From d6e1618052aabbce993537b76e7f72a28de2c7aa Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 29 Sep 2024 02:03:15 +0000 Subject: [PATCH] Auto-Update: 2024-09-29T02:00:17.791047+00:00 --- CVE-2021/CVE-2021-279xx/CVE-2021-27915.json | 98 +- CVE-2021/CVE-2021-389xx/CVE-2021-38963.json | 2 +- CVE-2022/CVE-2022-24xx/CVE-2022-2439.json | 2 +- CVE-2022/CVE-2022-390xx/CVE-2022-39068.json | 68 +- CVE-2022/CVE-2022-438xx/CVE-2022-43845.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49037.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49038.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49039.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49040.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49041.json | 2 +- CVE-2023/CVE-2023-251xx/CVE-2023-25189.json | 2 +- CVE-2023/CVE-2023-356xx/CVE-2023-35674.json | 2 +- CVE-2023/CVE-2023-461xx/CVE-2023-46175.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52946.json | 2 +- CVE-2023/CVE-2023-529xx/CVE-2023-52947.json | 2 +- CVE-2023/CVE-2023-529xx/CVE-2023-52948.json | 2 +- CVE-2023/CVE-2023-529xx/CVE-2023-52949.json | 2 +- CVE-2023/CVE-2023-529xx/CVE-2023-52950.json | 2 +- CVE-2023/CVE-2023-53xx/CVE-2023-5359.json | 2 +- CVE-2024/CVE-2024-01xx/CVE-2024-0132.json | 2 +- CVE-2024/CVE-2024-01xx/CVE-2024-0133.json | 2 +- CVE-2024/CVE-2024-228xx/CVE-2024-22892.json | 2 +- CVE-2024/CVE-2024-239xx/CVE-2024-23922.json | 2 +- CVE-2024/CVE-2024-239xx/CVE-2024-23972.json | 2 +- CVE-2024/CVE-2024-23xx/CVE-2024-2300.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28973.json | 2 +- CVE-2024/CVE-2024-291xx/CVE-2024-29173.json | 2 +- CVE-2024/CVE-2024-301xx/CVE-2024-30134.json | 4 + CVE-2024/CVE-2024-304xx/CVE-2024-30472.json | 2 +- CVE-2024/CVE-2024-318xx/CVE-2024-31872.json | 4 + CVE-2024/CVE-2024-318xx/CVE-2024-31899.json | 4 + CVE-2024/CVE-2024-31xx/CVE-2024-3150.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3166.json | 2 +- CVE-2024/CVE-2024-320xx/CVE-2024-32034.json | 77 +- CVE-2024/CVE-2024-33xx/CVE-2024-3322.json | 2 +- CVE-2024/CVE-2024-341xx/CVE-2024-34112.json | 2 +- CVE-2024/CVE-2024-34xx/CVE-2024-3408.json | 2 +- CVE-2024/CVE-2024-34xx/CVE-2024-3467.json | 2 +- CVE-2024/CVE-2024-34xx/CVE-2024-3468.json | 2 +- CVE-2024/CVE-2024-371xx/CVE-2024-37125.json | 4 + CVE-2024/CVE-2024-373xx/CVE-2024-37300.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37304.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37985.json | 68 +- CVE-2024/CVE-2024-382xx/CVE-2024-38267.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38268.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38269.json | 2 +- CVE-2024/CVE-2024-383xx/CVE-2024-38324.json | 2 +- CVE-2024/CVE-2024-388xx/CVE-2024-38861.json | 4 + CVE-2024/CVE-2024-392xx/CVE-2024-39278.json | 2 +- CVE-2024/CVE-2024-393xx/CVE-2024-39319.json | 4 + CVE-2024/CVE-2024-394xx/CVE-2024-39431.json | 4 + CVE-2024/CVE-2024-394xx/CVE-2024-39432.json | 4 + CVE-2024/CVE-2024-394xx/CVE-2024-39433.json | 4 + CVE-2024/CVE-2024-394xx/CVE-2024-39434.json | 4 + CVE-2024/CVE-2024-394xx/CVE-2024-39435.json | 4 + CVE-2024/CVE-2024-395xx/CVE-2024-39577.json | 4 + CVE-2024/CVE-2024-399xx/CVE-2024-39910.json | 52 +- CVE-2024/CVE-2024-39xx/CVE-2024-3930.json | 2 +- CVE-2024/CVE-2024-406xx/CVE-2024-40681.json | 2 +- CVE-2024/CVE-2024-40xx/CVE-2024-4099.json | 4 + CVE-2024/CVE-2024-411xx/CVE-2024-41121.json | 2 +- CVE-2024/CVE-2024-411xx/CVE-2024-41122.json | 2 +- CVE-2024/CVE-2024-414xx/CVE-2024-41445.json | 2 +- CVE-2024/CVE-2024-417xx/CVE-2024-41715.json | 4 + CVE-2024/CVE-2024-417xx/CVE-2024-41722.json | 4 + CVE-2024/CVE-2024-417xx/CVE-2024-41725.json | 2 +- CVE-2024/CVE-2024-419xx/CVE-2024-41930.json | 4 + CVE-2024/CVE-2024-419xx/CVE-2024-41931.json | 4 + CVE-2024/CVE-2024-422xx/CVE-2024-42272.json | 2 +- CVE-2024/CVE-2024-422xx/CVE-2024-42278.json | 2 +- CVE-2024/CVE-2024-422xx/CVE-2024-42297.json | 2 +- CVE-2024/CVE-2024-423xx/CVE-2024-42320.json | 2 +- CVE-2024/CVE-2024-424xx/CVE-2024-42406.json | 2 +- CVE-2024/CVE-2024-424xx/CVE-2024-42473.json | 2 +- CVE-2024/CVE-2024-424xx/CVE-2024-42487.json | 2 +- CVE-2024/CVE-2024-424xx/CVE-2024-42495.json | 2 +- CVE-2024/CVE-2024-428xx/CVE-2024-42861.json | 2 +- CVE-2024/CVE-2024-430xx/CVE-2024-43024.json | 74 +- CVE-2024/CVE-2024-430xx/CVE-2024-43025.json | 2 +- CVE-2024/CVE-2024-431xx/CVE-2024-43108.json | 4 + CVE-2024/CVE-2024-431xx/CVE-2024-43188.json | 111 +- CVE-2024/CVE-2024-431xx/CVE-2024-43191.json | 4 + CVE-2024/CVE-2024-432xx/CVE-2024-43201.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43402.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43405.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43423.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43692.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43693.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43694.json | 4 + CVE-2024/CVE-2024-438xx/CVE-2024-43801.json | 2 +- CVE-2024/CVE-2024-438xx/CVE-2024-43814.json | 4 + CVE-2024/CVE-2024-438xx/CVE-2024-43825.json | 2 +- CVE-2024/CVE-2024-438xx/CVE-2024-43827.json | 2 +- CVE-2024/CVE-2024-438xx/CVE-2024-43829.json | 2 +- CVE-2024/CVE-2024-438xx/CVE-2024-43842.json | 2 +- CVE-2024/CVE-2024-438xx/CVE-2024-43850.json | 2 +- CVE-2024/CVE-2024-439xx/CVE-2024-43944.json | 2 +- CVE-2024/CVE-2024-441xx/CVE-2024-44162.json | 65 +- CVE-2024/CVE-2024-448xx/CVE-2024-44860.json | 4 + CVE-2024/CVE-2024-450xx/CVE-2024-45042.json | 4 + CVE-2024/CVE-2024-450xx/CVE-2024-45066.json | 2 +- CVE-2024/CVE-2024-452xx/CVE-2024-45299.json | 2 +- CVE-2024/CVE-2024-453xx/CVE-2024-45300.json | 63 +- CVE-2024/CVE-2024-453xx/CVE-2024-45302.json | 2 +- CVE-2024/CVE-2024-453xx/CVE-2024-45306.json | 2 +- CVE-2024/CVE-2024-453xx/CVE-2024-45373.json | 2 +- CVE-2024/CVE-2024-453xx/CVE-2024-45374.json | 4 + CVE-2024/CVE-2024-456xx/CVE-2024-45613.json | 2 +- CVE-2024/CVE-2024-457xx/CVE-2024-45723.json | 4 + CVE-2024/CVE-2024-458xx/CVE-2024-45838.json | 4 + CVE-2024/CVE-2024-458xx/CVE-2024-45861.json | 2 +- CVE-2024/CVE-2024-458xx/CVE-2024-45862.json | 2 +- CVE-2024/CVE-2024-459xx/CVE-2024-45979.json | 4 + CVE-2024/CVE-2024-459xx/CVE-2024-45980.json | 4 + CVE-2024/CVE-2024-459xx/CVE-2024-45981.json | 4 + CVE-2024/CVE-2024-459xx/CVE-2024-45982.json | 4 + CVE-2024/CVE-2024-459xx/CVE-2024-45983.json | 4 + CVE-2024/CVE-2024-459xx/CVE-2024-45984.json | 4 + CVE-2024/CVE-2024-459xx/CVE-2024-45985.json | 4 + CVE-2024/CVE-2024-459xx/CVE-2024-45986.json | 4 + CVE-2024/CVE-2024-459xx/CVE-2024-45987.json | 4 + CVE-2024/CVE-2024-463xx/CVE-2024-46327.json | 4 + CVE-2024/CVE-2024-463xx/CVE-2024-46328.json | 4 + CVE-2024/CVE-2024-463xx/CVE-2024-46329.json | 4 + CVE-2024/CVE-2024-463xx/CVE-2024-46330.json | 4 + CVE-2024/CVE-2024-466xx/CVE-2024-46610.json | 2 +- CVE-2024/CVE-2024-466xx/CVE-2024-46628.json | 4 + CVE-2024/CVE-2024-466xx/CVE-2024-46632.json | 4 + CVE-2024/CVE-2024-467xx/CVE-2024-46714.json | 2 +- CVE-2024/CVE-2024-467xx/CVE-2024-46727.json | 2 +- CVE-2024/CVE-2024-467xx/CVE-2024-46730.json | 2 +- CVE-2024/CVE-2024-467xx/CVE-2024-46744.json | 2 +- CVE-2024/CVE-2024-467xx/CVE-2024-46750.json | 2 +- CVE-2024/CVE-2024-467xx/CVE-2024-46751.json | 2 +- CVE-2024/CVE-2024-467xx/CVE-2024-46769.json | 2 +- CVE-2024/CVE-2024-469xx/CVE-2024-46997.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47066.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47068.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47069.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47075.json | 4 + CVE-2024/CVE-2024-470xx/CVE-2024-47076.json | 4 + CVE-2024/CVE-2024-470xx/CVE-2024-47078.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47082.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47083.json | 2 +- CVE-2024/CVE-2024-471xx/CVE-2024-47121.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47122.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47123.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47124.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47125.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47126.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47127.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47128.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47129.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47130.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47169.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47170.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47171.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47174.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47175.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47176.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47177.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47179.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47180.json | 4 + CVE-2024/CVE-2024-472xx/CVE-2024-47221.json | 64 +- CVE-2024/CVE-2024-472xx/CVE-2024-47222.json | 2 +- CVE-2024/CVE-2024-57xx/CVE-2024-5798.json | 2 +- CVE-2024/CVE-2024-65xx/CVE-2024-6512.json | 2 +- CVE-2024/CVE-2024-65xx/CVE-2024-6544.json | 2 +- CVE-2024/CVE-2024-65xx/CVE-2024-6590.json | 2 +- CVE-2024/CVE-2024-65xx/CVE-2024-6592.json | 2 +- CVE-2024/CVE-2024-65xx/CVE-2024-6593.json | 2 +- CVE-2024/CVE-2024-65xx/CVE-2024-6594.json | 2 +- CVE-2024/CVE-2024-65xx/CVE-2024-6596.json | 2 +- CVE-2024/CVE-2024-66xx/CVE-2024-6654.json | 4 + CVE-2024/CVE-2024-67xx/CVE-2024-6769.json | 4 + CVE-2024/CVE-2024-67xx/CVE-2024-6786.json | 2 +- CVE-2024/CVE-2024-67xx/CVE-2024-6787.json | 2 +- CVE-2024/CVE-2024-68xx/CVE-2024-6800.json | 2 +- CVE-2024/CVE-2024-69xx/CVE-2024-6936.json | 2 +- CVE-2024/CVE-2024-69xx/CVE-2024-6937.json | 2 +- CVE-2024/CVE-2024-70xx/CVE-2024-7011.json | 4 + CVE-2024/CVE-2024-71xx/CVE-2024-7107.json | 6 +- CVE-2024/CVE-2024-71xx/CVE-2024-7108.json | 6 +- CVE-2024/CVE-2024-72xx/CVE-2024-7259.json | 4 + CVE-2024/CVE-2024-73xx/CVE-2024-7386.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7398.json | 2 +- CVE-2024/CVE-2024-74xx/CVE-2024-7400.json | 4 + CVE-2024/CVE-2024-74xx/CVE-2024-7415.json | 2 +- CVE-2024/CVE-2024-74xx/CVE-2024-7421.json | 2 +- CVE-2024/CVE-2024-74xx/CVE-2024-7426.json | 2 +- CVE-2024/CVE-2024-74xx/CVE-2024-7491.json | 2 +- CVE-2024/CVE-2024-75xx/CVE-2024-7575.json | 2 +- CVE-2024/CVE-2024-75xx/CVE-2024-7576.json | 2 +- CVE-2024/CVE-2024-75xx/CVE-2024-7594.json | 4 + CVE-2024/CVE-2024-76xx/CVE-2024-7679.json | 2 +- CVE-2024/CVE-2024-77xx/CVE-2024-7713.json | 4 + CVE-2024/CVE-2024-77xx/CVE-2024-7734.json | 1020 ++++++++++++++++++- CVE-2024/CVE-2024-78xx/CVE-2024-7862.json | 2 +- CVE-2024/CVE-2024-80xx/CVE-2024-8044.json | 2 +- CVE-2024/CVE-2024-81xx/CVE-2024-8103.json | 2 +- CVE-2024/CVE-2024-81xx/CVE-2024-8118.json | 4 + CVE-2024/CVE-2024-81xx/CVE-2024-8126.json | 4 + CVE-2024/CVE-2024-82xx/CVE-2024-8263.json | 2 +- CVE-2024/CVE-2024-82xx/CVE-2024-8291.json | 2 +- CVE-2024/CVE-2024-83xx/CVE-2024-8316.json | 2 +- CVE-2024/CVE-2024-84xx/CVE-2024-8404.json | 2 +- CVE-2024/CVE-2024-84xx/CVE-2024-8405.json | 2 +- CVE-2024/CVE-2024-84xx/CVE-2024-8437.json | 2 +- CVE-2024/CVE-2024-86xx/CVE-2024-8606.json | 2 +- CVE-2024/CVE-2024-86xx/CVE-2024-8633.json | 4 + CVE-2024/CVE-2024-86xx/CVE-2024-8681.json | 4 + CVE-2024/CVE-2024-87xx/CVE-2024-8704.json | 4 + CVE-2024/CVE-2024-87xx/CVE-2024-8725.json | 4 + CVE-2024/CVE-2024-87xx/CVE-2024-8771.json | 4 + CVE-2024/CVE-2024-87xx/CVE-2024-8796.json | 2 +- CVE-2024/CVE-2024-88xx/CVE-2024-8801.json | 2 +- CVE-2024/CVE-2024-88xx/CVE-2024-8877.json | 2 +- CVE-2024/CVE-2024-88xx/CVE-2024-8878.json | 2 +- CVE-2024/CVE-2024-89xx/CVE-2024-8917.json | 2 +- CVE-2024/CVE-2024-89xx/CVE-2024-8919.json | 2 +- CVE-2024/CVE-2024-89xx/CVE-2024-8922.json | 4 + CVE-2024/CVE-2024-89xx/CVE-2024-8940.json | 2 +- CVE-2024/CVE-2024-89xx/CVE-2024-8941.json | 2 +- CVE-2024/CVE-2024-89xx/CVE-2024-8942.json | 2 +- CVE-2024/CVE-2024-89xx/CVE-2024-8965.json | 4 + CVE-2024/CVE-2024-89xx/CVE-2024-8974.json | 4 + CVE-2024/CVE-2024-89xx/CVE-2024-8975.json | 2 +- CVE-2024/CVE-2024-89xx/CVE-2024-8991.json | 4 + CVE-2024/CVE-2024-89xx/CVE-2024-8996.json | 2 +- CVE-2024/CVE-2024-90xx/CVE-2024-9032.json | 4 + CVE-2024/CVE-2024-90xx/CVE-2024-9048.json | 2 +- CVE-2024/CVE-2024-90xx/CVE-2024-9049.json | 4 + CVE-2024/CVE-2024-90xx/CVE-2024-9075.json | 2 +- CVE-2024/CVE-2024-91xx/CVE-2024-9130.json | 4 + CVE-2024/CVE-2024-91xx/CVE-2024-9148.json | 2 +- CVE-2024/CVE-2024-91xx/CVE-2024-9155.json | 4 + CVE-2024/CVE-2024-91xx/CVE-2024-9166.json | 4 + CVE-2024/CVE-2024-91xx/CVE-2024-9177.json | 4 + CVE-2024/CVE-2024-91xx/CVE-2024-9198.json | 2 +- CVE-2024/CVE-2024-91xx/CVE-2024-9199.json | 2 +- CVE-2024/CVE-2024-92xx/CVE-2024-9203.json | 4 + CVE-2024/CVE-2024-93xx/CVE-2024-9319.json | 141 +++ CVE-2024/CVE-2024-93xx/CVE-2024-9320.json | 141 +++ CVE-2024/CVE-2024-93xx/CVE-2024-9321.json | 141 +++ README.md | 66 +- _state.csv | 559 +++++----- 246 files changed, 2952 insertions(+), 500 deletions(-) create mode 100644 CVE-2024/CVE-2024-93xx/CVE-2024-9319.json create mode 100644 CVE-2024/CVE-2024-93xx/CVE-2024-9320.json create mode 100644 CVE-2024/CVE-2024-93xx/CVE-2024-9321.json diff --git a/CVE-2021/CVE-2021-279xx/CVE-2021-27915.json b/CVE-2021/CVE-2021-279xx/CVE-2021-27915.json index b15c0e5536f..802d488dda4 100644 --- a/CVE-2021/CVE-2021-279xx/CVE-2021-27915.json +++ b/CVE-2021/CVE-2021-279xx/CVE-2021-27915.json @@ -2,8 +2,8 @@ "id": "CVE-2021-27915", "sourceIdentifier": "security@mautic.org", "published": "2024-09-17T14:15:14.100", - "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-29T00:22:31.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + }, { "source": "security@mautic.org", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@mautic.org", "type": "Secondary", @@ -51,10 +81,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "4.4.12", + "matchCriteriaId": "71754804-5279-4236-8CE2-434BC23B4A30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:-:*:*:*:*:*:*", + "matchCriteriaId": "99718D48-5C19-41C5-84E1-52E95F012830" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:beta2:*:*:*:*:*:*", + "matchCriteriaId": "0B21EB9D-BFCD-4D58-BCA6-3AAE6B3B9041" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:beta3:*:*:*:*:*:*", + "matchCriteriaId": "9C1C106B-1B3D-427D-8147-5527E610F569" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:beta4:*:*:*:*:*:*", + "matchCriteriaId": "4E35B0F0-9BF1-45FA-8954-B8BFB7389C4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "213A9276-B9D1-4B4D-BBE9-FC42B6D63DE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "F366E4D8-1515-4E5F-8551-4C8D9E00D0D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc3:*:*:*:*:*:*", + "matchCriteriaId": "B4234B41-F219-45B7-83A1-8F0F652F2A8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc4:*:*:*:*:*:*", + "matchCriteriaId": "DA028F70-6020-47D6-BEC0-6FC0C7E18420" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2755-v422", - "source": "security@mautic.org" + "source": "security@mautic.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-389xx/CVE-2021-38963.json b/CVE-2021/CVE-2021-389xx/CVE-2021-38963.json index 13b0ef9d22e..ba8f4950317 100644 --- a/CVE-2021/CVE-2021-389xx/CVE-2021-38963.json +++ b/CVE-2021/CVE-2021-389xx/CVE-2021-38963.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-09-25T01:15:26.607", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-24xx/CVE-2022-2439.json b/CVE-2022/CVE-2022-24xx/CVE-2022-2439.json index cad5be6ac76..055df216d50 100644 --- a/CVE-2022/CVE-2022-24xx/CVE-2022-2439.json +++ b/CVE-2022/CVE-2022-24xx/CVE-2022-2439.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-24T03:15:02.040", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39068.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39068.json index 29db35f9943..086c9cd2db0 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39068.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39068.json @@ -2,8 +2,8 @@ "id": "CVE-2022-39068", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-09-18T02:15:09.690", - "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-29T00:41:50.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "psirt@zte.com.cn", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "psirt@zte.com.cn", "type": "Secondary", @@ -51,10 +81,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zte:mf296r_firmware:mf296r_nordic1_b06:*:*:*:*:*:*:*", + "matchCriteriaId": "4D4200F7-9018-4F67-B09D-AD07064FAA2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zte:mf296r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E159E60A-7612-405E-B837-DECB98D049D2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1028984", - "source": "psirt@zte.com.cn" + "source": "psirt@zte.com.cn", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43845.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43845.json index 8684f9be837..7ca98eda9a1 100644 --- a/CVE-2022/CVE-2022-438xx/CVE-2022-43845.json +++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43845.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-09-25T01:15:32.757", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49037.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49037.json index a78a990e6fd..a9fe4929887 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49037.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49037.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:03.770", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49038.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49038.json index bba19c7e736..d4a732146b3 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49038.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49038.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:04.940", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49039.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49039.json index 980678a4757..27ce37bf314 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49039.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49039.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:05.187", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49040.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49040.json index a4efb9b24a2..554ae2eb7e8 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49040.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49040.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:05.390", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49041.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49041.json index 071c76278d7..43d197b9c98 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49041.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49041.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:05.620", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json index 527c82f58c1..350dbc70371 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-09-25T16:15:06.827", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35674.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35674.json index fee524cdc7a..02b62eb7577 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35674.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35674.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.193", "lastModified": "2024-09-26T15:35:17.000", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "cisaExploitAdd": "2023-09-13", "cisaActionDue": "2023-10-04", diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46175.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46175.json index 0c0819f842a..8e9ed30e761 100644 --- a/CVE-2023/CVE-2023-461xx/CVE-2023-46175.json +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46175.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Cloud Pak for Multicloud Management 2.3 through 2.3 FP8 stores user credentials in a log file plain clear text which can be read by a privileged user." + }, + { + "lang": "es", + "value": "IBM Cloud Pak for Multicloud Management 2.3 a 2.3 FP8 almacena las credenciales de usuario en un archivo de registro de texto simple que puede ser le\u00eddo por un usuario privilegiado." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52946.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52946.json index 920b8f852c7..753d44a5164 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52946.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52946.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:05.863", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52947.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52947.json index 3445c5203fe..ab96a2557ec 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52947.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52947.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:06.110", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52948.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52948.json index e163ad33633..929ecbc11e8 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52948.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52948.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:06.327", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52949.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52949.json index a45dd1a834e..c7afad93a15 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52949.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52949.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:06.550", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52950.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52950.json index 2a4a81c38ed..23080cb225d 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52950.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52950.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-09-26T04:15:06.780", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5359.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5359.json index eecd24cefe2..7c44fee3b84 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5359.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5359.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T01:15:39.730", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0132.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0132.json index 8372d2f996c..f21f422ffea 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0132.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0132.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2024-09-26T06:15:02.397", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0133.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0133.json index 1d908ffd6af..ff6b55b488b 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0133.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0133.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2024-09-26T06:15:04.053", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22892.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22892.json index 8306b3a9555..f23ce2bfaa0 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22892.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22892.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-09-25T15:15:13.430", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23922.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23922.json index 7d4d5a74942..68ba36c33aa 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23922.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23922.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@asrg.io", "published": "2024-09-23T15:15:13.010", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23972.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23972.json index 9e1a1804b54..e5741fc86db 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23972.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23972.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@asrg.io", "published": "2024-09-23T15:15:13.703", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2300.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2300.json index ef355951930..41665c02826 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2300.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2300.json @@ -3,7 +3,7 @@ "sourceIdentifier": "hp-security-alert@hp.com", "published": "2024-06-12T15:15:51.097", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28973.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28973.json index 60590c310b6..c52d5fa2d7e 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28973.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28973.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-26T03:15:09.640", "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29173.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29173.json index 3132d7e7e78..438814f1b8d 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29173.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29173.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-26T03:15:09.877", "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30134.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30134.json index 3d43f92359d..e7d0456ebbe 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30134.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30134.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The HCL Traveler for Microsoft Outlook executable (HTMO.exe) is being flagged as potentially Malicious Software or an Unrecognized Application." + }, + { + "lang": "es", + "value": "El ejecutable de HCL Traveler para Microsoft Outlook (HTMO.exe) est\u00e1 marcado como software potencialmente malicioso o una aplicaci\u00f3n no reconocida." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30472.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30472.json index e4b8fb4e4cb..c9c70251b9e 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30472.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30472.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-13T12:15:10.410", "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31872.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31872.json index 1afa7e95558..b79f4f51cd6 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31872.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31872.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Security Verify Access Appliance 10.0.0 through 10.0.7 could allow a malicious actor to conduct a man in the middle attack when deploying Open Source scripts due to missing certificate validation. IBM X-Force ID: 287316." + }, + { + "lang": "es", + "value": "IBM Security Verify Access Appliance 10.0.0 a 10.0.7 podr\u00eda permitir que un actor malintencionado lleve a cabo un ataque de intermediario al implementar scripts de c\u00f3digo abierto debido a la falta de validaci\u00f3n de certificados. ID de IBM X-Force: 287316." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31899.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31899.json index d15226b607b..8b03cf64f94 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31899.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31899.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Cognos Command Center 10.2.4.1 and 10.2.5 could disclose highly sensitive user information to an authenticated user with physical access to the device." + }, + { + "lang": "es", + "value": "IBM Cognos Command Center 10.2.4.1 y 10.2.5 podr\u00edan revelar informaci\u00f3n de usuario altamente confidencial a un usuario autenticado con acceso f\u00edsico al dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3150.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3150.json index 9b845bda297..7fa81005a24 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3150.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3150.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:00.350", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3166.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3166.json index 81ae9188d4e..b1fc276eb59 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3166.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3166.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:00.817", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32034.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32034.json index fb487879c86..4094ab14f9f 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32034.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32034.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32034", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-16T19:16:10.300", - "lastModified": "2024-09-20T12:31:20.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-29T00:14:35.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,26 +71,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:decidim:decidim:*:*:*:*:*:ruby:*:*", + "versionEndExcluding": "0.27.7", + "matchCriteriaId": "6C6546E7-9340-4C15-BEF9-9075508E1C35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:decidim:decidim:0.28.0:-:*:*:*:ruby:*:*", + "matchCriteriaId": "637B8863-0862-4FB4-9871-EDCF21054F34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:decidim:decidim:0.28.1:*:*:*:*:ruby:*:*", + "matchCriteriaId": "45B74421-A9CA-4C0F-86ED-A6AAB5FCF7F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/decidim/decidim/commit/23fc8d702a4976727f78617f5e42353d67931645", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/decidim/decidim/commit/9d79f09a2d38c87feb28725670d6cc1f55c22072", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/decidim/decidim/commit/e494235d559be13dd1f8694345e6f6bba762d1c0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/decidim/decidim/commit/ff755e23814aeb56e9089fc08006a5d3faee47b6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/decidim/decidim/security/advisories/GHSA-rx9f-5ggv-5rh6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3322.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3322.json index 03e2e7a1ec1..cc471f4ee8f 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3322.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3322.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:01.247", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34112.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34112.json index c2d5ff5296b..5fb85292010 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34112.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34112.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T12:15:10.870", "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3408.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3408.json index 3a5dc9bf402..329938cd119 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3408.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3408.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:01.890", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3467.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3467.json index bf120c251be..3efb4131896 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3467.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3467.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-06-12T21:15:50.617", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3468.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3468.json index dd4650c8d6d..ff638444d50 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3468.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3468.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-06-12T21:15:50.747", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37125.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37125.json index 682cbb24229..ff50e50b881 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37125.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37125.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell SmartFabric OS10 Software, versions 10.5.6.x, 10.5.5.x, 10.5.4.x,10.5.3.x, contains an Uncontrolled Resource Consumption vulnerability. A remote unauthenticated host could potentially exploit this vulnerability leading to a denial of service." + }, + { + "lang": "es", + "value": "El software Dell SmartFabric OS10, versiones 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contiene una vulnerabilidad de consumo de recursos no controlado. Un host remoto no autenticado podr\u00eda explotar esta vulnerabilidad y provocar una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37300.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37300.json index 7519c21c68a..ee0c6c36b02 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37300.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37300.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-12T16:15:12.097", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37304.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37304.json index d8fff7eeea9..ddf7f3f0bb9 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37304.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37304.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-12T15:15:52.910", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37985.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37985.json index 186809b136e..317e859da5a 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37985.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37985.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37985", "sourceIdentifier": "secure@microsoft.com", "published": "2024-09-17T23:15:14.913", - "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-29T00:26:19.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.1, + "impactScore": 4.0 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "C0C74784-089C-4F6D-8488-C2D78F1334D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "7430F434-C018-49EA-8E58-B326918F04C6" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37985", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38267.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38267.json index daf733e388f..9af05e4b0b6 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38267.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38267.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-09-24T02:15:02.750", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38268.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38268.json index 0cc8e620956..c23eae74dc4 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38268.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38268.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-09-24T02:15:02.987", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38269.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38269.json index 214a52e8a10..0f43f3c38be 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38269.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38269.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-09-24T02:15:03.230", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38324.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38324.json index 0e6be404aaa..5d3f02db69c 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38324.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38324.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-09-25T01:15:40.493", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38861.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38861.json index dd884a26da6..2bff8f95bc9 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38861.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38861.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Certificate Validation in Checkmk Exchange plugin MikroTik allows attackers in MitM position to intercept traffic. This issue affects MikroTik: from 2.0.0 through 2.5.5, from 0.4a_mk through 2.0a." + }, + { + "lang": "es", + "value": "Validaci\u00f3n incorrecta de certificados en el complemento Checkmk Exchange MikroTik permite a los atacantes en posici\u00f3n MitM interceptar el tr\u00e1fico. Este problema afecta a MikroTik: desde la versi\u00f3n 2.0.0 hasta la 2.5.5, desde la versi\u00f3n 0.4a_mk hasta la 2.0a." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39278.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39278.json index ba3abb80b71..aeeeaebfe5d 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39278.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39278.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-05T23:15:12.233", "lastModified": "2024-09-06T12:08:04.550", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39319.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39319.json index 7c44d6f743d..2582ce8256a 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39319.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39319.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "aimeos/ai-controller-frontend is the Aimeos frontend controller package for e-commerce projects. Prior to versions 2024.4.2, 2023.10.9, 2022.10.8, 2021.10.8, and 2020.10.15, an insecure direct object reference allows an attacker to disable subscriptions and reviews of another customer. Versions 2024.4.2, 2023.10.9, 2022.10.8, 2021.10.8, and 2020.10.15 fix this issue." + }, + { + "lang": "es", + "value": "aimeos/ai-controller-frontend es el paquete de controlador de interfaz de Aimeos para proyectos de comercio electr\u00f3nico. En versiones anteriores a las 2024.4.2, 2023.10.9, 2022.10.8, 2021.10.8 y 2020.10.15, una referencia directa a un objeto no segura permit\u00eda a un atacante deshabilitar las suscripciones y rese\u00f1as de otro cliente. Las versiones 2024.4.2, 2023.10.9, 2022.10.8, 2021.10.8 y 2020.10.15 solucionan este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39431.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39431.json index 4533a86d650..748dbf728c5 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39431.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39431.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In UMTS RLC driver, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with System execution privileges needed." + }, + { + "lang": "es", + "value": "En el controlador RLC de UMTS, existe la posibilidad de una escritura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota con privilegios de ejecuci\u00f3n de System necesarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39432.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39432.json index 53af45ccd92..4fe04cfffbd 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39432.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39432.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In UMTS RLC driver, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with System execution privileges needed." + }, + { + "lang": "es", + "value": "En el controlador RLC de UMTS, existe una posible lectura fuera de los l\u00edmites debido a la falta de una verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio con privilegios de ejecuci\u00f3n de System necesarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39433.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39433.json index c88dfe94099..1a20922d969 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39433.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39433.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In drm service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed." + }, + { + "lang": "es", + "value": "En el servicio DRM, existe la posibilidad de una escritura fuera de los l\u00edmites debido a la falta de una verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n local del servicio con privilegios de ejecuci\u00f3n de System necesarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39434.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39434.json index f5b208edd2f..2677d5ff512 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39434.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39434.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In drm service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed." + }, + { + "lang": "es", + "value": "En el servicio DRM, es posible que se produzca una lectura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n local del servicio, con privilegios de ejecuci\u00f3n de System necesarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39435.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39435.json index 5a006cc0dc1..2a9e5730f6b 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39435.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39435.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Logmanager service, there is a possible missing verification incorrect input. This could lead to local escalation of privilege with no additional execution privileges needed." + }, + { + "lang": "es", + "value": "En el servicio Logmanager, es posible que falte una verificaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39577.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39577.json index 802661f2b1b..6af6d5676f9 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39577.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39577.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell SmartFabric OS10 Software, versions 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability leading to code execution." + }, + { + "lang": "es", + "value": "El software Dell SmartFabric OS10, versiones 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contiene una vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando ('inyecci\u00f3n de comando'). Un atacante con pocos privilegios y acceso remoto podr\u00eda explotar esta vulnerabilidad y provocar la ejecuci\u00f3n de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39910.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39910.json index 2342b64654a..2f2240b711b 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39910.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39910.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39910", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-16T19:16:10.540", - "lastModified": "2024-09-20T12:31:20.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-29T00:33:03.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:decidim:decidim:*:*:*:*:*:ruby:*:*", + "versionEndExcluding": "0.27.7", + "matchCriteriaId": "6C6546E7-9340-4C15-BEF9-9075508E1C35" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/decidim/decidim/commit/47adca81cabea898005ec07b130b008f2a2be99f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/decidim/decidim/security/advisories/GHSA-vvqw-fqwx-mqmm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3930.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3930.json index 65f61391e3e..d22f2552307 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3930.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3930.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@puppet.com", "published": "2024-07-30T19:15:10.573", "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40681.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40681.json index 069d0ff5f8d..2184f51298a 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40681.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40681.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-09-07T15:15:10.167", "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4099.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4099.json index 4f14ff6bb82..9c75439f287 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4099.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4099.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue has been discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. An AI feature was found to read unsanitized content in a way that could have allowed an attacker to hide prompt injection." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab EE que afecta a todas las versiones a partir de la 16.0 anterior a la 17.2.8, de la 17.3 anterior a la 17.3.4 y de la 17.4 anterior a la 17.4.1. Se descubri\u00f3 que una funci\u00f3n de IA le\u00eda contenido no desinfectado de una manera que podr\u00eda haber permitido a un atacante ocultar la inyecci\u00f3n de mensajes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41121.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41121.json index 4662c4b6937..af3ba0c8e3b 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41121.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41121.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-19T20:15:08.180", "lastModified": "2024-07-22T13:00:53.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41122.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41122.json index 5f2e988968e..7f27e5505dd 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41122.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41122.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-19T20:15:08.430", "lastModified": "2024-07-22T13:00:53.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41445.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41445.json index ae8a4cdb70e..99ff0bed932 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41445.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41445.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-09-25T17:15:18.740", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41715.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41715.json index 0dc8e781561..346ecdf3900 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41715.