427ca9074741d82735194e48352258ab,2024-10-04T13:51:25.567000 +CVE-2024-8107,0,1,60fd61039aa97a327d3a9eaa7b9f3f2a657e455e34097e20950be10f000d412d,2024-10-04T13:51:25.567000 CVE-2024-8108,0,0,8f1cde3e4e080de95c0957ccbabc0a49f644f40a04612484228affb54375e534,2024-09-19T13:37:32.203000 CVE-2024-8110,0,0,35b29aa278bc186f939dacbb87981e7b3283cd41ccc0818c634be4d5c87818aa,2024-09-20T12:31:20.110000 CVE-2024-8112,0,0,68d19c324dfb08f42fbaae63f6c41217ad9d464e632ed1f450780261e0cb818a,2024-09-12T18:23:22.507000 @@ -267756,7 +267756,7 @@ CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf56 CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000 CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000 CVE-2024-8184,0,0,92c1db6b8911f83c9668ff411c9a02657286363b11f9f1292cd97f0715f9d11d,2024-11-08T21:00:09.857000 -CVE-2024-8185,0,0,1368b09c94284d9805fb106103e314ec00232d14fe5e3fdffd2fddd8d80126f8,2024-11-01T12:57:03.417000 +CVE-2024-8185,0,1,7c65c4010b87d247d013a7115e4f59c211e092ad2fcd015ff54dfb6b049399b9,2024-11-01T12:57:03.417000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 CVE-2024-8189,0,0,63668eb3e5fc8ff94f956bfec9b936178c3cdc9b685d09571c582433c179a1da,2024-10-07T15:44:45.110000 CVE-2024-8190,0,0,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000 @@ -267818,10 +267818,10 @@ CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a37 CVE-2024-8275,0,0,51e1ea7caef25d27b6b41142c09640cebec413599e9a871eb48577f39eda902b,2024-10-02T19:14:54.870000 CVE-2024-8276,0,0,3274d76cbc571327fcfea77f70e01de12a7ccc769cbd3850878973b51b7dc40b,2024-09-13T19:19:42.293000 CVE-2024-8277,0,0,82bcf1542db43e00d98392122dd79a27dbe1d8e968a985fda92afe2ac464709c,2024-09-26T14:39:20.653000 -CVE-2024-8278,0,0,e69975b53ce0ef39053ad939a119f0e4e8c9b3aebcdb78285cbb0702908d7feb,2024-09-14T11:47:14.677000 -CVE-2024-8279,0,0,01f644a1ae1f0a4ef44a2343cafe192879360307caeedc9a7c313857131734eb,2024-09-14T11:47:14.677000 -CVE-2024-8280,0,0,88b7153bea0bbf7f9a34ad509910f9c44d6c8ab2e8341e10d53e75fc2169bf02,2024-09-14T11:47:14.677000 -CVE-2024-8281,0,0,725f2625da91213836ca1bceafc918ece44002acd0aff7672f92c90331483080,2024-09-14T11:47:14.677000 +CVE-2024-8278,0,1,fc32e2167ccf88370e539f3d055e0ff107942d544d0900ce5dc32eec47fdcd63,2024-09-14T11:47:14.677000 +CVE-2024-8279,0,1,a7de1f6bcd7acd612433087dd62d700c55c2713edbe09e73822c3aefec563e44,2024-09-14T11:47:14.677000 +CVE-2024-8280,0,1,ee8246d9e12854e999c4fc7d4ea10afbd0920ea1f9472e1c543327a9ae0730e7,2024-09-14T11:47:14.677000 +CVE-2024-8281,0,1,6e64aec5696815efe009b246052ca974dfd6e9415a9b5d9826067281cc5ba11d,2024-09-14T11:47:14.677000 CVE-2024-8282,0,0,a2856bd38a75dc608ab77f534123da02823e646362412e35675868041564bc32,2024-10-07T20:11:24.890000 CVE-2024-8283,0,0,2d2a9978130a53c84b94f1aa7904ec768bd6494ba0f0dc2730b572cdd6339438,2024-10-07T15:49:22.043000 CVE-2024-8285,0,0,0dc7b9ae09e1cf8976e262dd1fffb8b648c33c9cca4195663b4b85ea560fc0be,2024-10-01T13:15:02.670000 @@ -268092,7 +268092,7 @@ CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102 CVE-2024-8629,0,0,6c9063bb86e9be09fbe263c2afa91e0d043c7779d47db076384be2da04357d8a,2024-10-10T12:56:30.817000 CVE-2024-8630,0,0,c5e92ea3475e7fdf4ce18793c10b7cc1fb102a32792867098f992a914ab99d4c,2024-10-16T13:15:59.997000 CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000 -CVE-2024-8632,0,0,e0cada97c6995cbb67fe42f80a349e37abe4361f782a8365fc38e88552a5da8f,2024-10-04T13:51:25.567000 +CVE-2024-8632,0,1,fd16bdc23f2820db0d83894e1ab03d32c62b52a4f0f01e53941e5fa96e3a2a65,2024-10-04T13:51:25.567000 CVE-2024-8633,0,0,11f9c1ab75a0acad9e38c7131ee0e717752f233463501613a3dd97a61fe47734,2024-10-01T14:17:43.700000 CVE-2024-8635,0,0,7a33169aa1c56166fecdf7f4d906662353a5e22f1362c34800f026c91df08470,2024-09-14T15:24:45.657000 CVE-2024-8636,0,0,0c59a94a620a4c5a9ca1b46d0e9c59ab3787ae337f0eaa0364c7e33937f31aa2,2024-09-13T14:35:08.313000 @@ -268171,7 +268171,7 @@ CVE-2024-8733,0,0,2ad75c4913be224ff75684fa724a275e53b709dc0d7f918cc99544f1d75453 CVE-2024-8734,0,0,df9336f51fe9af5a1ddacc740bf3abe8991041c91d1f44bc6bec3f0ce7eaa8b2,2024-09-26T19:30:03.503000 CVE-2024-8737,0,0,a8f5a9ac08b3915d238b7b0f4fdae19f4d9de463f7b6e5257b850817c52f3420,2024-09-26T19:18:36.097000 CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d13d,2024-09-26T16:48:19.490000 -CVE-2024-8739,0,0,ad602d28df054cf3c9ab379e086c07be2f37aac4e708c350f9bbef7b0a13f2e7,2024-11-04T13:11:14.613000 +CVE-2024-8739,0,1,747f9791250ce7bdb4abfdc453616fbfd86c038e88e5e1339b79be2bb7d7fd29,2024-11-04T13:11:14.613000 CVE-2024-8740,0,0,344648ec73420b23dee0eff45da9579413da1d5a4cc904056aa5b9f023dadc49,2024-10-29T14:46:02.103000 CVE-2024-8741,0,0,b4e1d7f7dfc20b3d40ed40689f6d2a74196871e98895f038c49cf39f3f685863,2024-10-02T16:37:16.407000 CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000 @@ -268282,7 +268282,7 @@ CVE-2024-8924,0,0,ffd18997b4a1a175cd09c0acb2c855c400aa6ac556f1b8573d109646137225 CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000 CVE-2024-8926,0,0,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000 CVE-2024-8927,0,0,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000 -CVE-2024-8934,0,0,789f8344b6df6edb5211621d37606fc9508b8d9f2a3341baf4696f0f5274b977,2024-11-01T12:57:03.417000 +CVE-2024-8934,0,1,d034263c2209110f29442857367b8a22ee1ee4bb6c46d99b0b6fa829300a19f1,2024-11-01T12:57:03.417000 CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000 CVE-2024-8940,0,0,8c62b13b4d198a54cb56580861e41476c7bb8758f7b9eb8762dc3ff8a4d7701c,2024-10-01T17:21:01.550000 CVE-2024-8941,0,0,92a203d8a6a94e9c82aca27b5b4eb25cc17b0659508e43ff25edbb70a0d6f393,2024-09-30T19:45:43.223000 @@ -268414,8 +268414,8 @@ CVE-2024-9127,0,0,2a57398f5cef1966c50482248e5fdb86e0eae0bed7d0a3c554fbb9c182ab0a CVE-2024-9129,0,0,156eaf7bc9b578e645b2cd31b998e3c79292935e3b301a3570b23f38eb7c94cd,2024-10-23T15:12:34.673000 