diff --git a/CVE-2009/CVE-2009-05xx/CVE-2009-0551.json b/CVE-2009/CVE-2009-05xx/CVE-2009-0551.json index f08bbaa4312..f0d52469d3d 100644 --- a/CVE-2009/CVE-2009-05xx/CVE-2009-0551.json +++ b/CVE-2009/CVE-2009-05xx/CVE-2009-0551.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0551", "sourceIdentifier": "secure@microsoft.com", "published": "2009-04-15T08:00:00.627", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-10-21T17:35:00.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2009/CVE-2009-15xx/CVE-2009-1529.json b/CVE-2009/CVE-2009-15xx/CVE-2009-1529.json index e3bab7df108..8de76d9ccd5 100644 --- a/CVE-2009/CVE-2009-15xx/CVE-2009-1529.json +++ b/CVE-2009/CVE-2009-15xx/CVE-2009-1529.json @@ -2,7 +2,7 @@ "id": "CVE-2009-1529", "sourceIdentifier": "secure@microsoft.com", "published": "2009-06-10T18:30:00.483", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-10-21T17:35:00.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "CWE-399" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] } ], "configurations": [ diff --git a/CVE-2009/CVE-2009-15xx/CVE-2009-1544.json b/CVE-2009/CVE-2009-15xx/CVE-2009-1544.json index ec2fd68aa73..a24136cfca7 100644 --- a/CVE-2009/CVE-2009-15xx/CVE-2009-1544.json +++ b/CVE-2009/CVE-2009-15xx/CVE-2009-1544.json @@ -2,7 +2,7 @@ "id": "CVE-2009-1544", "sourceIdentifier": "secure@microsoft.com", "published": "2009-08-12T17:30:00.563", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-10-21T17:35:02.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "CWE-399" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2009/CVE-2009-25xx/CVE-2009-2502.json b/CVE-2009/CVE-2009-25xx/CVE-2009-2502.json index f2446bd9a76..bfa4a83b9ee 100644 --- a/CVE-2009/CVE-2009-25xx/CVE-2009-2502.json +++ b/CVE-2009/CVE-2009-25xx/CVE-2009-2502.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2502", "sourceIdentifier": "secure@microsoft.com", "published": "2009-10-14T10:30:01.390", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-10-21T17:35:04.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2009/CVE-2009-25xx/CVE-2009-2529.json b/CVE-2009/CVE-2009-25xx/CVE-2009-2529.json index 07eb6763c0a..855abd591e2 100644 --- a/CVE-2009/CVE-2009-25xx/CVE-2009-2529.json +++ b/CVE-2009/CVE-2009-25xx/CVE-2009-2529.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2529", "sourceIdentifier": "secure@microsoft.com", "published": "2009-10-14T10:30:01.733", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-10-21T17:35:05.513", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2009/CVE-2009-36xx/CVE-2009-3671.json b/CVE-2009/CVE-2009-36xx/CVE-2009-3671.json index 3e185dee297..d6787c667f4 100644 --- a/CVE-2009/CVE-2009-36xx/CVE-2009-3671.json +++ b/CVE-2009/CVE-2009-36xx/CVE-2009-3671.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3671", "sourceIdentifier": "secure@microsoft.com", "published": "2009-12-09T18:30:00.420", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-10-21T17:35:06.493", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "CWE-399" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2010/CVE-2010-02xx/CVE-2010-0248.json b/CVE-2010/CVE-2010-02xx/CVE-2010-0248.json index 59605c21239..02a668cc992 100644 --- a/CVE-2010/CVE-2010-02xx/CVE-2010-0248.json +++ b/CVE-2010/CVE-2010-02xx/CVE-2010-0248.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0248", "sourceIdentifier": "secure@microsoft.com", "published": "2010-01-22T22:00:00.583", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-10-21T17:35:07.367", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2010/CVE-2010-04xx/CVE-2010-0492.json b/CVE-2010/CVE-2010-04xx/CVE-2010-0492.json index 6f73b2b63e3..751a6fa4ac4 100644 --- a/CVE-2010/CVE-2010-04xx/CVE-2010-0492.json +++ b/CVE-2010/CVE-2010-04xx/CVE-2010-0492.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0492", "sourceIdentifier": "secure@microsoft.com", "published": "2010-03-31T19:30:00.517", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-10-21T17:35:08.240", "vulnStatus": "Modified", "cveTags": [], "evaluatorImpact": "Per: http://www.microsoft.com/technet/security/Bulletin/MS10-018.mspx\r\n\r\n'Internet Explorer 6 and Internet Explorer 7 are not affected by this vulnerability.'", @@ -17,6 +17,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -53,6 +75,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2010/CVE-2010-12xx/CVE-2010-1260.json b/CVE-2010/CVE-2010-12xx/CVE-2010-1260.json index 3ea7f734b12..70246a2849e 100644 --- a/CVE-2010/CVE-2010-12xx/CVE-2010-1260.json +++ b/CVE-2010/CVE-2010-12xx/CVE-2010-1260.json @@ -2,7 +2,7 @@ "id": "CVE-2010-1260", "sourceIdentifier": "secure@microsoft.com", "published": "2010-06-08T22:30:01.507", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-10-21T17:35:09.133", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0346.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0346.json index 53859d35015..d4f0dcecafa 100644 --- a/CVE-2011/CVE-2011-03xx/CVE-2011-0346.json +++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0346.json @@ -2,7 +2,7 @@ "id": "CVE-2011-0346", "sourceIdentifier": "cve@mitre.org", "published": "2011-01-07T23:00:20.093", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-10-21T17:35:10.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "CWE-399" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2011/CVE-2011-11xx/CVE-2011-1142.json b/CVE-2011/CVE-2011-11xx/CVE-2011-1142.json index 0888f89f6ff..e91f6d58677 100644 --- a/CVE-2011/CVE-2011-11xx/CVE-2011-1142.json +++ b/CVE-2011/CVE-2011-11xx/CVE-2011-1142.json @@ -2,8 +2,8 @@ "id": "CVE-2011-1142", "sourceIdentifier": "cve@mitre.org", "published": "2011-03-03T01:00:01.597", - "lastModified": "2023-12-22T18:18:15.377", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-21T17:35:10.907", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "CWE-835" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1539.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1539.json index e1cb7049a51..1b84739b33a 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1539.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1539.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1539", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-14T00:55:01.200", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-10-21T17:35:12.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "CWE-399" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2013/CVE-2013-08xx/CVE-2013-0810.json b/CVE-2013/CVE-2013-08xx/CVE-2013-0810.json index 00bf80e686f..20d0e66f1ce 100644 --- a/CVE-2013/CVE-2013-08xx/CVE-2013-0810.json +++ b/CVE-2013/CVE-2013-08xx/CVE-2013-0810.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0810", "sourceIdentifier": "cve@mitre.org", "published": "2013-09-11T14:03:48.000", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-10-21T17:35:13.017", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2015/CVE-2015-83xx/CVE-2015-8370.json b/CVE-2015/CVE-2015-83xx/CVE-2015-8370.json index 23cc6a1340e..4bcbed504ad 100644 --- a/CVE-2015/CVE-2015-83xx/CVE-2015-8370.json +++ b/CVE-2015/CVE-2015-83xx/CVE-2015-8370.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8370", "sourceIdentifier": "cve@mitre.org", "published": "2015-12-16T21:59:04.063", - "lastModified": "2024-01-16T01:15:33.947", + "lastModified": "2024-10-21T17:35:14.003", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "CWE-264" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-80xx/CVE-2018-8034.json b/CVE-2018/CVE-2018-80xx/CVE-2018-8034.json index 201d30499ec..ee866239e2a 100644 --- a/CVE-2018/CVE-2018-80xx/CVE-2018-8034.json +++ b/CVE-2018/CVE-2018-80xx/CVE-2018-8034.json @@ -2,7 +2,7 @@ "id": "CVE-2018-8034", "sourceIdentifier": "security@apache.org", "published": "2018-08-01T18:29:00.313", - "lastModified": "2023-12-08T16:41:18.860", + "lastModified": "2024-10-21T16:35:00.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -74,6 +96,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-252xx/CVE-2019-25218.json b/CVE-2019/CVE-2019-252xx/CVE-2019-25218.json index 3f8cff9d76e..63b458b98df 100644 --- a/CVE-2019/CVE-2019-252xx/CVE-2019-25218.json +++ b/CVE-2019/CVE-2019-252xx/CVE-2019-25218.json @@ -2,13 +2,17 @@ "id": "CVE-2019-25218", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-19T04:15:03.007", - "lastModified": "2024-10-19T04:15:03.007", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Photo Gallery Slideshow & Masonry Tiled Gallery plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.0.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Photo Gallery Slideshow & Masonry Tiled Gallery para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'id' en todas las versiones hasta la 1.0.3 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de administrador y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48434.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48434.json index 15d6f0d5226..5b6236a0528 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48434.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48434.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48434", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-29T17:15:07.053", - "lastModified": "2023-12-23T12:15:21.383", + "lastModified": "2024-10-21T16:35:03.207", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20834.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20834.json index 901982b4eef..25a19c73835 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20834.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20834.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20834", "sourceIdentifier": "security@mediatek.com", "published": "2023-09-04T03:15:10.063", - "lastModified": "2023-09-07T19:08:44.343", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-21T17:35:15.610", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -53,6 +73,20 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20835.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20835.json index 9cadc2d7c24..309537e1a4b 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20835.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20835.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20835", "sourceIdentifier": "security@mediatek.com", "published": "2023-09-04T03:15:10.183", - "lastModified": "2023-09-07T19:13:46.380", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-21T17:35:16.473", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -53,6 +73,20 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31436.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31436.json index ecaceaaf5d5..c109c03b585 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31436.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31436.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31436", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-28T02:15:09.007", - "lastModified": "2023-11-29T15:15:07.820", + "lastModified": "2024-10-21T16:35:05.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35828.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35828.json index 5ae2d85496d..6943b393bf4 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35828.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35828.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35828", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-18T22:15:09.417", - "lastModified": "2023-12-04T14:53:50.153", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-21T16:35:06.073", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -49,6 +69,20 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52917.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52917.json index 6e9573a193a..20d856d381d 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52917.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52917.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52917", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:02.230", - "lastModified": "2024-10-21T13:15:02.230", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6080.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6080.json index 42503ebc022..ac8c571705c 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6080.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6080.json @@ -2,13 +2,17 @@ "id": "CVE-2023-6080", "sourceIdentifier": "mandiant-cve@google.com", "published": "2024-10-18T17:15:12.353", - "lastModified": "2024-10-18T17:15:12.353", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lakeside Software\u2019s SysTrack LsiAgent Installer version 10.7.8 for Windows contains a local privilege escalation vulnerability which allows attackers SYSTEM level access." + }, + { + "lang": "es", + "value": "La versi\u00f3n 10.7.8 del instalador SysTrack LsiAgent de Lakeside Software para Windows contiene una vulnerabilidad de escalada de privilegios locales que permite a los atacantes acceso a nivel de SYSTEM." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6243.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6243.json index 5699a99eb4e..c1a8b599a85 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6243.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6243.json @@ -2,13 +2,17 @@ "id": "CVE-2023-6243", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-19T07:15:02.520", - "lastModified": "2024-10-19T07:15:02.520", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The EventON PRO - WordPress Virtual Event Calendar Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.6.8. This is due to missing or incorrect nonce validation on the admin_test_email function. This makes it possible for unauthenticated attackers to send test emails to arbitrary email addresses via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento EventON PRO - WordPress Virtual Event Calendar Plugin para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 4.6.8 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n admin_test_email. Esto permite que atacantes no autenticados env\u00eden correos electr\u00f3nicos de prueba a direcciones de correo electr\u00f3nico arbitrarias a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10120.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10120.json index b3f0ee75b82..e5f1daac850 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10120.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10120.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10120", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-18T17:15:12.537", - "lastModified": "2024-10-18T17:15:12.537", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in wfh45678 Radar up to 1.0.8 and classified as critical. This vulnerability affects unknown code of the file /services/v1/common/upload. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en wfh45678 Radar hasta la versi\u00f3n 1.0.8 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /services/v1/common/upload. La manipulaci\u00f3n del archivo de argumentos provoca una carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10121.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10121.json index 60e605c4918..eb842800888 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10121.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10121.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10121", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-18T19:15:13.707", - "lastModified": "2024-10-18T19:15:13.707", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in wfh45678 Radar up to 1.0.8 and classified as critical. This issue affects some unknown processing of the component Interface Handler. The manipulation with the input /../ leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This appears not to be a path traversal weakness. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en wfh45678 Radar hasta la versi\u00f3n 1.0.8 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del componente Interface Handler. La manipulaci\u00f3n con la entrada /../ lleva a la omisi\u00f3n de la autorizaci\u00f3n. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Esto no parece ser una debilidad de path traversal. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10122.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10122.json index 1aa36279591..bcde5cd61be 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10122.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10122.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10122", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-18T19:15:13.990", - "lastModified": "2024-10-18T19:15:13.990", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been classified as problematic. Affected is an unknown function of the file /InnerRepPlus.html of the component Operator Details Form. The manipulation leads to missing password field masking. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Topdata Inner Rep Plus WebServer 2.01. Se ha clasificado como problem\u00e1tica. Se trata de una funci\u00f3n desconocida del archivo /InnerRepPlus.html del componente Operator Details Form. La manipulaci\u00f3n provoca la falta de enmascaramiento del campo de contrase\u00f1a. Es posible lanzar el ataque de forma remota. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10123.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10123.json index 95cddb533d7..425b7661653 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10123.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10123.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10123", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-18T20:15:02.960", - "lastModified": "2024-10-18T20:15:02.960", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda AC8 16.03.34.06. It has been declared as critical. Affected by this vulnerability is the function compare_parentcontrol_time of the file /goform/saveParentControlInfo. The manipulation of the argument time leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This is not the same issue like CVE-2023-33671. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Tenda AC8 16.03.34.06. Se ha declarado como cr\u00edtica. La funci\u00f3n compare_parentcontrol_time del archivo /goform/saveParentControlInfo se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento time provoca un desbordamiento del b\u00fafer basado en la pila. El ataque se puede ejecutar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. No se trata del mismo problema que CVE-2023-33671. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10128.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10128.json index 3bb8efd0ecc..76ee0233bfb 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10128.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10128.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10128", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-18T21:15:03.340", - "lastModified": "2024-10-18T21:15:03.340", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been rated as problematic. Affected by this issue is some unknown functionality of the file td.js.gz. The manipulation leads to risky cryptographic algorithm. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Topdata Inner Rep Plus WebServer 2.01. Se ha calificado como problem\u00e1tica. Este problema afecta a algunas funciones desconocidas del archivo td.js.gz. La manipulaci\u00f3n conduce a un algoritmo criptogr\u00e1fico riesgoso. El ataque puede ejecutarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10129.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10129.json index 5e899b5bd5e..7781d61caee 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10129.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10129.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10129", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-18T22:15:04.013", - "lastModified": "2024-10-18T22:15:04.013", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in HFO4 shudong-share up to 2.4.7. This affects an unknown part of the file /includes/create_share.php of the component Share Handler. The manipulation of the argument fkey leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en HFO4 shudong-share hasta la versi\u00f3n 2.4.7. Afecta a una parte desconocida del archivo /includes/create_share.php del componente Share Handler. La manipulaci\u00f3n del argumento fkey provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10130.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10130.json index 7802b6d4b73..d6a3fb5e584 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10130.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10130.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10130", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-18T22:15:04.683", - "lastModified": "2024-10-18T22:15:04.683", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Tenda AC8 16.03.34.06. This vulnerability affects the function formSetRebootTimer of the file /goform/SetSysAutoRebbotCfg. The manipulation of the argument rebootTime leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC8 16.03.34.06. Esta vulnerabilidad afecta a la funci\u00f3n formSetRebootTimer del archivo /goform/SetSysAutoRebbotCfg. La manipulaci\u00f3n del argumento rebootTime provoca un desbordamiento del b\u00fafer basado en la pila. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10131.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10131.json index ea8c215d803..e53a1c4acbf 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10131.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10131.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10131", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-19T04:15:05.300", - "lastModified": "2024-10-19T04:15:05.300", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The `add_llm` function in `llm_app.py` in infiniflow/ragflow version 0.11.0 contains a remote code execution (RCE) vulnerability. The function uses user-supplied input `req['llm_factory']` and `req['llm_name']` to dynamically instantiate classes from various model dictionaries. This approach allows an attacker to potentially execute arbitrary code due to the lack of comprehensive input validation or sanitization. An attacker could provide a malicious value for 'llm_factory' that, when used as an index to these model dictionaries, results in the execution of arbitrary code." + }, + { + "lang": "es", + "value": "La funci\u00f3n `add_llm` en `llm_app.py` en infiniflow/ragflow versi\u00f3n 0.11.0 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE). La funci\u00f3n utiliza la entrada proporcionada por el usuario `req['llm_factory']` y `req['llm_name']` para instanciar din\u00e1micamente clases de varios diccionarios de modelos. Este enfoque permite a un atacante ejecutar c\u00f3digo arbitrario debido a la falta de una validaci\u00f3n o desinfecci\u00f3n integral de la entrada. Un atacante podr\u00eda proporcionar un valor malicioso para 'llm_factory' que, cuando se utiliza como \u00edndice para estos diccionarios de modelos, da como resultado la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10133.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10133.json index 94641df4c87..e977a8ab620 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10133.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10133.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10133", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T09:15:11.090", - "lastModified": "2024-10-19T09:15:11.090", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in ESAFENET CDG 5 and classified as critical. Affected by this vulnerability is the function updateNetSecPolicyPriority of the file /com/esafenet/servlet/ajax/NetSecPolicyAjax.java. The manipulation of the argument id/frontId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG 5 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n updateNetSecPolicyPriority del archivo /com/esafenet/servlet/ajax/NetSecPolicyAjax.java. La manipulaci\u00f3n del argumento id/frontId provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10134.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10134.json index 2218f1cc7bf..07baa9847f1 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10134.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10134.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10134", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T10:15:02.663", - "lastModified": "2024-10-19T10:15:02.663", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ESAFENET CDG 5 and classified as critical. Affected by this issue is the function connectLogout of the file /com/esafenet/servlet/ajax/MultiServerAjax.java. The manipulation of the argument servername leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en ESAFENET CDG 5 y se ha clasificado como cr\u00edtica. La funci\u00f3n connectLogout del archivo /com/esafenet/servlet/ajax/MultiServerAjax.java se ve afectada por este problema. La manipulaci\u00f3n del argumento servername provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10135.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10135.json index 06098fc5fb8..b80ab76118c 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10135.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10135.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10135", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T12:15:13.247", - "lastModified": "2024-10-19T12:15:13.247", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ESAFENET CDG 5. It has been classified as critical. This affects the function actionDelNetSecConfig of the file /com/esafenet/servlet/netSec/NetSecConfigService.java. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG 5. Se ha clasificado como cr\u00edtica. Afecta a la funci\u00f3n actionDelNetSecConfig del archivo /com/esafenet/servlet/netSec/NetSecConfigService.java. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10136.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10136.json index 354e219ddec..5419a3e9473 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10136.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10136.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10136", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T12:15:14.110", - "lastModified": "2024-10-19T12:15:14.110", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /manage_invoice.php. The manipulation of the argument invoice_number leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Pharmacy Management System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /manage_invoice.php. La manipulaci\u00f3n del argumento invoice_number conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10137.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10137.json index f55d033d109..91ab7694271 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10137.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10137.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10137", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T13:15:11.553", - "lastModified": "2024-10-19T13:15:11.553", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /manage_medicine.php?action=delete. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Pharmacy Management System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /manage_medicine.php?action=delete. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10138.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10138.json index 2f40c40daa6..5e63eadfbb3 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10138.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10138.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10138", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T13:15:12.277", - "lastModified": "2024-10-19T13:15:12.277", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Pharmacy Management System 1.0. Affected is an unknown function of the file /add_new_purchase.php?action=is_supplier. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Pharmacy Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /add_new_purchase.php?action=is_supplier. La manipulaci\u00f3n del nombre del argumento provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10139.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10139.json index 6e29f7ae9da..c83756a03c4 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10139.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10139.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10139", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T14:15:02.223", - "lastModified": "2024-10-19T14:15:02.223", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Pharmacy Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /add_new_supplier.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Pharmacy Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /add_new_supplier.php. La manipulaci\u00f3n del nombre del argumento conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10140.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10140.json index da55a9ced1c..3932fbe35ac 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10140.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10140.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10140", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T15:15:14.603", - "lastModified": "2024-10-19T15:15:14.603", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in code-projects Pharmacy Management System 1.0. Affected by this issue is some unknown functionality of the file /manage_supplier.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Pharmacy Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /manage_supplier.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10141.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10141.json index 48daa5db0ab..c6611b35b6d 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10141.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10141.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10141", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T15:15:14.973", - "lastModified": "2024-10-19T15:15:14.973", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in jsbroks COCO Annotator 0.11.1. This affects an unknown part of the component Session Handler. The manipulation of the argument SECRET_KEY leads to predictable from observable state. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en jsbroks COCO Annotator 0.11.1. Afecta a una parte desconocida del componente Session Handler. La manipulaci\u00f3n del argumento SECRET_KEY hace que el estado sea predecible y no observable. Es posible iniciar el ataque de forma remota. La complejidad del ataque es bastante alta. Se dice que la explotaci\u00f3n es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10142.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10142.json index 201d546dd55..8b205ba2810 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10142.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10142.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10142", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T17:15:10.657", - "lastModified": "2024-10-19T17:15:10.657", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Blood Bank System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /viewrequest.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Blood Bank System 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /viewrequest.php. La manipulaci\u00f3n conduce a Cross-Site Scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10153.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10153.json index 3ab0596e9f8..dc17a514c60 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10153.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10153.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10153", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T18:15:02.437", - "lastModified": "2024-10-19T18:15:02.437", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file book-boat.php?bid=1 of the component Book a Boat Page. The manipulation of the argument nopeople leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Boat Booking System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo book-boat.php?bid=1 del componente Book a Boat Page. La manipulaci\u00f3n del argumento nopeople conduce a una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10154.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10154.json index d988d060e8e..1cdfcedc2df 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10154.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10154.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10154", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T19:15:04.090", - "lastModified": "2024-10-19T19:15:04.090", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Boat Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file status.php of the component Check Booking Status Page. The manipulation of the argument emailid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Boat Booking System 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo status.php del componente Check Booking Status Page. La manipulaci\u00f3n del argumento emailid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10155.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10155.json index 46ac04590a4..241083b6d4a 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10155.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10155.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10155", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T21:15:12.220", - "lastModified": "2024-10-19T21:15:12.220", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been classified as problematic. This affects an unknown part of the file book-boat.php?bid=1 of the component Book a Boat Page. The manipulation of the argument phone_number leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Boat Booking System 1.0. Se ha clasificado como problem\u00e1tica. Afecta a una parte desconocida del archivo book-boat.php?bid=1 del componente Book a Boat Page. La manipulaci\u00f3n del argumento phone_number provoca Cross-Site Scripting. Es posible iniciar el ataque de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10156.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10156.json index 068b5ed16e4..d8edefd8650 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10156.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10156.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10156", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T21:15:12.490", - "lastModified": "2024-10-19T21:15:12.490", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/index.php of the component Sign In Page. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Boat Booking System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/index.php del componente Sign In Page. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10157.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10157.json index 99549d6bc71..5f66e60351b 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10157.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10157.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10157", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T23:15:04.033", - "lastModified": "2024-10-19T23:15:04.033", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/password-recovery.php of the component Reset Your Password Page. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Boat Booking System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /admin/password-recovery.php del componente Reset Your Password Page. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10158.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10158.json index 15b50f084dc..676ed2c3aa6 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10158.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10158.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10158", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T23:15:04.297", - "lastModified": "2024-10-19T23:15:04.297", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in PHPGurukul Boat Booking System 1.0. Affected is the function session_start. The manipulation leads to session fixiation. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en PHPGurukul Boat Booking System 1.0. La funci\u00f3n afectada es session_start. La manipulaci\u00f3n provoca la fijaci\u00f3n de la sesi\u00f3n. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10159.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10159.json index b74aef2e706..ea68b4d70ef 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10159.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10159.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10159", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T00:15:02.137", - "lastModified": "2024-10-20T00:15:02.137", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in PHPGurukul Boat Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/profile.php of the component My Profile Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"mobilenumber\" to be affected. But it must be assumed that other parameters are affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Boat Booking System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/profile.php del componente My Profile Page. La manipulaci\u00f3n del argumento sadminusername/fullname/emailid/mobilenumber conduce a una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. El aviso inicial para investigadores solo menciona el par\u00e1metro \"mobilenumber\" que se ver\u00e1 afectado. Pero se debe asumir que tambi\u00e9n se ver\u00e1n afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10160.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10160.json index 70c77505646..84a0ad73f24 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10160.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10160.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10160", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T00:15:02.550", - "lastModified": "2024-10-20T00:15:02.550", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Boat Booking System 1.0. Affected by this issue is some unknown functionality of the file /admin/bwdates-report-details.php of the component BW Dates Report Page. The manipulation of the argument fdate/tdate leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"fdate\" to be affected. But it must be assumed \"tdate\" is affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en PHPGurukul Boat Booking System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /admin/bwdates-report-details.php del componente BW Dates Report Page. La manipulaci\u00f3n del argumento fdate/tdate conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. El aviso inicial para investigadores solo menciona que el par\u00e1metro \"fdate\" se ver\u00e1 afectado, pero se debe asumir que \"tdate\" tambi\u00e9n se ver\u00e1 afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10161.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10161.json index cc373c037af..a43ce84eda2 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10161.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10161.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10161", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T01:15:01.940", - "lastModified": "2024-10-20T01:15:01.940", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Boat Booking System 1.0. This affects an unknown part of the file change-image.php of the component Update Boat Image Page. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Boat Booking System 1.0. Afecta a una parte desconocida del archivo change-image.php del componente Update Boat Image Page. La manipulaci\u00f3n del argumento image permite la carga sin restricciones. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10162.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10162.json index 93a02e4683d..a0c676b312e 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10162.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10162.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10162", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T01:15:02.213", - "lastModified": "2024-10-20T01:15:02.213", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-subadmin.php of the component Edit Subdomain Details Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"mobilenumber\" to be affected. But it must be assumed that other parameters are affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Boat Booking System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/edit-subadmin.php del componente Edit Subdomain Details Page. La manipulaci\u00f3n del argumento sadminusername/fullname/emailid/mobilenumber conduce a una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. El aviso inicial para investigadores solo menciona el par\u00e1metro \"mobilenumber\" que se ver\u00e1 afectado. Pero se debe asumir que tambi\u00e9n se ver\u00e1n afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10163.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10163.json index c866aa67193..0925960613f 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10163.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10163.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10163", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T02:15:01.970", - "lastModified": "2024-10-20T02:15:01.970", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Sentiment Based Movie Rating System 1.0. It has been classified as critical. Affected is an unknown function of the file /msrps/movie_details.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher disclosure mentions a slightly changed product name." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Sentiment Based Movie Rating System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /msrps/movie_details.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. La divulgaci\u00f3n inicial del investigador menciona un nombre de producto ligeramente modificado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10165.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10165.json index 6e7fe455539..4e41234f635 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10165.