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41715.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna Pro ATAK Plugin has a payload length vulnerability that \nmakes it possible to tell the length of the payload regardless of the \nencryption used." + }, + { + "lang": "es", + "value": "El complemento ATAK de goTenna Pro tiene una vulnerabilidad de longitud de payload que permite saber la longitud de el payload independientemente del cifrado utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41722.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41722.json index 16871e93aec..d4c7c5a4009 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41722.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41722.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the goTenna Pro ATAK Plugin there is a vulnerability that makes it \npossible to inject any custom message with any GID and Callsign using a \nsoftware defined radio in existing gotenna mesh networks. This \nvulnerability can be exploited if the device is being used in a \nunencrypted environment or if the cryptography has already been \ncompromised." + }, + { + "lang": "es", + "value": "En el complemento ATAK de goTenna Pro existe una vulnerabilidad que permite inyectar cualquier mensaje personalizado con cualquier GID y Callsign utilizando una radio definida por software en redes en malla de GoTenna existentes. Esta vulnerabilidad se puede explotar si el dispositivo se utiliza en un entorno no cifrado o si la criptograf\u00eda ya se ha visto comprometida." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41725.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41725.json index 14d92807f75..ca3caddcb6c 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41725.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41725.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-25T01:15:41.833", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41930.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41930.json index a05fe1fe256..16e797a2d87 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41930.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41930.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-site scripting vulnerability exists in MF Teacher Performance Management System version 6. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Scripting en MF Teacher Performance Management System version 6. Si se explota esta vulnerabilidad, se puede ejecutar una secuencia de comandos arbitraria en el navegador web del usuario que accedi\u00f3 al sitio web utilizando el producto." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41931.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41931.json index bc010d6b6e7..9310b51e348 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41931.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41931.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna Pro ATAK Plugin broadcast key name is always sent unencrypted and could reveal the location of operation." + }, + { + "lang": "es", + "value": "El nombre de la clave de transmisi\u00f3n del complemento goTenna Pro ATAK siempre se env\u00eda sin cifrar y podr\u00eda revelar la ubicaci\u00f3n de la operaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42272.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42272.json index 99cf00dd1ad..3fd9e0edfdc 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42272.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42272.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:08.370", "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42278.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42278.json index bbbf419e45a..fbcd21a3797 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42278.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42278.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:08.813", "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42297.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42297.json index 6f01f1ead77..6ccfa6016df 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42297.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42297.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:10.147", "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42320.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42320.json index 08c71fdc5ee..6b7c301183e 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42320.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42320.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:11.833", "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42406.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42406.json index 3e1c418a69a..b1d820f77bf 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42406.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42406.json @@ -3,7 +3,7 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-09-26T08:15:05.810", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42473.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42473.json index 06d07fc0d75..3c5e688c6d2 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42473.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42473.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-12T13:38:35.680", "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42487.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42487.json index 996027d3121..043158e5c8b 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42487.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42487.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-15T21:15:16.997", "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42495.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42495.json index 22ac508c085..1399a1069db 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42495.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42495.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-05T23:15:12.520", "lastModified": "2024-09-06T12:08:04.550", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42861.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42861.json index 20b0e16c45e..a1bbc21594d 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42861.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42861.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-09-23T21:15:12.870", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43024.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43024.json index dc3d3b51dd4..4ae1d137790 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43024.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43024.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43024", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T20:15:03.270", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-29T00:27:47.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,81 @@ "value": "Varias vulnerabilidades de cross-site scripting (XSS) almacenado en RWS MultiTrans v7.0.23324.2 y versiones anteriores permiten a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rws:multitrans:*:*:*:*:*:*:*:*", + "versionEndIncluding": "7.0.23324.2", + "matchCriteriaId": "1386A44E-EF45-4423-B305-3A89ABA23AAF" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.rws.com/product-groups/translation_management/multitrans/w/releases/5112/multitrans-7-releases", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-43024", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/tomdantuma/CVE/tree/main/2024-43024", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43025.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43025.json index 03061816586..4475b9de652 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43025.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43025.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T20:15:03.343", "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43108.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43108.json index a39e38e94f8..fb7c41747a2 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43108.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43108.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna Pro ATAK Plugin use AES CTR mode for short, encrypted \nmessages without any additional integrity checking mechanisms. This \nleaves messages malleable to any attacker that can access the message." + }, + { + "lang": "es", + "value": "El complemento ATAK de goTenna Pro utiliza el modo AES CTR para mensajes breves y cifrados sin ning\u00fan mecanismo de comprobaci\u00f3n de integridad adicional. Esto permite que los mensajes sean manipulables para cualquier atacante que pueda acceder a ellos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43188.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43188.json index a822ed8b056..c0c29d63340 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43188.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43188.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43188", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-09-18T12:15:02.867", - "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-29T00:24:49.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -36,13 +36,43 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, "weaknesses": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,81 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*", + "versionStartIncluding": "18.0.0.1", + "versionEndIncluding": "18.0.0.3", + "matchCriteriaId": "F74D99AD-0570-49B3-9B0D-6F28FA9564B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*", + "versionStartIncluding": "19.0.0.1", + "versionEndIncluding": "19.0.0.3", + "matchCriteriaId": "DB90C98C-7A38-4B9B-878C-028DD872D19C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*", + "versionStartIncluding": "21.0.1", + "versionEndIncluding": "21.0.3.1", + "matchCriteriaId": "47064639-B3A7-4F99-8823-40D2C9FE3C1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:20.0.0.1:*:*:*:traditional:*:*:*", + "matchCriteriaId": "D36329EB-4317-4AB1-85FA-4E23F185C179" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:20.0.0.2:*:*:*:traditional:*:*:*", + "matchCriteriaId": "8C7FDEC2-CBE3-4C5B-917D-37F2612018FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:22.0.1:*:*:*:traditional:*:*:*", + "matchCriteriaId": "8C6D1E72-FC9F-4A0A-8E80-A3CA8CB0EDAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:traditional:*:*:*", + "matchCriteriaId": "DFB13BEC-206E-41B3-A4F3-9281EBB0E213" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:23.0.1:*:*:*:traditional:*:*:*", + "matchCriteriaId": "F7C0BC37-0F42-463F-B2E4-F2B3D3958314" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:23.0.2:*:*:*:traditional:*:*:*", + "matchCriteriaId": "7E9F20F6-4D3B-4AD6-9F6B-E145598FFEE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:24.0.0:*:*:*:traditional:*:*:*", + "matchCriteriaId": "95CE7462-D6B6-41AE-BD90-E2D65E0318A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7168769", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43191.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43191.json index b93bec0ce6c..38f0a16d448 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43191.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43191.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM ManageIQ could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted yaml file request." + }, + { + "lang": "es", + "value": "IBM ManageIQ podr\u00eda permitir que un atacante autenticado remoto ejecute comandos arbitrarios en el sistema enviando una solicitud de archivo yaml especialmente manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43201.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43201.json index 7f4d561c766..2a0fb84d150 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43201.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43201.json @@ -3,7 +3,7 @@ "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2024-09-23T20:15:04.973", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43402.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43402.json index 98bd8059628..fa73baaaf9d 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43402.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43402.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-04T16:15:06.640", "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43405.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43405.json index e320a17a162..a8c45d5ce0c 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43405.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43405.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-04T16:15:06.853", "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43423.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43423.json index cc63f790343..303dfddc743 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43423.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43423.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-25T01:15:42.893", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43692.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43692.json index 45551d3f165..59bf28ab8b9 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43692.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43692.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-25T01:15:43.110", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43693.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43693.json index 50a68f56714..4d1313b5546 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43693.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43693.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-25T01:15:43.370", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43694.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43694.json index 36004148f5d..22a65e7a254 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43694.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43694.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the goTenna Pro ATAK Plugin application, the encryption keys are \nstored along with a static IV on the device. This allows for complete \ndecryption of keys stored on the device. This allows an attacker to \ndecrypt all encrypted broadcast communications based on broadcast keys \nstored on the device." + }, + { + "lang": "es", + "value": "En la aplicaci\u00f3n del complemento ATAK de goTenna Pro, las claves de cifrado se almacenan junto con un IV est\u00e1tico en el dispositivo. Esto permite el descifrado completo de las claves almacenadas en el dispositivo. Esto permite que un atacante descifre todas las comunicaciones de transmisi\u00f3n cifradas en funci\u00f3n de las claves de transmisi\u00f3n almacenadas en el dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43801.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43801.json index 3f6fa689999..4a429490d90 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43801.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43801.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-02T18:15:36.320", "lastModified": "2024-09-03T12:59:02.453", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43814.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43814.json index 3fbbac29ae0..5605c277eb0 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43814.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43814.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "goTenna Pro ATAK Plugin by default enables frequent unencrypted \nPosition, Location and Information (PLI) transmission. This transmission\n is done without user's knowledge, revealing the exact location \ntransmitted in unencrypted form." + }, + { + "lang": "es", + "value": "El complemento ATAK de goTenna Pro permite de forma predeterminada la transmisi\u00f3n frecuente de informaci\u00f3n de posici\u00f3n, ubicaci\u00f3n e informaci\u00f3n (PLI) sin cifrar. Esta transmisi\u00f3n se realiza sin el conocimiento del usuario y revela la ubicaci\u00f3n exacta transmitida sin cifrar." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43825.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43825.json index dbb57afc89e..83a332bb340 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43825.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43825.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:08.533", "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43827.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43827.json index b05e761bf88..25e88a17c0d 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43827.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43827.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:08.653", "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43829.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43829.json index 6f651948f1a..7c1b488b227 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43829.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43829.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:08.787", "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43842.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43842.json index f701650f782..5e870a3a59c 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43842.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43842.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.647", "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43850.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43850.json index fd3dbf18c21..b544687c1cf 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43850.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43850.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:10.157", "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43944.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43944.json index f59a2fad02f..c20777deecc 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43944.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43944.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-29T16:15:09.197", "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44162.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44162.json index 43459416e29..bee1451e643 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44162.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44162.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44162", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:51.060", - "lastModified": "2024-09-20T12:31:20.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-29T00:16:28.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Este problema se solucion\u00f3 habilitando el tiempo de ejecuci\u00f3n reforzado. Este problema se solucion\u00f3 en Xcode 16. Una aplicaci\u00f3n malintencionada puede obtener acceso a los elementos de Keychain de un usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0", + "matchCriteriaId": "6894DFF1-7930-4DF7-88CF-EB6C7E36336F" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121239", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44860.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44860.json index 8c770468a3c..b531602f28b 100644 --- a/CVE-2024/CVE-2024-448xx/CVE-2024-44860.json +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44860.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An information disclosure vulnerability in the /Letter/PrintQr/ endpoint of Solvait v24.4.2 allows attackers to access sensitive data via a crafted request." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el endpoint /Letter/PrintQr/ de Solvait v24.4.2 permite a los atacantes acceder a datos confidenciales a trav\u00e9s de una solicitud manipulada espec\u00edficamente para ello." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45042.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45042.json index 765f2e00436..d54bc083c2c 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45042.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45042.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Ory Kratos is an identity, user management and authentication system for cloud services. Prior to version 1.3.0, given a number of preconditions, the `highest_available` setting will incorrectly assume that the identity\u2019s highest available AAL is `aal1` even though it really is `aal2`. This means that the `highest_available` configuration will act as if the user has only one factor set up, for that particular user. This means that they can call the settings and whoami endpoint without a `aal2` session, even though that should be disallowed. An attacker would need to steal or guess a valid login OTP of a user who has only OTP for login enabled and who has an incorrect `available_aal` value stored, to exploit this vulnerability. All other aspects of the session (e.g. the session\u2019s aal) are not impacted by this issue. On the Ory Network, only 0.00066% of registered users were affected by this issue, and most of those users appeared to be test users. Their respective AAL values have since been updated and they are no longer vulnerable to this attack. Version 1.3.0 is not affected by this issue. As a workaround, those who require MFA should disable the passwordless code login method. If that is not possible, check the sessions `aal` to identify if the user has `aal1` or `aal2`." + }, + { + "lang": "es", + "value": "Ory Kratos es un sistema de autenticaci\u00f3n, gesti\u00f3n de usuarios e identidad para servicios en la nube. Antes de la versi\u00f3n 1.3.0, dadas una serie de condiciones previas, la configuraci\u00f3n `highest_available` supon\u00eda incorrectamente que el AAL m\u00e1s alto disponible de la identidad era `aal1`, aunque en realidad era `aal2`. Esto significa que la configuraci\u00f3n `highest_available` actuar\u00eda como si el usuario tuviera solo un factor configurado para ese usuario en particular. Esto significa que pueden llamar a la configuraci\u00f3n y al endpoint whoami sin una sesi\u00f3n `aal2`, aunque eso deber\u00eda estar prohibido. Un atacante necesitar\u00eda robar o adivinar un OTP de inicio de sesi\u00f3n v\u00e1lido de un usuario que solo tiene habilitado el OTP para el inicio de sesi\u00f3n y que tiene un valor `available_aal` incorrecto almacenado, para explotar esta vulnerabilidad. Todos los dem\u00e1s aspectos de la sesi\u00f3n (por ejemplo, el aal de la sesi\u00f3n) no se ven afectados por este problema. En la red Ory, solo el 0,00066 % de los usuarios registrados se vieron afectados por este problema, y la mayor\u00eda de esos usuarios parec\u00edan ser usuarios de prueba. Desde entonces, se han actualizado sus respectivos valores AAL y ya no son vulnerables a este ataque. La versi\u00f3n 1.3.0 no se ve afectada por este problema. Como workaround, quienes requieran MFA deben deshabilitar el m\u00e9todo de inicio de sesi\u00f3n con c\u00f3digo sin contrase\u00f1a. Si eso no es posible, verifique las sesiones `aal` para identificar si el usuario tiene `aal1` o `aal2`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45066.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45066.json index eb70d3a91e3..04fa41265b6 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45066.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45066.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-25T01:15:43.710", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45299.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45299.json index fd7158c2837..75b0475441c 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45299.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45299.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-06T13:15:05.253", "lastModified": "2024-09-06T16:46:26.830", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45300.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45300.json index 8fd0e59d059..f3692021247 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45300.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45300.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45300", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-06T13:15:05.537", - "lastModified": "2024-09-06T16:46:26.830", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-29T00:08:14.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alf:alf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0-m5", + "matchCriteriaId": "4A86C937-5E17-42BE-AB2C-8D47FD56CAED" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/alfio-event/alf.io/commit/53b3309e26e8acec6860d1e045df3046153a3245", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/alfio-event/alf.io/security/advisories/GHSA-67jg-m6f3-473g", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45302.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45302.json index 0c327414134..e7ca8e2eba3 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45302.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45302.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-29T22:15:05.377", "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45306.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45306.json index 254e3c7baa2..ce718e7c33e 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45306.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45306.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-02T18:15:36.920", "lastModified": "2024-09-03T12:59:02.453", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45373.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45373.json index 91dcf3b151f..70e668706fd 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45373.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45373.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-25T01:15:43.930", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45374.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45374.json index 36f13cb530f..a78e75bd555 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45374.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45374.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the goTenna Pro ATAK Plugin application, the encryption keys are \nstored along with a static IV on the device. This allows for complete \ndecryption of keys stored on the device. This allows an attacker to \ndecrypt all encrypted broadcast communications based on broadcast keys \nstored on the device." + }, + { + "lang": "es", + "value": "En la aplicaci\u00f3n del complemento ATAK de goTenna Pro, las claves de cifrado se almacenan junto con un IV est\u00e1tico en el dispositivo. Esto permite el descifrado completo de las claves almacenadas en el dispositivo. Esto permite que un atacante descifre todas las comunicaciones de transmisi\u00f3n cifradas en funci\u00f3n de las claves de transmisi\u00f3n almacenadas en el dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45613.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45613.json index 13adc3d5284..5c6218e6d82 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45613.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45613.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-25T14:15:05.303", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45723.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45723.json index 0760bc62d71..d06d94f4fd8 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45723.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45723.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna Pro ATAK Plugin does not use SecureRandom when generating \nits cryptographic keys. The random function in use is not suitable for \ncryptographic use." + }, + { + "lang": "es", + "value": "El complemento ATAK de goTenna Pro no utiliza SecureRandom al generar sus claves criptogr\u00e1ficas. La funci\u00f3n aleatoria que se utiliza no es adecuada para el uso criptogr\u00e1fico." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45838.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45838.json index 00ec6cf6006..01030344216 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45838.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45838.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna Pro ATAK Plugin does not encrypt the callsigns of its users.\n These callsigns reveal information about the users and can also be \nleveraged for other vulnerabilities." + }, + { + "lang": "es", + "value": "El complemento ATAK de goTenna Pro no cifra los indicativos de sus usuarios. Estos indicativos revelan informaci\u00f3n sobre los usuarios y tambi\u00e9n pueden aprovecharse para otras vulnerabilidades." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45861.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45861.json index 17aa3747200..5b8311fe10d 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45861.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45861.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-19T16:15:05.103", "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45862.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45862.json index 31b6c5af0b1..954284863d2 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45862.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45862.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-19T16:15:05.227", "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45979.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45979.json index 84a65963afb..94a0d3940ee 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45979.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45979.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A host header injection vulnerability in Lines Police CAD 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de encabezado de host en Lines Police CAD 1.0 permite a los atacantes obtener el token de restablecimiento de contrase\u00f1a mediante la interacci\u00f3n del usuario con un enlace de restablecimiento de contrase\u00f1a manipulado espec\u00edficamente. Esto permite a los atacantes restablecer de forma arbitraria las contrase\u00f1as de otros usuarios y comprometer sus cuentas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45980.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45980.json index 4b61eff5a7e..f202ab057eb 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45980.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45980.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A host header injection vulnerability in MEANStore 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de encabezado de host en MEANStore 1.0 permite a los atacantes obtener el token de restablecimiento de contrase\u00f1a mediante la interacci\u00f3n del usuario con un enlace de restablecimiento de contrase\u00f1a manipulado espec\u00edficamente. Esto permite a los atacantes restablecer de forma arbitraria las contrase\u00f1as de otros usuarios y comprometer sus cuentas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45981.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45981.json index e9f94562c02..b02d5e33ce3 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45981.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45981.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A host header injection vulnerability in BookReviewLibrary 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de encabezado de host en BookReviewLibrary 1.0 permite a los atacantes obtener el token de restablecimiento de contrase\u00f1a a trav\u00e9s de la interacci\u00f3n del usuario con un enlace de restablecimiento de contrase\u00f1a manipulado espec\u00edficamente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45982.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45982.json index 498961b5b41..b916e372716 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45982.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45982.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A host header injection vulnerability in scheduleR v0.0.18 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de encabezado de host en scheduleR v0.0.18 permite a los atacantes obtener el token de restablecimiento de contrase\u00f1a mediante la interacci\u00f3n del usuario con un enlace de restablecimiento de contrase\u00f1a manipulado espec\u00edficamente. Esto permite a los atacantes restablecer de forma arbitraria las contrase\u00f1as de otros usuarios y comprometer sus cuentas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45983.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45983.json index 497cd426cf4..4b7faa514be 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45983.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45983.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in kishan0725's Hospital Management System version 6.3.5. The vulnerability allows an attacker to craft a malicious HTML form that submits a request to delete a doctor record. By enticing an authenticated admin user to visit the specially crafted web page, the attacker can leverage the victim's browser to make unauthorized requests to the vulnerable endpoint, effectively allowing the attacker to perform actions on behalf of the admin without their consent." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Request Forgery (CSRF) en kishan0725's Hospital Management System version 6.3.5. La vulnerabilidad permite a un atacante crear un formulario HTML malicioso que env\u00eda una solicitud para eliminar un registro m\u00e9dico. Al incitar a un usuario administrador autenticado a visitar la p\u00e1gina web especialmente manipulada, el atacante puede aprovechar el navegador de la v\u00edctima para realizar solicitudes no autorizadas al endpoint vulnerable, lo que le permite realizar acciones en nombre del administrador sin su consentimiento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45984.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45984.json index 63d1569d5e2..17d9680a44a 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45984.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45984.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Cross Site Scripting (XSS) vulnerability in add_donor.php of Blood Bank And Donation Management System 1.0 allows an attacker to inject malicious scripts that will be executed when the Donor List is viewed." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en add_donor.php de Blood Bank And Donation Management System 1.0 permite a un atacante inyectar secuencias de comandos maliciosas que se ejecutar\u00e1n cuando se visualice la lista de donantes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45985.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45985.json index 254283a7cbc..0f4bdf96768 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45985.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45985.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Cross Site Scripting (XSS) vulnerability in update_contact.php of Blood Bank and Donation Management System v1.0 allows an attacker to inject malicious scripts via the name parameter of the update_contact.php" + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en update_contact.php de Blood Bank and Donation Management System v1.0 permite a un atacante inyectar secuencias de comandos maliciosas a trav\u00e9s del par\u00e1metro de nombre de update_contact.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45986.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45986.json index f3b3d445ac8..aaccaab73c5 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45986.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45986.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross-Site Scripting (XSS) vulnerability was identified in Projectworld Online Voting System 1.0 that occurs when an account is registered with a malicious javascript payload. The payload is stored and subsequently executed in the voter.php and profile.php pages whenever the account information is accessed." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en Projectworld Online Voting System 1.0 que se produce cuando se registra una cuenta con un payload de JavaScript malicioso. El payload se almacena y se ejecuta posteriormente en las p\u00e1ginas voter.php y profile.php cada vez que se accede a la informaci\u00f3n de la cuenta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45987.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45987.json index 44712e4be64..de5056ff1cd 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45987.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45987.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Projectworld Online Voting System Version 1.0 is vulnerable to Cross Site Request Forgery (CSRF) via voter.php. This vulnerability allows an attacker to craft a malicious link that, when clicked by an authenticated user, automatically submits a vote for a specified party without the user's consent or knowledge. The attack leverages the user's active session to perform the unauthorized action, compromising the integrity of the voting process." + }, + { + "lang": "es", + "value": "Projectworld Online Voting System Version 1.0 es vulnerable a Cross Site Request Forgery (CSRF) a trav\u00e9s de voter.php. Esta vulnerabilidad permite a un atacante crear un v\u00ednculo malicioso que, cuando un usuario autenticado hace clic en \u00e9l, env\u00eda autom\u00e1ticamente un voto para un partido espec\u00edfico sin el consentimiento o conocimiento del usuario. El ataque aprovecha la sesi\u00f3n activa del usuario para realizar la acci\u00f3n no autorizada, lo que compromete la integridad del proceso de votaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46327.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46327.json index f79eb28bbf0..e73c83ca311 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46327.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46327.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue in the Http_handle object of VONETS VAP11G-300 v3.3.23.6.9 allows attackers to access sensitive files via a directory traversal." + }, + { + "lang": "es", + "value": "Un problema en el objeto Http_handle de VONETS VAP11G-300 v3.3.23.6.9 permite a los atacantes acceder a archivos confidenciales a trav\u00e9s de un directory traversal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46328.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46328.json index cbf227b0627..2f683ba7c9b 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46328.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46328.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "VONETS VAP11G-300 v3.3.23.6.9 was discovered to contain hardcoded credentials for several different privileged accounts, including root." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que VONETS VAP11G-300 v3.3.23.6.9 conten\u00eda credenciales codificadas para varias cuentas privilegiadas diferentes, incluida la ra\u00edz." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46329.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46329.json index c8b3cb0613c..33c31eac308 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46329.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46329.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "VONETS VAP11G-300 v3.3.23.6.9 was discovered to contain a command injection vulnerability via the SystemCommand object." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que VONETS VAP11G-300 v3.3.23.6.9 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del objeto SystemCommand." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46330.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46330.json index 5737520723e..7107ec26229 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46330.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46330.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "VONETS VAP11G-300 v3.3.23.6.9 was discovered to contain a command injection vulnerability via the iptablesWebsFilterRun object." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que VONETS VAP11G-300 v3.3.23.6.9 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del objeto iptablesWebsFilterRun." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46610.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46610.json index 902b6346f98..1f932999a3e 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46610.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46610.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-09-25T01:15:44.497", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46628.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46628.json index 4960e4c5500..1e69f79cb87 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46628.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46628.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tenda G3 Router firmware v15.03.05.05 was discovered to contain a remote code execution (RCE) vulnerability via the usbPartitionName parameter in the formSetUSBPartitionUmount function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que el firmware v15.03.05.05 del enrutador Tenda G3 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del par\u00e1metro usbPartitionName en la funci\u00f3n formSetUSBPartitionUmount." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46632.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46632.json index 8fd8c212630..df3fae829f8 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46632.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46632.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Assimp v5.4.3 is vulnerable to Buffer Overflow via the MD5Importer::LoadMD5MeshFile function." + }, + { + "lang": "es", + "value": "Assimp v5.4.3 es vulnerable al desbordamiento de b\u00fafer a trav\u00e9s de la funci\u00f3n MD5Importer::LoadMD5MeshFile." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46714.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46714.json index 3b4612c5767..8774044e61a 100644 --- a/CVE-2024/CVE-2024-467xx/CVE-2024-46714.json +++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46714.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T07:15:03.060", "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46727.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46727.json index 4f518b3f8a7..a69682af8ed 100644 --- a/CVE-2024/CVE-2024-467xx/CVE-2024-46727.json +++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46727.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T07:15:03.840", "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46730.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46730.json index 9be711e4054..df5dc5e743d 100644 --- a/CVE-2024/CVE-2024-467xx/CVE-2024-46730.json +++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46730.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T07:15:04.003", "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46744.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46744.json index 540992d0e8e..3156fb3ed5e 100644 --- a/CVE-2024/CVE-2024-467xx/CVE-2024-46744.json +++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46744.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:03.603", "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46750.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46750.json index 00be45b40b4..38c377306f2 100644 --- a/CVE-2024/CVE-2024-467xx/CVE-2024-46750.json +++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46750.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:03.947", "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46751.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46751.json index 8209edbe58f..93f60e16c22 100644 --- a/CVE-2024/CVE-2024-467xx/CVE-2024-46751.json +++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46751.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:04.010", "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46769.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46769.json index f849eb5a7da..7767d61c781 100644 --- a/CVE-2024/CVE-2024-467xx/CVE-2024-46769.json +++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46769.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:04.903", "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46997.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46997.json index 20a1db263e2..668d9b8d5d9 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46997.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46997.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-23T16:15:06.387", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47066.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47066.json index 1cf3cd46836..a1ddf3b7df9 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47066.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47066.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-23T16:15:06.670", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47068.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47068.json index 7e4e1221366..f2f50e185df 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47068.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47068.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-23T16:15:06.947", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47069.