CVE-2024-9130,0,0,c55ec493e0918bdc6346df7de1c7b50119b1912e830881716d5b60020f91e1cd,2024-10-04T17:18:59.130000 CVE-2024-9136,0,0,9b9746749b73403d8dc2b7a33b5935315a467feb0aa3698e70e44d08c2289a1f,2024-10-01T14:28:31.027000 -CVE-2024-9137,0,0,264d67370ab0f50b8c3f1048814084fcd11d0d542a946dd3f8623532739c7355,2024-10-15T12:57:46.880000 -CVE-2024-9139,0,0,4ad68147a5d9ea2e8ca6916d944791ed9c6e2cb907a5644b5fb819f412e605c8,2024-10-15T12:57:46.880000 +CVE-2024-9137,0,1,81d2b6151d6a08e6a6a254db77ac86d0ad378b529291237f369d578912b5b193,2024-10-15T12:57:46.880000 +CVE-2024-9139,0,1,77f0a64c0943b0edf147a203f50ece0ae8a3843dbe9558aa0de0a6695543a927,2024-10-15T12:57:46.880000 CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000 CVE-2024-9142,0,0,143ad6ae744fa593642be06138ba59f5a3ac64fb0a6f22e5d0ade004fddfc127,2024-10-14T16:35:01.033000 CVE-2024-9143,0,0,432306abde8654e6ac194ba9ef5fbef505d23aee8a471f214443bc02dd505196,2024-11-08T16:35:21.580000 @@ -268539,7 +268539,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39 CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000 CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000 CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000 -CVE-2024-9341,0,0,72a5678c25fa1efebda3b3bdc035f57c27c8a6deb35e9011d7464b351ef8a7b9,2024-11-07T08:15:13.577000 +CVE-2024-9341,0,1,7547053127fd864606063a8ad0e325a2056d5818fa8a88d914f6cb31ddc5a945,2024-11-07T08:15:13.577000 CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000 @@ -268550,7 +268550,7 @@ CVE-2024-9350,0,0,aa8e581f7289e7bd37e76e94e3964b82de5f4fbd95aa75417bef570e71a86c CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa47b,2024-10-18T12:53:04.627000 CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 -CVE-2024-9355,0,0,d36c2ed40d06c17ec10f15f75e2e272326b34edbf5b46606acbd8e50c1ff2128,2024-11-05T08:15:04.413000 +CVE-2024-9355,0,1,302621984b6116aa148a6d267ab2864d150a3fcf399bab5a42fa5db73f8156da,2024-11-05T08:15:04.413000 CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000 CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000 CVE-2024-9360,0,0,9328fb4e6135929e3835e5c835fd869b8491fb46bae32eb4c5f02c6fc86a7446,2024-10-04T18:53:58.020000 @@ -268588,7 +268588,7 @@ CVE-2024-9402,0,0,04bb4c5739f014caa4b772ec804b7222edbe186c7bb2fe331673658400879b CVE-2024-9403,0,0,c1afe1062aca6f3e2bbfc345cdb3697cf0c5243163e1e418a6944c658c5bb841,2024-10-04T13:51:25.567000 CVE-2024-9405,0,0,5a1aaacdf03c4deeb5787d411c40d8ad3aed60be9320ac0ab9cd4983368bffee,2024-10-04T13:51:25.567000 CVE-2024-9407,0,0,a50d13b68f03a0b269ee4665a39a310962d3f698bba2a4179dd3284c23695f72,2024-11-05T08:15:04.690000 -CVE-2024-9410,0,0,90cffd2b402803b1ff7e6401238cb515c8bb4e7ed816fe3e9a33e1d435f92656,2024-10-07T17:48:28.117000 +CVE-2024-9410,0,1,f1caeb057101bc11b923104c4939c2a18b358804c54a293851a2bbe945ca8cb5,2024-10-07T17:48:28.117000 CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000 CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000 