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10165.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10165", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T03:15:02.557", - "lastModified": "2024-10-20T03:15:02.557", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Codezips Sales Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file deletecustcom.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Codezips Sales Management System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo deletecustcom.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10166.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10166.json index 403dcd75b98..dd6ffb47882 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10166.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10166.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10166", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T03:15:02.840", - "lastModified": "2024-10-20T03:15:02.840", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Codezips Sales Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file checkuser.php. The manipulation of the argument name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Codezips Sales Management System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo checkuser.php. La manipulaci\u00f3n del nombre del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10167.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10167.json index d70583abfe0..d3351e7de6a 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10167.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10167.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10167", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T03:15:03.090", - "lastModified": "2024-10-20T03:15:03.090", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Codezips Sales Management System 1.0. This affects an unknown part of the file deletecustind.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips Sales Management System 1.0. Afecta a una parte desconocida del archivo deletecustind.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10169.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10169.json index 673d4f75912..54812107431 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10169.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10169.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10169", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T04:15:02.600", - "lastModified": "2024-10-20T04:15:02.600", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Hospital Management System 1.0. This vulnerability affects unknown code of the file change-password.php. The manipulation of the argument cpass leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Hospital Management System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo change-password.php. La manipulaci\u00f3n del argumento cpass conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10170.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10170.json index 7a15e76fb14..67c3e2107d2 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10170.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10170.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10170", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T04:15:02.920", - "lastModified": "2024-10-20T04:15:02.920", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in code-projects Hospital Management System 1.0. This issue affects some unknown processing of the file get_doctor.php. The manipulation of the argument specilizationid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Hospital Management System 1.0. Este problema afecta a algunos procesos desconocidos del archivo get_doctor.php. La manipulaci\u00f3n del argumento specilizationid conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10171.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10171.json index c450dacac1d..9f5b9f415dd 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10171.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10171.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10171", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T05:15:02.363", - "lastModified": "2024-10-20T05:15:02.363", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Blood Bank System up to 1.0. Affected is an unknown function of the file /admin/massage.php. The manipulation of the argument bid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Blood Bank System hasta la versi\u00f3n 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/massage.php. La manipulaci\u00f3n del argumento bid provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10173.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10173.json index 585d804411b..d0161742903 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10173.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10173.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10173", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T05:15:02.830", - "lastModified": "2024-10-20T05:15:02.830", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in didi DDMQ 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Console Module. The manipulation with the input /;login leads to improper authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en didi DDMQ 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente Console Module. La manipulaci\u00f3n de la entrada /;login provoca una autenticaci\u00f3n incorrecta. El ataque se puede lanzar de forma remota. La vulnerabilidad se ha divulgado al p\u00fablico y puede utilizarse. Este producto adopta el enfoque de lanzamientos continuos para proporcionar una entrega continua. Por lo tanto, no est\u00e1n disponibles los detalles de las versiones afectadas y actualizadas. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10191.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10191.json index 3fa2f6cc550..6af3e6717be 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10191.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10191.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10191", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T06:15:02.413", - "lastModified": "2024-10-20T06:15:02.413", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in PHPGurukul Boat Booking System 1.0. This affects an unknown part of the file /admin/book-details.php of the component Booking Details Page. The manipulation of the argument Official Remark leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en PHPGurukul Boat Booking System 1.0. Afecta a una parte desconocida del archivo /admin/book-details.php del componente Booking Details Page. La manipulaci\u00f3n del argumento Official Remark provoca Cross-Site Scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10192.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10192.json index 9321c6f9d45..7240dd78c3e 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10192.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10192.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10192", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T07:15:02.103", - "lastModified": "2024-10-20T07:15:02.103", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul IFSC Code Finder Project 1.0 and classified as problematic. This vulnerability affects unknown code of the file search.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul IFSC Code Finder Project 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo search.php. La manipulaci\u00f3n conduce a Cross-Site Scripting. El ataque se puede iniciar de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10193.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10193.json index 4ee5aca10d6..e998f4e91b2 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10193.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10193.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10193", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T08:15:02.300", - "lastModified": "2024-10-20T08:15:02.300", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028 and classified as critical. This issue affects the function ping_ddns of the file internet.cgi. The manipulation of the argument DDNS leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en WAVLINK WN530H4, WN530HG4 y WN572HG3 hasta el 28/10/2022 y se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n ping_ddns del archivo internet.cgi. La manipulaci\u00f3n del argumento DDNS provoca la inyecci\u00f3n de comandos. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10194.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10194.json index 20093441378..e09c8b112d2 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10194.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10194.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10194", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T08:15:02.710", - "lastModified": "2024-10-20T08:15:02.710", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been classified as critical. Affected is the function Goto_chidx of the file login.cgi of the component Front-End Authentication Page. The manipulation of the argument wlanUrl leads to stack-based buffer overflow. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en WAVLINK WN530H4, WN530HG4 y WN572HG3 hasta el 28/10/2022. Se ha clasificado como cr\u00edtica. La funci\u00f3n Goto_chidx del archivo login.cgi del componente Front-End Authentication Page est\u00e1 afectada. La manipulaci\u00f3n del argumento wlanUrl provoca un desbordamiento del b\u00fafer basado en la pila. El ataque solo puede iniciarse dentro de la red local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10195.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10195.json index 71152d97530..83bdf899fb9 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10195.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10195.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10195", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T09:15:02.393", - "lastModified": "2024-10-20T09:15:02.393", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tecno 4G Portable WiFi TR118 V008-20220830. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /goform/goform_get_cmd_process of the component SMS Check. The manipulation of the argument order_by leads to sql injection. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Tecno 4G Portable WiFi TR118 V008-20220830. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /goform/goform_get_cmd_process del componente SMS Check. La manipulaci\u00f3n del argumento order_by conduce a una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10196.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10196.json index 11c6a3277e7..189b3b18f75 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10196.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10196.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10196", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-21T01:15:02.230", - "lastModified": "2024-10-21T01:15:02.230", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Pharmacy Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /add_new_invoice.php. The manipulation of the argument text leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Pharmacy Management System 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /add_new_invoice.php. La manipulaci\u00f3n del texto del argumento conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10197.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10197.json index da862f6824a..97acc82d7a6 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10197.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10197.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10197", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-21T01:15:02.687", - "lastModified": "2024-10-21T01:15:02.687", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file /manage_supplier.php of the component Manage Supplier Page. The manipulation of the argument address leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Pharmacy Management System 1.0. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /manage_supplier.php del componente Manage Supplier Page. La manipulaci\u00f3n del argumento address provoca Cross-Site Scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10198.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10198.json index f8d22f45c88..1542ca276ae 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10198.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10198.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10198", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-21T02:15:02.133", - "lastModified": "2024-10-21T02:15:02.133", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /manage_customer.php of the component Manage Customer Page. The manipulation of the argument suppliers_name/address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting files to be affected. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Pharmacy Management System 1.0. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /manage_customer.php del componente Manage Customer Page. La manipulaci\u00f3n del argumento providers_name/address conduce a Cross-Site Scripting. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. El aviso inicial para investigadores menciona archivos contradictorios que se ver\u00e1n afectados. Tambi\u00e9n podr\u00edan verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10199.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10199.json index 5558fe420ff..266e04992f4 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10199.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10199.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10199", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-21T02:15:02.403", - "lastModified": "2024-10-21T02:15:02.403", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /manage_medicine.php of the component Manage Medicines Page. The manipulation of the argument name/address/doctor_address/suppliers_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting files to be affected." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Pharmacy Management System 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a algunas funciones desconocidas del archivo /manage_medicine.php del componente Manage Medicines Page. La manipulaci\u00f3n del argumento name/address/doctor_address/suppliers_name provoca Cross-Site Scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. El aviso inicial para investigadores menciona archivos contradictorios que se ver\u00e1n afectados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10200.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10200.json index 2e6263dd130..91b208aa1e2 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10200.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10200.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10200", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-10-21T04:15:02.513", - "lastModified": "2024-10-21T04:15:02.513", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Administrative Management System from Wellchoose has a Path Traversal vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to download arbitrary files on the server." + }, + { + "lang": "es", + "value": "Administrative Management System de Wellchoose tiene una vulnerabilidad de path traversal, lo que permite a atacantes remotos no autenticados explotar esta vulnerabilidad para descargar archivos arbitrarios en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10201.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10201.json index 1b7afd4484f..04b240016ee 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10201.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10201.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10201", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-10-21T04:15:02.893", - "lastModified": "2024-10-21T04:15:02.893", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Administrative Management System from Wellchoose does not properly validate uploaded file types, allowing remote attackers with regular privileges to upload and execute webshells." + }, + { + "lang": "es", + "value": "Administrative Management System de Wellchoose no valida correctamente los tipos de archivos cargados, lo que permite que atacantes remotos con privilegios regulares carguen y ejecuten webshells." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10202.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10202.json index f8f002c6b95..7ac4d87d747 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10202.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10202.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10202", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-10-21T04:15:03.900", - "lastModified": "2024-10-21T04:15:03.900", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Administrative Management System from Wellchoose has an OS Command Injection vulnerability, allowing remote attackers with regular privileges to inject and execute arbitrary OS commands." + }, + { + "lang": "es", + "value": "Administrative Management System de Wellchoose tiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo, lo que permite a atacantes remotos con privilegios regulares inyectar y ejecutar comandos arbitrarios del sistema operativo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21233.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21233.json index 80ab8a5e593..3127910b651 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21233.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21233.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21233", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:12.293", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:17:34.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,61 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.3", + "versionEndIncluding": "19.24", + "matchCriteriaId": "255FC4D8-BDC8-4686-B97C-D462E68ACECE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "21.3", + "versionEndIncluding": "21.15", + "matchCriteriaId": "905A5485-EEC2-49A8-9ECB-B9C398CF641C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:database_server:23.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5EF50A6F-B07E-443D-A446-DBBA5C8FC82B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:database_server:23.5:*:*:*:*:*:*:*", + "matchCriteriaId": "3D8D6899-7091-4434-87D9-DA468E2FF4D6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21242.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21242.json index dc0a2818318..62cc2540c45 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21242.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21242.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21242", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:13.730", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:17:57.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,61 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:xml_database:*:*:*:*:*:*:*:*", + "versionStartExcluding": "19.3", + "versionEndIncluding": "19.24", + "matchCriteriaId": "4C0CCB33-06E6-4FC9-9569-F49471A2A3A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:xml_database:*:*:*:*:*:*:*:*", + "versionStartExcluding": "21.3", + "versionEndIncluding": "21.15", + "matchCriteriaId": "7955AD5E-EE3E-4C09-BBF4-4B647CA46B14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:xml_database:23.4:*:*:*:*:*:*:*", + "matchCriteriaId": "A4833CB3-997B-48A2-9277-D8DE452FE626" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:xml_database:23.5:*:*:*:*:*:*:*", + "matchCriteriaId": "C8394166-1DE0-4EC5-B2E9-EB0EBB153D2D" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json index 6accc054290..15343246363 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21262", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:17.157", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:28:16.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json index 43b0696f04b..09b1b317ad3 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21272", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:18.963", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:14:28.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21275.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21275.json index 6188b33f4fd..056dbe01494 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21275.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21275.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21275", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:19.520", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:05:07.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, { "source": "secalert_us@oracle.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.7", + "versionEndIncluding": "12.2.13", + "matchCriteriaId": "9AEA0470-D9AD-4694-8FA4-6A94CF437A19" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21276.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21276.json index 395c64cf06f..4a374fc8a1c 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21276.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21276.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21276", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:19.693", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:06:30.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.13", + "matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21277.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21277.json index 89af56c046a..6407c19dfd9 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21277.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21277.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21277", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:19.873", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:06:47.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.13", + "matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21278.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21278.json index 6a3291e46a7..793b1b09dc1 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21278.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21278.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21278", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:20.070", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:07:08.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.13", + "matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21279.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21279.json index d0e565f14ce..e0f65019513 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21279.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21279.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21279", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:20.257", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:08:39.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.13", + "matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21280.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21280.json index 46fe4f543c6..02f5b4d15b4 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21280.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21280.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21280", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:20.453", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:08:59.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:service_contracts:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.5", + "versionEndIncluding": "12.2.13", + "matchCriteriaId": "3494DC24-8651-4D71-8FDA-3E26592E9934" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json index b0c2f00e65b..e93cb39dda9 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21281", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:20.647", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:11:15.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,42 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.0.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46370D5C-11B2-4D86-A012-F5B9243229B0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21282.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21282.json index d34de7f3838..5a2fd128fba 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21282.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21282.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21282", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:20.830", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:12:01.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.13", + "matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21283.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21283.json index 7e35637bf72..b0eb12c5de7 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21283.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21283.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21283", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:21.033", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:13:04.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.2.48", + "versionEndIncluding": "9.2.50", + "matchCriteriaId": "643F3A21-105A-4A1F-9C32-9BCEA330EE56" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21286.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21286.json index 95bdaf4d954..cf8e4fa0971 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21286.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21286.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21286", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:21.633", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:16:31.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,42 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise:9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B74B2C85-C8F3-4325-A554-888325A2A2F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21536.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21536.json index 36a18e422ce..69df9d9e5f5 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21536.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21536.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21536", "sourceIdentifier": "report@snyk.io", "published": "2024-10-19T05:15:13.097", - "lastModified": "2024-10-19T05:15:13.097", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Versions of the package http-proxy-middleware before 2.0.7, from 3.0.0 and before 3.0.3 are vulnerable to Denial of Service (DoS) due to an UnhandledPromiseRejection error thrown by micromatch. An attacker could kill the Node.js process and crash the server by making requests to certain paths." + }, + { + "lang": "es", + "value": "Las versiones del paquete http-proxy-middleware anteriores a la 2.0.7, a la 3.0.0 y a la 3.0.3 es vulnerable a un ataque de denegaci\u00f3n de servicio (DoS) debido a un error UnhandledPromiseRejection generado por micromatch. Un atacante podr\u00eda matar el proceso Node.js y bloquear el servidor al realizar solicitudes a determinadas rutas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29213.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29213.json index a844727893a..e549e8721d4 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29213.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29213.json @@ -2,13 +2,17 @@ "id": "CVE-2024-29213", "sourceIdentifier": "support@hackerone.com", "published": "2024-10-18T23:15:03.180", - "lastModified": "2024-10-18T23:15:03.180", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ivanti DSM < version 2024.2 allows authenticated users on the local machine to run code with elevated privileges due to insecure ACL via unspecified attack vector." + }, + { + "lang": "es", + "value": "Ivanti DSM < versi\u00f3n 2024.2 permite que los usuarios autenticados en la m\u00e1quina local ejecuten c\u00f3digo con privilegios elevados debido a una ACL insegura a trav\u00e9s de un vector de ataque no especificado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29821.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29821.json index f35e817c627..924d1dd55be 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29821.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29821.json @@ -2,13 +2,17 @@ "id": "CVE-2024-29821", "sourceIdentifier": "support@hackerone.com", "published": "2024-10-18T23:15:03.357", - "lastModified": "2024-10-18T23:15:03.357", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ivanti DSM < version 2024.2 allows authenticated users on the local machine to run code with elevated privileges due to insecure ACL via unspecified attack vector." + }, + { + "lang": "es", + "value": "Ivanti DSM < versi\u00f3n 2024.2 permite que los usuarios autenticados en la m\u00e1quina local ejecuten c\u00f3digo con privilegios elevados debido a una ACL insegura a trav\u00e9s de un vector de ataque no especificado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37404.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37404.json index 47272233b12..1540956990c 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37404.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37404.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37404", "sourceIdentifier": "support@hackerone.com", "published": "2024-10-18T23:15:03.580", - "lastModified": "2024-10-18T23:15:03.580", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el portal de administraci\u00f3n de Ivanti Connect Secure anterior a 22.7R2.1 y 9.1R18.9, o Ivanti Policy Secure anterior a 22.7R1.1 permite que un atacante autenticado remoto logre la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40746.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40746.json new file mode 100644 index 00000000000..840e08b1b5a --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40746.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40746", + "sourceIdentifier": "security@joomla.org", + "published": "2024-10-21T17:15:03.330", + "lastModified": "2024-10-21T17:15:03.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability in HikaShop Joomla Component < 5.1.1 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload in the `description` parameter of any product. The `description `parameter is not sanitised in the backend." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.hikashop.com/", + "source": "security@joomla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42508.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42508.json index f72ce939adf..d62159bb23d 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42508.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42508.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42508", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-10-18T16:15:04.710", - "lastModified": "2024-10-18T16:15:04.710", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability could be exploited, leading to unauthorized disclosure of information to authenticated users." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad podr\u00eda ser explotada para provocar la divulgaci\u00f3n no autorizada de informaci\u00f3n a usuarios autenticados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4211.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4211.json index 1c24378fc22..64941f4e55c 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4211.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4211.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4211", "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:17.617", - "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:15:09.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "LOW" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:application_automation_tools:*:*:*:*:*:jenkins:*:*", + "versionEndIncluding": "24.1.0", + "matchCriteriaId": "81346F30-B1A1-4A05-8706-ACED99564F09" + } + ] + } + ] + } + ], "references": [ { "url": "https://portal.microfocus.com/s/article/KM000033543?language=en_US", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json index 8b7938d7f7b..580de24f083 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43483", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:10.367", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T17:35:34.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,557 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "934D4E46-12C1-41DC-A28C-A2C430E965E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F513002-D8C1-4D3A-9F79-4B52498F67E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4793BFB-2E4E-4067-87A5-4B8749025CA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42D329B2-432D-4029-87EB-4C3C5F55CD95" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A529CED5-0DF0-4203-85C0-894CAF37E159" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1F0241B0-855A-489C-9AAE-68BC2556F24D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B822942-B429-406C-A13A-A2379AA952CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "2D3F18AF-84ED-473B-A8DF-65EB23C475AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0E2A7014-8078-4C40-91E3-ACA60A98AC68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "979081E3-FB60-43E0-BF86-ED301E7EF25C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7F7487B8-BE4D-4707-9E20-39840A260831" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "47D0AB10-CD2F-4500-A4D6-CC2BA724036C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3E4E76DC-838A-46D7-BC09-E2C149699050" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1F0241B0-855A-489C-9AAE-68BC2556F24D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "matchCriteriaId": "AA1CCA3D-299D-4BCD-8565-98083C40525C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*", + "matchCriteriaId": "8968BAC8-A1DB-4F88-89F8-4BE47919C247" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "2D3F18AF-84ED-473B-A8DF-65EB23C475AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "matchCriteriaId": "D00F295B-6ECF-43C4-BD71-98F835CCDB0D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "matchCriteriaId": "1648C361-E25C-42FE-8543-03DE56100201" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AF6437F9-6631-49D3-A6C2-62329E278E31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0E2A7014-8078-4C40-91E3-ACA60A98AC68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3E4E76DC-838A-46D7-BC09-E2C149699050" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8EDC4407-7E92-4E60-82F0-0C87D1860D3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "734112B3-1383-4BE3-8721-C0F84566B764" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "36B0E40A-84EF-4099-A395-75D6B8CDA196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*", + "matchCriteriaId": "280FE663-23BE-45D2-9B31-5F577E390B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*", + "matchCriteriaId": "D400E856-2B2E-4CEA-8CA5-309FDF371CEA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", + "matchCriteriaId": "42A6DF09-B8E1-414D-97E7-453566055279" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.0.35", + "matchCriteriaId": "BA23E158-EEDE-46D9-ADA2-43A07949A326" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.0.10", + "matchCriteriaId": "D977AC32-7583-44F0-B48D-ACB001DA164A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6", + "versionEndExcluding": "17.6.20", + "matchCriteriaId": "C8CF89C8-6076-458E-B27E-B88A6A8765FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.8", + "versionEndExcluding": "17.8.15", + "matchCriteriaId": "81CBEFEE-6C2B-4341-9499-42385C88E5CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.10", + "versionEndExcluding": "17.10.8", + "matchCriteriaId": "68935496-FE9F-4E64-95C7-4DCAA4681F41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.11", + "versionEndExcluding": "17.11.5", + "matchCriteriaId": "2FB9AE6A-F671-423C-9C83-0A031067F948" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43483", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json index 32220b58f57..3a60bb280e9 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43484", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:10.633", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T17:35:44.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,10 +65,572 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "934D4E46-12C1-41DC-A28C-A2C430E965E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F513002-D8C1-4D3A-9F79-4B52498F67E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4793BFB-2E4E-4067-87A5-4B8749025CA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42D329B2-432D-4029-87EB-4C3C5F55CD95" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A529CED5-0DF0-4203-85C0-894CAF37E159" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1F0241B0-855A-489C-9AAE-68BC2556F24D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B822942-B429-406C-A13A-A2379AA952CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "2D3F18AF-84ED-473B-A8DF-65EB23C475AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0E2A7014-8078-4C40-91E3-ACA60A98AC68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "979081E3-FB60-43E0-BF86-ED301E7EF25C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7F7487B8-BE4D-4707-9E20-39840A260831" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "47D0AB10-CD2F-4500-A4D6-CC2BA724036C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3E4E76DC-838A-46D7-BC09-E2C149699050" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1F0241B0-855A-489C-9AAE-68BC2556F24D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "matchCriteriaId": "AA1CCA3D-299D-4BCD-8565-98083C40525C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*", + "matchCriteriaId": "8968BAC8-A1DB-4F88-89F8-4BE47919C247" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "2D3F18AF-84ED-473B-A8DF-65EB23C475AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "matchCriteriaId": "D00F295B-6ECF-43C4-BD71-98F835CCDB0D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "matchCriteriaId": "1648C361-E25C-42FE-8543-03DE56100201" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AF6437F9-6631-49D3-A6C2-62329E278E31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "matchCriteriaId": "D00F295B-6ECF-43C4-BD71-98F835CCDB0D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "matchCriteriaId": "1648C361-E25C-42FE-8543-03DE56100201" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0E2A7014-8078-4C40-91E3-ACA60A98AC68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AF6437F9-6631-49D3-A6C2-62329E278E31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3E4E76DC-838A-46D7-BC09-E2C149699050" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8EDC4407-7E92-4E60-82F0-0C87D1860D3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "734112B3-1383-4BE3-8721-C0F84566B764" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "36B0E40A-84EF-4099-A395-75D6B8CDA196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*", + "matchCriteriaId": "280FE663-23BE-45D2-9B31-5F577E390B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*", + "matchCriteriaId": "D400E856-2B2E-4CEA-8CA5-309FDF371CEA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", + "matchCriteriaId": "42A6DF09-B8E1-414D-97E7-453566055279" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.0.35", + "matchCriteriaId": "BA23E158-EEDE-46D9-ADA2-43A07949A326" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.0.10", + "matchCriteriaId": "D977AC32-7583-44F0-B48D-ACB001DA164A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6", + "versionEndExcluding": "17.6.20", + "matchCriteriaId": "C8CF89C8-6076-458E-B27E-B88A6A8765FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.8", + "versionEndExcluding": "17.8.15", + "matchCriteriaId": "81CBEFEE-6C2B-4341-9499-42385C88E5CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.10", + "versionEndExcluding": "17.10.8", + "matchCriteriaId": "68935496-FE9F-4E64-95C7-4DCAA4681F41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.11", + "versionEndExcluding": "17.11.5", + "matchCriteriaId": "2FB9AE6A-F671-423C-9C83-0A031067F948" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43484", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43577.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43577.json index eb2b39eb1f9..453c6482a00 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43577.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43577.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43577", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-18T23:15:06.510", - "lastModified": "2024-10-18T23:15:06.510", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad en Microsoft Edge (basado en Chromium)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43689.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43689.json index bcddf8a31e2..5073a3d6e8f 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43689.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43689.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43689", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-10-21T02:15:02.680", - "lastModified": "2024-10-21T14:35:08.110", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43945.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43945.json index ef27a4fe62e..0e7c73fd9b5 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43945.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43945.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43945", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-21T11:15:02.933", - "lastModified": "2024-10-21T11:15:02.933", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44000.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44000.json index 769f6f6c8a8..e867bfa0596 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44000.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44000.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44000", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T12:15:03.287", - "lastModified": "2024-10-20T12:15:03.287", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Authentication Bypass.This issue affects LiteSpeed Cache: from n/a before 6.5.