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47069.json index aa26bb45468..d74409aeff6 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47069.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47069.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-23T16:15:07.160", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47075.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47075.json index ccc951b6b90..05ac3ba17e7 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47075.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47075.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "LayUI is a native minimalist modular Web UI component library. Versions prior to 2.9.17 have a DOM Clobbering vulnerability that can lead to Cross-site Scripting (XSS) on web pages where attacker-controlled HTML elements (e.g., `img` tags with unsanitized `name` attributes) are present. Version 2.9.17 fixes this issue." + }, + { + "lang": "es", + "value": "LayUI es una librer\u00eda de componentes de interfaz de usuario web modular minimalista nativa. Las versiones anteriores a la 2.9.17 tienen una vulnerabilidad de DOM Clobbering que puede provocar Cross-Site Scripting (XSS) en p\u00e1ginas web donde hay elementos HTML controlados por el atacante (por ejemplo, etiquetas `img` con atributos `name` no saneados). La versi\u00f3n 2.9.17 corrige este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47076.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47076.json index 560c02b9268..e1d4e3c83e6 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47076.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47076.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system." + }, + { + "lang": "es", + "value": "CUPS es un sistema de impresi\u00f3n de c\u00f3digo abierto basado en est\u00e1ndares, y `libcupsfilters` contiene el c\u00f3digo de los filtros del antiguo paquete `cups-filters` como funciones de librer\u00eda que se utilizar\u00e1n para las tareas de conversi\u00f3n de formato de datos necesarias en las aplicaciones de impresora. La funci\u00f3n `cfGetPrinterAttributes5` en `libcupsfilters` no desinfecta los atributos IPP devueltos desde un servidor IPP. Cuando estos atributos IPP se utilizan, por ejemplo, para generar un archivo PPD, esto puede provocar que se proporcionen datos controlados por un atacante al resto del sistema CUPS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47078.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47078.json index 5b35b867335..d17e74b65d2 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47078.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47078.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-25T16:15:10.907", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47082.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47082.json index da22efc29e3..8823b8bad25 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47082.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47082.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-25T18:15:05.417", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47083.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47083.json index babcac6f5aa..62dffa2cc3a 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47083.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47083.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-25T22:15:03.273", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47121.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47121.json index e25604f0b06..9fb2a84df1e 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47121.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47121.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna Pro series uses a weak password for the QR broadcast message. If the QR broadcast message is captured over RF it is possible to decrypt it and use it to decrypt all future and past messages sent via encrypted broadcast." + }, + { + "lang": "es", + "value": "La serie goTenna Pro utiliza una contrase\u00f1a d\u00e9bil para el mensaje de transmisi\u00f3n QR. Si el mensaje de transmisi\u00f3n QR se captura mediante RF, es posible descifrarlo y utilizarlo para descifrar todos los mensajes futuros y pasados enviados mediante transmisi\u00f3n cifrada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47122.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47122.json index 1299e89e343..5f7bff49c13 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47122.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47122.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the goTenna Pro application, the encryption keys are stored along with a static IV on the device. This allows for complete decryption of keys stored on the device. This allows an attacker to decrypt all encrypted communications that include P2P, Group, and broadcast messages that use these keys." + }, + { + "lang": "es", + "value": "En la aplicaci\u00f3n goTenna Pro, las claves de cifrado se almacenan junto con un IV est\u00e1tico en el dispositivo. Esto permite el descifrado completo de las claves almacenadas en el dispositivo. Esto permite que un atacante descifre todas las comunicaciones cifradas que incluyen mensajes P2P, grupales y de difusi\u00f3n que utilizan estas claves." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47123.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47123.json index fe7adff49e5..53ddad49493 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47123.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47123.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna Pro series use AES CTR mode for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to any attacker that can access the message." + }, + { + "lang": "es", + "value": "La serie goTenna Pro utiliza el modo AES CTR para mensajes breves y cifrados sin ning\u00fan mecanismo de comprobaci\u00f3n de integridad adicional. Esto permite que los mensajes sean manipulables para cualquier atacante que pueda acceder a ellos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47124.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47124.json index 49850b708ba..de72885b616 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47124.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47124.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna pro series does not encrypt the callsigns of its users. These callsigns reveal information about the users and can also be leveraged for other vulnerabilities." + }, + { + "lang": "es", + "value": "La serie goTenna Pro no cifra los indicativos de sus usuarios. Estos indicativos revelan informaci\u00f3n sobre los usuarios y tambi\u00e9n pueden aprovecharse para otras vulnerabilidades." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47125.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47125.json index c579975c6c1..c48721f7c66 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47125.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47125.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna Pro series does not authenticate public keys which allows an unauthenticated attacker to intercept and manipulate messages." + }, + { + "lang": "es", + "value": "La serie goTenna Pro no autentica claves p\u00fablicas, lo que permite que un atacante no autenticado intercepte y manipule mensajes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47126.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47126.json index 7694be5d7d7..72f5cd0ab80 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47126.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47126.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna Pro series does not use SecureRandom when generating its cryptographic keys. The random function in use is not suitable for cryptographic use." + }, + { + "lang": "es", + "value": "La serie goTenna Pro no utiliza SecureRandom al generar sus claves criptogr\u00e1ficas. La funci\u00f3n aleatoria que se utiliza no es adecuada para el uso criptogr\u00e1fico." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47127.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47127.json index 0799de2a569..9584a4f7f1f 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47127.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47127.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the goTenna Pro there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing gotenna mesh networks. This vulnerability can be exploited if the device is being used in a unencrypted environment or if the cryptography has already been compromised." + }, + { + "lang": "es", + "value": "En goTenna Pro existe una vulnerabilidad que permite inyectar cualquier mensaje personalizado con cualquier GID y Callsign utilizando una radio definida por software en redes en malla de GoTenna existentes. Esta vulnerabilidad puede explotarse si el dispositivo se utiliza en un entorno no cifrado o si la criptograf\u00eda ya se ha visto comprometida." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47128.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47128.json index 14d66db9cb9..89c9f08f3d4 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47128.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47128.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna Pro broadcast key name is always sent unencrypted and could reveal the location of operation." + }, + { + "lang": "es", + "value": "El nombre de la clave de transmisi\u00f3n de goTenna Pro siempre se env\u00eda sin cifrar y podr\u00eda revelar la ubicaci\u00f3n de la operaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47129.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47129.json index 3a772ca4b77..fd875600a42 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47129.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47129.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna Pro has a payload length vulnerability that makes it possible to tell the length of the payload regardless of the encryption used." + }, + { + "lang": "es", + "value": "goTenna Pro tiene una vulnerabilidad de longitud de payload que permite saber la longitud de el payload independientemente del cifrado utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47130.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47130.json index 16f1eb31c9f..7a7852f5e8c 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47130.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47130.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The goTenna Pro series allows unauthenticated attackers to remotely update the local public keys used for P2P and Group messages." + }, + { + "lang": "es", + "value": "La serie goTenna Pro permite a atacantes no autenticados actualizar de forma remota las claves p\u00fablicas locales utilizadas para mensajes P2P y grupales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47169.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47169.json index b5f41019f18..113e63bb825 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47169.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47169.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload arbitrary files to attacker-chosen locations on the server, including JavaScript, enabling the execution of commands within those files. This issue could result in unauthorized access, full server compromise, data leakage, and other critical security threats. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. This does affect publicly hosted installs without S3-compatible storage. Version 1.0.330 fixes this vulnerability." + }, + { + "lang": "es", + "value": "Agnai es un sistema de chat multiusuario y multibot que juega roles y que no depende de la inteligencia artificial. Una vulnerabilidad en las versiones anteriores a la 1.0.330 permite a los atacantes cargar archivos arbitrarios en las ubicaciones elegidas por el atacante en el servidor, incluido JavaScript, lo que permite la ejecuci\u00f3n de comandos dentro de esos archivos. Este problema podr\u00eda provocar acceso no autorizado, compromiso total del servidor, fuga de datos y otras amenazas de seguridad cr\u00edticas. Esto no afecta a `agnai.chat`, instalaciones que utilizan almacenamiento compatible con S3 o alojamiento propio que no est\u00e1 expuesto p\u00fablicamente. Esto s\u00ed afecta a las instalaciones alojadas p\u00fablicamente sin almacenamiento compatible con S3. La versi\u00f3n 1.0.330 corrige esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47170.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47170.json index 76ef1972f4c..c1da85b32d3 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47170.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47170.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to read arbitrary JSON files at attacker-chosen locations on the server. This issue can lead to unauthorized access to sensitive information and exposure of confidential configuration files. This only affects installations with `JSON_STORAGE` enabled which is intended to local/self-hosting only. Version 1.0.330 fixes this issue." + }, + { + "lang": "es", + "value": "Agnai es un sistema de chat multiusuario y multibot que funciona con inteligencia artificial y es independiente de la misma. Una vulnerabilidad en las versiones anteriores a la 1.0.330 permite a los atacantes leer archivos JSON arbitrarios en ubicaciones elegidas por el atacante en el servidor. Este problema puede provocar acceso no autorizado a informaci\u00f3n confidencial y la exposici\u00f3n de archivos de configuraci\u00f3n confidenciales. Esto solo afecta a las instalaciones con `JSON_STORAGE` habilitado, que est\u00e1 destinado \u00fanicamente al alojamiento local o propio. La versi\u00f3n 1.0.330 soluciona este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47171.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47171.json index 1fa6d60889f..5f18376b4ca 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47171.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47171.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload image files at attacker-chosen location on the server. This issue can lead to image file uploads to unauthorized or unintended directories, including overwriting of existing images which may be used for defacement. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. Version 1.0.330 fixes this vulnerability." + }, + { + "lang": "es", + "value": "Agnai es un sistema de chat multiusuario y multibot que no depende de la inteligencia artificial. Una vulnerabilidad en las versiones anteriores a la 1.0.330 permite a los atacantes cargar archivos de imagen en la ubicaci\u00f3n elegida por el atacante en el servidor. Este problema puede provocar que se carguen archivos de imagen en directorios no autorizados o no deseados, incluida la sobrescritura de im\u00e1genes existentes que pueden usarse para desfigurar el sistema. Esto no afecta a `agnai.chat`, a las instalaciones que usan almacenamiento compatible con S3 o al alojamiento propio que no est\u00e1 expuesto p\u00fablicamente. La versi\u00f3n 1.0.330 corrige esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47174.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47174.json index c5a68763610..afddfce0a49 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47174.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47174.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Nix is a package manager for Linux and other Unix systems. Starting in version 1.11 and prior to versions 2.18.8 and 2.24.8, `` did not verify TLS certificates on HTTPS connections. This could lead to connection details such as full URLs or credentials leaking in case of a man-in-the-middle (MITM) attack. `` is also known as the builtin derivation builder `builtin:fetchurl`. It's not to be confused with the evaluation-time function `builtins.fetchurl`, which was not affected by this issue. A user may be affected by the risk of leaking credentials if they have a `netrc` file for authentication, or rely on derivations with `impureEnvVars` set to use credentials from the environment. In addition, the commonplace trust-on-first-use (TOFU) technique of updating dependencies by specifying an invalid hash and obtaining it from a remote store was also vulnerable to a MITM injecting arbitrary store objects. This also applied to the impure derivations experimental feature. Note that this may also happen when using Nixpkgs fetchers to obtain new hashes when not using the fake hash method, although that mechanism is not implemented in Nix itself but rather in Nixpkgs using a fixed-output derivation. The behavior was introduced in version 1.11 to make it consistent with the Nixpkgs `pkgs.fetchurl` and to make `` work in the derivation builder sandbox, which back then did not have access to the CA bundles by default. Nowadays, CA bundles are bind-mounted on Linux. This issue has been fixed in Nix 2.18.8 and 2.24.8. As a workaround, implement (authenticated) fetching with `pkgs.fetchurl` from Nixpkgs, using `impureEnvVars` and `curlOpts` as needed." + }, + { + "lang": "es", + "value": "Nix es un administrador de paquetes para Linux y otros sistemas Unix. A partir de la versi\u00f3n 1.11 y antes de las versiones 2.18.8 y 2.24.8, `` no verificaba los certificados TLS en las conexiones HTTPS. Esto podr\u00eda provocar que se filtraran detalles de la conexi\u00f3n, como URL completas o credenciales, en caso de un ataque de intermediario (MITM). `` tambi\u00e9n se conoce como el generador de derivaciones integrado `builtin:fetchurl`. No debe confundirse con la funci\u00f3n de tiempo de evaluaci\u00f3n `builtins.fetchurl`, que no se vio afectada por este problema. Un usuario puede verse afectado por el riesgo de filtrar credenciales si tiene un archivo `netrc` para la autenticaci\u00f3n o conf\u00eda en derivaciones con `impureEnvVars` configuradas para usar credenciales del entorno. Adem\u00e1s, la t\u00e9cnica com\u00fan de confianza en el primer uso (TOFU) de actualizar dependencias especificando un hash no v\u00e1lido y obteni\u00e9ndolo de un almac\u00e9n remoto tambi\u00e9n era vulnerable a un MITM que inyectara objetos de almac\u00e9n arbitrarios. Esto tambi\u00e9n se aplicaba a la caracter\u00edstica experimental de derivaciones impuras. Tenga en cuenta que esto tambi\u00e9n puede suceder cuando se utilizan los recuperadores de Nixpkgs para obtener nuevos hashes cuando no se utiliza el m\u00e9todo de hash falso, aunque ese mecanismo no est\u00e1 implementado en Nix en s\u00ed, sino en Nixpkgs que utiliza una derivaci\u00f3n de salida fija. El comportamiento se introdujo en la versi\u00f3n 1.11 para que fuera coherente con el `pkgs.fetchurl` de Nixpkgs y para que `` funcionara en el entorno limitado del generador de derivaciones, que en ese entonces no ten\u00eda acceso a los paquetes de CA de forma predeterminada. Hoy en d\u00eda, los paquetes de CA se montan mediante enlaces en Linux. Este problema se ha solucionado en Nix 2.18.8 y 2.24.8. Como workaround, implemente la obtenci\u00f3n (autenticada) con `pkgs.fetchurl` desde Nixpkgs, usando `impureEnvVars` y `curlOpts` seg\u00fan sea necesario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47175.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47175.json index 0d3e91caa7e..cc13e59accf 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47175.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47175.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176." + }, + { + "lang": "es", + "value": "CUPS es un sistema de impresi\u00f3n de c\u00f3digo abierto basado en est\u00e1ndares, y `libppd` se puede utilizar para la compatibilidad con archivos PPD heredados. La funci\u00f3n `libppd` `ppdCreatePPDFromIPP2` no desinfecta los atributos IPP al crear el b\u00fafer PPD. Cuando se utiliza en combinaci\u00f3n con otras funciones como `cfGetPrinterAttributes5`, puede dar lugar a una entrada controlada por el usuario y, en \u00faltima instancia, a la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de Foomatic. Esta vulnerabilidad puede ser parte de una cadena de explotaci\u00f3n que conduce a la ejecuci\u00f3n remota de c\u00f3digo (RCE), como se describe en CVE-2024-47176." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47176.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47176.json index 8f0ab92e9df..32ec46762d0 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47176.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47176.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL.\n\nDue to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled." + }, + { + "lang": "es", + "value": "CUPS es un sistema de impresi\u00f3n de c\u00f3digo abierto basado en est\u00e1ndares, y `cups-browsed` contiene funcionalidades de impresi\u00f3n en red que incluyen, entre otras, servicios de impresi\u00f3n de detecci\u00f3n autom\u00e1tica e impresoras compartidas. `cups-browsed` se vincula a `INADDR_ANY:631`, lo que hace que conf\u00ede en cualquier paquete de cualquier origen, y puede provocar la solicitud IPP `Get-Printer-Attributes` a una URL controlada por el atacante. Debido a la vinculaci\u00f3n del servicio a `*:631 ( INADDR_ANY )`, se pueden explotar varios errores en `cups-browsed` en secuencia para introducir una impresora maliciosa en el sistema. Esta cadena de exploits finalmente permite a un atacante ejecutar comandos arbitrarios de forma remota en la m\u00e1quina de destino sin autenticaci\u00f3n cuando se inicia un trabajo de impresi\u00f3n. Esto plantea un riesgo de seguridad significativo en la red. Cabe destacar que esta vulnerabilidad es particularmente preocupante ya que se puede explotar desde Internet p\u00fablico, lo que potencialmente expone una gran cantidad de sistemas a ataques remotos si sus servicios CUPS est\u00e1n habilitados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47177.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47177.json index 813d81a1142..8fb4894b79e 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47177.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47177.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE_2024-47176, this can lead to remote command execution." + }, + { + "lang": "es", + "value": "CUPS es un sistema de impresi\u00f3n de c\u00f3digo abierto basado en est\u00e1ndares, y cups-filters proporciona backends, filtros y otro software para que CUPS 2.x se utilice en sistemas que no sean Mac OS. Cualquier valor que se pase a `FoomaticRIPCommandLine` a trav\u00e9s de un archivo PPD se ejecutar\u00e1 como un comando controlado por el usuario. Cuando se combina con otros errores l\u00f3gicos como los descritos en CVE_2024-47176, esto puede provocar la ejecuci\u00f3n remota de comandos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47179.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47179.json index 417dbc318f5..82d8885e7dd 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47179.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47179.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "RSSHub is an RSS network. Prior to commit 64e00e7, RSSHub's `docker-test-cont.yml` workflow is vulnerable to Artifact Poisoning, which could have lead to a full repository takeover. Downstream users of RSSHub are not vulnerable to this issue, and commit 64e00e7 fixed the underlying issue and made the repository no longer vulnerable. The `docker-test-cont.yml` workflow gets triggered when the `PR - Docker build test` workflow completes successfully. It then collects some information about the Pull Request that triggered the triggering workflow and set some labels depending on the PR body and sender. If the PR also contains a `routes` markdown block, it will set the `TEST_CONTINUE` environment variable to `true`. The workflow then downloads and extracts an artifact uploaded by the triggering workflow which is expected to contain a single `rsshub.tar.zst` file. However, prior to commit 64e00e7, it did not validate and the contents were extracted in the root of the workspace overriding any existing files. Since the contents of the artifact were not validated, it is possible for a malicious actor to send a Pull Request which uploads, not just the `rsshub.tar.zst` compressed docker image, but also a malicious `package.json` file with a script to run arbitrary code in the context of the privileged workflow. As of commit 64e00e7, this scenario has been addressed and the RSSHub repository is no longer vulnerable." + }, + { + "lang": "es", + "value": "RSSHub es una red RSS. Antes de el commit 64e00e7, el flujo de trabajo `docker-test-cont.yml` de RSSHub era vulnerable al envenenamiento de artefactos, lo que podr\u00eda haber llevado a una toma de control total del repositorio. Los usuarios posteriores de RSSHub no son vulnerables a este problema y el commit 64e00e7 solucion\u00f3 el problema subyacente e hizo que el repositorio ya no fuera vulnerable. El flujo de trabajo `docker-test-cont.yml` se activa cuando el flujo de trabajo `PR - Docker build test` se completa correctamente. Luego, recopila informaci\u00f3n sobre la solicitud de extracci\u00f3n que activ\u00f3 el flujo de trabajo desencadenante y establece algunas etiquetas seg\u00fan el cuerpo de la solicitud de extracci\u00f3n y el remitente. Si la solicitud de extracci\u00f3n tambi\u00e9n contiene un bloque de rebajas `routes`, establecer\u00e1 la variable de entorno `TEST_CONTINUE` en `true`. Luego, el flujo de trabajo descarga y extrae un artefacto cargado por el flujo de trabajo desencadenante que se espera que contenga un solo archivo `rsshub.tar.zst`. Sin embargo, antes de el commit 64e00e7, no se valid\u00f3 y el contenido se extrajo en la ra\u00edz del espacio de trabajo anulando cualquier archivo existente. Dado que el contenido del artefacto no se valid\u00f3, es posible que un actor malintencionado env\u00ede una solicitud de extracci\u00f3n que cargue, no solo la imagen de Docker comprimida `rsshub.tar.zst`, sino tambi\u00e9n un archivo `package.json` malicioso con un script para ejecutar c\u00f3digo arbitrario en el contexto del flujo de trabajo privilegiado. A partir de el commit 64e00e7, se ha abordado este escenario y el repositorio RSSHub ya no es vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47180.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47180.json index 3e5e09ffd47..c1aeb8ab867 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47180.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47180.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Shields.io is a service for concise, consistent, and legible badges in SVG and raster format. Shields.io and users self-hosting their own instance of shields using version < `server-2024-09-25` are vulnerable to a remote execution vulnerability via the JSONPath library used by the Dynamic JSON/Toml/Yaml badges. This vulnerability would allow any user with access to make a request to a URL on the instance to the ability to execute code by crafting a malicious JSONPath expression. All users who self-host an instance are vulnerable. This problem was fixed in server-2024-09-25. Those who follow the tagged releases should update to `server-2024-09-25` or later. Those who follow the rolling tag on DockerHub, `docker pull shieldsio/shields:next` to update to the latest version. As a workaround, blocking access to the endpoints `/badge/dynamic/json`, `/badge/dynamic/toml`, and `/badge/dynamic/yaml` (e.g: via a firewall or reverse proxy in front of your instance) would prevent the exploitable endpoints from being accessed." + }, + { + "lang": "es", + "value": "Shields.io es un servicio para insignias concisas, consistentes y legibles en formato SVG y raster. Shields.io y los usuarios que alojan por s\u00ed mismos su propia instancia de escudos usando la versi\u00f3n < `server-2024-09-25` son vulnerables a una vulnerabilidad de ejecuci\u00f3n remota a trav\u00e9s de la librer\u00eda JSONPath utilizada por las insignias Dynamic JSON/Toml/Yaml. Esta vulnerabilidad permitir\u00eda a cualquier usuario con acceso hacer una solicitud a una URL en la instancia con la capacidad de ejecutar c\u00f3digo mediante la creaci\u00f3n de una expresi\u00f3n JSONPath maliciosa. Todos los usuarios que alojan por s\u00ed mismos una instancia son vulnerables. Este problema se solucion\u00f3 en server-2024-09-25. Aquellos que siguen las versiones etiquetadas deben actualizar a `server-2024-09-25` o posterior. Aquellos que siguen la etiqueta continua en DockerHub, `docker pull shieldsio/shields:next` para actualizar a la \u00faltima versi\u00f3n. Como workaround, bloquear el acceso a los endpoints `/badge/dynamic/json`, `/badge/dynamic/toml` y `/badge/dynamic/yaml` (por ejemplo: a trav\u00e9s de un firewall o proxy inverso frente a su instancia) evitar\u00eda que se acceda a los endpoints explotables." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47221.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47221.json index 41fe90aeed0..6cc2273b01f 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47221.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47221.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47221", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-22T01:15:12.013", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-29T00:45:21.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "CheckUser en ScadaServerEngine/MainLogic.cs en Rapid SCADA hasta 5.8.4 permite una contrase\u00f1a vac\u00eda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rapidscada:rapid_scada:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.8.4", + "matchCriteriaId": "280A83B5-F3B4-4BA0-A112-A5FC00D74091" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/RapidScada/scada/commit/b14cbdfa6cf3a205e57f2383c915365adc3859a7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47222.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47222.json index e742f83a2b2..4f22cb007ca 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47222.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47222.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-09-23T20:15:05.493", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5798.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5798.json index bb310164415..ff719a51399 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5798.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5798.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@hashicorp.com", "published": "2024-06-12T19:15:51.413", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6512.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6512.json index aa599b9c01e..fcfdc94f3f3 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6512.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6512.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@devolutions.net", "published": "2024-09-25T14:15:05.560", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6544.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6544.json index 2b9ba53a675..4eec1545054 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6544.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6544.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-13T15:15:16.300", "lastModified": "2024-09-13T16:37:22.997", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6590.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6590.json index 712fe65d5c6..5c14432ff23 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6590.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6590.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:02.830", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6592.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6592.json index 848090c2dcd..7aa6425b071 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6592.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6592.json @@ -3,7 +3,7 @@ "sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "published": "2024-09-25T12:15:05.027", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6593.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6593.json index 757eb8b2d3b..5a31b093b21 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6593.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6593.json @@ -3,7 +3,7 @@ "sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "published": "2024-09-25T12:15:05.217", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6594.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6594.json index d43f3087ac0..4abc71f4e3d 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6594.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6594.json @@ -3,7 +3,7 @@ "sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "published": "2024-09-25T12:15:05.397", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6596.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6596.json index b7fc288d100..f300b2f7317 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6596.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6596.json @@ -3,7 +3,7 @@ "sourceIdentifier": "info@cert.vde.com", "published": "2024-09-10T08:15:03.350", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6654.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6654.json index 0e6a8e3ff50..ad3aac0c68a 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6654.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6654.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Products for macOS enables a\u00a0user logged on to the system to perform a denial-of-service attack, which could be misused to disable the protection of the ESET security product and cause general system slow-down." + }, + { + "lang": "es", + "value": "Los productos para macOS permiten que un usuario conectado al sistema realice un ataque de denegaci\u00f3n de servicio, que podr\u00eda usarse indebidamente para deshabilitar la protecci\u00f3n del producto de seguridad de ESET y provocar una ralentizaci\u00f3n general del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6769.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6769.json index 8cf045f8098..2e1456a3872 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6769.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6769.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A DLL Hijacking caused by drive remapping combined with a poisoning of the activation cache in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated attacker to elevate from a medium integrity process to a high integrity process without the intervention of a UAC prompt." + }, + { + "lang": "es", + "value": "Un secuestro de DLL causado por la reasignaci\u00f3n de unidades combinado con un envenenamiento del cach\u00e9 de activaci\u00f3n en Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019 y Windows Server 2022 permite que un atacante autenticado malintencionado pase de un proceso de integridad media a un proceso de integridad alta sin la intervenci\u00f3n de un mensaje de UAC." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6786.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6786.json index e85af54f669..0b95a39140c 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6786.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6786.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@moxa.com", "published": "2024-09-21T05:15:12.397", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6787.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6787.json index de7f09b3581..94fd37e093a 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6787.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6787.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@moxa.com", "published": "2024-09-21T05:15:12.607", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json index e8d733d586e..b13bda42a25 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-cna@github.com", "published": "2024-08-20T20:15:09.910", "lastModified": "2024-08-22T15:15:17.127", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6936.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6936.json index 068110ffe7a..0c86207ccd3 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6936.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6936.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-21T04:15:02.007", "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6937.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6937.json index c8f7ec133d3..0569a93bcfb 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6937.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6937.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-21T04:15:02.447", "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7011.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7011.json index 223d8a86d9f..b81410941fe 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7011.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7011.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Sharp NEC Projectors (NP-CB4500UL, NP-CB4500WL, NP-CB4700UL, NP-P525UL, NP-P525UL+, NP-P525ULG, NP-P525ULJL, NP-P525WL, NP-P525WL+, NP-P525WLG, NP-P525WLJL, NP-CG6500UL, NP-CG6500WL, NP-CG6700UL, NP-P605UL, NP-P605UL+, NP-P605ULG, NP-P605ULJL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC332WJL, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME372WJL, NP-ME382U, NP-ME382UG, NP-ME382UJL, NP-ME402X, NP-ME402XG, NP-ME402XJL, NP-CB4500XL, NP-CG6400UL, NP-CG6400WL, NP-CG6500XL, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CB4600U, NP-CF6600U, NP-P474U, NP-P554U, NP-P554U+, NP-P554UG, NP-P554UJL, NP-CG6600UL, NP-P547UL, NP-P547ULG, NP-P547ULJL, NP-P607UL+, NP-P627UL, NP-P627UL+, NP-P627ULG, NP-P627ULJL, NP-PV710UL-B, NP-PV710UL-B1, NP-PV710UL-W, NP-PV710UL-W+, NP-PV710UL-W1, NP-PV730UL-BJL, NP-PV730UL-WJL, NP-PV800UL-B, NP-PV800UL-B+, NP-PV800UL-B1, NP-PV800UL-BJL, NP-PV800UL-W, NP-PV800UL-W+, NP-PV800UL-W1, NP-PV800UL-WJL, NP-CA4200X, NP-CA4265X, NP-CA4300U, NP-CA4300W, NP-CA4305X, NP-CA4400X, NP-CD2125X, NP-CD2200W, NP-CD2300U, NP-CD2310X, NP-CR2105X, NP-CR2200X, NP-CR2205W, NP-CR2300U, NP-CR2300W, NP-CR2315X, NP-CR2400X, NP-MC333XG, NP-MC363XG, NP-MC393WJL, NP-MC423W, NP-MC423WG, NP-MC453X, NP-MC453X, NP-MC453XG, NP-MC453XJL, NP-ME383WG, NP-ME403U, NP-ME403UG, NP-ME403UJL, NP-ME423W, NP-ME423WG, NP-ME423WJL, NP-ME453X, NP-ME453XG, NP-CB4400USL, NP-CB4400WSL, NP-CB4510UL, NP-CB4510WL, NP-CB4510XL, NP-CB4550USL, NP-CB6700UL, NP-CG6510UL, NP-PE456USL, NP-PE456USLG, NP-PE456USLJL, NP-PE456WSLG, NP-PE506UL, NP-PE506ULG, NP-PE506ULJL, NP-PE506WL, NP-PE506WLG, NP-PE506WLJL) allows an attacker to cause a denial-of-service (DoS) condition via SNMP service." + }, + { + "lang": "es", + "value": "Proyectores Sharp NEC (NP-CB4500UL, NP-CB4500WL, NP-CB4700UL, NP-P525UL, NP-P525UL+, NP-P525ULG, NP-P525ULJL, NP-P525WL, NP-P525WL+, NP-P525WLG, NP-P525WLJL, NP-CG6500UL, NP-CG6500WL, NP-CG6700UL, NP-P605UL, NP-P605UL+, NP-P605ULG, NP-P605ULJL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC332WJL, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME372WJL, NP-ME382U, NP-ME382UG, NP-ME382UJL, NP-ME402X, NP-ME402XG, NP-ME402XJL, NP-CB4500XL, NP-CG6400UL, 400WL, NP-CG6500XL, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CB4600U, NP-CF6600U, NP-P474U, NP-P554U, NP-P554U+, NP-P554UG, NP-P554UJL, NP-CG6600UL, NP-P547UL, NP-P547ULG, NP-P547ULJL, NP-P607UL+, NP-P627UL, NP-P627UL+, NP-P627ULG, NP-P627ULJL, NP-PV710UL-B, B1, NP-PV710UL-W, NP-PV710UL-W+, NP-PV710UL-W1, NP-PV730UL-BJL, NP-PV730UL-WJL, NP-PV800UL-B, NP-PV800UL-B+, NP-PV800UL-B1, NP-PV800UL-BJL, NP-PV800UL-W, NP-PV800UL-W+, NP-PV800UL-W1, NP-PV800UL-WJL, NP-CA4200X, NP-CA4265X, NP-CA4300U, NP-CA4300W, NP-CA4305X, NP-CA4400X, NP-CD2125X, NP-CD2200W, NP-CD2300U, NP-CD2310X, NP-CR2105X, NP-CR2200X, NP-CR2205W, NP-CR2300U, NP-CR2300W, NP-CR2315X, NP-CR2400X, NP-MC333XG, NP-MC363XG, NP-MC393WJL, NP-MC423W, NP-MC423WG, NP-MC453X, NP-MC453X, NP-MC453XG, NP-MC453XJL, NP-ME383WG, NP-ME403U, NP-ME403UG, NP-ME403UJL, NP-ME423W, NP-ME423WG, NP-ME423WJL, NP-ME453X, NP-ME453XG, NP-CB4400USL, NP-CB4400WSL, NP-CB4510UL, NP-CB4510WL, NP-CB4510XL, NP-CB4550USL, NP-CB6700UL, NP-CG6510UL, NP-PE456USL, NP-PE456USLG, NP-PE456USLJL, NP-PE456WSLG, NP-PE506UL, NP-PE506ULG, NP-PE506ULJL, NP-PE506WL, NP-PE506WLG, NP-PE506WLJL) permite a un atacante provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) a trav\u00e9s del servicio SNMP." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7107.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7107.json index 4f21a2689df..d8eb4453708 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7107.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7107.json @@ -3,12 +3,16 @@ "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-09-26T12:15:03.957", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Files or Directories Accessible to External Parties vulnerability in National Keep Cyber Security Services CyberMath allows Collect Data from Common Resource Locations.This issue affects CyberMath: before CYBM.240816253." + }, + { + "lang": "es", + "value": "Vulnerabilidad de archivos o directorios accesibles a partes externas en National Keep Cyber Security Services CyberMath permite recopilar datos de ubicaciones de recursos comunes. Este problema afecta a CyberMath: anteriores a CYBM.240816253." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7108.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7108.json index 1590deb7ee0..2f5f2b98d19 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7108.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7108.json @@ -3,12 +3,16 @@ "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-09-26T12:15:04.193", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Authorization vulnerability in National Keep Cyber Security Services CyberMath allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects CyberMath: before CYBM.240816253." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n incorrecta en National Keep Cyber Security Services CyberMath permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a CyberMath: anteriores a CYBM.240816253." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7259.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7259.json index f95251d5cff..36079dbcb18 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7259.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7259.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in oVirt. A user with administrator privileges, including users with the ReadOnlyAdmin permission, may be able to use browser developer tools to view Provider passwords in cleartext." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en oVirt. Un usuario con privilegios de administrador, incluidos los usuarios con el permiso ReadOnlyAdmin, puede usar las herramientas para desarrolladores del navegador para ver las contrase\u00f1as del proveedor en texto plano." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7386.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7386.json index c243a444fa3..e400dfef4cb 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7386.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7386.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:03.040", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7398.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7398.json index c65b86d4f7f..bcc00e45ffe 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7398.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7398.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-09-25T01:15:45.403", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7400.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7400.json index 70a10be9fb0..b860fd45d9d 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7400.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7400.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The vulnerability potentially allowed an attacker to misuse ESET\u2019s file operations during the removal of a detected file on the Windows operating system to delete files without having proper permissions to do so." + }, + { + "lang": "es", + "value": "La vulnerabilidad potencialmente permiti\u00f3 a un atacante hacer un mal uso de las operaciones de archivos de ESET durante la eliminaci\u00f3n de un archivo detectado en el sistema operativo Windows para eliminar archivos sin tener los permisos adecuados para hacerlo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7415.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7415.json index 5f8ce595414..fb57128459b 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7415.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7415.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-06T04:15:05.137", "lastModified": "2024-09-06T12:08:04.550", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7421.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7421.json index 82f565ed1e8..c935145599c 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7421.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7421.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@devolutions.net", "published": "2024-09-25T16:15:11.187", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7426.