From 115bef71218decdbae78b109959e2c01eeaa24f0 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 16 Mar 2024 23:03:26 +0000 Subject: [PATCH] Auto-Update: 2024-03-16T23:00:37.755577+00:00 --- CVE-2024/CVE-2024-24xx/CVE-2024-2479.json | 6 +- CVE-2024/CVE-2024-24xx/CVE-2024-2480.json | 6 +- CVE-2024/CVE-2024-25xx/CVE-2024-2530.json | 88 +++++++++++++++++++++++ CVE-2024/CVE-2024-25xx/CVE-2024-2531.json | 88 +++++++++++++++++++++++ CVE-2024/CVE-2024-25xx/CVE-2024-2532.json | 88 +++++++++++++++++++++++ README.md | 19 ++--- _state.csv | 15 ++-- 7 files changed, 293 insertions(+), 17 deletions(-) create mode 100644 CVE-2024/CVE-2024-25xx/CVE-2024-2530.json create mode 100644 CVE-2024/CVE-2024-25xx/CVE-2024-2531.json create mode 100644 CVE-2024/CVE-2024-25xx/CVE-2024-2532.json diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2479.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2479.json index 298b6a5284e..57cdd0686d9 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2479.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2479.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2479", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T06:15:10.460", - "lastModified": "2024-03-15T12:53:06.423", + "lastModified": "2024-03-16T22:15:07.180", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in MHA Sistemas arMHAzena 9.6.0.0. This affects an unknown part of the component Cadastro Page. The manipulation of the argument Query leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256887. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en MHA Sistemas arMHAzena 9.6.0.0 y clasificada como problem\u00e1tica. Una parte desconocida del componente Cadastro Page afecta a una parte desconocida. La manipulaci\u00f3n del argumento Consulta conduce a cross-site scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-256887. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2480.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2480.json index 2d5e76a2f7b..15626e6f9a7 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2480.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2480.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2480", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T06:15:10.890", - "lastModified": "2024-03-15T12:53:06.423", + "lastModified": "2024-03-16T22:15:07.317", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in MHA Sistemas arMHAzena 9.6.0.0. This vulnerability affects unknown code of the component Executa Page. The manipulation of the argument Companhia/Planta/Agente de/Agente at\u00e9 leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-256888. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en MHA Sistemas arMHAzena 9.6.0.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del componente Executa Page. La manipulaci\u00f3n del argumento Companhia/Planta/Agente de/Agente at\u00e9 conduce a la inyecci\u00f3n sql. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-256888. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2530.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2530.json new file mode 100644 index 00000000000..1de3057ee15 --- /dev/null +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2530.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2530", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-16T21:15:29.733", + "lastModified": "2024-03-16T21:15:29.733", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/update-rooms.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256967. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20update-rooms.php.