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de credenciales insuficientemente protegidas en LiteSpeed Technologies LiteSpeed Cache permite omitir la autenticaci\u00f3n. Este problema afecta a LiteSpeed Cache: desde n/a hasta 6.5.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44061.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44061.json index dd4821ba27d..e03a48ae871 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44061.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44061.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44061", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:02.277", - "lastModified": "2024-10-20T10:15:02.277", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in WPFactory EU/UK VAT Manager for WooCommerce allows Cross-Site Scripting (XSS).This issue affects EU/UK VAT Manager for WooCommerce: from n/a through 2.12.14." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de etiquetas HTML relacionadas con scripts en una p\u00e1gina web (XSS b\u00e1sico) en WPFactory EU/UK VAT Manager para WooCommerce permite Cross-Site Scripting (XSS). Este problema afecta a EU/UK VAT Manager para WooCommerce: desde n/a hasta 2.12.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45309.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45309.json index 9008f43e1b4..eefc9c064b7 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45309.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45309.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45309", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-21T15:15:03.463", - "lastModified": "2024-10-21T15:15:03.463", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45944.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45944.json index a73691c68f1..b80311055e3 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45944.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45944.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45944", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-18T19:15:14.293", - "lastModified": "2024-10-18T19:15:14.293", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In J2eeFAST <=2.7, the backend function has unsafe filtering, which allows an attacker to trigger certain sensitive functions resulting in arbitrary code execution." + }, + { + "lang": "es", + "value": "En J2eeFAST <=2.7, la funci\u00f3n backend tiene un filtrado inseguro, lo que permite a un atacante activar ciertas funciones sensibles que resultan en la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4692.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4692.json index 2afba902fb7..5b39401bb28 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4692.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4692.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4692", "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:17.873", - "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:10:14.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "LOW" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:application_automation_tools:*:*:*:*:*:jenkins:*:*", + "versionEndExcluding": "24.1.0", + "matchCriteriaId": "D899757D-1EEB-4A7C-9842-F3BF6F3B1D09" + } + ] + } + ] + } + ], "references": [ { "url": "https://portal.microfocus.com/s/article/KM000033546?language=en_US", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47241.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47241.json index 3cce7fd3b92..7cc2194f794 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47241.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47241.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47241", "sourceIdentifier": "security_alert@emc.com", "published": "2024-10-18T17:15:12.880", - "lastModified": "2024-10-18T17:15:12.880", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains an Improper Certificate Validation vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access and modification of transmitted data." + }, + { + "lang": "es", + "value": "Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, versi\u00f3n(es) 5.24, contiene una vulnerabilidad de validaci\u00f3n de certificado incorrecta. Un atacante con pocos privilegios y acceso remoto podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda un acceso no autorizado y la modificaci\u00f3n de los datos transmitidos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47325.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47325.json index 01f0ad6a710..1ede9b98abf 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47325.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47325.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47325", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:03.180", - "lastModified": "2024-10-20T10:15:03.180", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeisle Multiple Page Generator Plugin \u2013 MPG allows SQL Injection.This issue affects Multiple Page Generator Plugin \u2013 MPG: from n/a through 3.4.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Themeisle Multiple Page Generator Plugin \u2013 MPG permite la inyecci\u00f3n SQL. Este problema afecta al complemento generador de m\u00faltiples p\u00e1ginas \u2013 MPG: desde n/a hasta 3.4.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47328.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47328.json index c6ea7450918..1fa543d03fb 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47328.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47328.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47328", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-21T11:15:03.393", - "lastModified": "2024-10-21T11:15:03.393", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47634.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47634.json index 9aa98ccc99e..4417f728a06 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47634.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47634.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47634", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T11:15:02.217", - "lastModified": "2024-10-20T11:15:02.217", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Streamline.Lv CartBounty \u2013 Save and recover abandoned carts for WooCommerce allows Cross Site Request Forgery.This issue affects CartBounty \u2013 Save and recover abandoned carts for WooCommerce: from n/a through 8.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Streamline.Lv CartBounty \u2013 Save and recover abandoned carts for WooCommerce permite Cross-Site Request Forgery. Este problema afecta a CartBounty \u2013 Guardar y recuperar carritos abandonados para WooCommerce: desde n/a hasta 8.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47675.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47675.json index beb5a27dcec..b1bc4d69823 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47675.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47675.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47675", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:04.600", - "lastModified": "2024-10-21T12:15:04.600", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json index fe232e90ee6..976856a75f4 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47676", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:04.687", - "lastModified": "2024-10-21T12:15:04.687", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47677.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47677.json index 5ae15cf77e0..55281f46726 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47677.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47677.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47677", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:04.760", - "lastModified": "2024-10-21T12:15:04.760", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47678.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47678.json index b8e7d813f3e..d4a6d7574e2 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47678.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47678.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47678", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:04.837", - "lastModified": "2024-10-21T12:15:04.837", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47679.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47679.json index be2064ee445..bd851a651f2 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47679.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47679.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47679", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:04.920", - "lastModified": "2024-10-21T12:15:04.920", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47680.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47680.json index 0aea1b01cb4..b1a64acfc31 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47680.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47680.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47680", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.003", - "lastModified": "2024-10-21T12:15:05.003", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47681.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47681.json index ecc0e640c52..db9c4a66446 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47681.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47681.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47681", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.080", - "lastModified": "2024-10-21T12:15:05.080", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47682.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47682.json index a8ad4707dec..67259694319 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47682.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47682.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47682", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.143", - "lastModified": "2024-10-21T12:15:05.143", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47683.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47683.json index ccff2911814..7321fadbfeb 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47683.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47683.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47683", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.210", - "lastModified": "2024-10-21T12:15:05.210", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47684.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47684.json index 50a01f13c52..464a32cde74 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47684.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47684.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47684", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.290", - "lastModified": "2024-10-21T12:15:05.290", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47685.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47685.json index 6d1986b2b6c..9fe9a29d794 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47685.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47685.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47685", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.397", - "lastModified": "2024-10-21T12:15:05.397", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47686.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47686.json index 76db0f72c8e..bdade9ba259 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47686.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47686.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47686", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.497", - "lastModified": "2024-10-21T12:15:05.497", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47687.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47687.json index bf3b25c5fd3..89f7e799b9c 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47687.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47687.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47687", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.580", - "lastModified": "2024-10-21T12:15:05.580", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47688.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47688.json index cbfb9661b71..010a4297a96 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47688.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47688.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47688", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.653", - "lastModified": "2024-10-21T12:15:05.653", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47689.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47689.json index ede3a3bbd2a..f05aabc8a04 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47689.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47689.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47689", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.733", - "lastModified": "2024-10-21T12:15:05.733", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47690.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47690.json index 4bc6c1516e2..93fabceba5f 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47690.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47690.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47690", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.800", - "lastModified": "2024-10-21T12:15:05.800", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47691.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47691.json index 05893fb408d..8d6c0b6b782 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47691.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47691.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47691", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.880", - "lastModified": "2024-10-21T12:15:05.880", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47692.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47692.json index 083d652d33a..47f82756f85 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47692.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47692.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47692", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.953", - "lastModified": "2024-10-21T12:15:05.953", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47693.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47693.json index e7c7a59cc9a..27ab3fa62c8 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47693.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47693.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47693", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:06.033", - "lastModified": "2024-10-21T12:15:06.033", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47694.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47694.json index c15f5ff2f5f..2289bfd4768 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47694.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47694.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47694", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:06.107", - "lastModified": "2024-10-21T12:15:06.107", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47695.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47695.json index 60ae2eab1f8..ec90392ee3a 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47695.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47695.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47695", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:06.180", - "lastModified": "2024-10-21T12:15:06.180", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47696.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47696.json index bbe39b38b2b..3bd2bd5f445 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47696.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47696.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47696", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:06.257", - "lastModified": "2024-10-21T12:15:06.257", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47697.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47697.json index eeb60c55eba..584322d5f9e 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47697.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47697", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:06.343", - "lastModified": "2024-10-21T12:15:06.343", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47698.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47698.json index 43714c46f22..199ff2a685d 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47698.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47698.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47698", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:06.423", - "lastModified": "2024-10-21T12:15:06.423", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47699.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47699.json index d80be89dd63..d7e329d424b 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47699.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47699.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47699", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:06.503", - "lastModified": "2024-10-21T12:15:06.503", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47700.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47700.json index fe9e98ae3a6..92fc5bd24b9 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47700.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47700.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47700", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:06.593", - "lastModified": "2024-10-21T12:15:06.593", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47701.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47701.json index 0ae4d259c95..b67c73144b2 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47701.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47701.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47701", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:06.663", - "lastModified": "2024-10-21T12:15:06.663", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47702.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47702.json index 057552ae581..d90802879f8 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47702.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47702.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47702", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:06.743", - "lastModified": "2024-10-21T12:15:06.743", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47703.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47703.json index 54e9ba56ddb..b3af72379a5 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47703.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47703.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47703", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:06.823", - "lastModified": "2024-10-21T12:15:06.823", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47704.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47704.json index 83f1bd30666..d5699a96536 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47704.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47704.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47704", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:06.923", - "lastModified": "2024-10-21T12:15:06.923", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47705.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47705.json index 20e1576c0ab..eb5c85af7fb 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47705.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47705.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47705", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:07.020", - "lastModified": "2024-10-21T12:15:07.020", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47706.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47706.json index a4e27352cb9..c0eac312c0d 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47706.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47706.json @@ -2,13 +2,13 @@ "id": "CVE-2024-47706", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:07.120", - "lastModified": "2024-10-21T12:15:07.120", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix possible UAF for bfqq->bic with merge chain\n\n1) initial state, three tasks:\n\n\t\tProcess 1 Process 2\tProcess 3\n\t\t (BIC1) (BIC2)\t\t (BIC3)\n\t\t | \u039b | \u039b\t\t | \u039b\n\t\t | | | |\t\t | |\n\t\t V | V |\t\t V |\n\t\t bfqq1 bfqq2\t\t bfqq3\nprocess ref:\t 1\t\t 1\t\t 1\n\n2) bfqq1 merged to bfqq2:\n\n\t\tProcess 1 Process 2\tProcess 3\n\t\t (BIC1) (BIC2)\t\t (BIC3)\n\t\t | |\t\t | \u039b\n\t\t \\--------------\\|\t\t | |\n\t\t V\t\t V |\n\t\t bfqq1--------->bfqq2\t\t bfqq3\nprocess ref:\t 0\t\t 2\t\t 1\n\n3) bfqq2 merged to bfqq3:\n\n\t\tProcess 1 Process 2\tProcess 3\n\t\t (BIC1) (BIC2)\t\t (BIC3)\n\t here -> \u039b |\t\t |\n\t\t \\--------------\\ \\-------------\\|\n\t\t V\t\t V\n\t\t bfqq1--------->bfqq2---------->bfqq3\nprocess ref:\t 0\t\t 1\t\t 3\n\nIn this case, IO from Process 1 will get bfqq2 from BIC1 first, and then\nget bfqq3 through merge chain, and finially handle IO by bfqq3.\nHowerver, current code will think bfqq2 is owned by BIC1, like initial\nstate, and set bfqq2->bic to BIC1.\n\nbfq_insert_request\n-> by Process 1\n bfqq = bfq_init_rq(rq)\n bfqq = bfq_get_bfqq_handle_split\n bfqq = bic_to_bfqq\n -> get bfqq2 from BIC1\n bfqq->ref++\n rq->elv.priv[0] = bic\n rq->elv.priv[1] = bfqq\n if (bfqq_process_refs(bfqq) == 1)\n bfqq->bic = bic\n -> record BIC1 to bfqq2\n\n __bfq_insert_request\n new_bfqq = bfq_setup_cooperator\n -> get bfqq3 from bfqq2->new_bfqq\n bfqq_request_freed(bfqq)\n new_bfqq->ref++\n rq->elv.priv[1] = new_bfqq\n -> handle IO by bfqq3\n\nFix the problem by checking bfqq is from merge chain fist. And this\nmight fix a following problem reported by our syzkaller(unreproducible):\n\n==================================================================\nBUG: KASAN: slab-use-after-free in bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]\nBUG: KASAN: slab-use-after-free in bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]\nBUG: KASAN: slab-use-after-free in bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889\nWrite of size 1 at addr ffff888123839eb8 by task kworker/0:1H/18595\n\nCPU: 0 PID: 18595 Comm: kworker/0:1H Tainted: G L 6.6.0-07439-gba2303cacfda #6\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\nWorkqueue: kblockd blk_mq_requeue_work\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:364 [inline]\n print_report+0x10d/0x610 mm/kasan/report.c:475\n kasan_report+0x8e/0xc0 mm/kasan/report.c:588\n bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]\n bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]\n bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889\n bfq_get_bfqq_handle_split+0x169/0x5d0 block/bfq-iosched.c:6757\n bfq_init_rq block/bfq-iosched.c:6876 [inline]\n bfq_insert_request block/bfq-iosched.c:6254 [inline]\n bfq_insert_requests+0x1112/0x5cf0 block/bfq-iosched.c:6304\n blk_mq_insert_request+0x290/0x8d0 block/blk-mq.c:2593\n blk_mq_requeue_work+0x6bc/0xa70 block/blk-mq.c:1502\n process_one_work kernel/workqueue.c:2627 [inline]\n process_scheduled_works+0x432/0x13f0 kernel/workqueue.c:2700\n worker_thread+0x6f2/0x1160 kernel/workqueue.c:2781\n kthread+0x33c/0x440 kernel/kthread.c:388\n ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:305\n \n\nAllocated by task 20776:\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\n __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328\n kasan_slab_alloc include/linux/kasan.h:188 [inline]\n slab_post_alloc_hook mm/slab.h:763 [inline]\n slab_alloc_node mm/slub.c:3458 [inline]\n kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503\n ioc_create_icq block/blk-ioc.c:370 [inline]\n---truncated---" + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix possible UAF for bfqq->bic with merge chain\n\n1) initial state, three tasks:\n\n\t\tProcess 1 Process 2\tProcess 3\n\t\t (BIC1) (BIC2)\t\t (BIC3)\n\t\t | ? | ?\t\t | ?\n\t\t | | | |\t\t | |\n\t\t V | V |\t\t V |\n\t\t bfqq1 bfqq2\t\t bfqq3\nprocess ref:\t 1\t\t 1\t\t 1\n\n2) bfqq1 merged to bfqq2:\n\n\t\tProcess 1 Process 2\tProcess 3\n\t\t (BIC1) (BIC2)\t\t (BIC3)\n\t\t | |\t\t | ?\n\t\t \\--------------\\|\t\t | |\n\t\t V\t\t V |\n\t\t bfqq1--------->bfqq2\t\t bfqq3\nprocess ref:\t 0\t\t 2\t\t 1\n\n3) bfqq2 merged to bfqq3:\n\n\t\tProcess 1 Process 2\tProcess 3\n\t\t (BIC1) (BIC2)\t\t (BIC3)\n\t here -> ? |\t\t |\n\t\t \\--------------\\ \\-------------\\|\n\t\t V\t\t V\n\t\t bfqq1--------->bfqq2---------->bfqq3\nprocess ref:\t 0\t\t 1\t\t 3\n\nIn this case, IO from Process 1 will get bfqq2 from BIC1 first, and then\nget bfqq3 through merge chain, and finially handle IO by bfqq3.\nHowerver, current code will think bfqq2 is owned by BIC1, like initial\nstate, and set bfqq2->bic to BIC1.\n\nbfq_insert_request\n-> by Process 1\n bfqq = bfq_init_rq(rq)\n bfqq = bfq_get_bfqq_handle_split\n bfqq = bic_to_bfqq\n -> get bfqq2 from BIC1\n bfqq->ref++\n rq->elv.priv[0] = bic\n rq->elv.priv[1] = bfqq\n if (bfqq_process_refs(bfqq) == 1)\n bfqq->bic = bic\n -> record BIC1 to bfqq2\n\n __bfq_insert_request\n new_bfqq = bfq_setup_cooperator\n -> get bfqq3 from bfqq2->new_bfqq\n bfqq_request_freed(bfqq)\n new_bfqq->ref++\n rq->elv.priv[1] = new_bfqq\n -> handle IO by bfqq3\n\nFix the problem by checking bfqq is from merge chain fist. And this\nmight fix a following problem reported by our syzkaller(unreproducible):\n\n==================================================================\nBUG: KASAN: slab-use-after-free in bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]\nBUG: KASAN: slab-use-after-free in bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]\nBUG: KASAN: slab-use-after-free in bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889\nWrite of size 1 at addr ffff888123839eb8 by task kworker/0:1H/18595\n\nCPU: 0 PID: 18595 Comm: kworker/0:1H Tainted: G L 6.6.0-07439-gba2303cacfda #6\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\nWorkqueue: kblockd blk_mq_requeue_work\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:364 [inline]\n print_report+0x10d/0x610 mm/kasan/report.c:475\n kasan_report+0x8e/0xc0 mm/kasan/report.c:588\n bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]\n bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]\n bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889\n bfq_get_bfqq_handle_split+0x169/0x5d0 block/bfq-iosched.c:6757\n bfq_init_rq block/bfq-iosched.c:6876 [inline]\n bfq_insert_request block/bfq-iosched.c:6254 [inline]\n bfq_insert_requests+0x1112/0x5cf0 block/bfq-iosched.c:6304\n blk_mq_insert_request+0x290/0x8d0 block/blk-mq.c:2593\n blk_mq_requeue_work+0x6bc/0xa70 block/blk-mq.c:1502\n process_one_work kernel/workqueue.c:2627 [inline]\n process_scheduled_works+0x432/0x13f0 kernel/workqueue.c:2700\n worker_thread+0x6f2/0x1160 kernel/workqueue.c:2781\n kthread+0x33c/0x440 kernel/kthread.c:388\n ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:305\n \n\nAllocated by task 20776:\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\n __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328\n kasan_slab_alloc include/linux/kasan.h:188 [inline]\n slab_post_alloc_hook mm/slab.h:763 [inline]\n slab_alloc_node mm/slub.c:3458 [inline]\n kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503\n ioc_create_icq block/blk-ioc.c:370 [inline]\n---truncated---" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47707.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47707.json index 67ea2f9a410..a84327786cd 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47707.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47707.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47707", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:07.220", - "lastModified": "2024-10-21T12:15:07.220", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47708.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47708.json index e88d5549903..2d9af29a606 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47708.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47708.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47708", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:07.313", - "lastModified": "2024-10-21T12:15:07.313", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47709.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47709.json index 73a29d4ba74..f529370e4bc 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47709.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47709.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47709", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:07.397", - "lastModified": "2024-10-21T12:15:07.397", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47710.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47710.json index bb4732867e2..4ce6546b51a 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47710.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47710.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47710", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:07.483", - "lastModified": "2024-10-21T12:15:07.483", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47711.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47711.json index c180e6f40c9..e29a8308a01 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47711.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47711.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47711", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:07.563", - "lastModified": "2024-10-21T12:15:07.563", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47712.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47712.json index 64c997e4991..71816be3550 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47712.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47712.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47712", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:07.640", - "lastModified": "2024-10-21T12:15:07.640", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47713.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47713.json index a290de63edb..a613a722655 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47713.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47713.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47713", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:07.717", - "lastModified": "2024-10-21T12:15:07.717", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47714.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47714.json index bf7395c8329..fe1ff497468 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47714.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47714.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47714", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:07.797", - "lastModified": "2024-10-21T12:15:07.797", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47715.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47715.json index 81dd2d33423..5d35700d35d 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47715.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47715.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47715", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:07.870", - "lastModified": "2024-10-21T12:15:07.870", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47716.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47716.json index dd6c8880957..d8ce36ec0e1 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47716.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47716.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47716", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:07.943", - "lastModified": "2024-10-21T12:15:07.943", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47717.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47717.json index 1e4158b954c..871235ed20c 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47717.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47717.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47717", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:08.020", - "lastModified": "2024-10-21T12:15:08.020", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47718.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47718.json index d9a6c2037c0..86417b21f25 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47718.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47718.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47718", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:08.090", - "lastModified": "2024-10-21T12:15:08.090", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47719.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47719.json index c2a6cef0006..5e58faa068e 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47719.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47719.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47719", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:08.167", - "lastModified": "2024-10-21T12:15:08.167", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47720.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47720.json index bd06cd9c427..970b209f016 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47720.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47720.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47720", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:08.240", - "lastModified": "2024-10-21T12:15:08.240", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47721.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47721.json index db01a05b028..b0d0853f338 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47721.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47721.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47721", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:08.313", - "lastModified": "2024-10-21T12:15:08.313", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47723.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47723.json index 847d3cc1fae..9bac332c2a7 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47723.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47723.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47723", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:02.503", - "lastModified": "2024-10-21T13:15:02.503", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47724.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47724.json index 9562596571e..99c4c177626 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47724.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47724.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47724", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:02.590", - "lastModified": "2024-10-21T13:15:02.590", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47725.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47725.json index 501f7290b39..3e3e79eb633 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47725.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47725.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47725", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:02.673", - "lastModified": "2024-10-21T13:15:02.673", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47726.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47726.json index 912614d1688..3339ffdf743 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47726.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47726.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47726", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:02.767", - "lastModified": "2024-10-21T13:15:02.767", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47727.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47727.json index 9fa3210f9f3..330235a7384 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47727.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47727.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47727", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:02.883", - "lastModified": "2024-10-21T13:15:02.883", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47728.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47728.json index 97a1103a845..7296620e4de 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47728.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47728.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47728", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:02.980", - "lastModified": "2024-10-21T13:15:02.980", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47729.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47729.json index 785c9c0ae38..b1668e20fec 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47729.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47729.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47729", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.070", - "lastModified": "2024-10-21T13:15:03.070", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47730.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47730.json index 02e43b25a9c..163f1aebc80 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47730.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47730.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47730", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.160", - "lastModified": "2024-10-21T13:15:03.160", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47731.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47731.json index 74c99ec1ed2..c01e902d3de 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47731.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47731.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47731", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.260", - "lastModified": "2024-10-21T13:15:03.260", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47732.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47732.json index d048bf677ee..bb7670cf6bd 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47732.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47732", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.363", - "lastModified": "2024-10-21T13:15:03.363", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47733.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47733.json index 4f6f2f8beb9..851742dabfb 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47733.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47733.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47733", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.450", - "lastModified": "2024-10-21T13:15:03.450", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47734.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47734.json index 05e78aceb21..a802f5badcb 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47734.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47734.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47734", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.547", - "lastModified": "2024-10-21T13:15:03.547", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47735.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47735.json index 6f870c1dd29..856a37b099c 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47735.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47735.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47735", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.630", - "lastModified": "2024-10-21T13:15:03.630", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47736.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47736.json index d1cb70dc7d2..b8463a1e966 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47736.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47736.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47736", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.737", - "lastModified": "2024-10-21T13:15:03.737", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47737.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47737.json index a29adac75ac..d241fcf3acb 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47737.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47737.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47737", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.833", - "lastModified": "2024-10-21T13:15:03.833", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47738.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47738.json index 9091a8a6a71..736fc1b8e93 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47738.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47738.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47738", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.920", - "lastModified": "2024-10-21T13:15:03.920", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47739.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47739.json index 0234bcab55c..c207ff82951 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47739.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47739", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.017", - "lastModified": "2024-10-21T13:15:04.017", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47740.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47740.json index 2ec05765375..274fc3494d9 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47740.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47740", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.103", - "lastModified": "2024-10-21T13:15:04.103", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47741.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47741.json index a7b43884c6f..1b0048b5b7f 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47741.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47741.