CVE-2024-9414,0,0,5c21f14ec376abe57dfce5e862247c317429afdd9c8e1a9c0b90f9672b7f519b,2024-10-18T12:52:33.507000 @@ -268603,8 +268603,8 @@ CVE-2024-9434,0,0,79d9ee229ea07912fe660d5aecc73644854130ed033cb358b3e5a09b73a525 CVE-2024-9435,0,0,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40cd6,2024-10-08T16:22:40.780000 CVE-2024-9436,0,0,e30b504278d7461ced9f3cdf7218be31f384e3265b531ba87e7d14e133fbe3e1,2024-10-15T12:58:51.050000 CVE-2024-9438,0,0,f23988b383ffc7b9a8be3f13a0e81848cd3463f82ea0b782cf2d1c7c8dbf0f4a,2024-10-29T14:34:04.427000 -CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000 -CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000 +CVE-2024-9440,0,1,6d1dcf73d068b7faadb02e4ba0fc0848940245146b0545ec0600dafa6ab7817c,2024-10-04T13:50:43.727000 +CVE-2024-9441,0,1,6140a959c2007c944d1666868cb9225779ffdff23e8a8d66442e7c9862616444,2024-10-04T13:50:43.727000 CVE-2024-9443,0,0,79216bcefacd2c253b69bfe25ad6a32e8cbce4e2b4f380af9ed43792d6197551,2024-11-07T20:56:58.797000 CVE-2024-9444,0,0,5871ece6e08e2e034d7a3616fcef31689e8667809591fe9662a10d21d3c836c0,2024-10-16T16:38:14.557000 CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000 @@ -268616,7 +268616,7 @@ CVE-2024-9454,0,0,e0a54a80b6d0251ef607f4148add63a26c7f5ec0cd907194ef73988f726f48 CVE-2024-9455,0,0,70bc73495623b6fab8931499505a6be70a8937392cffccc260a57663b280a262,2024-10-07T17:48:28.117000 CVE-2024-9456,0,0,32e971f93ac67b7dc136ac73dad60b7dab2a314c3fc73b1f49c543da51c18681,2024-10-28T13:58:09.230000 CVE-2024-9457,0,0,9e423d4cda70891a0b74c4852459db88bd5163f875d32e19ac8dac4b758e8eeb,2024-10-15T14:23:57.307000 -CVE-2024-9459,0,0,1fbdede460e96050e57c7e9c9e816080ef38c79a77a32c58edefa452d0fd7056,2024-11-06T15:29:04.917000 +CVE-2024-9459,0,1,f79fcf5e24399662f2c8fe8a61d79ad22521a784ff705bf6fa7dcce2b4df0ff8,2024-11-06T15:29:04.917000 CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000 CVE-2024-9462,0,0,da874134bd4c6d4628ad3a17d1671b7f5c2018935fed477a57fc0d0990ff5d0e,2024-10-28T13:58:09.230000 CVE-2024-9463,0,0,833fbe5400df3e16652b73757d66400db6c2e58ea10075ce0e9e52ee535a69f7,2024-10-15T15:05:25.997000 @@ -268626,7 +268626,7 @@ CVE-2024-9466,0,0,fd9458b730d3a9a669f2d9d658488af28ef360506c84b0ff287be2e6f40084 CVE-2024-9467,0,0,75d04ab03e69b7f9e1a38d891f6aaa266a750bf286ffd9f476545cea603cc1a5,2024-10-15T15:09:13.297000 CVE-2024-9468,0,0,f7accbeda6900e100e8aad354b4e5585f782571ee82a35557f7f3b3ab3e92447,2024-10-10T12:51:56.987000 CVE-2024-9469,0,0,bfacd6ae0e951d4d0f806b219fe22ea394e7dcfb5460f334dffa6ddb0a7e18c6,2024-10-15T18:38:25.647000 -CVE-2024-9470,0,0,6d7d145d5ed6ae4ef4f33928573352f54839c5b9641b899af46f8b3aa4ed69d1,2024-10-10T12:51:56.987000 +CVE-2024-9470,0,1,13c3a583553fbf2e90723a5a0ed6f2354808c5a1753993b658aba04d0ed9b282,2024-10-10T12:51:56.987000 CVE-2024-9471,0,0,2517c360d1e41d9c7ea79e15df7f34465e8f98b985f9011876ffa34a1656df21,2024-10-15T16:55:45.090000 