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7426.json index 42793e0eebb..a7ffc89c83a 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7426.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7426.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:03.230", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7491.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7491.json index 6a7a01401a8..8a6c5923ed9 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7491.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7491.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:03.417", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7575.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7575.json index dcaf017b90e..be283527e4f 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7575.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7575.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@progress.com", "published": "2024-09-25T14:15:05.750", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7576.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7576.json index bdebf8d85ba..eeba2f4989a 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7576.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7576.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@progress.com", "published": "2024-09-25T14:15:05.970", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7594.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7594.json index c040bae7d66..89478e526c5 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7594.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7594.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Vault\u2019s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault\u2019s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15." + }, + { + "lang": "es", + "value": "El motor de secretos SSH de Vault no requer\u00eda que la lista valid_principals contuviera un valor de manera predeterminada. Si los campos valid_principals y default_user de la configuraci\u00f3n del motor de secretos SSH no est\u00e1n configurados, un certificado SSH solicitado por un usuario autorizado al motor de secretos SSH de Vault podr\u00eda usarse para autenticarse como cualquier usuario en el host. Se corrigi\u00f3 en Vault Community Edition 1.17.6 y en Vault Enterprise 1.17.6, 1.16.10 y 1.15.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7679.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7679.json index 4daa8678585..09dca86bb5b 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7679.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7679.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@progress.com", "published": "2024-09-25T14:15:06.180", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7713.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7713.json index 311a07ddb47..59de7739438 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7713.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7713.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The AI ChatBot with ChatGPT and Content Generator by AYS WordPress plugin before 2.1.0 discloses the Open AI API Key, allowing unauthenticated users to obtain it" + }, + { + "lang": "es", + "value": "El complemento AI ChatBot con ChatGPT y Content Generator de AYS para WordPress anterior a la versi\u00f3n 2.1.0 revela la clave API de Open AI, lo que permite que los usuarios no autenticados la obtengan" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7734.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7734.json index 7266e20f3cd..8a0d72e106c 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7734.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7734.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7734", "sourceIdentifier": "info@cert.vde.com", "published": "2024-09-10T08:15:04.020", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-28T23:56:32.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,1024 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "CD02CC05-860D-442A-B973-643B51E13613" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D624EC2-7CEE-4ADC-A1D2-B0688AE23873" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "0702823F-52B6-40D3-B598-AA6F8745DB85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0910CB6C-8716-4A79-B43C-EB02B22AB632" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "FDEE0407-9473-4810-BC8D-F9AC44C69219" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA0DA3D1-0599-4364-AF1A-2DAD50382A15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "053DB989-17D5-49E1-BF0A-814F80D0FF62" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8861227-5A7F-49CA-B0E6-5806C746B5B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "6DB61681-FE91-4EA7-A431-446579A511C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FD37990-FF75-4323-A8B1-7BEF9A0001D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "234CD8A4-BA72-47A5-8BAF-B449315A2202" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56CE797B-2D4B-41CC-888E-467F64BDB19C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "428076C7-97EC-47C9-B409-C1C9379A6E29" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_att_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40F4219D-1822-471E-88C0-7B6F5FB56A00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "0D64F7DC-B719-46CF-8D6D-0E9CE24E5F31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F287F24-13AD-4628-B724-E58A9F44E48B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "74CBDC4F-31FE-430A-BD2B-95985E2B8959" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_smart2_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37A2DC0B-6B50-4E38-9585-B131DBCB9F51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "1E3AAE8C-4A1C-4DA7-B710-F1458E9E472E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_smart2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50690731-FA99-45B3-AF4C-C1DAD881CAEE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "FF284D31-EA9B-48F3-A261-78672D3A8BF3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E62C758-015E-4178-BA37-D463F95BD468" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "5E7D20EC-CBAA-48C2-91A9-7964A64C5F51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA35CCC1-2FE0-4FA7-A360-C2F9849476B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "EC86EA88-023D-477B-9138-6F16DC173EB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1726B1D9-3CAF-4C11-BB25-C7677B2CEE33" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "CADDBA01-FB75-4B02-B100-28E7BE105C80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F88246FF-5453-4473-992B-AEEFE88ED41D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "732BF960-A8C6-4BF3-B58E-A142D1349560" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A87B204-19D0-4E12-B462-EB4BB25D196E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "9BA76759-0346-4978-B865-4C11D733A381" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EEEC9DE-5CF5-4596-B64C-6CAA32110FA1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "4DDAE7BE-54B1-472F-80D6-A5B3BC4F9035" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9887CEB-57EA-49A0-9CFD-910DAFE4A09D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "7F1794B6-B631-488C-B7DC-7D3E79C0D9CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3051DBA5-8D2B-4630-8FA7-602AC7CB4576" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "ABBD929B-2E97-48F6-835E-9B217C846DE8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "428D6C77-0592-4031-933E-2CFE0AB58BA7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "DD719D49-5D66-4E3F-896C-97D0BCF0C2C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A698B47-3DF4-4FAB-9AA6-425FF823F303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "B4A8A58D-90BC-4E6B-9CAD-7B8A72ACE990" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADB6EF67-BB61-4661-977B-A4968641E9BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "D8775CE8-282C-498C-9EA2-542338025F1B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_pci4000_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FFEEEAD-22B2-49FC-8B2B-583D9DFFB291" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "2B608EB3-6BA1-4D4F-B3E4-31B984CD0B0F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_pci4000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24EB7394-6BE3-44F4-A184-BA438200F532" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "72335756-555D-413F-955B-02F57C6B8C01" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C3B0286-BD27-4032-B4FF-0A7481356039" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "6CF8B1A6-81B0-4A50-A340-2BA68922F614" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12FBC961-F834-4334-948A-9FC9E613301D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "EAC710BB-60A5-4F43-AEF3-4BFCA13846F5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA9CB765-BEE4-4318-ADBD-EE241CA9FA31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "E28ED34B-2510-48B6-A2A8-55EB0937ABCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FBF005C-9157-49E2-820F-C75B3828EDA1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "050BE7DC-F22E-4022-A113-8A951170617A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_core_tx_vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "577E14AD-C198-4E8B-AC31-FF89F3EB97C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "A091DE68-F0CE-480D-BD5E-90BD582ED1AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_core_tx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B549B2C1-42A9-4D05-B32D-6E08A2BECBEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.9.3", + "matchCriteriaId": "29581AAB-05BC-43F2-9527-1377413529E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_centerport_vpn-1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20459672-988A-403E-9073-37F3B38F972E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.1", + "matchCriteriaId": "65B7E551-0057-48E6-AEA8-33588AA4C54C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_4305:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31D36718-F7F5-40E4-9A01-58475943AB8E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.1", + "matchCriteriaId": "16F72A3C-1E6A-4642-94C4-C2EA14C67A31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_4302:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C68D03F-E473-4F34-85FA-F7C81859E976" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.1", + "matchCriteriaId": "73C34979-43F9-4D09-B8DD-64B741247AE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_4102_pcie:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADCA6B7B-1420-4B75-8AF1-245C48A0809C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.1", + "matchCriteriaId": "72C5CD24-7FB6-4482-A9C6-22B35B3DFE47" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_4102_pci:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF36E8F0-08B9-46B2-B5E1-E207C70A0447" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.1", + "matchCriteriaId": "CEA88A13-7425-4EDB-89EC-BC68E6985FFA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_2105:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5DF8E58-5E12-4214-B659-5FC6CEB18879" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.1", + "matchCriteriaId": "AAC77981-EC77-4273-AAAA-0D715F6C75C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_2102:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E3DCBF6-F308-4B53-A3CA-5A799A82F579" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2024-052", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7862.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7862.json index dc6508ea595..92416eca9fc 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7862.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7862.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:25.003", "lastModified": "2024-09-12T14:35:21.530", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8044.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8044.json index aed7a802a5d..bfe414552ac 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8044.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8044.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-17T06:15:02.550", "lastModified": "2024-09-20T12:31:20.110", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8103.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8103.json index 4b429b3ca37..cb54ca0ae35 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8103.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8103.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T01:15:45.793", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8118.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8118.json index bbe39a4b8da..6aa4ee2ed52 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8118.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8118.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Grafana, the wrong permission is applied to the alert rule write API endpoint, allowing users with permission to write external alert instances to also write alert rules." + }, + { + "lang": "es", + "value": "En Grafana, se aplica el permiso incorrecto al endpoint de la API de escritura de reglas de alerta, lo que permite que los usuarios con permiso para escribir instancias de alerta externas tambi\u00e9n escriban reglas de alerta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8126.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8126.json index dd9500fbb0d..dd6cd37ed66 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8126.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8126.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Advanced File Manager plugin for WordPress is vulnerable to arbitrary file uploads via the 'class_fma_connector.php' file in all versions up to, and including, 5.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to upload a new .htaccess file allowing them to subsequently upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento Advanced File Manager para WordPress es vulnerable a la carga de archivos arbitrarios a trav\u00e9s del archivo 'class_fma_connector.php' en todas las versiones hasta la 5.2.8 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, y con permisos otorgados por un administrador, carguen un nuevo archivo .htaccess que les permita cargar posteriormente archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8263.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8263.json index 91f4d1c9702..06c423c4277 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8263.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8263.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-cna@github.com", "published": "2024-09-23T21:15:12.957", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8291.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8291.json index 055255149ab..51cf05b4a4b 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8291.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8291.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-09-25T01:15:46.193", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8316.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8316.json index fc7fae55b82..44aa768d9a2 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8316.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8316.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@progress.com", "published": "2024-09-25T14:15:06.550", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8404.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8404.json index 9114284dcdd..a85be18dfa2 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8404.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8404.json @@ -3,7 +3,7 @@ "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-09-26T02:15:02.797", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8405.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8405.json index 88661b3e718..c2c7b712c8d 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8405.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8405.json @@ -3,7 +3,7 @@ "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-09-26T02:15:03.007", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8437.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8437.json index c7a171262ec..bc3c02b4c0f 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8437.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8437.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T01:15:46.500", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8606.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8606.json index e7dc7fb8388..784db25fd53 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8606.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8606.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@checkmk.com", "published": "2024-09-23T07:15:02.233", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8633.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8633.json index fab6f1252e6..e08b56ec16b 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8633.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8633.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Form Maker by 10Web \u2013 Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.15.27 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Form Maker by 10Web \u2013 Mobile-Friendly Drag & Drop Contact Form Builder para WordPress, es vulnerable a Cross-Site Scripting almacenado en todas las versiones hasta la 1.15.27 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de administrador o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8681.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8681.json index f9defbeb63b..30743b4d420 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8681.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8681.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Media Grid widget in all versions up to, and including, 4.10.52 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Premium Addons for Elementor para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del widget Media Grid del complemento en todas las versiones hasta la 4.10.52 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8704.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8704.json index 2cb12fbbf29..bd537a7282e 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8704.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8704.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Advanced File Manager plugin for WordPress is vulnerable to Local JavaScript File Inclusion in all versions up to, and including, 5.2.8 via the 'fma_locale' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El complemento Advanced File Manager para WordPress es vulnerable a la inclusi\u00f3n de archivos JavaScript locales en todas las versiones hasta la 5.2.8 incluida a trav\u00e9s del par\u00e1metro 'fma_locale'. Esto permite que atacantes autenticados, con acceso de nivel de administrador o superior, incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8725.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8725.json index 3e7bb8a6ae7..d01040b8a4d 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8725.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8725.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Multiple plugins and/or themes for WordPress are vulnerable to Limited File Upload in various versions. This is due to a lack of proper checks to ensure lower-privileged roles cannot upload .css and .js files to arbitrary directories. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an administrator, to upload .css and .js files to any directory within the WordPress root directory, which could lead to Stored Cross-Site Scripting. The Advanced File Manager Shortcodes plugin must be installed to exploit this vulnerability." + }, + { + "lang": "es", + "value": "Varios complementos y/o temas para WordPress son vulnerables a la carga limitada de archivos en varias versiones. Esto se debe a la falta de controles adecuados para garantizar que los roles con privilegios m\u00e1s bajos no puedan cargar archivos .css y .js en directorios arbitrarios. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor o superior, y con permisos otorgados por un administrador, carguen archivos .css y .js en cualquier directorio dentro del directorio ra\u00edz de WordPress, lo que podr\u00eda provocar Cross-Site Scripting almacenado. El complemento Advanced File Manager Shortcodes debe estar instalado para aprovechar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8771.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8771.json index 104da3850df..53d3fb57637 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8771.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8771.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Email Subscribers by Icegram Express \u2013 Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'preview_email_template_design' function in all versions up to, and including, 5.7.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including the content of private, password protected, pending, and draft posts and pages." + }, + { + "lang": "es", + "value": "El complemento Email Subscribers de Icegram Express \u2013 Email Marketing, Newsletters, Automation for WordPress & WooCommerce para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'preview_email_template_design' en todas las versiones hasta la 5.7.34 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, extraigan datos confidenciales, incluido el contenido de publicaciones y p\u00e1ginas privadas, protegidas con contrase\u00f1a, pendientes y borradores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8796.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8796.json index db9a5bae6a1..a9b5ebdb226 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8796.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8796.json @@ -3,7 +3,7 @@ "sourceIdentifier": "disclosure@synopsys.com", "published": "2024-09-17T18:15:05.443", "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8801.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8801.json index 0ea5975e623..e96e6e90beb 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8801.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8801.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T01:15:47.050", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8877.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8877.json index 1f0f6b50857..fdcac913261 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8877.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8877.json @@ -3,7 +3,7 @@ "sourceIdentifier": "office@cyberdanube.com", "published": "2024-09-25T01:15:47.267", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8878.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8878.json index 2de11bed2bc..85fc8ff8041 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8878.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8878.json @@ -3,7 +3,7 @@ "sourceIdentifier": "office@cyberdanube.com", "published": "2024-09-25T01:15:47.367", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8917.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8917.json index f23d8c6a550..816631e4d1b 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8917.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8917.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T01:15:47.687", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8919.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8919.json index a05aaac7759..40a3afaa879 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8919.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8919.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T01:15:47.880", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8922.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8922.json index c85ce006ce0..ed4ed6bbab2 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8922.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8922.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Product Enquiry for WooCommerce, WooCommerce product catalog plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.2.33.32 via deserialization of untrusted input in enquiry_detail.php. This makes it possible for authenticated attackers, with Author-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento Product Enquiry for WooCommerce, WooCommerce product catalog para WordPress, es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 2.2.33.32 incluida, a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables en enquiry_detail.php. Esto hace posible que atacantes autenticados, con acceso de nivel de autor y superior, inyecten un objeto PHP. No hay ninguna cadena POP presente en el software vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8940.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8940.json index 1dc0ffae160..a3f6cf2e12b 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8940.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8940.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-25T01:15:48.087", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8941.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8941.json index d550bf2d8c7..7169b426ac5 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8941.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8941.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-25T01:15:48.287", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8942.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8942.json index 4543d0ace78..39e0df3033b 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8942.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8942.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-25T01:15:48.483", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8965.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8965.json index 35971c2c03f..ed67701eb6c 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8965.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8965.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Absolute Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Name' field of a custom post criteria in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Absolute Reviews para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del campo \"Nombre\" de un criterio de publicaci\u00f3n personalizado en todas las versiones hasta la 1.1.3 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8974.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8974.json index 63acdc3f50f..dd5594ed244 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8974.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8974.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Information disclosure in Gitlab EE/CE affecting all versions from 15.6 prior to 17.2.8, 17.3 prior to 17.3.4, and 17.4 prior to 17.4.1 in specific conditions it was possible to disclose to an unauthorised user the path of a private project.\"" + }, + { + "lang": "es", + "value": "Divulgaci\u00f3n de informaci\u00f3n en Gitlab EE/CE que afecta a todas las versiones desde la 15.6 anterior a la 17.2.8, la 17.3 anterior a la 17.3.4 y la 17.4 anterior a la 17.4.1: en condiciones espec\u00edficas era posible revelar a un usuario no autorizado la ruta de un proyecto privado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8975.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8975.json index 6ac8eda5361..a2bc2d098fd 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8975.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8975.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@grafana.com", "published": "2024-09-25T17:15:19.360", "lastModified": "2024-09-26T17:15:04.283", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8991.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8991.json index 0f901c61d57..6c6c31e841c 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8991.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8991.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The OSM \u2013 OpenStreetMap plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's osm_map and osm_map_v3 shortcodes in all versions up to, and including, 6.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento OSM \u2013 OpenStreetMap para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de los c\u00f3digos cortos osm_map y osm_map_v3 del complemento en todas las versiones hasta la 6.1.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8996.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8996.json index 30975e24749..35e28f4271d 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8996.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8996.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@grafana.com", "published": "2024-09-25T17:15:19.567", "lastModified": "2024-09-26T17:15:04.373", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9032.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9032.json index dd64953dde6..2522b810ee1 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9032.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9032.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in SourceCodester Simple Forum-Discussion System 1.0. Affected is an unknown function of the file /index.php. The manipulation of the argument page leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Simple Forum-Discussion System 1.0. Se trata de una funci\u00f3n desconocida del archivo /index.php. La manipulaci\u00f3n de la p\u00e1gina de argumentos provoca un path traversal. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9048.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9048.json index 53899ea68be..38e187fc08d 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9048.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9048.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-21T09:15:04.660", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9049.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9049.json index 18ee885c39a..2ff183d6b04 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9049.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9049.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Beaver Builder \u2013 WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button Group module in all versions up to, and including, 2.8.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Beaver Builder \u2013 WordPress Page Builder para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del m\u00f3dulo Button Group del complemento en todas las versiones hasta la 2.8.3.6 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en las p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9075.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9075.json index a7cbbd0ae79..15bbf811e04 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9075.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9075.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-21T23:15:14.493", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9130.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9130.json index 6ad065e4ac0..59dde271bac 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9130.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9130.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018order\u2019 parameter in all versions up to, and including, 3.16.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with GiveWP Manager-level access and above, to append additional SQL queries into already existing queries within the Legacy View mode, that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento GiveWP \u2013 Donation Plugin and Fundraising Platform para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro 'order' en todas las versiones hasta la 3.16.1 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de administrador de GiveWP y superior, agreguen consultas SQL adicionales a las consultas ya existentes dentro del modo de vista heredada, que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9148.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9148.json index e402f6522de..98e52f013af 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9148.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9148.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-09-25T01:15:49.297", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9155.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9155.json index d49572f3c1d..42dd09e486a 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9155.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9155.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 9.10.x <= 9.10.1, 9.9.x <= 9.9.2, 9.5.x <= 9.5.8 fail to limit access to channels files that have not been linked to a post which allows an attacker to view them in channels that they are a member of." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 9.10.x <= 9.10.1, 9.9.x <= 9.9.2, 9.5.x <= 9.5.8 no logran limitar el acceso a los archivos de canales que no se han vinculado a una publicaci\u00f3n, lo que permite a un atacante verlos en los canales de los que son miembros." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9166.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9166.json index 323d9313e74..6252ff7b3ba 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9166.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9166.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the 'getcommand' query within the application, allowing the attacker to gain root access." + }, + { + "lang": "es", + "value": "El dispositivo permite que un atacante no autorizado ejecute comandos del sistema con privilegios elevados. Esta vulnerabilidad se facilita mediante el uso de la consulta 'getcommand' dentro de la aplicaci\u00f3n, lo que permite al atacante obtener acceso superusuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9177.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9177.json index 2c81fb2231a..75c63b8393c 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9177.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9177.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Themedy Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's themedy_col, themedy_social_link, themedy_alertbox, and themedy_pullleft shortcodes in all versions up to, and including, 1.0.14, and up to, and including 1.0.15 for the plugin's themedy_button shortcode due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Themedy Toolbox para WordPress es vulnerable a Cross-Site Scripting almacenados a trav\u00e9s de los c\u00f3digos cortos themedy_col, themedy_social_link, themedy_alertbox y themedy_pullleft del complemento en todas las versiones hasta la 1.0.14 incluida, y hasta la 1.0.15 incluida para el c\u00f3digo corto themedy_button del complemento debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9198.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9198.json index 3d71bb849e6..447ebbe8ffc 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9198.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9198.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-26T10:15:05.040", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9199.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9199.json index 71743afd016..8ab08c68df3 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9199.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9199.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-26T10:15:05.257", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9203.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9203.json index 29932e7e352..8f1b17268cf 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9203.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9203.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in Enpass Password Manager up to 6.9.5 on Windows. This issue affects some unknown processing. The manipulation leads to cleartext storage of sensitive information in memory. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 6.10.1 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad clasificada como problem\u00e1tica en Enpass Password Manager hasta la versi\u00f3n 6.9.5 en Windows. Este problema afecta a algunos procesos desconocidos. La manipulaci\u00f3n provoca el almacenamiento en texto plano de informaci\u00f3n confidencial en la memoria. Un ataque debe abordarse localmente. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. La actualizaci\u00f3n a la versi\u00f3n 6.10.1 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9319.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9319.json new file mode 100644 index 00000000000..45dc6039ca4 --- /dev/null +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9319.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9319", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-29T00:15:02.490", + "lastModified": "2024-09-29T00:15:02.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in SourceCodester Online Timesheet App 1.0. This affects an unknown part of the file /endpoint/delete-timesheet.php. The manipulation of the argument timesheet leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zz0zz0/CVE/blob/main/Online%20Timesheet%20App%20--SQL%20injection/Online%20Timesheet%20App%20--SQL%20injection.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.278823", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.278823", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.413329", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9320.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9320.json new file mode 100644 index 00000000000..3ab03c08f51 --- /dev/null +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9320.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9320", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-29T00:15:03.093", + "lastModified": "2024-09-29T00:15:03.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SourceCodester Online Timesheet App 1.0 and classified as problematic. This vulnerability affects unknown code of the file /endpoint/add-timesheet.php of the component Add Timesheet Form. The manipulation of the argument day/task leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zz0zz0/CVE/blob/main/Online%20Timesheet%20App%20--XSS/Online%20Timesheet%20App%20--XSS.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.278824", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.278824", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.413331", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9321.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9321.json new file mode 100644 index 00000000000..8d5515a9aac --- /dev/null +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9321.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9321", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-29T01:15:10.380", + "lastModified": "2024-09-29T01:15:10.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Online Railway Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/inquiries/view_details.php. The manipulation of the argument id leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gurudattch/CVEs/blob/main/Sourcecodester-Online-Railway-Registraion-System-BAC.