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47741", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.207", - "lastModified": "2024-10-21T13:15:04.207", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47742.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47742.json index 50d976a5628..9ddc2417615 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47742.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47742.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47742", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.297", - "lastModified": "2024-10-21T13:15:04.297", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47743.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47743.json index 94c61c780e6..917963f4ded 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47743.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47743.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47743", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.393", - "lastModified": "2024-10-21T13:15:04.393", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47744.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47744.json index 8b125789ffb..18ba3869974 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47744.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47744.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47744", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.480", - "lastModified": "2024-10-21T13:15:04.480", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47745.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47745.json index 9fff8b41d2d..4f1adc59ffb 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47745.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47745.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47745", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.580", - "lastModified": "2024-10-21T13:15:04.580", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47746.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47746.json index 4ba1ffa7f9b..ce9e8dba524 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47746.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47746.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47746", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.667", - "lastModified": "2024-10-21T13:15:04.667", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47747.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47747.json index e524a60f0a8..515c1c7536e 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47747.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47747.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47747", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.753", - "lastModified": "2024-10-21T13:15:04.753", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47748.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47748.json index f1162e269a6..0f53b98171f 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47748.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47748.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47748", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.857", - "lastModified": "2024-10-21T13:15:04.857", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47749.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47749.json index fad35f7d998..baf0740daac 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47749.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47749.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47749", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.950", - "lastModified": "2024-10-21T13:15:04.950", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47750.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47750.json index ceb6ee257dc..8c05d9174ee 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47750.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47750.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47750", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.037", - "lastModified": "2024-10-21T13:15:05.037", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47751.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47751.json index 822bd89ecae..baf42bf7c89 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47751.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47751.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47751", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.123", - "lastModified": "2024-10-21T13:15:05.123", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47752.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47752.json index f5ee59b55dd..a3a818af555 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47752.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47752.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47752", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.203", - "lastModified": "2024-10-21T13:15:05.203", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47753.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47753.json index f7238935b9f..bb2f0ed5a01 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47753.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47753.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47753", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.283", - "lastModified": "2024-10-21T13:15:05.283", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json index fe7cfb1f0f9..74843cf0a72 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47754", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.377", - "lastModified": "2024-10-21T13:15:05.377", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47755.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47755.json index 8e14fb2bf52..d7e2d7e9f3c 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47755.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47755.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47755", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.467", - "lastModified": "2024-10-21T13:15:05.467", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47756.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47756.json index 7e07a702215..5521c48b9bd 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47756.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47756.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47756", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.550", - "lastModified": "2024-10-21T13:15:05.550", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47757.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47757.json index 3d08b2f6b22..bfdebfc6dfc 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47757.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47757.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47757", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.640", - "lastModified": "2024-10-21T13:15:05.640", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48016.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48016.json index 5f7c83619de..17e414579ff 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48016.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48016.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48016", "sourceIdentifier": "security_alert@emc.com", "published": "2024-10-18T17:15:13.380", - "lastModified": "2024-10-18T17:15:13.380", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains a Use of a Broken or Risky Cryptographic Algorithm vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The attacker may be able to use exposed credentials to access the system with privileges of the compromised account." + }, + { + "lang": "es", + "value": "Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, versi\u00f3n(es) 5.24, contiene una vulnerabilidad de uso de un algoritmo criptogr\u00e1fico da\u00f1ado o riesgoso. Un atacante con pocos privilegios y acceso remoto podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la divulgaci\u00f3n de informaci\u00f3n. El atacante podr\u00eda usar credenciales expuestas para acceder al sistema con privilegios de la cuenta comprometida." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48049.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48049.json index c3a7a116d94..6f1be1f7c05 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48049.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48049.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48049", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:03.000", - "lastModified": "2024-10-20T08:15:03.000", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mighty Plugins Mighty Builder allows Stored XSS.This issue affects Mighty Builder: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Mighty Plugins Mighty Builder permite XSS almacenado. Este problema afecta a Mighty Builder: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48231.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48231.json index 822eeb6e1b2..f05b313cc80 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48231.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48231.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48231", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T12:15:08.380", - "lastModified": "2024-10-21T13:15:05.720", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48930.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48930.json new file mode 100644 index 00000000000..00fb428934b --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48930.json @@ -0,0 +1,98 @@ +{ + "id": "CVE-2024-48930", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-21T16:15:03.607", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "secp256k1-node is a Node.js binding for an Optimized C library for EC operations on curve secp256k1. In `elliptic`-based version, `loadUncompressedPublicKey` has a check that the public key is on the curve. Prior to versions 5.0.1, 4.0.4, and 3.8.1, however, `loadCompressedPublicKey` is missing that check. That allows the attacker to use public keys on low-cardinality curves to extract enough information to fully restore the private key from as little as 11 ECDH sessions, and very cheaply on compute power. Other operations on public keys are also affected, including e.g. `publicKeyVerify()` incorrectly returning `true` on those invalid keys, and e.g. `publicKeyTweakMul()` also returning predictable outcomes allowing to restore the tweak. Versions 5.0.1, 4.0.4, and 3.8.1 contain a fix for the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-354" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cryptocoinjs/secp256k1-node/blob/6d3474b81d073cc9c8cc8cfadb580c84f8df5248/lib/elliptic.js#L17-L19", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cryptocoinjs/secp256k1-node/blob/6d3474b81d073cc9c8cc8cfadb580c84f8df5248/lib/elliptic.js#L37-L39", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cryptocoinjs/secp256k1-node/commit/8bd6446e000fa59df3cda0ae3e424300747ea5ed", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cryptocoinjs/secp256k1-node/commit/9a15fff274f83a6ec7f675f1121babcc0c42292f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cryptocoinjs/secp256k1-node/commit/e256905ee649a7caacc251f7c964667195a52221", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cryptocoinjs/secp256k1-node/security/advisories/GHSA-584q-6j8j-r5pm", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49215.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49215.json index fc185b8ac8b..e95fc7f926a 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49215.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49215.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49215", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T01:15:02.943", - "lastModified": "2024-10-21T01:15:02.943", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Sangoma Asterisk through 18.20.0, 19.x and 20.x through 20.5.0, and 21.x through 21.0.0, and Certified Asterisk through 18.9-cert5. In manager.c, the functions action_getconfig() and action_getconfigJson() do not process the input file path, resulting in a path traversal vulnerability. In versions without the restrictedFile() function, no processing is done on the input path. In versions with the restrictedFile() function, path traversal is not processed." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Sangoma Asterisk hasta 18.20.0, 19.x y 20.x hasta 20.5.0, y 21.x hasta 21.0.0, y Certified Asterisk hasta 18.9-cert5. En manager.c, las funciones action_getconfig() y action_getconfigJson() no procesan la ruta del archivo de entrada, lo que genera una vulnerabilidad de path traversal. En las versiones sin la funci\u00f3n restrictFile(), no se realiza ning\u00fan procesamiento en la ruta de entrada. En las versiones con la funci\u00f3n restrictFile(), no se procesa el path traversal." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49224.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49224.json index ed0d0df1241..763b1ab9a80 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49224.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49224.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49224", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:04.593", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:31:21.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:maheshpatel:mitm_bug_tracker:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "7F8925D8-0160-48A4-B615-2DA92C1B328C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/mitm-bug-tracker/wordpress-mitm-bug-tracker-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49225.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49225.json index 984aaa08e03..38bba160519 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49225.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49225.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49225", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:04.890", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:33:00.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:swebdeveloper:wppricing_builder:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.5.0", + "matchCriteriaId": "7E8C0388-6A52-4DDF-87C3-FC0D424E9E19" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wppricing-builder-lite-responsive-pricing-table-builder/wordpress-wppricing-builder-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49228.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49228.json index 598481d0b4c..46ea2d1d556 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49228.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49228.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49228", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:05.233", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:34:41.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:crossedcode:bverse_convert:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.7.1", + "matchCriteriaId": "F5A488DC-5827-45EE-8A4A-2F5AA3195425" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bverse-convert/wordpress-bverse-convert-plugin-1-3-7-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49230.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49230.json index 2c7a7351a5b..e018b954c11 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49230.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49230.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49230", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:05.533", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:37:15.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:harpreetsingh:ajax_custom_css\\/js:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.4", + "matchCriteriaId": "E649D939-59F4-4575-8455-DCA0E9420A65" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ajax-awesome-css/wordpress-ajax-custom-css-js-plugin-2-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49231.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49231.json index 8952081147c..5fbe79cf79f 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49231.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49231.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49231", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:05.817", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:37:46.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:petercyclop:wordpress_video:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "FA5EC07D-0A10-40B8-9182-50149F8E7C2B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wordpress-video/wordpress-wordpress-video-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49232.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49232.json index 87c62428b7a..948dd6ff470 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49232.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49232.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49232", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:06.143", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:39:15.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:javierloureiro:el_mejor_cluster:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.14", + "matchCriteriaId": "F50810D4-1888-455B-8ED7-46EBF29F5181" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/mejorcluster/wordpress-el-mejor-cluster-plugin-1-1-14-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49233.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49233.json index 60bafb0c106..5b6ba7038d1 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49233.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49233.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49233", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:06.433", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T17:17:17.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:madrasthemes:mas_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.7", + "matchCriteriaId": "CA11007A-7208-44EA-A4EC-A65397C650E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/mas-addons-for-elementor/wordpress-mas-elementor-plugin-1-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49234.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49234.json index 590354ea028..d46e096c3e1 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49234.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49234.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49234", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:06.777", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T17:16:51.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeworm:plexx_elementor_extension:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.7", + "matchCriteriaId": "B45880E6-996C-4C57-BF5A-6B1E8BA66BCB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/plexx-elementor-extension/wordpress-plexx-elementor-extension-plugin-1-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49236.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49236.json index 876e87d8d80..c82defc426d 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49236.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49236.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49236", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:07.103", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T17:12:00.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hafizuddinahmed:crazy_call_to_action_box:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.05", + "matchCriteriaId": "DA2F1EB4-8599-4037-B001-A628488B5302" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/crazy-call-to-action-box/wordpress-crazy-call-to-action-box-plugin-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49238.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49238.json index 9353aa80ae8..084dbf4b4c8 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49238.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49238.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49238", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:07.400", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T17:02:51.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dh9sb.dx-info:adif_log_search_widget:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0f", + "matchCriteriaId": "78DF7107-261E-4107-83E5-80E46229443C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/adif-log-search-widget/wordpress-adif-log-search-widget-plugin-1-0f-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49239.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49239.json index 5b1133f0ec7..b12c4dfe7e4 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49239.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49239.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49239", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:07.653", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:26:20.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nikhilvaghela:add_categories_post_footer:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.2.2", + "matchCriteriaId": "84BAA55C-5737-46CC-A804-A7D469E5B42C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/add-categories-post-footer/wordpress-add-categories-post-footer-plugin-2-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49240.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49240.json index b620b678f28..287585a8284 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49240.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49240.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49240", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:07.937", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:25:06.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:agustinberasategui:ab_categories_search_widget:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.2.5", + "matchCriteriaId": "3757DA2E-3C82-4E24-994A-8CB4BBBB17C7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ab-categories-search-widget/wordpress-ab-categories-search-widget-plugin-0-2-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49241.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49241.json index 78d6562f87d..f201f312d7b 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49241.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49241.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49241", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:08.167", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T16:23:35.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tadywalsh:tito:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.3", + "matchCriteriaId": "C4CE8D3E-4412-414A-96B4-6760C33C5404" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/tito/wordpress-tito-plugin-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49250.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49250.json index dd0d99bec9d..a8acdbf7cd1 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49250.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49250.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49250", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T11:15:02.437", - "lastModified": "2024-10-20T11:15:02.437", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Michael Tran Table of Contents Plus allows Cross Site Request Forgery.This issue affects Table of Contents Plus: from n/a through 2408." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Michael Tran Table of Contents Plus permite Cross-Site Request Forgery. Este problema afecta a Table of Contents Plus: desde n/a hasta 2408." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49272.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49272.json index 9e353ebfe15..82ae4f0794f 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49272.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49272.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49272", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T11:15:02.650", - "lastModified": "2024-10-20T11:15:02.650", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPWeb Social Auto Poster allows Cross Site Request Forgery.This issue affects Social Auto Poster: from n/a through 5.3.15." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WPWeb Social Auto Poster permite Cross-Site Request Forgery. Este problema afecta a Social Auto Poster: desde n/a hasta 5.3.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49273.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49273.json index 9d777448dd4..4b6d254dbf0 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49273.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49273.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49273", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-21T12:15:08.450", - "lastModified": "2024-10-21T12:15:08.450", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49274.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49274.json index b380843d078..19e6724b1b7 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49274.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49274.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49274", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T11:15:02.863", - "lastModified": "2024-10-20T11:15:02.863", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Infomaniak Staff VOD Infomaniak allows Cross Site Request Forgery.This issue affects VOD Infomaniak: from n/a through 1.5.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Infomaniak Staff VOD Infomaniak permite Cross-Site Request Forgery. Este problema afecta a VOD Infomaniak: desde n/a hasta 1.5.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49275.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49275.json index 08ca4cc2c35..19a4b245ada 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49275.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49275.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49275", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T11:15:03.063", - "lastModified": "2024-10-20T11:15:03.063", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Martin Gibson IdeaPush allows Cross Site Request Forgery.This issue affects IdeaPush: from n/a through 8.69." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Martin Gibson IdeaPush permite Cross-Site Request Forgery. Este problema afecta a IdeaPush: desde n/a hasta 8.69." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49286.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49286.json index b382ff7408c..c18699800d4 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49286.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49286.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49286", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:03.233", - "lastModified": "2024-10-20T08:15:03.233", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Moridrin SSV Events allows PHP Local File Inclusion.This issue affects SSV Events: from n/a through 3.2.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Moridrin SSV Events permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a SSV Events: desde n/a hasta 3.2.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49290.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49290.json index 514fc6d9bbf..6ceb2edcb76 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49290.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49290.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49290", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T11:15:03.260", - "lastModified": "2024-10-20T11:15:03.260", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Gora Tech LLC Cooked Pro allows Cross Site Request Forgery.This issue affects Cooked Pro: from n/a before 1.8.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Cooked Pro de Gora Tech LLC permite Cross-Site Request Forgery. Este problema afecta a Cooked Pro: desde n/a antes de 1.8.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49293.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49293.json index df2cb7a6ba5..1b34d253a2f 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49293.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49293.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49293", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-21T12:15:08.683", - "lastModified": "2024-10-21T12:15:08.683", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49306.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49306.json index 9fcc71fc57a..99b78a10a00 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49306.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49306.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49306", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T11:15:03.460", - "lastModified": "2024-10-20T11:15:03.460", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WP-buy WP Content Copy Protection & No Right Click allows Cross Site Request Forgery.This issue affects WP Content Copy Protection & No Right Click: from n/a through 3.5.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP-buy WP Content Copy Protection & No Right Click permite Cross-Site Request Forgery. Este problema afecta a WP Content Copy Protection & No Right Click: desde n/a hasta 3.5.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49321.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49321.json index edd886a2f2c..0ceb6c35ef5 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49321.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49321.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49321", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-21T12:15:08.893", - "lastModified": "2024-10-21T12:15:08.893", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49323.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49323.json index 756224baa5c..5185705f0b2 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49323.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49323.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49323", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:03.460", - "lastModified": "2024-10-20T08:15:03.460", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sourav All in One Slider allows Reflected XSS.This issue affects All in One Slider: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Sourav All in One Slider permite XSS reflejado. Este problema afecta a All in One Slider: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49324.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49324.json index 9aa34d9f28f..90c51bf0d4e 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49324.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49324.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49324", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:03.227", - "lastModified": "2024-10-20T09:15:03.227", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Sovratec Sovratec Case Management allows Upload a Web Shell to a Web Server.This issue affects Sovratec Case Management: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Sovratec Sovratec Case Management permite cargar un shell web a un servidor web. Este problema afecta a Sovratec Case Management: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49325.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49325.json index 4669764976b..ffadc06205a 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49325.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49325.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49325", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T11:15:03.657", - "lastModified": "2024-10-20T11:15:03.657", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Subscriber Broken Access Control in Photo Gallery Builder <= 3.0 versions." + }, + { + "lang": "es", + "value": "Control de acceso roto para suscriptores en Photo Gallery Builder versiones anteriores a la 3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49326.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49326.json index 8ae398e19ef..51229752d2f 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49326.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49326.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49326", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:03.750", - "lastModified": "2024-10-20T09:15:03.750", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Vasilis Kerasiotis Affiliator allows Upload a Web Shell to a Web Server.This issue affects Affiliator: from n/a through 2.1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Vasilis Kerasiotis Affiliator permite cargar un shell web a un servidor web. Este problema afecta a Affiliator: desde n/a hasta 2.1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49327.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49327.json index 39061300f38..2a87a7266d8 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49327.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49327.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49327", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:04.440", - "lastModified": "2024-10-20T09:15:04.440", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Asep Bagja Priandana Woostagram Connect allows Upload a Web Shell to a Web Server.This issue affects Woostagram Connect: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Asep Bagja Priandana Woostagram Connect permite cargar un shell web a un servidor web. Este problema afecta a Woostagram Connect: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49328.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49328.json index 62d7b5e71b2..d85f8eb9deb 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49328.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49328.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49328", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:03.667", - "lastModified": "2024-10-20T08:15:03.667", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Vivek Tamrakar WP REST API FNS allows Authentication Bypass.This issue affects WP REST API FNS: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en Vivek Tamrakar WP REST API FNS permite la omisi\u00f3n de autenticaci\u00f3n. Este problema afecta a WP REST API FNS: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49329.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49329.json index bd393fdfab8..f21990ba6c4 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49329.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49329.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49329", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:04.860", - "lastModified": "2024-10-20T09:15:04.860", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Vivek Tamrakar WP REST API FNS allows Upload a Web Shell to a Web Server.This issue affects WP REST API FNS: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Vivek Tamrakar WP REST API FNS permite cargar un shell web a un servidor web. Este problema afecta a WP REST API FNS: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49330.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49330.json index 449b2cf44d8..e032edfcf86 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49330.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49330.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49330", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:05.133", - "lastModified": "2024-10-20T09:15:05.133", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in brx8r Nice Backgrounds allows Upload a Web Shell to a Web Server.This issue affects Nice Backgrounds: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en brx8r Nice Backgrounds permite cargar un shell web a un servidor web. Este problema afecta a Nice Backgrounds: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49331.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49331.json index 183b866eb8c..63e95bc0019 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49331.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49331.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49331", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:05.377", - "lastModified": "2024-10-20T09:15:05.377", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Myriad Solutionz Property Lot Management System allows Upload a Web Shell to a Web Server.This issue affects Property Lot Management System: from n/a through 4.2.38." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en Myriad Solutionz Property Lot Management System permite cargar un shell web a un servidor web. Este problema afecta al sistema de administraci\u00f3n de lotes de propiedad: desde n/a hasta 4.2.38." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49332.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49332.json index 6d23dc331f4..08c4bcdd8c1 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49332.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49332.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49332", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:05.560", - "lastModified": "2024-10-20T09:15:05.560", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Giveaway Boost allows Object Injection.This issue affects Giveaway Boost: from n/a through 2.1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Giveaway Boost permite la inyecci\u00f3n de objetos. Este problema afecta a Giveaway Boost: desde n/a hasta 2.1.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49334.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49334.json index 4fc4954fcdf..a641873f215 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49334.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49334.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49334", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:03.907", - "lastModified": "2024-10-20T08:15:03.907", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Unizoe Web Solutions jLayer Parallax Slider allows Reflected XSS.This issue affects jLayer Parallax Slider: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Unizoe Web Solutions jLayer Parallax Slider permite XSS reflejado. Este problema afecta a jLayer Parallax Slider: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49335.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49335.json index fc3ad6eb220..f93e61e5498 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49335.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49335.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49335", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:03.430", - "lastModified": "2024-10-20T10:15:03.430", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Edush Maxim GoogleDrive folder list allows Stored XSS.This issue affects GoogleDrive folder list: from n/a through 2.2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Edush Maxim GoogleDrive folder list permite XSS almacenado. Este problema afecta a la lista de carpetas de GoogleDrive: desde n/a hasta 2.2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49361.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49361.json index c0da48555fe..3bff432ffbb 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49361.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49361.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49361", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-18T19:15:14.393", - "lastModified": "2024-10-18T19:15:14.393", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ACON is a widely-used library of tools for machine learning that focuses on adaptive correlation optimization. A potential vulnerability has been identified in the input validation process, which could lead to arbitrary code execution if exploited. This issue could allow an attacker to submit malicious input data, bypassing input validation, resulting in remote code execution in certain machine learning applications using the ACON library. All users utilizing ACON\u2019s input-handling functions are potentially at risk. Specifically, machine learning models or applications that ingest user-generated data without proper sanitization are the most vulnerable. Users running ACON on production servers are at heightened risk, as the vulnerability could be exploited remotely. As of time of publication, it is unclear whether a fix is available." + }, + { + "lang": "es", + "value": "ACON es una librer\u00eda de herramientas de aprendizaje autom\u00e1tico ampliamente utilizada que se centra en la optimizaci\u00f3n de la correlaci\u00f3n adaptativa. Se ha identificado una vulnerabilidad potencial en el proceso de validaci\u00f3n de entrada, que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario si se explota. Este problema podr\u00eda permitir que un atacante env\u00ede datos de entrada maliciosos, evitando la validaci\u00f3n de entrada, lo que da como resultado la ejecuci\u00f3n remota de c\u00f3digo en ciertas aplicaciones de aprendizaje autom\u00e1tico que utilizan la librer\u00eda ACON. Todos los usuarios que utilizan las funciones de manejo de entrada de ACON corren un riesgo potencial. En concreto, los modelos o aplicaciones de aprendizaje autom\u00e1tico que ingieren datos generados por el usuario sin una desinfecci\u00f3n adecuada son los m\u00e1s vulnerables. Los usuarios que ejecutan ACON en servidores de producci\u00f3n corren un mayor riesgo, ya que la vulnerabilidad podr\u00eda explotarse de forma remota. Al momento de la publicaci\u00f3n, no est\u00e1 claro si hay una soluci\u00f3n disponible." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49366.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49366.json new file mode 100644 index 00000000000..c3642748a0a --- /dev/null +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49366.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-49366", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-21T17:15:03.567", + "lastModified": "2024-10-21T17:15:03.