CVE-2024-9473,0,0,2610a860a1ec132e11b499793a273ee08374ba46887944874ff47b7b5fdd4588,2024-10-17T06:15:04.983000 CVE-2024-9475,0,0,273622ecfea8dd0cb8d3a034084a5946e50b2bee83443e844bae24857067e968,2024-10-28T13:58:09.230000 @@ -268642,7 +268642,7 @@ CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b6 CVE-2024-9505,0,0,134fdf0964e1ec52ef4b47c0af3083cd4691e60ed884fd2512ddc6dbb615a8df,2024-10-31T16:39:41.193000 CVE-2024-9506,0,0,fc042b04aa147d17b390b33fa64fff12c26897968128764931f8bf3b1a3e0722,2024-10-16T16:38:43.170000 CVE-2024-9507,0,0,9477ee329318032ff294d196e1a50966e1c5d89bdb9b9dc24092f58cf1f5f346,2024-10-15T12:58:51.050000 -CVE-2024-9513,0,0,8bf69fcd896ef2c6d740d4e3fb7359c13bcd3037f3f5c5ca172d72ee575fdaa7,2024-10-07T21:15:19.450000 +CVE-2024-9513,0,1,db69cbd003490743b194d88463e731d3b1de02129841a861f0831cc016416d9b,2024-10-07T21:15:19.450000 CVE-2024-9514,0,0,a0c385c9cad31170054b57880ea14385102aa94e9ee1a9b5619f4982b4ac92e4,2024-10-09T11:19:25.577000 CVE-2024-9515,0,0,b319f60f83e92c55aa0a25714009b76d6e0da4210ce3c744b2eab53a0f6a8b5b,2024-10-09T11:19:00.897000 CVE-2024-9518,0,0,f447c904357b5163990d2137b373a895756d6633f7b2422e2f067d90be1f5d20,2024-10-15T14:25:58.540000 @@ -268693,7 +268693,7 @@ CVE-2024-9572,0,0,6aa8ec5096cffb49c05ffcb187e769f5454844eed5ebf1e91e8e45ef57650b CVE-2024-9573,0,0,58c75dd5695e86f3dd5971604e3d0b5f4fa9518dd900d56e54c2dcc37c5c3326,2024-10-08T18:45:09.057000 CVE-2024-9574,0,0,a60670a65a4470a80e62c618e77fec3e5e5071e32e3c874874eb23f89671df72,2024-10-08T18:45:13.147000 CVE-2024-9575,0,0,902a179ba291c73f1ff19f974c0569ed05c8dbb3d8914c4f7409455feb2bd5d7,2024-10-14T08:15:02.970000 -CVE-2024-9576,0,0,7a96a155cd09492144b259aa00c523497a7aeb66fdb84ed492d68f7654aa3880,2024-10-07T17:47:48.410000 +CVE-2024-9576,0,1,8951fce62906502da47a1a14d346f6d3a0ab552a2a1307ec37410d86b47884ad,2024-10-07T17:47:48.410000 CVE-2024-9579,0,0,e2993f144efd5aa9c48a1ec5bcd5f3b9005733d0240c41dfc1522a865c26a6aa,2024-11-08T18:08:02.683000 CVE-2024-9581,0,0,fb1d34fab9f94525003a0f26c830b830dcb7b4bdc92dd8a95590c26db891e7c3,2024-10-15T14:28:35.283000 CVE-2024-9582,0,0,6ec198135418f168eaebdeafd2e2fe73c3f44201fb3d949937a7b4e70c974bf6,2024-10-16T16:38:14.557000 @@ -268736,7 +268736,7 @@ CVE-2024-9647,0,0,6da0b5c2c888d90e6f29cb1f98cdc0c7a4315eaaa058e1c781c3c46d5b8615 CVE-2024-9649,0,0,f2ab83afff02bfae827ac0ac8958125c0d2707e9b7d72806aa0e09daf73ca0d7,2024-10-16T16:38:14.557000 CVE-2024-9650,0,0,c785e5c8b40ec3a7d0b9a0e25f6978363c5dcc2fc6507b9c6a2c03a208ac34e9,2024-10-25T12:56:07.750000 CVE-2024-9652,0,0,096af9c07df6f24ff5a9459bed95d6ce45b4a430b6f907d5bc85c0d2be3b93b5,2024-10-16T16:38:14.557000 -CVE-2024-9655,0,0,3320de4caba420aff675473bbcf46fc1de59a784259a889e904f3cf6e797add0,2024-11-01T12:57:03.417000 +CVE-2024-9655,0,1,5f64b0ed215cc4c47eaa212ce6a6578c092759946c6128b0f32509f44691e359,2024-11-01T12:57:03.417000 CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000 