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.278825", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.278825", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.412491", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index af1e8a813c6..8390dcdada2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-28T23:55:17.196918+00:00 +2024-09-29T02:00:17.791047+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-28T23:51:34.580000+00:00 +2024-09-29T01:15:10.380000+00:00 ``` ### Last Data Feed Release @@ -27,51 +27,53 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-09-28T00:00:08.677685+00:00 +2024-09-29T00:00:08.657310+00:00 ``` ### Total Number of included CVEs ```plain -264099 +264102 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `3` -- [CVE-2024-9318](CVE-2024/CVE-2024-93xx/CVE-2024-9318.json) (`2024-09-28T23:15:13.530`) +- [CVE-2024-9319](CVE-2024/CVE-2024-93xx/CVE-2024-9319.json) (`2024-09-29T00:15:02.490`) +- [CVE-2024-9320](CVE-2024/CVE-2024-93xx/CVE-2024-9320.json) (`2024-09-29T00:15:03.093`) +- [CVE-2024-9321](CVE-2024/CVE-2024-93xx/CVE-2024-9321.json) (`2024-09-29T01:15:10.380`) ### CVEs modified in the last Commit -Recently modified CVEs: `36` +Recently modified CVEs: `241` -- [CVE-2023-39436](CVE-2023/CVE-2023-394xx/CVE-2023-39436.json) (`2024-09-28T22:15:04.010`) -- [CVE-2023-39438](CVE-2023/CVE-2023-394xx/CVE-2023-39438.json) (`2024-09-28T22:15:04.123`) -- [CVE-2023-39439](CVE-2023/CVE-2023-394xx/CVE-2023-39439.json) (`2024-09-28T22:15:04.243`) -- [CVE-2023-39440](CVE-2023/CVE-2023-394xx/CVE-2023-39440.json) (`2024-09-28T22:15:04.350`) -- [CVE-2023-40309](CVE-2023/CVE-2023-403xx/CVE-2023-40309.json) (`2024-09-28T22:15:04.460`) -- [CVE-2023-40622](CVE-2023/CVE-2023-406xx/CVE-2023-40622.json) (`2024-09-28T22:15:04.610`) -- [CVE-2023-42475](CVE-2023/CVE-2023-424xx/CVE-2023-42475.json) (`2024-09-28T23:15:11.563`) -- [CVE-2023-42481](CVE-2023/CVE-2023-424xx/CVE-2023-42481.json) (`2024-09-28T23:15:11.717`) -- [CVE-2023-45038](CVE-2023/CVE-2023-450xx/CVE-2023-45038.json) (`2024-09-28T23:51:34.580`) -- [CVE-2023-47563](CVE-2023/CVE-2023-475xx/CVE-2023-47563.json) (`2024-09-28T23:47:40.683`) -- [CVE-2023-49578](CVE-2023/CVE-2023-495xx/CVE-2023-49578.json) (`2024-09-28T23:15:11.840`) -- [CVE-2023-49580](CVE-2023/CVE-2023-495xx/CVE-2023-49580.json) (`2024-09-28T23:15:11.977`) -- [CVE-2023-49583](CVE-2023/CVE-2023-495xx/CVE-2023-49583.json) (`2024-09-28T23:15:12.090`) -- [CVE-2023-50360](CVE-2023/CVE-2023-503xx/CVE-2023-50360.json) (`2024-09-28T23:44:50.720`) -- [CVE-2023-50422](CVE-2023/CVE-2023-504xx/CVE-2023-50422.json) (`2024-09-28T23:15:12.223`) -- [CVE-2023-50423](CVE-2023/CVE-2023-504xx/CVE-2023-50423.json) (`2024-09-28T23:15:12.360`) -- [CVE-2023-50424](CVE-2023/CVE-2023-504xx/CVE-2023-50424.json) (`2024-09-28T23:15:12.477`) -- [CVE-2024-21736](CVE-2024/CVE-2024-217xx/CVE-2024-21736.json) (`2024-09-28T23:15:12.587`) -- [CVE-2024-24740](CVE-2024/CVE-2024-247xx/CVE-2024-24740.json) (`2024-09-28T23:15:12.777`) -- [CVE-2024-25644](CVE-2024/CVE-2024-256xx/CVE-2024-25644.json) (`2024-09-28T23:15:12.907`) -- [CVE-2024-25645](CVE-2024/CVE-2024-256xx/CVE-2024-25645.json) (`2024-09-28T23:15:13.020`) -- [CVE-2024-25646](CVE-2024/CVE-2024-256xx/CVE-2024-25646.json) (`2024-09-28T23:15:13.110`) -- [CVE-2024-28163](CVE-2024/CVE-2024-281xx/CVE-2024-28163.json) (`2024-09-28T23:15:13.217`) -- [CVE-2024-30218](CVE-2024/CVE-2024-302xx/CVE-2024-30218.json) (`2024-09-28T23:15:13.313`) -- [CVE-2024-33004](CVE-2024/CVE-2024-330xx/CVE-2024-33004.json) (`2024-09-28T23:15:13.420`) +- [CVE-2024-8877](CVE-2024/CVE-2024-88xx/CVE-2024-8877.json) (`2024-09-26T13:32:02.803`) +- [CVE-2024-8878](CVE-2024/CVE-2024-88xx/CVE-2024-8878.json) (`2024-09-26T13:32:02.803`) +- [CVE-2024-8917](CVE-2024/CVE-2024-89xx/CVE-2024-8917.json) (`2024-09-26T13:32:02.803`) +- [CVE-2024-8919](CVE-2024/CVE-2024-89xx/CVE-2024-8919.json) (`2024-09-26T13:32:02.803`) +- [CVE-2024-8922](CVE-2024/CVE-2024-89xx/CVE-2024-8922.json) (`2024-09-27T06:15:12.817`) +- [CVE-2024-8940](CVE-2024/CVE-2024-89xx/CVE-2024-8940.json) (`2024-09-26T13:32:02.803`) +- [CVE-2024-8941](CVE-2024/CVE-2024-89xx/CVE-2024-8941.json) (`2024-09-26T13:32:02.803`) +- [CVE-2024-8942](CVE-2024/CVE-2024-89xx/CVE-2024-8942.json) (`2024-09-26T13:32:02.803`) +- [CVE-2024-8965](CVE-2024/CVE-2024-89xx/CVE-2024-8965.json) (`2024-09-27T06:15:13.223`) +- [CVE-2024-8974](CVE-2024/CVE-2024-89xx/CVE-2024-8974.json) (`2024-09-26T23:15:03.083`) +- [CVE-2024-8975](CVE-2024/CVE-2024-89xx/CVE-2024-8975.json) (`2024-09-26T17:15:04.283`) +- [CVE-2024-8991](CVE-2024/CVE-2024-89xx/CVE-2024-8991.json) (`2024-09-27T07:15:05.493`) +- [CVE-2024-8996](CVE-2024/CVE-2024-89xx/CVE-2024-8996.json) (`2024-09-26T17:15:04.373`) +- [CVE-2024-9032](CVE-2024/CVE-2024-90xx/CVE-2024-9032.json) (`2024-09-20T17:04:51.490`) +- [CVE-2024-9048](CVE-2024/CVE-2024-90xx/CVE-2024-9048.json) (`2024-09-26T13:32:55.343`) +- [CVE-2024-9049](CVE-2024/CVE-2024-90xx/CVE-2024-9049.json) (`2024-09-27T07:15:06.120`) +- [CVE-2024-9075](CVE-2024/CVE-2024-90xx/CVE-2024-9075.json) (`2024-09-26T13:32:55.343`) +- [CVE-2024-9130](CVE-2024/CVE-2024-91xx/CVE-2024-9130.json) (`2024-09-27T06:15:13.570`) +- [CVE-2024-9148](CVE-2024/CVE-2024-91xx/CVE-2024-9148.json) (`2024-09-26T13:32:02.803`) +- [CVE-2024-9155](CVE-2024/CVE-2024-91xx/CVE-2024-9155.json) (`2024-09-26T15:15:18.060`) +- [CVE-2024-9166](CVE-2024/CVE-2024-91xx/CVE-2024-9166.json) (`2024-09-26T17:15:04.460`) +- [CVE-2024-9177](CVE-2024/CVE-2024-91xx/CVE-2024-9177.json) (`2024-09-26T14:15:09.697`) +- [CVE-2024-9198](CVE-2024/CVE-2024-91xx/CVE-2024-9198.json) (`2024-09-26T13:32:02.803`) +- [CVE-2024-9199](CVE-2024/CVE-2024-91xx/CVE-2024-9199.json) (`2024-09-26T13:32:02.803`) +- [CVE-2024-9203](CVE-2024/CVE-2024-92xx/CVE-2024-9203.json) (`2024-09-26T17:15:04.593`) ## Download and Usage diff --git a/_state.csv b/_state.csv index af2020d645b..14513aa8485 100644 --- a/_state.csv +++ b/_state.csv @@ -172858,7 +172858,7 @@ CVE-2021-27911,0,0,63453bc44e6b819da248bb6ae5fe3d8b3964709f36e8394f2204e3db47f4d CVE-2021-27912,0,0,19148a6b4be6511067ebb8120b362588e1573f54967fc3540726b708fba4e179,2021-09-03T16:45:06.903000 CVE-2021-27913,0,0,167d05a43c4b8a3a9a5f9095ae1170cc5f9466459db5849cf91ef768c53d596c,2021-09-03T16:43:47.267000 CVE-2021-27914,0,0,675b39026c04fc757a33b18eab7c2aa058775623331c1d7c9d085c842a052b1d,2022-06-08T18:45:22.737000 -CVE-2021-27915,0,0,42170d064d1b01652cdc11eb30f626387eda85d27a5f861e99cddbeae26cfb9b,2024-09-20T12:30:51.220000 +CVE-2021-27915,0,1,aa4b9f4c69d7d5ac6f5dbddcc007e3027f3bc066eee27bd2a695f6cfc3b6d157,2024-09-29T00:22:31.787000 CVE-2021-27916,0,0,17a56e0b9e95a77b85369601e6daab8e12801e4f3a1e07f75ef096207d8313df,2024-09-20T12:30:51.220000 CVE-2021-27917,0,0,5465a3d7f25a5154d30a82cd6f06e15430a49f302876406aa605d64d13a082bc,2024-09-27T15:13:58.927000 CVE-2021-27918,0,0,0518da32da0b62ea5fcb12a67bfb4a45de87702f6745ca2fb1540144faa372aa,2022-12-13T16:28:13.860000 @@ -181004,7 +181004,7 @@ CVE-2021-38959,0,0,845c3150ebb8687180ab6e0146ffefda06be6ad1737480b99fd5aad07acc0 CVE-2021-3896,0,0,aee74c6ec825cf7ec1161a52b7ddff0aa95119c741e301e8ce32cd3b8e44169e,2023-11-07T03:38:23.847000 CVE-2021-38960,0,0,af62b24d3a32530dfd1e782d19ffc98102731af5d11851593a3dd61a9ba1148f,2022-02-09T02:54:21.237000 CVE-2021-38961,0,0,3f2953a57a597c8352e0512813950ba2e7f166632065237b650cab43de70a1ca,2022-01-06T21:05:43.627000 -CVE-2021-38963,0,0,82de033c08ac39bf9634b0ef4047c7427996f2f501d096cc12799b0f0ed060da,2024-09-26T13:32:55.343000 +CVE-2021-38963,0,1,58bb5ebd8ccb3c174ff376055db946d1b52bdbe1cfdfe7125808fbf33c2dca83,2024-09-26T13:32:55.343000 CVE-2021-38965,0,0,dd7ff47cb05ee2d4a4638f84ef21a8e7f9626afa92d1759c4254f06799e93e65,2022-01-22T03:38:48.947000 CVE-2021-38966,0,0,726e933d39b4e84dcfd51ebc0f5079d8d4a5dfc91420ab5924b3575139fdda7e,2021-12-23T19:43:30.430000 CVE-2021-38967,0,0,1f576412d95c67f405ebc9b48a4f718e27476e6e9ba2f7606552643d956d233f,2021-11-30T20:29:59.293000 @@ -193452,7 +193452,7 @@ CVE-2022-24386,0,0,457222f095c62db0fb0ca8bf1941849311c926f62af825405c1c6aca5315e CVE-2022-24387,0,0,54dc02b7b2ac9a081a5973c3d20f765d63e8646b2df0467cc341110e81783a58,2022-03-19T01:11:04.923000 CVE-2022-24388,0,0,0aa162374a72e7b272071bc85f23bb3ac62a1dbd8bcfa58503cbe59a9d783e6a,2022-05-26T01:49:38.753000 CVE-2022-24389,0,0,1bfcfb3a923a3c536cc281292090c1401824e60d2f38b82785afa6c7ed823d33,2022-05-26T01:59:03.417000 -CVE-2022-2439,0,0,5b371e9175851f699e250ea33d34854e5aab6a97e69cb5821484f625f9d85d23,2024-09-26T13:32:55.343000 +CVE-2022-2439,0,1,71c4c44c3559f8dfdec520c0c7b7ccf9de70a0b28373021d99fd5226fd703f97,2024-09-26T13:32:55.343000 CVE-2022-24390,0,0,705be1c3f842778de9c5ad738b83b0073d2efbf3670df34f916910c3e6d0d305,2022-05-26T02:07:01 CVE-2022-24391,0,0,d1b442508d4e4b0ae49d9e9718627e98d284f227909aa2ed6709d35321c6a8c4,2022-05-26T02:08:19.357000 CVE-2022-24392,0,0,025d4905f7269caa1761e9832885e92f900050e154cdd466754c6513bee6cacf,2022-05-26T02:11:27.130000 @@ -205301,7 +205301,7 @@ CVE-2022-39064,0,0,12a3dbbf728a982dd312cc0d5d9ff9657f0bdfb214dd42709048b34b79d2d CVE-2022-39065,0,0,cd584a75aec5300c6e9a9a671fc8c9b43a6618931ca91f50e33f6d7044185186,2022-10-18T14:08:59.637000 CVE-2022-39066,0,0,67c65566bd21096c72fb54e751efd5c2676353abb951d0c6b56e3cf4f5a67339,2022-11-30T13:32:37.447000 CVE-2022-39067,0,0,c358196114540dd22595661fab8f7d8d626092ee22ba6d47c3469536ad018e02,2022-11-30T13:38:39.770000 -CVE-2022-39068,0,0,196733977692b6e39b527069798354749867091cc424e37913f17633b1d19a3c,2024-09-20T12:30:51.220000 +CVE-2022-39068,0,1,bcbe3bc7ee831284bdd7d2089ddd462ccc47a6adabf2d45be145e24244fd349e,2024-09-29T00:41:50.500000 CVE-2022-39069,0,0,8ff28daec3354122720c8cb16c1caccdcaa79dbb867529cb1094311244bf3a64,2022-11-09T16:44:17.623000 CVE-2022-3907,0,0,d1aebbc42b807c6a07b40a31bb83639d938c2e22546d709be343b2e421af6dd9,2023-11-07T03:51:56.857000 CVE-2022-39070,0,0,1055429b8a4d59edcc42ecb196a96188940cd00259c634d98da73157d4e25d30,2022-11-28T19:29:32.380000 @@ -209013,7 +209013,7 @@ CVE-2022-43841,0,0,35116a5e43ce48481c2d2ecb6ae5499b246b3da5f07462d73bd693609cadf CVE-2022-43842,0,0,a68686a004389338f1dce23623a68acb741ff4745918cf1238400c566f2ad1b1,2024-02-23T19:31:25.817000 CVE-2022-43843,0,0,aa0c3a2ae6a2cc2fcc583bf5b1ca1da32d6bf45a63332265e02d80ec3a4c0a68,2023-12-19T02:00:44.520000 CVE-2022-43844,0,0,b8dacec7ff65eb775abbd8f6cda4c37ecbf43ea433719c36bdb14b472b1a3da1,2023-11-07T03:54:05.313000 -CVE-2022-43845,0,0,c729ab686d8c514965e55034181e32f1411f009179047282d8e37afddc8b5b1a,2024-09-26T13:32:55.343000 +CVE-2022-43845,0,1,d6beb287c89866058c4b5810cad0366db4035c716aea3da5a6d75ec4d8d34284,2024-09-26T13:32:55.343000 CVE-2022-43848,0,0,075f5f0ab7b7c2459de144404ce81f63e43a1c5ca7c68d93134ae7852fb15c62,2023-11-07T03:54:05.370000 CVE-2022-43849,0,0,7e34dc61a4bd78a455cabae905789f7bd871517a179ef2a07e835f35a9cc8364,2023-11-07T03:54:05.460000 CVE-2022-4385,0,0,8b5af91d3e781e15777a402139847011694579816a78a3ddf65a7f59c596b7f6,2023-11-07T03:57:43.257000 @@ -212523,12 +212523,12 @@ CVE-2022-4900,0,0,190b62a537516e288099ba80e5f84457dcb946e631ca8348b4310cc8613075 CVE-2022-4901,0,0,b216b364f33ab0ef7a0c7606c08559e2c099c064cab5e2ac5756fa24252b7a04,2023-03-09T01:06:23.703000 CVE-2022-4902,0,0,287e358bd6e692608595d8f35e480fa1fc0a17dda86b7a57dcb446074ab1fd22,2024-05-17T02:17:02.280000 CVE-2022-4903,0,0,cf9430f75554b10fc3063c2d4e895e2575b24650a7af1dc91ee51937fe80926d,2024-05-17T02:17:02.397000 -CVE-2022-49037,0,0,27e1db35317981199ef9e0ed8cd8295fc0c180cb9451a4788429ae3f654a03c9,2024-09-26T13:32:02.803000 -CVE-2022-49038,0,0,54ea9b20605f9891208fb1af2258c9dd88712c5cb6b1234f7486de8b292138a3,2024-09-26T13:32:02.803000 -CVE-2022-49039,0,0,91504c3b167cc6561927a82a1c24cd522799b594d9090681b6670ee8439e61bc,2024-09-26T13:32:02.803000 +CVE-2022-49037,0,1,c92e2003007494a884d0853b28c3ea1cf45b59686f12b468248885d62af01a45,2024-09-26T13:32:02.803000 +CVE-2022-49038,0,1,8640716a6fa5cdfa180ee31f65ae43c4086816e85778bdd971dfabbb043d54cd,2024-09-26T13:32:02.803000 +CVE-2022-49039,0,1,b63056356929ea2e8886c9d04df3edc708730401e9dd7263b335886ee886015a,2024-09-26T13:32:02.803000 CVE-2022-4904,0,0,7fd91bcfdda485d2d1b99e23faafa981f8e23511627b52ddcbefb9f4810ebc15,2024-01-05T10:15:10.403000 -CVE-2022-49040,0,0,0d63543672e7f9bea2c27e9c0c3ecbf179089a858e1860172f0bb696a69e2e6b,2024-09-26T13:32:02.803000 -CVE-2022-49041,0,0,6587682ed45d8c419cc61a0379a8a6986578f06bcfb67da9a093249312760726,2024-09-26T13:32:02.803000 +CVE-2022-49040,0,1,dc70df585541374883cd603fb7f8962afe2c74c015c228d99365d73d7596efbe,2024-09-26T13:32:02.803000 +CVE-2022-49041,0,1,cd08955ec1ef7807a92d976e3bf6d14c816370963c58a1a0c86d5e78d7ee8629,2024-09-26T13:32:02.803000 CVE-2022-4905,0,0,5ed0102a2ff79a38a818598d42a854f2653bfd1cbf7bd4d44c6202eec6703dca,2024-05-17T02:17:02.537000 CVE-2022-4906,0,0,a1c66471618b60e194f3fe4d779a45e5ee2c0bea6e8f8da3c7c0eae7fd768250,2023-08-10T03:15:50.953000 CVE-2022-4907,0,0,fccbd9f1017b7c4db6bafd15fa3ee2977587a49756ba66d0760690b5c66f8c42,2023-12-28T15:39:50.990000 @@ -218853,7 +218853,7 @@ CVE-2023-25185,0,0,1135c662e57f51c34416e024b4987aa850e5741deacd604b74a870538bfd2 CVE-2023-25186,0,0,84fdf198fca54d82274bf23f7a19407034d6d7950ada02a9b488f31cf7adb57c,2023-07-05T15:48:07.843000 CVE-2023-25187,0,0,e89bd4fa4c1c86879c04daf0b42f122bc213686f65f5bd42b68cf2726238ff4f,2023-06-29T19:17:48.053000 CVE-2023-25188,0,0,99a89a05ad15ad65c3e7bcd487b49199dddb071e95c006fb1db1eae71d2117f6,2023-06-30T16:10:18.383000 -CVE-2023-25189,0,0,bd30d48be47051d80e37d6ea5536ff430181fb5ceea8f06deeb251856c5786e3,2024-09-26T13:32:02.803000 +CVE-2023-25189,0,1,a6a0a0369b47aa6c0dc94f3935d0ef8a420315847bc80e1b5ff79edb997a40f0,2024-09-26T13:32:02.803000 CVE-2023-2519,0,0,8cda41d4e7e8d661e9517bd8596373028e42458752588636e6f9350df8a49a49,2024-05-17T02:23:01.927000 CVE-2023-25191,0,0,85db906bc04b5d6fc3bb6f91c549d5e5b7ee59e11d5b5bb8995020c923f11762,2023-02-24T17:51:34.277000 CVE-2023-25192,0,0,408ab00a0fee17449a1dde61e3baf17726d13732731f80e617385e1174ac9859,2023-02-24T18:02:49.487000 @@ -223701,7 +223701,7 @@ CVE-2023-31366,0,0,44bbd1f8a094e73a70261f57615c2508c43003e09aed16040afe9f888e90f CVE-2023-3138,0,0,8f5ffff3673e8f74abc6225a3f21e8fa48e79b4bc3826a6eddcc46862b33415a,2023-12-08T19:15:07.580000 CVE-2023-3139,0,0,63da4e4c506673ff4b4b94c15b4d0285dc0dfef1076f2791ebbb5626e7d3bb6f,2023-11-07T04:17:58.783000 CVE-2023-3140,0,0,83445c1e28eed50d0564a2961426f98d0d9629256d1766c5b66f60dd49997477,2023-06-16T18:06:57.083000 -CVE-2023-31403,0,1,5fdd8bee99db50a48168c6cf910fe676e9bca4f466ec47070ce8e0157b59b65a,2024-09-28T22:15:02.433000 +CVE-2023-31403,0,0,5fdd8bee99db50a48168c6cf910fe676e9bca4f466ec47070ce8e0157b59b65a,2024-09-28T22:15:02.433000 CVE-2023-31404,0,0,4a57aeaae211f48ce93cca38338dda9b5c9de161ecf2fe3caf1604ea95d230f7,2023-05-15T17:32:45.030000 CVE-2023-31405,0,0,969cd152ec35e0bebe41113c42f762a1777df1496f01a3cb659d6f147453713f,2023-07-18T18:10:38.967000 CVE-2023-31406,0,0,e6ef06b8d0d2e12fab5898067ddc6638d3129aa25756a52b02fc1cb7d45fb214,2023-05-15T17:32:21.943000 @@ -224166,7 +224166,7 @@ CVE-2023-32110,0,0,403939799f39a8ac61e8ea50435741a1b2f2651a1763f256a2753cbe37e9f CVE-2023-32111,0,0,f01715a3b0bc44a49da48dae37cd3b11e8b9bbed4cc01c89601fc7ba0af4538f,2023-05-15T17:28:48.667000 CVE-2023-32112,0,0,500b473b63c35570e3a0b2dddf442bb4d1a3b8848e942367827f5ea7c50177f7,2023-05-15T17:23:48.290000 CVE-2023-32113,0,0,52ed52d4859a67df002f37ed2aaa4d39ce83f116cf5e2d1969e6d90a53829143,2024-03-19T19:48:16.700000 -CVE-2023-32114,0,1,0a15609fb2b5b2d1029997b518de3da87d0e3877573815c744943e8e6b63156e,2024-09-28T22:15:02.783000 +CVE-2023-32114,0,0,0a15609fb2b5b2d1029997b518de3da87d0e3877573815c744943e8e6b63156e,2024-09-28T22:15:02.783000 CVE-2023-32115,0,0,c3c14f9a6502f271a5b9eb6d48d16bfe36993e42edd597f057b0ecc72ddd5ac5,2023-06-26T13:55:12.110000 CVE-2023-32116,0,0,73b448578f57f99fb38509be1d12572fd9f535b4b34b69d6021322aeae71459e,2023-10-30T16:27:32.430000 CVE-2023-32118,0,0,3a328632555ce7f7c1a25df14024a651316fcd182b26f56fd5747ddd62122166,2023-06-16T03:56:42.987000 @@ -225738,7 +225738,7 @@ CVE-2023-33987,0,0,730078fa5315ef4dca20cb30b6fea8294c9b2bb4cc35700a073ffc2a0bfb0 CVE-2023-33988,0,0,5a9c91cc07fd432683ee76f164187371e9c7aa3ffdcf54a0baec998fbca758a9,2023-07-18T18:28:55.847000 CVE-2023-33989,0,0,78a4bfda446152fc81c2aa547105a75bfab9012ec91d4d20afe82139fa563c61,2023-07-19T12:53:57.597000 CVE-2023-3399,0,0,0f6f58d3cae0530810a7d8d7418ee7eb45cc2a247394b7c4ad89aefa7f49c8d5,2023-11-14T18:01:40.643000 -CVE-2023-33990,0,1,429bb9aafe8096479694a62b3f04dad25a8f4d047c435d55613482a4888c9b4c,2024-09-28T22:15:02.930000 +CVE-2023-33990,0,0,429bb9aafe8096479694a62b3f04dad25a8f4d047c435d55613482a4888c9b4c,2024-09-28T22:15:02.930000 CVE-2023-33991,0,0,2c38f74b06b22d20412aca2a54d271209ee9b7d6cb3b275f1c6d85b506b373a3,2023-06-20T16:48:54.673000 CVE-2023-33992,0,0,e0e448a5babd6ef7f5670d3b16701e514ec5e975dff13cd9e1ce223ebcd25efd,2023-07-19T13:24:24.817000 CVE-2023-33993,0,0,3a1592208fe1bf22f9ee2f9110ed0966e9b504175fab9be2c10572f072b5c0b1,2023-08-15T15:09:12.373000 @@ -226782,7 +226782,7 @@ CVE-2023-3567,0,0,463ff0bc913bf13cf3c16fe877148cf2bff1d68e46fd1a93c8e3c1e796bf61 CVE-2023-35670,0,0,66ce78a9898c485696f823b30641c59b9e8ac4455648b41a4893d58974bc027f,2023-09-14T01:41:38.713000 CVE-2023-35671,0,0,f99a5ee7cf89dbe2e5ea741ad23d416a25a631c2e51aa5f4135963e50126b54d,2024-09-26T15:35:16.237000 CVE-2023-35673,0,0,af7a2faf5f17208be8e9b27e9e2cec66d6cafcd9d2d31f5c5d0ef58b562e4e88,2023-09-14T01:30:16.627000 -CVE-2023-35674,0,0,36a88dff973492ce2b985dc4caee5ed37497573d42de23221055d3b36fede107,2024-09-26T15:35:17 +CVE-2023-35674,0,1,ca504b14d66aefaa57cced562c3d06c5f3016479ee5ea5b99e4975836c95aae4,2024-09-26T15:35:17 CVE-2023-35675,0,0,dd907efec7bb9661ca3412922449fce7a3a8de3faadf9ff8a1de1fa932b2f6b1,2023-09-13T17:40:35.963000 CVE-2023-35676,0,0,4f46b1bdafea48d731ba296299a9f54c45fec7c2e74d32462c1c58fd4e63e3a8,2024-09-26T15:35:17.767000 CVE-2023-35677,0,0,c582e41061bdaab22d2ba8536d5eb2163e13ae1e498284896f8f230289ed877e,2023-09-13T17:39:58.473000 @@ -226960,11 +226960,11 @@ CVE-2023-35863,0,0,cbb3608b436941ca40fc8a80428d35db8eb42f5a5a45f413b4802ea90385c CVE-2023-35866,0,0,6d8702e252316d86b52dcc46d4f25a5da1013c148d3f195460a689452152e596,2024-08-02T17:15:48.717000 CVE-2023-35867,0,0,5db923c7d14791cdd1ab7e9dc94705e30f35cb5d599aa351441dea1555738b42,2023-12-22T20:13:40.507000 CVE-2023-3587,0,0,858fbdf3b83a95a9d9fa2568a9b573917ded232ef7c8c9c0bf0b541a05fd78c3,2023-07-27T19:40:35.700000 -CVE-2023-35870,0,1,921e90eae30dd3932800aee7eba5ddcdccc6ee0964eb09f08d3c88f882a4bf08,2024-09-28T22:15:03.063000 +CVE-2023-35870,0,0,921e90eae30dd3932800aee7eba5ddcdccc6ee0964eb09f08d3c88f882a4bf08,2024-09-28T22:15:03.063000 CVE-2023-35871,0,0,d43b3a693b7dc87781f1504dfdc1a0512dc65f88011ecf68fc3feb58581429a6,2023-08-14T14:15:10.587000 CVE-2023-35872,0,0,46efe0a1a61cc48f94c5ffc8323d3526b2f917771157bbd207c0cd13135b8af4,2023-07-19T13:36:59.200000 CVE-2023-35873,0,0,9be398fb5a578d66a8e050b22d237fc4e7262e6c90661c5198282761d7edf667,2023-07-19T15:27:53.343000 -CVE-2023-35874,0,1,07d063e56172d4b330873c6a8a0017004b0e9740e74348b8a3a1bf876d0e0de9,2024-09-28T22:15:03.187000 +CVE-2023-35874,0,0,07d063e56172d4b330873c6a8a0017004b0e9740e74348b8a3a1bf876d0e0de9,2024-09-28T22:15:03.187000 CVE-2023-35876,0,0,d18e0ce61960cccc57bf475a075bb7f424cb1062b297d3699e467aff78c0d9c5,2023-12-28T20:17:35.997000 CVE-2023-35877,0,0,0ed125dbba11615c742d210b81261f0b496018687670d00a2fbc4ade0656a38a,2023-11-16T18:14:43.550000 CVE-2023-35878,0,0,31806b46808d48e1b06bdfff9d6a9d20e621aec43eefb38af128b522c0380e3f,2023-06-27T15:16:31.900000 @@ -227818,7 +227818,7 @@ CVE-2023-36915,0,0,5d656d6742cd64232d331d79f144c5195083cbe66f00399e182bec51b9ac8 CVE-2023-36916,0,0,67ac9d41aeea12b3c5abede45e587aaa746d1890bd1ab96299049df166b76c59,2024-04-09T21:15:11.227000 CVE-2023-36917,0,0,63f41b496cca09ca13149b06a529715ca5422dd2b4ca4c74715fb23e43003f71,2023-07-18T17:01:51.703000 CVE-2023-36918,0,0,ce15c2b3b21fc1790596c0ac8f2a6a976b4bc5b08101d2f149737c42c78576b2,2023-07-18T18:18:05.993000 -CVE-2023-36919,0,1,1076e2832e8aa0b910bf4b7db5a2747930ccd90a83d98859980dca73d8d75e3d,2024-09-28T22:15:03.313000 +CVE-2023-36919,0,0,1076e2832e8aa0b910bf4b7db5a2747930ccd90a83d98859980dca73d8d75e3d,2024-09-28T22:15:03.313000 CVE-2023-3692,0,0,d64ea2c78b76086a94b1a5c632af5e2d6ded6ee02b85b4c9f53744c42a27def5,2023-07-27T19:56:48.617000 CVE-2023-36920,0,0,c6aa92f8fc7d3cbbad5f554b81599e99635f832f01ebef5100e7043fe53fad1d,2023-11-08T00:16:23.700000 CVE-2023-36921,0,0,d14eb8e094eb26ebc2c221be24a1c18cdad698ab0655f977ead62c9cc244468d,2023-07-18T16:58:01.603000 @@ -228212,16 +228212,16 @@ CVE-2023-37479,0,0,65e698aeeec2de06015ebeeea50f3d8c2a3426ce2bf10b2923c6560b563e0 CVE-2023-3748,0,0,fbda536dd4dc031ecda3b4a3649fdc6e53178f4339fdaffc9ef3ebd42ff82bf3,2023-11-07T04:19:28.013000 CVE-2023-37480,0,0,652a3a23bafd305f9c2b7d3d1b87d3da5a01c6872bd5490c2366de4adbf638c6,2023-07-27T19:47:29.237000 CVE-2023-37481,0,0,db4abe35e141784e06fa4f3deb2743fed370d0e6ce2c608fe66c51d91bc9a2ec,2023-07-27T19:48:07.587000 -CVE-2023-37483,0,1,a06c307876460fd1997034979cd734b50178b62883eec0ec2aad9e9fe3eb8226,2024-09-28T22:15:03.433000 +CVE-2023-37483,0,0,a06c307876460fd1997034979cd734b50178b62883eec0ec2aad9e9fe3eb8226,2024-09-28T22:15:03.433000 CVE-2023-37484,0,0,760f55faa8c391cf557574d8b28bc1659926eabce351e2c7fb22d1954e7103de,2024-09-26T19:15:06.213000 -CVE-2023-37486,0,1,687c614f5ca4a79aa3d21e7b0746a1427771024c9b5a884c3831416a73c97e9a,2024-09-28T22:15:03.550000 -CVE-2023-37487,0,1,dd465ff25b94ede3032e958cf77df90cbd7c58a152279b54e8b633ded141b6e2,2024-09-28T22:15:03.670000 +CVE-2023-37486,0,0,687c614f5ca4a79aa3d21e7b0746a1427771024c9b5a884c3831416a73c97e9a,2024-09-28T22:15:03.550000 +CVE-2023-37487,0,0,dd465ff25b94ede3032e958cf77df90cbd7c58a152279b54e8b633ded141b6e2,2024-09-28T22:15:03.670000 CVE-2023-37488,0,0,a032fbb6b6fb8d9ec7eaea4394794969b13cf8fc31e6b77ab71c16c0ca58d597,2023-08-15T14:54:40.297000 CVE-2023-37489,0,0,1d24e14d654cea189a394fecb9c8bb7c050b6c0ec5ed17426a45133d2723e5bc,2023-09-14T02:07:38.067000 CVE-2023-3749,0,0,79575f437c00db11c5bc0408c98a9b194331bfe98dd13f13102bfbfdb447b240,2023-08-09T15:39:05.463000 CVE-2023-37490,0,0,d0afa82f8e1f60484edfa4ee4b02e342b7b84361f9859d350cae937d83586605,2023-08-09T18:21:14.410000 -CVE-2023-37491,0,1,f4f9aec1cccee79a8f65d739ee1fae55691219898360f98989170d7ce3b63272,2024-09-28T22:15:03.780000 -CVE-2023-37492,0,1,3201cae8021ed446e9e72842e5aed642bb38567a5b6d5d69dfeabfe2209387af,2024-09-28T22:15:03.890000 +CVE-2023-37491,0,0,f4f9aec1cccee79a8f65d739ee1fae55691219898360f98989170d7ce3b63272,2024-09-28T22:15:03.780000 +CVE-2023-37492,0,0,3201cae8021ed446e9e72842e5aed642bb38567a5b6d5d69dfeabfe2209387af,2024-09-28T22:15:03.890000 CVE-2023-37495,0,0,88b1b51fbc2aad530bec1f2499429397c80ed14af053e3ad0aaa2da2a3d61382,2024-02-29T13:49:47.277000 CVE-2023-37496,0,0,b3f6cf2213edd1b1c9a2df0a7e4e60f95ea00f20eade28d20d75195eb4a8af8d,2023-08-04T16:25:04.313000 CVE-2023-37497,0,0,a16a802dd163d689a9d35dd104f0934c7f0cb9de2213c75db89f75dc9c196288,2023-08-08T14:49:09.140000 @@ -229827,12 +229827,12 @@ CVE-2023-39432,0,0,c2c5e4411d42152860b85e65fde776a03bb884049f8dd2a1bf7f1c7dfe4b0 CVE-2023-39433,0,0,f891132ba414524367ca6e5b3376c4fd3194df781c7ccd69c825a121a915823e,2024-05-17T18:36:05.263000 CVE-2023-39434,0,0,bc693e7754388058b19485a72219b0597d4d79b71ecc558e086fe03a669881fc,2024-01-31T15:15:09.663000 CVE-2023-39435,0,0,2cde1591acdec05b9dded1c5b5ca1d20ab1200f3c8779b480c0f389d969c7be2,2024-08-02T18:16:11.260000 -CVE-2023-39436,0,1,91dbd45fc6d7cbbfca5793894245e11bf171465babb030aa24b814b96ad3465e,2024-09-28T22:15:04.010000 +CVE-2023-39436,0,0,91dbd45fc6d7cbbfca5793894245e11bf171465babb030aa24b814b96ad3465e,2024-09-28T22:15:04.010000 CVE-2023-39437,0,0,b841f4255101e124b17ae23b02cf5d1b090638a4fc3910c94f13b97ddb25767c,2023-08-09T18:19:10.230000 -CVE-2023-39438,0,1,8b59466a23cd4d7d7241f64763cc91bae48570db99077a0b129f81adc6171fcc,2024-09-28T22:15:04.123000 -CVE-2023-39439,0,1,34ef72977e4842aee96fb324aa892becfcd70f8ea4692a0db324f554980ef8a4,2024-09-28T22:15:04.243000 +CVE-2023-39438,0,0,8b59466a23cd4d7d7241f64763cc91bae48570db99077a0b129f81adc6171fcc,2024-09-28T22:15:04.123000 +CVE-2023-39439,0,0,34ef72977e4842aee96fb324aa892becfcd70f8ea4692a0db324f554980ef8a4,2024-09-28T22:15:04.243000 CVE-2023-3944,0,0,df00d3557db6753bd6b2ad3c7f11ec86b8aa42d5dfb831d8b5f3e11df12ce829,2024-05-17T02:27:57.947000 -CVE-2023-39440,0,1,6a2f84855caa69d956f5aa7ff3d81683e8055e06632176c19aacf42c40cf5311,2024-09-28T22:15:04.350000 +CVE-2023-39440,0,0,6a2f84855caa69d956f5aa7ff3d81683e8055e06632176c19aacf42c40cf5311,2024-09-28T22:15:04.350000 CVE-2023-39441,0,0,1524af4c21eae8180b90656f56e4a47c0f827b489d48bce7311f67eaeb7fc6cb,2023-08-29T15:48:57.633000 CVE-2023-39443,0,0,1a26c9a28c096baa05119ad2798651f43ab2b06c68ce772bef1bd6a634d5fb42,2024-04-09T21:15:15.770000 CVE-2023-39444,0,0,8b67b0a3f75b53fd0b4a8e0d327154f6629b9f5e5973540fb30aa61cc1ab9e84,2024-04-09T21:15:15.873000 @@ -230478,7 +230478,7 @@ CVE-2023-40305,0,0,a709c79a40741227f412ea5137931cdb24c45c1293363bcf092e9d35a151d CVE-2023-40306,0,0,bd6bf8b0706e3eb9376e2fdb97bbf36506c5582490b9ed214eb2d3c01e19bf67,2023-09-13T00:38:01.823000 CVE-2023-40307,0,0,ddcb42995f545b3dbd573d42be7cd65a62e5d161097fa3407e331e12871a2c1c,2023-10-02T17:49:25.247000 CVE-2023-40308,0,0,98c43c86dcb343e085b8745a6568623d24b202c96e4353c1ce375574045aa4e5,2024-09-26T19:15:06.487000 -CVE-2023-40309,0,1,1b0bc6771b82c947113ef68944a1650f468aef63818b03d82f35201b0306ca2c,2024-09-28T22:15:04.460000 +CVE-2023-40309,0,0,1b0bc6771b82c947113ef68944a1650f468aef63818b03d82f35201b0306ca2c,2024-09-28T22:15:04.460000 CVE-2023-40310,0,0,aafae91f872ed8196d989ce6f92724af64aa9c420d18d46f56352ee69e0632df,2023-10-11T19:10:10.253000 CVE-2023-40311,0,0,97ab1d90ac0eabc8fe9eefc1eb35bce10058e81ca86a8abc18ac988d8880435a,2023-08-23T17:04:28.627000 CVE-2023-40312,0,0,acc8e0b15b4384682b1bc786a01efe9878d67c6d102843423d8c8719fa2528cf,2023-08-23T16:58:38.697000 @@ -230770,7 +230770,7 @@ CVE-2023-40617,0,0,3a460a0fe7b821688e96669bfca02ae7badd6e98fed7bf3e4d4aef8e02c15 CVE-2023-40618,0,0,b22f1e470705cb01d295026df0efcfb6a0941d66f006698c10d413e612027e8a,2023-09-26T14:09:16.680000 CVE-2023-40619,0,0,f1489f101809c6a30e839362b8151d60789a86328685856374a0c0ad5eacef3e,2023-11-03T11:15:08.183000 CVE-2023-40621,0,0,03427c02c9886665707f46cfbc8e9c6c323eed2cb28445fd2559ec4dbb9a0abd,2023-09-13T14:46:22.113000 -CVE-2023-40622,0,1,f4743d29cb785e0e3a8d8e81eda60ec8ac35200da2c21645734f661d2a256cd2,2024-09-28T22:15:04.610000 +CVE-2023-40622,0,0,f4743d29cb785e0e3a8d8e81eda60ec8ac35200da2c21645734f661d2a256cd2,2024-09-28T22:15:04.610000 CVE-2023-40623,0,0,5ee5e0592116f6d4636a97205259d6bf210e0a97114ba463eaa2c70bbcfc42a1,2023-09-13T14:45:19.633000 CVE-2023-40624,0,0,747cb3d54257bb2c6b03c46b6a0b19e07ee27d544e5eeb8ae834154eb4c91df8,2023-09-15T16:24:06.913000 CVE-2023-40625,0,0,f9655b86ad188075706103365b8f2083509d75f1e65a1d7efba6dfc1f629e08d,2023-09-13T14:59:43.357000 @@ -232086,14 +232086,14 @@ CVE-2023-42471,0,0,3d47fcf90090571e29593e83e592637a2983aee4c755b0502ea61f6a8ff0f CVE-2023-42472,0,0,d4b6e31aad9009b5c9e01ff4d5ef8ee885211dca89fab65e12e85f27feca21c4,2023-09-13T15:01:22.793000 CVE-2023-42473,0,0,3dc315884c13bf461401454525346c0be60bd374f097b946976815a94631c8ed,2023-10-11T19:10:40.223000 CVE-2023-42474,0,0,481ae6b0e8f41d4d61d692a5cd2060771c556db8f6828058322fe13af59a07a2,2023-10-11T19:14:12.600000 -CVE-2023-42475,0,1,c1b0ee1eba3e5fb512186b0dc30efe85ed7379b2a5ac26055cf44270cbad052b,2024-09-28T23:15:11.563000 +CVE-2023-42475,0,0,c1b0ee1eba3e5fb512186b0dc30efe85ed7379b2a5ac26055cf44270cbad052b,2024-09-28T23:15:11.563000 CVE-2023-42476,0,0,3b3dd9807a0f4ed6ce2468f7a4ed8fe4e9ea19bf3c6d0591c051ac24ff0ad738,2023-12-14T00:07:10.443000 CVE-2023-42477,0,0,fec4e6b685afd7509507459ccf95b2de9653675dc5d035947dec6f17dda7c351,2023-10-16T18:14:29.393000 CVE-2023-42478,0,0,c4c7f09ad08c692378f0a61d49fca19f206097275d23bd3ca18b775839aec945,2023-12-13T23:23:46.593000 CVE-2023-42479,0,0,f0b1e6ab673626b705998f4f2380ee9d6acf6b1d897467ec67c33bbfa23aabf0,2023-12-15T14:49:29.267000 CVE-2023-4248,0,0,938b672c9f5bfea09c245c341d3b357ab47d1817c22604b02cdc3f59b07bf2f0,2024-01-17T00:00:16.260000 CVE-2023-42480,0,0,b4c996dc097786af55fa5d04a9ac4df88342c244f821e059bb278dc9d11beef4,2023-11-20T19:59:14.070000 -CVE-2023-42481,0,1,24868d5de151eec6717fda4925ac65c6552a60bcbde5db803be9c2861b2ed7f3,2024-09-28T23:15:11.717000 +CVE-2023-42481,0,0,24868d5de151eec6717fda4925ac65c6552a60bcbde5db803be9c2861b2ed7f3,2024-09-28T23:15:11.717000 CVE-2023-42482,0,0,9c5cada0b75438fb7635b87fbd7757cce171c67bbc4934b1768b3b34aa22b31c,2023-09-23T03:33:36.887000 CVE-2023-42483,0,0,884b55162d96c6c79bd2f0068448c5d90c631bb990c572d1d302d6389b80e217,2023-12-15T19:13:42.503000 CVE-2023-42486,0,0,033e47c7d5f41ab68591c7c5f1ab98fccccaf7fc715f16f8625db94f13953ee8,2023-09-28T17:50:46.877000 @@ -233743,7 +233743,7 @@ CVE-2023-4503,0,0,9a35d49a48b71f7276fb8172166d6d1aecccabc3aade6184e25e8c96138a6a CVE-2023-45035,0,0,48123901d1326f450c18d3b0ccad106d9e148b3033fe2b672e89055fc85cad07,2024-02-08T03:48:56.403000 CVE-2023-45036,0,0,5b3e2bf8b11caa6b50968173d283a1eec4ca6a58ec51bfb3f0740601e12c6547,2024-02-06T20:18:45.043000 CVE-2023-45037,0,0,d9bef7c23ea9eb8863eec401793407eae857058b6098d8a56b377750f03a7bed,2024-02-06T20:18:34.557000 -CVE-2023-45038,0,1,067d3daf830335f4445bbcc95af30c7b0b231a5ec96e22c57e090e46928a561f,2024-09-28T23:51:34.580000 +CVE-2023-45038,0,0,067d3daf830335f4445bbcc95af30c7b0b231a5ec96e22c57e090e46928a561f,2024-09-28T23:51:34.580000 CVE-2023-45039,0,0,e8930afda8d133bbe65ee717cfe9224bd9cb5c74f33c400953a957a39946a6d1,2024-01-10T16:59:35.883000 CVE-2023-4504,0,0,48b788a38cbf3794838d5825f4a3d5b50fb58219a94aae40cd43de2ab240310f,2023-11-09T20:58:00.163000 CVE-2023-45040,0,0,4264dd7f7c1bfe78bdbabea796f0de0efca1ab106d71d9c726cef2ae7b66f8b6,2024-01-10T16:57:27.477000 @@ -234574,7 +234574,7 @@ CVE-2023-46170,0,0,b897e9040bc030afe42cc5ad50415f5b2a52be10b387946ecb760ebb83cc9 CVE-2023-46171,0,0,067eb3c906679b90befba2ebbb666473745b4c0ddb0eb72710945cfefe553217,2024-03-08T14:02:57.420000 CVE-2023-46172,0,0,092a5bc4707e81a78df1953ec9ce275dfb73bf37fd52d1a82132649756bfbb84,2024-03-08T14:02:57.420000 CVE-2023-46174,0,0,e8a730db2f9b95cd824eb3fd6260ec3880f9f6206b85cad568934b876c5895fa,2023-12-04T18:31:04.347000 -CVE-2023-46175,0,0,b75bd46745093e62b15eef9b81466192413c2e8106e05fff76e76c34b4db89dd,2024-09-26T14:15:07.247000 +CVE-2023-46175,0,1,9c4556cc95984a76748cdfc45b19904c4348b65a2382aaecb1dff352fb7833e6,2024-09-26T14:15:07.247000 CVE-2023-46176,0,0,d96b210af3c575f1f7efaf22b5814a185a031da74e98ee061bf7a6a9ce416250,2023-11-09T16:55:00.637000 CVE-2023-46177,0,0,ef12581f32d09a7580bd99c5d47910cc8a5ca1b2278b3178114242471a29e5c8,2023-12-22T18:46:12.510000 CVE-2023-46179,0,0,7df6f632e5ebdfe2ac0791e3008fa37e3348cf878b1be369c5905228f1b85279,2024-03-19T17:06:48.300000 @@ -235586,7 +235586,7 @@ CVE-2023-4756,0,0,60c65032e5b93776fef6f38ba2fedf37023289c4f2a24ceb78bc3b2f406a9e CVE-2023-47560,0,0,5ac28e7e9a66106b736371a34b3097e66ad1cda34200867e184b83d8e20d363c,2024-01-11T14:07:09.593000 CVE-2023-47561,0,0,8c6823c8294618b7f2c78f304596bd27d313bc780b9a248a6002fe2f9ebd6d0f,2024-02-07T17:51:35.570000 CVE-2023-47562,0,0,eed5fa12d7eedb3933e2c8a9aa4171d8041e9fcfcc221d3d86745eee17563b9c,2024-02-07T17:50:38.510000 -CVE-2023-47563,0,1,a18ec77086e0b85a091c4b2d33d65478f0d4b9cad261c6a0c8d5816eb317a727,2024-09-28T23:47:40.683000 +CVE-2023-47563,0,0,a18ec77086e0b85a091c4b2d33d65478f0d4b9cad261c6a0c8d5816eb317a727,2024-09-28T23:47:40.683000 CVE-2023-47564,0,0,34d735757dd301c9641e82718c2dd925495c3b8fb8af8ff042788502c1634ad5,2024-02-09T19:33:26.900000 CVE-2023-47565,0,0,282333723d94196bbefe55ff568702e2610a6820a9456aa9fe6ac73919207aea,2023-12-22T02:00:01.337000 CVE-2023-47566,0,0,26a4a10ebe40b2b5bf6badce33dd8f30d8b09a56a91b1061398ee28499d68a36,2024-02-06T20:18:26.263000 @@ -237054,12 +237054,12 @@ CVE-2023-49573,0,0,668d26e17886603090861420f97df7110444aa6097038cffa9edd3fe881cb CVE-2023-49574,0,0,cf12ec560e66df2f8e6fe14be56965158911ec99b9b79f08d7d31fadd9d28d5f,2024-05-24T18:09:20.027000 CVE-2023-49575,0,0,ac9ff4377f1f3563c349897d2a2875f9aff8e7a6d6bd9465a4e338b042bba3c4,2024-05-24T18:09:20.027000 CVE-2023-49577,0,0,337a8413375455feea032808d84500f8744a9a8b52d72a926a4fb84eb6b7aad8,2023-12-19T14:50:18.817000 -CVE-2023-49578,0,1,1167f5734b8f433be63e1ed4f7be6d7f7a0ce424c44e3fe6e46dc74ec52fce97,2024-09-28T23:15:11.840000 +CVE-2023-49578,0,0,1167f5734b8f433be63e1ed4f7be6d7f7a0ce424c44e3fe6e46dc74ec52fce97,2024-09-28T23:15:11.840000 CVE-2023-4958,0,0,b9fc19622ba6df397f2314bb1498399d57a97d8d3d77e1be35cc528df3591ff4,2024-05-03T16:15:11.227000 -CVE-2023-49580,0,1,1fe00926918ee94ed5d0f65be26556c618ba07b3209d13ab98392975d7829a67,2024-09-28T23:15:11.977000 +CVE-2023-49580,0,0,1fe00926918ee94ed5d0f65be26556c618ba07b3209d13ab98392975d7829a67,2024-09-28T23:15:11.977000 CVE-2023-49581,0,0,c752d9c8b49d3a50b30e010fb1e627be8921c15cd9f5ebf74ca53588cf11cd1e,2024-01-16T14:15:48.123000 CVE-2023-49582,0,0,254586a5bd35da117db3a87fcbf0665709da9c852d76af64aed9d2b7bc82d1ec,2024-08-27T16:04:58.657000 -CVE-2023-49583,0,1,17a566852cc5bd1ad30f2730f7b7805c66d84960c5d6f97f747b6a073ca3776f,2024-09-28T23:15:12.090000 +CVE-2023-49583,0,0,17a566852cc5bd1ad30f2730f7b7805c66d84960c5d6f97f747b6a073ca3776f,2024-09-28T23:15:12.090000 CVE-2023-49584,0,0,12b0484dfd67af5cdba226de40078067413392935bfd8575322e5980ac90dd4f,2023-12-15T14:26:47.663000 CVE-2023-49587,0,0,b72e8cc0e0b1f24503bc21b9e5a03faa03723a19fc8b810902b73346efe7215f,2023-12-14T15:41:25.777000 CVE-2023-49588,0,0,da1e9f5316d05f0feeebf32eba644409b9293543014b6e46be9637d63d764393,2024-02-14T18:15:46.310000 @@ -237592,7 +237592,7 @@ CVE-2023-50357,0,0,c49fba6a6b8ae43153115bdc180d0a50fda6badb9bd287f826717a708c649 CVE-2023-50358,0,0,affeae249fec946895d3bef4063e720c758024b3343a9b8cb10accf20047afe3,2024-02-15T06:15:45.960000 CVE-2023-50359,0,0,017df15c1e36b7a4da9c2a548d3a19bcce6cc2270ecdf18aa860e29b8b47570d,2024-02-06T20:18:14.547000 CVE-2023-5036,0,0,142ff7c8f9f78ca5371b9c6802e1971802347d9f04e927ee76b2acbd83ef8ec5,2023-09-19T13:18:54.193000 -CVE-2023-50360,0,1,27634f79a715ec48d12d4c3552f14cf2df45a967ec21f459defca999b97ed253,2024-09-28T23:44:50.720000 +CVE-2023-50360,0,0,27634f79a715ec48d12d4c3552f14cf2df45a967ec21f459defca999b97ed253,2024-09-28T23:44:50.720000 CVE-2023-50361,0,0,188b58f48ae349f3b9eaaccb10078a3e7a1f81ce543b15434a0caf573d93d149,2024-09-11T13:25:10.873000 CVE-2023-50362,0,0,31a964a4db386c4376a063900f0da816b2224f83fc7dcc60de4592c35a7b4c69,2024-09-11T13:26:57.707000 CVE-2023-50363,0,0,a3e5f8527cf755f8b94f6ecd1f1ebe83c8a25ee2cb0536cd8287e4c1acfd8207,2024-09-11T13:30:17.090000 @@ -237619,9 +237619,9 @@ CVE-2023-50387,0,0,570d9f4f035f72cf75b6fb2ec7a865d346eadbb37e839bf469ab56bd506c2 CVE-2023-50395,0,0,0e94ac3a53ddd522dfa1daba7864a823ebeef0121cec6b5f6750eb619a73d637,2024-02-13T20:35:06.703000 CVE-2023-5041,0,0,edfc474d6f8955b06b6b129c14854ffb36763d854b8ade07d6bf9f3581fc855e,2024-01-24T19:20:29.410000 CVE-2023-5042,0,0,17be57ec49e4200dc6b7de1783f7771b7237e91348201a865d65f3f8ff47b98d,2023-09-25T13:25:16.230000 -CVE-2023-50422,0,1,2e74a3fef27ae16d3512ba178b2cd1f8610f89b13a942b920a7dd95c102fa33c,2024-09-28T23:15:12.223000 -CVE-2023-50423,0,1,2150b034245e11b7172ea5c3d421807e644ba644bc75de8c2a84617f8a025ff4,2024-09-28T23:15:12.360000 -CVE-2023-50424,0,1,8c5083bac1ff92e08b481a632dbb35f753fe85f3cc8cb2fe6559ea5bb3362c14,2024-09-28T23:15:12.477000 +CVE-2023-50422,0,0,2e74a3fef27ae16d3512ba178b2cd1f8610f89b13a942b920a7dd95c102fa33c,2024-09-28T23:15:12.223000 +CVE-2023-50423,0,0,2150b034245e11b7172ea5c3d421807e644ba644bc75de8c2a84617f8a025ff4,2024-09-28T23:15:12.360000 +CVE-2023-50424,0,0,8c5083bac1ff92e08b481a632dbb35f753fe85f3cc8cb2fe6559ea5bb3362c14,2024-09-28T23:15:12.477000 CVE-2023-50428,0,0,24e245a5620aa9efed1739f31f330f49d3b1e7340a02a534f07d622180c9ee2a,2024-08-02T23:15:27.933000 CVE-2023-50429,0,0,cf7c3990876d34813be7786260b9d58e3f0ef74bfa3057d97d875c61dd198c94,2023-12-14T14:33:52.857000 CVE-2023-5043,0,0,24549f6a594c400161517cb178315694a2db415c3b53eae682adf0618aa705bf,2024-03-07T17:15:11.983000 @@ -239458,12 +239458,12 @@ CVE-2023-52916,0,0,bebcac5d0a36cd875bff11f8b42fd7bc5076a3c1c94e9b8c44be74509c12a CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000 CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000 CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000 -CVE-2023-52946,0,0,027665af3a95c242bce885a57036d72ab4d05d907993b38939a23679c8e99ce2,2024-09-26T13:32:02.803000 -CVE-2023-52947,0,0,ccb2009adb29ce3a99e99c3174cfb021d9380ff2b29fb7551e25eb4be5925d80,2024-09-26T13:32:02.803000 -CVE-2023-52948,0,0,f27873aad3e6cce7658137c3c68bf8d86334998ef309b2182fb8018ac160a7c9,2024-09-26T13:32:02.803000 -CVE-2023-52949,0,0,3aaadaa2b34a01037ee30611acf163c402f74462812c98c5cd909511ed67a553,2024-09-26T13:32:02.803000 +CVE-2023-52946,0,1,20e045551a05525bd02d771d699e1c8ac48012af353f0f8ecae8c441edb3d8bd,2024-09-26T13:32:02.803000 +CVE-2023-52947,0,1,cf529ded4204207b8a36b0083255389533c15f6066513f4b4382d5d646a43cee,2024-09-26T13:32:02.803000 +CVE-2023-52948,0,1,e12c408f99005296c87adfe95bbe9cca3bd73f2640b3c6ec2106a839d4666d91,2024-09-26T13:32:02.803000 +CVE-2023-52949,0,1,835ac97d6e66575186136926a7f310a93bb1ecab9193cafa743df7d4a79e7e61,2024-09-26T13:32:02.803000 CVE-2023-5295,0,0,41c6baf71065d9210a6020c54df01a479effe3ab43eb4f6a24f246bdbfb6c99e,2023-11-07T04:23:49.733000 -CVE-2023-52950,0,0,fa57b566107b39b2d95d24a4bfac3d2b2ff4308975b76bf21986294fbd43c536,2024-09-26T13:32:02.803000 +CVE-2023-52950,0,1,947190e9142a98990e5b4486d6761c1bbdd8f6ebe28b42c79c313dad341e9b06,2024-09-26T13:32:02.803000 CVE-2023-5296,0,0,476d33b024be332ac896dbf35bcf9a4f784c8ee1e5e045f6783134e6c34f6d9c,2024-05-17T02:32:59.083000 CVE-2023-5297,0,0,ae358353c2ceed16fa9e9e76c2608b86123b91774a8853eb6bb1140ab0dca019,2024-05-17T02:32:59.190000 CVE-2023-5298,0,0,b737514e302eee8d165af79674626b1e30c9fc6b7145814e6b6dce9deaaa8577,2024-05-17T02:32:59.290000 @@ -239526,7 +239526,7 @@ CVE-2023-5355,0,0,d098da85c3438a4439923ee92497d0182b232c38e4fd52ca79544ab5cc66d0 CVE-2023-5356,0,0,b84e22dbfe3e7f039bfa2ba9de491324959e04452175807ba95f8d42235b41c0,2024-01-18T21:17:29.540000 CVE-2023-5357,0,0,aac145c58c1f60e7437891e94ecbaeb6276a449d0d5791d2d8be58074c656d56,2023-11-07T04:23:56.477000 CVE-2023-5358,0,0,3843b7eb2b83630439823339cd1e7c1ebb5c2bfad1a924657ec37661bd127a4d,2023-11-09T17:40:10.643000 -CVE-2023-5359,0,0,cd4483b9f7bf2d1aaf987f9bdbfeb28e5957eef1198c2c0951f21be1c449e3a0,2024-09-26T13:32:02.803000 +CVE-2023-5359,0,1,42402c36cad9fb5596df5e7a4b23665b6683d3b672955f44cf9e79ab72d8bbfe,2024-09-26T13:32:02.803000 CVE-2023-5360,0,0,23416f23056cf7d0eaf89d196ff3012aba1f2266b06af6861779d6d467ce1803,2023-11-29T15:15:10.100000 CVE-2023-5362,0,0,80b923a43138bfee55c8b364d2d98e107b276de0395018a0792e2ca94e3f39da,2023-11-13T14:47:34.907000 CVE-2023-5363,0,0,aa6b9de3cddc01d0ae4091411012ff2b6c9a62ca78af0c9a8c40bad1d195139f,2024-02-01T17:15:08.743000 @@ -241333,8 +241333,8 @@ CVE-2024-0110,0,0,9d3ea028d3dde672136c07e8d052ddc3ffee906b5f050cc97127e00fa31f77 CVE-2024-0111,0,0,745fe4fa8ac2297a871814d16ec0cf5bf56a98c3501448d82308b7dc75a74f20,2024-09-18T15:22:14.727000 CVE-2024-0113,0,0,30ea5d78769c707d77ab5e88a1087a3bf4be86e316909498095d743b94b19e08,2024-09-11T17:34:37.667000 CVE-2024-0115,0,0,90525cb6d1df6f268f81b58c98763d2a78ce3017a9779cdc04eec9f2dd2bca4d,2024-09-11T17:24:27.393000 -CVE-2024-0132,0,0,d98f312fbd6937fab469823847d094d6a4ab0478e02c76c7b1d9abc22c4aaeef,2024-09-26T13:32:02.803000 -CVE-2024-0133,0,0,067827605362ddc11956f43a712725370cbca8bcd77a15d92a24cb14925c5a50,2024-09-26T13:32:02.803000 +CVE-2024-0132,0,1,eda7ee0edadef6ec9cb2c3493d33c997d2ed32b4a18322f4e48c77044ca64949,2024-09-26T13:32:02.803000 +CVE-2024-0133,0,1,dc8118cfdd62bde027b0be10a4f284011d28edd78a66df58663a80962bbc8e67,2024-09-26T13:32:02.803000 CVE-2024-0151,0,0,e688008e47f7f2b2995cf15f9fce74bb525b3898f5e47db0ad5b6ce2aa86a255,2024-08-09T19:35:02.910000 CVE-2024-0153,0,0,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000 CVE-2024-0154,0,0,e0c538dbc1a8e60b09b037cacd452435c496c209b1106146ca859e110f3efaa6,2024-03-13T18:15:58.530000 @@ -244299,7 +244299,7 @@ CVE-2024-21732,0,0,5b8477386d174238a16ab6890c874c5b9a2e295383724c8992520c310a411 CVE-2024-21733,0,0,5c1944b5f993b5404fdb05bb0e77d12a8bf708110b872f1231cf5e420e715391,2024-02-16T13:15:10.190000 CVE-2024-21734,0,0,885365a84c85d383ea10609ce715ea65d1a8ab1acecb51a21fedb1fc4873fc73,2024-01-12T16:34:40.870000 CVE-2024-21735,0,0,64afeafd3ca5ebe95ef19b8cb0b1a221cb3831f7e736f22e7bca2463c0261a93,2024-01-30T22:15:53.150000 -CVE-2024-21736,0,1,54442fb9b042c5f4e212c801d8862949178fa83601b4c5ba313c1abbb63c3c64,2024-09-28T23:15:12.587000 +CVE-2024-21736,0,0,54442fb9b042c5f4e212c801d8862949178fa83601b4c5ba313c1abbb63c3c64,2024-09-28T23:15:12.587000 CVE-2024-21737,0,0,59ff5ff1f6beafb8f0d3418ea62fa9e84b0ab8ac80ddfb91af2e3d93d716a188,2024-01-16T17:45:47.083000 CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc105,2024-01-11T22:54:02.190000 CVE-2024-21739,0,0,74c51cc55d726fea23dbc7423ad28b618c0ad3e8f250404a9e572e22bf0444c5,2024-06-26T12:44:29.693000 @@ -245075,7 +245075,7 @@ CVE-2024-2288,0,0,cd7c5230343a968ec1284ad6d84a2effc1ddaec094bc18cd1b2aea35c83f88 CVE-2024-22889,0,0,f0896593ec3ca9dd1c8d891024a90166832eac7f6f24d69ccef8118546590c89,2024-03-06T15:18:08.093000 CVE-2024-2289,0,0,88c8ea445f3ec0f52a4a4915f3451dfa2a58f08cca6c52d35d5827b3a85f59bb,2024-04-10T13:23:38.787000 CVE-2024-22891,0,0,c372c37d8d29f1a790c33c777dd74eb88692521ab57198e3805ccc92c63aff20,2024-08-29T20:36:05.290000 -CVE-2024-22892,0,0,18110de39823c3e06ea38ca94f028a674bfb46e06da92b6f4e626960f64c519e,2024-09-26T13:32:02.803000 +CVE-2024-22892,0,1,97c72da874f6b3d7dd05787b0c23625cd25353b2cf693bd534939794794fb011,2024-09-26T13:32:02.803000 CVE-2024-22893,0,0,e1e53fa1e54ff65fc5aae6a149ae9db0f2276c6ba02f1d9037ae0607db2029bf,2024-09-26T14:35:12.920000 CVE-2024-22894,0,0,ecc90d1f90435a146d50bcd73db1df9adeb9ffb1597740cac1fbe4451cd93336,2024-08-29T20:36:06.063000 CVE-2024-22895,0,0,ed8706063f1e23de8c688f7d1c47a27a8939e76d7f567287b7abe53b8af0f9ba,2024-01-26T19:34:53.417000 @@ -245117,7 +245117,7 @@ CVE-2024-22983,0,0,0dbb631f78d28923e9859c710e63788238aca3d525fba402be97c8a040ca0 CVE-2024-22984,0,0,fc6f2532d62536f57f6959754844311196ea55b6a39fbf85c7d2f459ee5381d0,2024-02-07T20:15:49.320000 CVE-2024-22988,0,0,bcdb5f15ed4779291106b8a41380d22faef3821d715b2e437ea810ac15384a3b,2024-08-01T13:47:02.130000 CVE-2024-2299,0,0,bcaf001b188a6a59c651086d5de9bc1bcbff13b9f9f974e12ea28b63208cc548,2024-05-14T16:13:02.773000 -CVE-2024-2300,0,0,5a595d4b99095a74a4db203295fa733fbea26b57d91af74227287d2cb117b609,2024-06-13T18:36:09.010000 +CVE-2024-2300,0,1,7a5117241d9098121463dddf0b884449123757ea52654c5bf7c4430ae3130af4,2024-06-13T18:36:09.010000 CVE-2024-2301,0,0,1afb458e5f9d4ae44ae9449a435822a07045827b45328651403747fa4ca77bd6,2024-05-24T01:15:30.977000 CVE-2024-2302,0,0,9c8ca2b584551a85610f3330e028ca3d92713288df58433993ed1dcbbbe096ba,2024-04-10T13:23:38.787000 CVE-2024-2303,0,0,1ebe4b64194b1b1065020a0476d184aafc80f6e9f9572bbc34db4238a89767cd,2024-03-26T12:55:05.010000 @@ -245865,7 +245865,7 @@ CVE-2024-23915,0,0,26daec6c21dda6d5d37818379de58533357f885ea52deb2834a097462a07b CVE-2024-23916,0,0,5077cd24018e805b075cf41f1ccac823739f63acd7350dd61dccd4ccae77329c,2024-09-20T19:07:23.750000 CVE-2024-23917,0,0,f3236f3886ac3a298029762564187aed866f84d01e9365abb654a21b0d966829,2024-02-09T01:05:22.180000 CVE-2024-2392,0,0,a1f238224b889878ea8101bb03eb85f7363cbe3f032b78dbb59584257d093c6d,2024-03-22T12:45:36.130000 -CVE-2024-23922,0,0,288cd2c46a3e75a5e0ef35cc35e0f6530d4d6b67a2eb2b42fa02b67f3d5649f8,2024-09-26T13:32:55.343000 +CVE-2024-23922,0,1,37a02ab971cb50385b7fc0a0489eb30f0ce2ddc6b2cc2fd3f3b240e3e9e970d7,2024-09-26T13:32:55.343000 CVE-2024-23923,0,0,018ef5fcdc300723cc2e14dae15017b4a930053d99c9fd577ac55b06f0be1909,2024-09-28T07:15:02.440000 CVE-2024-23924,0,0,fb697cc01f0647d1e21deb85e2308042905d41cb886de08cb4a4c797a6686033,2024-09-28T07:15:02.790000 CVE-2024-2393,0,0,df74eedb2cf97a7cc02bf0873514b7acec290c6b3a77795cc7def5200bf6c3d3,2024-05-17T02:38:12.530000 @@ -245892,7 +245892,7 @@ CVE-2024-23960,0,0,fda5fbb384c44cfd892f3a255575c7cf6ce4c2641fb844129ac1686dd7735 CVE-2024-23961,0,0,774760d9234af4b9b92feb77a30beda5760511ad18696f76b2ebaa44aee95b0e,2024-09-28T07:15:03.740000 CVE-2024-23967,0,0,2bcd51c846821f9a9259d670019f976da6ff4d771498869c33d238e656bb6765,2024-09-28T07:15:03.937000 CVE-2024-2397,0,0,00747e677ac07569e47a4b44c68849d40056dfcd1ae374307286b3eb2379c47d,2024-06-10T17:16:25.180000 -CVE-2024-23972,0,0,828a337376a97e45b1a3d6fb92449e5bfc2bd8dd2b86628021713c0c44f1d02e,2024-09-26T13:32:55.343000 +CVE-2024-23972,0,1,6c5c594b7898f5e185c6869f05332bf9954a24724f07056c10cd99db6873a41c,2024-09-26T13:32:55.343000 CVE-2024-23974,0,0,c245074da43acd228fb7b61c7f93435155d38dc53924647c7bf42e3ed476242f,2024-08-14T17:49:14.177000 CVE-2024-23975,0,0,8574349dfa5f2a0fe4ae15f83d2f9c7c0823899e45c716a2ca2f4f60ae30fa2f,2024-03-22T12:45:36.130000 CVE-2024-23976,0,0,16acbea1fb543126c77bcb211c592f37e28d378e3cd2df50f24701a7caca7cb3,2024-02-14T18:04:45.380000 @@ -246242,7 +246242,7 @@ CVE-2024-2473,0,0,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6 CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000 CVE-2024-24739,0,0,e6ef264a93a50eff13b25a0b1f96966e49da366ebdc1c075ecbe225ac111b0c5,2024-02-13T14:01:40.577000 CVE-2024-2474,0,0,e295561a11995d9c40e939a773b47208b6445581a981c9a04645753adc140ddf,2024-03-20T13:00:16.367000 -CVE-2024-24740,0,1,5a0025656e10ede9df3e0999b52fcdfd5a23388b4b1c6503aed4b2448caac40f,2024-09-28T23:15:12.777000 +CVE-2024-24740,0,0,5a0025656e10ede9df3e0999b52fcdfd5a23388b4b1c6503aed4b2448caac40f,2024-09-28T23:15:12.777000 CVE-2024-24741,0,0,055f4a536b488558e042e77fcf1dc4ede8dc674d4e491c7a235734621d72b4a1,2024-02-13T14:01:40.577000 CVE-2024-24742,0,0,87b67dd3de4a42ff5193bf6db8fa126263e616b4bc4dcdea2d08157e23dce2d0,2024-02-13T14:01:40.577000 CVE-2024-24743,0,0,951e24161363ed6730298781326eb91e2e05dd09153b345d01a5eecb04bc8312,2024-02-13T14:01:40.577000 @@ -246894,9 +246894,9 @@ CVE-2024-25640,0,0,3bceb9b54384127c8987d6d0f984f439fa5009d13bcb784ca7a9cb2c455ef CVE-2024-25641,0,0,676a26b1b2c12534fcd8ac5d05e0285f4f22783fa69470781479894a7e859c5d,2024-06-10T17:16:21.837000 CVE-2024-25642,0,0,62b98db44a08196f7b7012c39faaf86e5ea68b1167c724b1b57391d731cd46b5,2024-06-10T17:16:21.947000 CVE-2024-25643,0,0,531b402e512e75c4384caa610ae811e75e61e13fefc89fff8eb67c6e4dee7cdd,2024-02-13T14:01:07.747000 -CVE-2024-25644,0,1,b702cfb10f1d9840e7089aa6d4444498e1a0b1a9f6491295ca80b70c56a42bd0,2024-09-28T23:15:12.907000 -CVE-2024-25645,0,1,6bd46b6b76bf2191c2da23dbf63dbdf0c2ad3d8c1e837e15d8adaddae98d01c1,2024-09-28T23:15:13.020000 -CVE-2024-25646,0,1,a101219cbb661ecbc967b4403965684b4e383408a09ced0696a5c771abd09b61,2024-09-28T23:15:13.110000 +CVE-2024-25644,0,0,b702cfb10f1d9840e7089aa6d4444498e1a0b1a9f6491295ca80b70c56a42bd0,2024-09-28T23:15:12.907000 +CVE-2024-25645,0,0,6bd46b6b76bf2191c2da23dbf63dbdf0c2ad3d8c1e837e15d8adaddae98d01c1,2024-09-28T23:15:13.020000 +CVE-2024-25646,0,0,a101219cbb661ecbc967b4403965684b4e383408a09ced0696a5c771abd09b61,2024-09-28T23:15:13.110000 CVE-2024-25648,0,0,43a3c9df6a9798012b99a2670068513af50de7590b4bfb346569d85e9cedfb11,2024-04-30T17:52:35.057000 CVE-2024-25649,0,0,699eb0c1b6c1eb28f54aa653e10ca84f6b536f18d39e73450a463cbb2c01c545,2024-08-27T19:35:14.950000 CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000 @@ -248952,7 +248952,7 @@ CVE-2024-2816,0,0,1ff2465397674739fa53ccc9486babdbd16fc63821544c8b1e2bf9f4ddfd16 CVE-2024-28160,0,0,241bfdb3674a34e6849fc0ad74b8b7e2c84a649745fec71e6a1d767d5a523265,2024-05-01T18:15:17.143000 CVE-2024-28161,0,0,732a0ccf3a0c78179498ba4c5715c7787b053aa5997b6e9c437de4d97e88e833,2024-05-01T18:15:17.180000 CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bdefc,2024-05-01T18:15:17.223000 -CVE-2024-28163,0,1,b559a456c891fdcf20fbbbab8887f6be9d0dfdc7fd048fd9d3a99e789aac31bd,2024-09-28T23:15:13.217000 +CVE-2024-28163,0,0,b559a456c891fdcf20fbbbab8887f6be9d0dfdc7fd048fd9d3a99e789aac31bd,2024-09-28T23:15:13.217000 CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000 CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000 CVE-2024-28166,0,0,d799c0db8419cc219426077b2570c40e187024e21f6e37f4e3723cf31620790d,2024-09-16T16:17:15.540000 @@ -249415,7 +249415,7 @@ CVE-2024-2897,0,0,cedfc20da5ed85e9f84ef73f96b224aba1a7761f3b26b18165ca182e027656 CVE-2024-28970,0,0,1efe73e5129f5edf059395c3c0c53f1042e783e3281ac893e2ec310eecb5007b,2024-09-18T13:04:12.567000 CVE-2024-28971,0,0,977b1e796a504922885da69c0f7540513ab16cea6a678ad4098d22f0ec570269,2024-05-08T17:05:24.083000 CVE-2024-28972,0,0,dcd09dd1c8cb5d138c9b91d96467fdac02f663b71ca96fca6c2bdc82024bff7c,2024-08-23T16:59:11.070000 -CVE-2024-28973,0,0,262e9dc48324cc3e516a17b8c720e8fe9d3b1fdea64b4155ac52570610c76e11,2024-06-26T12:44:29.693000 +CVE-2024-28973,0,1,c5833936687fc47280c5de84f71bab0362ecad8e5c2b89ba9d836c1b9ea2e1df,2024-06-26T12:44:29.693000 CVE-2024-28974,0,0,9abba18f604ec1e999d11794eb149d52c94c8b05cbfba16cb362e87c9a7f33fd,2024-05-29T19:50:25.303000 CVE-2024-28976,0,0,c0cfcb815492d56170eba26ed04c4ed5dc48c34f8cfcf09f6c5238d2d54ddae0,2024-04-24T13:39:42.883000 CVE-2024-28977,0,0,595331eb11b0123839e916f01746f57387cac5ac57ba95b8bd9b5a83f3c745c9,2024-04-24T13:39:42.883000 @@ -249599,7 +249599,7 @@ CVE-2024-29168,0,0,4b03610f0e9707b91f6d4ca8302add5e9446f332d0532287451d81854b8e8 CVE-2024-29169,0,0,46ae3e5e128a47a51f9060fa5b406a480b0436c4fa2b267a42e0503161231bfe,2024-07-03T01:52:14.690000 CVE-2024-2917,0,0,bce749de88c117bab31f2480bda989ec4febf4f1b6cd352875ee070fe63e4914,2024-05-17T02:38:37.297000 CVE-2024-29170,0,0,b197fa7a7096d94d37c613ba2c6a7ee9897dd072a00f8dfa13a38fc4064e100a,2024-06-04T16:57:41.053000 -CVE-2024-29173,0,0,9ca53375c70fe72f2b313860e778605c05c0bdc38f7f9d1c319dc0f6afa02511,2024-06-26T12:44:29.693000 +CVE-2024-29173,0,1,b62456de8f4690ce00618be7c34a0b2cf8be7a1ae45ec9583315adfc494ef33d,2024-06-26T12:44:29.693000 CVE-2024-29174,0,0,2f89576d93360494ca2cc2b277086c2a427003cf8ac672efbf66eb7d6dd29f29,2024-09-23T21:00:33.127000 CVE-2024-29175,0,0,bf3d75b78a3d0440ae4550a31f6e6795d080c83a26a8a4e7e6b90f2099187102,2024-09-23T21:13:13.247000 CVE-2024-29176,0,0,9bb9fc9a997c8ced6f942799a8062b3dd4eb5bd750cbf43b5cc48cdf020c157c,2024-09-23T21:11:39.197000 @@ -250221,7 +250221,7 @@ CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1 CVE-2024-30128,0,0,c924b379265c859e8daf7f44eeec6d1dc40d7540b45d81bbd3137e5592a1e7b5,2024-09-26T13:32:02.803000 CVE-2024-3013,0,0,6f68abb10d211d077c48c60372c20fba216cedafa08cc66982d3e5be234b2590,2024-05-17T02:39:40.710000 CVE-2024-30130,0,0,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000 -CVE-2024-30134,0,0,18ed5e216495bd701aa0a43548a7e76bb8e22bcc4e3b9a342746a17029643012,2024-09-26T16:35:22.707000 +CVE-2024-30134,0,1,72156b2301a058f685d41be339215a4dca7c28cf56516526dfa6a5957d42c05e,2024-09-26T16:35:22.707000 CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919aee63,2024-06-28T10:27:00.920000 CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000 CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000 @@ -250282,7 +250282,7 @@ CVE-2024-30214,0,0,cf5accb9e4a3278486a75d6623c8c03abb4ef1fc50fe46650d28f97df932b CVE-2024-30215,0,0,3576a060ab4a3509fa025a4a09e391456b98e8a3ff1f9ef6a6adfedd520e279a,2024-04-09T12:48:04.090000 CVE-2024-30216,0,0,317fbed0703b9e56e6e6659964629ef86247b3618fd61971d8544005edb73b9f,2024-04-09T12:48:04.090000 CVE-2024-30217,0,0,dc7c143bac3a66c1917b4b2e1e571544199576af15f1c229990a317af3df58ab,2024-04-09T12:48:04.090000 -CVE-2024-30218,0,1,5f669f8b672f21460455ea72a76ee594e61362d8a5948a66529555605773b70d,2024-09-28T23:15:13.313000 +CVE-2024-30218,0,0,5f669f8b672f21460455ea72a76ee594e61362d8a5948a66529555605773b70d,2024-09-28T23:15:13.313000 CVE-2024-30219,0,0,58a0ce96139e860887241ec214de08a83f6a295a69c273470160597230c476b7,2024-08-02T02:15:21.560000 CVE-2024-3022,0,0,5e468669a1bf6780e691c70abcdca6d29e576f4158c740ba44cf88cd33320476,2024-04-04T12:48:41.700000 CVE-2024-30220,0,0,cdf9eb92198fd5f7ed28a64003f236fba45aaa8db3640801c81262851b43cc57,2024-08-02T02:15:21.620000 @@ -250536,7 +250536,7 @@ CVE-2024-30469,0,0,5f60e05589c3ee2464f9657ee501b05ffdf6e5d6a13b3d79ce37326fbe7f6 CVE-2024-3047,0,0,b22e2b3bd3f2ea2e1a9b8967138f5d24af468217212d0308948532706a31b398,2024-05-02T18:00:37.360000 CVE-2024-30470,0,0,48e5d66dc273af24da4e4b7519926c3e97f1d38856b041954b60e69533ae4645,2024-06-10T02:52:08.267000 CVE-2024-30471,0,0,d2c7175a640d9b74965331cf8285959ab05f361410426a885e08e10d5fad74e2,2024-08-01T13:50:08.403000 -CVE-2024-30472,0,0,ff82a3c23f1c4a2ca83919a1c935b9642eb03d2215981e572545ce0cdee1b7b2,2024-06-13T18:35:19.777000 +CVE-2024-30472,0,1,00bb1b58fdab892a36ea40136ac2fa59e308dd9cc355f92e428b81257afaa77e,2024-06-13T18:35:19.777000 CVE-2024-30473,0,0,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d56027e3,2024-07-19T13:01:44.567000 CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000 CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000 @@ -251310,7 +251310,7 @@ CVE-2024-31493,0,0,23786918c0e6bb606f80dfbf3cc1cf7aa62322ef3147c75ab2836cfafd79a CVE-2024-31495,0,0,cc64a104bd02c0ad2ecb59ee5b7d31fe176ceb300f836393c6f4ac68db9adc74,2024-06-13T18:36:45.417000 CVE-2024-31497,0,0,8d8d7f6d342d19eead9a597122971bd1c38180baf81620a11231640a58ff9af9,2024-06-20T19:15:49.960000 CVE-2024-31498,0,0,64e912cb7273640f524a86a4c4b92bedddd325f11af3ca69081c43f6ca10cd7a,2024-08-27T19:35:26.363000 -CVE-2024-3150,0,0,b97a8815b56839d2226aebb6cd7913d84c716ac8c4d2225d62974de2a6c38871,2024-06-07T14:56:05.647000 +CVE-2024-3150,0,1,69195bb0268f0d9c44b64d544ae820662fe7bc6d09e60627c417b378085c3c15,2024-06-07T14:56:05.647000 CVE-2024-31502,0,0,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87571,2024-07-03T01:55:04.920000 CVE-2024-31503,0,0,63f26c08bc84d4a6878a828315f5d6a190e4224cc41f797a0adf367284c5896d,2024-08-19T21:35:06.150000 CVE-2024-31504,0,0,ff5e6de58bbe8f153bd36ad8b71b66ea5d63fceb3d05f083e0fcf1527f2e563c,2024-07-11T16:23:42.943000 @@ -251378,7 +251378,7 @@ CVE-2024-3165,0,0,80972bb4e4cfe5922196180e44e15963a79521816e646014cac03ba5f7adab CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000 CVE-2024-31651,0,0,ff635ec14b868d2b93fa21d54db2cc160b86957cb7aa11437f2a0e792cdace05,2024-08-20T16:35:08.810000 CVE-2024-31652,0,0,2f3d2336fbc8f42d1dec7a1682c8c016320ebabd666e8e526baaf0f45acfa966,2024-04-16T13:24:07.103000 -CVE-2024-3166,0,0,04937860c731b46e9c6b95e68f13e5f7d601593cff28a841df90efccab79ba6d,2024-06-07T14:56:05.647000 +CVE-2024-3166,0,1,2118d9d21001c971cc655ae0425738c34bcbaa36794043093e86cc4003bdc260,2024-06-07T14:56:05.647000 CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9fc0,2024-04-22T19:24:06.727000 CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000 CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc54c5,2024-08-05T19:35:12.297000 @@ -251476,7 +251476,7 @@ CVE-2024-31868,0,0,be0ea2b246dea97d950d5311835807a91b45d404ab727e1af1e6a0979cb9a CVE-2024-31869,0,0,683e8c771fda682074fc448ea32be7db8fcec1e782121eb87243bff930796032,2024-05-01T18:15:23.843000 CVE-2024-31870,0,0,089cc53c4c4bda98698ee28fa3173d546c896f43008726ca3e29a627fc47e14b,2024-08-01T20:37:52.127000 CVE-2024-31871,0,0,7b402a738ae8306e1005160b5cd3c0ef58a4e7f0d19a95a39021f1b2af76b2f4,2024-04-10T19:49:51.183000 -CVE-2024-31872,0,0,35bb5c70e8c3756863dd791e983a5c400bb0bb995b3674843c891d5a94cbb790,2024-09-20T20:15:05.120000 +CVE-2024-31872,0,1,3db97c936d679b09f7c0cbcf4407389ec3057292bdc2f2624578bc78bf289dfb,2024-09-20T20:15:05.120000 CVE-2024-31873,0,0,24abe7baa992592d6db6d5399b8a686299aafff7ea0d5cb35804d3dfc3e91db4,2024-04-10T19:49:51.183000 CVE-2024-31874,0,0,e7d8855c4e811764eef94dcfa7dca9ed011409e4b80758da69813345c8ab3557,2024-04-10T19:49:51.183000 CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aacef5,2024-06-11T18:23:27.153000 @@ -251494,7 +251494,7 @@ CVE-2024-31894,0,0,657ebec51508a8a9e81a6bf77e1af55b91d39f1157660d9afa903879def9d CVE-2024-31895,0,0,fe374e20832c9aae350e47d74978bf183f5d5c0369f487d8af68df70d3c0f094,2024-05-24T01:15:30.977000 CVE-2024-31897,0,0,a9f6dffdef42db63de321f283f9008f4cc590873723e0b6ff14df57c7407f3ac,2024-07-11T14:52:52.907000 CVE-2024-31898,0,0,98b5fee92aa3e78db3b92a2045655a85910d78a165cc0fc0eb03d45c453d34fe,2024-07-31T18:56:36.063000 -CVE-2024-31899,0,0,31cfcb5ebc48543e7ca7fa9a01c37404dc03ede79fb90fa69a8e306b8f0d0e30,2024-09-26T14:15:08.433000 +CVE-2024-31899,0,1,07b49bfc9a3140de40692054cf70e51ff7e6f23102bae54fee696f03887a68a7,2024-09-26T14:15:08.433000 CVE-2024-3190,0,0,59b4ce24fb505a0884244f905c395c98b38f50a3b44829542252bc93265789b6,2024-05-30T13:15:41.297000 CVE-2024-31902,0,0,792ebd92048a7d574f1f4f622d29c5adae49f7f37a902660c4b217f76bba207a,2024-07-31T19:20:04.903000 CVE-2024-31904,0,0,77f4db6cab579901d99ba6c75def744c8e9197f1a2c93d4ffef011323b61b3cc,2024-05-24T01:15:30.977000 @@ -251609,7 +251609,7 @@ CVE-2024-32028,0,0,b956f2cb35d2eb76bf21787d66d076dfbdef597d363f9d56fcb9f1f9516d5 CVE-2024-32029,0,0,ec00582208fdbdbc31ad232b1ff8828b057f2b25e4f7f9338f4ce73ccf6c8240,2024-05-30T16:15:10.050000 CVE-2024-3203,0,0,078a888f044955ee21dac38b13cc5d17738d27cb49253338ebf5634d7de667ed,2024-05-17T02:39:46.670000 CVE-2024-32030,0,0,0cc5188210738d2bd5e371d19b9d5b90c9344f382557d9aac3c440080c3c707c,2024-06-20T12:43:25.663000 -CVE-2024-32034,0,0,b5467d4e9f409b5fe03470ce7d0cc45e72b58deccaaefaf4e42c193f9b601d08,2024-09-20T12:31:20.110000 +CVE-2024-32034,0,1,9a1075dc3ecef6a31f7daa5f2871304d15354db0074707a77fbce02ff79b0301,2024-09-29T00:14:35.067000 CVE-2024-32035,0,0,b52417dbe80b989e0254fdafa0c50f4c29942daacf259a60ac52b3e43909ce9a,2024-04-16T13:24:07.103000 CVE-2024-32036,0,0,f57c3cf4854e4cca51b91980c87b3c03c374ee26c761ceba488b1d3e6ee9aad5,2024-04-16T23:15:09.173000 CVE-2024-32038,0,0,62fa4dc9f26e7546b622776b845348b59460be296c28e06c3ae9322bf565dba7,2024-04-19T16:19:49.043000 @@ -252392,7 +252392,7 @@ CVE-2024-33000,0,0,4fa8fb2595c0457675d86cac50d60385335480588f2754c16c92238c89528 CVE-2024-33001,0,0,e89dbc37b1bbada386268abb25bbfd26ba11d29f63337f64d12b9c9ded295629,2024-08-09T19:36:18.637000 CVE-2024-33002,0,0,bbd8f2f002227dcd69fa7ae031c0a1ecfe37f7776553c4961a527a6eaa21d480,2024-05-14T19:17:55.627000 CVE-2024-33003,0,0,f92d99f5ef6ac0dd2fa77c8e3e4a82297fdecac133b0dd0df2ea5b03733ef6c0,2024-09-16T16:22:07.617000 -CVE-2024-33004,0,1,b4d4e30a06e9114efbe213bcb0a187e38c5d8d0f9c07694c65f258c76ba852d6,2024-09-28T23:15:13.420000 +CVE-2024-33004,0,0,b4d4e30a06e9114efbe213bcb0a187e38c5d8d0f9c07694c65f258c76ba852d6,2024-09-28T23:15:13.420000 CVE-2024-33005,0,0,b6e8581506b98b3d048c876ef09153cc5329e2b3c294dcc9c0512597d7564067,2024-09-12T14:39:03.480000 CVE-2024-33006,0,0,36d8448e64529b3242e1d14d3223c50e6fc2fd869abf9e54a01bde3e4dc1ca08,2024-05-14T19:17:55.627000 CVE-2024-33007,0,0,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000 @@ -252484,7 +252484,7 @@ CVE-2024-33215,0,0,f9635f87bc059511c8393decbd9afdfc8c1adc67d76d6bf1ee0f441704979 CVE-2024-33217,0,0,931f6caed27deca16afe48992fe19ff3bc360241c91b6cd818528eeb486c2c41,2024-08-07T16:35:04.690000 CVE-2024-33218,0,0,ee7d69983b37f9c6bf7e7a7a1874f78caedf9c878645e11206579f136a2c86ea,2024-08-01T13:51:46.453000 CVE-2024-33219,0,0,88db41ff645af4eb9aa3c0f9c25ab5a9fdf513c3fdf3a77e4c6808a67dc97b30,2024-08-20T15:35:08.557000 -CVE-2024-3322,0,0,6147980d29bf80cf73d70b09724819aaaccafdb583bf7c36a80c60dc305d7ecc,2024-06-07T14:56:05.647000 +CVE-2024-3322,0,1,e55b514365f4edfd08d32461dca85dba678afa08e3277cfa12a38dc6ce7e86b6,2024-06-07T14:56:05.647000 CVE-2024-33220,0,0,94878fc1442fb742de617743986fbb0ae7d177efb074829742c5a4e187579f4f,2024-08-15T17:35:06.067000 CVE-2024-33221,0,0,4c13ec1b720b7ec2ce94f445e942c2447ba67f3bae626d7dba251fb8b3437798,2024-08-01T13:51:47.243000 CVE-2024-33222,0,0,826b88c0df0010107f0595e8bf718ff48038d9c2823c40b87f1e329d93d630c8,2024-08-01T13:51:48.023000 @@ -253064,7 +253064,7 @@ CVE-2024-34075,0,0,5da4b38afe940e30356d7f8cfc346d6566a1ba741dea8ba465506ec525937 CVE-2024-34077,0,0,31442e851c955aa9945f0776918b7a4c11f8d38adcaf71b61df52b286a466749,2024-05-14T16:12:23.490000 CVE-2024-34078,0,0,9dfabba0f15cfcb159383479a7fa78dc12060b0d38698b03def607cb1411276a,2024-05-06T16:00:59.253000 CVE-2024-34079,0,0,047b20d453ed22b2c9238a036a318cfab2d6390422d9ac0a43a87d01bddd47f7,2024-05-14T16:12:23.490000 -CVE-2024-3408,0,0,324428315bee45d3aafd518b2834d944210598288988c14ae075750a99213d2d,2024-06-07T14:56:05.647000 +CVE-2024-3408,0,1,067fa20c1c86a0b7e827afccfe5101f5439cb485c499f43c28b8bfc6d472715c,2024-06-07T14:56:05.647000 CVE-2024-34080,0,0,04e7d157cb56563e9b6ae3413063ef4f7c8897fff39cfc6fef6ee0c59786b5d4,2024-05-14T16:12:23.490000 CVE-2024-34081,0,0,59bd3a052213b2000050e90eb97869fd7a5e0bfd844a1f6ce493f930af4d6add,2024-05-14T16:12:23.490000 CVE-2024-34082,0,0,72145cae379aff6a1272d937f8ee0caba928404f9d12f9c0fb3d88b23848000f,2024-05-15T18:35:11.453000 @@ -253099,7 +253099,7 @@ CVE-2024-34109,0,0,c9e7a028e318045ad0e07a30584a8cdf66484faf15b239f83d63fffcfc9c0 CVE-2024-3411,0,0,c5534494d0c0f328f6dd6a29b2c75cf0917384aed2d3044a8f39c15c542a2568,2024-07-03T21:15:03.933000 CVE-2024-34110,0,0,c15838464fcaf085b2c09e471beb2e732398e46cad7f992477efffffb5459007,2024-07-09T15:09:42.910000 CVE-2024-34111,0,0,19c043112b06522ffc5ddb9df0f8b999a9184efbe5f7c5a69c8e8324f21b6533,2024-08-07T15:15:54.520000 -CVE-2024-34112,0,0,4fedfdaae5edce40b599103a3734ea84d64894cb2c94870c6446a55052f431df,2024-06-13T18:35:19.777000 +CVE-2024-34112,0,1,e62a170073c335d4b2fa523b231a2040753ea6d61925540b759aae879b0a33d7,2024-06-13T18:35:19.777000 CVE-2024-34113,0,0,a2e9f7ac8776392f6be8ef1204f1c90f02f8da5b4c386f27bfe6c53f96f39c9b,2024-08-07T15:15:54.640000 CVE-2024-34115,0,0,cc8b9b55a33ad4e137b074effd11699dd96f8494f93e6413f33a6c251661c876,2024-07-19T18:02:32.427000 CVE-2024-34116,0,0,4851ab33470ffca4c1046ad0fdbe4ebf66556d22cc3b975d80dd125226b02f02,2024-08-07T15:15:54.863000 @@ -253524,8 +253524,8 @@ CVE-2024-34659,0,0,dd3f9420e24bf859148c793c2123fe1fcf6f82da97ec67367518f44415c24 CVE-2024-3466,0,0,0337eeb2bb11dc2971562c8acd5fd5c98aad745dda4239343a7e69d2339c0489,2024-05-17T02:39:57.717000 CVE-2024-34660,0,0,0b2d2bea24d7fa6e914da9f7286c2cb2a544faaaec97dda10fa17e8966604e75,2024-09-05T13:30:28.343000 CVE-2024-34661,0,0,39eda7ed3fc18d4431971deb4f86b7b12866001e42dbec50f2575ba9405dbbce,2024-09-05T17:57:44.563000 -CVE-2024-3467,0,0,e374e857871dedc74323eb41dbd5d91c0657bb0dba17f1a361deea2b5f1b2a63,2024-06-13T18:36:09.010000 -CVE-2024-3468,0,0,9cbc57c509ee4c447cef04d212cb9221d0311dbaa25def2d7e51d8a8ca44ea39,2024-06-13T18:36:09.010000 +CVE-2024-3467,0,1,f97f520f5797999559b92a7c0577ac536f47706a8739d6dd391d5611a09166cd,2024-06-13T18:36:09.010000 +CVE-2024-3468,0,1,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45e0,2024-06-13T18:36:09.010000 CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000 CVE-2024-34684,0,0,e8c75614bfdf726402b2e2e5ba5b4d9d3d56d8e0e55be88a08ea86e305e764ec,2024-08-09T19:15:17.677000 CVE-2024-34685,0,0,7b2238e6c0d6ba01f5b0c43be9387a7356e22cab609b2b92ef07aa910b7a9a4c,2024-08-29T19:29:14.440000 @@ -255196,7 +255196,7 @@ CVE-2024-37120,0,0,e217f7fee1fd744744a6e451bd7bab1af64ac11cf693c5332902861bc57f3 CVE-2024-37121,0,0,f38dd3795bb34ab592f0837185cc69e5390fe6be6ea0a7f8fed8aebfe54c3ef5,2024-07-25T19:27:44.087000 CVE-2024-37122,0,0,b311939d15bf048863cce658485cfe0a8e332201062bbe989c7fc9c6113ec98e,2024-07-25T19:28:05.110000 CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000 -CVE-2024-37125,0,0,1926a2a20e7e8a88feada3756dd9c2a47084207043bf6d3274f8bf49dee57db9,2024-09-26T17:15:03.400000 +CVE-2024-37125,0,1,a9d961e2fb8e09f2141c21357d68455764a0d5ffa479caa6b3e5fd3d9a63b85d,2024-09-26T17:15:03.400000 CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000 CVE-2024-37127,0,0,d9e870bed45357108f05b43be573ea51c7d15f5150f07ef26a707da9d896bb8b,2024-08-27T15:23:21.370000 CVE-2024-37129,0,0,1bda6b021f1f7698674c595a8a84e9d380a54f5551f6ad0383f5d9c8c50d327f,2024-08-13T15:26:46.890000 @@ -255334,9 +255334,9 @@ CVE-2024-37297,0,0,80b2958482b49c2c594bfcbdc02294260e55ba58ad36e98395d0881554b20 CVE-2024-37298,0,0,6f9425539bbf552d046145e15afc1050d4c995579ef3ea2bdc7c3c684a72f7a7,2024-07-02T12:09:16.907000 CVE-2024-37299,0,0,205f0b40a758fdc1dced6d887b5ea436463fde8aa45c00a6907effc08c197fd6,2024-09-11T14:03:56.993000 CVE-2024-3730,0,0,f3a19794b78dc38a637f07c4e7db0ac4195dbeda34c530b5cbd488b9ecb411f6,2024-04-25T13:18:02.660000 -CVE-2024-37300,0,0,a5778be8622feef55b9732e6b86bdcc9c5967af3b73afc79a75d4a72bcaaeb3c,2024-06-13T18:36:09.010000 +CVE-2024-37300,0,1,5590a189f2c80a2c0e69ad3b8771a19032b2ef2b4a268875ff14b77477677613,2024-06-13T18:36:09.010000 CVE-2024-37301,0,0,edc8a23be80a0adc425b4edf50a7dcbe1479a99dce59b837847fb08393ce0038,2024-06-13T18:36:09.013000 -CVE-2024-37304,0,0,c1762cc1ae3c3731d84a2756793836d9454a75dd5745ddee667cf3fda006592c,2024-06-13T18:36:09.010000 +CVE-2024-37304,0,1,51ff2c81cd80d88058aa6d3b84ff7bd3ddd43c76d3fb15284419f7add985f2a7,2024-06-13T18:36:09.010000 CVE-2024-37305,0,0,a35a18378d9858479faa1c229d8034f7e9f595e8a830d5cd9cde2fec42c2e7b6,2024-06-20T12:44:22.977000 CVE-2024-37306,0,0,793d4fb76d193c9cde6559e6d4f42e65455e8eb4e61b0bc936eaa6f9b8fbb6c0,2024-06-13T18:35:19.777000 CVE-2024-37307,0,0,c9350fb9c722ea4244fcc9a427b35c9640ee14da93784e0ff4f0738db7c1e293,2024-06-13T18:35:19.777000 @@ -255754,7 +255754,7 @@ CVE-2024-3798,0,0,0b85fa9696a9b911425afa5f1da8b23352f77c3b644e418948a0e7e7520035 CVE-2024-37980,0,0,70458b75bacf19393793b89d35eb3b322f8d4d2f01c38ded10361b8e8312542e,2024-09-10T17:43:14.410000 CVE-2024-37981,0,0,21e2c6f93736909ccf452ff971bb58314fc8d03f8877901219941882d1cdb65e,2024-07-16T16:38:46.800000 CVE-2024-37984,0,0,795bbd0d983da96a0e51622d507b54846875127f8b996aff715bb2b9778cfcc2,2024-07-17T15:48:09.993000 -CVE-2024-37985,0,0,39cc4c1144685243c81d5c05e5e6e5a1b46cf144b37a676dd13932a70cd88958,2024-09-20T12:30:51.220000 +CVE-2024-37985,0,1,8e75e8ded91c606cf6f8a7951d4db59fbd2c888177e5eb0c4c7845eff08923bb,2024-09-29T00:26:19.423000 CVE-2024-37986,0,0,2487af021a0226ccec4882899dac83c56eac5cd7eeb2fa0beb7fe3b7d12bbdce,2024-07-12T18:59:41.357000 CVE-2024-37987,0,0,f4bc331a9b09a336ebf69cac5128f3ddb41a4064b564c097fc6645464fecd53a,2024-07-12T18:51:17.253000 CVE-2024-37988,0,0,c86291a0f061c05259fe7a7336e8616b7d2b496dae2d1e3292124af3161a49e9,2024-07-12T19:01:50.753000 @@ -256015,9 +256015,9 @@ CVE-2024-3826,0,0,121760e16d238bf81106004c4251c8d93e688e0e085277d4609f0e75162701 CVE-2024-38260,0,0,73cef9e77ce89bf4b93fa7a1c854f856e4e4e75ffa70f23f415d57a3b75d2431,2024-09-13T14:53:26.410000 CVE-2024-38263,0,0,f46aea6861be934017dd7285d8a02938dbd0902e0b8a60fe9326066622646e6c,2024-09-13T14:55:01.400000 CVE-2024-38266,0,0,24812493931b23eb9f9c734be2317a33135a030c22860333943c8effa1ea4408,2024-09-26T13:32:55.343000 -CVE-2024-38267,0,0,2fe5ef79ae85270f08892985c9883163123d649aca77dfaf0ef82768417471ae,2024-09-26T13:32:55.343000 -CVE-2024-38268,0,0,db4e1ad75fa11f1e2c0c6332c52c15da04d790270a9056389973fec1490284d5,2024-09-26T13:32:55.343000 -CVE-2024-38269,0,0,e1e1f65c7a4f819c54fa9971f1e2d7a989a20b193ee3adb19d03222ae444cc6f,2024-09-26T13:32:55.343000 +CVE-2024-38267,0,1,426ef76391e52179796d69722c1e6184195a0162d5d19291c21598bbd78baad6,2024-09-26T13:32:55.343000 +CVE-2024-38268,0,1,92a0c4a82d9460cc65e66847ab3334c788ea573a7327133d535283fcb8163480,2024-09-26T13:32:55.343000 +CVE-2024-38269,0,1,41f451c8b5b4cf859e625975b6beae09c4c0b5deea4e8c00e6cd95f1a11b2811,2024-09-26T13:32:55.343000 CVE-2024-3827,0,0,fe9452c74994fbdb1f4a1edea576f588d513e300bcd491a382890605454b836b,2024-08-02T12:59:43.990000 CVE-2024-38270,0,0,1961d440f3358bfa7071d7e107f3bab1b4b617abe6229812924e38655d765076,2024-09-18T18:23:40.977000 CVE-2024-38271,0,0,9834d9a0550777bb280ac01d7ed323683d684e57908edc4058e727ad92f2608d,2024-09-24T19:29:24.630000 @@ -256058,7 +256058,7 @@ CVE-2024-38319,0,0,baca4c6dd463198ff6e83e4d1d026e029418f6c2a504c13c76e1be823b804 CVE-2024-3832,0,0,9a695728462575e75497ca13bb41d4307d467f786773e32ceb92b024954b50b9,2024-08-14T20:35:21.240000 CVE-2024-38321,0,0,2710f443b4070c40eb4ddb90b32a5c6553d12d8c8899edd19abf3192e0c71b2d,2024-09-06T14:50:53.583000 CVE-2024-38322,0,0,74b9e97c7c82afcc24ac902608f17e4ba9d4e2fd0a18a6e0da522de36e8692a9,2024-08-20T17:27:59.567000 -CVE-2024-38324,0,0,f57f8a702b266b6d28df4513189d781dfe9dc288b61d035c1b1282ce254d7a7c,2024-09-26T13:32:02.803000 +CVE-2024-38324,0,1,8c33bfd1ae62181ab5f40aecacdd14d6e1d45514e242b2834b7129f23496c225,2024-09-26T13:32:02.803000 CVE-2024-38329,0,0,515bd4f8a6975d0242eb5160bb598bf35297ce9bdbe7a3832edd58be7833ade0,2024-08-03T12:15:16.803000 CVE-2024-3833,0,0,d8bd7ba32ab0c5df93ed1bc71c84eca78bd804cb628236293c000739d365ad50,2024-08-01T13:56:42.740000 CVE-2024-38330,0,0,33b4b1d171beda816ad627337fb5495a328e7dcd46af2bf62178f6a78527c9e7,2024-07-11T14:53:16.417000 @@ -256460,7 +256460,7 @@ CVE-2024-38858,0,0,c2e046d5d75320cc690e509cc93285ebeb3c1c26a8f79c6f003385d5db961 CVE-2024-38859,0,0,de323bde3647e4f305c3b46157fa86379bf5b570b3bfbebf89dea8495917b5d3,2024-08-26T15:15:23.727000 CVE-2024-3886,0,0,637917caac7fdeed5913d854d310583d9de4da2bf7f910a461c6efc8f1bacf15,2024-09-03T18:48:14.927000 CVE-2024-38860,0,0,266a5ea7baf50ab92e42d7685db3a6cf2803dcca1365001a34024abb32b3b89e,2024-09-20T12:30:51.220000 -CVE-2024-38861,0,0,efb98c795d304b64f37f693cf2805df11904abe5bcc6e764ab68cbaa742e4165,2024-09-27T09:15:02.873000 +CVE-2024-38861,0,1,de57b8c84f052f5e4dbe7761f23a1d7dcd731f578a432762b8e5c5cf76194bb7,2024-09-27T09:15:02.873000 CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000 CVE-2024-38868,0,0,f5122b748e151420a9f3845d24af4920bd437f9bfb8619e2cdc643a0cfcffcd9,2024-09-04T19:13:29.983000 CVE-2024-38869,0,0,c0f887639cd5f8290b163362347e9df211e2de0bfae6dfee57ed54004469d16e,2024-08-30T18:15:07.150000 @@ -256642,7 +256642,7 @@ CVE-2024-39274,0,0,6d4b03e5d97ff9e2231b9be6769126c78b619f16e46745a1adeaad7d24bf4 CVE-2024-39275,0,0,ab9311e8c17c5cead5320c770d56f66a0814f9dc1363bdd82612f13758d50912,2024-09-27T18:15:05.173000 CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000 CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000 -CVE-2024-39278,0,0,58069499df62456724a7513c2a4610cfda6b008bc65dc970841f8e87808cbcaf,2024-09-06T12:08:04.550000 +CVE-2024-39278,0,1,0601498c3389c5dd00f8ed9530dea3d77d09d81c315f48a8850ef30911e72e8d,2024-09-06T12:08:04.550000 CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000 CVE-2024-39283,0,0,3cb180f3de5aa4a3b64779758cf8f61008b6ae73b857127aaaa5aa752ce57774,2024-09-12T19:15:46.390000 CVE-2024-39287,0,0,95145d1fbc5d3c99088ebf6343df14053c1bba8568afd021848bf0425c858769,2024-08-29T14:23:31.807000 @@ -256652,7 +256652,7 @@ CVE-2024-39292,0,0,1e56ccb176115700ab782778ca3caad0c0ce72d927e8ec4deb0eae57f1b32 CVE-2024-39293,0,0,1fec2940f1bd80b7fcd0ef6093774070c9cb79d5cc06d154bd66dc488c9431e4,2024-06-25T18:50:42.040000 CVE-2024-39296,0,0,1505e8dd09a63330ec5436e9f86022e9b63137e3bb41d294e6c4ca091f2e08ed,2024-06-25T18:50:42.040000 CVE-2024-39298,0,0,ebc8c1ac57b6c8432c32f877ad1093e868a3d2381cb98ee4d7cf51055258ad60,2024-06-25T18:50:42.040000 -CVE-2024-3930,0,0,537f11b71a41ea6556e1d48aaa3e75500c9c3067a6bc87bf1a804e2f1df62a05,2024-07-31T12:57:02.300000 +CVE-2024-3930,0,1,54b8e4aa07087aa149fa9bad599c7a18dec56c1b93dd2d2499327bc3c7940bbd,2024-07-31T12:57:02.300000 CVE-2024-39300,0,0,06c907e887f3a9a49c8c034a570476f82ab0d4832c162f4aa9ed409176b9d3d3,2024-09-03T14:57:54.137000 CVE-2024-39301,0,0,05ede2147c0414ce0c80c5aedca5b458241dd00889546d94391bc82da8555dc6,2024-09-03T18:06:28.743000 CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000 @@ -256672,7 +256672,7 @@ CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdd CVE-2024-39316,0,0,0330ee1f4f66ad5c4fc8d75b41d6a1a5d4b46137b39514674c0311e081ce6ff7,2024-07-02T17:44:45.700000 CVE-2024-39317,0,0,bae2aa4f7badec0edc31db102a83207f0bd6d840ba46b9f715d3db216be3b8e0,2024-09-19T16:08:43.417000 CVE-2024-39318,0,0,d84809b5481c68217d59c341f89a33a753d6db4b36e662db9d71acc330a074f7,2024-08-01T12:42:36.933000 -CVE-2024-39319,0,0,058415148f2313b68e6ad4de00b734155f4f49a7308fced76493fba15af23cb8,2024-09-26T16:15:07.947000 +CVE-2024-39319,0,1,91427d9ed878735bd99e1803488e83a78233c7fcae651eda382ab6910ffc8ce4,2024-09-26T16:15:07.947000 CVE-2024-3932,0,0,d78b7c01d3f6b397349c50b0cef81a61649a3d63b8878b7ded7786d99bb82db6,2024-06-06T20:15:14.030000 CVE-2024-39320,0,0,e4457acba8f556f298935fbc133601a3fb3b1932660972d8c1667e76d43acbce,2024-09-11T14:09:44.857000 CVE-2024-39321,0,0,25b62962ce26575b135148ce4bc78df297e90148993ee6065a33a42f83d7ebff,2024-07-08T15:49:22.437000 @@ -256771,11 +256771,11 @@ CVE-2024-39428,0,0,5d03789c96f23918b1ab1ea6fa6e056174329d182d27e72cc9dae9827964f CVE-2024-39429,0,0,e5307c82d36950beba8c9942e931fdf6e3ccb2f9d59fae72d11a48dd470f78ba,2024-08-27T17:44:02.903000 CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000 CVE-2024-39430,0,0,1e2b9ea56442b26f7737a9950103fafe605e5c7a90c854837eacf7ef42d0ec7f,2024-08-27T17:44:25.593000 -CVE-2024-39431,0,0,44e8650714a4327deffbd54b3f3d6fb6ad5e6ae47c0934191e138032ca222839,2024-09-27T08:15:02.513000 -CVE-2024-39432,0,0,476d831a8d2c1a6f218b61b77d0db56d667966415db2f43c79df01c97914337c,2024-09-27T08:15:03.530000 -CVE-2024-39433,0,0,8ac806fb51c54c84676b2fce3bcd795d5053461ff1ba46372c3bdec8a52f9d3f,2024-09-27T08:15:03.710000 -CVE-2024-39434,0,0,3ed337b9d431095d63beeaba887ef251d9bd5fb8e6ae278b91a0a8c8f712f5c8,2024-09-27T08:15:03.873000 -CVE-2024-39435,0,0,2e1bfae8fa45687dd12c58f92e4a38002965ee849bfe67f241c090a5d41e5ae5,2024-09-27T08:15:04.030000 +CVE-2024-39431,0,1,66931d5fea012032a4cc38dde303e83da1435c7ef31127696e0f162ca0aaa9d8,2024-09-27T08:15:02.513000 +CVE-2024-39432,0,1,6a181c3a6fdaf52948ae1a9c718dc793e15e76af06ab14ef8f29dd963c88c5bf,2024-09-27T08:15:03.530000 +CVE-2024-39433,0,1,d3723e2cf121ee7d59abd3045cab248baf49a68c6104e1be45088bcf5eaca811,2024-09-27T08:15:03.710000 +CVE-2024-39434,0,1,8d83fbba085547974f811661b6419c32b98cc9fd85d55546fa40dc52dcdaf317,2024-09-27T08:15:03.873000 +CVE-2024-39435,0,1,d26a28ed5369519c6f001d57e9ac342b6fef3c32f5d9c07b24b2a87415cc6e6a,2024-09-27T08:15:04.030000 CVE-2024-3944,0,0,5f019f02cc03a38e43d6ce346d35a78d9422843cd57b5ebc3224417ac95f2368,2024-08-29T13:25:27.537000 CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000 CVE-2024-39457,0,0,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000 @@ -256894,7 +256894,7 @@ CVE-2024-39571,0,0,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09 CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000 CVE-2024-39574,0,0,19f7903aaa2fe3131935c172a6b15d77efbdb8c9899ed2e523d65e46645a7e43,2024-09-16T15:59:10.653000 CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000 -CVE-2024-39577,0,0,c3126946705589f1c1d627503fe1e177cb5cacb7273fc38a629279e35af0b6b6,2024-09-26T18:15:05.717000 +CVE-2024-39577,0,1,7c99a2167f03955233bf02d24c0a140bb2d5a8e7e1fee9b2f5b7ed5b45187aa5,2024-09-26T18:15:05.717000 CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f0862047f9,2024-09-03T20:56:11.277000 CVE-2024-39579,0,0,3b10efac241247907da1969516918327fdf07736fefefce9e8f33c60526e18a1,2024-09-03T20:57:32.607000 CVE-2024-3958,0,0,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000 @@ -257134,7 +257134,7 @@ CVE-2024-39907,0,0,df8abc1aeb07f373ea5308560b353f7fd53a1185320b5683a20eb2e5a3415 CVE-2024-39908,0,0,08d14bdaf18f2ed74e9b6ee71dfe514c41d48f98781bfe1f038503cd39467df4,2024-07-17T13:34:20.520000 CVE-2024-39909,0,0,fbbc093407091179e71e1918858815533e9fcbe1a27be8ba832d91f8904f5c32,2024-07-12T16:34:58.687000 CVE-2024-3991,0,0,8fc5cec164b75a61473f46907d411f1d06a3bf1fdc70a00ae47e8c931a83fb1a,2024-05-02T18:00:37.360000 -CVE-2024-39910,0,0,d67276b705ffdb142dd572c0388b8819ed0afed9b3219c6aae07b50ad62baec0,2024-09-20T12:31:20.110000 +CVE-2024-39910,0,1,4f59441ca67abf68b87cd10e459713489107d4419e26c989617ec129302e1c9f,2024-09-29T00:33:03.740000 CVE-2024-39911,0,0,bbacd25e95749fef59927280207e8bffc7f13800b5a9f14e2561979475bf47e1,2024-09-10T19:12:28.007000 CVE-2024-39912,0,0,4436d60855b958a3375758a6aab42c07e9fab81e2780af44769632fe57f2c7e5,2024-07-16T13:43:58.773000 CVE-2024-39914,0,0,02387d67ec6b5ae42576fd903e8c611ccc330a426fa97d240f1f6c354444a7e1,2024-07-12T16:34:58.687000 @@ -257394,7 +257394,7 @@ CVE-2024-40662,0,0,158da2f06a1d27615161cee7fe7341ef1e87f2062801f47e3e4f4b1d6a166 CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000 CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f63,2024-07-03T02:07:03.943000 CVE-2024-40680,0,0,794f30a0300ebe158f9152f2f74e21707701b6ca05e509917be3b4037119800b,2024-09-13T20:55:57.213000 -CVE-2024-40681,0,0,f5857f90db1c19edf3c86f979ed1679bf60684e8d607e835b6f3bc264ec9335a,2024-09-09T13:03:38.303000 +CVE-2024-40681,0,1,9e895d78b484c0bb5ee482f02ff24ce83fbbdab55878447f7dc4bf0bb7a15e61,2024-09-09T13:03:38.303000 CVE-2024-40689,0,0,b737e3a1f88271d05934916a1e9611bb299eb972b578fcd1907e65284f8f8a13,2024-07-29T14:12:08.783000 CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000 CVE-2024-40690,0,0,90531c3f5bf2655a59eec8750bd49d0d616cedd303a52fde5af4cabda07abfea,2024-09-10T16:16:41.940000 @@ -257649,7 +257649,7 @@ CVE-2024-40986,0,0,e11c6af819396a110129f1e7859e06c0772bed04c3fb1bbbaea29870bb8d4 CVE-2024-40987,0,0,bd162da49fe1fb86bcc7ce9143288253658754ac905f49dbeb8377eff94c5a38,2024-07-12T16:34:58.687000 CVE-2024-40988,0,0,fee50aa21ac1f7599bace66ea0a5b4dd99eddaf99acede81ddb3e4c91a447b9e,2024-07-12T16:34:58.687000 CVE-2024-40989,0,0,2f3227e456cf3b119ccfa262dfec37e99ce70cb4da10bde2d819344e6e1324eb,2024-07-12T16:34:58.687000 -CVE-2024-4099,0,0,00bf42274a8b997f1b78babdd12a83899a1c4db5d30529b6ef2229935a4db7d1,2024-09-26T23:15:02.873000 +CVE-2024-4099,0,1,0be5009b04cdf94057b8c5b75407b321bc12867098cb6ef692cba8244f00df4e,2024-09-26T23:15:02.873000 CVE-2024-40990,0,0,cd4ca053a0ec5d11c69e407da176119a515b6b0abc494934cf9d76e0e1606550,2024-07-12T16:34:58.687000 CVE-2024-40991,0,0,ec2ddb2f3ffaaab4f22b585138329157aff6badf22f9c0dc433ce0a15fb727e1,2024-07-12T16:34:58.687000 CVE-2024-40992,0,0,59330320f1c372354ad798dc40538850329b5c6373bec47c4461455ccd576b86,2024-07-12T16:34:58.687000 @@ -257782,8 +257782,8 @@ CVE-2024-41118,0,0,e0eee055fbd470e0628dea6d9d48cfe33859b8a44e08917376e3579ed1fec CVE-2024-41119,0,0,2b2d1362b1256f26b7e3456598dbc750a32abaa8055aca23aed136bade558c26,2024-08-26T17:33:31.573000 CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6cdd,2024-05-17T02:40:15.740000 CVE-2024-41120,0,0,a70d4faa55c7ddaaf93976569e1c96bdce498cb1f9f22f75468c1ec57f8b4cef,2024-08-26T17:33:33.787000 -CVE-2024-41121,0,0,91cb53bc29963f11fdf64645513c1c2c3bf3f9456a5f423e3cb1f394f830e271,2024-07-22T13:00:53.287000 -CVE-2024-41122,0,0,a6a8383a81cf09c9b153a0323d2516ac8ce416bc61d76a25c8333778bb40d081,2024-07-22T13:00:53.287000 +CVE-2024-41121,0,1,eee6567dc6068e4098c4ab7d1e6ecee46fc76012014594fbc00d63fe0ec66f03,2024-07-22T13:00:53.287000 +CVE-2024-41122,0,1,6d25b2f6ad91782572e4d740b95fe916a629d19c9dc78c7ad036308c3bcc3f7e,2024-07-22T13:00:53.287000 CVE-2024-41123,0,0,1b9d0ba5e0ca489b31c9b708600ddad032ff5087a77d385d50002a73b3acee12,2024-09-05T16:12:21.557000 CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000 CVE-2024-41127,0,0,cb656d719f797ab9b0f4b867a7e6012c2f45c355cda77a51db0501f209b4731d,2024-09-11T14:52:15.690000 @@ -257926,7 +257926,7 @@ CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1 CVE-2024-41440,0,0,0bba27cb4081a14b1798eb2cddc147a76c07aeb5aeb07d5a7917e7317d9973b7,2024-08-01T13:58:41.773000 CVE-2024-41443,0,0,4b989230a84b85398c5698bceac0a0dd2b8192cac38c0d61b31ca0600868cc4e,2024-09-11T15:54:29.327000 CVE-2024-41444,0,0,5ea59719718418adee108f9ce5540b96facb8a58caf3370b9e6aa1a42ff02782,2024-09-05T18:36:39.773000 -CVE-2024-41445,0,0,e5dac03a6f420806146bdbb7e5230d1bc2d1049ccbc758bab775d58a1ad61cad,2024-09-26T13:32:02.803000 +CVE-2024-41445,0,1,083a5449dd1dde2e23599df982976518b7f26d9d920427b0f6d7949a0e3d9e63,2024-09-26T13:32:02.803000 CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000 CVE-2024-41459,0,0,9640a7afe79b79343a3929c52d836dc236bb14f56157fc3a97eeb523f4182cdc,2024-08-01T13:58:42.827000 CVE-2024-4146,0,0,44d4e6fc76499583267ad9d2982965e0b01277c59cea588fc1c62cd739f32cf9,2024-08-30T16:15:09.813000 @@ -258052,16 +258052,16 @@ CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000 CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000 CVE-2024-41711,0,0,a7d50100784e2b53720ec9203abd546adbf9c7f45f11894e83b991465b2f1919,2024-08-14T16:35:15.033000 -CVE-2024-41715,0,0,3580b1dfd7cdc37652048ce6a0da6aaf20ec3fb8c8996b4d66f16f3fa7386b78,2024-09-26T18:15:05.950000 +CVE-2024-41715,0,1,2eff0f2ab1df75431520d8eacfd37f1a6d52444e5f8e6e3f272a1ce8184368b4,2024-09-26T18:15:05.950000 CVE-2024-41716,0,0,add00a3b8bb5c856cb11efe54462b72e0907045ad71076c98ae404e938cc3293,2024-09-13T19:53:47.723000 CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79a72,2024-09-03T11:15:15.050000 CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000 CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000 CVE-2024-41720,0,0,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a971,2024-08-30T17:49:42.047000 CVE-2024-41721,0,0,a17f2b030998fd99e19cd291400da7030bbfa9d3d97c94e9d58d3ba36f26dd93,2024-09-25T14:35:06.917000 -CVE-2024-41722,0,0,4e14dd1d4603a85deaf2c4aad2a49bbc3c07eaca245af9ccc67137c9cd5d8023,2024-09-26T18:15:06.193000 +CVE-2024-41722,0,1,5d07f20d77edcdff2b0c48115f0a106e17545e598dc19737d2e74f4cc90da333,2024-09-26T18:15:06.193000 CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000 -CVE-2024-41725,0,0,12251843ec69e7a7c09cacb5c9511b5d8034e4eb21cfc97cc03cc46e86f1de90,2024-09-26T13:32:02.803000 +CVE-2024-41725,0,1,9fa43c2bc17c8b3a4f55f7cab7925b510f29704748d43554c32ada9221146150,2024-09-26T13:32:02.803000 CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000 CVE-2024-41727,0,0,f64de623c1f3cae418235db50af8da33c1315446224a7b8505bd8fc5343d1bad,2024-08-20T19:25:12.490000 CVE-2024-41728,0,0,99c94826375f1fb80dce15bbcf8a28085193444f8aab436fe5d670c8781915eb,2024-09-16T14:14:52.840000 @@ -258191,8 +258191,8 @@ CVE-2024-41927,0,0,28b0e861c649b30f117a5ffa21dceff5e2eb3f40c9e49c2283b3efe64f1c3 CVE-2024-41928,0,0,fac45a5eba953351f64e8420aefaa828221c1e8b109e75da05d07c8ee7a8c443,2024-09-06T17:35:13.400000 CVE-2024-41929,0,0,7547305bee5f10749b150ea9e1b86a9a69192b8070c36c448e7faebd542862fc,2024-09-20T12:30:51.220000 CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000 -CVE-2024-41930,0,0,25c57d6058236cfcab76a2760f3a8f8f2a5602ef5414f4c8c0da9dd617e3bd17,2024-09-27T09:15:03.550000 -CVE-2024-41931,0,0,e581cb8ef9d0ab39bf17ffa9fd706d91e871044d591d2982e81f15328d9af0c0,2024-09-26T18:15:06.453000 +CVE-2024-41930,0,1,63928bfdcc381b15d510631522bb1e512a85b5c66677d22982efc3b8854ef96d,2024-09-27T09:15:03.550000 +CVE-2024-41931,0,1,f180c6fca54cf52eee1343c8a59435802042a122aa78bb1e04626855b2ec0ff4,2024-09-26T18:15:06.453000 CVE-2024-41936,0,0,d330b2a32a604797fc4eb94f395ba3140911090caf0d19e4d7603d421735298b,2024-08-20T16:26:54.663000 CVE-2024-41937,0,0,17d01be9af92612ee6b4d89126a811836507d3fbf35417e172928be42551212a,2024-08-23T16:21:21.893000 CVE-2024-41938,0,0,3ab7c3a39df7962916b58b6a8012e354ce7c2e72731bfa6d3bfa597d2e12afa7,2024-08-14T18:08:42.777000 @@ -258458,13 +258458,13 @@ CVE-2024-42268,0,0,470e4d27aa12d8779499ba3b2e25164e689e6957fb0c4ad57dfd46175c593 CVE-2024-42269,0,0,491dada60f7e866fa32ebe8fcb0b4475c420242ae55bfcda826cc5feafe78ccd,2024-08-19T20:53:51.717000 CVE-2024-42270,0,0,b49f12c003a5a0b58712f7f59d9683820dd71ed90538d1c5cea863c711e0b061,2024-08-19T20:01:09.520000 CVE-2024-42271,0,0,0df7c75ef67f151a59228bcb8e14b7a35ce523209f0a0893d4ae076e680c9f4a,2024-08-19T20:03:31.840000 -CVE-2024-42272,0,0,e9fd13caa415324a90840fcf36b4a7f856aa001c7dd930380894db0c2ee1562f,2024-08-19T12:59:59.177000 +CVE-2024-42272,0,1,1b7bae7295bac968617b34ce16eeed5e4d17a65b3f99f681114326017ebaa241,2024-08-19T12:59:59.177000 CVE-2024-42273,0,0,89c3e5fcb30a2aae5aa3d49a5c5b01333443b5f3eb420974b5dde59246bd10b4,2024-08-19T12:59:59.177000 CVE-2024-42274,0,0,41adbee025c5f4a53a652bf0a753c3ea42a40dbdd574998956145692ea179777,2024-08-19T12:59:59.177000 CVE-2024-42275,0,0,1d4b2e93b72816cd6a71a64e9e12e8f0ea317c294fa31038a9062c70cd86a8ff,2024-08-19T12:59:59.177000 CVE-2024-42276,0,0,1cf69353aae1f5622016d0abc7d910b7648f9f601915d22e1d47d592ff1edcb4,2024-08-19T12:59:59.177000 CVE-2024-42277,0,0,19bde7d6dc9b4ed08395676e8f60fb260a552c136c888e4a84bff3d56a015f00,2024-09-10T18:46:21.620000 -CVE-2024-42278,0,0,801b233b4b9b90755c1b46b52beda140cb180ecbb2dc9426544b6b86aae6ba8e,2024-08-19T12:59:59.177000 +CVE-2024-42278,0,1,af1c28c8e89a179e1fa420f7dfccccb43b6e94042a487c7a74866a983c0b018e,2024-08-19T12:59:59.177000 CVE-2024-42279,0,0,4072eea42cb14ef4445f722c9302e69097aa69e91098ddb0b91b0bf4f0001b6d,2024-08-19T12:59:59.177000 CVE-2024-4228,0,0,22331e972270e81a8a4d9238da77e1f1eab8644e20c13e517da1e3ed609f3be8,2024-06-27T12:47:19.847000 CVE-2024-42280,0,0,1694248546c938a9fc132aaac5ad50510fba699e64b961da898fcab9edf57703,2024-09-10T18:43:31.077000 @@ -258484,7 +258484,7 @@ CVE-2024-42293,0,0,7cf92cea47cf0aeade81c478f71bad3f09bbe1b4ba14510e43dd89a0a6440 CVE-2024-42294,0,0,1014993f483faff29cfdc56b3a6e1108bbfa3c0b5440094cc7d24f2d59b3641b,2024-08-19T19:43:22.460000 CVE-2024-42295,0,0,f0cd0e6a993b87e3204ed117d3bdfa9958e49bdcdf9632bb8d42fdd57196683b,2024-08-19T12:59:59.177000 CVE-2024-42296,0,0,6f0a4e19d0af7904c42d2fd48012f42857e020384d64582beaccc791074f5639,2024-08-19T12:59:59.177000 -CVE-2024-42297,0,0,c6a17cd20eb476c36e74835def3dec9425eca068ceb110058bb8cda346565ec4,2024-08-19T12:59:59.177000 +CVE-2024-42297,0,1,af783682b3acd49cecbeb309a7be7be02b11d85338c75538675796b3c9b51fc2,2024-08-19T12:59:59.177000 CVE-2024-42298,0,0,a7a104314be64271f752c48d4221bba0e238f1aac61a20a74aa57ea83b79a4c1,2024-09-10T18:42:19.607000 CVE-2024-42299,0,0,1d9a7f76ca05044914ea6b23419a3afe5dfacda94e0276680ead40f3cc253bdb,2024-08-19T12:59:59.177000 CVE-2024-42300,0,0,0085a0d67ebb00a2eb0fdee834d161b381fb524f015d1781780f7c3f00257248,2024-08-19T12:59:59.177000 @@ -258509,7 +258509,7 @@ CVE-2024-42317,0,0,44f472938e0f5464917f6f6f19a154afd8a7d285193dd7544e55d6415831a CVE-2024-42318,0,0,9010727792eb410d1e9ad3b39440509d19383e8fe33f90305bb640c17c956a4b,2024-08-19T12:59:59.177000 CVE-2024-42319,0,0,eb5fc32e810c02d0e4bc3b0d9ebaf0ea35abaefd35cea63e1339820db2a46ad1,2024-08-19T12:59:59.177000 CVE-2024-4232,0,0,d86181ca34c980ccca9d603012d25d1fd9d02a5c899c7483f16d67878d54942c,2024-07-03T02:07:15.740000 -CVE-2024-42320,0,0,3bb9745120c3e683aefbafbca3ae9140002adac221663a12333f744da45f1bbd,2024-08-19T12:59:59.177000 +CVE-2024-42320,0,1,f9df773abc3333437daca67b80c5a05403fbb972fde81725c79cec5ff40fd2e8,2024-08-19T12:59:59.177000 CVE-2024-42321,0,0,1716db5db6c984bf2ebbd691b80440a9181fa253c6bc8c5d00954d830484e312,2024-08-19T12:59:59.177000 CVE-2024-42322,0,0,2accb2a45b605eba549de2a0c83236102f9dab689f1b61dc800f0c45a0f92db4,2024-08-19T12:59:59.177000 CVE-2024-42323,0,0,53a82aa56b3376607f69ef6442a0c95be14356f4dffb06936b0b758d7aae490a,2024-09-26T13:32:55.343000 @@ -258576,7 +258576,7 @@ CVE-2024-42399,0,0,b2d8d291d138c04491424e6796bb04940f5bfb5f03fc0a00b681faa84689b CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4e6,2024-06-04T19:20:33.263000 CVE-2024-42400,0,0,bada445f5210525c2b124a846736c128f6bdefeabff1b80f8c8c07a166ac65a5,2024-08-23T15:06:00 CVE-2024-42404,0,0,258bbe9a8fc30a08f303346ac087df8a3b0eda2e13e09e67b46abeb3b548974a,2024-09-20T12:30:51.220000 -CVE-2024-42406,0,0,065bd6358e1e7c27d29c937b1beeec6ff1bcb4616421717cafb34f60be9a6404,2024-09-26T13:32:02.803000 +CVE-2024-42406,0,1,beb9df42952f608150607105a437f6e625ece4a66c83f3450e06050178804c64,2024-09-26T13:32:02.803000 CVE-2024-42408,0,0,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf808,2024-08-29T14:22:45.603000 CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000 CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa9ff,2024-08-23T16:04:26.227000 @@ -258617,7 +258617,7 @@ CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67 CVE-2024-42470,0,0,2551589b1228b4a193f06647a431e38919ef03a66b4d8da3d720aed70dc94a29,2024-09-12T16:04:23.273000 CVE-2024-42471,0,0,cb7c57c681bb54dfcee3c5eaeb006836382343e337f1d6b4eeb7bc799bce8f98,2024-09-16T16:18:09.597000 CVE-2024-42472,0,0,7ab57564efdc72933310d3a5f9856c0205ef1bb0a8b6f4b7c4270b076011eb97,2024-08-19T13:00:23.117000 -CVE-2024-42473,0,0,4c7c671ee00009c6a5c03d538a956eb7febcd1530231ce4a9c79893c5aea342c,2024-08-12T13:41:36.517000 +CVE-2024-42473,0,1,a953ead0cb1fdfa325b78c681afa9a4a9cf00917424e83da6f91b3b4ea3d62d0,2024-08-12T13:41:36.517000 CVE-2024-42474,0,0,48f6cde78461c6ba9ace4e05f6633b0cf67ce0623fdc49b099c25bbc541fd023,2024-09-16T14:30:13.683000 CVE-2024-42475,0,0,0bea3f4f89f8bc03bac4d639b5f5fdd2b60e43250279ee60d6b04aa71867108c,2024-08-19T13:00:23.117000 CVE-2024-42476,0,0,f1465443e6b3e51dab23ffd8341536a4d0a88fd0eab640af90824ca752825643,2024-08-19T13:00:23.117000 @@ -258632,14 +258632,14 @@ CVE-2024-42483,0,0,ca4650d6e89f90cab3f4cbd174343a58f75eabf663e066f3c3338307399ba CVE-2024-42484,0,0,a1d071a36aea45bef6715a21ed0f1766066470b11470c144bede3c9c755cd118,2024-09-12T18:14:03.913000 CVE-2024-42485,0,0,9c52a237d351fcf0752a53847291432cd122014665f3d16b6c4975bcf35af6a7,2024-09-18T18:31:40.427000 CVE-2024-42486,0,0,a989fdd89a78984e53108438ae1d4599e890f4b44bbe2719c613b74d6b8f2b23,2024-08-19T13:00:23.117000 -CVE-2024-42487,0,0,2efeb3a744823d93cb77dca921c5d1e1876bd604d6d9b9e3d12e2ec5d005b3d2,2024-08-19T13:00:23.117000 +CVE-2024-42487,0,1,cfa3e5fc5d85dee47035ee9506daaf513205a0ae2a1267b79a4b3106110a6897,2024-08-19T13:00:23.117000 CVE-2024-42488,0,0,2e1cd2e30af855296712aec04f31ad7dc9d3eafb93055aaa6265177ab90fd230,2024-09-27T18:49:05.410000 CVE-2024-42489,0,0,181648e804e837cda5bb13bcded826140342ba5660b47fc9ce10fe5b939de398,2024-09-16T19:46:18.913000 CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000 CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000 CVE-2024-42491,0,0,f29a442764e941cf16c1143e20ac825cd384b5c08683995678d650efdc59327b,2024-09-06T12:08:21.290000 CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000 -CVE-2024-42495,0,0,ec6874fdfc9b12ec8ef1020de6e62e8d7226ab1ffee9b169624f6e5854e0042e,2024-09-06T12:08:04.550000 +CVE-2024-42495,0,1,1180a26d6b9f5e5788a1528660b9981f2c7723878d1236cb29689626dd32a15c,2024-09-06T12:08:04.550000 CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000 CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000 CVE-2024-42500,0,0,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000 @@ -258838,7 +258838,7 @@ CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4 CVE-2024-42851,0,0,f841f745f513412557e0c00ae557a507c262bbcf9e2f6ddfb2d4220b405d360a,2024-08-30T15:30:44.113000 CVE-2024-42852,0,0,2344821754827259ef0e7a5b96c5bf6543f51312170a85eff0c415fda2be9db8,2024-08-23T19:35:15.240000 CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000 -CVE-2024-42861,0,0,1d37808dd864f268c5c30f5428f99e6c099c54ce0c63a75d6a359d78741ac170,2024-09-26T13:32:55.343000 +CVE-2024-42861,0,1,d16e8ebf4380ac12b6e1582b6e252058c8045743e7ea8ea4716e419cb22f9306,2024-09-26T13:32:55.343000 CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000 CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000 CVE-2024-42885,0,0,b6fbfe1a8ae448a95f4eb231b38e7555bf7772a19abe7daa4ac719d8268bede7,2024-09-05T18:35:07.060000 @@ -258912,8 +258912,8 @@ CVE-2024-4301,0,0,218172685a71d9dc14b7de60ac62731c757d7801c2c506799e72286e245e5c CVE-2024-43011,0,0,a1a7726f53e21e3beb63c25ff5d202a0a16dad76f49dffd4b60f93fe1759157a,2024-08-19T14:35:10.893000 CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea6b,2024-04-29T12:42:03.667000 CVE-2024-43022,0,0,650f9fb8ccee75912422917c17fa309113c9ea3a4d5a4e724d337f4fa0323626,2024-08-21T18:35:09.733000 -CVE-2024-43024,0,0,491b0835c9b439fa900b3e57aa8e4200a5875728f3b9f6ed49afd24b747a30c9,2024-09-20T12:30:17.483000 -CVE-2024-43025,0,0,b566850b05b768408f71443b6361d266b221de02db5c6109d8f382336ddfdb35,2024-09-20T12:30:17.483000 +CVE-2024-43024,0,1,c5f0cc8bedf820b250245c83e75eef2329c1bda7ae52de51223cb56379c99592,2024-09-29T00:27:47.003000 +CVE-2024-43025,0,1,0a05b30057cb366221e0d640fe120aa0a062fc3c4b8622021efe08be23d8cf62,2024-09-20T12:30:17.483000 CVE-2024-43027,0,0,0604ae83aadfc055c804f63006999d0d70f480945a963fa75a913e2db2c243a3,2024-08-23T18:35:06.387000 CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000 CVE-2024-43031,0,0,c3ec426a9c2d322dc356eb4fe356a9e19c60505e16e054c91bc62d391f4483d2,2024-08-23T18:15:07.490000 @@ -258933,7 +258933,7 @@ CVE-2024-43099,0,0,1e8651c725576df83054b4b74436ff5087c13bad1e13244cb0e6a25df0f7b CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000 CVE-2024-43102,0,0,08e196b4c8739548226238903033d07bdd98395e1a6fb3461533ef08cfa70faf,2024-09-05T21:23:40.503000 CVE-2024-43105,0,0,65a66601afd2de184f3745e025013cb99c4a6cae651d4eabc58a96778d4da9f8,2024-08-23T16:18:28.547000 -CVE-2024-43108,0,0,fcb935c8e1c0bd88e30470676732a296af76213c257ee8771f5ffe077e96d188,2024-09-26T18:15:06.713000 +CVE-2024-43108,0,1,47a57e102eb90cd8ecab9e088eb8f89335b210e0681716c3a3c3463504f54156,2024-09-26T18:15:06.713000 CVE-2024-43110,0,0,1fe822a52c0b3af1ede7bdafa556f57158a1ace3adaf6fcd1e0c1b1f3c86485b,2024-09-05T21:22:04.810000 CVE-2024-43111,0,0,45754d9244b10ae48023a8465600f12d5ca692d4146e1c9ba1d4a0e6fcd0734a,2024-08-29T16:53:16.233000 CVE-2024-43112,0,0,72269ebdb7b810fe860916d34468320e2e91d1a609ed10c8290e69cc95ee1d45,2024-08-29T16:51:55.937000 @@ -258985,12 +258985,12 @@ CVE-2024-43168,0,0,dda21c5c2e3bbeaf5d69baa1c2ddcb5d63c7d6cc03584943a831db0d376f9 CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000 CVE-2024-4318,0,0,7b0a62dc8691f5e6f2210e7e19a78c6d4d5c9f053f662e7593a96cdc8c097afb,2024-05-16T13:03:05.353000 CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000 -CVE-2024-43188,0,0,9732a41401c8278fa7c84a534007c5d2780a3c65fc89d9cce5c3453fd30c05ae,2024-09-20T12:30:51.220000 +CVE-2024-43188,0,1,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000 CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a24,2024-06-11T13:54:12.057000 -CVE-2024-43191,0,0,9581b7dede9f2fbfd540ac5ba139a37076e0b1f2264b526a760eb7e7fa75ece9,2024-09-26T16:15:08.347000 +CVE-2024-43191,0,1,5f67b16219345fcf95dfd06c9c3534096ce258dac0d31872dec3aca9db9936a8,2024-09-26T16:15:08.347000 CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000 CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000 -CVE-2024-43201,0,0,26d3404bed6827061c63c24c8574304c3643d40b2409970536a44bb9df193651,2024-09-26T13:32:55.343000 +CVE-2024-43201,0,1,1cb9c408cdac4166bfc707332bad69ac09ccf565f3b94099914e1bf7d83574f0,2024-09-26T13:32:55.343000 CVE-2024-43202,0,0,9ce3457395226f6b2d3e3ae28bae28adde4e9867d0df01a0022666c3aba587f5,2024-08-20T15:44:20.567000 CVE-2024-43207,0,0,e22c5710770b6cfc075b06ecdaad97a6d82c458382d84efdd62d5cddbde66f6b,2024-08-19T12:59:59.177000 CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000 @@ -259156,10 +259156,10 @@ CVE-2024-43399,0,0,72972aa8210630cb7e9ed019395b1964574a7b9fdb0cdecaf47d033016a56 CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000 CVE-2024-43400,0,0,a74902014f54105a8fa235ae36e5688fa3ffdb525b8d03b30be1350fafa88962,2024-08-20T16:10:29.987000 CVE-2024-43401,0,0,15903cc3c455a698e44524d269216ecf71232ae93f3f18482e5b95f18bb9ab5a,2024-08-20T16:09:23.747000 -CVE-2024-43402,0,0,f88ac2252420c28573e4d32b55a0448c84914d7bce756f0f93e4621ecd27e525,2024-09-05T12:53:21.110000 +CVE-2024-43402,0,1,cbe68b18948166515e5561c66b3e20398d555c5718a44005e9b0867dbe19db31,2024-09-05T12:53:21.110000 CVE-2024-43403,0,0,2d2fd26bb8b3833065b554e3ee4081855a0a04ca3de9ec4a77dfc795be220eec,2024-08-21T12:30:33.697000 CVE-2024-43404,0,0,4a621a1822c1e3e97d6e70f878ab3c56f57d21a88a8bcb23b8dabc38faa193b9,2024-08-26T18:29:15.190000 -CVE-2024-43405,0,0,8063cbc13285bb0351f17a597eed25f2405afcc430fb89f55793bb64150ce90c,2024-09-05T12:53:21.110000 +CVE-2024-43405,0,1,2b76393a5c890a8b0bfb7064e2086be40b129aa6a441b2937ffc742f6036940b,2024-09-05T12:53:21.110000 CVE-2024-43406,0,0,854367aefb2456ec94d3be7f3dee319c12b7f5f1a1af5dbd89c34dcd70789a4c,2024-08-26T18:30:13.230000 CVE-2024-43407,0,0,e2ea80f87c66143027da11cf79f2cd80121ef59cc1cf87c24a28fe2c518a474a,2024-08-23T16:20:42.363000 CVE-2024-43408,0,0,d4537cc05369b1073eab6be6b0c0270081103ca8bf402f8fafe9ed3f7a29471a,2024-08-21T12:30:33.697000 @@ -259171,7 +259171,7 @@ CVE-2024-43412,0,0,d8be950c692563feabe854c0542abee7aa58fa64820fe9c692a8fb330f15b CVE-2024-43413,0,0,8e6331055eff0a1fc21c13ac1aa5a910957effe87064f315927a5ac8c4d9163f,2024-09-12T20:18:46.097000 CVE-2024-43414,0,0,41d126c00be1a75ca1d7b9b05a3a92eaf49a5d7831c24ad21608856181f8c11a,2024-09-12T21:33:40.887000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 -CVE-2024-43423,0,0,8b14c4a0476b0904bfffc71b0879bb6907f2aaafbf86699c2d86124211c9be36,2024-09-26T13:32:02.803000 +CVE-2024-43423,0,1,505cd298bb9f904538d2dd3be8a82bf6c3223a78902f77997b1cd780b9086398,2024-09-26T13:32:02.803000 CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000 CVE-2024-43442,0,0,5431c5e587ae45a37d19d37e97d6aeb67638f78f0db0677df8b847e3725ec6a3,2024-08-26T16:35:12.860000 CVE-2024-43443,0,0,41bfb91b7f7c9bee48be0f5c8ffcdaa9039df695b92734c0f1b611ea064f9e04,2024-08-26T12:47:20.187000 @@ -259230,9 +259230,9 @@ CVE-2024-4368,0,0,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696 CVE-2024-43688,0,0,f39d1b1cd29869db949f77b65b174936ed5c42e4fb24c070ceb5bc7ef518b2eb,2024-08-26T14:35:06.680000 CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000 CVE-2024-43690,0,0,d9d35b70595ee9d0c288460e486611e2e8293b6f0702f7c86364e442cd6413d7,2024-09-11T16:26:11.920000 -CVE-2024-43692,0,0,02391c942943649077f2ad9dc03e1795972f5c9bb1caba6c31d8ae359d50cf48,2024-09-26T13:32:02.803000 -CVE-2024-43693,0,0,51ff2b38095b3333bf9c658625662857a1ca6864caf2191bea9d044f4b1fc3c8,2024-09-26T13:32:02.803000 -CVE-2024-43694,0,0,3e1d5b0bba841a8fa5ce4dbc66ed9b7d9588fd6390ce3ae693a3188967740bd7,2024-09-26T18:15:06.960000 +CVE-2024-43692,0,1,d1b5697b63da654d2d13d1fcc82e59a0dedefb31c825ca2a41153e80bbedc1d3,2024-09-26T13:32:02.803000 +CVE-2024-43693,0,1,19b4b7db75ade941f1cdaeb9b641488dc13ac3956c210b270b644d2601c579e2,2024-09-26T13:32:02.803000 +CVE-2024-43694,0,1,496852a249506b9b30012d03f0de3852265c7aabeff9a97bc92bb94ebec6a378,2024-09-26T18:15:06.960000 CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000 CVE-2024-43700,0,0,7d9ad3bdf541499d627305e5fd2f4d5ebf1292f98ea79760d8a63eda3d4aed15,2024-09-06T22:52:41.727000 CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000 @@ -259271,7 +259271,7 @@ CVE-2024-43797,0,0,93bf50c44e46a55d09c378845b20b036c0751fae29a6426402d2fc53d3595 CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000 CVE-2024-43799,0,0,6c08aef01f65a833e2fca5757e98318d6e36858e3dc03d0541df1ebc8146113d,2024-09-20T16:57:14.687000 CVE-2024-43800,0,0,e1524c228f1bea1df882aa0fecc8adcf3e24af301a783b22f72e60d4acf109e3,2024-09-20T17:36:30.313000 -CVE-2024-43801,0,0,3057bc3523c59b7a2ce3a49766bca817655c19ea20647a6ae5a515942f4aa7c4,2024-09-03T12:59:02.453000 +CVE-2024-43801,0,1,efb5a3b925c214d49c455b2877a61c381ff488fb3a649f3ed157dfc2b438970c,2024-09-03T12:59:02.453000 CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000 CVE-2024-43803,0,0,0902a32771a2eb3f314cb6530d6efc037bbc19b3186a10ca173150ea252c919c,2024-09-03T19:40:46.783000 CVE-2024-43804,0,0,dfcc6bb057a0133a6590fad8e3f17989c092b880dfeea4c7e4ce29f3c77ba4ff,2024-09-06T22:57:01.697000 @@ -259283,7 +259283,7 @@ CVE-2024-43809,0,0,83732ae5b37d299f4c52d51b00d231c62060b5df8f6e1ebed9668263f4747 CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000 CVE-2024-43810,0,0,3423aa76d2322965ee6b2f07b882867425d31c3e78ec55c0a16ed8dcb25e9221,2024-08-19T21:11:45.823000 CVE-2024-43813,0,0,0eeebfc2e52232a1c410e398d59e84b3ed93d69c2f86a7c29afdb248f4d5f622,2024-08-23T15:35:12.617000 -CVE-2024-43814,0,0,26edc200689a18bbcc48541a6e84094766e5e50e4c4365bd785a8f9801fb3bed,2024-09-26T18:15:07.207000 +CVE-2024-43814,0,1,884ff68c844499e18350ea6c3335f9c79fad1f176e74be1c40c7efa0b079b319,2024-09-26T18:15:07.207000 CVE-2024-43815,0,0,982a00e3a03355b9c82b813d4044e6da96d5259d4a40715b1b2b57e8056ddfef,2024-08-19T12:59:59.177000 CVE-2024-43816,0,0,44d0571961b52b51ae89fc464c69e8f5e9bafc93420d249ab2ac48cf3e8eb3af,2024-08-19T12:59:59.177000 CVE-2024-43817,0,0,40ac22692ed786254f5ec48928bcf93ac877c29f85c735a88d69b269b19e064f,2024-09-03T17:41:46.407000 @@ -259295,11 +259295,11 @@ CVE-2024-43821,0,0,6b0e9cb35a5b6e032d8dc153d9b81ba7d6475c202a42151c153b72b750312 CVE-2024-43822,0,0,4b30c97c59fde25edad2ddef4aadc560c3590e445036e23d418a5d9b0009bfe3,2024-09-03T17:49:33.007000 CVE-2024-43823,0,0,415804e4f8eed1337d29cbbb761efe6861f75ea20f4e23a3083e452f5f4746c1,2024-09-03T17:49:03.910000 CVE-2024-43824,0,0,96ac4b3d40968a435b003b39f652f4b72c5c89619f936eca147dfa5683737ac9,2024-09-03T17:48:39.160000 -CVE-2024-43825,0,0,130af7d96288110e02aee1e7600bdbf8c5cd66dfe2f98ab074c672e68f4722cd,2024-08-19T12:59:59.177000 +CVE-2024-43825,0,1,630e35074c43feee4a0169705a99e32b9fd3fb276b829ad157298d50396b62bb,2024-08-19T12:59:59.177000 CVE-2024-43826,0,0,19b9e65dcef3547ac09f1e3335abc85678bc165e6f805e49f1110dd703b3f07f,2024-09-12T18:15:09.137000 -CVE-2024-43827,0,0,cf65368434e7a2b682a9d717038e50932b650d5aee79f4ae380ff9863f20dec9,2024-08-19T12:59:59.177000 +CVE-2024-43827,0,1,969ea5f54077b19be32ca6fe8ae129bbdf206d0e1dd38aeaee7713d913691f36,2024-08-19T12:59:59.177000 CVE-2024-43828,0,0,34d93531989f41b09094ffb798c3bd14e32cc02dc3ecd2194ff28e1c3f3ed704,2024-08-22T15:41:50.870000 -CVE-2024-43829,0,0,cb6e8b0f01b87b3f7e043e1ec20f970771e88fee11f056198306c40048ba4acc,2024-08-19T12:59:59.177000 +CVE-2024-43829,0,1,a63b2922cf902c2ca576dcfd3377747b7e362f85a99f5a658cd9af4917e83a9b,2024-08-19T12:59:59.177000 CVE-2024-4383,0,0,79a386b1175f996c5232e33e8542f544a0804b6992fb3e16e7f612c169e16a45,2024-05-14T16:11:39.510000 CVE-2024-43830,0,0,0c202a646bcfaaaa39d2cb27400c7552b5186a7ed520c033e84fbd5365796f5a,2024-08-19T12:59:59.177000 CVE-2024-43831,0,0,d2d2b5793f8c890b4b992408f65959bbc46269161bd855b4336fdc8262090039,2024-08-19T12:59:59.177000 @@ -259314,7 +259314,7 @@ CVE-2024-43839,0,0,8837353b52a881be05b25b7fd8ffdec6b5f99540c518bf74d996a0bee6721 CVE-2024-4384,0,0,9e6f6b1cee0183a069a2a4eaff8415209b35f5a05fd8cbbb389885858a6f3133,2024-07-17T03:01:34.710000 CVE-2024-43840,0,0,23c960f08c72e92672042c1b393c21288af5920aee8a16c3fbfc5fa814adb315,2024-08-19T12:59:59.177000 CVE-2024-43841,0,0,e1a2c38a635a3f723bb13f01d4b145d0059affd305089e3a07adc4eba6ffd3eb,2024-08-19T12:59:59.177000 -CVE-2024-43842,0,0,a9e92e9fe7d83f2bbbf14ffa788f7191f8705535edb6aa37b190042b46301c8a,2024-08-19T12:59:59.177000 +CVE-2024-43842,0,1,33623f67e6087852ab47ab4eb71895740028c2b87e54eeedc99a19887c3f5e77,2024-08-19T12:59:59.177000 CVE-2024-43843,0,0,a0131aafc1fe810a712c7a36d5efccca41cdcb3c562b11e8dec7755521d56b27,2024-08-19T12:59:59.177000 CVE-2024-43844,0,0,a0d50b71edd9141ff92598003e1617be5ffa1f51ed6945e4adfc2aef19f1831c,2024-08-19T12:59:59.177000 CVE-2024-43845,0,0,975e9883b95b773086eb2dd70b312cb34500f721b9f0912731724d7ad97a858e,2024-08-29T17:15:08.397000 @@ -259323,7 +259323,7 @@ CVE-2024-43847,0,0,835246f4f393ea975e0a8495b92ecf4d0f17d69854486c3d470ee96289075 CVE-2024-43848,0,0,f1a2b4dd4e81d797bfb09af1eb3c38201e05560605d293e2d1b82a973cb40d73,2024-08-19T12:59:59.177000 CVE-2024-43849,0,0,4e7441e23902fce37752729b14d7b654ff080b4dff9f1f8570b222a7a4400bc3,2024-08-19T12:59:59.177000 CVE-2024-4385,0,0,77dea89143b3a0633a6b8d90c0521dc82338402099ab7a378f8d43e8fe04ecd2,2024-05-16T13:03:05.353000 -CVE-2024-43850,0,0,af5a8e5c81d2d7083cc2063dd97b917fab8a477ad546922bdeb0b7cb165eb7d7,2024-08-19T12:59:59.177000 +CVE-2024-43850,0,1,a256223538db4b1ea083b10c0ae76737556091791686980a6f200e7fc1d13511,2024-08-19T12:59:59.177000 CVE-2024-43851,0,0,6b377a11182d300738f6cb3fcaa1aa4d6b0f57bbe7852e35522a14ee29006899,2024-08-19T12:59:59.177000 CVE-2024-43852,0,0,e16a39e3485e6268d56a06e4f3ecc24b277dfc853c8871fb0e21f6f409c0a86d,2024-08-20T19:32:55.747000 CVE-2024-43853,0,0,3a6c96c14ae012eaed5b1ef682d62a9cbd9b79ece1f1039255ad0f2a7b3d5c29,2024-09-04T12:15:04.827000 @@ -259414,7 +259414,7 @@ CVE-2024-43940,0,0,e2807b5b7542484ae9ed35e04d622dfaaddf93a950c2f3af8ce19e39df4a5 CVE-2024-43941,0,0,65eb65a5b19127de85b2ed3f09e3f3a2fc43c5d3fc64b0022b1df003f93a2eb1,2024-09-04T13:40:41.620000 CVE-2024-43942,0,0,e66d301ff91d4e3d6c85080e28c55dc563393fe5e437a624aa40d0cb331e6a52,2024-09-05T15:25:59.153000 CVE-2024-43943,0,0,0708a62e7be84f809da9677b73fc0a902b7d605c03fc359ea64fa95773946d2e,2024-09-05T15:10:48.663000 -CVE-2024-43944,0,0,3b43949b67e3b5293c2c106f6d4c5bf9b7b47da0cd6c64d08fad13e8014c08a4,2024-08-30T13:00:05.390000 +CVE-2024-43944,0,1,7cf078bdee4a7204a94c29ac880eb2e8a1ff47220e24f3c833101ea77c610d2f,2024-08-30T13:00:05.390000 CVE-2024-43946,0,0,f240acba317febcf1e96ae7507bd3580d8fecd1103a0412511da00f09d6e888f,2024-09-03T15:21:07.167000 CVE-2024-43947,0,0,00adf93b652a6a1fea9f57602f2aa8edc17efc755f7abf02b222226d3eb2a44e,2024-09-04T14:16:00.423000 CVE-2024-43948,0,0,f60ff73d80da3808d8af4258622a438dd588d368d767678c8fd4008f71ea0306,2024-09-03T15:22:20.567000 @@ -259545,7 +259545,7 @@ CVE-2024-44154,0,0,52420e716bdaf0c7fece3d5feef7b52e02f0f1fb32372b8f2d13dde79a132 CVE-2024-44158,0,0,9d7e2fa5cd578734634a4ad7f07935a9c77533bae7cbf9b59ee2c2f082d12524,2024-09-24T15:50:25.083000 CVE-2024-44160,0,0,111306ea6d5f4cd614ad1f97ebba8b9ebd1a48c26d38996100c4c5802f2b5bd6,2024-09-20T12:31:20.110000 CVE-2024-44161,0,0,7c1aadaed2bcadc65ac3b4a310e13a88d0da6d821bc96d21705d61516e8bb478,2024-09-26T13:56:51.110000 -CVE-2024-44162,0,0,3f14eb43cace0291473abe5a6a05a37f0c7d25818db1b9306e78a99c625d78e0,2024-09-20T12:31:20.110000 +CVE-2024-44162,0,1,1131808ef016b13b5d7fcf92510530c5e9d006caa670f7c22a84955b0e1ca58f,2024-09-29T00:16:28.033000 CVE-2024-44163,0,0,e2b412048fbdf8ae95e2280e50fc2f756b4523202ab2b8f59f648be7c0e4a8eb,2024-09-26T13:55:41.473000 CVE-2024-44164,0,0,442a0be8fca2c2465dd252b5d43bed873c3aac22994c2fc3808d18de19ca4205,2024-09-26T13:54:46.297000 CVE-2024-44165,0,0,086d9d84bbd001d271d67060f861ab5332ea58aa937d02eb132c58dc52ab7620,2024-09-26T13:53:09.203000 @@ -259731,7 +259731,7 @@ CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e74 CVE-2024-44851,0,0,b06ae94265ebaf06a2cbe7f2decfe95140f8875bcd4429129ed5fbd14698dada,2024-09-13T16:34:45.413000 CVE-2024-44859,0,0,361e21bdfe4afccedd32d666cb901903834fe5ed28d7a4a2b19923a7bb2e90ef,2024-09-05T12:53:21.110000 CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000 -CVE-2024-44860,0,0,90e97636467649aa68d277c81a4224a3e82e1e3e6f448483aa82744fcc764ae4,2024-09-26T18:35:09.097000 +CVE-2024-44860,0,1,8eb6fe76005f4162a0e7ffc2c965686ded6cfb07dadb6ba1659a2473ab277ae7,2024-09-26T18:35:09.097000 CVE-2024-44867,0,0,cd6a6afd2f8bf5129300a4aaa71447e1cefe42047245db3824a71c8f9b607a2e,2024-09-10T15:50:57.713000 CVE-2024-4487,0,0,4ec04e3a5fad37f02884076b1172c7e1dd67ad4c891fc4fe04112b3c8765dc55,2024-05-14T16:11:39.510000 CVE-2024-44871,0,0,1356acf26c4ae6b59ff57670a194625c19205b79d8f3e0651dc4d2caf4793728,2024-09-13T15:28:21.260000 @@ -259875,7 +259875,7 @@ CVE-2024-45039,0,0,0967c84c315cac168258b3bd286849d311dca2008818c6f6887587ae82f83 CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000 CVE-2024-45040,0,0,37ed54ed372ce3bdf51dabacbff5eaa56f209b445759510f5117c47e52aec1ad,2024-09-20T00:13:23.323000 CVE-2024-45041,0,0,1e2da4c1302b38fb57fb38280037032da391876c3275a0d8eb8672700cab0b97,2024-09-18T17:31:53.903000 -CVE-2024-45042,0,0,2b38e5d98fa9e2d2eda4f53561f8b75f76f820c6eca8e873d2e93bca7eba7cfd,2024-09-26T18:15:07.463000 +CVE-2024-45042,0,1,eb21440d21643e9eb1ab90993f31af56eb66294e3e97fff69b27a21e0e882efc,2024-09-26T18:15:07.463000 CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000 CVE-2024-45044,0,0,2ed42d19dae2f6825c5977ea48282a4184680e7c5fcc5191852ec831d989e86c,2024-09-10T15:50:47.237000 CVE-2024-45045,0,0,c746f1c0e6db0596dc093f08d310bbebe72a6c977f5bda8337efa37c3e8dcc04,2024-09-03T15:13:16.580000 @@ -259894,7 +259894,7 @@ CVE-2024-45058,0,0,0aeca269943a7129c0404dfb981723de5fb36265ba0866f96f3a12be3215e CVE-2024-45059,0,0,c6a55ab336d1100130455a63f91aee20aa7bff7dc7cd1c935c7137c38d9b84ad,2024-09-13T20:09:19.523000 CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000 CVE-2024-45063,0,0,33e08634550506363c06b675c8eebdf6582cbbe73548148f8e40aee753dad000,2024-09-06T17:35:18.370000 -CVE-2024-45066,0,0,625637759d81d0e300a66e9fe405ec90904f1359afd8c743232591ee651c14ee,2024-09-26T13:32:02.803000 +CVE-2024-45066,0,1,2e4b2ea4af15e526fc68e3edde82d87824f4c5bc700f72dbcc49925cc2ad8005,2024-09-26T13:32:02.803000 CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000 CVE-2024-45074,0,0,410d152e2b1ce535bb792f747dab438d63c99a6f6d04953bcc95f60bfd46ac78,2024-09-06T16:45:32.767000 CVE-2024-45075,0,0,72725abf8f0bda55b265624cd19c42b954d17e9672b7c19951b6fe04531ef578,2024-09-06T16:45:12.980000 @@ -259996,14 +259996,14 @@ CVE-2024-45294,0,0,571ccadaa63af3685b6ee82cf020ce004878004e5a04088787ea6924189ff CVE-2024-45295,0,0,9cbcd7c9c4357757a60245b46b7ad7987cdeaebea00bcdcc3890fa90524c0282,2024-09-06T17:15:17.053000 CVE-2024-45296,0,0,49181c4036a3982c1d4d8e879ccd14076733bcb79f94fe42ac7b08410afb4b40,2024-09-10T12:09:50.377000 CVE-2024-45298,0,0,3855d0d2f5eeba6af655c62306c41db8dfb0c660d64bc08f64547216bf276198,2024-09-20T12:30:17.483000 -CVE-2024-45299,0,0,1dc20bab2e5804f3b833440e86d8fa4e2d640a2a31779b302ea51c7be7ad4d71,2024-09-06T16:46:26.830000 +CVE-2024-45299,0,1,25a73913f7ab6d65c34ae4be0e0d9ed22a4816663678f10de7d875ee5d34b515,2024-09-06T16:46:26.830000 CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000 -CVE-2024-45300,0,0,371ea055cbd370f2315f57d501b2d8bde7fe9993dc271953659e5b000db99936,2024-09-06T16:46:26.830000 -CVE-2024-45302,0,0,81d543b8058ec9a64648a785b7fa014c697fce5846d6cc78b75fe051c3ed2104,2024-08-30T13:00:05.390000 +CVE-2024-45300,0,1,27fd775164e57067a38ceabd2aa31d5b4a7f60dbeadc170d1b287ab3c44d3eb5,2024-09-29T00:08:14.363000 +CVE-2024-45302,0,1,2643a37ef19c9772537ce62d37ff849e3e9fbe197380391a278662073d8a215f,2024-08-30T13:00:05.390000 CVE-2024-45303,0,0,0f2993ec35c2f5c69a86f92f14083da5a1f9682262497cdf98941162719918c3,2024-09-18T20:25:05.807000 CVE-2024-45304,0,0,46c3aa86e7ae53dac98ca6e0bb14f844dd183bc529cbdd17303f7bdd1323bb19,2024-09-19T17:26:37.030000 CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a873,2024-09-03T12:59:02.453000 -CVE-2024-45306,0,0,2089f2b015e15041c3f3807cc6f2c8eb1cf893208c28e4b1ca171ff53a3a8feb,2024-09-03T12:59:02.453000 +CVE-2024-45306,0,1,1390b52a2d673caea6114ada69df1d79c695f14457d4c2bcf847624d9ac7da9e,2024-09-03T12:59:02.453000 CVE-2024-45307,0,0,453e354c13ea082f71f784fb99af4cdeb162dcc05e43b9c9b2e7febafaebfb7b,2024-09-07T01:34:05.907000 CVE-2024-45308,0,0,700e0eb4024a102ed71899877978cfb0e434a318435f3d46acfc9659de5f360b,2024-09-03T12:59:02.453000 CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000 @@ -260026,8 +260026,8 @@ CVE-2024-45366,0,0,ec78c74ac351c22ffbb4e903d91259c92e90ebafbe4e65694c50f7e794cfe CVE-2024-45368,0,0,563bfc1ed8b31a23579e2f54c884aca7d778495c2d744e0c86e6262fb50de16f,2024-09-14T11:47:14.677000 CVE-2024-4537,0,0,2e530ca2c49a8373646367a8e0c1771a783669d0151f9600cf6b8a99b12e73b9,2024-05-07T13:39:32.710000 CVE-2024-45372,0,0,ed980d92931893d9eec78d3783ee6eee46758477e6e3155c959d481ad52ab077,2024-09-26T13:32:02.803000 -CVE-2024-45373,0,0,9a9feee85a6a853e6997a756fca6aa8496122e024226a6073d404b8e80059a29,2024-09-26T13:32:02.803000 -CVE-2024-45374,0,0,70e3b6b9e924df0014d7902df9f79d9011407816798e8b44b7551c2091f14a68,2024-09-26T18:15:07.687000 +CVE-2024-45373,0,1,5056ad24b7f0c08109af18e31c67cc6492a0071e1c33f675a5518cfe8e99ed44,2024-09-26T13:32:02.803000 +CVE-2024-45374,0,1,aebae42ad4312ffb80c614342596b18c7053fa2bbc5c220fa5163855d573c3d9,2024-09-26T18:15:07.687000 CVE-2024-4538,0,0,1753f7bd0b59062edc1103b5572b8666a59c2630e5fb59443506518ac4083bd7,2024-05-07T13:39:32.710000 CVE-2024-45383,0,0,235a14ef262025a5c45e6e746df2b6dcf33186b99aef4d19b36fdcfc9676da5c,2024-09-18T20:24:29.247000 CVE-2024-45384,0,0,583f6b0150a5c6e4d0e90be5e6cc15f9937a4f3e905df3e759e07d110131191d,2024-09-20T12:30:51.220000 @@ -260135,7 +260135,7 @@ CVE-2024-45606,0,0,74770cd60bba1a7e3534716f76d2f24e8f6b5a1c9090e259fc4bcbaa50144 CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000 CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000 CVE-2024-45612,0,0,3e30286b1d723ddfef1522eda155227a0e1e8c66d0b8dce0d9a777734913d222,2024-09-23T19:33:04.650000 -CVE-2024-45613,0,0,ab9e357484910f1abcc65e5d7c0d96eafb9903ce5e60e960bc0d3c0f56285535,2024-09-26T13:32:02.803000 +CVE-2024-45613,0,1,2bf621894007aaf460fd780541faa839d0fccd3ce6c7c8a6ff88687f11c445ab,2024-09-26T13:32:02.803000 CVE-2024-45614,0,0,ac4b7afda4571cd40367f25e5fa4ed4a95b6d96da3864aae950ca5538b1c5a35,2024-09-26T13:28:30.537000 CVE-2024-45615,0,0,c6d6282e5a9613bcbeb55c568082301f30c66c5c3e170d6aa78e0325f2dae6b9,2024-09-13T19:21:15.423000 CVE-2024-45616,0,0,ec4ff704ba2aae95f08442d1bfa2173f2a102c1c3b0570dfa4cb1518cb449547,2024-09-13T19:21:11.507000 @@ -260168,7 +260168,7 @@ CVE-2024-45698,0,0,ae3e99b30522a0cc22ac110f0e079a19451e6ffc669d2c6984799a2bd6bce CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000 CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 -CVE-2024-45723,0,0,ce867dd46d1e839d722c68090d3fbfdbc763c98fc31a5e88aad392490b0b3859,2024-09-26T18:15:07.927000 +CVE-2024-45723,0,1,430d19c6d20cc3fa27977641a485d1cb611429e5af94903d5c0f824233aa5175,2024-09-26T18:15:07.927000 CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000 CVE-2024-45744,0,0,12cdd282bbeb6dcaae97e5625f3c388f0a743cf0d2b647f5666841d51cb6d2e6,2024-09-27T17:15:12.993000 CVE-2024-45745,0,0,228ac34cebbbf1dbb6f2db7f96e496ca39885acc6830fe3dadc9b25f7c8420ef,2024-09-27T17:15:13.167000 @@ -260219,7 +260219,7 @@ CVE-2024-4583,0,0,80422ff6020fca1720c5a88e28ab76aaa9a918b3afa6700e13782e64857c67 CVE-2024-45833,0,0,d66bcdb35ef05ab6c240a22f01c308be4dcef309fd562be6507d54a47e85401a,2024-09-23T13:43:42.073000 CVE-2024-45835,0,0,2bbb89ffd28b8dc1adee7dde89d168866e6c50e525c50f0b4fc33c67b9ff7524,2024-09-17T12:11:48.833000 CVE-2024-45836,0,0,cbff046fd2ba2d8b660c4c08f598ee5586a8344514f02f65136577d6391cc3fa,2024-09-26T13:32:02.803000 -CVE-2024-45838,0,0,e3fc5181a2e4d90603ce11c9093ff47daf2ce6a25bf17109abe0fd9c14d3838f,2024-09-26T18:15:08.170000 +CVE-2024-45838,0,1,3deb0cb3b16c38538b00d8547397ba2a428f66ac16a27fa4491ffae3ed0af8be,2024-09-26T18:15:08.170000 CVE-2024-4584,0,0,4d639afeee5354fec0a7cf3023bb849f2437d78f7cd875e4a49ac03b46b9ec82,2024-06-17T19:15:58.903000 CVE-2024-45843,0,0,d277f4e7f1b7f77ab48f44241b10d59e0715a005bfff8db99caa28f9596ebe66,2024-09-26T18:42:26.697000 CVE-2024-45845,0,0,b549a9e321160df47bcb67d5d4737d4567fe304513c57d25b052b060dcd0ae25,2024-09-12T20:15:05.273000 @@ -260238,8 +260238,8 @@ CVE-2024-45856,0,0,0d2d555a4be2f7d0582132e7868cb1ae44e7be28b33194ae92062d7b37f54 CVE-2024-45857,0,0,baf58007ae785d8a411fcf58ab797e8aa621cae99978a873f3918c60d00cf497,2024-09-12T18:14:03.913000 CVE-2024-45858,0,0,b5441be916d9d638a5a087843bce9f2981a17328a32cafaa10622a0d2ef26e3e,2024-09-20T12:30:17.483000 CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000 -CVE-2024-45861,0,0,57fe73e3a177e4e17ab3e3d5c857fbcecceae3ffb20171f8b220e3723b40fcc2,2024-09-20T12:30:17.483000 -CVE-2024-45862,0,0,267d393c40ac4758b5b0d5f00783ff7e60ad200162cab3206861198fe5f922b0,2024-09-20T12:30:17.483000 +CVE-2024-45861,0,1,06da4e301ea3f4e44ad40215bb90dc27994813b6ecf99be9d6a5f2f497d7d785,2024-09-20T12:30:17.483000 +CVE-2024-45862,0,1,4e9b066250722e9cd280f4a8d9e78c648ab8f1036530303a9a0926348d90730f,2024-09-20T12:30:17.483000 CVE-2024-45863,0,0,fd048866aa707237f5e54143a9d87b2c08dcd9e461d7c79379b8ee0322294442,2024-09-27T15:35:02.800000 CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000 CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000 @@ -260252,15 +260252,15 @@ CVE-2024-4594,0,0,6353480e983dfe68c6b174c583e75b67b6ebde5befefc4e80bf75a35aedb23 CVE-2024-4595,0,0,a34d956039b7343ba69c0066573aab0165928a92f89b42d7c5d672a51296492e,2024-06-17T19:15:59.063000 CVE-2024-4596,0,0,dbe0fd0eb8770735bec19f4c23a1e0e23418b2478aa147d47acbafa8a1854f1c,2024-06-04T19:20:43.750000 CVE-2024-4597,0,0,098adbd2826136caa11e67cd45a2f45f6208425bc1c84711667f353f70d7a203,2024-05-14T16:11:39.510000 -CVE-2024-45979,0,0,269b75a54e9f92beafd188ab19a8d7385d758d97c5e411a79ea62cba1f5eab36,2024-09-26T19:35:18.603000 -CVE-2024-45980,0,0,80d4d3c4a39d6eda4d1251291920661cf4318ff630617ff5a8c2ef6bcb93066a,2024-09-26T19:35:19.337000 -CVE-2024-45981,0,0,cb3e5e325beb876213a050a2d01446d055c618ef567f52c853670cfd917138da,2024-09-26T19:35:20.077000 -CVE-2024-45982,0,0,7267167aad51972d82bb5eafcf0bbd7723920ecef6ca919e7cd170fdf5915ca9,2024-09-26T21:35:21.020000 -CVE-2024-45983,0,0,22d5518c635412d3a4fbcbd27a9fa61e2cd4257a37cd0ef087a05a6b94e1fdaf,2024-09-26T19:35:20.827000 -CVE-2024-45984,0,0,191e6065bcea691e7d2f212f050b5e86a6bc7b2eba815207627ed9ddd2dc279a,2024-09-26T19:35:21.550000 -CVE-2024-45985,0,0,dc45e2ab3de87861a9443117e4cfd6e57b68e9216bd82bc7bd6f3e068d51ccad,2024-09-26T18:35:10.080000 -CVE-2024-45986,0,0,f61f0e27b2db4ecf52ec82e83c4f905d4703f7b81b7eef8d8ec2e435944bc38e,2024-09-26T21:35:21.760000 -CVE-2024-45987,0,0,894b34f536a04c93f16834a2446d6c8467b7fe3b94446a5ff31078de5ce6842c,2024-09-26T18:15:08.583000 +CVE-2024-45979,0,1,20900760776888720bc452f948a22393f2454a614fa8aa7fbac42514a7060eb2,2024-09-26T19:35:18.603000 +CVE-2024-45980,0,1,ffaf4fca3fa64b261a72e8089eec57c304182191befa533f835558e642471c45,2024-09-26T19:35:19.337000 +CVE-2024-45981,0,1,55493d23e37aba5a13e63ff62e6893e63571ae517e3126a692b53ee3c7a37e80,2024-09-26T19:35:20.077000 +CVE-2024-45982,0,1,9827426dd688694de22af563154a60b20bc7cbeaf43718eafc880ff62f6d08cc,2024-09-26T21:35:21.020000 +CVE-2024-45983,0,1,e89b9d4b14ec1f1422528c39849cbf428bab3483b79187c5a60f900783b9935c,2024-09-26T19:35:20.827000 +CVE-2024-45984,0,1,078c8933034572f782fb2476803297f39dd2d9fe34829528787233d8040a4bf1,2024-09-26T19:35:21.550000 +CVE-2024-45985,0,1,04a7e20fcfe8eda08bfd4033a96db01f2d42bf196c98b75de28fa4696134823b,2024-09-26T18:35:10.080000 +CVE-2024-45986,0,1,33cf79b8162b128f06c2389ba5a8930d2d312e7cd0044c59851c2ed8856240d2,2024-09-26T21:35:21.760000 +CVE-2024-45987,0,1,313eae185e734966d596e1f8f46a2e23a8d75ab06d253b00492d98a798714e18,2024-09-26T18:15:08.583000 CVE-2024-45989,0,0,af7080c89647f989ac2ca7d839fcda290a1db2a2584e5ec2b33ecc9edab6b0e0,2024-09-27T15:35:02.983000 CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ecca,2024-05-07T13:39:32.710000 CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000 @@ -260307,10 +260307,10 @@ CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494 CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000 CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000 CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000 -CVE-2024-46327,0,0,1109f4d5733337c522b43c688073dbf042a675894632702e5e62b9816340dacc,2024-09-26T15:35:24.607000 -CVE-2024-46328,0,0,6d725cf49973d0547b531dffd10544f7db3c88f49071ede40d544ac8d4e71635,2024-09-26T15:35:25.783000 -CVE-2024-46329,0,0,67c3a6b863dc93eeddc6458cdb7ed37a92f231ba9522b51de613709b565f065a,2024-09-26T15:35:27.397000 -CVE-2024-46330,0,0,5f5561b584280ec21bb45f30f74e33818f7bd5bdd6c0f77a96022667b1fd499f,2024-09-26T15:35:28.713000 +CVE-2024-46327,0,1,d6172f02cd57f92bcb2dc3b72e7511432679981e69d942e65c0a83dbb0797c69,2024-09-26T15:35:24.607000 +CVE-2024-46328,0,1,d3f937aaae9e9bcb0a1efdd2fbc630a7cc602ed3ecc4d7ad11b685e169712060,2024-09-26T15:35:25.783000 +CVE-2024-46329,0,1,8c553e98ee568f1064be541dd05386f283d7f017d99dcf74d27780eb8dc41327,2024-09-26T15:35:27.397000 +CVE-2024-46330,0,1,4035a2d5ea03776bf28c54a7689cec785d84d883637680d1abcc062505d717c1,2024-09-26T15:35:28.713000 CVE-2024-46331,0,0,22938aafdadbf7022de7390605aae86613d7f1d9bb1d3857d6ec9f21a3624baf,2024-09-27T17:35:09.747000 CVE-2024-46333,0,0,992c78f88d887bc986be2e0a520e5ea7469626b0dc2226548b9127039487360e,2024-09-27T17:35:11.090000 CVE-2024-4634,0,0,2c56b13392d50c2560d26201cfe4914a1f0ee83080b338e78708abce42a9dd35,2024-05-16T13:03:05.353000 @@ -260402,13 +260402,13 @@ CVE-2024-46600,0,0,cae524fca9cb69012594d951fa8090d3fe8d1cfa0f217e7dac4acb986038e CVE-2024-46607,0,0,19b52a4f221a81e7b0e70e694b13b9c3dc0a4fb6554fee97e54b7afadc8502a3,2024-09-26T13:32:02.803000 CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c67789542038576759bd,2024-09-27T16:35:03.627000 CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf70,2024-06-10T02:52:08.267000 -CVE-2024-46610,0,0,d922b4261099847096d8c683fe0eb8434b2ccb3c0c33dd549b34f19d2b943e06,2024-09-26T13:32:02.803000 +CVE-2024-46610,0,1,6224d590ad053e155d100016a07cc2f3151c2a8745936d3316b691dc668900af,2024-09-26T13:32:02.803000 CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000 CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000 CVE-2024-46627,0,0,2d97afaae826c5582be81e574e277b4f6fe41b8dad48517b39b84d283362a60b,2024-09-27T15:35:04.583000 -CVE-2024-46628,0,0,b9b3a5b65ec5ae34f5ecdb56d9dab97b5151c6b611a9836ba074833ecc1193a1,2024-09-26T21:35:22.537000 +CVE-2024-46628,0,1,c27e816cb0ec46fa1f117835bce851202bebe4b3d8ba9e46a6dcc357c18fdf7a,2024-09-26T21:35:22.537000 CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000 -CVE-2024-46632,0,0,49c02e3668d5e881ef006304da2eb6eae159ef85be40315a6a4d9e988cef6e2a,2024-09-26T19:35:22.293000 +CVE-2024-46632,0,1,a4b613b047da9ac8f459b3b9d152212eef946036bf6e18be68c7d5e20a43b558,2024-09-26T19:35:22.293000 CVE-2024-46639,0,0,32a1c80f017ce1b9b0a593e635fc1fe3b0612fc660594feed34360cf471ca787,2024-09-26T13:32:55.343000 CVE-2024-4664,0,0,b622a884dca6c94dd91f571bd68ec3e5e60df69c2ec441187a6010b0dbb54f4f,2024-08-01T13:59:32.680000 CVE-2024-46640,0,0,8a8901a45f157bc967024a42c670214bc1166786f3fd7086e031ee10a8d6de95,2024-09-26T13:32:55.343000 @@ -260469,7 +260469,7 @@ CVE-2024-46710,0,0,99ad059fec6100ef5344b9476dea58e8105bf6e298abfd9609e18d1b32dd8 CVE-2024-46711,0,0,91f6e71bff9276f1e56a88764fca11ade7e1d2c1501a9c829689237f0828b894,2024-09-19T13:12:30.390000 CVE-2024-46712,0,0,225e28d58d121274afe8a67bb7e9b2a631f03521abd17c753d0a27bb12faae1a,2024-09-19T13:09:22.957000 CVE-2024-46713,0,0,a6f4ee9871c0b122806551f92aee6c4bb9f19a62163eec4e9b4f68119693903f,2024-09-13T16:37:22.997000 -CVE-2024-46714,0,0,5dc06c1790627348c8b42d7234b56d306e0d63ecf8e6e2f024add2fdc2f2068b,2024-09-20T12:30:51.220000 +CVE-2024-46714,0,1,408a614120ceb60cd5122f1f7c5b0afdcc13dfc83ded664d6de66c1ff210903c,2024-09-20T12:30:51.220000 CVE-2024-46715,0,0,f6acc12b1eecea12bf9d6f195b39a00b75ddb201277b4ad1fc8ac95e25d25405,2024-09-20T12:30:51.220000 CVE-2024-46716,0,0,285e828ee8aa50fa4c3aa4bd8a3abe4a01c20af8ed00007aa5c1fe4778857afd,2024-09-20T12:30:51.220000 CVE-2024-46717,0,0,cd61e7eb874e3f98372d85a33e9e40d7e36ee1787456cd2287e7b17844f088a5,2024-09-20T12:30:51.220000 @@ -260483,11 +260483,11 @@ CVE-2024-46723,0,0,b2624b2a21160a8d4a59b7fec6cc7978e601b3e3a7818f220883cbdff8b32 CVE-2024-46724,0,0,6c553f378b7cb7dd68150fea097a0f4d041e50f4ab427769b0d527656c79da2a,2024-09-20T18:30:58.980000 CVE-2024-46725,0,0,509dc11dae441e04b0c8fea7acf1636c9004b5d1cec287f96ad48f7578f554c6,2024-09-20T18:40:42.753000 CVE-2024-46726,0,0,6f5f3ef17f2e9948e78b6f7e567b0bc7ef81f62ef77f0f62b43f6510fb120a9f,2024-09-20T18:36:27.070000 -CVE-2024-46727,0,0,df7c36e90817b43197d2d9c012a6e8afd8c1a737d85f5fed3ed5c2384427e829,2024-09-20T12:30:51.220000 +CVE-2024-46727,0,1,c432d5f3aa89ca129651c4ee5afd1195b4a525955783ebd17efaeffa66bcfd4e,2024-09-20T12:30:51.220000 CVE-2024-46728,0,0,b41c3dc555ca9fe309841348a5a63c5246a0e7a294011225be7b3eea5aabda83,2024-09-26T13:31:34.347000 CVE-2024-46729,0,0,7b3dc0c090bb6cc0b1332923d5e2f0f6592c4f5e0390aac8790a4bd11f0fc162,2024-09-20T12:30:51.220000 CVE-2024-4673,0,0,534fe3baa36c9b2de1fe1f9372b44f4a695e5779fe305c090e0c97233d7085b1,2024-06-04T19:20:45.437000 -CVE-2024-46730,0,0,b0df5901f35fba20f373c4395684d5c970a27cd6c2c7852cf6020fd607887d24,2024-09-20T12:30:51.220000 +CVE-2024-46730,0,1,0ed0580d09d08563481351041189dcb8bb2fd6b6af0aab2b8356e901dfe76a91,2024-09-20T12:30:51.220000 CVE-2024-46731,0,0,819cced81520d9f96f9b886212fc7b127f26019bfc7a6b4e191e1cee82bf615d,2024-09-26T13:29:19.877000 CVE-2024-46732,0,0,d75dfdfc158d4c29a001d6993f043ff82e1ab649a4d9a9b9cf4e720caab3cd0e,2024-09-26T13:28:07.157000 CVE-2024-46733,0,0,79186a2b7b8560d75a3f382848c11d76972e45dfdd742ee0a98c810d97481fb5,2024-09-20T12:30:51.220000 @@ -260502,15 +260502,15 @@ CVE-2024-46740,0,0,d4717fc628887090b7eb7198113033485898a54dca129d114c0f2b9979d86 CVE-2024-46741,0,0,57723406524ab51c560f304ba8e714435f3fd19a56628487c9d048fc115bb129,2024-09-20T18:33:27.960000 CVE-2024-46742,0,0,7652f750a872ccfc513a3dc4349e7ac393b527211852a63dedceed1ca4a6947f,2024-09-20T18:32:34.303000 CVE-2024-46743,0,0,df0d7d2eb3182449b16b6affacc8470eebcbcc10a1de999cd67e31652253986f,2024-09-20T18:32:11.827000 -CVE-2024-46744,0,0,1ddb6091ea143124b9b1590099b9687701ffa30b9df9a4a2d29918b7d821e335,2024-09-20T12:30:51.220000 +CVE-2024-46744,0,1,f35d015e0fb536ab62263808397a9a9c5681dbb98905649b81f66dfc59b45e8b,2024-09-20T12:30:51.220000 CVE-2024-46745,0,0,1810fdd8cfd3dd07004fc4f09934af972754cc295d1890751708649bd77ab182,2024-09-20T12:30:51.220000 CVE-2024-46746,0,0,7880eb752c4578e177f1e05923fbb260f9ebedc769ed15c86919f8afb6ffea22,2024-09-26T12:47:53.267000 CVE-2024-46747,0,0,1948e1f9201fe25611a5c77cbc29febebe96132e9112ffb9f995f2387902f930,2024-09-20T18:31:19.190000 CVE-2024-46748,0,0,1f58ab5daa8fdc3cf242c066f17a57853dc64a33693f07928a094111674fe835,2024-09-20T12:30:51.220000 CVE-2024-46749,0,0,d08c889b54155801d0848154d2e5a797f952a6f23df8a481d6edd8b60c2beb27,2024-09-20T18:45:43.483000 CVE-2024-4675,0,0,897bf9bfba1675ab43c3b9cceb7b3ad24a12ab65256b892b47361d9f07ed1f4e,2024-06-04T19:20:45.627000 -CVE-2024-46750,0,0,c09c1f067655fcdf519db40372da7bacd7550fd274adcad8a90935385ad5d13a,2024-09-20T12:30:51.220000 -CVE-2024-46751,0,0,9a3f715f8855231d0b29f7b0ce4f06ca1ddb8cb0650b529c0cfbbf4ef8fa6072,2024-09-20T12:30:51.220000 +CVE-2024-46750,0,1,94d0b2c6525c5236b580346029666bab576a5a0ad66ee70cd0edd0e2a69fe9b3,2024-09-20T12:30:51.220000 +CVE-2024-46751,0,1,692b8f2562e977a4f52a43b019c5df009b1a6beff9a1fbd4d578ab574d0abbfc,2024-09-20T12:30:51.220000 CVE-2024-46752,0,0,a6e483848fd846991fe052cf397d8e3748be44625f58093adb7b1755e086fa32,2024-09-20T12:30:51.220000 CVE-2024-46753,0,0,3d7493508cc733effcafdd7d2b06bc7d70b1185c0794738e42492fc29ea4f135,2024-09-20T12:30:51.220000 CVE-2024-46754,0,0,d335bc48b5fc1eebe1a7eef0e7eae5f8d2c1b537f7a261d71a0e5ceb10c05e28,2024-09-20T12:30:51.220000 @@ -260529,7 +260529,7 @@ CVE-2024-46765,0,0,584f96269688e10aedc11057947f82fa03feb9c9ca3ecb2a522bbf502bad2 CVE-2024-46766,0,0,55d63c81e0644404ba2b3c5eec2e0e368cac985d5fcde38c97950713f33905c3,2024-09-23T16:15:23.823000 CVE-2024-46767,0,0,fd3b90678eac65bcb3233c07c19427fffd1566d14f3f9a8041e6042771984f5b,2024-09-20T12:30:51.220000 CVE-2024-46768,0,0,404d33c105e2f2e7a4f6108144330470208ba943ab19e3a7f2654703cb3bf44e,2024-09-20T12:30:51.220000 -CVE-2024-46769,0,0,27c275cf99cad3189c828761832a92d77d4a10c7366ca2ce0ffd4d9d81bbe6ae,2024-09-20T12:30:51.220000 +CVE-2024-46769,0,1,59e9fd73ed5771a3f0357badc95770f27642db2c24338119ac66ce339c7a8d75,2024-09-20T12:30:51.220000 CVE-2024-4677,0,0,06b789b4e22353188f4fa1dbcfc045ef487187889647b738ddd6f1b3dabcd887,2024-06-04T19:20:45.830000 CVE-2024-46770,0,0,7f952820dc90535bd167d3f017a589524ac6f56b9d3dfae2b4b9bd0b58f79ea0,2024-09-23T16:13:25.563000 CVE-2024-46771,0,0,d3e25589d0aa5cc76f678addd8f11cf59207b44575da23e672799ad7db6233bc,2024-09-20T12:30:51.220000 @@ -260672,7 +260672,7 @@ CVE-2024-46987,0,0,3e51e4a66f91f3c1a320e0df76dd0f9bd2a4c4e56143ff227719b395a8a10 CVE-2024-46989,0,0,fa29cba3c1dce457e1dbba7936349383199f9bdd1c6535b099705e0bc06fa139,2024-09-20T12:30:17.483000 CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000 CVE-2024-46990,0,0,a651df2006ba8ce24b06699e6e89ccb4decc32abf73ae7975ae4d0581b357bf8,2024-09-20T12:30:17.483000 -CVE-2024-46997,0,0,010bed8d326bdf780f34012181931c8e1f732edd14f0cc74991f0a7e64f12cf5,2024-09-26T13:32:55.343000 +CVE-2024-46997,0,1,92aca82682d4add687b8bf7e966a16c2d31047f153315e44c3daf436233a3a13,2024-09-26T13:32:55.343000 CVE-2024-46999,0,0,3f752cfc2057db8c9e88a86dc03848f68cfeb464ea96f96eaca0cf77bb84d96a,2024-09-24T20:20:39.253000 CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb9d,2024-05-21T12:37:59.687000 CVE-2024-47000,0,0,d44e65f26ff5211f3ae15f921442088284d2de145a1f7d23069c9caedddf80a6,2024-09-24T20:25:30.493000 @@ -260695,18 +260695,18 @@ CVE-2024-4706,0,0,9fb317504579dba9e9851d8ef4d6ad37a71c1b39f231cbe007ab86fbaba76d CVE-2024-47060,0,0,3723bb9e2990e983919d891a0f942a097942693d70a5d147a7a34b2c3bd8fa94,2024-09-25T16:43:47.267000 CVE-2024-47061,0,0,fe88cb5968145d279da6e4fd6edb09ab3be3c5c5915bf3eb5f15f2dbcdbe9c9e,2024-09-26T13:32:55.343000 CVE-2024-47062,0,0,c88a3c374fa0eb0b07de5442f40e8a296375128149eedfb948b94e624d4304ec,2024-09-26T13:32:55.343000 -CVE-2024-47066,0,0,848d3503003b0beb68b0a32471fae028cff02d347e9daec18cdf8b7197aa5eb4,2024-09-26T13:32:55.343000 -CVE-2024-47068,0,0,9fa18205ed6db75eac8827f604c295b45fb5105b39b9b04ec6642eaaaf0df04e,2024-09-26T13:32:55.343000 -CVE-2024-47069,0,0,de213caeb9a769191162a97261070a3d98c902d6acfdcac434afd1818328a8ff,2024-09-26T13:32:55.343000 +CVE-2024-47066,0,1,c938aa14b4956e02dcf0b434c18945502d356432c94e760748910c81591de152,2024-09-26T13:32:55.343000 +CVE-2024-47068,0,1,9a2d3108eea50eff8603bc77d70d90bfdff4f750554a22e7f34077cf80622f21,2024-09-26T13:32:55.343000 +CVE-2024-47069,0,1,d1ca0b59cb9b908604f17a277156c965bb34001301ad8409e27c97bc1fb1cbd9,2024-09-26T13:32:55.343000 CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000 CVE-2024-47070,0,0,4ea115eca8debbd7f8407d6153d3e721624d09ee0302b5e6b473ba0a4b62d9df,2024-09-27T16:15:05.413000 -CVE-2024-47075,0,0,a4c707482ed9ed15f197cc08f0fd770eba503eb24d934030135a9caa3e32073c,2024-09-26T18:15:08.757000 -CVE-2024-47076,0,0,4303df594e4b2557b464094d9194eb22d685492e61c9a7849614bf245ae949d0,2024-09-26T22:15:04.063000 +CVE-2024-47075,0,1,a955baee439f43ff23f5603c3dab864843c41f14129f6e95ff6edd6519063b1b,2024-09-26T18:15:08.757000 +CVE-2024-47076,0,1,b5d605f7718f33043eab4238edb58432c818261140586c8ea1ba1781225e2f86,2024-09-26T22:15:04.063000 CVE-2024-47077,0,0,0283963e39ed592e425ac7ebe5b36c330cbd285fa06d3f973d91b681dd5b6580,2024-09-27T16:15:06.043000 -CVE-2024-47078,0,0,64213b6a5c750c509872d49c1274178c839b92046b4e8257c5790cb7b4a5d616,2024-09-26T13:32:02.803000 +CVE-2024-47078,0,1,f62e4b6a06a4e25ca8c2b3e5dfd5368a6f25a3a562d4ac9b28b8f541444fb2d7,2024-09-26T13:32:02.803000 CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000 -CVE-2024-47082,0,0,863bd134b5e2e2c07206cfa4641c79a7f77a6df89fcd648b7374dfe92c23c92f,2024-09-26T13:32:02.803000 -CVE-2024-47083,0,0,db33d394e80203adc35467523ae3af8416101d78d6ce60e8410b08e550c5fcf3,2024-09-26T13:32:02.803000 +CVE-2024-47082,0,1,d7ffc8b868640d5bbc5bc3253e64c223c49da037df585cfe29979998a6e29188,2024-09-26T13:32:02.803000 +CVE-2024-47083,0,1,5b490c0fd8cdac8afed0a02d02ba8fbf5e1993a5d9b09690e4aa8f97b99a9224,2024-09-26T13:32:02.803000 CVE-2024-47085,0,0,52609fda0dd3268fb54a4c4835942301029b5f82b7a9256b81c2395928ebbe9b,2024-09-26T15:30:47.787000 CVE-2024-47086,0,0,170e19d2a5f94228d179fe1c43d4342418d894a17ee62d0745e0ba04130a0c3e,2024-09-26T15:29:47.233000 CVE-2024-47087,0,0,00c0418dcbaa10bdb3121773be01ff0430232cec071716dead5062981f005e75,2024-09-26T15:25:51.467000 @@ -260716,17 +260716,17 @@ CVE-2024-4709,0,0,291d83b7a71e23f3ddf2ffe4b4f9de6c9c89e71bab3de54c457add53e92c99 CVE-2024-4710,0,0,bc3d641a4dcd652350f442cdc80714adde1798c9afb82fb5cdb92bbe3aa27b20,2024-05-21T12:37:59.687000 CVE-2024-4711,0,0,d363465dc42b9acab3c0c0b87ab6c465a5fbabc481e6b69ff97f983a499169d2,2024-07-18T16:32:23.447000 CVE-2024-4712,0,0,3843a22d246b1dcd1f463ab35db131587d98590206b11784167b4cf4df51610c,2024-09-26T02:15:02.550000 -CVE-2024-47121,0,0,9e12bc1a35a5ab0470076ce2987df43e1211b6d18fbb15ef36e55db6f4337f07,2024-09-26T18:15:08.967000 -CVE-2024-47122,0,0,4c14223fdfe58f007e574e25aa99521af2c733f2734fc1c5c385c6c327e13028,2024-09-26T18:15:09.077000 -CVE-2024-47123,0,0,9032b459ec9af083af2e8d5f67c6e5c510acea86b4f7edbc0ce68ace6656eab6,2024-09-26T19:35:23.310000 -CVE-2024-47124,0,0,a8beb50d8ed55f7bc5adec8f44054910a66f3a29c12d310a945b384323758780,2024-09-26T18:15:09.310000 -CVE-2024-47125,0,0,23e9ef992e37ea2917bf8a19d5525132863dbf7369f72241b66029e0ce602b3f,2024-09-26T18:15:09.430000 -CVE-2024-47126,0,0,d28255995e2e78cb9d154259cc04d2b95c863818b1bb665bbfa427bee1f1ada2,2024-09-26T18:15:09.553000 -CVE-2024-47127,0,0,50d83b6bc33d5f0dba3e1e8a3c6bbfd67fed69915c05fa215f9e660862d2c0d2,2024-09-26T18:15:09.667000 -CVE-2024-47128,0,0,38e5c36c709d7c90a89a3d2c9f53a4e6418a7f68a6ebcd46d0de5091747c7721,2024-09-26T18:15:09.783000 -CVE-2024-47129,0,0,a8ae8f0445972cdd6e5a55ee4427fb93bca3a7d2a6501b00541bb513c6324151,2024-09-26T18:15:09.913000 +CVE-2024-47121,0,1,2abc44e82b91061374428baa95d98be438515edd437c930a13d7d9de43fea669,2024-09-26T18:15:08.967000 +CVE-2024-47122,0,1,2170aa4dfeac4bbc52e87a16782745e8ac712b111430bda3cd588071322be153,2024-09-26T18:15:09.077000 +CVE-2024-47123,0,1,d560ae833c1fc1e39422023d549653d94d9e84912627e203ec79dbe996a4a915,2024-09-26T19:35:23.310000 +CVE-2024-47124,0,1,f6cd6c37bdb924ab5c2399ebc265497198fcb191cc20b1343b44f62567705662,2024-09-26T18:15:09.310000 +CVE-2024-47125,0,1,a9ecb5731c9df1e95ba9e76506e2f8bc344763358288482282b22d6b08ef7ec5,2024-09-26T18:15:09.430000 +CVE-2024-47126,0,1,0d1e47b9cbe889325c40d99197a022c89f5f9e398c07e9dbc21fdcc6070283a1,2024-09-26T18:15:09.553000 +CVE-2024-47127,0,1,d1cc30a0e619440f975b9f0425e21cad01edb82b64a8e6267448b157025c39e2,2024-09-26T18:15:09.667000 +CVE-2024-47128,0,1,61ec8e44be4259ea6363a62c71fe5208bc50565db6ec7ecdf29eaf6dd07d40e0,2024-09-26T18:15:09.783000 +CVE-2024-47129,0,1,32ad92b0587706b36edbfa7c109cf70441b78b3d63d7faad2531349555f855e5,2024-09-26T18:15:09.913000 CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000 -CVE-2024-47130,0,0,b561c5435be336c1a88dca57c681a9de5320318422722ed49c4465c91053854f,2024-09-26T18:15:10.040000 +CVE-2024-47130,0,1,5bacd748f0875cb25861037aa6872a4594c12cd9e061380d0c56138bdd59a121,2024-09-26T18:15:10.040000 CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000 CVE-2024-47145,0,0,1a35765c26b04b61b861cee47b184170021783241b94fd51efafd1127befdb57,2024-09-26T18:42:33.550000 CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000 @@ -260734,17 +260734,17 @@ CVE-2024-47159,0,0,f629ab8645ae2d3b373e84498ebe22f56e42f569db9052d68376aa856c847 CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000 CVE-2024-47160,0,0,c1aad4fed9b1c25a1ac730f435c0afe6164d933ac9e43b9a1caf75e24768ef64,2024-09-24T18:03:48.370000 CVE-2024-47162,0,0,322233fc16cb60b7afacb06e9a8b8faccd2cf3bd8a5ab8537cf655de3bfbfae0,2024-09-24T17:57:43.827000 -CVE-2024-47169,0,0,526d244d9088c4c4b791ada215f391217d4a3358da3b61f13267dc162912cd0b,2024-09-26T18:15:10.157000 +CVE-2024-47169,0,1,e33f3db3bdd04702a8c2e5ea09346c94608ffc9003bc25e394406542f8f3d008,2024-09-26T18:15:10.157000 CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000 -CVE-2024-47170,0,0,fe4d13cf77d513f35ba2853821b8e2ae8222bd4eed1fa1e6b09b0cddf4424717,2024-09-26T18:15:10.370000 -CVE-2024-47171,0,0,08a80451561ba5bbd5c611d866676ab79cf9777345aa0dcce4bf15d17a3b3559,2024-09-26T18:15:10.590000 -CVE-2024-47174,0,0,a9e224a534d1dc1418acac6fb1d9c84f8610e405f9c48f2cb604b84073ae235a,2024-09-26T18:15:10.840000 -CVE-2024-47175,0,0,0b42a73e9b3c9ee1c8a433b8f55adfec0615c0b3f1a75ff38be6b0ea39353dfa,2024-09-26T22:15:04.283000 -CVE-2024-47176,0,0,fd5df7e91e50706bec9dd5d8b4c6da50748e95ace1a3171c59677a6deebee8b2,2024-09-26T22:15:04.497000 -CVE-2024-47177,0,0,4693ff070f9f11940b1b6fa608419c33ee06a3d35c330a56c23ddcccb6e86a77,2024-09-26T22:15:04.740000 -CVE-2024-47179,0,0,9058d44736aa5879fe15ebac05ddf4897c6368571c116083074f73c4d934c6d8,2024-09-26T20:15:06.950000 +CVE-2024-47170,0,1,e5b16e6a39bacfb59f03271eb8e950abf0e773e9fb8adfac98aa1a5b714c888f,2024-09-26T18:15:10.370000 +CVE-2024-47171,0,1,9e279b103eb844b23e178eb21a348a67acdd9164c91f1d21a226be600f0e424d,2024-09-26T18:15:10.590000 +CVE-2024-47174,0,1,6fa26d82a1b33f95bbf8a1e0855ff6535581811be06cf33594f6d97fe6aafdc1,2024-09-26T18:15:10.840000 +CVE-2024-47175,0,1,fa1548d1257cebc826a6ec01d6dff7de7a1e2b2a3589aa8e2b64c71d8cd9c8d8,2024-09-26T22:15:04.283000 +CVE-2024-47176,0,1,a3d89dc21721bc279bdf94eb1d8216e0f9c78b0a6a16de589d205570e1c8050e,2024-09-26T22:15:04.497000 +CVE-2024-47177,0,1,d56fbb29ccdd9e7d283709e77d445f4bcb1fa0f8852fbd135e120bef7752ca00,2024-09-26T22:15:04.740000 +CVE-2024-47179,0,1,ef247904a19c46d2694845ae7cade3025603bb814bd5be3dbbff64d9d3a8a82b,2024-09-26T20:15:06.950000 CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000 -CVE-2024-47180,0,0,d098d674c2c5dd84a239cf91df06907f039b4828c306456dcad3f506e675b516,2024-09-26T20:15:07.310000 +CVE-2024-47180,0,1,edb02c70b31e5ebeb97c297f7a7d274f95b47ea6afca69e49dfd4eb097628c5e,2024-09-26T20:15:07.310000 CVE-2024-47182,0,0,69a16fc9154ea6d7ac97d74655916e8770997f865ecb98299d0d581a01a394b7,2024-09-27T14:15:04.620000 CVE-2024-47184,0,0,af8ebb1816d7ba0a039271d512029a4f3a5177b9bc7103f3acf040e130a3146c,2024-09-27T14:15:04.833000 CVE-2024-47186,0,0,e4f8ce43fafbf516bf28164ab1dec73a08a2eb15490bbcac5ce1bb957b6e3c72,2024-09-27T21:15:03.443000 @@ -260757,8 +260757,8 @@ CVE-2024-47218,0,0,cbae5651883fc6a23cfded5441ecfa0a8fc9a13deebe9132508757a320a35 CVE-2024-47219,0,0,a066954bcdf131c2608027bab8859b20b54f044bb76995c0988c392d4a5406dc,2024-09-26T13:32:55.343000 CVE-2024-4722,0,0,d0eb70616d7559be2944527d8cacda4cb03faa787985cf2ceace067dd7c5ef1c,2024-06-04T19:20:47.553000 CVE-2024-47220,0,0,ec1088c10a16b1d5d48c36f52f549a9f66295221614c4c2acd2563482d5ed68e,2024-09-26T13:32:55.343000 -CVE-2024-47221,0,0,9945326a63a4f22056aa693bc302be5627c81a203ca389984e5641561e32c74d,2024-09-26T13:32:55.343000 -CVE-2024-47222,0,0,c9d91390c6fc5cc28c9595e327041e2003c4b786ecc4a4fccc3e7dcd2477488e,2024-09-26T13:32:55.343000 +CVE-2024-47221,0,1,cc80d5b45c9b68b206ee1a2dbfe9f9a68f652cad6fbd63e536e536e628b771d4,2024-09-29T00:45:21.857000 +CVE-2024-47222,0,1,bf7e0a5126504c00a3d2f85012c5939b940ef4df1351d22b29ef5dbc4b68f1c3,2024-09-26T13:32:55.343000 CVE-2024-47226,0,0,67acd1dda98161941683c1ecdf3fb2829a8afb2cdb12d796e19b0a64631c82e3,2024-09-26T13:32:55.343000 CVE-2024-47227,0,0,411c02c14211cd5d3ec12de94c1c6b5b491382d24a6716c2e035097b7090e042,2024-09-27T16:37:44.143000 CVE-2024-4723,0,0,7af98ecd367a90ef8c416c400db7bb1bdf630fc1c111a3c8e6b7b48b9bb15bbe,2024-06-04T19:20:47.717000 @@ -261715,7 +261715,7 @@ CVE-2024-5792,0,0,9094b7486c3fc344423def250d1a80e78a3bf07108bd316adddc44339dabcd CVE-2024-5793,0,0,4f7c09f8feed484d3c3bfde7191aecbd9210e86e918c2f39cfc1ec374b1fc06e,2024-07-09T18:19:14.047000 CVE-2024-5795,0,0,956ff1b2f14e29b7f01f801db379e0436600c38786f3ba041afbcb3f8c718295,2024-09-17T16:24:29.340000 CVE-2024-5796,0,0,e179556883d33099fab8768b9c3d50a47b2a022b7b46e47f95f4ba7640cc26df,2024-06-28T10:27:00.920000 -CVE-2024-5798,0,0,3aaadb587c9d91372dc0635cbbfc89b5f63af5a22b0d2a5da4cd6de81034493a,2024-06-13T18:36:09.010000 +CVE-2024-5798,0,1,8c4fc55b5a68256010d6e6bfcfe06ef9f209d5a592c838664e8662bbc4a3d762,2024-06-13T18:36:09.010000 CVE-2024-5799,0,0,7dd7f7ea5b6fee89dd0eb91dacd880561304ae591d99359107b4e3e905c13d92,2024-09-26T20:39:09.127000 CVE-2024-5800,0,0,a1cb578d92a5ce21abf5c6c3a9df30d0f15dec959b83eaaecf5cab603de30571,2024-08-12T13:41:36.517000 CVE-2024-5801,0,0,668584c28d68f34806b15aa23a003fb18ba18cb7fb2d24326345f03f0e3dd0a3,2024-08-12T13:41:36.517000 @@ -262322,7 +262322,7 @@ CVE-2024-6508,0,0,5773cbe3ab2c4eb69c1efc3c03d7ae03bdf5d1ca7c49c5fd875f2b2bd8e08d CVE-2024-6509,0,0,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000 CVE-2024-6510,0,0,271701171f98244795ebd972ebc5048aac2cefcf02c3610beea189409c6fb6ff,2024-09-12T18:14:03.913000 CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000 -CVE-2024-6512,0,0,8a457a741b9a13f5ecaeee00a784b033b2d995ec1c0f7ec68bc29f18c23c3ea0,2024-09-26T13:32:02.803000 +CVE-2024-6512,0,1,e5f59e81be1a76fa6bf983d89a9f63382172e481a755180244787cf8ca04cb61,2024-09-26T13:32:02.803000 CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000 CVE-2024-6517,0,0,284a9e11267ab25537790597701cb80256104a9ef1a0a6406ea3f17ec8a06130,2024-09-26T13:32:02.803000 CVE-2024-6518,0,0,7382529f36b9b37e0acec24889e25676a677588945f854438be53c4cb8bd58b0,2024-08-27T13:15:20.033000 @@ -262345,7 +262345,7 @@ CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79 CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000 CVE-2024-6542,0,0,bb318408eda9e57d4fba1c49251ffc615a87c88f77b6516a9b3efcf954de0990,2024-08-14T16:32:34.753000 -CVE-2024-6544,0,0,9e1a661807258c3b50f30541c6e2b51e15dedbc1533b705e10e9cf3dd69a9125,2024-09-13T16:37:22.997000 +CVE-2024-6544,0,1,45f53c801f5be057304526bfa46ae491276bb3854816f041adef1411f73b7edd,2024-09-13T16:37:22.997000 CVE-2024-6545,0,0,97ee5e13519e722f4006d1598ff8b5d6e2e4cb7552f463abeca3e656c343e880,2024-07-29T14:12:08.783000 CVE-2024-6546,0,0,0eee46a34ab9f84036d2fbded3a46124e4089d04296fa0288f2cdad15177d72e,2024-07-29T14:12:08.783000 CVE-2024-6547,0,0,18c84e0486ad4b936dd6fb72fb2fdab2178f5a996a76eecb6a226aad2d913b31,2024-07-29T14:12:08.783000 @@ -262386,13 +262386,13 @@ CVE-2024-6586,0,0,fae1812021b838f78d9872593f00167428e312ab2f13f81f35231f528789de CVE-2024-6587,0,0,beafb6345b23524627cc95c414e61dfbf32246a233b66daa9ffc1674c11f0da4,2024-09-20T14:55:16.423000 CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000 CVE-2024-6589,0,0,786a762dda95a3db4c9cdc907a3a2b97d61313e4f2473ece396d13a201bdbeba,2024-08-26T16:21:36.530000 -CVE-2024-6590,0,0,e2e771e69e26489e365b30443aaf84ac6f2df34b40af1eb9ca3a06cb4cbc4ea8,2024-09-26T13:32:02.803000 +CVE-2024-6590,0,1,e682eee2956701b0bbb15f0f0c77e3e5a4b1531c5a11ae8834adaf62bec601ba,2024-09-26T13:32:02.803000 CVE-2024-6591,0,0,ba434f770e77a561bd09877a3c29228f51c9818a995d0175b55ef4d80494af35,2024-07-29T14:12:08.783000 -CVE-2024-6592,0,0,541278997bf5d917fd1aa4f2f06e7bc0f1024e7ef3b67128459b5596ef61b91b,2024-09-26T13:32:02.803000 -CVE-2024-6593,0,0,a3711b7815bf076bbdf11763068420c8ae3f8915dbb80b28262339e3d7d65a00,2024-09-26T13:32:02.803000 -CVE-2024-6594,0,0,2dda24d050f98b678de0a3134ca76a2c224cd3b8209a8aaff3478c9057cf0f17,2024-09-26T13:32:02.803000 +CVE-2024-6592,0,1,56cb2f00de87e3e269cc8bb2d38c49a9ccab28362051ec2cc4587d49bac7038b,2024-09-26T13:32:02.803000 +CVE-2024-6593,0,1,74ecb1f976e55139114c99c3f17176facb148c28c535f4017b2f6089c1f43c92,2024-09-26T13:32:02.803000 +CVE-2024-6594,0,1,ac88be8dc98c3bc388168c64e96f2927ecb5fec32a63511b4d75d4d79df9b0bf,2024-09-26T13:32:02.803000 CVE-2024-6595,0,0,1592dd03cd1b2c459ee5de6a924fab7f4c8bad5124f72f8b639c71537346952d,2024-08-30T14:15:17.063000 -CVE-2024-6596,0,0,fbc52d4ad7cc3809cd1ad61f11ddbbe24543620b93977b9bbe0dc2fc14b26149,2024-09-10T12:09:50.377000 +CVE-2024-6596,0,1,1de9660f09baabd2cd489910098e85b8cdc20413019bc0f0b1598d8d7c446441,2024-09-10T12:09:50.377000 CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000 CVE-2024-6599,0,0,6a69a16a0a8781527f95db9310983c42c357e28a72f780fd79d80c9654364b86,2024-07-18T12:28:43.707000 CVE-2024-6600,0,0,8a7bdd7b6969fa6cd69a1854f6f2130a9698184b9485e28b1c9cbb32470416d8,2024-07-16T18:15:08.737000 @@ -262443,7 +262443,7 @@ CVE-2024-6650,0,0,06d380480b3184a2b1dceb59084b40d2dcd977ecfc30eac16df686ef247b89 CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555ee,2024-08-06T16:30:24.547000 CVE-2024-6652,0,0,8978a0baa082505b94e778186034022d155714d2d8ee4e86dbb9cc40d29251d6,2024-08-08T16:43:37.053000 CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000 -CVE-2024-6654,0,0,6765928f4950edaad8478fadcbc8dc7c45ce169434a4dca2fe3c5e45bf6c63b2,2024-09-27T09:15:03.937000 +CVE-2024-6654,0,1,0cdc2cb5aa50ec2d377a4abf1ea8dda62b6e713e698b7d9c623109702419ca69,2024-09-27T09:15:03.937000 CVE-2024-6655,0,0,a32b97bcdf109b29c8d77151fae7b1b28b3012a09ea60dee2c55a3acae47acc7,2024-09-25T01:15:45.070000 CVE-2024-6656,0,0,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000 CVE-2024-6658,0,0,c59a5bc453b7b50f1c8c3eefda7e3a6df21ab1a88b2d2e9df9362f9733c6e2a7,2024-09-23T20:15:05.560000 @@ -262531,7 +262531,7 @@ CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f277 CVE-2024-6766,0,0,4e69f4c5d546bbff4d97a532e9e5f675c0139ba3a0fba76f00597bc0bd516b20,2024-08-06T16:30:24.547000 CVE-2024-6767,0,0,e624184eb5b85e1f323682c46b24401770f3ecb164370e5143c01069a4262025,2024-08-21T12:30:33.697000 CVE-2024-6768,0,0,82748b5876adf1db3885f7851e524fbc4111b7e46f9748cb3a4056bb52182449,2024-08-13T12:58:25.437000 -CVE-2024-6769,0,0,afcf32c9cb52fbf429e93b707edf4c3e78467326b00622952ee66671d7ba61f9,2024-09-26T21:15:07.787000 +CVE-2024-6769,0,1,19d9fdadb40748d19ec5907cd6e50a633a0ed22af18e8e4e6561d0090bc78bab,2024-09-26T21:15:07.787000 CVE-2024-6770,0,0,4e0dc06a2aaa55c8bf6c7adb0f484fa8776788d11a4220cb3908768a1c995eb7,2024-07-31T12:57:02.300000 CVE-2024-6772,0,0,f0ffeebc9a92372629de2eb0378ed8854f5d1b95881919ea662c83ca59f4b1a0,2024-08-06T19:35:10.307000 CVE-2024-6773,0,0,1bdc9e628b27751c087418245f6e220f86984c0c8a171e81c36efa661e11acef,2024-08-06T19:35:11.320000 @@ -262546,8 +262546,8 @@ CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0c CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000 CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000 CVE-2024-6785,0,0,ef25cfd9dd9fb398c181c2e2c1a44a7dbc0dc59353d1fa28c2cc7cafe3b60589,2024-09-27T18:59:25.253000 -CVE-2024-6786,0,0,6597b7dd569386c901be03b7245eaafe138b67af6e27e8cdf77a3a0b8ca4cea0,2024-09-26T13:32:55.343000 -CVE-2024-6787,0,0,e0b77d2378b8922074bb9dd2f1bdf4b4b3c5d5d4b21b5875d179c9f9f1a98777,2024-09-26T13:32:55.343000 +CVE-2024-6786,0,1,3493add59ea41909363960472a7490ce43155eacf299d4a14021628fbd24ac57,2024-09-26T13:32:55.343000 +CVE-2024-6787,0,1,069c45bc91f1142aab5002ae41cf01ce3d1f7f8ba9e8ff23b9c4e02064c4ad40,2024-09-26T13:32:55.343000 CVE-2024-6788,0,0,369ef896034f113597a96208fca075acd0c3bdd5e82bf3987939f5fd20470069,2024-08-13T17:11:53.553000 CVE-2024-6789,0,0,e33e978edc987b98e576665a6bdb79eb993fb5854279dc068f6ea120541693df,2024-09-16T07:15:03.877000 CVE-2024-6791,0,0,6ce79f46aa2ab35d9212f59a5703ed0b8f9ce029cc93e4591d5b48478ec576f2,2024-09-17T14:44:39.387000 @@ -262557,7 +262557,7 @@ CVE-2024-6794,0,0,ad94acaa214038da0f1d2d9a411a4c1c4e53e8ac05cf5953ca0eb0b2970fe6 CVE-2024-6795,0,0,43a9755eea89cb70653f5bb3a7b4b270588a1e76e27a27f3976e0e66d5198a2a,2024-09-20T14:53:15.217000 CVE-2024-6796,0,0,ea450aaa268d6c6930fa47bff0f10e52dfa43850b94210c20818c6bdcee5cec7,2024-09-20T14:53:11.447000 CVE-2024-6799,0,0,39536c19a9ca2d6262efda14a231fbf09108e28ad2b189e8ce4347991001df6e,2024-09-10T15:05:48.583000 -CVE-2024-6800,0,0,a15298e35d6052e73a8ba7e320d06f1ae120c932f1a3656ad087f1be4be328b2,2024-08-22T15:15:17.127000 +CVE-2024-6800,0,1,a5d8346745f242933d21fbed086500bc35ec95f2fa2f5715ca5593178025d7b8,2024-08-22T15:15:17.127000 CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000 CVE-2024-6802,0,0,41c45597ef2d2991d0ff5de1c94d34d596167540846175036f3a8eca13168f84,2024-08-26T05:15:05.980000 CVE-2024-6803,0,0,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000 @@ -262656,8 +262656,8 @@ CVE-2024-6932,0,0,b45f238b66342b8a7c2c79c0dddcacbab87276fdb0cd01ae77c1653350b609 CVE-2024-6933,0,0,31e003a378d639e27641dced44e726d35d058acd0301a48a16d76976ef2aa1ee,2024-07-22T13:00:31.330000 CVE-2024-6934,0,0,e803290e0f45598964544bee83d9eab1d1648748432498a6102e4608f1e931cb,2024-09-10T20:22:56.390000 CVE-2024-6935,0,0,e72e7506294a595ab2cf5db5061b1cb277319bbf98ed1b3e690a38f115d41f6a,2024-09-10T20:14:55.343000 -CVE-2024-6936,0,0,4577b3afdea08ef342dd85247402a57dfff23ab9c07a41a4f2c576d4c65eb8f9,2024-07-22T13:00:31.330000 -CVE-2024-6937,0,0,b63bb470375f2142964fb92a1dfcf47a63984d8e097aab41275eebd556b8da44,2024-07-22T13:00:31.330000 +CVE-2024-6936,0,1,c3135623e07bfa962eaae47b33235e55701757a791431ecc292302b1d8016c20,2024-07-22T13:00:31.330000 +CVE-2024-6937,0,1,74e62536b58f09d059ad27b8ef986d46bfc8bc78bc2dfd9fd9d32d0e294f1897,2024-07-22T13:00:31.330000 CVE-2024-6938,0,0,b45e7150592dc53d2d6f8456f74caeee413b2781d0948d41717bd8701ae68b88,2024-07-22T13:00:31.330000 CVE-2024-6939,0,0,a7847aa2e67130908ca4b0fccbd5e84e8651f5b038701465ea8b316a5bed0334,2024-09-20T22:55:37.133000 CVE-2024-6940,0,0,5a3082ab9e69eb4544b88d6195e3acb056697f1ce4655acc61d1de5cd6e851ce,2024-09-10T20:12:35.823000 @@ -262721,7 +262721,7 @@ CVE-2024-7006,0,0,407596314396364e4943bbca86287583cbccbfd5ef54346220152eb6a6a023 CVE-2024-7007,0,0,6c2603aae32d52f56620cb62e82bb337e026d3d4a4716b72dab9674c5cf4b216,2024-08-26T16:40:44.500000 CVE-2024-7008,0,0,e9008eac80639f6b75fc8244a6b0baab3d6a7fa095b7e9aa58d7626a117a490a,2024-08-19T17:19:25.390000 CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400e2,2024-08-19T17:18:50.290000 -CVE-2024-7011,0,0,870f43643b73b1775aef3750fa7cec5942255cb040d035b146ceaa71dd9c37fc,2024-09-27T03:15:02.307000 +CVE-2024-7011,0,1,db0f561cfd39f03fcabcf1112beeb29601844f9f50d58cb76258e2d5815add6d,2024-09-27T03:15:02.307000 CVE-2024-7012,0,0,7505e34b161e28dbe95eb89541c44fc261402b7bb3b4a766cd0492f45404fdcf,2024-09-19T06:15:03.777000 CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000 CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000 @@ -262773,8 +262773,8 @@ CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d5 CVE-2024-7104,0,0,65dfc462223ed34264e8700eb7e9171b84ef85c656f444224981a91d9956a19c,2024-09-20T14:44:18.010000 CVE-2024-7105,0,0,46f1c8544843abdf42260f92967cf768f61b8f943bd2d80ab65735c61cbf36f4,2024-09-11T14:15:33.063000 CVE-2024-7106,0,0,ff3ffd817a427576052bad31a6af61e50bfb0473d392446ac87a1106350f920d,2024-08-13T14:15:31.030000 -CVE-2024-7107,0,0,c7bd1a93f9a31f91df9402fbfa285f1d061e40b22acc14f37c872bf8c06ea847,2024-09-26T13:32:02.803000 -CVE-2024-7108,0,0,723aeb46696df8ac5da706e9bfdad9274261d1b67efe8b05f0130dec50559cd8,2024-09-26T13:32:02.803000 +CVE-2024-7107,0,1,71743d4dad18d41653bcf5df1fdad649f5d582cc2316708780278044127de1d6,2024-09-26T13:32:02.803000 +CVE-2024-7108,0,1,ce873b22df7847d732c118d8df6e354bbcd135a320b22197f321f89a7388c28f,2024-09-26T13:32:02.803000 CVE-2024-7110,0,0,a4d256798386bbcae63cc631884c30e79e65250cc4557b1041a9bd821ab24cc0,2024-09-11T16:52:37.847000 CVE-2024-7112,0,0,8ade2da3c94d5b9dafacd952ec2bbc34e1f1f89b182ab227f6b775e3286c65b7,2024-09-26T16:12:49.780000 CVE-2024-7113,0,0,0a8f4221b6e071d6c72a8ad7c45f4c251b092637dae636c0dfdbfb44a73d4a6e,2024-08-14T02:07:05.410000 @@ -262890,7 +262890,7 @@ CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698 CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000 CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000 CVE-2024-7258,0,0,d87745b439eb0eec0ee02b318012450e9a5bbd9a1641e9180767ba5e2e2be570,2024-09-27T13:05:06.930000 -CVE-2024-7259,0,0,06b546cb7425acd940841d9812f3e9ea327d9484b7605f96ad6e03fcd1cd086d,2024-09-26T16:15:08.997000 +CVE-2024-7259,0,1,14b500a59c2c12c9d5ca0fda58c51c0ba565f96064f6fc4fe3ced6f2a4e3f2df,2024-09-26T16:15:08.997000 CVE-2024-7260,0,0,7ac5c086a530cf5346822fe722bc0e211467ce336a1543005152dae602c7481a,2024-09-26T15:01:07.803000 CVE-2024-7261,0,0,f672393d607443ec498009a9b040ef410e3a579843a04e18027fe16c96a4fd8c,2024-09-13T19:39:40.570000 CVE-2024-7262,0,0,95b3d95a32b25a2634e7e0faa3f1f6b57a404f18277315b6dddbf2c940c189df,2024-09-05T13:30:33.680000 @@ -263002,7 +263002,7 @@ CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c5 CVE-2024-7383,0,0,21277f7530eb9638c0031a3484c43cc9bf1c76998abaa0508791395c60c4cd7b,2024-09-25T01:15:45.270000 CVE-2024-7384,0,0,e16089be5aef5f78ca7e6b44ab3843ceb098d29ed31bfeb024ecf87d32c582a0,2024-09-27T13:15:28.443000 CVE-2024-7385,0,0,a77c5e9bd92ca25ffb5d5fc3a083bc3c8336b2e231394dd2af48112daf35e0eb,2024-09-26T13:32:02.803000 -CVE-2024-7386,0,0,73853b6e40a3b4b4a94fcf4c59609f559f6495383ceafa0a1df8f3191c741131,2024-09-26T13:32:02.803000 +CVE-2024-7386,0,1,d2e07064fd53b4f2486678922d08c221ca3e369913ce854369225c4eab166918,2024-09-26T13:32:02.803000 CVE-2024-7387,0,0,de7380b259c5cde0120b2e8a809f8a10a35a7d4a44cb8d5f57cbb1470484b8a0,2024-09-20T12:31:20.110000 CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000 CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000 @@ -263011,9 +263011,9 @@ CVE-2024-7394,0,0,311dd8d09f289dca72e294063b3121b4c7fd832b8fb4e9134c8457f94c79d2 CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000 CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000 CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000 -CVE-2024-7398,0,0,1dcfef49defa559c01e2851abae1eafd982a8e8c238f6930f092d0303f2326a2,2024-09-26T13:32:02.803000 +CVE-2024-7398,0,1,7ca8fddb8ef1f52901b2255125fac0a0a6c61da66ccb82e3e8b1d5c901cab621,2024-09-26T13:32:02.803000 CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861e6,2024-08-13T15:30:52.337000 -CVE-2024-7400,0,0,5473aff250567b2681804900ec4c66c9b5eb81c659a1e03335c8a921d1e72ace,2024-09-27T07:15:03.387000 +CVE-2024-7400,0,1,0a91a315bbc76957faa74c611b1f8ea1f3c1591bc708d3cbdea4cd805efe4da3,2024-09-27T07:15:03.387000 CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000 CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 CVE-2024-7409,0,0,f8780d25575ceaa72bb05ea56c673e2b6be1f1e6ecd77c7a6074e31ef6bc0967,2024-09-25T17:15:19.213000 @@ -263022,14 +263022,14 @@ CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e327 CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000 CVE-2024-7413,0,0,cc9a3132dbf30c713a640687e195177085da2f3a67f589d16f765a82cdaabb61,2024-08-12T13:41:36.517000 CVE-2024-7414,0,0,ec5a655568a866725caccc407e481351f1a5df496455996ee3102ef3dac59f70,2024-08-12T13:41:36.517000 -CVE-2024-7415,0,0,635de2a957d86d33c8ae8c57c08ec9a59fa790990e371bc472902145ad47b98e,2024-09-06T12:08:04.550000 +CVE-2024-7415,0,1,4ca72ae97b363de3f26a8b072063b9a51f348ec1424665e4b42eacd9c561d984,2024-09-06T12:08:04.550000 CVE-2024-7416,0,0,67a9ab6c88d18462429964f1183d705aa9fe2b8f49f4e7e013c20651e7dbf059,2024-08-12T13:41:36.517000 CVE-2024-7418,0,0,6785004d3e0c8a7d4acd7be47cb26ee53d058e1a0fbb989539468dc8c9c8a1ec,2024-08-29T13:25:27.537000 CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc054,2024-09-13T14:45:43.513000 -CVE-2024-7421,0,0,33e4e007e227b7e38adbf52d4dfe85c1a36f771116ca9f2ca7c3d8c72bf90cc2,2024-09-26T13:32:02.803000 +CVE-2024-7421,0,1,6260576cc2c3fd3f9dbdef0d28f51daa1eecf4cdd009572459e3c1541da94a2f,2024-09-26T13:32:02.803000 CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d62,2024-08-19T13:00:23.117000 CVE-2024-7423,0,0,683032207cd0b1b10abe49d0a408feb34a406022ce5c9940510e7ae64734c49a,2024-09-26T20:08:31.863000 -CVE-2024-7426,0,0,9f3e55786129b781b17170a967b9ef5bc6b742cfe2caefbc0e61ae60385622e2,2024-09-26T13:32:02.803000 +CVE-2024-7426,0,1,ec174e3fd64c9ca33cc9c90fb8b99c02b6b8adbf5d8fac35b63ba4dd39b28f13,2024-09-26T13:32:02.803000 CVE-2024-7427,0,0,db7ee0ecad2784af038bf44c17fdbe281451988802f60a362e8cf5f513055a51,2024-08-23T18:46:31.730000 CVE-2024-7428,0,0,6dbc394d0d800a640022319856b0e52c143a4490c0eebfb1fe7dd2cce04fb45f,2024-08-23T18:46:31.730000 CVE-2024-7435,0,0,66fc1a447d06c1e8d0a9056fadb7b0070b6d69677ecdcc565c829d3d11041847,2024-09-03T12:59:02.453000 @@ -263074,7 +263074,7 @@ CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54 CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000 CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000 CVE-2024-7490,0,0,2dbd6717a12bca522d1065ac017f63874351831b0b05b9f6e750116d667cf962,2024-08-12T15:22:20.267000 -CVE-2024-7491,0,0,d689a374fb3537e15633f4540eb868e4dc80670c3ee0d8274c63d44d12227824,2024-09-26T13:32:02.803000 +CVE-2024-7491,0,1,a01b632cdea4b7de4f1d96a6110e5895a43b6bc1c1fcfe3f5789f97da5b84105,2024-09-26T13:32:02.803000 CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000 CVE-2024-7493,0,0,3771857e70d7d3e7e04dd2b1f1ab0ad1e21954c07c8190785053e50de0d1ed22,2024-09-26T17:41:16.390000 CVE-2024-7494,0,0,3a598ade67522bffd51a3365723ddb5bff4182d602034c8ec8df719958075683,2024-08-19T17:34:50.933000 @@ -263140,8 +263140,8 @@ CVE-2024-7569,0,0,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f1 CVE-2024-7570,0,0,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000 CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000 CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000 -CVE-2024-7575,0,0,346ad645ee628107891e8fca11b2b72461014a2b4ae2de6c7435b49078f42876,2024-09-26T13:32:02.803000 -CVE-2024-7576,0,0,092ba710f10439dc57c32da980986d1bf17d4f819dd4cacd289f483a10b1cea0,2024-09-26T13:32:02.803000 +CVE-2024-7575,0,1,6051a697dcc52968c8ef178679be3e7959ff89ab58529f0bc40857a438f687f6,2024-09-26T13:32:02.803000 +CVE-2024-7576,0,1,7fbd6ca155ff3a215a8b7455f0582289d5022b8abbf96d3b13c339d10651dd3f,2024-09-26T13:32:02.803000 CVE-2024-7578,0,0,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000 CVE-2024-7579,0,0,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000 CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000 @@ -263156,7 +263156,7 @@ CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261 CVE-2024-7591,0,0,9bcedc7acbbd809dd6a6f1ce5b15338605c84badc4e03df5409c4faa7e372fa9,2024-09-19T18:19:12.210000 CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000 CVE-2024-7593,0,0,60b30c808c702e818d231ca6cd3e332309e25b5d629eb181703aa0b1b2d6d1a4,2024-09-25T01:00:03.110000 -CVE-2024-7594,0,0,162733b542e59d18938a00367d1636c5c30469f059abba19e86017f5710d91ac,2024-09-26T20:15:07.687000 +CVE-2024-7594,0,1,de160147e3a77d4784909b90cc5c2e8e40459f6d6d2428f4df61cf3e137d849b,2024-09-26T20:15:07.687000 CVE-2024-7599,0,0,bfed51419671bdac1f3d9d2ff4e2a39cacf92b9f7219234693d312300db2a267,2024-09-26T16:45:58.507000 CVE-2024-7600,0,0,456ca552c9a809b72d1cc9f2b35e12282778424a2ecdfd82d7e98a6e39cd97fa,2024-08-23T16:35:31.137000 CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198d2,2024-08-23T16:35:52.383000 @@ -263225,7 +263225,7 @@ CVE-2024-7669,0,0,1ab8d834092c7284d64294dd9869665d57807a9389d554f2c75360b4021639 CVE-2024-7676,0,0,7817fdd5f2edbb492448eb9de4bc52ee9c1fd35a5b97e69f44935e966a3aaa34,2024-08-15T18:05:17.853000 CVE-2024-7677,0,0,619a29b11672f1d6182de3fe0ed62cac67fac40890fa3659f2ed393ccafc6a23,2024-08-15T18:06:06.680000 CVE-2024-7678,0,0,7a80ac621ece570be5503c7435c87b024e4d34454346340a478740f49f03181a,2024-08-15T18:06:54.127000 -CVE-2024-7679,0,0,0b1a539d1b8439b6dca13f43bce0671094bff347ad47a352ce3c3fbdbabae205,2024-09-26T13:32:02.803000 +CVE-2024-7679,0,1,5a2e02ae463ef310a61cc0e296ad31e67c97c25e8d81f50d0a2bf4737036761b,2024-09-26T13:32:02.803000 CVE-2024-7680,0,0,4742cee85d7df5fbe02ea5ecd61db4452ad7db3d8ef0db88ef67139768aab176,2024-08-15T18:08:52.780000 CVE-2024-7681,0,0,e6c1e7782509f60074b687569285020e895fcc1fd23e8fb399f4f22e032de697,2024-08-15T18:09:55.887000 CVE-2024-7682,0,0,8dbcf53cb3ad3a4e3e6c93fa0edfe498b656bd897e790189cda42acfe0f7b35c,2024-08-15T18:10:41.557000 @@ -263254,7 +263254,7 @@ CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb CVE-2024-7709,0,0,4ea4e71ad8cd2325399b6f32c817fafe76ecfe7c20ad1838061c8bb44a136e96,2024-08-17T10:15:10.957000 CVE-2024-7711,0,0,5f68b281cfe401fc4184ff1613ff12ae79d70995453a2a2aa130ad5c1bee1478,2024-09-27T18:17:05.577000 CVE-2024-7712,0,0,0b5a8e9c5ba36af8bef340cc5ae017c9fa1ba3b9186fddf3fda3dcc554ec2462,2024-08-30T16:15:11.050000 -CVE-2024-7713,0,0,087ec51e88c8fe30f0c34d44b176229232ed6289fc8aa5ebb9431dfe92cfcd5e,2024-09-27T06:15:11.327000 +CVE-2024-7713,0,1,34768f13d879ef5560f0127c1e010a7eebd91adf6561c5201fe5dc9293502e1e,2024-09-27T06:15:11.327000 CVE-2024-7714,0,0,705d8fa26395ef610bad264ffef178490d23a61ef3ede9b9fe5bf2e0a9ab5182,2024-09-27T17:35:15.420000 CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 CVE-2024-7716,0,0,6e32ca8fc3d9f498e4c95945e19f3ae22dd503780e7b0ea7d794bef53d1a899a,2024-09-25T19:35:32.990000 @@ -263271,7 +263271,7 @@ CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000 CVE-2024-7732,0,0,8a3c8a90acf6f5b098dbde4b61fbc477d38ff395fb346234319b59a8d03915b0,2024-09-16T16:49:31.427000 CVE-2024-7733,0,0,6e2d7bf1ae3b63c8d3634c7048b79cd280171ae70720629e0842a624f33387c9,2024-09-12T16:20:49.503000 -CVE-2024-7734,0,0,ecf2761e7c92c768ea860282a3ce0e06a2c71cea4892b743b02acfaa994cd50a,2024-09-10T12:09:50.377000 +CVE-2024-7734,0,1,459bbc2e4ef53c0aeb0045c7ae69009551fce3e0d67f581b6c888ec16e3d84d7,2024-09-28T23:56:32.053000 CVE-2024-7735,0,0,d84558a56c3d7c028f46cbc0def08e97a007bd478f7fe7e5c32aa9d160820a58,2024-09-26T13:32:55.343000 CVE-2024-7736,0,0,ce9247efde023705af1cb8ccc6da7b14548eb91ae5af047fc841139014aac596,2024-09-20T12:30:17.483000 CVE-2024-7737,0,0,e53dd92d3b129d88196d7c1a6ef282a1ba660eaa21af254544f958cbdf414541,2024-09-20T12:30:17.483000 @@ -263362,7 +263362,7 @@ CVE-2024-7858,0,0,dbe22e1f02da632a108fdb9c096b7008488e7f6cd1024c2ca6a33d2456cc06 CVE-2024-7859,0,0,226a85a1690e60d5c312a7296dfa4fc4fa943380666900b35d25ad4eaf87137f,2024-09-27T18:00:53.567000 CVE-2024-7860,0,0,c391ad7c4ef407489069e585cb95bbfbb22674e36a77cbf1c14427ff7d81452b,2024-09-27T20:56:24.493000 CVE-2024-7861,0,0,0a909509d97ae1cc7403adef3feb39aabff91c1c695789c3f097cacdbb9f06a1,2024-09-27T20:52:11.350000 -CVE-2024-7862,0,0,ab3213803d3b49b6ac19aa8c58cc004e989e60ff7f240b01de14d09685981992,2024-09-12T14:35:21.530000 +CVE-2024-7862,0,1,6902cd6b85fae2ddd8a1026180dfc09aea025665ba446fb178d7c311849d093d,2024-09-12T14:35:21.530000 CVE-2024-7863,0,0,11d320db6ad42df94b7ce126cd0ba1a84504b8818a402a12b56e92e066aa845a,2024-09-27T21:27:07.640000 CVE-2024-7864,0,0,8cb55f9c6813f7ebb3e411de07404fd2812a548c1112fcc9ece6be38f8f1e98f,2024-09-27T21:26:50.067000 CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000 @@ -263482,7 +263482,7 @@ CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03 CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000 CVE-2024-8042,0,0,e4aa4e1a36a07a1eb78e15d1333e45b76f368de2e361b8c314d2f7b5ac3ec00f,2024-09-17T17:25:02.330000 CVE-2024-8043,0,0,64a4eb5bb222479441ed067bfc6fe873f303afec2ac8c6b2d3d33e0811bfa896,2024-09-27T18:22:43.967000 -CVE-2024-8044,0,0,66a840b3b744914aeb912493a88172b219c2bc4688dd089a25891a08edff7e40,2024-09-20T12:31:20.110000 +CVE-2024-8044,0,1,215dc207a8792dde867d866bfb2746affa8e93350ab3cda0576a38d01bf91c6f,2024-09-20T12:31:20.110000 CVE-2024-8045,0,0,4f33bec2129e516f0590350db62def0ffeb2e64cb03de1e46d8b3d52953002f0,2024-09-25T19:22:03.157000 CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000 CVE-2024-8047,0,0,b09ff33da28d13c746e9dd8622cb16da9ea9a8911cc13c3fef8877b81efca550,2024-09-27T21:25:08.523000 @@ -263515,7 +263515,7 @@ CVE-2024-8093,0,0,98e0c7040cf9105cb1c3055778b4c0e7f9f1a20fe40737d282c5bab0fdcb38 CVE-2024-8096,0,0,33268897f7f8b2273839db6d4e75fbc8fdf5f760a220b507e80b08e690a9edf4,2024-09-11T16:26:11.920000 CVE-2024-8097,0,0,9eb75255abcd069d744af59bd7e8120e62794401b3e1be4e7c495de1066a7b41,2024-09-12T12:35:54.013000 CVE-2024-8102,0,0,59b268e27a6763219f51e9e55e73ae4276fd3b992bf79726ec1ccd845c10f5f9,2024-09-05T13:28:54.747000 -CVE-2024-8103,0,0,8caecd774de890c524e903158f991acfc02ebc3e4846d1cf55a97e890599aadd,2024-09-26T13:32:02.803000 +CVE-2024-8103,0,1,1b29f3b6137bfcf94b15b3f00030db2380a8f5875b46cc2db01d41f97c98beaf,2024-09-26T13:32:02.803000 CVE-2024-8104,0,0,e0dd7af2b8170ad0cb122178cc67d0512cc1eb1562d671a3c4e0173a78c8b550,2024-09-05T13:28:06.817000 CVE-2024-8105,0,0,fdab1a8bdde46d997c9a9800b483d676df23e449425d94531660960b3c42e376,2024-09-09T21:35:17.320000 CVE-2024-8106,0,0,918839130e1d38968c976a0bfdbedb93d4d38744e55b3c51d6882ceb90663b73,2024-09-05T13:05:52.540000 @@ -263524,13 +263524,13 @@ CVE-2024-8110,0,0,35b29aa278bc186f939dacbb87981e7b3283cd41ccc0818c634be4d5c87818 CVE-2024-8112,0,0,68d19c324dfb08f42fbaae63f6c41217ad9d464e632ed1f450780261e0cb818a,2024-09-12T18:23:22.507000 CVE-2024-8113,0,0,955ebfeb47657ee688d94f4a91bdebad900106533d62e5ae0eb920a40b616cec,2024-09-12T18:21:30.677000 CVE-2024-8117,0,0,8911918cea1d80613ef158836fc25c8d180447229a308c8b8d66c79bd51e5356,2024-09-06T16:04:23.413000 -CVE-2024-8118,0,0,8a61bf5d9083a53484238fb37dbf9b1de26f3ac6fa9267176bc08c3626b89983,2024-09-26T19:15:07.663000 +CVE-2024-8118,0,1,5fc6ed737462cfefaff190aa8cfe3373c52265e785d5cdc2b756c9adc41aed6c,2024-09-26T19:15:07.663000 CVE-2024-8119,0,0,209c67cb8bfc8afcb7a4732dcac7c96ef9caf231c5c5c990646aa6c9fa168084,2024-09-06T16:11:02.370000 CVE-2024-8120,0,0,94d6700060407df9049e5baa85dfe75b2dcfe8ef464f0408d491eefb42a5e54b,2024-09-17T20:07:46.117000 CVE-2024-8121,0,0,ff1e52368219900437efe7b0d09c59c3cd45c1a8ee1d51b7c00a17f9caa0d460,2024-09-06T16:20:59.767000 CVE-2024-8123,0,0,0c7aca2112819fbb5f60b01b3de749c0321788022ccd287129bcc300c493718d,2024-09-06T17:20:28.600000 CVE-2024-8124,0,0,02c59f30d4d00678a507631ef49dae97166d69f81e7a4ab71ebdf86641cfe454,2024-09-17T12:15:03.333000 -CVE-2024-8126,0,0,ea36800c8172a543b5e718f6569093a52318735e6fe17c1dccd1f140494ac568,2024-09-26T13:32:02.803000 +CVE-2024-8126,0,1,d7af634e96bc1b0b7d5d148d214c0455cac12c183f5df70e258377c2a6987b29,2024-09-26T13:32:02.803000 CVE-2024-8127,0,0,5102baf959cfebdfcce1f9ebf5537e39c68d598c19a75f9e8284fbe283c6efe3,2024-08-27T14:53:45.257000 CVE-2024-8128,0,0,d07e75d47fb86cf66a48a7ed0955a75ebdca9af77e0b6c43500f577ad4f51a7f,2024-08-27T15:32:47.997000 CVE-2024-8129,0,0,39dbf19e98dba6341432a7bc1b8c1b6b77a667d2938ed3ce971d1f146a38e875,2024-08-27T15:33:23.187000 @@ -263624,7 +263624,7 @@ CVE-2024-8253,0,0,538885466f07c28468f1d184c3fb77b594dc3a7e7631ea6be509e963086ff9 CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000 CVE-2024-8258,0,0,acf33ae8a1adec0534fb0ef526f8343ca036563113e584df48e051347d7f4bae,2024-09-27T18:56:41.140000 CVE-2024-8260,0,0,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000 -CVE-2024-8263,0,0,ad65448f4ef9e6d39f00279a5a8db0ec57a6e502dd6ab5aa12fd95772e708ca5,2024-09-26T13:32:55.343000 +CVE-2024-8263,0,1,290174f21b8bb717d92daf0567c14b0bf94ab9ffab0985e1a39ca16d01ea65c7,2024-09-26T13:32:55.343000 CVE-2024-8267,0,0,a2c757f79a1be4af3dcdbc6f7c080b05c84634b9f014df0bba5d8d956f6b81cf,2024-09-26T13:32:02.803000 CVE-2024-8268,0,0,5be7ed43bc13c42d107f9505f0e50c5c3da78418e570e46eb634a6a34dba57c1,2024-09-26T16:15:31.053000 CVE-2024-8269,0,0,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000 @@ -263641,7 +263641,7 @@ CVE-2024-8285,0,0,b03f6a28365b23ccdd28cfaabc1a4440173ac6451ac16c91954a645332d3ac CVE-2024-8287,0,0,a69e7cb2d3c0316abfeaff67da311f8b23d877ec163f8b4d2f35a96004b37bbb,2024-09-24T15:52:38.047000 CVE-2024-8289,0,0,900bfbd861154484ed59254bdbec992d28a9742381ab830cf631e50b7fa985ab,2024-09-05T17:41:58.350000 CVE-2024-8290,0,0,63d92c77191032f40cbea4b8210ec288fe5f42eda168ed122e114c38be3ba3ea,2024-09-26T13:32:02.803000 -CVE-2024-8291,0,0,65417e652bc995d42f8ef93647af21c76888132592f823803544367b21be3ab5,2024-09-26T13:32:02.803000 +CVE-2024-8291,0,1,71df4d8a88a99b1b45a66ee686a060105a7c8d73cb194ec9fb44b4048ee46965,2024-09-26T13:32:02.803000 CVE-2024-8292,0,0,ddba0ea03a741b8e444eb2158f82b5461df4d19adfc58fb2639bbcaaaadf6349,2024-09-12T12:37:18.380000 CVE-2024-8294,0,0,76cafe7a1838d9cd0244706a299f12cd4ba69ef653952654db2fa070ca07bd0d,2024-08-30T15:38:13.437000 CVE-2024-8295,0,0,907331a3a97a6618443e3aff92f4e758c3135b25ca0d9fb01d74d067e9cd6716,2024-08-30T15:37:41.510000 @@ -263655,7 +263655,7 @@ CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d7076 CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000 CVE-2024-8310,0,0,4b4d09bbae7dc3c7636d9c5d157a7a2629566e4bc2921727c3269659425cdb4b,2024-09-27T17:15:13.970000 CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000 -CVE-2024-8316,0,0,409e129101724ecd66dc3c7769b7215f176e0924920c809a0b56df28be8af585,2024-09-26T13:32:02.803000 +CVE-2024-8316,0,1,a248c418c551695f5f3999b43393b9999b710986073d296562b230ac2e92eb88,2024-09-26T13:32:02.803000 CVE-2024-8317,0,0,75ca94f8a803caa3f0996235375e7a6ab4757d251a8a35a9b32dc3ad55213ecc,2024-09-11T17:46:03.753000 CVE-2024-8318,0,0,5a1c058346165498258e6a0dbcca1e25ab26db572376e8715726de97a7feed6e,2024-09-04T13:05:36.067000 CVE-2024-8319,0,0,19bee7e43deb1719502aef7eb4c05b0fb28cffea0ae04999821f01ddbcc0e265,2024-09-03T14:43:13.787000 @@ -263717,8 +263717,8 @@ CVE-2024-8391,0,0,e4a53876b2b078fcdc3ea9cb2dcdd9122c87a07a74293148b584a5df448e00 CVE-2024-8394,0,0,537ec046b9d95c9c611478000abd6dd7551041a1f2ea81cd7e79459ae0e45ad8,2024-09-11T16:25:44.833000 CVE-2024-8395,0,0,7904c0b52ace758f0078aaf5623dc08c2f22d70190a82ab855b84d88ee4995e4,2024-09-19T17:53:45.753000 CVE-2024-8399,0,0,ff5a0b61b9891ed649233268ce0fa37bd0b7c79ba8aa2863ea2ecc61c35c709c,2024-09-12T19:45:07.347000 -CVE-2024-8404,0,0,ce755f531c0ec1266c22f6c7de63cedd3c9f4db092e38e9ead13936cf66f9ca9,2024-09-26T13:32:02.803000 -CVE-2024-8405,0,0,57980f2bd27c086422d1b71d9901bdc15275dab02781dd06bf474cd799e1550a,2024-09-26T13:32:02.803000 +CVE-2024-8404,0,1,1a8f7c90ae4839e29c3ee7baac93c7ffbd2488d21ade054856933c21be4bdeda,2024-09-26T13:32:02.803000 +CVE-2024-8405,0,1,3b81acf4a35a984c561ce8224cfd77ffbf64627fbb72f0222e3ea0b15ddb1f93,2024-09-26T13:32:02.803000 CVE-2024-8407,0,0,190893f5b3da05c3b04f6347e8d36e88eb22b5329ec3a82949674ad3abb1a15d,2024-09-05T14:48:28.513000 CVE-2024-8408,0,0,9f87fcd812f2a0614c81edf26c59a3fd5158e6ac48b1ed6a5cdb904e931cd196,2024-09-05T14:41:14.603000 CVE-2024-8409,0,0,9f46c5adb31a6d87824a8eab48e9d2e947ae9b31368ae468d358816a64d27b2e,2024-09-05T14:20:27.397000 @@ -263736,7 +263736,7 @@ CVE-2024-8428,0,0,224fe311bf12d06d4c690b8d9ea3bc4f42261bcb370dc3457883b86fb932f7 CVE-2024-8432,0,0,8868d9b36bd238df6f75f7287d6bafac4ff3b898eed233d7b4ed5ce985d677d0,2024-09-27T12:58:58.433000 CVE-2024-8434,0,0,a7dd938925c560d2c4358a00a748e9c070db95d94d7906c441d33bc026b679c8,2024-09-26T13:32:02.803000 CVE-2024-8436,0,0,0d153a053863f3621c53c1e26deb2ddde74385c0ccdd737c792b34eb9af883c1,2024-09-26T13:32:02.803000 -CVE-2024-8437,0,0,4b506df7175b44ffa93e3ef9b1fdedd8455751a5d7f25e7c7b69c7cd1dfd7636,2024-09-26T13:32:02.803000 +CVE-2024-8437,0,1,e197ee77442bbe9c0c205a562fa2fee4cf9645f10acbb85445e512103cf01a70,2024-09-26T13:32:02.803000 CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000 CVE-2024-8440,0,0,8dcfa58740a8b45172e18897b2d796d55a68f35b9034374864c3da0c6b77c079,2024-09-25T19:34:19.683000 CVE-2024-8441,0,0,0efac0f95475c5b753f85a6e07784bad0c26116c06bdd47c81e7d9e5f2143687,2024-09-12T21:53:43.387000 @@ -263819,7 +263819,7 @@ CVE-2024-8586,0,0,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba0 CVE-2024-8601,0,0,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b36e,2024-09-17T17:54:39.767000 CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000 CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000 -CVE-2024-8606,0,0,b26561fdb25b431c7769f970473f862e2409b32db7325f6388e5ff10e75450f5,2024-09-26T13:32:55.343000 +CVE-2024-8606,0,1,c19a3da486de068c4625e8e25dc67324e334aba2f868c0ed9a722d4209377311,2024-09-26T13:32:55.343000 CVE-2024-8607,0,0,2ddb0309fe1197047db89200e1244a0ab07c4cc8c5b67b4ff257922493e74f5b,2024-09-27T12:15:03.617000 CVE-2024-8608,0,0,70a6908469f677ff13fb63da61d58f7946f34054726b2ac2f47edb4296c4ca33,2024-09-27T12:15:03.823000 CVE-2024-8609,0,0,5a99fdb2093de97963ab5690f22ae5bbf17fb50466c32aba9a5a2535ef0c4ee9,2024-09-27T12:15:03.997000 @@ -263833,7 +263833,7 @@ CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec066 CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102be,2024-09-26T16:42:16.700000 CVE-2024-8630,0,0,69a27a840e91c607a813416fcba4f9f4f6ef755929d1d9c70a9d24bb45f19f82,2024-09-27T17:15:14.180000 CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000 -CVE-2024-8633,0,0,6b6fa07493612adb207d4663a83235545ef325dab32fe9e233cf29d5468de603,2024-09-26T13:32:02.803000 +CVE-2024-8633,0,1,b5b3cb7bf92993a95877e5bb9de5f9fe762b28b46c227d23bc70c2891d4703fa,2024-09-26T13:32:02.803000 CVE-2024-8635,0,0,7a33169aa1c56166fecdf7f4d906662353a5e22f1362c34800f026c91df08470,2024-09-14T15:24:45.657000 CVE-2024-8636,0,0,0c59a94a620a4c5a9ca1b46d0e9c59ab3787ae337f0eaa0364c7e33937f31aa2,2024-09-13T14:35:08.313000 CVE-2024-8637,0,0,d6df40a324e01da3d9d07d635490137e7d47536917ac9016017a9e8f14b895ac,2024-09-13T14:35:09.463000 @@ -263865,7 +263865,7 @@ CVE-2024-8669,0,0,a540528fa4f0bbb5defe17259c589787942e6df5d18ff3bf79d91bf53c9aac CVE-2024-8671,0,0,44eb9fc4ae83bda74c805da6c8f69132f0b0ddef607b7afc290779058022b5c0,2024-09-26T16:38:24.447000 CVE-2024-8678,0,0,889d21ef247546a6f2ba4419351284ba9f2f3727a17d89355bbfe7a36fdacaf2,2024-09-26T13:32:02.803000 CVE-2024-8680,0,0,f92fa58a804f571c1e7bcf32a74c84f918657d6176f24d169d6d6fd1db54ec14,2024-09-27T13:53:47.910000 -CVE-2024-8681,0,0,eb2555a283f92f1304ea04a10441d173f9fe6abf0f05be78151ead97d14620bd,2024-09-27T07:15:05.123000 +CVE-2024-8681,0,1,e85827f2b8828da8ba7ea80cebc7e3cc190a5b387dcc33f1d81b64fa55a98704,2024-09-27T07:15:05.123000 CVE-2024-8686,0,0,ede88dcdbc0e792bd803e1f16895e5a739a1631453b49ef7e6a4fb82c32bd0dd,2024-09-12T12:35:54.013000 CVE-2024-8687,0,0,113cfff3abfee2dabf4872656a1085a998928e6c5f0a4785deb63af7b2621db8,2024-09-12T12:35:54.013000 CVE-2024-8688,0,0,622feee60e16c8839b74efa94c0181d710fda4c1e7dbcb6de36b0dc3a1f1b61b,2024-09-12T12:35:54.013000 @@ -263878,7 +263878,7 @@ CVE-2024-8694,0,0,2e1993ee271c7157fceb04bc71a63e2f464fbf1cced51f76c6346163fc1234 CVE-2024-8695,0,0,52bc6b8b60aae6c315837e4eb131cf540e2b445dfd9cef8ca664c148d103d584,2024-09-13T16:01:31.340000 CVE-2024-8696,0,0,3ba62a921109450e540b318e77e86831bda9c658513319d0aed77dfa516028ff,2024-09-13T16:01:22.410000 CVE-2024-8698,0,0,c30062663018d2be77466996c15fd1705260c0877cb3bd39b8f8b72279191504,2024-09-20T12:30:17.483000 -CVE-2024-8704,0,0,439322f460608b08509aad979e3ff4e44617fc141181b2c2b02424f623a43c7a,2024-09-26T13:32:02.803000 +CVE-2024-8704,0,1,58aa5298d91f9717e921123589a5cae1121b705a3673ebbca709d6c491a6055a,2024-09-26T13:32:02.803000 CVE-2024-8705,0,0,cb97dc5a896b102e020f4c6f7ce9db0475b1546a38609fc8cb74768e11db5694,2024-09-12T12:35:54.013000 CVE-2024-8706,0,0,6f71e5876a7dec7ae56fc457ee5142cb7cf0075ec2e95d2e16cb7162a3c7da96,2024-09-12T12:35:54.013000 CVE-2024-8707,0,0,53b8f536d953dccbee27f563b6dc5109a4e216dbbeb04b8d1e78c2b9c947dcb4,2024-09-12T15:18:27.333000 @@ -263893,7 +263893,7 @@ CVE-2024-8715,0,0,5dd80a9e377e26833109e36a9f853397f40930511fcbb10d79b8fb2a0b5afb CVE-2024-8716,0,0,1bb41aeeebe4e896420adf3cdaff53e3d88a64a7e4d1f07d25f8bcb2da122bf8,2024-09-26T17:03:05.487000 CVE-2024-8723,0,0,778d0a0398aed78fe986c3e106c93b2232e3d42b0102981078399ce3c143c0f8,2024-09-26T13:32:02.803000 CVE-2024-8724,0,0,41e3dd453fbe3c0072e7ab470e5d529ac122f059bb60a2be671564b989c49676,2024-09-27T15:56:00.073000 -CVE-2024-8725,0,0,206d33f8ec7dfc1aa0697b16d275da6d2346e0e0b344cb623ce6b9ea7820dd69,2024-09-26T13:32:02.803000 +CVE-2024-8725,0,1,e7161ff8e5bddb34d8cb70331e4764a7c296e8dd27bc773fb9d18a06e20edb11,2024-09-26T13:32:02.803000 CVE-2024-8730,0,0,ff380ede7d530472d7457d72280d0377e58fe499631b78029fd0dcbdd667a7f4,2024-09-26T19:58:33.353000 CVE-2024-8731,0,0,17c6adda5eb698d4c05886ce56b7c8d24eb85ac20af08445719f350b3f8c3e38,2024-09-26T19:43:33.110000 CVE-2024-8732,0,0,fdb5356750581bee2cd15ce9454648108e6d01424f144ebcf561e47c2245eaa8,2024-09-26T20:01:02.290000 @@ -263915,7 +263915,7 @@ CVE-2024-8766,0,0,b5c86feebeb7f4c2ef3d57aeff024553a8b8afab58619c1ddcc92e275588df CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e0e,2024-09-20T12:31:20.110000 CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000 CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000 -CVE-2024-8771,0,0,6bb3cfb2358f20779d30660368175ab098a299aee1188c852547dd80b3c854f6,2024-09-26T16:15:09.293000 +CVE-2024-8771,0,1,9145a8cb6464fa49eba000518b265b9222a8405fbd22e3aeb240835bffe774a5,2024-09-26T16:15:09.293000 CVE-2024-8775,0,0,1f8b246503d32d66b42e8fe1d2ca1b6d98900c0e0fb5babb06cd69ea0d0b6cab,2024-09-14T11:47:14.677000 CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000 CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000 @@ -263929,9 +263929,9 @@ CVE-2024-8788,0,0,9acf7ba86dfe3bb0d2f7badc30361934124d525e34346debde47c3772d9f6d CVE-2024-8791,0,0,fb5b0ac36efac34bc9b2b46a1f471f8bc629f8b19dafbbe4161ffb4834ecffd5,2024-09-26T16:25:34.120000 CVE-2024-8794,0,0,71d6f226610d884ee512fa4051f8594e0cafa29b4878c9ac672c3de2ccd4c022,2024-09-26T16:23:46.740000 CVE-2024-8795,0,0,f7b3fc89482c22947a1a26e63d2f04d7dee1f77ad827021897b332709b04072d,2024-09-26T16:46:55.587000 -CVE-2024-8796,0,0,85a6dfb5fb230c10b66238538bd5fe186ab9999598b67e5deda1ed4d1b78b262,2024-09-20T12:30:51.220000 +CVE-2024-8796,0,1,5578f6dd4609c4262e3fbee4f67559d9dd0c8fd308d8a788463a1834d87aed58,2024-09-20T12:30:51.220000 CVE-2024-8797,0,0,bc71120ba9c562037001bef5ed49069a2fb96f9263b3c8e2a617e34946a91f4d,2024-09-27T14:02:23.700000 -CVE-2024-8801,0,0,0819fc7670c97dfdf5903331c0719648e4a950ccf6d74c0e2820e973653fdf95,2024-09-26T13:32:02.803000 +CVE-2024-8801,0,1,91d95dcb2430a0a9dca58bb92653583f9abc5a83fc547ad164e94cd7733bc533,2024-09-26T13:32:02.803000 CVE-2024-8803,0,0,1e21e2187793442a371c4b65c97d90253ace224e18e6d0a30f5421631b4c2a19,2024-09-26T13:32:02.803000 CVE-2024-8850,0,0,60f99c260767f82bf00cc7954ec3e058985003b965020b8d3dac7a45b3ea5f64,2024-09-25T18:49:53.397000 CVE-2024-8853,0,0,b5a3b0675f8f2657c7381537f08c47ae3a3694c18acf1b18976370e35c278f0e,2024-09-25T17:49:25.653000 @@ -263948,8 +263948,8 @@ CVE-2024-8869,0,0,eaa7c70f03f38bcd808caaf5c9917ef912247cecdfb7f5fef4110fc2bf4de3 CVE-2024-8872,0,0,733177ad4b33f76c45e44b053f07a8c408dcf4ff406eb32c0f73b5df4adb5ebd,2024-09-26T13:32:02.803000 CVE-2024-8875,0,0,285b537766851a72a752adea85efa81abdeba3e4c5af2afdcf8485ecb658237e,2024-09-20T22:44:16.077000 CVE-2024-8876,0,0,adf401fb4b8b2c24f06ac7d28fd2360497bd835317abc655be39e3ccb04a97b8,2024-09-20T16:58:24.333000 -CVE-2024-8877,0,0,30d5b43a8d366cc669239a1129f71a0a8030349e38d90085bb23cc1766bb2bca,2024-09-26T13:32:02.803000 -CVE-2024-8878,0,0,3cf9b40416f4f1229a7bf5966a250dc504140ec7e2a78e24cc2919636854153d,2024-09-26T13:32:02.803000 +CVE-2024-8877,0,1,1bc66d2f00dd05aac07863e8fc476d175c1d825159b608873d153d10cc8b3cc4,2024-09-26T13:32:02.803000 +CVE-2024-8878,0,1,63be836fe5ca54094eacac466ad179d805552dc5f6164509876e090e9c8e63eb,2024-09-26T13:32:02.803000 CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000 CVE-2024-8883,0,0,9cef595db799db08b678f8a28be821702773d1b0045d378f8c6e0ef2aaaa99fb,2024-09-25T17:17:35.637000 CVE-2024-8887,0,0,a3051d5be0b46f2e314e247c4baa7ed0aa876885e0f5e30506d6e71c9b64e9ac,2024-09-20T12:30:51.220000 @@ -263969,13 +263969,13 @@ CVE-2024-8908,0,0,814a632e733410078b07e9411999ce68ca7ad8b9d3cd0621cbfe771be63227 CVE-2024-8909,0,0,164deeef11f6495a80d20f0aa7bd15b53f984d767860039b14665a9aa77c7c0d,2024-09-23T17:51:11.790000 CVE-2024-8910,0,0,b0443c5ae704d14459c44a4608f4ef463625446d5c4272eef73791c7d26c39d6,2024-09-26T13:32:02.803000 CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000 -CVE-2024-8917,0,0,662ac58156f8751ad1b8de14cccee08fa341d2e67f0f6df7b6445065c553f6ba,2024-09-26T13:32:02.803000 -CVE-2024-8919,0,0,85ea3e77f0eebb7aac0569e6238604aaeb33f09121ce4ba59110ac022361751d,2024-09-26T13:32:02.803000 -CVE-2024-8922,0,0,592760fdbbf1e31a49f5acf4187e669ee436eaae622821697f8ded66b8bc0001,2024-09-27T06:15:12.817000 +CVE-2024-8917,0,1,335953e24e12abbc8145f3320ee4f0273b970843143b0a5e292bf9bd7b191fa7,2024-09-26T13:32:02.803000 +CVE-2024-8919,0,1,12c0ac43496a9b38bd7825dfb5f140b90abdde078e3fcd0e3c34df036cfd6170,2024-09-26T13:32:02.803000 +CVE-2024-8922,0,1,d01182920fe7ae18059f0e89e44d786dc7b76d5f456699ce60e265b658289f29,2024-09-27T06:15:12.817000 CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000 -CVE-2024-8940,0,0,8e5e40a9bc006187b568349e1a1e7d874981212a137faadfcad403ca23692681,2024-09-26T13:32:02.803000 -CVE-2024-8941,0,0,2bebb7cd3bc3497241dc7454c3b3fa14eb83fc74e307721c3897253659c342f6,2024-09-26T13:32:02.803000 -CVE-2024-8942,0,0,ceda28422ae79e255a87ff48966189a974288f01e34d1f34887fcd95c7af72e0,2024-09-26T13:32:02.803000 +CVE-2024-8940,0,1,881a745a1b77233fe3ad09218f06df01a2061a4c2e5cfa2c2a81ed440bf13f5f,2024-09-26T13:32:02.803000 +CVE-2024-8941,0,1,5a23216cd953abba28d73d2932ca5626321bd4676456d325dae99c04345ab028,2024-09-26T13:32:02.803000 +CVE-2024-8942,0,1,9fa88a9f80e936ae8faf1c32f33e776df0d4bc5ebd4092a4b25ec56f8c279bb2,2024-09-26T13:32:02.803000 CVE-2024-8944,0,0,163e8bd42c52d6cb1f3f0fdfff8b3db24acfd0dba8d50b29b1780d64b55bd42a,2024-09-23T16:56:34.637000 CVE-2024-8945,0,0,89d4e06764ee27ae462e66a2c760956f13440d7833b3b8093e505b1c71a9aac5,2024-09-25T19:24:25.167000 CVE-2024-8946,0,0,0afc0efb5414dac2f435cdc08456c904eb9a65ac4dd275170da7c9549741129d,2024-09-24T13:11:17.417000 @@ -263986,13 +263986,13 @@ CVE-2024-8951,0,0,888c97aa442d5e8c89ae77387b914cd3981839dfe932748e6b429d09cccb70 CVE-2024-8956,0,0,469912f1c3a233b9c6103ff1ea98b03260e653e6a7cf65fa430bb18bb060e2a0,2024-09-20T12:30:51.220000 CVE-2024-8957,0,0,479bb87a5ce094312d7bf571ad4a1b1d6922673dde5733f096aa7041bc35da67,2024-09-20T12:30:51.220000 CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4ad,2024-09-20T16:32:02.563000 -CVE-2024-8965,0,0,cd96ed6fdc85c388166a6182171e2d531b06ed369a3457ea23e8f223e388deba,2024-09-27T06:15:13.223000 +CVE-2024-8965,0,1,0ef598dcedee293bef38c56e28c705f06609872221bfcc0ed18037f3b1832029,2024-09-27T06:15:13.223000 CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9e9,2024-09-20T12:30:51.220000 -CVE-2024-8974,0,0,26ac7fe97d711c6c7291aa307faa66606548d67509cefc5366462d6f4ecc6d3c,2024-09-26T23:15:03.083000 -CVE-2024-8975,0,0,a2beb9ac88df273c47e0fcc3ef47b5e42686ea2e8e78701b5e0748ded0bed0e2,2024-09-26T17:15:04.283000 +CVE-2024-8974,0,1,14dc536dc6bbaddfa8263fea422178640df68d52c4042ed544504bcf81267614,2024-09-26T23:15:03.083000 +CVE-2024-8975,0,1,6182f1c2aabebf93149118ffbf69a7c7fbdd0fa2fe06938640fbc8c09a95a52c,2024-09-26T17:15:04.283000 CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000 -CVE-2024-8991,0,0,1d01c7513e4a20cb079d7f5396a9de64cc512ba5a3c24fa4c45ea5277e0e45c5,2024-09-27T07:15:05.493000 -CVE-2024-8996,0,0,98127d05f9d21e990cd3f25f52ac884c3b968a9f9fe294830d657f5707b05245,2024-09-26T17:15:04.373000 +CVE-2024-8991,0,1,7af65a81f30483ba707f5704da13f2dc8efd5036ae0f4cd35e430bcd3d191502,2024-09-27T07:15:05.493000 +CVE-2024-8996,0,1,1db2f409b274638c0f9c246162c3dd0fbc2dbe210d25860090dd9c3c8a087a10,2024-09-26T17:15:04.373000 CVE-2024-9001,0,0,3414d6649893c69be27afcf1e3dc2327433e2ecaa7ac9013879a0b1b05bf0f03,2024-09-24T16:14:30.190000 CVE-2024-9003,0,0,7fb287df6f780d926de841fbcfd340e6c80a68c0faa41b54a6866e1139b43c05,2024-09-25T17:18:44.523000 CVE-2024-9004,0,0,94d0f2582229b176f297294b273867d83b4f75c60353b6fab8e5029183cf84e7,2024-09-23T17:29:20.827000 @@ -264010,7 +264010,7 @@ CVE-2024-9028,0,0,066617345a002ab3642d548e56d10899015c968402247f796f72778f556d56 CVE-2024-9029,0,0,35f447da90177f30c2552d1befa021521534c64f52e07afbe3088997f751fc53,2024-09-27T13:15:18.060000 CVE-2024-9030,0,0,c11a97e3409538e48c43922920e3ccde8c323ec97995f0c28aa92b45cd65fb6b,2024-09-25T18:01:19.270000 CVE-2024-9031,0,0,a2a75f47877f3d25b358bad394fac156601d3202f3a82ad425179531288fce65,2024-09-25T16:52:25.327000 -CVE-2024-9032,0,0,8becc8e05b7d6005b24bf74218ec0dbc532806e337cd797ce3550c4bccf0a3b2,2024-09-20T17:04:51.490000 +CVE-2024-9032,0,1,2d5c67bc837303d0499a93a9054ad23141a54194cf6f137859840c55c4e34922,2024-09-20T17:04:51.490000 CVE-2024-9033,0,0,7be928c299373aac94b8e0b56127ab59524b5bc9208cac30fb16b74e6a6c3108,2024-09-27T15:56:35.317000 CVE-2024-9034,0,0,3413fc4a84b9ff7c3619b4d0e0cc27a0a6e18fb3607100ba58325da27d611048,2024-09-26T13:32:55.343000 CVE-2024-9035,0,0,ecdd08b9ce66f90d6292d7a1da978c23aae7a52839423bea89ea3accdab800d5,2024-09-26T13:32:55.343000 @@ -264021,13 +264021,13 @@ CVE-2024-9039,0,0,2a46914eca39fc29da2da7edd5c8d5e2462d724fc7b13f9f758dbc7e741a3a CVE-2024-9040,0,0,0fb966ef41b73391708aea4bb41bcdf22035487df6b2f9dfc89d7d54ff500837,2024-09-27T15:53:28.333000 CVE-2024-9041,0,0,99f9003688843669abe0778fb23af0702d95d6892437f5bbf3a35f1e206f8b48,2024-09-27T15:57:55.073000 CVE-2024-9043,0,0,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000 -CVE-2024-9048,0,0,f177060896179d3e548fb6c61961758dc04b1d06da272024e713ebe682f3a80b,2024-09-26T13:32:55.343000 -CVE-2024-9049,0,0,c2460a86793cc351a3c801748f3c41f8869b146a68262e395de944016c346177,2024-09-27T07:15:06.120000 +CVE-2024-9048,0,1,4ba18ed8eae3391d4e9aa556ea2ddeeeb6600d1984fd49b296429d6d44643fc6,2024-09-26T13:32:55.343000 +CVE-2024-9049,0,1,d8dd6afd09a2bd54cb5c89c5fa3727e5d81ad9892bff0cc251ba3a30c729408a,2024-09-27T07:15:06.120000 CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000 CVE-2024-9068,0,0,595a98d7de817a377ea8bab7638422f5e22adb9ec7bbec5ed5ab04456ef8d738,2024-09-26T13:32:02.803000 CVE-2024-9069,0,0,288e488da0f8012f61662f009372321cf218ded299a5ebbf98a6261cf2fe518d,2024-09-26T13:32:02.803000 CVE-2024-9073,0,0,d760efb6ce0d5d4be652382e12d73083e7b14dfe21836f88aa22168f8a5841f0,2024-09-26T13:32:02.803000 -CVE-2024-9075,0,0,561f08f3beae25688613319eafb887a3be6f9829868a49b648b14e7c001e951c,2024-09-26T13:32:55.343000 +CVE-2024-9075,0,1,a23d7dddad7de2c9cc28fa7538b52055ecc1f96a75b383bef417813b3af91cb5,2024-09-26T13:32:55.343000 CVE-2024-9076,0,0,8c57021a64484b6edbf7ffabe5a971516c1732fccafbf97d4089a67e7015212f,2024-09-27T16:14:04.977000 CVE-2024-9077,0,0,b59a81d09978bed17f369329899086dd9d16ca13d3114e4823b03c2ad7c75c03,2024-09-27T16:31:52.923000 CVE-2024-9078,0,0,be3172dd4e65e7eeaa3d66d68e97344c6792d7c8b4c40a20e2e757753b59f979,2024-09-26T16:31:55.437000 @@ -264055,23 +264055,23 @@ CVE-2024-9122,0,0,8303a0c1b693e1f9637d76c62abb1e6e7e78f3941c479dc3e2dfaa8a5c17fa CVE-2024-9123,0,0,cd45c56b30b54bc08d10b45e423a2871895647b4b30e564898eb326d52a5c661,2024-09-26T13:32:02.803000 CVE-2024-9125,0,0,4bf17e508e09bae08b4b8c10069fa346e7a680100ea6e1ec52201e0cb1be815b,2024-09-26T13:32:02.803000 CVE-2024-9127,0,0,a2d913b976807bfe9181864a651a87affe3eacf586bda2ed55716688386fa758,2024-09-26T13:32:02.803000 -CVE-2024-9130,0,0,f1e38774a0aea91691c2f24bb32c7a5dc5aabdf54fcca655fcadf34247627b4d,2024-09-27T06:15:13.570000 +CVE-2024-9130,0,1,eba8a21b8e5f4f1c3278b978fa9c1e7b11d6346074a962dd45e110d99d2ec027,2024-09-27T06:15:13.570000 CVE-2024-9136,0,0,ba0aa3109f813b23fede3acd2c1a3889f7a4d72a995f937fa93d02af3e8a26a9,2024-09-27T11:15:13.150000 CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000 CVE-2024-9142,0,0,f41ad411b11065ca581c6c09a7cdbabb7231f7d077f84444580389a46c43e76b,2024-09-26T13:32:02.803000 -CVE-2024-9148,0,0,67e1a8965ac157a49477c7b911dc2eab586d6712cddbbb8bebbaaf2d7b8d1009,2024-09-26T13:32:02.803000 -CVE-2024-9155,0,0,3667cd6d9c617f3b4fff82f34cbe0acc0c5672d976fdd89baf4e1efb8fe50604,2024-09-26T15:15:18.060000 +CVE-2024-9148,0,1,a2b86d02d2dda10d9a4ece1fcb6c3b3948b7b33e22077676fb92f337dfc2bfe6,2024-09-26T13:32:02.803000 +CVE-2024-9155,0,1,1b0f8e094b1673c486612b7c024f78b2d5f340c1de061b10e95815d9098cc2cc,2024-09-26T15:15:18.060000 CVE-2024-9160,0,0,715ee1443ce6e224602c969cbcd987ef5a27c7bcedffe295ef23dde41ba44f85,2024-09-27T19:15:10.733000 -CVE-2024-9166,0,0,f959a40ffb6dedc25519b3fb4ef712dde7361eac9f511d5aa4ad9abbf925f6d2,2024-09-26T17:15:04.460000 +CVE-2024-9166,0,1,929d4d086f95ac8f3df2b53abe6903284eaab50db26058949a84c11a8f2f55cf,2024-09-26T17:15:04.460000 CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000 CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000 CVE-2024-9173,0,0,2168d2731be3fe970ffc5ab950f08498fa3240b2ba08eefc5bcf00b7c10db164,2024-09-26T13:32:02.803000 -CVE-2024-9177,0,0,6e2c009df0316a8da0dd2889808c0ffc99dc2f882d71b338c2c33d26f543ea1f,2024-09-26T14:15:09.697000 +CVE-2024-9177,0,1,25f2d6e915a4acbc1b72f6f368b990d8f1018d61c410464c35b01ce7ed8ec208,2024-09-26T14:15:09.697000 CVE-2024-9189,0,0,c94b870458a85f1fb676ae0d9e28df7c35aa469ab3b3e36f030359db84d8bb06,2024-09-28T02:15:10.860000 -CVE-2024-9198,0,0,a1f8f54995991f245b4109ccb51ed23023f74d143c0b4e7fa6f4e4802f3b1325,2024-09-26T13:32:02.803000 -CVE-2024-9199,0,0,27e0a64b81e9357b76a0a39a250ac06701e94144499cdd254c52ef2844f97315,2024-09-26T13:32:02.803000 +CVE-2024-9198,0,1,dc0289b7baa714eeb93a27fa0b615eecbc27114f3616c98feb15bac80300ac00,2024-09-26T13:32:02.803000 +CVE-2024-9199,0,1,3ca7b00968012de33482b7967da315774f8cea9a5b3070fbe655db855473b739,2024-09-26T13:32:02.803000 CVE-2024-9202,0,0,5d3f2d6a33ba631f7d073198e169a0e32af3f18d36ba441e4605889790f358ed,2024-09-27T10:15:02.827000 -CVE-2024-9203,0,0,63881804792b3aed56f72465b329c59bdd2f8e79682e4feb93f16e7c9b49e7f2,2024-09-26T17:15:04.593000 +CVE-2024-9203,0,1,b3eb699cdc2242b8a267bc3eaa2cf9ccdee8ce0006004cfcc81cffc0cdf23309,2024-09-26T17:15:04.593000 CVE-2024-9268,0,0,7e7771d589d5219f5f8e1d4b856d8a4ecc833e195b34661fddc76da01954ef5a,2024-09-27T17:15:14.497000 CVE-2024-9273,0,0,d541667891e816199f828382e531f52a986321fd7f85b5856a4bc94c161620a8,2024-09-27T17:15:14.550000 CVE-2024-9275,0,0,6bebcdc92872db9a9776b966b7829994144cd16473a7fe0a7c466b08b5f6ad63,2024-09-27T11:15:13.477000 @@ -264097,4 +264097,7 @@ CVE-2024-9301,0,0,f7d62ae99cd0d6877c5db63fcb4f2c0f8f043fbb8339f25415912b7f29acec CVE-2024-9315,0,0,1aaf0b25bc5db159a5983cc16616c1ec4eda1359782a55e5468dbd7b3fd618c0,2024-09-28T19:15:12.353000 CVE-2024-9316,0,0,885b5aadb6325a477167b023e058998d0e537cb489dccafe50b89208946e54a4,2024-09-28T20:15:02.280000 CVE-2024-9317,0,0,690e444ec011bf1361fdd2bbc9cdec3497358092c2cc8cdf0f08f746b48adc8b,2024-09-28T21:15:10.783000 -CVE-2024-9318,1,1,359284304f599d5b46dabbdd36eaf80d2e0ebae0fa4900079642b914d1c2b0ed,2024-09-28T23:15:13.530000 +CVE-2024-9318,0,0,359284304f599d5b46dabbdd36eaf80d2e0ebae0fa4900079642b914d1c2b0ed,2024-09-28T23:15:13.530000 +CVE-2024-9319,1,1,b2fe2ad1e388c2749f77abfa2db425092adbe510b046b9d6e937cbbe5cf1be69,2024-09-29T00:15:02.490000 +CVE-2024-9320,1,1,464590e46b839d984f0a0ad2d7ccb9c1f45a752e70158d32e6cd6caff1e1dfa8,2024-09-29T00:15:03.093000 +CVE-2024-9321,1,1,8d44d6a0220594c840d5ffc3b3d9aea21dff06cb8c335a9ed24bd3372a33185e,2024-09-29T01:15:10.380000