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fixes the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "PROOF-OF-CONCEPT", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.7, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/0xJacky/nginx-ui/releases/tag/v2.0.0-beta.36", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-prv4-rx44-f7jr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49367.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49367.json new file mode 100644 index 00000000000..59c3a353663 --- /dev/null +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49367.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-49367", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-21T17:15:03.783", + "lastModified": "2024-10-21T17:15:03.783", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, the log path of nginxui is controllable. This issue can be combined with the directory traversal at `/api/configs` to read directories and file contents on the server. Version 2.0.0-beta.36 fixes the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "PROOF-OF-CONCEPT", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/0xJacky/nginx-ui/releases/tag/v2.0.0-beta.36", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-gr34-jgw4-7j4m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49368.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49368.json new file mode 100644 index 00000000000..34b570bf0e6 --- /dev/null +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49368.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-49368", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-21T17:15:03.960", + "lastModified": "2024-10-21T17:15:03.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, when Nginx UI configures logrotate, it does not verify the input and directly passes it to exec.Command, causing arbitrary command execution. Version 2.0.0-beta.36 fixes this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "PROOF-OF-CONCEPT", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.9, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/0xJacky/nginx-ui/releases/tag/v2.0.0-beta.36", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-66m6-27r9-77vm", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49604.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49604.json index ec8c89669ee..292c6fbfd3c 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49604.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49604.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49604", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:04.117", - "lastModified": "2024-10-20T08:15:04.117", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Najeeb Ahmad Simple User Registration allows Authentication Bypass.This issue affects Simple User Registration: from n/a through 5.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en Najeeb Ahmad Simple User Registration permite la omisi\u00f3n de autenticaci\u00f3n. Este problema afecta al registro de usuario simple: desde n/a hasta 5.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49605.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49605.json index a042c7f459f..f8e62487069 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49605.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49605.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49605", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:03.640", - "lastModified": "2024-10-20T10:15:03.640", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Avchat.Net AVChat Video Chat allows Stored XSS.This issue affects AVChat Video Chat: from n/a through 2.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Avchat.Net AVChat Video Chat permite XSS almacenado. Este problema afecta a AVChat Video Chat: desde n/a hasta 2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49606.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49606.json index e41ce180177..ff0d0ee9654 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49606.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49606.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49606", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:04.323", - "lastModified": "2024-10-20T08:15:04.323", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dotsquares Google Map Locations allows Reflected XSS.This issue affects Google Map Locations: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Google Map Locations de Dotsquare permite XSS reflejado. Este problema afecta a Google Map Locations: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49607.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49607.json index 82970169673..9078a0fc517 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49607.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49607.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49607", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:05.763", - "lastModified": "2024-10-20T09:15:05.763", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Redwan Hilali WP Dropbox Dropins allows Upload a Web Shell to a Web Server.This issue affects WP Dropbox Dropins: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Redwan Hilali WP Dropbox Dropins permite cargar un shell web a un servidor web. Este problema afecta a WP Dropbox Dropins: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49608.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49608.json index 0de74aa2f20..a5d868f614c 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49608.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49608.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49608", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:05.973", - "lastModified": "2024-10-20T09:15:05.973", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ": Incorrect Privilege Assignment vulnerability in Gerry Ntabuhashe GERRYWORKS Post by Mail allows Privilege Escalation.This issue affects GERRYWORKS Post by Mail: from n/a through 1.0." + }, + { + "lang": "es", + "value": ":La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en GERRYWORKS Post by Mail de Gerry Ntabuhashe permite la escalada de privilegios. Este problema afecta a GERRYWORKS Post by Mail: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49609.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49609.json index d756f72ff81..678e2ae50a9 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49609.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49609.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49609", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:03.860", - "lastModified": "2024-10-20T10:15:03.860", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Brandon White Author Discussion allows Blind SQL Injection.This issue affects Author Discussion: from n/a through 0.2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Brandon White Author Discussion permite la inyecci\u00f3n SQL ciega. Este problema afecta a Author Discussion: desde n/a hasta 0.2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49610.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49610.json index 12f1fcee20f..6c0f2eae697 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49610.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49610.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49610", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:06.190", - "lastModified": "2024-10-20T09:15:06.190", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Jack Zhu allows Upload a Web Shell to a Web Server.This issue affects photokit: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Jack Zhu permite cargar un shell web a un servidor web. Este problema afecta a photokit: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49611.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49611.json index 5875db76464..e6079f39893 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49611.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49611.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49611", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:04.523", - "lastModified": "2024-10-20T08:15:04.523", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Paxman Product Website Showcase allows Upload a Web Shell to a Web Server.This issue affects Product Website Showcase: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en Paxman Product Website Showcase permite cargar un Web Shell a un servidor web. Este problema afecta a Product Website Showcase: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49612.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49612.json index 6ecf62cc3c8..563ed42378a 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49612.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49612.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49612", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:04.053", - "lastModified": "2024-10-20T10:15:04.053", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Infotuts SW Contact Form allows Blind SQL Injection.This issue affects SW Contact Form: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Infotuts SW Contact Form permite una inyecci\u00f3n SQL ciega. Este problema afecta a SW Contact Form: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49613.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49613.json index aea36ee05b9..e71c6af7c93 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49613.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49613.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49613", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:04.263", - "lastModified": "2024-10-20T10:15:04.263", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Lodel Geraldo Simple Code Insert Shortcode allows SQL Injection.This issue affects Simple Code Insert Shortcode: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Lodel Geraldo Simple Code Insert Shortcode permite la inyecci\u00f3n SQL. Este problema afecta a Simple Code Insert Shortcode: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49614.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49614.json index b12b85e353c..92284ad79e7 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49614.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49614.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49614", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:04.477", - "lastModified": "2024-10-20T10:15:04.477", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Dan Alexander SermonAudio Widgets allows SQL Injection.This issue affects SermonAudio Widgets: from n/a through 1.9.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Dan Alexander SermonAudio Widgets permite la inyecci\u00f3n SQL. Este problema afecta a SermonAudio Widgets: desde n/a hasta 1.9.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49615.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49615.json index e1057ee566d..01aff22a860 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49615.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49615.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49615", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:04.690", - "lastModified": "2024-10-20T10:15:04.690", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Henrique Rodrigues SafetyForms allows Blind SQL Injection.This issue affects SafetyForms: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Henrique Rodrigues SafetyForms permite la inyecci\u00f3n SQL ciega. Este problema afecta a SafetyForms: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49616.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49616.json index ec5f1fa8017..0a14c92ead4 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49616.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49616.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49616", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:04.903", - "lastModified": "2024-10-20T10:15:04.903", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nyasro Rate Own Post allows Blind SQL Injection.This issue affects Rate Own Post: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Nyasro Rate Own Post permite la inyecci\u00f3n SQL ciega. Este problema afecta a Rate Own Post: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49617.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49617.json index 2d86095a6c7..9a4b92f5029 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49617.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49617.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49617", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:05.130", - "lastModified": "2024-10-20T10:15:05.130", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Bhaskar Dhote Back Link Tracker allows Blind SQL Injection.This issue affects Back Link Tracker: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Bhaskar Dhote Back Link Tracker permite la inyecci\u00f3n SQL ciega. Este problema afecta a Back Link Tracker: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49618.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49618.json index bf622459ae7..5061718f883 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49618.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49618.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49618", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:05.347", - "lastModified": "2024-10-20T10:15:05.347", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Jordan Lyall MyTweetLinks allows Blind SQL Injection.This issue affects MyTweetLinks: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en MyTweetLinks de Jordan Lyall permite la inyecci\u00f3n SQL ciega. Este problema afecta a MyTweetLinks: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49619.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49619.json index 54e8ae1261f..6460a37359c 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49619.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49619.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49619", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:05.560", - "lastModified": "2024-10-20T10:15:05.560", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Acespritech Solutions Pvt. Ltd. Social Link Groups allows Blind SQL Injection.This issue affects Social Link Groups: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Acespritech Solutions Pvt. Ltd. Social Link Groups permite la inyecci\u00f3n SQL ciega. Este problema afecta a Social Link Groups: desde n/a hasta 1.1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49620.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49620.json index ffaeebb028d..1b946f2c4d0 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49620.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49620.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49620", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:05.770", - "lastModified": "2024-10-20T10:15:05.770", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Naudin Vladimir FERMA.Ru.Net allows Blind SQL Injection.This issue affects FERMA.Ru.Net: from n/a through 1.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Naudin Vladimir FERMA.Ru.Net permite la inyecci\u00f3n SQL ciega. Este problema afecta a FERMA.Ru.Net: desde n/a hasta 1.3.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49621.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49621.json index f4855053d5f..aad1cea12ff 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49621.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49621.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49621", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:06.390", - "lastModified": "2024-10-20T09:15:06.390", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Apa APA Register Newsletter Form allows SQL Injection.This issue affects APA Register Newsletter Form: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en APA Register Newsletter Form permite la inyecci\u00f3n de SQL. Este problema afecta a APA Register Newsletter Form: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49622.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49622.json index e2370b1527c..c5315b626b5 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49622.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49622.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49622", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:06.613", - "lastModified": "2024-10-20T09:15:06.613", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Apa Apa Banner Slider allows SQL Injection.This issue affects Apa Banner Slider: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Apa Apa Banner Slider permite la inyecci\u00f3n de SQL. Este problema afecta a Apa Banner Slider: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49623.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49623.json index 8570977a3c3..73391684562 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49623.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49623.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49623", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:06.810", - "lastModified": "2024-10-20T09:15:06.810", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hasan Movahed Duplicate Title Validate allows Blind SQL Injection.This issue affects Duplicate Title Validate: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Hasan Movahed. Duplicate Title Validate permite la inyecci\u00f3n SQL ciega. Este problema afecta a Duplicate Title Validate: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49624.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49624.json index 3f9ab90cf40..a90761548cf 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49624.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49624.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49624", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:07.013", - "lastModified": "2024-10-20T09:15:07.013", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Smartdevth Advanced Advertising System allows Object Injection.This issue affects Advanced Advertising System: from n/a through 1.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Smartdevth Advanced Advertising System permite la inyecci\u00f3n de objetos. Este problema afecta al sistema de publicidad avanzada: desde n/a hasta 1.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49625.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49625.json index 34a9eb684a6..95f861fab2f 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49625.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49625.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49625", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T09:15:07.220", - "lastModified": "2024-10-20T09:15:07.220", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Brandon Clark SiteBuilder Dynamic Components allows Object Injection.This issue affects SiteBuilder Dynamic Components: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Brandon Clark SiteBuilder Dynamic Components permite la inyecci\u00f3n de objetos. Este problema afecta a los componentes din\u00e1micos de SiteBuilder: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49626.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49626.json index efb17f731ca..877520ab252 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49626.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49626.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49626", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:04.730", - "lastModified": "2024-10-20T08:15:04.730", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Piyushmca Shipyaari Shipping Management allows Object Injection.This issue affects Shipyaari Shipping Management: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Piyushmca Shipyaari Shipping Management permite la inyecci\u00f3n de objetos. Este problema afecta a Shipyaari Shipping Management: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49627.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49627.json index c42088eacfa..39e4da2a163 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49627.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49627.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49627", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T11:15:03.873", - "lastModified": "2024-10-20T11:15:03.873", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Noor Alam WordPress Image SEO allows Cross Site Request Forgery.This issue affects WordPress Image SEO: from n/a through 1.1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WordPress Image SEO de Noor Alam permite Cross-Site Request Forgery. Este problema afecta a WordPress Image SEO: desde n/a hasta 1.1.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49628.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49628.json index f2f38ed59aa..4ec609b280c 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49628.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49628.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49628", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T11:15:04.077", - "lastModified": "2024-10-20T11:15:04.077", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WhileTrue Most And Least Read Posts Widget allows Cross Site Request Forgery.This issue affects Most And Least Read Posts Widget: from n/a through 2.5.18." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WhileTrue Most And Least Read Posts Widget permite Cross-Site Request Forgery. Este problema afecta al widget de publicaciones m\u00e1s y menos le\u00eddas: desde n/a hasta 2.5.18." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49629.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49629.json index 42bac7bc903..59afef2b234 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49629.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49629.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49629", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T10:15:05.990", - "lastModified": "2024-10-20T10:15:05.990", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Fahad Mahmood Endless Posts Navigation allows Stored XSS.This issue affects Endless Posts Navigation: from n/a through 2.2.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Endless Posts Navigation de Fahad Mahmood permite XSS almacenado. Este problema afecta a Endless Posts Navigation: desde n/a hasta 2.2.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49630.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49630.json index 36affcecf73..20661c568b8 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49630.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49630.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49630", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:04.933", - "lastModified": "2024-10-20T08:15:04.933", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HT Plugins WP Education allows Stored XSS.This issue affects WP Education: from n/a through 1.2.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en HT Plugins WP Education permite XSS almacenado. Este problema afecta a WP Education: desde n/a hasta 1.2.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49631.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49631.json index 2dfd6baa198..f60e29af2e6 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49631.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49631.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49631", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:05.130", - "lastModified": "2024-10-20T08:15:05.130", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Md Abdul Kader Easy Addons for Elementor allows Stored XSS.This issue affects Easy Addons for Elementor: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Easy Addons for Elementor de Md Abdul Kader permite XSS almacenado. Este problema afecta a Easy Addons for Elementor: desde n/a hasta 1.3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49850.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49850.json index 5cf87a7a2b9..1c7d4220c40 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49850.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49850.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49850", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.797", - "lastModified": "2024-10-21T13:15:05.797", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49851.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49851.json index 257e04c912e..563be75d039 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49851.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49851.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49851", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.883", - "lastModified": "2024-10-21T13:15:05.883", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49852.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49852.json index 4a3129320e7..90ea297f8f9 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49852.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49852.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49852", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.977", - "lastModified": "2024-10-21T13:15:05.977", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49853.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49853.json index b07c59b5674..61844daf948 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49853.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49853.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49853", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.083", - "lastModified": "2024-10-21T13:15:06.083", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49854.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49854.json index 948523967bd..5ce998b7eaa 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49854.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49854.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49854", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.203", - "lastModified": "2024-10-21T13:15:06.203", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49855.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49855.json index a522c3ed715..e315a211475 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49855.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49855.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49855", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.270", - "lastModified": "2024-10-21T13:15:06.270", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49856.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49856.json index 9dc9fc23716..1f4434627db 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49856.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49856.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49856", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.353", - "lastModified": "2024-10-21T13:15:06.353", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49857.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49857.json index 6fa4e1ca52b..2d8ac732fdb 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49857.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49857.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49857", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.447", - "lastModified": "2024-10-21T13:15:06.447", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49858.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49858.json index 96f57080d46..d03c91d4725 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49858.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49858.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49858", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.543", - "lastModified": "2024-10-21T13:15:06.543", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49859.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49859.json index 5a240472c3e..73fc0af120d 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49859.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49859.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49859", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.627", - "lastModified": "2024-10-21T13:15:06.627", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49860.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49860.json index 99b45bd6995..1c084a863ed 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49860.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49860.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49860", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.723", - "lastModified": "2024-10-21T13:15:06.723", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49861.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49861.json index 476469d3bbc..f94bc9914e2 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49861.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49861.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49861", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.800", - "lastModified": "2024-10-21T13:15:06.800", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49862.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49862.json index 409572141ca..f1981955249 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49862.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49862.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49862", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.893", - "lastModified": "2024-10-21T13:15:06.893", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6519.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6519.json index e368abed8a7..953bffda1e9 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6519.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6519.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6519", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-10-21T15:15:03.727", - "lastModified": "2024-10-21T15:15:03.727", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8305.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8305.json index 28c2ae70152..7f4d7b4403a 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8305.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8305.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8305", "sourceIdentifier": "cna@mongodb.com", "published": "2024-10-21T15:15:04.030", - "lastModified": "2024-10-21T15:15:04.030", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8625.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8625.json index 5fd3af594e5..820e936c8e8 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8625.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8625.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8625", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-21T06:15:02.207", - "lastModified": "2024-10-21T06:15:02.207", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TS Poll WordPress plugin before 2.4.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks" + }, + { + "lang": "es", + "value": "El complemento TS Poll de WordPress anterior a la versi\u00f3n 2.4.0 no desinfecta ni escapa un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que permite a los administradores realizar ataques de inyecci\u00f3n SQL" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9219.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9219.json index fcafb4d5d19..ad55bee68b6 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9219.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9219.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9219", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-19T04:15:05.560", - "lastModified": "2024-10-19T04:15:05.560", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordPress Social Share Buttons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.19. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WordPress Social Share Buttons de WordPress es vulnerable a ataques de Cross-Site Scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 1.19 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9537.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9537.json index 5917a2d2a58..7c33ceb49b4 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9537.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9537.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9537", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2024-10-18T15:15:04.170", - "lastModified": "2024-10-18T20:15:03.527", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x." + }, + { + "lang": "es", + "value": "ScienceLogic SL1 (anteriormente EM7) se ve afectado por una vulnerabilidad no especificada que involucra un componente de terceros no especificado incluido en el paquete de SL1. La vulnerabilidad se solucion\u00f3 en las versiones 12.1.3+, 12.2.3+ y 12.3+ de SL1. Se han puesto a disposici\u00f3n soluciones para todas las versiones de SL1 hasta las l\u00edneas de versi\u00f3n 10.1.x, 10.2.x, 11.1.x, 11.2.x y 11.3.x." } ], "metrics": { @@ -79,18 +83,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-829" - } - ] - } - ], "references": [ { "url": "https://arcticwolf.com/resources/blog/rackspace-breach-linked-to-zero-day-vulnerability-sciencelogic-sl1s-third-party-utility/", @@ -120,6 +112,10 @@ "url": "https://www.bleepingcomputer.com/news/security/rackspace-monitoring-data-stolen-in-sciencelogic-zero-day-attack/", "source": "9119a7d8-5eab-497f-8521-727c672e3725" }, + { + "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-9537", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + }, { "url": "https://www.theregister.com/2024/09/30/rackspace_zero_day_attack/", "source": "9119a7d8-5eab-497f-8521-727c672e3725" diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9593.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9593.json index e0f31a80579..c854dd83601 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9593.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9593.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9593", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T18:15:04.540", - "lastModified": "2024-10-18T18:15:04.540", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allows unauthenticated attackers to execute code on the server. The invoked function's parameters cannot be specified." + }, + { + "lang": "es", + "value": "El complemento Time Clock y el complemento Time Clock Pro para WordPress son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo en versiones hasta la 1.2.2 (para Time Clock) y la 1.1.4 (para Time Clock Pro) incluida, a trav\u00e9s de la funci\u00f3n 'etimeclockwp_load_function_callback'. Esto permite que atacantes no autenticados ejecuten c\u00f3digo en el servidor. No se pueden especificar los par\u00e1metros de la funci\u00f3n invocada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9889.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9889.json index a6256fc3e1c..f5c14e1c46c 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9889.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9889.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9889", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-19T07:15:03.073", - "lastModified": "2024-10-19T07:15:03.073", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:10:22.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ElementInvader Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.9 via the Page Loader widget. This makes it possible for authenticated attackers, with contributor-level access and above, to view private/draft/password protected posts, pages, and Elementor templates that they should not have access to." + }, + { + "lang": "es", + "value": "El complemento ElementInvader Addons for Elementor para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.2.9 incluida a trav\u00e9s del widget Page Loader. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, vean publicaciones, p\u00e1ginas y plantillas de Elementor privadas, protegidas con contrase\u00f1a o en borrador a las que no deber\u00edan tener acceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9897.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9897.json index df8ed44c4d9..4417640bec7 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9897.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9897.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9897", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-19T10:15:05.420", - "lastModified": "2024-10-19T10:15:05.420", - "vulnStatus": "Received", + "lastModified": "2024-10-21T17:09:45.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The StreamWeasels Twitch Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's sw-twitch-embed shortcode in all versions up to, and including, 1.8.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento StreamWeasels Twitch Integration para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado sw-twitch-embed del complemento en todas las versiones hasta la 1.8.6 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/README.md b/README.md index 400ab0358be..e0ccadc41b9 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-21T16:00:31.606486+00:00 +2024-10-21T18:00:21.462185+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-21T15:57:44.370000+00:00 +2024-10-21T17:35:44.460000+00:00 ``` ### Last Data Feed Release @@ -33,40 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -266355 +266360 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `5` -- [CVE-2024-45309](CVE-2024/CVE-2024-453xx/CVE-2024-45309.json) (`2024-10-21T15:15:03.463`) -- [CVE-2024-6519](CVE-2024/CVE-2024-65xx/CVE-2024-6519.json) (`2024-10-21T15:15:03.727`) -- [CVE-2024-8305](CVE-2024/CVE-2024-83xx/CVE-2024-8305.json) (`2024-10-21T15:15:04.030`) +- [CVE-2024-40746](CVE-2024/CVE-2024-407xx/CVE-2024-40746.json) (`2024-10-21T17:15:03.330`) +- [CVE-2024-48930](CVE-2024/CVE-2024-489xx/CVE-2024-48930.json) (`2024-10-21T16:15:03.607`) +- [CVE-2024-49366](CVE-2024/CVE-2024-493xx/CVE-2024-49366.json) (`2024-10-21T17:15:03.567`) +- [CVE-2024-49367](CVE-2024/CVE-2024-493xx/CVE-2024-49367.json) (`2024-10-21T17:15:03.783`) +- [CVE-2024-49368](CVE-2024/CVE-2024-493xx/CVE-2024-49368.json) (`2024-10-21T17:15:03.960`) ### CVEs modified in the last Commit -Recently modified CVEs: `18` +Recently modified CVEs: `277` -- [CVE-2022-45802](CVE-2022/CVE-2022-458xx/CVE-2022-45802.json) (`2024-10-21T15:35:01.227`) -- [CVE-2023-24831](CVE-2023/CVE-2023-248xx/CVE-2023-24831.json) (`2024-10-21T15:35:02.777`) -- [CVE-2023-30771](CVE-2023/CVE-2023-307xx/CVE-2023-30771.json) (`2024-10-21T15:35:04.733`) -- [CVE-2023-38885](CVE-2023/CVE-2023-388xx/CVE-2023-38885.json) (`2024-10-21T15:35:06.500`) -- [CVE-2023-46380](CVE-2023/CVE-2023-463xx/CVE-2023-46380.json) (`2024-10-21T15:35:07.737`) -- [CVE-2023-47213](CVE-2023/CVE-2023-472xx/CVE-2023-47213.json) (`2024-10-21T15:35:08.740`) -- [CVE-2023-6057](CVE-2023/CVE-2023-60xx/CVE-2023-6057.json) (`2024-10-21T15:35:09.613`) -- [CVE-2024-21265](CVE-2024/CVE-2024-212xx/CVE-2024-21265.json) (`2024-10-21T15:49:21.027`) -- [CVE-2024-21266](CVE-2024/CVE-2024-212xx/CVE-2024-21266.json) (`2024-10-21T15:49:43.940`) -- [CVE-2024-21267](CVE-2024/CVE-2024-212xx/CVE-2024-21267.json) (`2024-10-21T15:50:27.217`) -- [CVE-2024-21268](CVE-2024/CVE-2024-212xx/CVE-2024-21268.json) (`2024-10-21T15:56:01.437`) -- [CVE-2024-21269](CVE-2024/CVE-2024-212xx/CVE-2024-21269.json) (`2024-10-21T15:56:49.217`) -- [CVE-2024-21270](CVE-2024/CVE-2024-212xx/CVE-2024-21270.json) (`2024-10-21T15:57:11.543`) -- [CVE-2024-21271](CVE-2024/CVE-2024-212xx/CVE-2024-21271.json) (`2024-10-21T15:57:44.370`) -- [CVE-2024-4184](CVE-2024/CVE-2024-41xx/CVE-2024-4184.json) (`2024-10-21T14:09:02.020`) -- [CVE-2024-4189](CVE-2024/CVE-2024-41xx/CVE-2024-4189.json) (`2024-10-21T14:08:57.430`) -- [CVE-2024-43689](CVE-2024/CVE-2024-436xx/CVE-2024-43689.json) (`2024-10-21T14:35:08.110`) -- [CVE-2024-4690](CVE-2024/CVE-2024-46xx/CVE-2024-4690.json) (`2024-10-21T15:51:10.467`) +- [CVE-2024-49628](CVE-2024/CVE-2024-496xx/CVE-2024-49628.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49629](CVE-2024/CVE-2024-496xx/CVE-2024-49629.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49630](CVE-2024/CVE-2024-496xx/CVE-2024-49630.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49631](CVE-2024/CVE-2024-496xx/CVE-2024-49631.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49850](CVE-2024/CVE-2024-498xx/CVE-2024-49850.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49851](CVE-2024/CVE-2024-498xx/CVE-2024-49851.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49852](CVE-2024/CVE-2024-498xx/CVE-2024-49852.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49853](CVE-2024/CVE-2024-498xx/CVE-2024-49853.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49854](CVE-2024/CVE-2024-498xx/CVE-2024-49854.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49855](CVE-2024/CVE-2024-498xx/CVE-2024-49855.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49856](CVE-2024/CVE-2024-498xx/CVE-2024-49856.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49857](CVE-2024/CVE-2024-498xx/CVE-2024-49857.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49858](CVE-2024/CVE-2024-498xx/CVE-2024-49858.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49859](CVE-2024/CVE-2024-498xx/CVE-2024-49859.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49860](CVE-2024/CVE-2024-498xx/CVE-2024-49860.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49861](CVE-2024/CVE-2024-498xx/CVE-2024-49861.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-49862](CVE-2024/CVE-2024-498xx/CVE-2024-49862.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-6519](CVE-2024/CVE-2024-65xx/CVE-2024-6519.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-8305](CVE-2024/CVE-2024-83xx/CVE-2024-8305.