CVE-2024-9657,0,0,fb687953042b10eb922558cb840c65de9e3c4da22e7016c1d2e6ab79c6132615,2024-11-08T16:00:28.320000 CVE-2024-9667,0,0,db0574de12822738c38c8016441ce46841c68ee532fe6a4e072cebc9412ff13d,2024-11-08T15:27:25.697000 @@ -268766,7 +268766,7 @@ CVE-2024-9775,0,0,d75c1ef22917b4e34ea6a89f8dca900e05e2ff705fb39813883039fa4b522c CVE-2024-9776,0,0,82a616b68a2c5818c813f35d61772c622935aa1b119f178b9eaa21355bac63d9,2024-10-15T12:57:46.880000 CVE-2024-9778,0,0,0fe7ee5860b89dbc53027fbdd06b191ad5c5e349a3553ba6bc5769975646dd12,2024-10-15T12:57:46.880000 CVE-2024-9780,0,0,82a65b59c0bb0f4aa37b7bc9835ace6b2d8eb95b730adf88705db9589433fda5,2024-10-17T14:18:18.433000 -CVE-2024-9781,0,0,05e99923aaee7e014ef4a84addb9f9dd84cfde4cf7dabf943a828b781dac6231,2024-10-10T12:51:56.987000 +CVE-2024-9781,0,1,cd6f657ed9ef660338f0d777935f231b52aede3f9edb8681363de05250c2257d,2024-10-10T12:51:56.987000 CVE-2024-9782,0,0,e2eb69b6c2b044d22b718569cdb0ebf6964122bc02d92fdf90907280ee9e66c0,2024-10-16T16:44:19.637000 CVE-2024-9783,0,0,596e9c3bfc7b379492d9b169dc85ee1521bf5577471ebe43d2f04808f485ed3a,2024-10-16T16:43:49.053000 CVE-2024-9784,0,0,ee4690bd44afc2da98daa591c06fcd9ef379f757ced30fa65d12d9c28a6966f0,2024-10-16T14:12:35.597000 @@ -268776,7 +268776,7 @@ CVE-2024-9787,0,0,36006c5683023b0a550c9d990c27b32cd453733ae048071aa69db8f35e1b00 CVE-2024-9788,0,0,bb47e288d5e5460abea3a374f5e4cdb4b6cc616a2e520b5bc3d247976f89342a,2024-10-17T14:26:12.120000 CVE-2024-9789,0,0,80ea14a4b839222acb6cf5cbf05a0b4bf6c9c7a6ca9fbe680be5063151c1bd7e,2024-10-17T14:26:19.523000 CVE-2024-9790,0,0,5ca7d35e0149465887d771cb28bd9e6c74a2fa674a3dd1abd82977367f4ff4f8,2024-10-17T14:26:30.160000 -CVE-2024-9792,0,0,cd6fe10744f9cbe2461113b62ef116c322a51ea217f1854f369f223dd8d8050c,2024-10-15T12:58:51.050000 +CVE-2024-9792,0,1,d68aca032770f3ab555b174d9c980d2b9c8b7e1f4d87418bf0969c937a5a85c0,2024-10-15T12:58:51.050000 CVE-2024-9793,0,0,503f1878edc675a043a9f947e1fa9b5d180038b0550ffeb6e16498fc6b8d25cf,2024-11-01T14:36:02.277000 CVE-2024-9794,0,0,2109299c412606589d2d15c7a99f00ade0d69b6b01c343ac91afffa4dccb49fe,2024-10-15T19:12:36.503000 CVE-2024-9796,0,0,e9e2b215bb5f3ccc6d7244ebabf60d89574166678e83498211f5060a11c7c349,2024-10-15T18:46:53.397000 @@ -268803,13 +268803,13 @@ CVE-2024-9818,0,0,27036e755744f27c38d726a43ad1c9df4e3ef69bf87c77f10cf90295a9b03e CVE-2024-9820,0,0,c625b59d383479a78d36c1a053a231b239e4eac8d7ff5924cc83c93a44968c73,2024-10-19T00:44:10.420000 CVE-2024-9821,0,0,847982287e8db8d54661c5522d18fa833c3d9091b2ddb2afe78ab1e8077a47cb,2024-10-15T12:57:46.880000 CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c79,2024-10-15T12:58:51.050000 -CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000 +CVE-2024-9823,0,1,9bd58749a01179ea21ca36b4d37feb833f368418a0a0359d3cad87b853574111,2024-10-15T12:57:46.880000 CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000 CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de713790a,2024-10-29T14:34:50.257000 CVE-2024-9826,0,0,c03e2e0710a5712915ae2341fa5030e5bd74d5917743f7fdf85c043b115b921d,2024-11-01T16:17:10.620000 CVE-2024-9827,0,0,c5e7676b9d011eef0934f8d1e51cd92697f77495088547784042162cb4944824,2024-11-01T16:17:07.187000 CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000 -CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000 +CVE-2024-9837,0,1,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000 CVE-2024-9841,0,0,ebdd51eec8479d80c9266cdceb915506aec1278560e194f65ea2f5d20595b81b,2024-11-08T19:01:03.880000 CVE-2024-9846,0,0,173656afdffd3fc8df737b5cdb277d7e27d47fc010c3df17216e30b52661a1bb,2024-11-06T14:58:04.160000 CVE-2024-9848,0,0,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000 @@ -268825,7 +268825,7 @@ CVE-2024-9863,0,0,5a2779f928f03a35905e31f60158c72d5505c6aaa35173f98063e46d2c1389 CVE-2024-9864,0,0,ecd679b570a8abacc1db8d694db02ae1ea10c97942981b05302fe359da1cbf9c,2024-10-25T12:56:07.750000 CVE-2024-9865,0,0,767ca346f0a1ff11496989a87fd401620d0792dff4b8ce54d6dd2bc8cbb6f984,2024-10-25T12:56:07.750000 CVE-2024-9867,0,0,e67b1f8bf4d2b38a2b9f15fec521fb884d23cbbf85b48f78911bb6397a2ae366,2024-11-08T16:00:04.640000 -CVE-2024-9868,0,0,59a2aba846ee436405b49879e5b0c69be3ddd01e601615061714bd006d4f2afe,2024-11-04T13:44:51.370000 +CVE-2024-9868,0,1,b2463439f3611d00d054cbd441340ef04f6dbee60e35877cb3af971fb7fd3668,2024-11-04T13:44:51.370000 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000 CVE-2024-9873,0,0,54e1b937a83aa8c512a9ce3ab381594073150b73716fb01cf60c5f6e4db0c415,2024-10-16T16:38:14.557000 CVE-2024-9874,0,0,1460054aa35e3d4a7778af581a0d866be7bfa1ccfa7695a2f95ec342e86ad536,2024-11-09T07:15:07.297000 @@ -268842,11 +268842,11 @@ CVE-2024-9892,0,0,467133fa57ffb28c737f61f289d5c58f570db21daea4bb6d667a876d772714 CVE-2024-9893,0,0,d84489165ec702532da777a72a4e467826e650640db0f44ed30b8d433e32a61e,2024-10-16T16:38:14.557000 CVE-2024-9894,0,0,32055c4142b72d0a3f9c19293b700e4df1192ff16d337368689045e8c50a9c33,2024-10-16T22:13:05.583000 CVE-2024-9895,0,0,9f4575888232de3c29cfc8d0d4e2d5d892b3f5ec9e574dd895cb53771a8a3d74,2024-10-17T20:50:03.503000 -CVE-2024-9896,0,0,09339b3269859e496224a4ee93cb949746eeb659cdbf7ff07d2c92a00e93ede6,2024-11-04T14:10:06.287000 +CVE-2024-9896,0,1,1349378c85078664635cddd4e92f21938b789e5f2486c02fbf3dda2655343bf2,2024-11-04T14:10:06.287000 CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000 CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000 CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000 -CVE-2024-9902,0,0,5a17b86729ea7d243eb9cea611038373d4bbb9ba8a32113c474ad669aed65087,2024-11-06T20:15:07.820000 +CVE-2024-9902,0,1,fcc6621af7b49f5e2ca268109dd7638703c1a2b5eb812fea67773fc4fa89351f,2024-11-06T20:15:07.820000 CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000 CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000 CVE-2024-9905,0,0,09e20420cf063b331c2f2444287faaf461bdb42e483d150bc77bc6c327c543d3,2024-10-16T22:12:18.153000