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-8625](CVE-2024/CVE-2024-86xx/CVE-2024-8625.json) (`2024-10-21T17:09:45.417`) +- [CVE-2024-9219](CVE-2024/CVE-2024-92xx/CVE-2024-9219.json) (`2024-10-21T17:10:22.857`) +- [CVE-2024-9537](CVE-2024/CVE-2024-95xx/CVE-2024-9537.json) (`2024-10-21T17:10:22.857`) +- [CVE-2024-9593](CVE-2024/CVE-2024-95xx/CVE-2024-9593.json) (`2024-10-21T17:10:22.857`) +- [CVE-2024-9889](CVE-2024/CVE-2024-98xx/CVE-2024-9889.json) (`2024-10-21T17:10:22.857`) +- [CVE-2024-9897](CVE-2024/CVE-2024-98xx/CVE-2024-9897.json) (`2024-10-21T17:09:45.417`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a07fa2a23f0..0737033e464 100644 --- a/_state.csv +++ b/_state.csv @@ -37231,7 +37231,7 @@ CVE-2009-0547,0,0,4b01de74138dee71dc532bef0a5b47ae3f657c01852e4ff054b9affb322877 CVE-2009-0548,0,0,aa16005e89d5aec89f1ed7b7ccd3f83d7658607d8b5804c3a41d3f1def03f1ee,2011-03-08T03:18:41.500000 CVE-2009-0549,0,0,5dc29c251c23acf375021b62d9c6295fc687b6de2d271a30325a1f7a297dc584,2018-10-12T21:50:25.660000 CVE-2009-0550,0,0,ec30d940f310553b048b323f139cf9c67a2615385d06455d4e87493d47a93793,2023-12-07T18:38:56.693000 -CVE-2009-0551,0,0,e359c7bf0767581934a73dabedff5d6d5f12863dfe49aa58c3b4aa70f8dacf51,2023-12-07T18:38:56.693000 +CVE-2009-0551,0,1,6c0461fb58414cf0e0d6ceae2db249db1c27307a1db87c001a0bdf2889cbf2ce,2024-10-21T17:35:00.687000 CVE-2009-0552,0,0,67dc19b5113a28dca6219a7b970f617145e8c83b4f3453b91b26ac10db70622b,2021-07-23T12:16:46.640000 CVE-2009-0553,0,0,6cafcf0ef8d9e0db3ceaa1481ee188aec343c1afb7a3b54def5b852986239b5f,2024-02-14T01:17:43.863000 CVE-2009-0554,0,0,de0da184edfd30eeb74520f3620ba39c45a3df0f17663923289c2c361c441205,2023-12-07T18:38:56.693000 @@ -38167,7 +38167,7 @@ CVE-2009-1525,0,0,890ddd92d91c59e44de43e0e3ff7928810cc92d421aac6f40e55678b353fef CVE-2009-1526,0,0,c15c82a6af42943075fc5182b31652a5c9263997f6e39a73a8e1bb467bec9f50,2010-03-29T04:00:00 CVE-2009-1527,0,0,fd872e0b391345e99faffcd43af269e6f61a9687350c4600b0f778823c8059f0,2023-11-07T02:03:55.920000 CVE-2009-1528,0,0,f58a1c3416e4104b8e9a8220da02677a2ac7ceff497cfd97070c831955c5542a,2023-12-07T18:38:56.693000 -CVE-2009-1529,0,0,d24ebb4f32e99c67d7f967729be8e278d76b6e4f0f5e3b5e06d7246e4c6152d2,2023-12-07T18:38:56.693000 +CVE-2009-1529,0,1,bcdb8b9a7f04e221244f6940e540c5014965df0ef11c3bbcf62aeb71a73615b5,2024-10-21T17:35:00.990000 CVE-2009-1530,0,0,4619efd3c35dc58ef12c1b577f257d36d57d0700269ab599f739900feb9f6ce1,2023-12-07T18:38:56.693000 CVE-2009-1531,0,0,a0f9cc2e1390da6af897f48a9af1b883586cba0d8bc43e4f33dd6cc8ecf2b533,2023-12-07T18:38:56.693000 CVE-2009-1532,0,0,ae503f8b49b1e1c2cf444b994b3e4d591d51e0f08afe211701a6c682280153d4,2024-02-09T03:22:27.067000 @@ -38182,7 +38182,7 @@ CVE-2009-1540,0,0,061a766ae209c822bc01ab534f0acf52214fe2f7acca0f47482388615ee87c CVE-2009-1541,0,0,2492cbd2599a2f3a97d44c700ebf228a872e381140d3da855626026e34851480,2023-11-07T02:03:56.333000 CVE-2009-1542,0,0,0f3aa95b1ab59ea0ca8e340bad28c40bf66626736696bac0adc089e6ac85f8f5,2018-10-12T21:51:23.993000 CVE-2009-1543,0,0,828afe9209ce5cdd479acebb51bf12331fad6fdf40c1e7dae8988c24303dedb3,2023-11-07T02:03:56.560000 -CVE-2009-1544,0,0,7ddb3d596ffa0f75142258e8ae7e7de6d4523d3b71307b191439562f3e8ba902,2023-12-07T18:38:56.693000 +CVE-2009-1544,0,1,0bfd8302a95b6f5bf1aa7d66573e14e393032e6109abd4273cebdccca2575dc7,2024-10-21T17:35:02.977000 CVE-2009-1545,0,0,16384da31ef1ff4708803f101030269f3eccb2c0886c0d0d6e0214a04c0d9fc3,2023-12-07T18:38:56.693000 CVE-2009-1546,0,0,476378c46f951229016da1c9a9a2519a9010a70b5225172953c0d5b63825a2a3,2023-12-07T18:38:56.693000 CVE-2009-1547,0,0,cc2fb0060f04e4a41ad4fbcee660bbc5a9d07f8a5d7577f6576a1fee328b47a5,2023-12-07T18:38:56.693000 @@ -39121,7 +39121,7 @@ CVE-2009-2498,0,0,a1b786d3ed1a6fee01863a09c0f05d6736548e84c59eabdca2cea10857207e CVE-2009-2499,0,0,1dcf084c75ea984a756873f4fba563466d6d50c7ecaabf4403c3b894568e6b1c,2023-12-07T18:38:56.693000 CVE-2009-2500,0,0,757a048fcce36ffb5afa08c3e007384ee1d195837ee47a20098bce5ebf409b70,2023-12-07T18:38:56.693000 CVE-2009-2501,0,0,4099bb1574c866ef9cd69f3822c0b5d692799b9c492d67586f0ae9e039b9c239,2023-12-07T18:38:56.693000 -CVE-2009-2502,0,0,994f9ff8d3ae4f899fc8411d1789410aecfc0e4673f1a094afe7a6c945524f05,2023-12-07T18:38:56.693000 +CVE-2009-2502,0,1,97a3d858e64a89a66faa1a63c42ea7a678ce7539db0002c6320d80d799a11b0a,2024-10-21T17:35:04.240000 CVE-2009-2503,0,0,59e0e303d36d727abfbb56a7e6af6070b51a9d0955e52621bce47c583ceacf33,2023-12-07T18:38:56.693000 CVE-2009-2504,0,0,a5ef6737f6d2ee21adc459a9e2ea16f3f114fdafdd6b3cee2c2ec022d979a325,2023-12-07T18:38:56.693000 CVE-2009-2505,0,0,0ddf8763bfd56cfe6dc5e21442a4fe7c102ec422422055618db777139095f254,2023-12-07T18:38:56.693000 @@ -39148,7 +39148,7 @@ CVE-2009-2525,0,0,8a19ba4ca3b030ab60ad41494c57745371002871e59d15962f84dae2815d78 CVE-2009-2526,0,0,5fd69cda1a2d504dc1daaa04fcf992007cf8e7a8fdc03de6f83242ef6bdd1a29,2023-12-07T18:38:56.693000 CVE-2009-2527,0,0,a194ef7fea1e830fc8f5e59af64a9284f08abea583e988f15ea764932cd80377,2018-10-30T16:25:57.340000 CVE-2009-2528,0,0,719b838d03a32a238ed188d66c8d4ac70880b893348dc6a8fc45f9b5243a59a1,2023-12-07T18:38:56.693000 -CVE-2009-2529,0,0,9657424bb6a3a9120f428f76d743606e460c5d3c06a52d5c9e8e7f342c85d6fa,2023-12-07T18:38:56.693000 +CVE-2009-2529,0,1,40a987e1bc12495078e72d52e1b8f6a24f521e559e249ba719c5573948b0951c,2024-10-21T17:35:05.513000 CVE-2009-2530,0,0,baf3717edaf285ef2c6f22c8182a8a78950db8edb1f703218c7312509d4f79af,2023-12-07T18:38:56.693000 CVE-2009-2531,0,0,9e1c0c9938c4941c7970761e9d1ccbf76c7f08753fde8fd10588f12e50be195e,2023-12-07T18:38:56.693000 CVE-2009-2532,0,0,6c92c9ecff39f3e38f3b174e499fae53986d35b81978862a6d62008818b2536e,2023-12-07T18:38:56.693000 @@ -40266,7 +40266,7 @@ CVE-2009-3667,0,0,83e151a0d8b6af133c3a519962e59de3242788cd8efb5e15d4171fe7874dc8 CVE-2009-3668,0,0,c6f43c9f4fc73d5473c7e17caecef5e07c4834d8d5979f4bf927fdcbcb18ca0c,2009-10-12T04:00:00 CVE-2009-3669,0,0,c970e9bf1b52d30844c1628059e641c23f76423b43e4ebf4b0b2ca2948563d9a,2017-09-19T01:29:43.313000 CVE-2009-3670,0,0,36df8bf26386365e9adda23821e364d5f61450a2fdcc4ecbd56adeab9e2f0774,2017-09-19T01:29:43.377000 -CVE-2009-3671,0,0,89d5d5969de661fe6c337dd908c25884b75b26121cac005aad1421f599051cdb,2023-12-07T18:38:56.693000 +CVE-2009-3671,0,1,1cb513acd9e410e233a2a0e0f482b4a4e8f049eb3c405c72781c04b349848a1c,2024-10-21T17:35:06.493000 CVE-2009-3672,0,0,a3eda84c1a5e06b7d34a3e77233574990f49e8f29d8055bcef6187eb9569aad8,2023-12-07T18:38:56.693000 CVE-2009-3673,0,0,a08d905dbe064070af184221d85d665bb2476325141f66d9e784650df3b9817d,2023-12-07T18:38:56.693000 CVE-2009-3674,0,0,b02b7a7b5f0d9ce6d2f1c91e6747ac062b8bef848b75067b36607f284745b94d,2023-12-07T18:38:56.693000 @@ -41975,7 +41975,7 @@ CVE-2010-0244,0,0,5e0df5abd660169ea84c975e356e28e53411f2290a417a4f1c136fe6238b39 CVE-2010-0245,0,0,117555345b80905185feffa740e36f03396dbd71214b32255dacde8559024f78,2023-12-07T18:38:56.693000 CVE-2010-0246,0,0,b9abb1aab284093b13dd9b994e97eadaa607f4932fd09ed9498acfb1d4f002eb,2023-12-07T18:38:56.693000 CVE-2010-0247,0,0,d1bea62669836cb6a69e577058b85f5f49e1965de0a3e45757646b6075e117d1,2021-07-23T15:06:18.050000 -CVE-2010-0248,0,0,f571bb6bbcb77d73dbf06e13d18cb9d63eb019deeb4fd57d5a221856f25b5fd5,2023-12-07T18:38:56.693000 +CVE-2010-0248,0,1,b7537ca1c69cefb142697c3a2c7ddea4501b59d9722cde8bb15ff524b37ec4df,2024-10-21T17:35:07.367000 CVE-2010-0249,0,0,af75eea93ff9a7dfd5a75acb4dcfd8888b77f09555ebc65be7bf79ca242bfa6c,2024-02-15T21:06:48.057000 CVE-2010-0250,0,0,f27b906aa8bac70a12826b650944399e94a2163879cd13ba7439bd550a846131,2023-12-07T18:38:56.693000 CVE-2010-0251,0,0,c80da30a2c5c7824ec0bc1430ec3b36c894a891a8fc0492d99b06e01a75fe43f,2023-11-07T02:05:02.313000 @@ -42206,7 +42206,7 @@ CVE-2010-0488,0,0,9e47c55e0244ba94b9cbacf8dd1653b2e53d8b154c2ad0bde00322cf74fc18 CVE-2010-0489,0,0,4b88b179af4669bfe528d8eb7a75294bb1c76332ea74522dd34361a896d5ac3b,2023-12-07T18:38:56.693000 CVE-2010-0490,0,0,16a255fb50d89368d7a5f77f3b1088fd08c8bf1664bab6294ba6218953643dea,2023-12-07T18:38:56.693000 CVE-2010-0491,0,0,12a0488e7f2afb17503c29eac7087031157c43d97972dac808f42b5b13fd198b,2021-07-23T12:19:09.200000 -CVE-2010-0492,0,0,6e64afdff9d22e08d084b1f8c41ea3bf71ad70a5bc4109a1e27242600d14b1f9,2023-12-07T18:38:56.693000 +CVE-2010-0492,0,1,78aa492260a79945d9cc3debfdede0d1d7c84bcc38fa19046964e226ae590012,2024-10-21T17:35:08.240000 CVE-2010-0493,0,0,50bc057dab4d7f5e238fefa86f8be84ca8e8952edeb53c0e9103790f8f9bb609,2023-11-07T02:05:05.890000 CVE-2010-0494,0,0,d2ee000c7fb55aa3774757e2016dbd54db75d2e05fdaf1df40f678ae75c8a48a,2023-12-07T18:38:56.693000 CVE-2010-0495,0,0,afd6ad0b78c351387b2b52ca7e98b2dc4b8cd2fe0c5cb989baeb918b4a0e548d,2023-11-07T02:05:06.133000 @@ -42975,7 +42975,7 @@ CVE-2010-1256,0,0,d022f4d88cc115a35f2ba48934b55e20a2ea6f4b1343ba77d6aaae93adec81 CVE-2010-1257,0,0,10991e239e8f338cec88679273d4fef0f7b6159792e1e2d24da5d7334a55e25c,2023-12-07T18:38:56.693000 CVE-2010-1258,0,0,265c92cfb014976a541105b9ae1c7ee7ee861b4da0fb8fdf8c13a23c95fb6475,2023-12-07T18:38:56.693000 CVE-2010-1259,0,0,324be8854bff872415e7dd64ceaf90bcd9fb6b6ba14c58a34f03c719fc118553,2023-12-07T18:38:56.693000 -CVE-2010-1260,0,0,326f260351d15cbd4cebb524790d4d5c583dce7d10d3ad168796c852cab64ae5,2023-12-07T18:38:56.693000 +CVE-2010-1260,0,1,a1e589dcc8923be9a710424672af53dea8b33a38610db0f86b098f69326ed04a,2024-10-21T17:35:09.133000 CVE-2010-1261,0,0,97ce866d6a4456de97c227404c194505d4719232db27da607d9e0e6376b8f7fd,2023-12-07T18:38:56.693000 CVE-2010-1262,0,0,d6cddec0b64ff72224dc401cc055879fc8d0bb9a3ef5c5fa01ce82200388068c,2023-12-07T18:38:56.693000 CVE-2010-1263,0,0,efee137b37cd15c4fc4584b764609bd3a241530cb4d49461944c26192e04f34c,2018-10-12T21:57:36.700000 @@ -47263,7 +47263,7 @@ CVE-2011-0342,0,0,09def4d6b8a81fb3dbd0a3fdf00b1ce40a75a3dd63817b92ba75ebf4aecec9 CVE-2011-0343,0,0,516113f8dff7ce9d2223e780a169186184fe404c0a2028f3e82991d21b30a085,2020-05-19T19:30:18.510000 CVE-2011-0344,0,0,cdeb9e649fb18c833aceb237efb74cc101b7a4de149299ec80d4aee067a5202d,2017-08-17T01:33:27.010000 CVE-2011-0345,0,0,684926bce6d65d263a8fc5e79e851838bf1d69b9848c42dd6a106c45cc12ca17,2018-10-10T20:09:41.200000 -CVE-2011-0346,0,0,75eeb8d2ded7e3a5ab598afe17ec3c7b001c5bac1fc4d9786a2f30a152d6489f,2023-12-07T18:38:56.693000 +CVE-2011-0346,0,1,4efa60710f868f389422acce641f3e967e305fc6ecfcdd34fb692a9f0e55d6e5,2024-10-21T17:35:10 CVE-2011-0347,0,0,07428931f7e8fa235bb3400e17b96bc4877a52a65ff3913dfb596907350c0bdf,2021-07-23T15:12:10.537000 CVE-2011-0348,0,0,6cc678a3f5714f5bef18d066c99f41abfeb0d7201e4fde9ea07692962e534b59,2017-08-17T01:33:27.277000 CVE-2011-0349,0,0,c53d772cf97e90cae8507b889600bac358e4c29c56a2b40b077d64a35aff73b7,2017-08-17T01:33:27.323000 @@ -47980,7 +47980,7 @@ CVE-2011-1138,0,0,96729dea03412cfeb4f0165d7990722e10e5378fc6ebe16488acf137432ee7 CVE-2011-1139,0,0,7469f4498995b00a7baf4e788dc722dd45c77925ab2f85f877544542b19960cf,2017-09-19T01:32:22.193000 CVE-2011-1140,0,0,986789c4997324d4ce93b960e21c9f454613d94032ee5ec7862c766229f42265,2017-09-19T01:32:22.287000 CVE-2011-1141,0,0,e2f4be172d21679c7ed0e32295a2bae46876dbac0ad8ad78cee5294f2cad5223,2017-09-19T01:32:22.367000 -CVE-2011-1142,0,0,20774fdd755dd75dabef1b0c57dec8fdb031154bda3a9ea0a361f4e61763e09d,2023-12-22T18:18:15.377000 +CVE-2011-1142,0,1,c147a4eab63a8f6cb759631a773d016fad73c9290c31875852a66020d55ce88b,2024-10-21T17:35:10.907000 CVE-2011-1143,0,0,f31e2f2dd52eafc0e568a8853a998fec1db38b41e33003712515e56f88825c12,2017-09-19T01:32:22.540000 CVE-2011-1144,0,0,80b2b8e7111c6250b605290ddf9abb6fdea561e853fc6e0e4071f207c0a1402c,2020-01-23T14:33:48.200000 CVE-2011-1145,0,0,e7ad1057aeefbeb1b4f28dabe31d5ade6afdefd64d1f571edbc80bf45608890a,2019-11-19T21:02:35.183000 @@ -53201,7 +53201,7 @@ CVE-2012-1534,0,0,61ab61b50b5c66376d908d494ff18845f17861c54b3083ecb185a344577b54 CVE-2012-1535,0,0,06b8d329bd01553c5fd48c7b2dc68e6df320941a81b54560e560fc8c454c7848,2024-07-16T17:38:08.570000 CVE-2012-1537,0,0,de443f96f2a89f4df01002575b38b0735e102217e423a2882b62346eaa51c924,2019-02-26T14:04:02.400000 CVE-2012-1538,0,0,e66bcf8e0c1a71ed87dd0bb38bd97764ccab7ef1bd08b0d616b06f480dd74886,2023-12-07T18:38:56.693000 -CVE-2012-1539,0,0,16dc50af05ee7ff0ea8e530e88d279708286a4ea2f82d5e8a8de1945d1c96234,2023-12-07T18:38:56.693000 +CVE-2012-1539,0,1,6390dc321b7663d9a73633303639eef48f87043a6080265a1311abee25e4f817,2024-10-21T17:35:12.110000 CVE-2012-1541,0,0,e142a4ff334f68b28b34e40983ebcdd742cfafae3253d636fc3ad4f27bcd5892,2022-05-13T14:52:59.003000 CVE-2012-1543,0,0,64c37fa53f8a383edfa5353f012b3b78d400b1bfe8ddb795fda94aa012a44fa5,2017-09-19T01:34:46.997000 CVE-2012-1544,0,0,dbd5d064926e4f4a610890acb04c2eb1fe6af6dea83b745b8d10634e014f2bbd,2023-11-07T02:10:15.970000 @@ -58464,7 +58464,7 @@ CVE-2013-0804,0,0,4a5313c7240ab46b9718142b65f0f31c84f71895af34746e1dc1655df73eb3 CVE-2013-0805,0,0,5dca9ae4b5d59b816acc16973ce749137b85e37294cff1f4246e788ec6406d36,2017-08-29T01:33:08.480000 CVE-2013-0807,0,0,1ae8b545a439bb8a980746b8e79c3f9dcfa6caf459cdff77c137f86f41f8deec,2017-08-29T01:33:08.557000 CVE-2013-0809,0,0,de4afe627c41a11210822434530c6392ba2f47468c3b88a391be5c7aea252be1,2023-11-07T02:13:56.317000 -CVE-2013-0810,0,0,737aee8273ede33f445d949656748c9b57382f28acc7fb86781bf511b2cd563b,2023-12-07T18:38:56.693000 +CVE-2013-0810,0,1,ab94fdc9b8fa8b9d01b6fceed416cb3eb21e76418aca332016a45c8f04b2dba9,2024-10-21T17:35:13.017000 CVE-2013-0811,0,0,47f1b9ab7f3060c115752450690c2feae288bf6bdbc767fb4173834080ed5c3b,2018-10-12T22:03:50.317000 CVE-2013-0828,0,0,fed58cd6991669c4f3f9944e40c4929c9b05b72e60d52efae256bfba4849d925,2023-11-07T02:13:56.507000 CVE-2013-0829,0,0,f43a62ef152beef108f7bcbccbef19a83d8801cbbf26bfcfb2957a7921db7ebf,2023-11-07T02:13:56.773000 @@ -81085,7 +81085,7 @@ CVE-2015-8366,0,0,5633b5480b1c85fbedebf69fbe8e087df2f3dd235b7cfa41bf116c4bb7b2f1 CVE-2015-8367,0,0,fe7a7bd383179abb4db964941a6577548487c5d51fbf0e54d1bff6e15a4b32b3,2020-01-24T13:44:25.670000 CVE-2015-8368,0,0,512f9a946905ff46dac54203c7a2a228d4aff0309b19c0cbe0a39ca3afdf3324,2015-12-18T18:43:25.693000 CVE-2015-8369,0,0,2a682d99ec2f8339e53250ae71555bdc1a17d1f66bcfef1321592447905f0b8f,2016-12-07T18:27:09.537000 -CVE-2015-8370,0,0,02b59d6d8db09ba188b6c91268d4ed786970d07b95a8e6e9c9dd1d471ccdc26f,2024-01-16T01:15:33.947000 +CVE-2015-8370,0,1,ce78b38559be12e1e8db0b9c2d9643fdd21b1c8ccde56de17d3b376879ca2825,2024-10-21T17:35:14.003000 CVE-2015-8371,0,0,1d7030616907093335a27e933be8fb0ea132917c0056f2d5fb6f066cc993ef15,2023-09-29T04:26:02.697000 CVE-2015-8373,0,0,0a67165d7c94bc1ccfc6bf91e70ad2028a6fa25ba96dbfd6162f6e725df1f4fb,2016-12-07T18:27:12.193000 CVE-2015-8374,0,0,a8227f67f6cab3ef106d5c6e67ead96bee7614d122d9bfee293433c5eb02ba44,2018-01-05T02:30:20.367000 @@ -125910,7 +125910,7 @@ CVE-2018-8030,0,0,904136a82243c34d218478159af47acd32ba11d7629dfce786a960ca292cdb CVE-2018-8031,0,0,16f4b653fe9691e8e77167b533d20c4cd7e5b5986f69d8340410b57467a07435,2023-11-07T03:01:22.140000 CVE-2018-8032,0,0,4a031f3e4f618667732fa0d59bd6ae000fde2e250c01c0e4779bead2b17d177a,2024-06-21T19:15:11.357000 CVE-2018-8033,0,0,d30b27744c94ea8c82246e485a733f1a3e2a5c090057d86bd43c2578e169de07,2023-11-07T03:01:22.290000 -CVE-2018-8034,0,0,7afd11b1e87fc15c6625ca99d5f9dc48679be38a9795ad082d4cfe18b2bdadc8,2023-12-08T16:41:18.860000 +CVE-2018-8034,0,1,d46536e32aa87638260fdc205e7e1d3e31fe39a58485c1b3d8a72ef14d9fb919,2024-10-21T16:35:00.610000 CVE-2018-8035,0,0,46ec8acbfab9b7869e3235c52eece9067f381bfd681f0ae1120e957c3df5ffc3,2023-11-07T03:01:22.550000 CVE-2018-8036,0,0,e0011f08fb2302e19a31bf6ca7725b84a516a95502d6403c2bc4f908eab173b8,2023-11-07T03:01:22.623000 CVE-2018-8037,0,0,a4bf85ae6d20e859364bb37e1720f291ce5a374f41fc0477a6d72e450d4a707f,2023-12-08T16:41:18.860000 @@ -138409,7 +138409,7 @@ CVE-2019-25214,0,0,f39238d5ed48577540f531994d29659bb57358e55406eaf7ee66d83805ed7 CVE-2019-25215,0,0,e894585b718ba6ffd4c4fb2559e624b9ffb182a68ef25ae0e57369eba12bd404,2024-10-16T16:38:14.557000 CVE-2019-25216,0,0,4deb2b163c53c3da84ce16e745f05ec6e2891bf0f3544a26c07ca5c280831bcc,2024-10-16T16:38:14.557000 CVE-2019-25217,0,0,30c2571b4837240b6da6c51001318f4e94ce56e8b309a54c15bcaa6ac6286204,2024-10-16T16:38:14.557000 -CVE-2019-25218,0,0,48ecd4ad301624f5202ce4ff1ca96a9be4cc909ceef958bab7ef67a666519ae1,2024-10-19T04:15:03.007000 +CVE-2019-25218,0,1,5b80931fba7b5b61a09b6a7cef47b52c4c321e607f57f9764b15a065a78a0d69,2024-10-21T17:10:22.857000 CVE-2019-2522,0,0,438e5228ba492857a388b8016b2219394ce3508b8a36f1f8aede8ea3eeec2072,2020-08-24T17:37:01.140000 CVE-2019-2523,0,0,4a0e4915f05e6fa4b1849fafb208e6fb024214d6840b1c8202b1873b064ed383,2020-08-24T17:37:01.140000 CVE-2019-2524,0,0,bee2c79f8df3b71e86ab52db9d5dee51c63979ccd70534be30c64d8fa54a9384,2020-08-24T17:37:01.140000 @@ -210307,7 +210307,7 @@ CVE-2022-45797,0,0,e091564f8f26a2ff8244d2e158aae19b09c659d88081c0a3fc43dbfe3795a CVE-2022-45798,0,0,e42e938e5d69e3da19e3fc414bbaa4ac9286e7fcaf79ce22f6a07a2c9d9c3f2f,2023-11-07T03:54:49.870000 CVE-2022-4580,0,0,487bfdd6e38cbb7abfe171f84edb2787ad3484a43bc4476c57ba9ec39105ce06,2023-11-07T03:58:13.380000 CVE-2022-45801,0,0,c808b2aef48cf39acc9dd41dac44a882f25b2fe23e6cda4e5fbaf8d0cb604491,2023-05-09T18:09:27.697000 -CVE-2022-45802,0,1,cba2319bb79bf2b437a5a4208cfe3888ce59b0c95bd4a5c22149200b213a9076,2024-10-21T15:35:01.227000 +CVE-2022-45802,0,0,cba2319bb79bf2b437a5a4208cfe3888ce59b0c95bd4a5c22149200b213a9076,2024-10-21T15:35:01.227000 CVE-2022-45803,0,0,efa1db42f69eee0460aade15ad353e13136adedd726800a1f2e310c8a9bb1912,2024-06-24T18:51:29.867000 CVE-2022-45804,0,0,320bcdc47b31f62d100a1cee6d46af8afbbc9a8e64e32f0dc990e728420bbadd,2023-11-07T03:54:50.113000 CVE-2022-45805,0,0,fb0d479c9f7c3034cbd768e43f49157483a4b989ea9762df48bb49bb75471a89,2024-09-05T16:35:01.640000 @@ -212053,7 +212053,7 @@ CVE-2022-48430,0,0,d05e0ba6a2adbbf3e22a2f900e391dae6e162a69f5f40d4a20ae5300bc6cf CVE-2022-48431,0,0,0c2e4253feb11996ecd7aabd3cc4c4a74d2939488f7dd0ab1e48f0bbaad7e64f,2023-04-01T01:43:46.653000 CVE-2022-48432,0,0,04e244239550bb2fa51034cf4bea2d1109371e6ee506bcd362ab8da263dfe7b8,2023-04-01T01:43:30.497000 CVE-2022-48433,0,0,a467d1ee46f70a513e7ae264bc11baee8a036678d9c4d2f692011b582b692742,2023-04-01T01:44:08.973000 -CVE-2022-48434,0,0,f3c42a28cd2d0f12ece1647472208691a4a46aadbdd69d8b3cb59588a69722a9,2023-12-23T12:15:21.383000 +CVE-2022-48434,0,1,56daae1a8679c0f38b47dde67463669df2cf7d2dc0863968d4a715fcaaabdc70,2024-10-21T16:35:03.207000 CVE-2022-48435,0,0,d84c0554aabff8242ea025183be67186175a00e42935dc7333ac645a4bf37411,2023-04-10T18:45:58.457000 CVE-2022-48437,0,0,25357b9719e4ce98fc757e8607c1aedc309b1b4e8f0b19f88ee966769b04fdc3,2023-04-21T14:17:04.757000 CVE-2022-48438,0,0,f0500ff7753adbf8ccbfda8c0cf5755f7f8f865ea7428c6506254852688af576,2023-06-09T23:15:14.740000 @@ -215133,8 +215133,8 @@ CVE-2023-20830,0,0,6a02392b6a6fe91a83233632455d7b661d82c5d0733c61d40940a5da6781c CVE-2023-20831,0,0,a7bd9cc2fd769f7a7f78cbf92dbd0df138f255abd6200025975d1d20633911f3,2024-10-10T16:35:08.083000 CVE-2023-20832,0,0,05c466968e672a55e813b676aa2e07e30bcd43922fbe2ea39969f9ca4c1ecc0c,2024-10-04T15:35:02.997000 CVE-2023-20833,0,0,0d4fbfbfcfca4b8d072b58089465cf19c7295168fffc28d5689dd850a4e87f39,2023-09-07T19:08:21.983000 -CVE-2023-20834,0,0,2fa6eb5f722248d938b7f55db6fa9eb5c85a7a23b1dd1c297a61b4fbff51fb9d,2023-09-07T19:08:44.343000 -CVE-2023-20835,0,0,7414a97ffa8f886c5599244fc9c1489b9836da6abf4cae586743eec0004b6b4b,2023-09-07T19:13:46.380000 +CVE-2023-20834,0,1,dc16d76c142b5193ac17f5b75dcaa8b22795b017cd9742b79328932e1dab905f,2024-10-21T17:35:15.610000 +CVE-2023-20835,0,1,faae3ca1fca36ceaf58420d62f93d6cbb39caed5d00af1e0556c749eac4e1f76,2024-10-21T17:35:16.473000 CVE-2023-20836,0,0,2f520cac45241c9826fab91b98c1ee8658d002bcc30c36c2d99b511a81023f38,2023-09-07T19:14:40.490000 CVE-2023-20837,0,0,974760026d0e3459f41638d7a7db72c66a834df0d8acb851c7af5b2f605193a3,2023-09-07T14:39:00.457000 CVE-2023-20838,0,0,e9b487898facb858564fc7672c4f07c3709a1ded5b0e18db3f85ec7e2cd61dd2,2023-09-07T14:41:14.693000 @@ -218547,7 +218547,7 @@ CVE-2023-24828,0,0,f3cb1208a2f2cddb11165c476814337f1e32f14a77d5f9413f02ede075ad9 CVE-2023-24829,0,0,ba2d7cf937b7851caa9f2ef2b920652ff2a71520f556b1169935f7387807c600,2023-11-07T04:08:44.007000 CVE-2023-2483,0,0,54a2a6fd22199954be9a4481c481dc39884bf44c2bb0745882c6504df8733a6f,2023-11-07T04:12:45.080000 CVE-2023-24830,0,0,4260a1b65c2cc36abcda06b2d5697a29dda06d1fe3315304826b2c84c91310c2,2023-11-07T04:08:44.063000 -CVE-2023-24831,0,1,23ec8c4627e590946ac1aaaafe47e74b25910a56624b647374580e46ee085661,2024-10-21T15:35:02.777000 +CVE-2023-24831,0,0,23ec8c4627e590946ac1aaaafe47e74b25910a56624b647374580e46ee085661,2024-10-21T15:35:02.777000 CVE-2023-24832,0,0,1f61add0536060103b08bac6d6a3608a0bd5ec4ff60dba13af709537a61c8f19,2023-11-07T04:08:44.130000 CVE-2023-24833,0,0,f754f59cc5b5ab059fe7670d066eb84785e0cd22addcaa4eb4f151e09e05ffec,2023-11-07T04:08:44.230000 CVE-2023-24834,0,0,2216427c93b5fca5a23694ce7f85a4596ff2627ed2b86af8597735c9ca9fe06e,2023-04-18T13:32:37.937000 @@ -223286,7 +223286,7 @@ CVE-2023-30768,0,0,9ed4e092e6d53dcdb30d55903ab0a081415f55e17de722bec28b7db4b261b CVE-2023-30769,0,0,44b6c9aead5a9df34335c3660ad243794ce7c51a971386722fcd8575d7b433ad,2023-04-28T14:28:03.417000 CVE-2023-3077,0,0,08fb449b7e7ba209c9c000afe1520c03d2f40d2d22075772a2d735ad6f53d98a,2023-11-07T04:17:51.507000 CVE-2023-30770,0,0,205e81277bb1ab8cad998d507edd71c5bc762421e649c32f634350e136354e3f,2023-05-04T05:15:22.100000 -CVE-2023-30771,0,1,fc2ad4e8538077a4344f77f73c5503952f5afb38ccf168a0f8266fc1b398d2aa,2024-10-21T15:35:04.733000 +CVE-2023-30771,0,0,fc2ad4e8538077a4344f77f73c5503952f5afb38ccf168a0f8266fc1b398d2aa,2024-10-21T15:35:04.733000 CVE-2023-30772,0,0,50da9648b39ba899f62da48ab022bb2e5f193b04c58869041205927dc0502705,2023-05-03T14:15:34.807000 CVE-2023-30774,0,0,37de702b10992b913777b06477cebb943960951a92676ae813b57b462c11d4a1,2024-01-09T02:51:33.207000 CVE-2023-30775,0,0,35b505562bd0f30900fe135548a4292896f8a9f7985d084ddb065eeed2235ac5,2023-07-03T16:15:10.230000 @@ -223786,7 +223786,7 @@ CVE-2023-31432,0,0,7ede9fa95e9816e2aa3e27fabdfcc8e5d13ef54fc4c3e545c377558d71de5 CVE-2023-31433,0,0,fd50f6af98123b10eac8d3375ee494d0fbe800ebcacf4735490bc78b0900e37f,2023-05-09T20:46:59.023000 CVE-2023-31434,0,0,2e310097b64a44e0f6a2a4c76690d2605c3bf0d582e316d82b327509b2b6cd77,2023-05-10T03:55:17.283000 CVE-2023-31435,0,0,afd5c12591e625bb55a65117667d9aed5e6361367064415579fa3dc4d900fa21,2023-05-10T03:55:11.183000 -CVE-2023-31436,0,0,810ddc669bfc731c96e565421da480d2b326e054d1eef7a7c43adf4c363fe0a4,2023-11-29T15:15:07.820000 +CVE-2023-31436,0,1,f17ef09eed144d8438979041e26da6d5e2a4e05ef08ee6eccc0d3db2dbea4f08,2024-10-21T16:35:05.110000 CVE-2023-31437,0,0,fb76d1ded9c16085297fe0d1c6524e9eebdfb2366642e58b64ff1913d1fc4756,2024-08-02T15:16:07.647000 CVE-2023-31438,0,0,64920b30a84db94da81cee65c579a966667c24e3e77719d49d01bc55a56e3782,2024-08-02T15:16:07.753000 CVE-2023-31439,0,0,742cecff59f5909180f0aba163d696a1f651afd177fdf7f5eaa434156301a1b8,2024-08-02T15:16:07.843000 @@ -226983,7 +226983,7 @@ CVE-2023-35824,0,0,c9726414454319d9bcaa08a7d0240bf7169a3c9ade811a1ce7e904884f8c2 CVE-2023-35825,0,0,961bf3c080a0c7d56b5e9b19df3c1595dc69221847a345c345f3c44bfb570b13,2023-11-07T04:15:59.637000 CVE-2023-35826,0,0,5e43d2b4a6463cc57618d690e3eaa3dcf112fab46da37bf46c4f66930757de34,2023-12-04T14:52:10.630000 CVE-2023-35827,0,0,d5267cc8e5ff57341217408bcba76fb2af5741e775cc4e40c4f4580831015c03,2024-01-11T21:15:10.180000 -CVE-2023-35828,0,0,e4c614673bdb6413c6864d36ede0c16f09d7a48cd8d01f4d8d6c7341e8bffe26,2023-12-04T14:53:50.153000 +CVE-2023-35828,0,1,13a84b4d359f0a7a20df266cb8df7b222b35808e6042143114f3f2068e115b32,2024-10-21T16:35:06.073000 CVE-2023-35829,0,0,d781a1cc18b7b1a4d19b03bc7b61ddc2d06f09ba27700d26ab277831cd36e00e,2024-02-09T19:13:28.167000 CVE-2023-35830,0,0,09da6f1a46d1525d1cd80ca8705371b308db2bbf6135eddd66de8da296e8cbe7,2023-07-11T19:25:28.647000 CVE-2023-35833,0,0,b59e0c3549ed415537c60ab0c56af9b7ea9f99c585e3da19da7e86a887a60c5c,2024-08-02T17:15:47.460000 @@ -229447,7 +229447,7 @@ CVE-2023-38881,0,0,5bebf84525f29021077ecc408e98ffe6e0bd35ebbc1414a3bfa381f435a4c CVE-2023-38882,0,0,ec5ea47603a3086e4c462ba386dc895b14ddd5086093287271e85209edeb5c79,2023-11-30T14:20:28.047000 CVE-2023-38883,0,0,cd3140914d8c0ffbddee1828a1208821a650be5b41e85c41ea10c0430b03dc40,2023-11-30T14:21:33.187000 CVE-2023-38884,0,0,b5da0fb4dc777fd8639d5172b4dd9aea4eb0ed10d64ef9ac2f442f4a7ce780e9,2023-11-30T14:22:37.007000 -CVE-2023-38885,0,1,9f292c5887d41137269c0ae76598b1e03e14e7def72bb08efa2b7b33b0ed8f3d,2024-10-21T15:35:06.500000 +CVE-2023-38885,0,0,9f292c5887d41137269c0ae76598b1e03e14e7def72bb08efa2b7b33b0ed8f3d,2024-10-21T15:35:06.500000 CVE-2023-38886,0,0,94472bd9e9147d61ca51246df24167cb9efca241b8d0378ba7368418ce654f8d,2024-09-25T15:35:07.707000 CVE-2023-38887,0,0,ef6a800e913218682570d1543412894773e7fd59652e5edddda59874ebf59aa3,2024-09-25T01:35:53.460000 CVE-2023-38888,0,0,58087cc61e3ca9f72ca37b211c6f2b3cf8a5b8d6853a9a2b39aabbeb170b1082,2023-09-22T01:37:33.650000 @@ -234815,7 +234815,7 @@ CVE-2023-46375,0,0,84d5f59477bdb6e7348bcfcf2c36a58896f127e0ba6da6c408dfc1fd96ed6 CVE-2023-46376,0,0,a18e9d021664f17accb6b1583792a9a8d7514d3d3dd1baf1ca18e1fcd59ba2c0,2023-11-03T20:11:37.757000 CVE-2023-46377,0,0,3bb3f7894a7f9d7aaa69f0e876764e40500c22caad9e4790582ca41a59d18f7d,2023-11-21T16:15:42.713000 CVE-2023-46378,0,0,a12146fa3d7597e322af8e40f0f69ae518730ec831fca511dcbbdf4ce1a550fe,2023-11-08T23:17:43.707000 -CVE-2023-46380,0,1,9d594ed868c0ac318cd045bd6a6d1b32c61fa60627d1bd079ec4cdc6a7c4c5bf,2024-10-21T15:35:07.737000 +CVE-2023-46380,0,0,9d594ed868c0ac318cd045bd6a6d1b32c61fa60627d1bd079ec4cdc6a7c4c5bf,2024-10-21T15:35:07.737000 CVE-2023-46381,0,0,a447809038597a633db4a285838b0b9800cb1325cbcb36f551545bc235769afa,2024-09-19T20:15:06.463000 CVE-2023-46382,0,0,1fdf18165e958522f0af25e32e7179889fd310f10639fbfb6c52cb54cdd6b130,2024-09-19T20:15:06.523000 CVE-2023-46383,0,0,04a7783e325a5926c06f23aed6509e96127e1d7f1a3631c4b6b6fe09b493cc5f,2024-09-20T17:15:13.987000 @@ -235439,7 +235439,7 @@ CVE-2023-4721,0,0,5bed59ffe75b8be3189e2ebb35f3a3a5791725bfc9ef99b944f3d40b2e7587 CVE-2023-47210,0,0,e62daede3ddc1b31ef043d527e408f0a9addd65be9bee951a5c14de46ded64d0,2024-07-03T01:42:10.710000 CVE-2023-47211,0,0,a0ef4595401d37dd8b29d2fc323b17676b7661bced4aa1a64fabccbb28b16120,2024-01-12T18:44:45.403000 CVE-2023-47212,0,0,e4b744e97170e9653e7aef73e9bd4463f75abab70f78aab5fdd2d54c22932409,2024-06-10T17:16:15.040000 -CVE-2023-47213,0,1,e1665793a7e455f8be34ca60069d1730a8c4691047ad1438b3110f4360ef83e5,2024-10-21T15:35:08.740000 +CVE-2023-47213,0,0,e1665793a7e455f8be34ca60069d1730a8c4691047ad1438b3110f4360ef83e5,2024-10-21T15:35:08.740000 CVE-2023-47215,0,0,006d9d9019e9ff1126e65cfcfae215acec8da92d10c418bb98436ab346f3aaf6,2024-01-02T19:54:38.503000 CVE-2023-47216,0,0,1fe7473bc827bf89e0f3ef200cf4756515ab5473901af2e88d806c60ed3889b1,2024-09-09T12:21:53.383000 CVE-2023-47217,0,0,7eef44a7d9f6d218718d72d8b5c96cb9291c8af3386df309c7148738c54dbb54,2024-09-09T12:21:53.383000 @@ -239530,7 +239530,7 @@ CVE-2023-52913,0,0,0dff51631ec1ab5b0464af1dd4af3149cc942bacf8d31e47da582f111f384 CVE-2023-52914,0,0,3e2f63e6fcc2429a7a056b2f17033ece733c3917a2a011b1363b92bf8c84ed22,2024-09-12T14:07:17.137000 CVE-2023-52915,0,0,ce3c89a4bf7cab80e859d29c06c18dc19c9bdeb973ab832dffae6eeb3861fdf4,2024-09-10T17:12:41.607000 CVE-2023-52916,0,0,bebcac5d0a36cd875bff11f8b42fd7bc5076a3c1c94e9b8c44be74509c12a53b,2024-09-06T12:08:04.550000 -CVE-2023-52917,0,0,90e05fcff592dedf0d13c7b7307ad596010e9baabda0c4fc709b8aed346cfb7b,2024-10-21T13:15:02.230000 +CVE-2023-52917,0,1,fadae4ec5e5aee737480721d0991bf811403c3e8c62826f0e019ee2079cb11e4,2024-10-21T17:09:45.417000 CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000 CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000 CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000 @@ -240253,7 +240253,7 @@ CVE-2023-6053,0,0,884dd7c884b65418d1acc2ea8b654cbf552035c51290cebacf8d437558597e CVE-2023-6054,0,0,7c33b8bac31ea414624bbc9ce8995053ec355ffc65ef3213af66e1a1cc5d7096,2024-05-17T02:33:30.020000 CVE-2023-6055,0,0,503fb1072d5a69bee0e88b6ae09189645d07260e6713968dc7d0b8a2bcedf0e4,2024-10-18T12:52:33.507000 CVE-2023-6056,0,0,35d839e4b514b3336d1caecfe0eacb81ca28eb93db0edbbeacdf9c775d9824ca,2024-10-18T12:52:33.507000 -CVE-2023-6057,0,1,f4716c39b1983c6247cf13c1fd5fcb4cd71b345d51fac06778120005eabfdee8,2024-10-21T15:35:09.613000 +CVE-2023-6057,0,0,f4716c39b1983c6247cf13c1fd5fcb4cd71b345d51fac06778120005eabfdee8,2024-10-21T15:35:09.613000 CVE-2023-6058,0,0,73b7896699c2b4c96224866a8234ed7b0269d34c30da7bf20eae7df4be9ae139,2024-10-18T12:52:33.507000 CVE-2023-6061,0,0,3668adbae0969cfab0fed96f2f0cd588b0f30acaede83213c351da7fed813869,2023-12-12T22:24:14.313000 CVE-2023-6062,0,0,9acfdc2e379d5c765b916ddaf4e9e4b9e3e002ce20adb1082d4167d6fe0776c5,2023-11-29T18:01:56.163000 @@ -240274,7 +240274,7 @@ CVE-2023-6076,0,0,785349ee1b43a84e354166d321001c2befbbadd25695bc0d81584d4bc86bfb CVE-2023-6077,0,0,e66b1452c8e6292f97a54db430f2bf33d302af2002eed812cae50eb7b5b581e6,2023-12-21T19:35:11.607000 CVE-2023-6078,0,0,1932527b21a8099f46ffc89544c26744c754a38dba52bec61da58201006fed10,2024-02-09T20:23:01.477000 CVE-2023-6079,0,0,b8f1006a826661ea0e917e1a7d7f47f594110ed1928962517b4919ba2ad7c6e5,2023-11-15T17:15:41.840000 -CVE-2023-6080,0,0,ec1cfd92520266ba9a9e6c6a183df2f8bee583769bd235099685b5968ea3ffda,2024-10-18T17:15:12.353000 +CVE-2023-6080,0,1,da57850ecced5c5ef7def24af65d321078a5187eed55ad67dbe84254a58c7f17,2024-10-21T17:10:22.857000 CVE-2023-6081,0,0,178b25173627eb0b57b5dd11bc1c806c9af8a3ad415a03ba5ab5f93aed40cc65,2024-10-09T14:57:16.107000 CVE-2023-6082,0,0,4af34e45b57c353c9abf90f47fbc027e75196c20d60a16c38742835a1662ee67,2024-10-09T14:57:13.950000 CVE-2023-6083,0,0,d1560627dc68f7b1a426ece78a2c5533b729fcd47dd7569b2120a5d6118d44ad,2023-11-14T00:15:08.847000 @@ -240419,7 +240419,7 @@ CVE-2023-6239,0,0,b65e4e0202f8c904d3bed9c0b298036f60e92b6b3988771b4545deac730dcf CVE-2023-6240,0,0,9a8f126fd8f5ef282af06e27627122b943a8da0b0302096eb47cb5d50f4fd387,2024-09-14T00:15:12.483000 CVE-2023-6241,0,0,78adb3fd4a8ac4efb92f5a6775561b5f1500ff800960b1d97c9d0a5ad6838839,2024-03-04T13:58:23.447000 CVE-2023-6242,0,0,8cb486488143e74f052ae2f63ddae224c09f708bec76f7ceae67b2e585a168c1,2024-01-18T18:13:53.840000 -CVE-2023-6243,0,0,73d0760b29c715a05af43aac15a1ddb3e52fb7b057ba6d61b1db91034c71d252,2024-10-19T07:15:02.520000 +CVE-2023-6243,0,1,d335978c019637decb6e1cbf801642374a9194568b96344bb5f38cd1064b010b,2024-10-21T17:10:22.857000 CVE-2023-6244,0,0,e75e6775cafe9ec86cf77e396a624ef7fd7fcbcac6b9762312ce1f3427f7fd7e,2024-01-18T16:13:00.490000 CVE-2023-6245,0,0,28e9b7ff9285b21700d4fe9397a4e09496c4b2441b7d2de4ae7c1a7ecf0e3ecd,2023-12-13T14:41:10.210000 CVE-2023-6246,0,0,cf7f0537a32584936060f9a515de78d86839499a8af746409b793ff3b62faa25,2024-02-16T13:15:10.023000 @@ -242266,62 +242266,62 @@ CVE-2024-10115,0,0,2f48f8fc2fb64e7eea0f8a197e6ea039f4addb791184326175f5bf3196ca4 CVE-2024-10118,0,0,20c350d413130c355373caed8d6cb5911ff957b85489cebdf58c361a0299d81f,2024-10-18T12:52:33.507000 CVE-2024-10119,0,0,3a739123963202923959a689b720abc71b056e98e226f3cc9103b43eebd575a4,2024-10-18T12:52:33.507000 CVE-2024-1012,0,0,261f4dda24c2aefd44892a1e7cff84e275a6853943a2bba059238594bb202f50,2024-05-17T02:35:10.090000 -CVE-2024-10120,0,0,6b3a3c91f30d4e7f7b92867d41270f8e6bbf6820b9340444feb31f0b955c3c4c,2024-10-18T17:15:12.537000 -CVE-2024-10121,0,0,77492613cbc8e77c908f5bc147b61203df061f92f405799beb56ad2fd125d7fa,2024-10-18T19:15:13.707000 -CVE-2024-10122,0,0,a490f283489ae27e11673b5491cd15d43b57fb490aa757f2ca9d5ab975ca16af,2024-10-18T19:15:13.990000 -CVE-2024-10123,0,0,715dec68aeff147ac8bb3b91984dfe639b377d42b24487b75b3bb277892b3051,2024-10-18T20:15:02.960000 -CVE-2024-10128,0,0,a67b73dc6f57a0b3a94887822b2256c69bf41055cb13df61c910ec69f48fb699,2024-10-18T21:15:03.340000 -CVE-2024-10129,0,0,ec775af0248379f5d868655b54172a35331f8d92a81885707988267ce16d674c,2024-10-18T22:15:04.013000 +CVE-2024-10120,0,1,c466bf566e1f967eaf89709a18be2244947274563a08f6d81f9be121740d50aa,2024-10-21T17:10:22.857000 +CVE-2024-10121,0,1,027182529cfee940508ffb4070951b9c88b4b8cda22059e126804038d2c848e4,2024-10-21T17:10:22.857000 +CVE-2024-10122,0,1,153862f3f9eb72281b1c72dbca34e4eb5ada0e8c96788af32355e9b86fecda30,2024-10-21T17:10:22.857000 +CVE-2024-10123,0,1,325a6a57a5064913151c5985ffe615d4882dfebfa3dba79aced7ca6e42d126e2,2024-10-21T17:10:22.857000 +CVE-2024-10128,0,1,88b9e310a7215917b3c3eb4a7cebbad5131b0eb240c8e3b152a59db372aef3f9,2024-10-21T17:10:22.857000 +CVE-2024-10129,0,1,ec801a1f21eba257d935123cd915f870568d53f742fe5aad47c455a4df207feb,2024-10-21T17:10:22.857000 CVE-2024-1013,0,0,0ecf415fc1e3c9674ce36da20d6e67872f02747822a72b780ad0899083ff5765,2024-03-18T12:38:25.490000 -CVE-2024-10130,0,0,005b5772134ad7ab3ff093e3d1f3c1dcefb8a6bac854c40ff82f3832025c5145,2024-10-18T22:15:04.683000 -CVE-2024-10131,0,0,ec7f7d7eafabbce2d329a6df322b2a0ff4b203d8976eb09a804b94ea08a31f0c,2024-10-19T04:15:05.300000 -CVE-2024-10133,0,0,1403af45d2d75980e8b273ee70d6599abebda1b60a49d652dd75f4a6f64bf012,2024-10-19T09:15:11.090000 -CVE-2024-10134,0,0,461682cbdde81a87fe2c1d2aa03d035dc5e4253714bf534aa9aadd2b9f613670,2024-10-19T10:15:02.663000 -CVE-2024-10135,0,0,e8914e55b781bff716eafa940f25de30efb583513684251275ba2a3ba698eef6,2024-10-19T12:15:13.247000 -CVE-2024-10136,0,0,e0375517a90e229f8575b14da9742f014680eb77442b5a89ce25ef37d4825053,2024-10-19T12:15:14.110000 -CVE-2024-10137,0,0,33a47f69af14970bc437ebeaf02e36f1b2c715225745b0dc593980e1d4a08c0c,2024-10-19T13:15:11.553000 -CVE-2024-10138,0,0,1b4e7d561938531d13618919ae381cfdda69729bdad56337db9636f70aef3445,2024-10-19T13:15:12.277000 -CVE-2024-10139,0,0,0ed3826709bf9e931ea547c65bfab2710bfb80e53b842917d28eaf89d2532e46,2024-10-19T14:15:02.223000 +CVE-2024-10130,0,1,f6abde51c0a658ac0c1fc5543e76399ba5cf9030b2bf4a0d9258eaf9b51a8cfc,2024-10-21T17:10:22.857000 +CVE-2024-10131,0,1,cb9bf9653b1a7751e7f0fa889c2a9d1f6f68f80fbc6fe883721d1af8aab5c345,2024-10-21T17:10:22.857000 +CVE-2024-10133,0,1,6ac712da64da44a34e6fd349fcf3c834370a70c72d69b9a548fcaa7d1fe57ffa,2024-10-21T17:10:22.857000 +CVE-2024-10134,0,1,6267065d9c293b3c2366b6219e1002e933ab90f824c948f3e215158bad3a34cd,2024-10-21T17:10:22.857000 +CVE-2024-10135,0,1,51210d7ceeda6ad57adce141fb0fe5d97f34f2c51cfc509b6b738e19f13616dc,2024-10-21T17:09:45.417000 +CVE-2024-10136,0,1,985011a8cbab86404ad1262a0de900768324303de4271bcea421e0c9f7d28960,2024-10-21T17:09:45.417000 +CVE-2024-10137,0,1,bc2c34149a45761a81da5b10ebe7c1b04c95cf3414465ff7eb9338ad9c172190,2024-10-21T17:09:45.417000 +CVE-2024-10138,0,1,61aac4f2252384736e3864e34d05c9221c3c79f02b5fa69d26d32db3845eab2e,2024-10-21T17:09:45.417000 +CVE-2024-10139,0,1,1726b6c213396e370c3e4b04d0850b590d91cc1762baa76682000937b0e826aa,2024-10-21T17:09:45.417000 CVE-2024-1014,0,0,8e546db835ee0e62e0f6ed5b95e90d5586231fc78746cbbfef7db3d61b3c5f3d,2024-02-02T02:05:39.277000 -CVE-2024-10140,0,0,aec311209a02b8c14f754431c8bb87bae3f3320865efe32c0e3bd857d5ceadf9,2024-10-19T15:15:14.603000 -CVE-2024-10141,0,0,09fa08cc46cecf31331ef8b05b7e25cdba3a32b1fba57ba9bc41b0aac71ce99c,2024-10-19T15:15:14.973000 -CVE-2024-10142,0,0,8f40432a96404db59ba7840a4b90da81e1beb2e19d77a9cec5d89b9a339af23c,2024-10-19T17:15:10.657000 +CVE-2024-10140,0,1,216589d5556030b905e1bb994d753b8b8b292caccd7a00decd760e14f4219f48,2024-10-21T17:09:45.417000 +CVE-2024-10141,0,1,17ce1823f9e1032ce4106436ffa20ca67724ebc3ab8b7874ba66330fada06176,2024-10-21T17:09:45.417000 +CVE-2024-10142,0,1,20f3ea99900130160c805394b66019c49272761905b5ea7376caa328a388d2ce,2024-10-21T17:09:45.417000 CVE-2024-1015,0,0,5516b1d1af5a9d3814b8a6e102d3692fcdb9c463b2e2645787afdcb157946f20,2024-02-02T02:04:13.267000 -CVE-2024-10153,0,0,53cdd7b1faf79b7014d10984cde91af8d0727db65823fae8333e484880aed2b6,2024-10-19T18:15:02.437000 -CVE-2024-10154,0,0,7e7c002f56d275740fe09f07861e1d8c7c84d5a302d17ebda9002d1cc89af9eb,2024-10-19T19:15:04.090000 -CVE-2024-10155,0,0,c28c867d84c77c1d8b44365b1692537e6e29ecf12a6d0137ca0f337b9f9af334,2024-10-19T21:15:12.220000 -CVE-2024-10156,0,0,83e755790254c7c2e4d1027ae8f6334dc4933aa9f16f90c5f13d6ecf7d7b4b70,2024-10-19T21:15:12.490000 -CVE-2024-10157,0,0,362181b9f0e1b671cc8a04c08fd9c6c09a7b044f8ead6aff71510ce4b4573ab5,2024-10-19T23:15:04.033000 -CVE-2024-10158,0,0,61c36b183ad8ba7da42118e60d74e086d9b8bd47e56458ac3940d73d0c513457,2024-10-19T23:15:04.297000 -CVE-2024-10159,0,0,7e62b5742591a6154426c1fb53ce579061b0e46edac2dba2787045b93d21d6d2,2024-10-20T00:15:02.137000 +CVE-2024-10153,0,1,2fbd10c2c71d513efb87c2c48cecde1fbfd199af11c84818695d5d4188b1e8ee,2024-10-21T17:09:45.417000 +CVE-2024-10154,0,1,a89e619997d8288774c2ce05490a2ff73eb344aeb8d4285d85977cb483586a0d,2024-10-21T17:09:45.417000 +CVE-2024-10155,0,1,c49ad66b6280353deea1ac92102bd84a0088b633622721574658efc5e5cc27fe,2024-10-21T17:09:45.417000 +CVE-2024-10156,0,1,ec33a7f292b44569a8adb5f230aeb1936b5c7869ec9e23524b123525a98d4cc5,2024-10-21T17:09:45.417000 +CVE-2024-10157,0,1,43a24353b216d897faffbe5b5acce030b1a1b5e4f681795fe099b8c2dc210446,2024-10-21T17:09:45.417000 +CVE-2024-10158,0,1,11be81b514db49e0d4c1036e7ab29fac60ab54dcdf053c939bb522543b8de682,2024-10-21T17:09:45.417000 +CVE-2024-10159,0,1,a957e43b8f013253bae388b72bbe1442546c3b250ce9a226033f467eed2129a7,2024-10-21T17:09:45.417000 CVE-2024-1016,0,0,71cf76ab1a6b276906d8ecf764cf0be1d15a9c7c60543569d9e172588701616f,2024-05-17T02:35:10.520000 -CVE-2024-10160,0,0,9b97d8231da276c4c228af1c891ea28fedc3f99702b0d36c447c819bbdfcf234,2024-10-20T00:15:02.550000 -CVE-2024-10161,0,0,6ead8e2c530909e03f3bc00a362c465cb073f5e641b6e06f9353e22c61003e44,2024-10-20T01:15:01.940000 -CVE-2024-10162,0,0,b564add0ec6e615199c70067b83707201004319f151e23bf467f025f869e5afa,2024-10-20T01:15:02.213000 -CVE-2024-10163,0,0,760804505c29a993b3ee60bb0053b8796cff3f61fdbf35c8f9cb4945e46ed136,2024-10-20T02:15:01.970000 -CVE-2024-10165,0,0,1ee5150692a7caaa2f8d2f9cce2d2d3d86fe3d042db0026ad07e240edd08b858,2024-10-20T03:15:02.557000 -CVE-2024-10166,0,0,ee36d7372e2b89408897b5a68fb832be02d6b3e768730f2fbaef49e92c40cd7d,2024-10-20T03:15:02.840000 -CVE-2024-10167,0,0,e5beea9cb4c295a286090ab98b78e03dd1ce66fe9d6d402d0be81c2b1aa4b5c6,2024-10-20T03:15:03.090000 -CVE-2024-10169,0,0,d09a97a6d1608683e29b40fc52428bcec4f907868be75b732e3811329cbb0ca0,2024-10-20T04:15:02.600000 +CVE-2024-10160,0,1,39ac2bf156dc39ee077d3610aca8618443383beab962b00159650b8b309870e8,2024-10-21T17:09:45.417000 +CVE-2024-10161,0,1,8fd8b3180bd09399bfa659caa70bb1a8447b61c2f2436446da055256915430c9,2024-10-21T17:09:45.417000 +CVE-2024-10162,0,1,94cad70254661d6f66fe1ffeef44715e7f3687893d620f0b4d4b9fe91fd30213,2024-10-21T17:09:45.417000 +CVE-2024-10163,0,1,9b28215d70d6803fa02b8f91773221fcb00ce8e2ccbc25ea7d995d6ba8095203,2024-10-21T17:09:45.417000 +CVE-2024-10165,0,1,af33e6c84fb24a12266113d886a6c62172a37d83283eb52bb3b3bae79a2d30c7,2024-10-21T17:09:45.417000 +CVE-2024-10166,0,1,c02796774fbfad39072540da70f572ec18cfe723462ac98aa668f4ded95cd25a,2024-10-21T17:09:45.417000 +CVE-2024-10167,0,1,7ad81aa5e3faff9fd4be8885b7196a53b9bc768ed5519afa8c13456c816fccc0,2024-10-21T17:09:45.417000 +CVE-2024-10169,0,1,e8e6c9fb9383945c3d410fc4f008280f899970c875613eff84d409b4d2eaf686,2024-10-21T17:09:45.417000 CVE-2024-1017,0,0,50b68641acb97d381e6a65107328f0dab0fccf027bea27ef0f379cc058119760,2024-05-17T02:35:10.627000 -CVE-2024-10170,0,0,eadc15e054dff92a72c41bb061c16d2faf69911f67d05dd4dcda672e37172826,2024-10-20T04:15:02.920000 -CVE-2024-10171,0,0,60d7017912088a83451045313890efea0a3c4a8f38779b7c5b7680aa67b3fb1b,2024-10-20T05:15:02.363000 -CVE-2024-10173,0,0,694065e426755de8442b8b1e2a83d2200f1796f2f77c0caced3c41944e1a6b83,2024-10-20T05:15:02.830000 +CVE-2024-10170,0,1,e74978c38cd6ed16ba78778da65e688748cf710b3030d5cf952802d91f4b963a,2024-10-21T17:09:45.417000 +CVE-2024-10171,0,1,481df1b8718c33e758d1a94b88a3698e27a92399d99d0fda0b9748fff3238e54,2024-10-21T17:09:45.417000 +CVE-2024-10173,0,1,f6c48dfe45f526ea19e91b20ef708b171d9e0a76591dad105e56c584bb12efdc,2024-10-21T17:09:45.417000 CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000 CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f6841,2024-02-20T02:15:49.973000 -CVE-2024-10191,0,0,0d543e8a82bc8c79a47d9712105c05a38228b23d0440b597d65516663ce860f2,2024-10-20T06:15:02.413000 -CVE-2024-10192,0,0,9f3a26656d3a0aa5ee219d066ee638d49fb09c17860b4f18ed9a6f860568e3c9,2024-10-20T07:15:02.103000 -CVE-2024-10193,0,0,b93daf4f357fcb75b4b37e60362b781cc35ddbaaea37fe390b0a2133c2aa00aa,2024-10-20T08:15:02.300000 -CVE-2024-10194,0,0,01d2cafbf34c62e6f1147d9592057704a8ba426a02b5123a102e0bc34f4d9f79,2024-10-20T08:15:02.710000 -CVE-2024-10195,0,0,ed593f10b27233229e70d7006e552e63b4bf846b117fb3ae7173871eb91ce5c3,2024-10-20T09:15:02.393000 -CVE-2024-10196,0,0,ee1cf86004a08bc66a40ce7fab7cd92b4df29cd21692f664a994fb9ea341a0bc,2024-10-21T01:15:02.230000 -CVE-2024-10197,0,0,0f4c7b0f1324f1028f59c6eea75b7680e53d8c2cba987b1b9d71fb6f14bbecae,2024-10-21T01:15:02.687000 -CVE-2024-10198,0,0,e50ec102560503824c1906a6ce9e160e44334b56699bcb1ddd7e7a8fc8253c03,2024-10-21T02:15:02.133000 -CVE-2024-10199,0,0,e0c59945948bc46b98115fe8189e2d8c5ee7ae03f6b32f5e7c36095a253b5217,2024-10-21T02:15:02.403000 +CVE-2024-10191,0,1,ae2a8289213669e84c05751a0ddedb62a99a16d3765a4056a543c78131666882,2024-10-21T17:09:45.417000 +CVE-2024-10192,0,1,a018e9c3521bd9c30ec2d3bd523510e5e2587cb1110ac8cef21439ccf68f8983,2024-10-21T17:09:45.417000 +CVE-2024-10193,0,1,1edc42ac3209c75585ec8c6b26eafba6b0b9f2d61f9e6b3760f20c0ded29aa99,2024-10-21T17:09:45.417000 +CVE-2024-10194,0,1,2306506683b8321312c529c12d5538fdae946fec3d958eb6a86af3539ec3be4d,2024-10-21T17:09:45.417000 +CVE-2024-10195,0,1,433002dc4be76148bf0f1e8e85e5de7bd9f18de30e21fefcd1f30061067a4930,2024-10-21T17:09:45.417000 +CVE-2024-10196,0,1,0b052761dda527c9d578bdd237c16d6bdaa0a843794729a716c520574b82f796,2024-10-21T17:09:45.417000 +CVE-2024-10197,0,1,6fe37138acc52d09938e9bcb1e310dbdb2ac9977a35ddc0fec14852ea89360e5,2024-10-21T17:09:45.417000 +CVE-2024-10198,0,1,abaf2f4f42f61232b1970455cc809d0b90eac525f7e4d983a9e1b33ce83b71e9,2024-10-21T17:09:45.417000 +CVE-2024-10199,0,1,d17ea3e31997aeb62dfc2073f0f254329b606ac3ba3aeba5ead205c107ce186a,2024-10-21T17:09:45.417000 CVE-2024-1020,0,0,d848db5207b830f092dac5463c394c0f65f6423556f55d15e70d177c797c2de1,2024-05-17T02:35:10.867000 -CVE-2024-10200,0,0,8a0a5449263ceb6d99052019049485c29def119be58a456e70ed636c534defde,2024-10-21T04:15:02.513000 -CVE-2024-10201,0,0,0268e5b8055cd4f9391da1f46cdf30de5d78d63eea8f3d57c03ade7c051060ac,2024-10-21T04:15:02.893000 -CVE-2024-10202,0,0,5976aed508a7dac4042f88f75913f32bf73c23fea0278b2e8d75d8199f94ef6f,2024-10-21T04:15:03.900000 +CVE-2024-10200,0,1,490aa25fdf12ccb46c8a818662c15261aecf127ca00516740d200e5fc0c849a5,2024-10-21T17:09:45.417000 +CVE-2024-10201,0,1,fdd706f65f7aa0e194f575c5a7304653f1f8e37bb0097e52a009edadbfcb9ca7,2024-10-21T17:09:45.417000 +CVE-2024-10202,0,1,3a01bc3efcbe4e17c6fdc2e9102f4cbe8dd4afeaccd594b0d2eceea29302f820,2024-10-21T17:09:45.417000 CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000 CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000 CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000 @@ -244195,7 +244195,7 @@ CVE-2024-2123,0,0,0719ae4bee332af79c93b8620c3a1fe6da02de27a90f1595704940d001e25d CVE-2024-21230,0,0,c4e17944ebc3bfcbdf78b6336940e6a6054992926ab544142906aebeac23eae0,2024-10-16T20:42:35.450000 CVE-2024-21231,0,0,36b78c7f1d40d41b87ee14c511c304eaf9286e1b39ae47f4ae34fcf1169219e8,2024-10-16T20:42:13.877000 CVE-2024-21232,0,0,d3c11f941e85cc6d35f85f7ba5765b381a26d5c1e4add84f192886aaa77d4741,2024-10-16T20:41:35.300000 -CVE-2024-21233,0,0,c9783dd57fb83771b881b9eacb5204e315de62042e4503d88ca492207b5313dc,2024-10-16T16:38:43.170000 +CVE-2024-21233,0,1,db916875daedb62629bccfe5fb1ce39819ce2a0da14cc99f4bb5c053119755db,2024-10-21T16:17:34.617000 CVE-2024-21234,0,0,b3b8ed4e786067e578b55ed1ad884f7dcaf26511a099c1b0304d1e83b0941272,2024-10-18T19:05:00.380000 CVE-2024-21235,0,0,e8b8c6826fe22ed257db7bc493fd1c19c482c81b703061b649ee81dc38c96926,2024-10-18T18:30:26.097000 CVE-2024-21236,0,0,f3064ccc3b1d0405a68efbf4a4a2fc151335deb597e7bbeb33d75084dfe01195,2024-10-16T20:41:14.010000 @@ -244204,7 +244204,7 @@ CVE-2024-21238,0,0,04b43b7dfcf632c90dd367c6beee91e01080526504fa7fe217224e883f00b CVE-2024-21239,0,0,526fc8375712e973ff0d45003cae230ec5f44402442ae70a546b37d628f02100,2024-10-16T20:36:59.973000 CVE-2024-2124,0,0,49dc310dcf10d520f5d59cd2423bf19b84e2577ed2ccf7fa71616fe601b6b6e0,2024-03-20T13:00:16.367000 CVE-2024-21241,0,0,653a64e8940346f0241e59fbad90640ce2853b3ef07ef0bd409dac1e90cb0ec1,2024-10-16T20:36:10.917000 -CVE-2024-21242,0,0,4c73a750a7f36ff82501f6298ac5738a0ddbb4311643eef000b37616474c37f2,2024-10-16T16:38:43.170000 +CVE-2024-21242,0,1,9b0dd9d7722f325a791c44b08253fdd487b5c95d236311ccc5123d9bf999bc7d,2024-10-21T16:17:57.040000 CVE-2024-21243,0,0,0fc41f40153463683032ac1bfc5c5f45a9ef74d8033ddc59d83f59345dd7fc5e,2024-10-16T20:35:41.957000 CVE-2024-21244,0,0,a2d8857947cab47435f13652b22d7660077ec99971dc97d0f1c04da6d4b605c6,2024-10-16T20:35:00.173000 CVE-2024-21246,0,0,ce26d4699cd66244be859e323ba861645fea4d7c63493af05a19982e79b3ffed,2024-10-18T19:04:57.587000 @@ -244224,33 +244224,33 @@ CVE-2024-21259,0,0,f4f5607ed9f1a78aaccb5e08790e38092d26477ddc636f65efb0050b27293 CVE-2024-2126,0,0,4ce1f11f7bd5c084b75067cba762f3a64c791e384d09fc3623bdffa8d2aef429,2024-03-13T18:15:58.530000 CVE-2024-21260,0,0,7a47438a9729091b847bae11b79b0b39e45eeeb29dbb35a8c4d79bd78f465c02,2024-10-18T19:05:29.830000 CVE-2024-21261,0,0,264e20afc2c31861a3dfe0c50868999e6336c9bde09d592ac30112d480df1de2,2024-10-16T16:38:43.170000 -CVE-2024-21262,0,0,e19c4ff7421a278fdceec6eb223f5a1ccda273af6c221fea77dc4182cf357f44,2024-10-16T16:38:43.170000 +CVE-2024-21262,0,1,82558944e30d58821a3281c570a2d377b7ec0772f885917aea1c19c8d3bb4a8f,2024-10-21T16:28:16.427000 CVE-2024-21263,0,0,7ac7bc00544efec065b7a3ea0c417046cafbfd2ff0aea2fefa7b4595b67183a3,2024-10-18T15:00:52.463000 CVE-2024-21264,0,0,43edc8b0674a64ea84e7381a14394594bbb3f638fa4e4e95e2e0a620c8f8163d,2024-10-16T16:38:43.170000 -CVE-2024-21265,0,1,c55c1df1e1622cf6e643b1eb11b86f0a45ff8d2660ab5a45972681fbb6ed81df,2024-10-21T15:49:21.027000 -CVE-2024-21266,0,1,eb9a8a34ffd00406d4abf6e4a3c73c351bf9d5c51c3a336b85b5cbd4050db042,2024-10-21T15:49:43.940000 -CVE-2024-21267,0,1,badeabc98b9ebca68fd4a6f1dc13051a7275b459f1ba8064226c678286ad482a,2024-10-21T15:50:27.217000 -CVE-2024-21268,0,1,3dcd1072414d3ab2cc0e8cf25a936039d7a198cd15695ae150a849e0468770e4,2024-10-21T15:56:01.437000 -CVE-2024-21269,0,1,3aa0df8b906fc13a36fa7458f181578320c2053153721de033563f42b3b1480b,2024-10-21T15:56:49.217000 +CVE-2024-21265,0,0,c55c1df1e1622cf6e643b1eb11b86f0a45ff8d2660ab5a45972681fbb6ed81df,2024-10-21T15:49:21.027000 +CVE-2024-21266,0,0,eb9a8a34ffd00406d4abf6e4a3c73c351bf9d5c51c3a336b85b5cbd4050db042,2024-10-21T15:49:43.940000 +CVE-2024-21267,0,0,badeabc98b9ebca68fd4a6f1dc13051a7275b459f1ba8064226c678286ad482a,2024-10-21T15:50:27.217000 +CVE-2024-21268,0,0,3dcd1072414d3ab2cc0e8cf25a936039d7a198cd15695ae150a849e0468770e4,2024-10-21T15:56:01.437000 +CVE-2024-21269,0,0,3aa0df8b906fc13a36fa7458f181578320c2053153721de033563f42b3b1480b,2024-10-21T15:56:49.217000 CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73db,2024-03-08T14:02:57.420000 -CVE-2024-21270,0,1,4a518ed4b4cb6782124ba33794cc612bc75e39e255f383db2126551f87987c2d,2024-10-21T15:57:11.543000 -CVE-2024-21271,0,1,e631971eaba508d2edef987dd71912b09098da9e3a257d0702e20d89bdd0191b,2024-10-21T15:57:44.370000 -CVE-2024-21272,0,0,b1bba3bd561fed845f5697e78a01e3d097ac96d0e986ce7c0428031a9bfa25f4,2024-10-16T16:38:14.557000 +CVE-2024-21270,0,0,4a518ed4b4cb6782124ba33794cc612bc75e39e255f383db2126551f87987c2d,2024-10-21T15:57:11.543000 +CVE-2024-21271,0,0,e631971eaba508d2edef987dd71912b09098da9e3a257d0702e20d89bdd0191b,2024-10-21T15:57:44.370000 +CVE-2024-21272,0,1,b7e1605498b3e1a2e06d2fcf16ce428daec611cf69ca556b5569c8b03706317c,2024-10-21T16:14:28.780000 CVE-2024-21273,0,0,ed7e5def9d03e01a957f39d2f68dd8ee0f06806bdce0a2f3b8054840f4b49927,2024-10-18T15:02:45.267000 CVE-2024-21274,0,0,289f485fff477f3f1498b04fff96f3faef68a497affa5a5e137da23e9d116f59,2024-10-18T19:05:51.583000 -CVE-2024-21275,0,0,ff30974f12910859b0b0c97a4bf2ed1c57d0df95e60f3b76be051f309649647a,2024-10-16T16:38:14.557000 -CVE-2024-21276,0,0,88d1013768cd71bd50481a7f9f9a7d712b0c325c8d7c52c3ec4f2c43d050e298,2024-10-16T16:38:14.557000 -CVE-2024-21277,0,0,830dd2d7d7e14641e53154d60d94cda7bd0acc28101b04a7038c064c53fcaf0f,2024-10-16T16:38:14.557000 -CVE-2024-21278,0,0,fb5dc01e8f2a214bbabb748bfa4fafcfc6b7ab1659b95a09c2dbe590f3b946c1,2024-10-16T16:38:14.557000 -CVE-2024-21279,0,0,11ab356e8a2ffeec084a4b6869044b54c98feb0b1ccaefb36399b1f0082a72bc,2024-10-16T16:38:14.557000 +CVE-2024-21275,0,1,eda616394b4ac3d65a9275fbd9bb1b8cd041bccc3f2167d9bc81c62ca9ba58ff,2024-10-21T16:05:07.587000 +CVE-2024-21276,0,1,deda61d5cd5309d7c8b7f28845521e45550ed20864e23c909dd53a86718c739b,2024-10-21T16:06:30.230000 +CVE-2024-21277,0,1,3f1a5d6e454bb71a0744d0c4a2cca16602079dea3b606c38f337bb7e3c3a9d83,2024-10-21T16:06:47.313000 +CVE-2024-21278,0,1,5dab9dbd59b3d6c1c06eeaa94cc602e5ba5a589896688fba97c85fa7d3764f24,2024-10-21T16:07:08.597000 +CVE-2024-21279,0,1,4c6015a845d6fd4dd9412730103956e4c8494e2e2e32757e0d4e0945608f0544,2024-10-21T16:08:39.683000 CVE-2024-2128,0,0,ad241575873847a0cb8491370112d4603dbee504ed1e31d448d346ee3b31a6d6,2024-03-08T14:02:57.420000 -CVE-2024-21280,0,0,5156962358b991c2fcc9b491a164c9075e14fea3ef262c0f3a5e6c231d17be56,2024-10-16T16:38:14.557000 -CVE-2024-21281,0,0,fe654a0043295e853a0435434a40fb37f40af76db1c541ea163ce31caf5a2662,2024-10-16T16:38:14.557000 -CVE-2024-21282,0,0,b5fc9e7b277822785b6b2eecaa3af296e14f31d1210b4465c7c41d349ffd3f1f,2024-10-16T16:38:14.557000 -CVE-2024-21283,0,0,5b9131a58fd240835bffeb334ba4c0f4fd3efcccbcbbc66c489f69e6132ff021,2024-10-16T16:38:14.557000 +CVE-2024-21280,0,1,124214ec7f3bd6b5528df97445b5b094f1160a498e00b2ef96746ed9c07c447b,2024-10-21T16:08:59.440000 +CVE-2024-21281,0,1,2f0691ef7449ccc965c9aeab8dcef1281bc28d4a30186b9d3508f4a557481bf1,2024-10-21T16:11:15.620000 +CVE-2024-21282,0,1,009a2200cef6dd5f09dec46a9dd296fb2f3f5ca8bb77dc76565753bb0966b9bf,2024-10-21T16:12:01.550000 +CVE-2024-21283,0,1,0ddbb462ca0821dacd37d3533c526ba14fd88aa793b081385070a77512efde19,2024-10-21T16:13:04.547000 CVE-2024-21284,0,0,b26beb8928847ddda7596ad1b5456aaf9e461763a25565fb76df745f1499af72,2024-10-18T16:45:58.217000 CVE-2024-21285,0,0,94befa20d99f1e44a7a6e1443028684d2864251495f642087aa70fa909cebf20,2024-10-18T16:46:27.283000 -CVE-2024-21286,0,0,fa8caad2cbdeb465e9a7c9d2c279d3a95ff5551a1c3918c0e458dea9b0ff9821,2024-10-16T16:38:14.557000 +CVE-2024-21286,0,1,165be3dcf0a6405bd236710f2cf171c0d7219a16c20a273c1cdda02d4e5f4acd,2024-10-21T16:16:31.867000 CVE-2024-2129,0,0,5f52407743c1f969b3fa77917deda7339874ee16ffe5a9c10d3a77b843fb1d95,2024-03-20T13:00:16.367000 CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000 CVE-2024-21302,0,0,7f391d893a5dfcd3f80503750e1f19b379a4e74727dc288c2f0c00e1775f3cc9,2024-09-18T00:15:03.243000 @@ -244504,7 +244504,7 @@ CVE-2024-21532,0,0,a24d27f47c5298fab706ab72282873a260fc61d5e510f460d432a2b7b9c38 CVE-2024-21533,0,0,b6d94b5290ee8a666e06ea3154c21a82f3a037332835b4cbc04bf2409f97ee11,2024-10-10T12:57:21.987000 CVE-2024-21534,0,0,3641068338a125cfc76dca395aebd37e2004a05bbcc966c1678ccbc5dcd0ba06,2024-10-20T12:15:02.757000 CVE-2024-21535,0,0,2e7744380a1db7060122e5ae23002590579ae07efcc1f1beb06e6a3a8350e174,2024-10-17T20:36:29.213000 -CVE-2024-21536,0,0,770b7890e55d0cd49ec2dc3b9448202fd5362d352ddf0a63d1e9f0c254f1d18d,2024-10-19T05:15:13.097000 +CVE-2024-21536,0,1,ae629d9ab98963890f886285a55767a6d8dedbe865d46e575265103987fe6f1f,2024-10-21T17:10:22.857000 CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000 CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000 CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000 @@ -250024,7 +250024,7 @@ CVE-2024-29209,0,0,524c07895762e5b44d3e9ef1c206b4e7d4d5b3430c7ff6d4160e0e7acbfcd CVE-2024-2921,0,0,f4e342ffc58e19f9931b03228666e88722fb82add7b9c9b268ee78781cd5e71e,2024-04-09T19:15:38.423000 CVE-2024-29210,0,0,35f2fb1127989a840ec44eff998dd4dd34dd991643ed4983f752d1672da1ba01,2024-07-03T01:52:19.497000 CVE-2024-29212,0,0,1247faf67a6d05877ef4c24ac6b7bb7d5fbf779bfef43566ef9132ba263c1abf,2024-07-03T01:52:20.207000 -CVE-2024-29213,0,0,6fbb348fd63eb83036c89053fa1231f8f7e639481d63676f02eeb11a2643d4e2,2024-10-18T23:15:03.180000 +CVE-2024-29213,0,1,f5de2ed947f0be2e60319368323b177733511fdd292c3021cc757668005611d0,2024-10-21T17:10:22.857000 CVE-2024-29215,0,0,c3b478aa1710010c8b99ef1ca4fa2246febf1b61f49cb0a36af3387869a40afd,2024-05-28T12:39:42.673000 CVE-2024-29216,0,0,2aed50ca06d94573fdcea13916b8acc52550da1faf8cd9bfb64a818c7964e9a0,2024-03-25T13:47:14.087000 CVE-2024-29217,0,0,1379e154758970ea220e13f9d29020765e0cdb03091ce67a8deaa8fc55306947,2024-07-03T01:52:20.987000 @@ -250300,7 +250300,7 @@ CVE-2024-29818,0,0,b43be17b77573322064c5ec9d358afd6cf43c212bfe31910c801278a1ce0d CVE-2024-29819,0,0,4749576a07ae228f73869f312addb287fdf690803f9e8863734daca01a87fc2c,2024-03-27T12:29:30.307000 CVE-2024-2982,0,0,2211724d734198d9fb233becb17ec8dbde10e8455d29ee4fab78e86ceaba5ae1,2024-05-17T02:38:40.403000 CVE-2024-29820,0,0,2528d491aed96a02281e4f078b8e3f22ccbe89d79da1f8a661b52ce76993e523,2024-03-27T12:29:30.307000 -CVE-2024-29821,0,0,bc2ef8f4c2ed49383992226fe6e5c22d3879130ccf77835132479fc098c75e93,2024-10-18T23:15:03.357000 +CVE-2024-29821,0,1,181c60524b59410f9eeb676091b816425901a2cfd4463b152697a3b9082b927d,2024-10-21T17:10:22.857000 CVE-2024-29822,0,0,5d2c9e00bb0fe2f46c08dc837f1280f283485a53b01db1b74e5b392194998b98,2024-10-03T16:45:19.060000 CVE-2024-29823,0,0,7935be43b4ac46d887d4f03748872441ac79f4dab527d9f95095fada77eba679,2024-10-03T16:45:20.897000 CVE-2024-29824,0,0,1b740fa01a83c6e4b995d74f425eef2cbb5e7538bcbdf87088945ee820fd5f8a,2024-10-03T16:45:28.117000 @@ -255870,7 +255870,7 @@ CVE-2024-37397,0,0,7fbcc51c6b175128d4a712387aaad70ff152c7c1c439f81c942699a1e4599 CVE-2024-37399,0,0,308e730bcc199d112d6cfe8bdbdbf7120fa96451bfff020b7962dbf1afddf5e4,2024-08-15T17:31:49.067000 CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000 CVE-2024-37403,0,0,82a2fe28b07e6e9fe5e86dff02fa8c242d19ac626eea029ca875aeaf76338b4d,2024-08-12T18:55:15.890000 -CVE-2024-37404,0,0,cd214d8a925301ee0e522cf51a25edcf6f91d2cbf62f642761917d74cd40f9ab,2024-10-18T23:15:03.580000 +CVE-2024-37404,0,1,a9ac90f11e155ac4d0d36b2a91e96a4497dd1cae869575802b2f49a891e5af01,2024-10-21T17:10:22.857000 CVE-2024-37405,0,0,a7f42023569aa18cbb4863def372451bd6a310533c03fc36f82684a5a0e2908a,2024-08-01T13:53:37.273000 CVE-2024-37406,0,0,0fc96b9728d7b33874b8b927ffcfbb0aa2fa093e9dd7d9d9f4b8cbcdc1f0c64f,2024-09-20T12:30:17.483000 CVE-2024-37407,0,0,b2071e78ac73cfcd8ee3f67daccfb5fa834666925d4b4867e66acc10a01216e8,2024-07-17T20:16:52.400000 @@ -257944,6 +257944,7 @@ CVE-2024-40740,0,0,b418443d865eec432c82a04de65de6e9b39f235788ff127206843cf6bdb7c CVE-2024-40741,0,0,d8d483a0abb3b7648774c6f8d0ea3345aaa4bf40cdd21fdc9df2fcbe837ed8fa,2024-08-01T13:57:59.147000 CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000 CVE-2024-40743,0,0,4e2bb12b39654c0a7fc101446a81422e3ca7ab692f01d12e73f708088891a69c,2024-08-21T12:30:33.697000 +CVE-2024-40746,1,1,1323a4d1eb53065b11fb3ea06fca0403aa033fdae8ae40cf5d05d01281201792,2024-10-21T17:15:03.330000 CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 CVE-2024-40754,0,0,1ec64db92f9c8a84c8628e1cdeeb1b227a772e83fb8bf52c0f582741174a2abb,2024-09-10T14:35:04.833000 @@ -258657,7 +258658,7 @@ CVE-2024-41834,0,0,13eed51b4e049020c7f638e068eae53ccda0a6881cd4fb5749936291f43eb CVE-2024-41835,0,0,79c86df6665f091ccf38637e3904931e0a79e20c4f60784272f388a048f561fd,2024-08-15T17:13:11.837000 CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000 CVE-2024-41839,0,0,9a0f787d6e23b303277da94f6b7fca243c6839137dcfdc0b22d503addf44ffe6,2024-09-16T13:15:10.250000 -CVE-2024-4184,0,1,97f0f6e60ab54d01538d6d4b2a509ea43c378ea58cb11870c912ba2b10ca82d6,2024-10-21T14:09:02.020000 +CVE-2024-4184,0,0,97f0f6e60ab54d01538d6d4b2a509ea43c378ea58cb11870c912ba2b10ca82d6,2024-10-21T14:09:02.020000 CVE-2024-41840,0,0,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000 CVE-2024-41841,0,0,b3d7229e1df9655b819c6cdfc619b24790032230acf9c060fa1958fc581d2315,2024-08-26T14:08:05.547000 CVE-2024-41842,0,0,081439e1e1c0c36fa35dfc90cd7c1dab0afb799471eb093958cbeb73afdd7760,2024-08-26T14:08:17.263000 @@ -258705,7 +258706,7 @@ CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000 CVE-2024-41888,0,0,551a193b56683c8a955974406454da46e806e6e58f5cbc2dcb8dc5dd231b91d3,2024-08-29T12:55:09.210000 CVE-2024-41889,0,0,c2f8146a4c074f06a28a6e2235a6e3d92ccee3a8823a7bd377c0c9b959c16c5c,2024-08-30T17:53:40.897000 -CVE-2024-4189,0,1,b15b5d19a4afbfbc333cece3d1c3d72ee722494b6d9c37e3d6f01c5f9d0416f9,2024-10-21T14:08:57.430000 +CVE-2024-4189,0,0,b15b5d19a4afbfbc333cece3d1c3d72ee722494b6d9c37e3d6f01c5f9d0416f9,2024-10-21T14:08:57.430000 CVE-2024-41890,0,0,a90af16c8c7558e5227ebbc511a4c71519b3a4532e07b0a451c0d8da1663fee0,2024-08-29T12:56:47.413000 CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000 CVE-2024-41902,0,0,43ae61ebce9a8b7d3996bceeab15083df998500c68f80ca3ea2bc52db86bbada,2024-10-10T12:56:30.817000 @@ -258884,7 +258885,7 @@ CVE-2024-42106,0,0,d1be86d3a499fcbbd48fa48666a765f712be1dd5a6b971ade33744c711a65 CVE-2024-42107,0,0,6491957e69d9efbbc6993b086ea49c99500b6fccef3248643b058f90720776c1,2024-07-30T13:32:45.943000 CVE-2024-42108,0,0,07a55e64558b7f3e959e84e219b350a11c328136e4e4f1bc5343262d1bc114f5,2024-08-21T20:52:35.470000 CVE-2024-42109,0,0,7426022d2af0b7bcb0572ef1095f4b2b07e4bd980abf97c7236bd4ffbdf0f678,2024-08-27T13:44:00.143000 -CVE-2024-4211,0,0,97eff23e3f499ef8da6f7e4387f7b650f119a37f1d573bea23ebc2e11144f313,2024-10-18T12:53:04.627000 +CVE-2024-4211,0,1,f8fac2e5f1d0c57faf2dc7d3bf67ae0924f2d3ec75589c3075bd3ea73d091bd5,2024-10-21T16:15:09.963000 CVE-2024-42110,0,0,d32e698de0e7b17bea1969eb2144abdc6b889fd7317c6b8113fda73d076657e7,2024-07-30T13:32:45.943000 CVE-2024-42111,0,0,54db76ff7e8130362d41c492aa2e759d1e30f80ea24bf90a20c876a40458428a,2024-07-30T13:32:45.943000 CVE-2024-42112,0,0,053ed3da7b6fa8b9c64b9dd46522be8c0a3889161664650c546eddc66722489c,2024-07-30T13:32:45.943000 @@ -259204,7 +259205,7 @@ CVE-2024-42504,0,0,73b4e7fd81224455554066b5ec07433b0220ee7fb806342f0ac7873775612 CVE-2024-42505,0,0,2fcd58f857ce6c82725ed74b63d72047c82b9583f361cc1246e436db45ee28c1,2024-09-26T13:32:02.803000 CVE-2024-42506,0,0,a50836bc4b1264acacafbcc6caa08df43b3dfb5e0abc0c4e6db32750472d07f5,2024-09-26T13:32:02.803000 CVE-2024-42507,0,0,b57055df85850f2ee370e2a3273bd68424b888342bc78e94d00bb509124921a9,2024-09-26T13:32:02.803000 -CVE-2024-42508,0,0,7065d22c76abd7e0ff3549c7e9856001a62ab0757046210fe27993cc5f84695d,2024-10-18T16:15:04.710000 +CVE-2024-42508,0,1,4c1ae890f2c3f0db62db47cdcba2c7ec1dc0cee4a414a788be9754d3fe7b5259,2024-10-21T17:10:22.857000 CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000 CVE-2024-42514,0,0,a1f5f6b924755707c5bb385a67dc5d2ee260ba09c0f77899dd6a3e1d47eee9c5,2024-10-07T19:37:19.973000 CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000 @@ -259772,8 +259773,8 @@ CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69 CVE-2024-43480,0,0,082909a3b58d266f11205389eef04cec75ad90be250bb009c9909fcf6c15f589,2024-10-17T21:14:20.777000 CVE-2024-43481,0,0,fa0a86aff51fa534acc1bf04e9514a8b9ae5e4b98d0edc7dae95695ec2e5df10,2024-10-16T21:34:19.840000 CVE-2024-43482,0,0,d8f402bc0f3ce251083854e9d472514518876444465b9e6fddf99899cdf432df,2024-09-18T14:11:50.303000 -CVE-2024-43483,0,0,1d7db9c5e69dcdca637dfe316d79600af52269047705da1f16bf4044dcdc7aad,2024-10-10T12:56:30.817000 -CVE-2024-43484,0,0,05b3769755aefb3d20c2bb57cfc82a5ceb5d643ad8398f399763e63011e3167f,2024-10-10T12:56:30.817000 +CVE-2024-43483,0,1,2a21f19b6ee33c4d4ab036de56fe28511c1c49ff9f4c577369d2fdd9684bd311,2024-10-21T17:35:34.827000 +CVE-2024-43484,0,1,2aff961590fa56cdbb2c8e494b028e421066c209b13d02c2bf1f3f38ed845831,2024-10-21T17:35:44.460000 CVE-2024-43485,0,0,29444328f72abd94db2e2d7fb1ffd23577a03c304effb01c158d7c0fc0ea4e2a,2024-10-10T12:56:30.817000 CVE-2024-43487,0,0,b1bbbe6f3eeb8f594d4cca9a1e5f97347bd8ae24b6674c21dd2e36175fe4aaad,2024-09-18T14:10:20.320000 CVE-2024-43488,0,0,77f6f6423bdd8555de92dc96aa2c0828d81550946d3c9fa13293b1d31c3b2806,2024-10-10T12:56:30.817000 @@ -259861,7 +259862,7 @@ CVE-2024-43573,0,0,7cb2a96662a466abf265ca3d01d38469acb4c1db062ef75727d0e2c8e1756 CVE-2024-43574,0,0,27cb32f4bd91a68a1d79359c4fa56d2ab297703b1b8d3a2c872a415c852b6007,2024-10-17T18:58:37.100000 CVE-2024-43575,0,0,24f2c5a591586cc897a2d8a6a2db6f48b0fde505b74f11c59d7d9cf153abc125,2024-10-16T21:53:59.407000 CVE-2024-43576,0,0,fe1fcad43644aa438f5b12fd73a64989a355f1461202f1bc35d3359c0344ca8c,2024-10-16T21:54:24.047000 -CVE-2024-43577,0,0,269b5eddd8412982943c9ba176ed3cf3f91f2879618b752b4730034b338d4b9e,2024-10-18T23:15:06.510000 +CVE-2024-43577,0,1,9c001169f8d29d26d0d5c95cdd133d9ce3de19c6716ab9be96916c0c8c8f1d05,2024-10-21T17:10:22.857000 CVE-2024-43578,0,0,6e078fa937e90c65f5f983f7a227c4832334de65ca7467e3741fe920a590572e,2024-10-18T16:59:29.557000 CVE-2024-43579,0,0,75408e79b417f23da70191f7a80539f890575fc25e973282afc3f46a6611c497,2024-10-18T16:54:06.810000 CVE-2024-4358,0,0,947921f329844fe043b805245fd7e3c28f7c0f168bb436200605d302b39b1665,2024-06-14T17:59:33.993000 @@ -259909,7 +259910,7 @@ CVE-2024-43685,0,0,a89a9c99e0124da64988793c53f10ebfe259e8367a37913b86ec873ac50d0 CVE-2024-43686,0,0,57da9b9a959d579b6b38566543c182c3ea32961f0f4f75db16d108202427ec80,2024-10-16T19:20:57.230000 CVE-2024-43687,0,0,2d688f9009e177644291437898c6abc2a42e1449965d5242ebc6bc49d96ae3d9,2024-10-16T19:28:09.177000 CVE-2024-43688,0,0,f39d1b1cd29869db949f77b65b174936ed5c42e4fb24c070ceb5bc7ef518b2eb,2024-08-26T14:35:06.680000 -CVE-2024-43689,0,1,6e8402bbedf3e2a03fb0b6ac9aaa8ee42da21a41185d63e8f261bfcc15d7ce47,2024-10-21T14:35:08.110000 +CVE-2024-43689,0,1,fe54f922e4493fe8e62745757964a53981d998fc64b2a31c99a382f9d913ebf4,2024-10-21T17:09:45.417000 CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000 CVE-2024-43690,0,0,d9d35b70595ee9d0c288460e486611e2e8293b6f0702f7c86364e442cd6413d7,2024-09-11T16:26:11.920000 CVE-2024-43692,0,0,dd90c0c7ec0961e33104688c3a64f24371b069eba59a503241b07b01ecbb28f7,2024-10-01T16:22:38.197000 @@ -260103,7 +260104,7 @@ CVE-2024-43941,0,0,65eb65a5b19127de85b2ed3f09e3f3a2fc43c5d3fc64b0022b1df003f93a2 CVE-2024-43942,0,0,e66d301ff91d4e3d6c85080e28c55dc563393fe5e437a624aa40d0cb331e6a52,2024-09-05T15:25:59.153000 CVE-2024-43943,0,0,0708a62e7be84f809da9677b73fc0a902b7d605c03fc359ea64fa95773946d2e,2024-09-05T15:10:48.663000 CVE-2024-43944,0,0,3b43949b67e3b5293c2c106f6d4c5bf9b7b47da0cd6c64d08fad13e8014c08a4,2024-08-30T13:00:05.390000 -CVE-2024-43945,0,0,81fa79c19cc3b716e3d2d242ad13680f89aee2fe136785c815bef525db6ab04d,2024-10-21T11:15:02.933000 +CVE-2024-43945,0,1,f5b76ae5f6c1929b87b18648966e8cb7cf62ddaefac1781f217e3b80d65d5392,2024-10-21T17:09:45.417000 CVE-2024-43946,0,0,f240acba317febcf1e96ae7507bd3580d8fecd1103a0412511da00f09d6e888f,2024-09-03T15:21:07.167000 CVE-2024-43947,0,0,00adf93b652a6a1fea9f57602f2aa8edc17efc755f7abf02b222226d3eb2a44e,2024-09-04T14:16:00.423000 CVE-2024-43948,0,0,f60ff73d80da3808d8af4258622a438dd588d368d767678c8fd4008f71ea0306,2024-09-03T15:22:20.567000 @@ -260152,7 +260153,7 @@ CVE-2024-43996,0,0,4ab5e67e8284ceee786b93aed8adbdd80e1748d0425e228e0426548655b0c CVE-2024-43997,0,0,6c8f403711524a70f603385ceb669667a4c46d7aa3512bb8c48c49bc3e88de15,2024-10-18T12:52:33.507000 CVE-2024-43999,0,0,44faf8f669c2612c0005bd86c2cd14309b22432e58922d209b993e9c26847278,2024-09-25T15:15:43.683000 CVE-2024-4400,0,0,5b653bf54f7bd4284ff54a803a56c0860c5d3b2bf58a6f974ce1eac832bfafb8,2024-05-16T13:03:05.353000 -CVE-2024-44000,0,0,41058842004dc2a777a9168fc3ae29de8830980331ff6dcf8b0324d7dede50b8,2024-10-20T12:15:03.287000 +CVE-2024-44000,0,1,d9b805c0ced007d13e1daaa1a0919d9f0b1803ca3e227038ddb8cd8b68e32114,2024-10-21T17:09:45.417000 CVE-2024-44001,0,0,346ae8bf0c871825527e18434529b8ae58c66d1360bf3ccc9a5ea96d6edee082,2024-09-25T20:13:04.160000 CVE-2024-44002,0,0,a9ee9907ad6f165092347fc84904c323e2fe7244eb403d6a142135718b9384c1,2024-09-25T20:06:13.100000 CVE-2024-44003,0,0,5349233fccc3b861a24f3e5f6be5454244be5973fb6ae966dc1e7b789f2be81b,2024-09-25T20:03:29.867000 @@ -260209,7 +260210,7 @@ CVE-2024-44058,0,0,2a31d13e7c34ecf4ce5a2c39e291bd8b424b5c5c23539a4a1d30676f56f1c CVE-2024-44059,0,0,3f6c3a8dc5dadae72dc0df667c364ac97c0b5812f742d2c5b5a2597b4b344930,2024-09-27T15:33:52.013000 CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef984,2024-05-02T18:00:37.360000 CVE-2024-44060,0,0,6924c0c83b583f3e58aed5b3f0343601ab88a5f9325e897d35fa92b3431e95c6,2024-09-27T14:04:50.977000 -CVE-2024-44061,0,0,0be7c24cb59152e36f043fab4c10b62c2a9ced8e25cc34b20f38c610aa8f88df,2024-10-20T10:15:02.277000 +CVE-2024-44061,0,1,bb5a53075c211c5690acb49a7707d112fc365dedf03ff067e457eaeabfeae5ff,2024-10-21T17:09:45.417000 CVE-2024-44062,0,0,d6bef9112163640e773e122d40930de4ecec4777328c835263d4052bfb0847a1,2024-09-27T15:49:46.487000 CVE-2024-44063,0,0,8ea7a84a37f53fc26574f2d48b688739bfe3dad8852d642a265a023b1a91cd34,2024-09-27T14:31:05.703000 CVE-2024-44064,0,0,4e74c010eb0f0db49dd4385b0641f0bed56c75cde28c530ba6b3d37d998a5b5d,2024-09-24T18:15:30.537000 @@ -260826,7 +260827,7 @@ CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a CVE-2024-45306,0,0,492d01bc755bef5620391aaeab10cbcbbc187e7fb0b5fdfef32f617ff36771b7,2024-10-01T15:20:29.533000 CVE-2024-45307,0,0,453e354c13ea082f71f784fb99af4cdeb162dcc05e43b9c9b2e7febafaebfb7b,2024-09-07T01:34:05.907000 CVE-2024-45308,0,0,700e0eb4024a102ed71899877978cfb0e434a318435f3d46acfc9659de5f360b,2024-09-03T12:59:02.453000 -CVE-2024-45309,1,1,e263d1c1d14e76a06b2eefbfe649dc397e4a51dbfe08c353694c92f58a36c59e,2024-10-21T15:15:03.463000 +CVE-2024-45309,0,1,37b1b6516a2eba33c3ab3ba214ce5f9d1c13f014d2b6ba3988d0b90f4c60c88d,2024-10-21T17:09:45.417000 CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000 CVE-2024-45310,0,0,b4f994e38147edf9427b72be6b743ed0caed3e55fb540eb2ac96b6f81ac208e0,2024-09-03T19:40:46.783000 CVE-2024-45311,0,0,31e4f90acb3914bc5f26ccdbeff62c6d2144f0789887b6397c99591eab2befc3,2024-09-25T17:03:36.817000 @@ -261139,7 +261140,7 @@ CVE-2024-4593,0,0,94ecb7e459fb704ab815ca1814a0a7a4397cf6e067d30b0e365dc0bb210150 CVE-2024-45932,0,0,2ed9f934b88b8715dee6d1403606d8675e56a0a52183b37f1e481d7c65afc5b2,2024-10-11T13:21:12.003000 CVE-2024-45933,0,0,5a4c436ed920625b31726987668deff1799338d95efdc881a4c3f3acc7baa01c,2024-10-08T19:35:19.013000 CVE-2024-4594,0,0,6353480e983dfe68c6b174c583e75b67b6ebde5befefc4e80bf75a35aedb2302,2024-06-04T19:20:43.657000 -CVE-2024-45944,0,0,6b1dfadebc5172570bf126179661c0c53b7982f93e1475a396b6c420b02fb7cd,2024-10-18T19:15:14.293000 +CVE-2024-45944,0,1,0b9c2a63d004a2b3891687c266135f0863a7df06bd233f853b7775733df51fca,2024-10-21T17:10:22.857000 CVE-2024-4595,0,0,a34d956039b7343ba69c0066573aab0165928a92f89b42d7c5d672a51296492e,2024-06-17T19:15:59.063000 CVE-2024-4596,0,0,dbe0fd0eb8770735bec19f4c23a1e0e23418b2478aa147d47acbafa8a1854f1c,2024-06-04T19:20:43.750000 CVE-2024-45960,0,0,d6abae379e9e9c51c8d55d00b2041f6c01d4089ebb39e6f4c0aa02e3bfda222c,2024-10-04T13:50:43.727000 @@ -261603,10 +261604,10 @@ CVE-2024-46887,0,0,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f2229 CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000 CVE-2024-46897,0,0,bef47ab853ef7bc7dc5f5b92f2da0105b1d3bf070bcdb49e6d84896c515fe0cd,2024-10-18T12:52:33.507000 CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4f9c,2024-10-17T17:52:00.700000 -CVE-2024-4690,0,1,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000 +CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000 CVE-2024-46911,0,0,611952a6b1126b54cf024e9a99d67e12cb7d1e8ec93fd9b8c3fb7fb963b348cf,2024-10-15T12:57:46.880000 CVE-2024-46918,0,0,bb2eeb1c2eb1e1757cf1750044772f91012857866544e10c0b718da276cf0057,2024-09-20T18:14:23.897000 -CVE-2024-4692,0,0,b7b9a74e93f72916c98746ffb2327ed4f4b5e3bc24154a272818fa6657f1a490,2024-10-18T12:53:04.627000 +CVE-2024-4692,0,1,420cdb756a1aaa14cb1e307335b6de7bd1d234a3afb21494fcdfd9686d988217,2024-10-21T16:10:14.873000 CVE-2024-4693,0,0,e3d9266511ed640ea0a2750bbbe8d9b8b25eda5f77b693324e75ee95f4a7a307,2024-05-14T16:11:39.510000 CVE-2024-46934,0,0,39cd5d62e62d306b30cc42f4b07a71f98f69814db0958da38caca7a2aa0c372d,2024-09-26T17:41:09.580000 CVE-2024-46935,0,0,666c6a587a73311e054ad4d061f64579544880375cf82da7a9fb41d79c96b125,2024-09-26T17:39:33.123000 @@ -261766,7 +261767,7 @@ CVE-2024-47227,0,0,411c02c14211cd5d3ec12de94c1c6b5b491382d24a6716c2e035097b7090e CVE-2024-4723,0,0,7af98ecd367a90ef8c416c400db7bb1bdf630fc1c111a3c8e6b7b48b9bb15bbe,2024-06-04T19:20:47.717000 CVE-2024-4724,0,0,1e35a8d6fb4d3f11b5f0d2a27ec10d126d5383267b650c161b24f017393ebb63,2024-06-04T19:20:47.830000 CVE-2024-47240,0,0,6f25f158726aab52a97b2692120705842adb60413873377b7252be8cf1d4187a,2024-10-18T12:52:33.507000 -CVE-2024-47241,0,0,2d8b7548c31566b1aae107d67aba63fa40de1741a4f8bb339ca50e7a2503f3fb,2024-10-18T17:15:12.880000 +CVE-2024-47241,0,1,58a524562b790b246361050e626ab15f35dfe376489ed5527ca425e0e170e59e,2024-10-21T17:10:22.857000 CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000 CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000 CVE-2024-4727,0,0,944186dc32a6b9f919ede42bcb555e3e922a4782a833eff4d2f1edc6462e7155,2024-05-17T02:40:35.380000 @@ -261802,10 +261803,10 @@ CVE-2024-47320,0,0,34657895a2dc740604de3ed70971ec71840d6f541e4b1dab5738b65bfae57 CVE-2024-47322,0,0,8b232be4cdc689515d55262ec30fa58411c26ba1e6f796e82a1afc447dc811dd,2024-10-07T17:47:48.410000 CVE-2024-47323,0,0,9437c7effa68c712270b139ca11dd61e48e93b311d9f840ede69c45aa4843c11,2024-10-07T17:48:28.117000 CVE-2024-47324,0,0,9d0a8be9058b908dcef652c569e8b2141d19736e2ee3f4e8dc4463e949bd1e2a,2024-10-07T17:48:28.117000 -CVE-2024-47325,0,0,2ca5e9aa4ccab3eba097bd7bbcbc5e60fe130cb0752b918f5c433159e8deafa6,2024-10-20T10:15:03.180000 +CVE-2024-47325,0,1,b7c67b77836c7ef4d3b0ddbf89fd1446eb242341ba657ab302903e9df4924d62,2024-10-21T17:09:45.417000 CVE-2024-47326,0,0,becaddd8932d32a061dc10bf0f467953cb83f3406fc8da77294097e28e38b53b,2024-10-07T17:47:48.410000 CVE-2024-47327,0,0,c538510929aaa1efef8590e5c0955bb05270eb6eca4d47152891a99d515cb043,2024-10-07T17:47:48.410000 -CVE-2024-47328,0,0,c2cdd6d419933611be7f52b79207d671756fa9f24aa2a2543034429aa016bad4,2024-10-21T11:15:03.393000 +CVE-2024-47328,0,1,62f9f8d33304cccf048597ee2a40ab335b262bb415bbaa74abd5c667d1ba7a2a,2024-10-21T17:09:45.417000 CVE-2024-47329,0,0,8f9cf4ad2ce9c10f9ea9bbbdd9112304e1d41b0ef8826075f80f55633e097d19,2024-10-07T17:47:48.410000 CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000 CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000 @@ -261987,7 +261988,7 @@ CVE-2024-47630,0,0,adfa126a6bff751cacedf82d84a5f3e91767172ee22cb0ebf2bbe0582808e CVE-2024-47631,0,0,2f5538e06e1703745ac31e3e4aff85429449cb6536170f3449d5c719692260bc,2024-10-07T17:47:48.410000 CVE-2024-47632,0,0,86e12c89344fd18c9940736a7e6a5db1287861f4d951d9a231cba9485bf7a1d1,2024-10-07T17:47:48.410000 CVE-2024-47633,0,0,7b59299b7ab0b71990c59d871565371c288abbd036b35f6cb6499efd86c70120,2024-10-07T17:47:48.410000 -CVE-2024-47634,0,0,a1bd48ccc5f7dcdb5ea7a260ce3648170a46d7ba6d20cd60098525dcc259b19b,2024-10-20T11:15:02.217000 +CVE-2024-47634,0,1,4c2fd4c714ec4dc3dac5d1a6bb16310a6d1e30fe1f9a84c4436875832e074333,2024-10-21T17:09:45.417000 CVE-2024-47635,0,0,f0938227f4d08edb6147f27db4a3110fa41d32874c7b3f4eb3d409a9071f6c87,2024-10-07T17:47:48.410000 CVE-2024-47636,0,0,300b53ad3b56bdfe242daa94b07eff6e5ccd9aa8581554b844321a4f299321e6,2024-10-15T12:58:51.050000 CVE-2024-47637,0,0,e4b543420eae93f2afe4e99f554aa703bb23d396109484c61c62fa5d0986af60,2024-10-16T16:38:14.557000 @@ -262031,97 +262032,97 @@ CVE-2024-47671,0,0,6ed788244a5b1c264869a97a389632df94bcd4e1ed09a4e006408f0739ce7 CVE-2024-47672,0,0,208c9363d63200a0f87e54b2ecaa4588cdcb8ebe0fa60448ea15f5f621cd45a2,2024-10-17T14:15:13.780000 CVE-2024-47673,0,0,2317135deeb5a2ba1be6a2e702cd3dee3239bc7e08807d40785f15a0d93329d9,2024-10-17T14:15:13.853000 CVE-2024-47674,0,0,577054bd094ccd4f02c1335a12c85ee8c96c43e2d348ef1516b825d8eccd5d5e,2024-10-18T14:50:02.710000 -CVE-2024-47675,0,0,71bad2ca252fdc5023b285ebcd87743168cb64c6da5063a889a2fcdc4e2d0414,2024-10-21T12:15:04.600000 -CVE-2024-47676,0,0,b4b5a276baf180b81e8a7392caf17abc89e69a4f8970b417cb97a24a79e7d79e,2024-10-21T12:15:04.687000 -CVE-2024-47677,0,0,d8a88fa8eae1035414344b4a4132e47b2bd942cab45c86247c9e03932612a965,2024-10-21T12:15:04.760000 -CVE-2024-47678,0,0,deca0d1b3d5e3fcce13cdc3560805649955b22e6bc4489e112122c8824960b65,2024-10-21T12:15:04.837000 -CVE-2024-47679,0,0,efba03814b01e3588295f412c9bbbbbdb0eed657938b873e918400c8337c5058,2024-10-21T12:15:04.920000 +CVE-2024-47675,0,1,fff2226e2e91403974930f662f226a29696936c529972a0662f08267575cdd8e,2024-10-21T17:09:45.417000 +CVE-2024-47676,0,1,647f2a3a1d3c30594b68c3c4e4b627dfaf40a57c2604da0b88353cfb7110d574,2024-10-21T17:09:45.417000 +CVE-2024-47677,0,1,933d90797f1b0a5fd2fb3b9fa8c4abe9c0cdd7abda15cbc8d8905db2206a3b4e,2024-10-21T17:09:45.417000 +CVE-2024-47678,0,1,0599171199c0933ac90dc22e0c718002df8dc875ff64d0f6cfd466c664eca6eb,2024-10-21T17:09:45.417000 +CVE-2024-47679,0,1,307939d2ecd8d5c95d936c71f851827dbf3076f2cbcbbaee79f0d0403d820535,2024-10-21T17:09:45.417000 CVE-2024-4768,0,0,eca965b33b3bb965dbc6e4fa576e2b459dc24fb57cb15a91596443aba7e291e4,2024-06-10T17:16:33.883000 -CVE-2024-47680,0,0,4774aebb8cdd5c3ef6d4b77778fb9fed1ff9f8aa64a775026901621b82c3a903,2024-10-21T12:15:05.003000 -CVE-2024-47681,0,0,1f8d5e55b707084a451bc0d698e58141712f386032e63c49972f8b1a660844e7,2024-10-21T12:15:05.080000 -CVE-2024-47682,0,0,90c592a7d2d7afe8c2d63b0c9ede45c0f20d839998f2f91b9792ca9e88bf534b,2024-10-21T12:15:05.143000 -CVE-2024-47683,0,0,99eb50b1ecf33631b9ead5f894c980abfccdb4ae6bcb06976070c658f9c23e4e,2024-10-21T12:15:05.210000 -CVE-2024-47684,0,0,b438891cc435c2769ba0b167529aab22f3d6d0de5d0193ac69cdf84dc67078be,2024-10-21T12:15:05.290000 -CVE-2024-47685,0,0,7e94939e2f17bcb90d4717534eaba41854af373a9216aaae7263f45ba536690b,2024-10-21T12:15:05.397000 -CVE-2024-47686,0,0,d2b34643049b01af39677515e5089f6fd38022e86821039e3480825520e05acd,2024-10-21T12:15:05.497000 -CVE-2024-47687,0,0,1772fe51e0742b6a4d106980b72856dacb7d8b491dafe0b58e02a12e936d4c65,2024-10-21T12:15:05.580000 -CVE-2024-47688,0,0,9d53be098474422f9a513a081bf58c643475f268b522a1b2cac0f8878ca6f563,2024-10-21T12:15:05.653000 -CVE-2024-47689,0,0,dd43837819c5427415b8ae5ae63bf6d169418051c3efde0e35ad8fcea0bb7b03,2024-10-21T12:15:05.733000 +CVE-2024-47680,0,1,779185d87101541924dc45d047ca1b9e685cb152836bf7742a8884724035e45e,2024-10-21T17:09:45.417000 +CVE-2024-47681,0,1,d72ee2e0925f6dd8f7ae5a5fba0bc70f8e4ae96ad57cf5a7c0116561e335294e,2024-10-21T17:09:45.417000 +CVE-2024-47682,0,1,6c96643a2a20d61e5631dad60147e65d29328d6a7f713c97d1e3e384bd3d2097,2024-10-21T17:09:45.417000 +CVE-2024-47683,0,1,29df637f255ef6790fa4d5a6cef4a640ffa0c80b3f317910e368f8552b5ce5c0,2024-10-21T17:09:45.417000 +CVE-2024-47684,0,1,2acc08ca3248c44119a14af3d9722ae8304684681c57eb0a531de1fb88b87bb2,2024-10-21T17:09:45.417000 +CVE-2024-47685,0,1,45dca83ceec4838c760fe3a933b300812ff7df633870d5c25a6d36368c1c1374,2024-10-21T17:09:45.417000 +CVE-2024-47686,0,1,002328641bf73f5c7fdd0cb5a2e29f6ab710bee941d944f9154eb587c6d547fc,2024-10-21T17:09:45.417000 +CVE-2024-47687,0,1,94419916fe94ff70fceea8c9848ea1313fd4f7e2844cd750b51c3c2895ce18a2,2024-10-21T17:09:45.417000 +CVE-2024-47688,0,1,63cf7bbc52d99e9642d18487f0ecff1b2d60d37d963c462ecfec28bd3e5ec740,2024-10-21T17:09:45.417000 +CVE-2024-47689,0,1,f38595b73929eda7ffbe92fb56583fe677428445484bb676b9602bf370ac3b1a,2024-10-21T17:09:45.417000 CVE-2024-4769,0,0,27e569a8d015b1733830e438c3e7532f74e5dc1a595d9d72a9cda524aaf6545e,2024-07-03T02:08:05.617000 -CVE-2024-47690,0,0,3580fc6fb65ea2243d499ad02f0e9c5270c437c584e911259c6e09192c61427a,2024-10-21T12:15:05.800000 -CVE-2024-47691,0,0,d215d5e94b01fad9c353c96d21b7eeba61b32c540772beeef2329fe4bffb093f,2024-10-21T12:15:05.880000 -CVE-2024-47692,0,0,77398bb6a4e5ea1237d43a30ae678dbb19536ca739f061adba41e8d3e6fa5742,2024-10-21T12:15:05.953000 -CVE-2024-47693,0,0,ac547a4d007a30a4671b7ea04a45647e3a9982087d336566125068341be2ac3d,2024-10-21T12:15:06.033000 -CVE-2024-47694,0,0,e8795f7cda2eccd6f65cc6ce8a29d1e91d548e5f95fbfc1681859ef54a45a22e,2024-10-21T12:15:06.107000 -CVE-2024-47695,0,0,718fb9024100a4e8f90a3bc43300b937717722b0d74ecf5b73638878b08160e6,2024-10-21T12:15:06.180000 -CVE-2024-47696,0,0,b271f81eeed11bb026b7ef7d2c06c49ca5d7ee07347e61dabff48a2b1a76f3c6,2024-10-21T12:15:06.257000 -CVE-2024-47697,0,0,09117da89cc3befd33bec8a24a5722a9b0b35b04d1c10443e0eede80b132376f,2024-10-21T12:15:06.343000 -CVE-2024-47698,0,0,111b7bce805ed2a54f2c3cec0ed6d844c321f0d2fced3ebdeaa4f875ee004322,2024-10-21T12:15:06.423000 -CVE-2024-47699,0,0,42f04e819cc91e83527a8d010e5f2d8d2aa3ee18f1d493e005ab72bf2780d24d,2024-10-21T12:15:06.503000 +CVE-2024-47690,0,1,448d7fd9a4748a1d25367ec5280b83293a5830a569687c37d4d84e0edb81fe89,2024-10-21T17:09:45.417000 +CVE-2024-47691,0,1,3fdc4f49a381b730d9addaf6deb128b8a633a5acbe8c6f6cd5c757255fd2b7cd,2024-10-21T17:09:45.417000 +CVE-2024-47692,0,1,4809df75deeaaae1a9fd666ca9306de48b94ddabb018268fa2dd4ac3c22b0aa9,2024-10-21T17:09:45.417000 +CVE-2024-47693,0,1,bece60483438719441451ef5ba1d690153757c7da99172061ac17f2fd7feb1ae,2024-10-21T17:09:45.417000 +CVE-2024-47694,0,1,638278aad8111eb88ee881c87f8d44bcbc6d9563df95d3601378d58387800f5c,2024-10-21T17:09:45.417000 +CVE-2024-47695,0,1,c914fe7c9050898e6bf1bd39cfb1d9b02d81613d3b8a46e83a95986bfb55ceaa,2024-10-21T17:09:45.417000 +CVE-2024-47696,0,1,c5add6c9eb11a27b3ec8b40c878f02d4c4f426b811a1741023750e7a1c711854,2024-10-21T17:09:45.417000 +CVE-2024-47697,0,1,fedac310d965db0eb7ce43730316b8311770148b3c5445a8214433cccc61b2f9,2024-10-21T17:09:45.417000 +CVE-2024-47698,0,1,430be1979bbe48396cfe608e2022f2735b39713b5a6a45574d717f8b1d1c9d8a,2024-10-21T17:09:45.417000 +CVE-2024-47699,0,1,b7946d49555425cdc184f3b84c4b1f6b5f889162b966b32bff713c85ff41669e,2024-10-21T17:09:45.417000 CVE-2024-4770,0,0,9501f8bb52643b4bcadd7b11da17e463cda395ec382733177c6b60e7ef1c0b7b,2024-08-01T13:59:34.293000 -CVE-2024-47700,0,0,a12323d936e7705f7b355610887ec19f4822b58951cf259c9656756a479c1d3a,2024-10-21T12:15:06.593000 -CVE-2024-47701,0,0,c5d02f5cf27f5c59e56ba788fce9fb5e9850fb3660d812e8cfc1b7192860169d,2024-10-21T12:15:06.663000 -CVE-2024-47702,0,0,a730dc5905c2a76b000909f9e54d401dfb5d30378a3e32504feee69f659286b2,2024-10-21T12:15:06.743000 -CVE-2024-47703,0,0,f3193f2d3f96510356f5c8c763452ceea1dda57fce7ef86e8bf303bd364f7208,2024-10-21T12:15:06.823000 -CVE-2024-47704,0,0,15ce4f32550e7735c59d931aa4ad922b79b9fbe3d56b3bff28602e5dfec78f27,2024-10-21T12:15:06.923000 -CVE-2024-47705,0,0,5c7ffc390ae990c674ea67d7264ef3718c18bb9448f4d8647462325d3461bc6c,2024-10-21T12:15:07.020000 -CVE-2024-47706,0,0,552ed15ef6d5f9e18230f5b7798235590ae606c2b3ea576e067f546487563ef7,2024-10-21T12:15:07.120000 -CVE-2024-47707,0,0,b5b67169a2ed7cf59914e709126b0d5884e0bdbfd87654cecbc96e4905fb1603,2024-10-21T12:15:07.220000 -CVE-2024-47708,0,0,3d50ae476caea56fad4ddab9ba154d9e32811dda21e3ce33e50512e500e0b36c,2024-10-21T12:15:07.313000 -CVE-2024-47709,0,0,b9a2ce062eec3be970ff752bf21f73d3177dd7cf0fcf359feb296c11fc14151b,2024-10-21T12:15:07.397000 +CVE-2024-47700,0,1,40198de1f613d5467e296173f74ed3e37b2c93c376750f70f83020f05524933f,2024-10-21T17:09:45.417000 +CVE-2024-47701,0,1,319944ddbc3afb0231c37c7b3bddb711046a4ec0a946243baaf1167d1e3446b7,2024-10-21T17:09:45.417000 +CVE-2024-47702,0,1,1b176727fedcedd5b8973a84195d93175933b0894c79e5c2740e9b70a36ddcf8,2024-10-21T17:09:45.417000 +CVE-2024-47703,0,1,9eac4d36302ce06105e5020ceb3945728f57951f5fa6d1cfaab9ed8458b88de8,2024-10-21T17:09:45.417000 +CVE-2024-47704,0,1,777223417a57faae9e69f5df24021dc8757bfc71dd81953f121c9d5e8c567675,2024-10-21T17:09:45.417000 +CVE-2024-47705,0,1,da80dfe42da74a6c1c85802f35dc15c2881669247bfa85db0f9366f778672605,2024-10-21T17:09:45.417000 +CVE-2024-47706,0,1,4eb77f888a6672a44b7034874866a30ea7d165b6748b92ecc32c612e215bae77,2024-10-21T17:09:45.417000 +CVE-2024-47707,0,1,e0639bf652d1eed99b0f7b93fc5b5e18065eeae40c7f6ce507c5ae51ee3537ab,2024-10-21T17:09:45.417000 +CVE-2024-47708,0,1,2aa4a20a0fc3992a2cf750f6630b1970c023117da5583ddb150880137a92f9d0,2024-10-21T17:09:45.417000 +CVE-2024-47709,0,1,736c7f5f6a69cbe4a63aa40f9c9b550bb317dd0760d64911a98b8baa1adeb4ce,2024-10-21T17:09:45.417000 CVE-2024-4771,0,0,65ecb44d66f4d1dbe0ceedf41bce3009ee95c66c5cee70725cf485ae8cc22e85,2024-07-03T02:08:06.447000 -CVE-2024-47710,0,0,2203477f4e1e12fb61bef104ac8081d526f66c221be10da1a86b2dbbf7389a95,2024-10-21T12:15:07.483000 -CVE-2024-47711,0,0,00ac629a1d013ef9d3973c42dac24cff3ccdf5d24245961ee738befd77183475,2024-10-21T12:15:07.563000 -CVE-2024-47712,0,0,eadb477ced294548477149ec9602433f0498e18038e5ee227a8beee8bd5a0887,2024-10-21T12:15:07.640000 -CVE-2024-47713,0,0,9888fa6be247b6244bee7e8ab2e04c4f8e1d685d5e9340d7bb7eb9763cffd607,2024-10-21T12:15:07.717000 -CVE-2024-47714,0,0,459c846f206631031018f0a3d9d6951e83219cee28d7990bd2abf7f95aaea5b6,2024-10-21T12:15:07.797000 -CVE-2024-47715,0,0,2d75c028eb07d5ed0d15ff550c9bf1c5178ba286ace46455bcd2972f6abad1f9,2024-10-21T12:15:07.870000 -CVE-2024-47716,0,0,f09a4c5b0cb3dfa456f66accb2a7133893322a1692f96d6d2bdad294f601a16e,2024-10-21T12:15:07.943000 -CVE-2024-47717,0,0,f0519f401a9576ffb54d09a8679104ded34ef44bed2278482ace7dd1103d5766,2024-10-21T12:15:08.020000 -CVE-2024-47718,0,0,580351a3fd9d3d5bdccfb68a58482f508716f9e5c885f11fc7daacde0113781f,2024-10-21T12:15:08.090000 -CVE-2024-47719,0,0,37cb740726ffa09e3a6d1899dab6572e173aabe036f62895d4999f27874459a9,2024-10-21T12:15:08.167000 +CVE-2024-47710,0,1,84c333d23f72d123a33b9d153396f87ad734749e2d7f156695c981a4451a43b9,2024-10-21T17:09:45.417000 +CVE-2024-47711,0,1,3365c0a79579c030324969541f10771f2947b1892ee1135c057573f832ccc1dc,2024-10-21T17:09:45.417000 +CVE-2024-47712,0,1,1db48c57a3069d6cc743b1aa09117fc7e993e94c4a794f5a3174e28d1a1fed0e,2024-10-21T17:09:45.417000 +CVE-2024-47713,0,1,9ddc786aabb691e42a47c8351eaff5a3e819fe6af40b5b7b514a165cdae4c79b,2024-10-21T17:09:45.417000 +CVE-2024-47714,0,1,b18d52269000d9f08dabff517a2d03ad40480071911b85fa9f9a279e3e6824bd,2024-10-21T17:09:45.417000 +CVE-2024-47715,0,1,43660f0ff4516d5d5f706db1c1f84eec03fbcb32363e32cd44049f60b1046596,2024-10-21T17:09:45.417000 +CVE-2024-47716,0,1,5d530e2f159cb87e4276b67fd175dfe0a33dd705332a3351f0800e98844bc395,2024-10-21T17:09:45.417000 +CVE-2024-47717,0,1,1f16a2dea7123b560b45f1d5577cea2499c14593f46e8b947c80eaec41cca786,2024-10-21T17:09:45.417000 +CVE-2024-47718,0,1,b58fc361c85af159283e0d7c725f5be71f82b030723471120f8cf3a71cb6ecd8,2024-10-21T17:09:45.417000 +CVE-2024-47719,0,1,898fea7ef9b2c420d78f61822149f872729ff53db69e2ba127d283cb3de507b3,2024-10-21T17:09:45.417000 CVE-2024-4772,0,0,49f0c7fc95339e6e98a7cbd8d8849904a773b2a05345b7622006e8647831f13b,2024-05-14T19:17:55.627000 -CVE-2024-47720,0,0,82f77e3a2095a0de8da8fa6b60bedf0f7c05ad42df9c90b18d2123f49f027d99,2024-10-21T12:15:08.240000 -CVE-2024-47721,0,0,c8ea91c5ff9b9119d3af92b904ee756bae1a8c05988a737bcdfca8723b69682c,2024-10-21T12:15:08.313000 +CVE-2024-47720,0,1,fe2944aa6bb0bb0501763994144150c79b2f3ca0116c7a217bd698765f69b248,2024-10-21T17:09:45.417000 +CVE-2024-47721,0,1,04edd5df09b5c82f2a2feeea71eab7461d88f3c2fa180c2013bad25f1ea8da48,2024-10-21T17:09:45.417000 CVE-2024-47722,0,0,68c8d2f090df61a9f49a1f01f75a7ac8cda9d407591cfa0dc0a92c1e0656c53f,2024-10-21T13:15:02.360000 -CVE-2024-47723,0,0,a9f03915394300fce65604036e25655f6948d3ad9f808a80f9b44a1365ecf996,2024-10-21T13:15:02.503000 -CVE-2024-47724,0,0,375d295b4b555e4a55c7c393eb1679ce2fe017cfc731deb98cad02f430856d38,2024-10-21T13:15:02.590000 -CVE-2024-47725,0,0,b79a6560c527f091d68257ddb74e94911f4fcbffe10ad15a9906e1aa2b188955,2024-10-21T13:15:02.673000 -CVE-2024-47726,0,0,ede7839a0c8acec952f82045fbfdbe5b92376829a7aa3facea09d0bd51e5f2fc,2024-10-21T13:15:02.767000 -CVE-2024-47727,0,0,dcf0748ec8d3d168831660afdaa5da26177b1ee570017f7c2ef891706ff772fa,2024-10-21T13:15:02.883000 -CVE-2024-47728,0,0,abae274e2d2778936cf38f14084a8fe11f9bd1cb15fed353fd8109f0e5fd5178,2024-10-21T13:15:02.980000 -CVE-2024-47729,0,0,6612c7903d3ae0f9b01cd016de45de459fb5c35f6f8acae8368484137e0e8d09,2024-10-21T13:15:03.070000 +CVE-2024-47723,0,1,e78b215d0cbedf337fc4d670e1844dbbd29b556e5053e7d66b95322a621daa0b,2024-10-21T17:09:45.417000 +CVE-2024-47724,0,1,9c1d4dd363597ace78d1c7ebbef0e1f2e96a212b96b6a09618a577838f46fe1f,2024-10-21T17:09:45.417000 +CVE-2024-47725,0,1,5b041bb683211618550e4d3269ed83dc0c0e198d1ad8a3089e37417c858a4b04,2024-10-21T17:09:45.417000 +CVE-2024-47726,0,1,c446e3e2dffbcccbc0186f0322a85b4a05a0668ee60808d5804eca57a29d9a39,2024-10-21T17:09:45.417000 +CVE-2024-47727,0,1,b4841d049fe7977d7ae76ed99e0c8291d4ff9401863cf2613bdea9ae7e9a1347,2024-10-21T17:09:45.417000 +CVE-2024-47728,0,1,20d7130b4cb2af3704697b2735b8691238f821693df5a91fa37a4e7099218c8a,2024-10-21T17:09:45.417000 +CVE-2024-47729,0,1,7d1f6f34e39d97ae406ce74219e7048254356610a727b3668c7c3f2cd0d70ad2,2024-10-21T17:09:45.417000 CVE-2024-4773,0,0,451efafbcecc3ef1a9913dd6e3fbbf39d79f9aa10bbe1841409a244ef36a044e,2024-08-01T13:59:35.080000 -CVE-2024-47730,0,0,36342a45cbb61d151da202a59ad6b2bf39c02329ba5a29a671bae6f75890175a,2024-10-21T13:15:03.160000 -CVE-2024-47731,0,0,432d57f919d4c243aa1cb80b0a12b4e5b5ab00c9ddb34e870dfa9b8186c81289,2024-10-21T13:15:03.260000 -CVE-2024-47732,0,0,6a8faca5f298b17729a0a4a51112fdde4cea3ff51d7fa742504e78e15927930b,2024-10-21T13:15:03.363000 -CVE-2024-47733,0,0,9743935f3313458bce656023f8f2aebfa38931d2f1d32e49313ec858079f18c9,2024-10-21T13:15:03.450000 -CVE-2024-47734,0,0,7ed8c7f2a19f88c5f236f14e55851d3a22258c853d23ed72635f86335f39e3d2,2024-10-21T13:15:03.547000 -CVE-2024-47735,0,0,92d753052ca73aaa6f073467cfba232d319060257957d43bd3d1ce615d3c8a11,2024-10-21T13:15:03.630000 -CVE-2024-47736,0,0,1051c32df6c4c0a302a480e20bdbfcfddb7af748ced5516c7f98517eb106eb0b,2024-10-21T13:15:03.737000 -CVE-2024-47737,0,0,df034a83b259925e63950b2ee0ea49428075a92848078895db2a3944c21234f4,2024-10-21T13:15:03.833000 -CVE-2024-47738,0,0,90a8d040a2697ce8c2912c8c1ff92fa630ee4e2a8287fb4edb014122d97dec09,2024-10-21T13:15:03.920000 -CVE-2024-47739,0,0,6098aca53dbeda33dcbeb115807179704b14fa86a9df808b9ef27ae03c7a03ea,2024-10-21T13:15:04.017000 +CVE-2024-47730,0,1,c3f5f93c52ec9e2a2a3e43460027bfc21365178115f159c06fdea3245e28167d,2024-10-21T17:09:45.417000 +CVE-2024-47731,0,1,6248433178551df21e3cfb6bc6acc0af27e1ef9f0f681f44c992921ffccd980f,2024-10-21T17:09:45.417000 +CVE-2024-47732,0,1,3b7c5ecca23afedd48d94fd6764c6140af64284a7a533492a808d77f3064a941,2024-10-21T17:09:45.417000 +CVE-2024-47733,0,1,77e82f0d28a8ba47940fb2bd9a24af18b530601f804b8a4d3e8174e8e8fd528c,2024-10-21T17:09:45.417000 +CVE-2024-47734,0,1,79ca143553841e51e16d268c9dbbe489d1be92d485bdb1f9f32c766520faa09c,2024-10-21T17:09:45.417000 +CVE-2024-47735,0,1,918ed1ed6ba7267950dd2758ef51888a5f5662ceef4cc5d4887e675b3769fc56,2024-10-21T17:09:45.417000 +CVE-2024-47736,0,1,80e1bfd6b5ee20de3403a27bfa1c47b54d41ea5fc193ba9fd9ef66cf274c64f3,2024-10-21T17:09:45.417000 +CVE-2024-47737,0,1,ac87e3b2308277816910c98c2b290774c3ffffc3d2a1d12f6df7ede6b6fec94c,2024-10-21T17:09:45.417000 +CVE-2024-47738,0,1,df8a42001823c1e7a29c78a2dc7b7b033a870108f55c2c690b931c943d1f277c,2024-10-21T17:09:45.417000 +CVE-2024-47739,0,1,0c3874db11349c247df1edc5f4817cb0fb3b45ec26a3c74705ff1f5a7791bba7,2024-10-21T17:09:45.417000 CVE-2024-4774,0,0,a30e3c0a9681e5745664b5a7d21e43f4931cba5ae0f7ac5d13f7a53db899f70a,2024-05-14T19:17:55.627000 -CVE-2024-47740,0,0,1ba25863b96f3c25783b38e7542e25644f0f17f0eecee048a45aa7993beadb69,2024-10-21T13:15:04.103000 -CVE-2024-47741,0,0,8a07e2c5308823a019af99f817993f158fc1f74e8f62321f0845f848c6b8d9fd,2024-10-21T13:15:04.207000 -CVE-2024-47742,0,0,4e9ae2b973829e67a08f6cf2a772e8a07b361bd954624e7c2e7dd75541af581c,2024-10-21T13:15:04.297000 -CVE-2024-47743,0,0,82efe9eaf56efbd2fb468344b3b355d343d780c9341a2b55ff3eda1dca6e0639,2024-10-21T13:15:04.393000 -CVE-2024-47744,0,0,318c76b642310d705c90f729b7897077bd5b0e04e26bdf03ae888cefe59bec2b,2024-10-21T13:15:04.480000 -CVE-2024-47745,0,0,cc64ed51ebe39a8f749cc9bb1d98789a41c199b6bdb64fbade08362f41dbb228,2024-10-21T13:15:04.580000 -CVE-2024-47746,0,0,a4744b1d4b6215114a6aff1ceb463b84325e6269d8a3b265a028abd3e5a4ff45,2024-10-21T13:15:04.667000 -CVE-2024-47747,0,0,6ddd27f7517098d2d02e638459b1087d7d4767bf3164361c1c18dcd39b39bdcb,2024-10-21T13:15:04.753000 -CVE-2024-47748,0,0,2e9524d14b02ce9e8e6466840d93e483faa2ffcf2286310427bd5b3e0176040b,2024-10-21T13:15:04.857000 -CVE-2024-47749,0,0,e8633928e58908d9cb3e890f7bf6015d9ceb47a502719021defbdb812fce5be3,2024-10-21T13:15:04.950000 +CVE-2024-47740,0,1,768c60cc2aa6353990ba6be4a715ba73240d08f7aa920e59da8dba820cceb126,2024-10-21T17:09:45.417000 +CVE-2024-47741,0,1,16de1929b973495fab2b76c1e0c3aec13d1144f771036e4c19ce75034196e012,2024-10-21T17:09:45.417000 +CVE-2024-47742,0,1,d4bdf050ad676b843a45f07aa46808bebd66cb4930bdf4a3846418b0470ff5e9,2024-10-21T17:09:45.417000 +CVE-2024-47743,0,1,df3b925e76d2eb79d4c6c0fa3d1bf7931cea8b6ff34eda711cef48fae314d64b,2024-10-21T17:09:45.417000 +CVE-2024-47744,0,1,385a9cdb17b12399931832e8ce879a7f1e169b687bc5a8584bdda57c1ddfe24f,2024-10-21T17:09:45.417000 +CVE-2024-47745,0,1,bf9d70a37cd5327dcc2d07c3fdd8b5c36de5c72622dd6659e050773378799961,2024-10-21T17:09:45.417000 +CVE-2024-47746,0,1,a9cdeb753844bd87216637cd741d47b47d4ce9e70871099d1588c10e4fb363bf,2024-10-21T17:09:45.417000 +CVE-2024-47747,0,1,2104dff2f527df1ba533d7ee8f1831a600a90cb35b2e1c30e11abdf3e28b7769,2024-10-21T17:09:45.417000 +CVE-2024-47748,0,1,647817335e913f39ba0f188b7f0dda0acdc5eefa8874404f39f4072aced2a2c5,2024-10-21T17:09:45.417000 +CVE-2024-47749,0,1,29208827703f5a4969ec91c3d13592b6244024cb63aec150f6f76f03e8df0966,2024-10-21T17:09:45.417000 CVE-2024-4775,0,0,e28694f3b8983e1ffd74471dfd44709d0dccce69f1a573f2d66ebeb202246c51,2024-07-03T02:08:07.390000 -CVE-2024-47750,0,0,6dee46414fd845ec3ca01a1853a2bade8dc19320d6151808543607da04302efe,2024-10-21T13:15:05.037000 -CVE-2024-47751,0,0,6195fb12c8e3a1b0cf47c6075b83794a76688392db1a181db4bcd4dc1cf59291,2024-10-21T13:15:05.123000 -CVE-2024-47752,0,0,9699a3c05e2b76622b9afc00a0e6f96eb6810043fc8e182819fc1f920f49ea85,2024-10-21T13:15:05.203000 -CVE-2024-47753,0,0,4e8047dd952b59a130eaecb8249d957f5d43d107701456368e9594282d790eed,2024-10-21T13:15:05.283000 -CVE-2024-47754,0,0,0354436191e7d7599677bc5984d3ca5548c3663214f10b8e19cc91073ccbc9fe,2024-10-21T13:15:05.377000 -CVE-2024-47755,0,0,7b5941b98b9cf2b2445668a331f326542b689efc2ae2573b182fea74668f57f1,2024-10-21T13:15:05.467000 -CVE-2024-47756,0,0,dc95a56aced49d607f4cdd78a589c17960e23d0830ca49f8c92e01c022fa2331,2024-10-21T13:15:05.550000 -CVE-2024-47757,0,0,b17e946be16b7cc7e865b765e4d1f804c48577343a958838720833592392b2b8,2024-10-21T13:15:05.640000 +CVE-2024-47750,0,1,fcb30e866c3d64f885fc63b0fbe18064c59e15239984a0057b4922de3e3cda47,2024-10-21T17:09:45.417000 +CVE-2024-47751,0,1,dbbb46f679c8ef6d582034b10e0fc5133e1862d2b7e7523462d867f3e651a7ba,2024-10-21T17:09:45.417000 +CVE-2024-47752,0,1,a66c3e082229402829797fa4aac292b0da4706ad1123fbb973622c8b0632edb8,2024-10-21T17:09:45.417000 +CVE-2024-47753,0,1,6420c92655e4b40d5a575b4e06bf8b37d484916834b4a78a23d5efb8787093fe,2024-10-21T17:09:45.417000 +CVE-2024-47754,0,1,48b5d5ad78f1bb4e032f6eb7b9ffe0359b51df3128cd60ad1ede2f0fb50e691a,2024-10-21T17:09:45.417000 +CVE-2024-47755,0,1,0d684cc86f0a6c47b791d32e4342138c8dd5e25fb965fba35197fa8648dbe906,2024-10-21T17:09:45.417000 +CVE-2024-47756,0,1,0cbc66244095b915bdca4b56f2062962753bcb756f3eae18b0421fff29e249cf,2024-10-21T17:09:45.417000 +CVE-2024-47757,0,1,379f9d4d3707b2dbdad5a3b3d21f055f3f889a2ab558e7d4b69c5950e0414acb,2024-10-21T17:09:45.417000 CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e010,2024-07-03T02:08:08.187000 CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1ecf,2024-10-04T13:50:43.727000 CVE-2024-47763,0,0,0009d92633a66a995666b904976a3f571897c7b107ff706ed2173ff97f66c3ef,2024-10-10T12:51:56.987000 @@ -262237,7 +262238,7 @@ CVE-2024-4798,0,0,a3036cf57ec44ed92aa705d72184468d7b712fcb492c4ff2950b8be117e010 CVE-2024-4799,0,0,bef187df7ab031f873bee32f009cee90466081192edf9662131655f9488e20b3,2024-06-04T19:20:49.917000 CVE-2024-4800,0,0,46f73cb5132c32f542b67f61b6f2138522f24eb42a7d5cb9e69a7f683ef97724,2024-06-04T19:20:50.013000 CVE-2024-4801,0,0,2bcdaba0a3afa2888c47ef732ae4862e81c0c79cd78d2076198cb242d0df3f0e,2024-06-04T19:20:50.120000 -CVE-2024-48016,0,0,805069857f5403fcb822ceae0be17bda0b7c8abb852de45cea81512ca3db959f,2024-10-18T17:15:13.380000 +CVE-2024-48016,0,1,79b8427a21b025c2b604d3c3d72e2379266e5f76164b198ef3ca33d423daa7ad,2024-10-21T17:10:22.857000 CVE-2024-4802,0,0,9f23c738b4e7167dada064b214f9ad2d560e5cec48c7eaa4346088c33abc9143,2024-06-04T19:20:50.247000 CVE-2024-48020,0,0,dcbd5af80fa4e0ff77a2481b211c24b4aca48d4b01a6d0de815360ac1c5ff406,2024-10-15T12:57:46.880000 CVE-2024-48021,0,0,d91861579c30ceb9f080adcdf06bfa7cdd57f4b747fffd227caac318ccaeeeea,2024-10-18T12:52:33.507000 @@ -262267,7 +262268,7 @@ CVE-2024-48043,0,0,d7022e96ce1ce67c4f59e004a095bf6b87f052300567a30fb9f9fb2d5938d CVE-2024-48046,0,0,423091e4b5e8d6a105e8bdc778f5cf951b1df2d4a2635710b325a5130f1d15ea,2024-10-18T12:52:33.507000 CVE-2024-48047,0,0,3283398b8a8a75e7e31eaa0ac97fe84164a0704ec4cafc99d8da73b654c081f8,2024-10-18T12:52:33.507000 CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac13e,2024-10-18T12:52:33.507000 -CVE-2024-48049,0,0,c6cef7042c3715849b7db8cf2901ac7f2456fb67bd07d6a07453176e6135ff84,2024-10-20T08:15:03 +CVE-2024-48049,0,1,148df9ad31ecc0545e683b32bec8a0373210f0d3ec41d70a8b1226d9859ffdca,2024-10-21T17:09:45.417000 CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000 CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 @@ -262294,7 +262295,7 @@ CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05e CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000 CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000 -CVE-2024-48231,0,0,42dec53a830134c621c886e100f6e484596524a35af1c515691dd2bc2d7ed207,2024-10-21T13:15:05.720000 +CVE-2024-48231,0,1,d6a9119c95106d52c9037b3668d4076e0253f52a7b82cafbc29057b29a139ad4,2024-10-21T17:09:45.417000 CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000 CVE-2024-48249,0,0,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf271b,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000 @@ -262425,6 +262426,7 @@ CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752da CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000 CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000 +CVE-2024-48930,1,1,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9c48,2024-10-21T17:09:45.417000 CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000 CVE-2024-48937,0,0,53216fc8a6fbe5febb4c086d6958028e95a58513bdf6caced98eaac34038db0e,2024-10-17T19:48:11.163000 CVE-2024-48938,0,0,42546c0230f7c9740d6f2b303141b0c584cd79f3d515c30c7b8554d560fc1ee9,2024-10-17T19:49:56.327000 @@ -262467,7 +262469,7 @@ CVE-2024-49195,0,0,ebe503b8e48bc1eb234bda5829019875beb46e6f81279b5b20d7be3e70714 CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000 CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000 -CVE-2024-49215,0,0,16362fb91a1d9dad7e966a5bcf8d8d308433afd9441cf18c9e1483b80a6ae007,2024-10-21T01:15:02.943000 +CVE-2024-49215,0,1,9d23e97fd9538d4ddaefdbee98c9f991902afb90430384e62ea6427018c87235,2024-10-21T17:09:45.417000 CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000 CVE-2024-49217,0,0,d03ae3ae7bb906a5c0350c53ea3af5b288e7f6463b03cb7a32bb31d9e72767bc,2024-10-18T12:52:33.507000 CVE-2024-49218,0,0,671ff343da2f5231222648ce902558a11e99be4b95e42fa72739eb1b7f6df389,2024-10-16T16:38:14.557000 @@ -262476,26 +262478,26 @@ CVE-2024-4922,0,0,692b7adcf322621580a484f8f9b29edc18ffd7d0d7aa81554818742dd70afb CVE-2024-49220,0,0,57952046433432dd8ce12274d4b26b119c0532b2f024dacb0fa79f0239abbb05,2024-10-18T12:52:33.507000 CVE-2024-49221,0,0,923750c677c4e142fd1f1384663b07d08d89e89ab299b2af5eff54307fddfe2c,2024-10-18T12:52:33.507000 CVE-2024-49223,0,0,0be7b22234ee156e0f2d83dfd91e4e489d5261fae900de72d373a8df8c931b94,2024-10-18T12:52:33.507000 -CVE-2024-49224,0,0,0a7a0e5ab11d10e7a081f8b1e8896e83c6c961c8b2a1ed92807e6628891963d7,2024-10-18T12:52:33.507000 -CVE-2024-49225,0,0,4c875bf9cbafe8c51011c005dbbc98d24e40cc3ab1cb295ec705278bf1c4f617,2024-10-18T12:52:33.507000 +CVE-2024-49224,0,1,d5ed60c2b9217ee9e685d58c35300fb4a2b5ee5fb2fabe8974de51c33541a1ab,2024-10-21T16:31:21.593000 +CVE-2024-49225,0,1,e045d0de6712b0b413de59de2f5ec4e42e811096a71880e86b358673c2e0d271,2024-10-21T16:33:00.403000 CVE-2024-49226,0,0,df9f2172258cc4d19c6bc195be87c4c9b1bf3d29dd47d60cce8b8efee0aca1a0,2024-10-16T16:38:14.557000 CVE-2024-49227,0,0,982f5e93a814f85c16cf1657f4ba0ca40040816eb1de34f1d6cd0e6ad4881dc1,2024-10-16T16:38:14.557000 -CVE-2024-49228,0,0,ffa0093dadad540f50a509499affa5eba7a57259c265416414dea29cec418485,2024-10-18T12:52:33.507000 +CVE-2024-49228,0,1,38437087aa9be3056a11c6798501f534e4b6d4e733ee6d1c2006add27aba0767,2024-10-21T16:34:41.267000 CVE-2024-49229,0,0,30b75199012dde4362fdef6eb936298f876a9b6a4445d757e9fd5d137e13b1b6,2024-10-18T12:52:33.507000 CVE-2024-4923,0,0,c83198e21d781e3384db11f118092c5fbfa4a06f25d53a21adb6fe23f4380f17,2024-06-04T19:20:53.833000 -CVE-2024-49230,0,0,fc7a6a7a831083b9c98eecbb8010a58f50f7df551fb50b4df24418a63d4789fa,2024-10-18T12:52:33.507000 -CVE-2024-49231,0,0,29df8f4b81eadb3336f3a77c3c08d02be92cafc273e55791c2bd55311849bfac,2024-10-18T12:52:33.507000 -CVE-2024-49232,0,0,12c97a1fe25c0ca353c63d28e3109f71e93f1aa02c8382d5da393ddafd85fdae,2024-10-18T12:52:33.507000 -CVE-2024-49233,0,0,562dd9741cc388a7d990cf122a9db76608dee490e9019069bd48d7295c8c1b13,2024-10-18T12:52:33.507000 -CVE-2024-49234,0,0,d1c3174ec6269ae6a2098cbdf7434658f1ce839bad40bd8a206c053b483c57f6,2024-10-18T12:52:33.507000 +CVE-2024-49230,0,1,89342cb8496066491f5b3d74f112ed9eac62497b67d283852db13e34d1cb2199,2024-10-21T16:37:15.807000 +CVE-2024-49231,0,1,f1bca784a02483c4e1958c6dd7981ec9ffd6a01b629138db999d0ecc3e3b5b78,2024-10-21T16:37:46.010000 +CVE-2024-49232,0,1,d337b3c0fd7bcdd2693f8827f33e9eb4cde9ba740bd8fa3f7d8cf28d739d91c8,2024-10-21T16:39:15.407000 +CVE-2024-49233,0,1,d15701a736a720d91ce7a393cddc119d365e279a269d1078a3d62a0f44c1eecb,2024-10-21T17:17:17.680000 +CVE-2024-49234,0,1,00d6361d85da44a4fa5e98b0b1923a417577ef114f956e9a3a98833720c5555c,2024-10-21T17:16:51.053000 CVE-2024-49235,0,0,81b65049d9913937f83fbb02a460f07035b9a9b3cadf729eaa07645e1a8a845f,2024-10-18T12:52:33.507000 -CVE-2024-49236,0,0,f9175ddd5b00043493993cc2bbe8d4d408b8bf29ddc0f09821c75a4d0d5fed89,2024-10-18T12:52:33.507000 +CVE-2024-49236,0,1,a834af1459ab83c1993774b31ad0e95a9120429d91f000710053f11c8b77484e,2024-10-21T17:12:00.583000 CVE-2024-49237,0,0,64dcb0551ca73c40ba7dffeb043812bafa5ef4927c9ca1b4d270101db33dfadd,2024-10-18T12:52:33.507000 -CVE-2024-49238,0,0,1d5e90518314d1973218488eb787f4c9afaf77e0009379ea60d6bbf7fd5e5b3f,2024-10-18T12:52:33.507000 -CVE-2024-49239,0,0,b31c23ee9bcbe5221f250f9ee9dbd7142d31004ac40cfd09af489acaac19bd67,2024-10-18T12:52:33.507000 +CVE-2024-49238,0,1,4f7144ebb272524e891d29605f6262832b81db89d137d3761af7eafcb87405b6,2024-10-21T17:02:51.280000 +CVE-2024-49239,0,1,6bb7d5c1f1f1cff54f68d71e2aed5ac9078819a889d9132789e8a59fb72db7e3,2024-10-21T16:26:20.220000 CVE-2024-4924,0,0,1be75affb45c8b20da2e31570d5662533bb5af7060cf2ef9bdabbaa6aefcbc3f,2024-06-13T18:36:09.013000 -CVE-2024-49240,0,0,0c6beaa9afe4b9810f451a38d2b5c5be86ace5a23694510d5782af32543cb95d,2024-10-18T12:52:33.507000 -CVE-2024-49241,0,0,6a711d1967ff80385c8163a42d48011e3652f1e3ddaefe48e86bd53703dfc8ee,2024-10-18T12:52:33.507000 +CVE-2024-49240,0,1,78d551b2715738f90759c6362c73081457a01ffe8adef933e389b9c28db4cf96,2024-10-21T16:25:06.660000 +CVE-2024-49241,0,1,ced2c9f8f56abb7af28fb742efb898ba3b84bfd63d997ce7c66c3757d8704591,2024-10-21T16:23:35.187000 CVE-2024-49242,0,0,586a55fc98220eb3b89355f325d218516b34ca52df3a40b28bc26dfdc1eda854,2024-10-16T16:38:14.557000 CVE-2024-49243,0,0,4b1a7f741e6cf054fab92e99d14eff608dd56e4bfe8460eb4ee0834653621fa1,2024-10-18T12:52:33.507000 CVE-2024-49244,0,0,b48fecbaff1a9b03923440d2dd0ef12c64c8628a3d4ea40c29e741b5ea5e7908,2024-10-18T12:52:33.507000 @@ -262504,7 +262506,7 @@ CVE-2024-49246,0,0,29d95ab5e5ada47ed1ce4c5316c1ed56016d0bd62d5eaa8336ee05aabfec2 CVE-2024-49247,0,0,53d4a3018db37a197b470c54ef2b547817388692345ae27d113283d6ff358a44,2024-10-16T16:38:14.557000 CVE-2024-49248,0,0,5faff4bb312391427ded9d8a70538602237b0eda16601aaf8b69a0fc4e882c09,2024-10-18T12:52:33.507000 CVE-2024-4925,0,0,e685289dc2254f889ad5a234b3fb30d6e7f6b2466e13190ceb3e2217a8a2793e,2024-06-04T19:20:53.933000 -CVE-2024-49250,0,0,2e0b2419e538f6623a5f3acc778b66738f5aedb70ddbdc87e7937924fc549dc8,2024-10-20T11:15:02.437000 +CVE-2024-49250,0,1,a8a1c3b10a4d4be61ebf5454e1c113a7a7af1e6f8066b5652aa02d5981789f54,2024-10-21T17:09:45.417000 CVE-2024-49251,0,0,1715499fccdde32ea2c893d31b436444d1bc0be13aed0a2d0465f762db10dd8b,2024-10-16T16:38:14.557000 CVE-2024-49252,0,0,182fb601bd0f0026d40746462390dd120c29fe4ba3aa7cbbc89f2ffc2d833923,2024-10-16T16:38:14.557000 CVE-2024-49253,0,0,c1f3ed991f55da6518dd76ba83c95379c82378b9259ca4d054ec768bb2d242ed,2024-10-16T16:38:14.557000 @@ -262526,10 +262528,10 @@ CVE-2024-49268,0,0,8e55027882e89f0cab080b75d56d3c5721f6f46b9ae50eb1c51727bddbf92 CVE-2024-4927,0,0,4ddbe2418b736eceb0ee18662dc9ab0b7588d5e8a0dde06117bae0c9075b3606,2024-06-12T12:15:09.767000 CVE-2024-49270,0,0,616a2e437b03b1730ae710990d1f9b5d13bcf5a41263b98d33736d5e3831391d,2024-10-16T16:38:14.557000 CVE-2024-49271,0,0,6fd9d076a620483355861bd31b6d3fba7a6e8c77968d9b9b52f107ebea5c9f8b,2024-10-16T16:38:14.557000 -CVE-2024-49272,0,0,6005fa9a888a1eeaa182b2aa818956ae0a6b05ce74c9bd899267ff9a3002fa9c,2024-10-20T11:15:02.650000 -CVE-2024-49273,0,0,7e20cd8ea0243666b7a04c3f2f1bfcea668080cd37a4a643b756062432ac9f76,2024-10-21T12:15:08.450000 -CVE-2024-49274,0,0,a233e4bc15eff903b2c2d5e8618b07413f960b599063e587f67c7ae40a18a5cb,2024-10-20T11:15:02.863000 -CVE-2024-49275,0,0,76b178cba6823b7b39e33385b621b5ef1a887fac280d97bdd39b76c4523c5042,2024-10-20T11:15:03.063000 +CVE-2024-49272,0,1,35dbb34939df8db9cd821a661440d3d5df12d4b23c425f61c3f57ebefafe232a,2024-10-21T17:09:45.417000 +CVE-2024-49273,0,1,a5a897527b0067d7fc9bedecaf463cda4dbaa650e993c2c454d9055227c03f02,2024-10-21T17:09:45.417000 +CVE-2024-49274,0,1,d24454ff18a4cea9bde361471644fdc86494a6ca0c31a5a742d9a88659f00bea,2024-10-21T17:09:45.417000 +CVE-2024-49275,0,1,dbf5599267d29ef4245799b6b4fc76ba2aad36babf03a5479c9573e2585efb9c,2024-10-21T17:09:45.417000 CVE-2024-49276,0,0,6a6b58791e9512e826c457e3bee8f08f7b1de60db24c986554adb1b116c01f0f,2024-10-18T12:52:33.507000 CVE-2024-49277,0,0,413e0fb3e700b4ddf1e7bf9c0606cf9c4881f3636c1ad9b858708a2ee8b7a3f5,2024-10-18T12:52:33.507000 CVE-2024-49278,0,0,f5bee9930ffbbfdde604c657853a18e3b9208ed8b4b0cf0c41230a88e43b006c,2024-10-18T12:52:33.507000 @@ -262541,15 +262543,15 @@ CVE-2024-49282,0,0,3a6f5cd82ec68a1bfbe1f4f156ef6268706ea2c2772c6f37ca60ccaad2879 CVE-2024-49283,0,0,261a1f8cfe011441b757e2549150d49caf0cbd82863bcb1702fead1f8711ada8,2024-10-18T12:52:33.507000 CVE-2024-49284,0,0,bec1f0da1bcb0850e4841345e95550bca16d99530b59e5207d183ff1f4e1c3e0,2024-10-18T12:52:33.507000 CVE-2024-49285,0,0,6f46c329c3d1526d526943e0333d6d72992c68afd2913a4ef362b73e606f2e17,2024-10-18T12:52:33.507000 -CVE-2024-49286,0,0,afd3215a4f6eb26b8efcaa632ef4959bc1f464dea27447d4b8933cf82ca9222b,2024-10-20T08:15:03.233000 +CVE-2024-49286,0,1,108055b32dbabbf87208ba9b1a3515f81d2816f4819990e07d500b22b78f7766,2024-10-21T17:09:45.417000 CVE-2024-49287,0,0,0066d2fce1ed85532c90a9906dc911278ca46d873038b8dcfb2d0c4b3b95c685,2024-10-18T12:52:33.507000 CVE-2024-49288,0,0,9794858fdab905561c3b5d43269f1d3f1bacba7fba1bb0436d9d456534b0053f,2024-10-18T12:52:33.507000 CVE-2024-49289,0,0,1007ec713acd15fdb5c2262f73a22207aad725968297cd9b79b0f4fcd3d741cb,2024-10-18T12:52:33.507000 CVE-2024-4929,0,0,6b801c4c5a7fb7e65ec83572f903c6a563e938f183cb222d57e6a2e237461199,2024-06-04T19:20:54.337000 -CVE-2024-49290,0,0,eb6bcb41e5eb7444117c64e0179e6cd34e2e2c74d6a8e77c1f29691623d12961,2024-10-20T11:15:03.260000 +CVE-2024-49290,0,1,ca285eb96563921fd866403c796035b720c64bd5a41fb3038947fe37a7ba59f4,2024-10-21T17:09:45.417000 CVE-2024-49291,0,0,44e011055ffcc94f31147e91008bfca453f458c355b4c10d5e081a4748d73d9a,2024-10-18T12:52:33.507000 CVE-2024-49292,0,0,5f09a14990b6c411313ed3c0517e00101a5bacb90324a262f26a26dc9ec6f772,2024-10-18T12:52:33.507000 -CVE-2024-49293,0,0,aa52ccb0b4a8375a04232bb23f1dd642f62b98fa282ab0bf1aa0530d7f127f9d,2024-10-21T12:15:08.683000 +CVE-2024-49293,0,1,85b3188f5ad662f7c78c35d48b4fe82df910c07f89c757b60e18d9db28978d29,2024-10-21T17:09:45.417000 CVE-2024-49295,0,0,2233f6c9986d9f1a990d0d54b1c1d91ca1475b5db77026f702ef776949b63fa2,2024-10-18T12:52:33.507000 CVE-2024-49296,0,0,f1042f70e89016c7f4e9d2a0f572f4f930b555774f6b329b232673bc13de033a,2024-10-18T12:52:33.507000 CVE-2024-49297,0,0,c01c0683901cb1b114e43805eef512c87c392594a83094740c5f93a462c76e65,2024-10-18T12:52:33.507000 @@ -262560,7 +262562,7 @@ CVE-2024-49301,0,0,7d2494e642de20b5bc929cc6d54a8fb5dcf5cfdb65768055f9017f846af36 CVE-2024-49302,0,0,710ce60d767e5f3fed4efed760bfd34a8e958088ece1205aa9bb54b219723f7a,2024-10-18T12:52:33.507000 CVE-2024-49304,0,0,58dd4c2ddea953ce346c3f95611ced2fd41151c190485df9958a7a12599bf8c0,2024-10-18T12:52:33.507000 CVE-2024-49305,0,0,40dab16b7a70081634fde6765f3a20a4620c68c7c77381519add7b12c075078b,2024-10-18T12:52:33.507000 -CVE-2024-49306,0,0,b160051bf913be3506368a066c82f43cca24b73859c192a461a1ee0ce279a33d,2024-10-20T11:15:03.460000 +CVE-2024-49306,0,1,6e663358c35449c1098c968e832336ab7c41f624aed97fd4aebf2e88d20f4e39,2024-10-21T17:09:45.417000 CVE-2024-49307,0,0,666a5148f43aeccd18eb31fe6200f031359163a4193a62896c07267bd5dddec8,2024-10-18T12:52:33.507000 CVE-2024-49308,0,0,80b5bf0dcffe8ff357d2779a75304405ea747e2bcb1322a132f94886c9a31297,2024-10-18T12:52:33.507000 CVE-2024-49309,0,0,6a184f4fa1aea4b522b78b6818e7a615b1f64b5d3ee9ecb78863e4ec5e510708,2024-10-18T12:52:33.507000 @@ -262577,25 +262579,28 @@ CVE-2024-49318,0,0,02cca54ff58508f7015bdc78b225c5402ac891d24584c9a2512f1a35e3987 CVE-2024-49319,0,0,42677cde087b60b4589de437a49f5349c2181024ba44b1ead05df0b607435f60,2024-10-18T12:52:33.507000 CVE-2024-4932,0,0,c4279e0e81804cf3f06e3c52edfd706c295877ccc3771ef54ad83261fb500b37,2024-05-17T02:40:43.357000 CVE-2024-49320,0,0,f646a0aed9b94f9c2a4b6085270ae6d0667dce332670da7784078783e12bfcb6,2024-10-18T12:52:33.507000 -CVE-2024-49321,0,0,00602def11659531ebafac7f536b903f4062098349e9e7c2156599e08e1401ef,2024-10-21T12:15:08.893000 +CVE-2024-49321,0,1,6ce68241db10c7838e4a51d2227fb9952bea2f4d972829a40692939256bd9db9,2024-10-21T17:09:45.417000 CVE-2024-49322,0,0,541e4efebd0d76588052862000e37b2e98e8b9ac15619c2b0422f26ed3288fd3,2024-10-18T12:52:33.507000 -CVE-2024-49323,0,0,a0c9fe1ee25043a5c6ce05b64b3da5b674bffb891728ab885f2c49640cf68957,2024-10-20T08:15:03.460000 -CVE-2024-49324,0,0,cc2f963c5f422ee0027ce69cf8bf6eafe929476dcf60ea9a2e07206d47bfbab4,2024-10-20T09:15:03.227000 -CVE-2024-49325,0,0,9df72777228182d0a9090ef68eaab934638b83a097fc69885b6bb8855853ca58,2024-10-20T11:15:03.657000 -CVE-2024-49326,0,0,d7908215e9d2214195d5bc633c5438a600bd9c43bad62020f15072425e6fcc81,2024-10-20T09:15:03.750000 -CVE-2024-49327,0,0,e41bb1c667eb48938a61682c1c37a793df0b5de0b414fa2a241672410499ff91,2024-10-20T09:15:04.440000 -CVE-2024-49328,0,0,0d6ecb7d5c6fcb51275a237ec2f39deaca4172d76585df39c61a1b0c61d9109a,2024-10-20T08:15:03.667000 -CVE-2024-49329,0,0,59670216a09b4738ba946011f66a4c6a99a3913bbd36d8936b66a62208466f47,2024-10-20T09:15:04.860000 +CVE-2024-49323,0,1,31588edf5efb1fb6420266f9d6a5ac9fb72acad257ee1a3b124e17a5d1cdca71,2024-10-21T17:09:45.417000 +CVE-2024-49324,0,1,6a0da56f8b241aa139bafdc8a7cea36b225bb8abdef936740223bb227ab67ca9,2024-10-21T17:09:45.417000 +CVE-2024-49325,0,1,4ac4b57df900fcec8decb92f9f1e1587fcd2104621bfc02130f55e709f4af9ab,2024-10-21T17:09:45.417000 +CVE-2024-49326,0,1,fda910b2c7a76bbf2c72386ba089c287f84555f7530f28eb58f294531de1ce7e,2024-10-21T17:09:45.417000 +CVE-2024-49327,0,1,8b6c9aef8923e1de12a4d100640ad37448b7c34f1bbdc4fa10821a94ae1473e5,2024-10-21T17:09:45.417000 +CVE-2024-49328,0,1,e4f0eb619105a2fb9096e959f1de7a194eb985b50f07943c58f8f1beea5b5c79,2024-10-21T17:09:45.417000 +CVE-2024-49329,0,1,f70bf73589c931aa9ccbd5a8a6c329a32fe219888977f917a6e7137433e9c5b9,2024-10-21T17:09:45.417000 CVE-2024-4933,0,0,4d4c0ec531cab6a4561c767f5a9082d29f26ceefaadcc74bb08507bf05ca5d17,2024-06-04T19:20:54.643000 -CVE-2024-49330,0,0,4a14d60e6487eed0a0e509e68520c01a154c90f737f6d3f17ca17d212bc1005a,2024-10-20T09:15:05.133000 -CVE-2024-49331,0,0,8315190692b66bdd9dc06750b13ee16e7d7ed6ee7975da2ee77eecdc1b9ec128,2024-10-20T09:15:05.377000 -CVE-2024-49332,0,0,b946a62d8dd58f6ed9eeec4e464b268cf9dc10e8958bc966734228931575c636,2024-10-20T09:15:05.560000 -CVE-2024-49334,0,0,593a46afaef51690e8b3758fb4bd27c91fe210e50d585ffc4f5027ebabcfb2a7,2024-10-20T08:15:03.907000 -CVE-2024-49335,0,0,bd3d818e564d33e1dded1c7c97e9cc68566642cdf9b198edaa39fc72b391f966,2024-10-20T10:15:03.430000 +CVE-2024-49330,0,1,7accf1e781f0aa61906365473fdf4af87b4754ed339a7ad495b0c4ebeff22d13,2024-10-21T17:09:45.417000 +CVE-2024-49331,0,1,9ec402693291c894424e66eebc985f7e7ba3ce5bb7349cf58ad68284e18ecc68,2024-10-21T17:09:45.417000 +CVE-2024-49332,0,1,a9ab39a4ab9de09d13501701addd6e3ccdaf63be93c7bf933ca946939905c6cb,2024-10-21T17:09:45.417000 +CVE-2024-49334,0,1,df99f33d90832b7913746eaa7f8520eb2745d74922012cf53ed47a6cdfd3843c,2024-10-21T17:09:45.417000 +CVE-2024-49335,0,1,e0582084d760a7c1b5edb6582a5c201af75fdc2362c78425525e3f7ed66f6ebc,2024-10-21T17:09:45.417000 CVE-2024-4934,0,0,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b62f,2024-08-01T13:59:37.220000 CVE-2024-49340,0,0,37285f025630fd9eb79c4269f84ef859e190bfac2e34728b5f3d3dbad2273eb0,2024-10-16T16:38:14.557000 CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a658,2024-08-06T18:29:27.013000 -CVE-2024-49361,0,0,1914adc363f3d39bdf967f02f759842793e4fba888d46410258626ddf81d72f1,2024-10-18T19:15:14.393000 +CVE-2024-49361,0,1,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e281007d,2024-10-21T17:10:22.857000 +CVE-2024-49366,1,1,dba23a6a5d899dfc1dd93480431c60e66516ce3fea9b6f89406c417953de1770,2024-10-21T17:15:03.567000 +CVE-2024-49367,1,1,9cdea4233abdf31e5711ba3faae763fba0a540ae42a436f6b5d5034f60f32d59,2024-10-21T17:15:03.783000 +CVE-2024-49368,1,1,4323388038598adba9c2e6f2533f5d2b25d45af0a630786c844ee55a0bab465d,2024-10-21T17:15:03.960000 CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000 CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000 CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000 @@ -262631,37 +262636,37 @@ CVE-2024-49580,0,0,2a4b2f9ee960712197ef0f3776cc1a15f015ed4f9adbe3a24755a9ff67152 CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000 CVE-2024-49593,0,0,28b8568333d09b89b040a623f287dcf302e51d7008368ee150b7fde946577e54,2024-10-18T12:53:04.627000 CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000 -CVE-2024-49604,0,0,b40933b0080b8f014da1d2708b99a9bd5694c1bc5fb401c2b9cc2bcd9eb9aabe,2024-10-20T08:15:04.117000 -CVE-2024-49605,0,0,c8b91a8df179cf12f03687dece48dc98c1d85430d37b748abd1280f9ac90fef4,2024-10-20T10:15:03.640000 -CVE-2024-49606,0,0,970c4f813628b1c92dfe10abaccfba5e5bb9dcacf698b41a73eab726e1985769,2024-10-20T08:15:04.323000 -CVE-2024-49607,0,0,394d1823ee45ac19dcec09bf4d66a301e3354aa44e2c061cc1cf9d5564aabd0c,2024-10-20T09:15:05.763000 -CVE-2024-49608,0,0,5703481f68249d421fa1894222a1c8fdcb1148e41f290d4834fe8cacc7c5c9f2,2024-10-20T09:15:05.973000 -CVE-2024-49609,0,0,4778251f408a40d30b7e076a1848a5654ebb60d92bbab4b5ff2405754725f4f5,2024-10-20T10:15:03.860000 +CVE-2024-49604,0,1,dd1305ca7435bc4e8c076d067f4a80af070415eb72501c5c21a101622376e51b,2024-10-21T17:09:45.417000 +CVE-2024-49605,0,1,60247b99368f7bfa4039a3fcf801765c9601ec753a06227ddc6351d1c84fa963,2024-10-21T17:09:45.417000 +CVE-2024-49606,0,1,121c09c76d4b6e894d5ebd1b707360988d1d01435b0cb03ae392f5549358eb50,2024-10-21T17:09:45.417000 +CVE-2024-49607,0,1,65d4fe3b1dba2addf1a61a3c95e064bb0d23c04de7591f7f59b2b0d73eaf55e6,2024-10-21T17:09:45.417000 +CVE-2024-49608,0,1,5d356ee42b416b0e34ac84baa67290c9c17b7c79aeab97e7f4d0a4ee1a8d45f5,2024-10-21T17:09:45.417000 +CVE-2024-49609,0,1,58b5c9be468b513e3488cad4f69b335640bd2a9cfa84d94939a2898ec9a3cd0c,2024-10-21T17:09:45.417000 CVE-2024-4961,0,0,fcb73b246c680abaae254870453939d7dbf5d8c46c3dbb2f7ab747d994c3a111,2024-08-01T21:15:53.893000 -CVE-2024-49610,0,0,b101be7ee593fa54887871bddc9d836a4ce7e6f96fc62bf46db38e2c2511cac7,2024-10-20T09:15:06.190000 -CVE-2024-49611,0,0,c4b41ef91e7d543f2fac2d2d92091ee29cb741f381295d71e0c877c5c7190fbe,2024-10-20T08:15:04.523000 -CVE-2024-49612,0,0,1f797abcb29039806457eb80ab51d9cfab363b16d4515478a67f891fedb83f0b,2024-10-20T10:15:04.053000 -CVE-2024-49613,0,0,6a532176e64e3612e2a88812ebe12c2511283729c5d5f714ddef0cc53ed53a27,2024-10-20T10:15:04.263000 -CVE-2024-49614,0,0,84fe2b3b72d127ff552f39d783df59f42f757358082fb079bf106cae073efc25,2024-10-20T10:15:04.477000 -CVE-2024-49615,0,0,9cb61e08d9f5dcae695c862084239d672f4ec44827983f70bbc01022c2d0a033,2024-10-20T10:15:04.690000 -CVE-2024-49616,0,0,08a9e0f59c6b404014ce65c231be180ec79f795845c1bab9ffd0df79d2008ad0,2024-10-20T10:15:04.903000 -CVE-2024-49617,0,0,d075fcb8ec40d8bae8573a2f5874c6b74fac10a3d394d8fd4dccd93695539aaa,2024-10-20T10:15:05.130000 -CVE-2024-49618,0,0,b5f1ea0b2c5a87c5276afadfd5e726e1641cbabe6853546de5104fa8ab70155e,2024-10-20T10:15:05.347000 -CVE-2024-49619,0,0,83f0f55d3ff0f5cb31a21bc15d7d560fa98e859db7849c6a97176ad4dbfab637,2024-10-20T10:15:05.560000 +CVE-2024-49610,0,1,4f883c779c7b80912a16a7cdc0e52ccc8dd24129efdfa293f6a1ccc1bf1526fe,2024-10-21T17:09:45.417000 +CVE-2024-49611,0,1,c7f7e09d8f83b62743396c3bd4904fddaab94d00a5cf5a5c7129906b3bdbdafc,2024-10-21T17:09:45.417000 +CVE-2024-49612,0,1,acd6c0707ff81a9cd91d7e43f1e50373957b69b17c638b1ca230b26e66d303b8,2024-10-21T17:09:45.417000 +CVE-2024-49613,0,1,58d58cb063d46f69b8ced6aac4a2715db7aeb57dad9197fd1711dfcf8362c7a9,2024-10-21T17:09:45.417000 +CVE-2024-49614,0,1,e5c1eec69a0fa089433a222f5c2bef7f18b18014a6fff50a0e295f4aac592a1b,2024-10-21T17:09:45.417000 +CVE-2024-49615,0,1,ba81ea33ad44e9028a5a08fbc9b26c419164367943e113f8f0ddf78b9b8c69b0,2024-10-21T17:09:45.417000 +CVE-2024-49616,0,1,9a594ac2e99bd2ea3d04b4336df6a62b74a73cba884d04e5a4c50b731f2c0fcc,2024-10-21T17:09:45.417000 +CVE-2024-49617,0,1,fc3bc12b8230aeed8fe5e270ffff12b76ff2c45b03602b48cb05ca2b01bcb351,2024-10-21T17:09:45.417000 +CVE-2024-49618,0,1,b259022a82a9786efc0f4b97a99bb745863f5ea5c29985d8c38260ee2752bd41,2024-10-21T17:09:45.417000 +CVE-2024-49619,0,1,e8500ad2f662c42eb5cefcb54e6583c1e771076814e70ad1ad1341515be5295a,2024-10-21T17:09:45.417000 CVE-2024-4962,0,0,b9e851b58a3c7e382510249caa4fcb1d6185432495cf3586b8784f0d9e4becfd,2024-08-01T21:15:54 -CVE-2024-49620,0,0,ace0e3dd31da55f7042660788ac8aa4459be4ba98045162f791a388c1ba91743,2024-10-20T10:15:05.770000 -CVE-2024-49621,0,0,31c5fc383c2bcd92c8016fc1e37275b190c35f48a40db581601ab773f1a0cc51,2024-10-20T09:15:06.390000 -CVE-2024-49622,0,0,bc572e3dd5a73f77b49c87edadcb0ac0fb6fabc75afd5e88d295cad9a4c6127f,2024-10-20T09:15:06.613000 -CVE-2024-49623,0,0,f6c67fa2af542014e989cfcfe48235a26dcefd0e335430c5b37d90bf937998d5,2024-10-20T09:15:06.810000 -CVE-2024-49624,0,0,8847baeee1605f47537944445db3a53a137bb62a458b2490652be0df62649a76,2024-10-20T09:15:07.013000 -CVE-2024-49625,0,0,b834beffa72f84e4ed52feffb817767630e94087ee1dc7bde031b748f614fba0,2024-10-20T09:15:07.220000 -CVE-2024-49626,0,0,8eec36db163acf17703deb452e38c37d7800102b1591ba9946f04fb09303b66d,2024-10-20T08:15:04.730000 -CVE-2024-49627,0,0,c69f9e379c7eae08bd88d21a253d9105fda03949487beddc18e488db1f228fdd,2024-10-20T11:15:03.873000 -CVE-2024-49628,0,0,2fab35dba9c95af63e2ac61ab446f4d0add0a5713e0f15831fa201deddba9332,2024-10-20T11:15:04.077000 -CVE-2024-49629,0,0,250a834ce1e45a2303a39b725561ab1ce639b8f64d3f703144b8e46fe79d7b65,2024-10-20T10:15:05.990000 +CVE-2024-49620,0,1,03cc08ebcdb9c3da220e8f96b59d9d80dae0359c2d758e8d050a48cf9a60b6aa,2024-10-21T17:09:45.417000 +CVE-2024-49621,0,1,40c855e29a106464758c24a1bdb5df74f7e1f130c174b2cc39a416ce5bb07c0c,2024-10-21T17:09:45.417000 +CVE-2024-49622,0,1,f0d5dfa8c1ebf53d61bf597989f9b1e80a9b4ef9f6fb536f6dfaf31578dfe1b7,2024-10-21T17:09:45.417000 +CVE-2024-49623,0,1,92ff26855c35b1121f5df0b6550942b0b302d581178f4d79b65884f9961098bf,2024-10-21T17:09:45.417000 +CVE-2024-49624,0,1,94bbce3e9ae8d90bc2dd4db17a45b73dbd3b3950e84c88aa4d648b5929508d4d,2024-10-21T17:09:45.417000 +CVE-2024-49625,0,1,5b73196ab0d05a93dafb194b451d298f78f2ee157d4632f83bd5b31758525297,2024-10-21T17:09:45.417000 +CVE-2024-49626,0,1,30b476bad37b23d5536d26c14f0dafff57d002dc743ec7c754db73e32a2b6557,2024-10-21T17:09:45.417000 +CVE-2024-49627,0,1,5d11bcc891c8d8cf00052461e3d725934fb31197b275163731f95b7cf3dbe29d,2024-10-21T17:09:45.417000 +CVE-2024-49628,0,1,224bc72afc8883a1b63da91d6f011242a5ba5e37e5116785518926bf06a455af,2024-10-21T17:09:45.417000 +CVE-2024-49629,0,1,42f6961ef4307d0c57b7c28fafc507c1b62da86a999f15d54367bb0cc46d1073,2024-10-21T17:09:45.417000 CVE-2024-4963,0,0,ef1fba35c0790604656a5e5622c9c7f4af0f1d1414e5784cd7a21207910d8397,2024-08-01T21:15:54.113000 -CVE-2024-49630,0,0,c6691254deb15688d63a82ac964df1c02ee7fab215e1972b2aba0fd7a14bf009,2024-10-20T08:15:04.933000 -CVE-2024-49631,0,0,8a93e4c32c1333afdbac1599269c1679d369ac64b691a32e25df596e3de86d58,2024-10-20T08:15:05.130000 +CVE-2024-49630,0,1,fc02361dbe836b234c4f2baea1ce95c4f8783a553a50fe9d797af011750ca971,2024-10-21T17:09:45.417000 +CVE-2024-49631,0,1,90e84d249ffc88bac8ba7984e2725c172d8e09dd6e795888b9ed719f758a8be8,2024-10-21T17:09:45.417000 CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68be3,2024-08-01T21:15:54.223000 CVE-2024-4965,0,0,5bd9bf33c1ad1b27237ab2761363d4d9817c8f50155c84d844f98b12772718a0,2024-08-08T15:15:18.730000 CVE-2024-4966,0,0,ca96dc16e6a41cb4de3af3c10d7787996b0688fd8eb0522e09efb3ad5052b418,2024-05-17T02:40:44.507000 @@ -262681,19 +262686,19 @@ CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506 CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000 CVE-2024-4984,0,0,9f2b9cbe42298dc633fd7a95b66e0d4fdcec1b53d37f19261bcfa2f1a75e3637,2024-05-16T13:03:05.353000 CVE-2024-4985,0,0,df226dda87642aeec36f0fe802a8cb1e52b5f8e667dcfe00ff42a5cc0d642f7f,2024-05-21T12:37:59.687000 -CVE-2024-49850,0,0,81e39aabe6d7cf602d5a3961a2cd4909d8604493c82805ea87c561555c9d80a1,2024-10-21T13:15:05.797000 -CVE-2024-49851,0,0,ff48b9b6433475e3e4e79fd0738408ff418d755e5e4885bddccb2b352b4fe3de,2024-10-21T13:15:05.883000 -CVE-2024-49852,0,0,c52bab8531db091d06488a98aef027bc8b53973f848c3c9a3954555efc4a5752,2024-10-21T13:15:05.977000 -CVE-2024-49853,0,0,3d9ea39f76afbaec0504f6b09f6e1ef2b6aacb4870a2b7436af6070725008648,2024-10-21T13:15:06.083000 -CVE-2024-49854,0,0,7732cd96e5aede20ca3921413c27338efa1c9177cc39f7151175f2100c390f66,2024-10-21T13:15:06.203000 -CVE-2024-49855,0,0,05b6fb19bbafe74f441a2c2634f8460851a004c85b77b65656587403c012b3b9,2024-10-21T13:15:06.270000 -CVE-2024-49856,0,0,b537355e99a1e7cc49f58e6ad9c832e9e87765e276d136535381dd71771dbf21,2024-10-21T13:15:06.353000 -CVE-2024-49857,0,0,b430ca56627c1d1dcfd87251a1e7d623627f55f519cffdc61a1a3fe3749a7e30,2024-10-21T13:15:06.447000 -CVE-2024-49858,0,0,7dcb59b5727e376f27170eb27270b30af4756b049d5f621a7b6ef403bf1f8a5a,2024-10-21T13:15:06.543000 -CVE-2024-49859,0,0,3d4e004978b918cf35760ca264c25b8048dd71f247a8aff449c868123ec97212,2024-10-21T13:15:06.627000 -CVE-2024-49860,0,0,26a9aa7a71fc77fdb26c4ea43d5056f4bdeeb2e34f581b6e9eb706215bdce0c9,2024-10-21T13:15:06.723000 -CVE-2024-49861,0,0,be8c233885edb763a0218dd2d9109e999f273171e2e460d07d8ccdca3f00ae57,2024-10-21T13:15:06.800000 -CVE-2024-49862,0,0,3db26bd3875a27aba01e150640ca73a58bf814959fab4c8ee43dcc33d12801af,2024-10-21T13:15:06.893000 +CVE-2024-49850,0,1,8fb2208ed48bdb26222d1dc252f610fc96b2529a3c2127408e4890cb805ccb01,2024-10-21T17:09:45.417000 +CVE-2024-49851,0,1,3d484e6abda4a4ce29d99f10316c857626eb63bf2eefc7621c465c7b13c23949,2024-10-21T17:09:45.417000 +CVE-2024-49852,0,1,262ffe2d9e462bcad9f414c5114ff048fe0027922ed23ed53a0208a484284b67,2024-10-21T17:09:45.417000 +CVE-2024-49853,0,1,c217dd9272b2cd4fab6ae4f4c0fffed7f5095340c59c640aa7cae9145dfe0c13,2024-10-21T17:09:45.417000 +CVE-2024-49854,0,1,94138472b5f74b096a6e54fd3e7d9e10ac0cdb3bdf0c5b3ece24fbd6184cc9bd,2024-10-21T17:09:45.417000 +CVE-2024-49855,0,1,235fb5bbf6b64bf0c06e4e4c1e39a908de2bffefa4fddbca2ff5b11743de9310,2024-10-21T17:09:45.417000 +CVE-2024-49856,0,1,69c6d5b77115b2740f272ad46ab48ff11264f8cb25014c56c24110ee5f0eca13,2024-10-21T17:09:45.417000 +CVE-2024-49857,0,1,0e7ad00892cfc9a63f2340d55a3723b73d5cb90a5adcfb83725f0752cceab15a,2024-10-21T17:09:45.417000 +CVE-2024-49858,0,1,189a38e2e1729e4f650f5ed2d9949d8780bddccdc0a5c8eca5c522d45db87500,2024-10-21T17:09:45.417000 +CVE-2024-49859,0,1,eddb9cd522b0a40cdf04d9de3fb4a472c8ba55ab85e4eab90561b01c58a4d337,2024-10-21T17:09:45.417000 +CVE-2024-49860,0,1,f5150f7cf3bb2d2d0ca50e9d424c876fd9c84254fcf7bd6f2627024294f5ef2f,2024-10-21T17:09:45.417000 +CVE-2024-49861,0,1,f8d823d453896bd63aeb95297d35b7ca2209aad13429ece51e5e583706dfbad3,2024-10-21T17:09:45.417000 +CVE-2024-49862,0,1,0c94aa307fd6d2aeab9692641051191e71a94c4443ed0051d87097b98891acf2,2024-10-21T17:09:45.417000 CVE-2024-4988,0,0,ff557f66f633c813e65ed42f6b56820b4233d3efc23d00548e6797ba166f3d35,2024-08-21T03:15:05.460000 CVE-2024-4991,0,0,3aef226cc1578adb6c75565d63e7f13bcda4a2e79607b48e5e73e305c3d938d8,2024-05-16T13:03:05.353000 CVE-2024-4992,0,0,e061228a83f2d41e21e64f404fd50aefb3a354b638438e4cf4870e41885d01e3,2024-05-16T13:03:05.353000 @@ -264034,7 +264039,7 @@ CVE-2024-6512,0,0,906938fa7a056c51f95f91dd79dd34ac36ca181a28b11365ac04b0f9d5c622 CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000 CVE-2024-6517,0,0,f170167d48def43eb19df077ff3ef68c655e06896ed245e4dd4a412fc6b98463,2024-10-02T17:15:56.760000 CVE-2024-6518,0,0,7382529f36b9b37e0acec24889e25676a677588945f854438be53c4cb8bd58b0,2024-08-27T13:15:20.033000 -CVE-2024-6519,1,1,1b0239ffb7b3d5ea0c1ea3a792d393a0c60e209ef63dcb939f276402728bfa7b,2024-10-21T15:15:03.727000 +CVE-2024-6519,0,1,073f743ba20119be7a27ef571c7b0b153e0acf051fc8b85888a98b5c92e22d0a,2024-10-21T17:09:45.417000 CVE-2024-6520,0,0,788783a471766cea8e4d7400c47ef97ab3609f9b749a996b82510813b15dd35e,2024-08-27T13:15:39.697000 CVE-2024-6521,0,0,3aa5a2c2ac838fced00e2bfb97108d19e91480ed8940bd254983de5af0ee5d87,2024-08-27T13:14:02.300000 CVE-2024-6522,0,0,57b6846d29921e8cee4fe4e801365e7e03862527d6b402bc781bfd457598eb8d,2024-08-07T15:17:46.717000 @@ -265427,7 +265432,7 @@ CVE-2024-8301,0,0,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452f CVE-2024-8302,0,0,e8302268b823029df660336594addee00302ff9a5d73561baeea3f2fb742c200,2024-09-19T21:55:54.683000 CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000 CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000 -CVE-2024-8305,1,1,c4bbab6fbb25bfb16e112ba74e49023c1c867b51dc6cdee4544cab0fe4bdc94e,2024-10-21T15:15:04.030000 +CVE-2024-8305,0,1,d66b035463acddb1c93013687fce349938f4d85da7d81154c45e44366bbf218f,2024-10-21T17:09:45.417000 CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000 CVE-2024-8310,0,0,7c8549a7a64d3579b34aa56e199885805550ab7f5a2102b636629253bc8a75c3,2024-09-30T12:45:57.823000 CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000 @@ -265645,7 +265650,7 @@ CVE-2024-8621,0,0,da11617ee187bea39361c3e736358efdd8e000970ca04e836eaac8c5eeb75d CVE-2024-8622,0,0,3dd68829fc11e22f0c21c42ebfb82eece7f179bcaa47d99ccdf324ecdb81f1e2,2024-09-26T14:59:27.770000 CVE-2024-8623,0,0,b38d11e5ea040f7d1c1df76eb8b329847342918d3746a88d315f2eac79041136,2024-09-26T16:46:28.590000 CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec06617,2024-09-26T16:45:40.470000 -CVE-2024-8625,0,0,5b80dacef0e2cfb1111f2d420564fcb1b3e85f81594a89733f63e678ec4a116e,2024-10-21T06:15:02.207000 +CVE-2024-8625,0,1,eaa35f0f916143fbe7a79cf12dd88e2402dd5c384be43d893a2fa29be259065a,2024-10-21T17:09:45.417000 CVE-2024-8626,0,0,0a3a6a067accd62c7f1e4362c07a97c5507716edc2a0ef32e9c35b5c51ec20a4,2024-10-10T12:56:30.817000 CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102be,2024-09-26T16:42:16.700000 CVE-2024-8629,0,0,6c9063bb86e9be09fbe263c2afa91e0d043c7779d47db076384be2da04357d8a,2024-10-10T12:56:30.817000 @@ -265992,7 +265997,7 @@ CVE-2024-9211,0,0,2701fea91f9be8cf1cd1e5693145c9b46f27f6fcdb96052a4b980af632a066 CVE-2024-9213,0,0,31f33319f9359990d4006b16b291c444261bcf993a594e4963d2f42975eaaf14,2024-10-18T12:52:33.507000 CVE-2024-9215,0,0,a2b4a7b85cc10e131d947f9ea57761eb1ffd891ccc6b3de8f68e6c912c75a7eb,2024-10-18T12:53:04.627000 CVE-2024-9218,0,0,1fe5a0dc5cbc5663db71bfb2b02fdc2baeca2012618f21fc2618b5a68d78cab6,2024-10-08T15:33:58.617000 -CVE-2024-9219,0,0,0212b723b5837ba301f83fb90cbcf354553485b046b601dd80a90d21067cef5f,2024-10-19T04:15:05.560000 +CVE-2024-9219,0,1,3fb4b1b0c7097a00793e0d6302e53c6669eb1da87cc370b9efc41cda4d03081f,2024-10-21T17:10:22.857000 CVE-2024-9220,0,0,6bac7ddea6b917eb69cb1f74123e8b2dddc4799202193b6b6e16b0128e05e777,2024-10-07T19:19:59.487000 CVE-2024-9221,0,0,feb1b16d88be55b92259cd20b799cece7abb9935cf5adfed4d1f38e82a4356d4,2024-10-15T12:58:51.050000 CVE-2024-9222,0,0,aa75daaaa6f167f771e02be32b7ac6d9115eba757cf38ea3ae7fe336f82931ef,2024-10-08T15:34:13.250000 @@ -266160,7 +266165,7 @@ CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca7 CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000 CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000 CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000 -CVE-2024-9537,0,0,0867f643eef9b66e488d49fcb5508ad309f5909e28341670b6a823d0d0087a06,2024-10-18T20:15:03.527000 +CVE-2024-9537,0,1,8ca47aec3d299c4fb3f2bb252c574303ee503de8dd61df97105c909a49def806,2024-10-21T17:10:22.857000 CVE-2024-9538,0,0,11f6571425b77352661bef56e196d840faf334a919cdd5771fb07fb3f313a4e6,2024-10-15T12:58:51.050000 CVE-2024-9539,0,0,a0cbd26a327675fb40fcaea93c0a3ea911dbc683021df526355995459666c7a0,2024-10-15T12:57:46.880000 CVE-2024-9540,0,0,155792833f2c3d33a8c6cc679a0bdb6a5ac3f76d67aede19f5592875c2f877b6,2024-10-16T16:38:14.557000 @@ -266200,7 +266205,7 @@ CVE-2024-9582,0,0,6ec198135418f168eaebdeafd2e2fe73c3f44201fb3d949937a7b4e70c974b CVE-2024-9586,0,0,a482a25f032ea940edbd74f8dc11272d0d4fecf517c5613466c04b8bd798dc3e,2024-10-15T12:58:51.050000 CVE-2024-9587,0,0,081ae6ebdba381265a40b327141c3458d6ec1c5b94d7fb86236bf633a93923d3,2024-10-15T12:58:51.050000 CVE-2024-9592,0,0,6f7f83fab1eebba9a1f954ec84a1bbaa3c51a5f9b9c0e4a02c7010d63a53fba8,2024-10-15T12:57:46.880000 -CVE-2024-9593,0,0,217659af2dbe7f16c994242cd24c3f7f80a396da357cd4500002c854d6d23c61,2024-10-18T18:15:04.540000 +CVE-2024-9593,0,1,cce5b3ee491d6630c052fcb33edfbddbd5dba3d44ec1ac1a1bc92ad9d40ee350,2024-10-21T17:10:22.857000 CVE-2024-9594,0,0,76152af657dea527c4e562a1c5799c4834f4bf18cf4ca885159373bfd78ad4ca,2024-10-16T16:38:14.557000 CVE-2024-9595,0,0,6e91591cc8fc6f8664de9cf116e0c3ff35185abd26eee85b7100e07838bd2f63,2024-10-15T12:57:46.880000 CVE-2024-9596,0,0,b127f83f2b318ff048db80701b5c7105ea78e0681a89ee2fdf37846a5fa10d86,2024-10-16T17:00:19.787000 @@ -266287,13 +266292,13 @@ CVE-2024-9863,0,0,5a2779f928f03a35905e31f60158c72d5505c6aaa35173f98063e46d2c1389 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000 CVE-2024-9873,0,0,54e1b937a83aa8c512a9ce3ab381594073150b73716fb01cf60c5f6e4db0c415,2024-10-16T16:38:14.557000 CVE-2024-9888,0,0,de5de1e3177c72ea1d0a5d19aa48b1693390bd1baf1f85524c962ffa2c18433f,2024-10-16T16:38:14.557000 -CVE-2024-9889,0,0,0b3b7545dde906fe90387e12e3b83b4a894a23cbd921465fbc28a4b03f9f9d4f,2024-10-19T07:15:03.073000 +CVE-2024-9889,0,1,ae2d8b3ae5ea45b7bf6ef4fc45ab8d1cf63876d506d81aa02cc186300793ec67,2024-10-21T17:10:22.857000 CVE-2024-9891,0,0,53ec4da3ba927732190105b9993cdfaefd46788f3c82dc582d229482b0eb1fcc,2024-10-16T16:38:14.557000 CVE-2024-9892,0,0,584f5c7c0c5a775fc15fb3ba6088d5cb7abd48140a1f2b1bd6d2a1fd7b17f015,2024-10-18T12:52:33.507000 CVE-2024-9893,0,0,d84489165ec702532da777a72a4e467826e650640db0f44ed30b8d433e32a61e,2024-10-16T16:38:14.557000 CVE-2024-9894,0,0,32055c4142b72d0a3f9c19293b700e4df1192ff16d337368689045e8c50a9c33,2024-10-16T22:13:05.583000 CVE-2024-9895,0,0,9f4575888232de3c29cfc8d0d4e2d5d892b3f5ec9e574dd895cb53771a8a3d74,2024-10-17T20:50:03.503000 -CVE-2024-9897,0,0,064099574bceac97f000a2cb328480b18db5cd3caebd8f6bfb5719dc89a2c154,2024-10-19T10:15:05.420000 +CVE-2024-9897,0,1,f308c0111617eadaadafb29e97ec039364f5185710cd1efe1ec56329c77092f7,2024-10-21T17:09:45.417000 CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000 CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000 CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000