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.256967", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.256967", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2531.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2531.json new file mode 100644 index 00000000000..a76bdd05184 --- /dev/null +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2531.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2531", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-16T22:15:07.400", + "lastModified": "2024-03-16T22:15:07.400", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0. Affected is an unknown function of the file /admin/update-rooms.php. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-256968. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Arbitrary%20File%20Upload%20-%20update-rooms.php.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.256968", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.256968", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2532.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2532.json new file mode 100644 index 00000000000..2da62bdd7ac --- /dev/null +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2532.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2532", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-16T22:15:07.613", + "lastModified": "2024-03-16T22:15:07.613", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/update-users.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256969 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-users.php.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.256969", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.256969", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6b664043630..bbca2487488 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-16T21:00:38.269083+00:00 +2024-03-16T23:00:37.755577+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-16T20:15:06.947000+00:00 +2024-03-16T22:15:07.613000+00:00 ``` ### Last Data Feed Release @@ -29,23 +29,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -241711 +241714 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `3` -* [CVE-2024-2526](CVE-2024/CVE-2024-25xx/CVE-2024-2526.json) (`2024-03-16T19:15:06.087`) -* [CVE-2024-2527](CVE-2024/CVE-2024-25xx/CVE-2024-2527.json) (`2024-03-16T19:15:06.317`) -* [CVE-2024-2528](CVE-2024/CVE-2024-25xx/CVE-2024-2528.json) (`2024-03-16T20:15:06.713`) -* [CVE-2024-2529](CVE-2024/CVE-2024-25xx/CVE-2024-2529.json) (`2024-03-16T20:15:06.947`) +* [CVE-2024-2530](CVE-2024/CVE-2024-25xx/CVE-2024-2530.json) (`2024-03-16T21:15:29.733`) +* [CVE-2024-2531](CVE-2024/CVE-2024-25xx/CVE-2024-2531.json) (`2024-03-16T22:15:07.400`) +* [CVE-2024-2532](CVE-2024/CVE-2024-25xx/CVE-2024-2532.json) (`2024-03-16T22:15:07.613`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `2` +* [CVE-2024-2479](CVE-2024/CVE-2024-24xx/CVE-2024-2479.json) (`2024-03-16T22:15:07.180`) +* [CVE-2024-2480](CVE-2024/CVE-2024-24xx/CVE-2024-2480.json) (`2024-03-16T22:15:07.317`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 6a80928aafa..4d2e5cadd74 100644 --- a/_state.csv +++ b/_state.csv @@ -240720,13 +240720,13 @@ CVE-2024-24783,0,0,12be64e2db63a036341461fa12b20bbb20b8ea46e325e75c94cfb782663e8 CVE-2024-24784,0,0,5450058de71553b9cf7fdedc345d5ee5f35be919b251db9a4b49d663fd2c521a,2024-03-06T15:18:08.093000 CVE-2024-24785,0,0,7b9073a1f2be203ed1de8c1594434fc8421a0c0316879bd3f71a1253b422083d,2024-03-06T15:18:08.093000 CVE-2024-24786,0,0,9a7cdd8ad660e7a56a83d0409ccc2144904f9d91b9b4d12f7d622b82700c0904,2024-03-06T15:18:08.093000 -CVE-2024-2479,0,0,47b3c19b0298507568d5036163a3e382a6395cdee86b21dfccff1f2ad7aa300a,2024-03-15T12:53:06.423000 +CVE-2024-2479,0,1,4e42a85cd7a5dd6437b5c3ced2d2d4d3166c7ca25f9d2edd1908301a9882710f,2024-03-16T22:15:07.180000 CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000 CVE-2024-24796,0,0,a14eda4226a58c2c4e1be311d88c2631825b3dc125c63aa2226f772d7e85a358,2024-02-12T14:19:54.330000 CVE-2024-24797,0,0,c19a8ac8bc5c78a5206d6c6bb45c357c3a8b7076e1d1a067b2d060905019e0d6,2024-02-12T14:19:54.330000 CVE-2024-24798,0,0,27adaa65a015e65d65b2afdd5c0a25214a188429d30f4388b6afc3dde21fa6d1,2024-02-22T19:07:27.197000 -CVE-2024-2480,0,0,28e577c451b247476a0a7225fd4724f8938ca6fd6a15f996eabbfd72ee472657,2024-03-15T12:53:06.423000 +CVE-2024-2480,0,1,1ad8091366906d60986cf13811a146b0dbb77bd1c4ace31a37a490d382cacf2b,2024-03-16T22:15:07.317000 CVE-2024-24801,0,0,47915f71445069b208f35a7935b9c510a17f8f452a570f52726f8c5c81b5b647,2024-02-16T16:17:01.713000 CVE-2024-24802,0,0,a1a79b4d1a40c19f0b1fd783e577af4a06bd7c4a6081e664509b96e8417dd1d1,2024-02-22T19:07:27.197000 CVE-2024-24803,0,0,fc5d4f4cab51b4c20d7b6e3bf5587ec068edf5c72abf706c2f7a07ca396460a8,2024-02-16T16:19:58.613000 @@ -240957,20 +240957,21 @@ CVE-2024-25249,0,0,e626f7804fc8e3e2331820b9aeb548c245c405719ff0d76dcfa04a8ec8a29 CVE-2024-2525,0,0,e0720dcc8e46feddc25c2cf611c952cec7fef0cb124392f10384d5d54e22e8d1,2024-03-16T18:15:07.290000 CVE-2024-25250,0,0,50921ad09828430a91a170dee03070c033f5594e850effa2946a4512e5f222cf,2024-03-14T12:52:16.723000 CVE-2024-25251,0,0,1d2a5a9a4b66e0916ca3d01dc7a497fd6f413128e5f9cf23b916246f32337d74,2024-02-22T19:07:27.197000 -CVE-2024-2526,1,1,fa6e9816bfdd16464305d7b46ca2942cf8bac60e6915cca5f1e658d97360efd7,2024-03-16T19:15:06.087000 +CVE-2024-2526,0,0,fa6e9816bfdd16464305d7b46ca2942cf8bac60e6915cca5f1e658d97360efd7,2024-03-16T19:15:06.087000 CVE-2024-25260,0,0,a963ef502694ae6000774c93857ccef97ccb95aa054d7c962bcf481c9eca61da,2024-02-20T19:50:53.960000 CVE-2024-25262,0,0,e9e8a281108082e2fe38cf1f84c8b0462ae4f78a51833715d231a5f9854a6582,2024-02-29T13:49:29.390000 CVE-2024-25269,0,0,610ef0fe6e3e6668f53e0b2517fd03c8e618e09a014c6c96c638cb13913135da,2024-03-05T13:41:01.900000 -CVE-2024-2527,1,1,39e4215aa19f2b1ca028599a3dfccfa5202e2e275e8523fed48187af04162df7,2024-03-16T19:15:06.317000 +CVE-2024-2527,0,0,39e4215aa19f2b1ca028599a3dfccfa5202e2e275e8523fed48187af04162df7,2024-03-16T19:15:06.317000 CVE-2024-25274,0,0,c67c1019fa7f81937eaa7b49699eb25e8594cfb6c501c59f973bc6d3f7357c19,2024-02-20T19:50:53.960000 -CVE-2024-2528,1,1,6587c55544c5e01742f652b8a331a0e682a55d77b778c39790372a18f375f47f,2024-03-16T20:15:06.713000 +CVE-2024-2528,0,0,6587c55544c5e01742f652b8a331a0e682a55d77b778c39790372a18f375f47f,2024-03-16T20:15:06.713000 CVE-2024-25288,0,0,72929964e4a52e0e6416447a3784055900fd86941add2396584bdb99e953beb1,2024-02-22T19:07:27.197000 -CVE-2024-2529,1,1,ef510e7d38276a50a2f41be5d6358bea1df927bdaf4684a12024aa37daf1a9cd,2024-03-16T20:15:06.947000 +CVE-2024-2529,0,0,ef510e7d38276a50a2f41be5d6358bea1df927bdaf4684a12024aa37daf1a9cd,2024-03-16T20:15:06.947000 CVE-2024-25291,0,0,bc77bf07b7f0885dcc53f309d4c8551c9d231ccb3e5075560ca429ae43d295cd,2024-02-29T13:49:29.390000 CVE-2024-25292,0,0,93d2b7f6141fe539a29ae7e5b673c657afb26540dc5e8da909caf90c01b33dc8,2024-02-29T13:49:29.390000 CVE-2024-25293,0,0,0b85db10c32bd0ffaa51c674a448c6fa3593e795a8c8cebcd511335821521f83,2024-03-01T14:04:26.010000 CVE-2024-25297,0,0,c19c73677945e62fe080022a44c0cbc836550b8fdff36961566daa131754b5e5,2024-02-20T19:50:53.960000 CVE-2024-25298,0,0,4fa4ef0f63750c476b0b4a4ba066ec9d8bbe95d9ab83d566e2b5ec729231bb8a,2024-02-20T19:50:53.960000 +CVE-2024-2530,1,1,92c098852ee58532e7e5d2e18bdaf1c546feadec4053b212128dbf99ad86c7e6,2024-03-16T21:15:29.733000 CVE-2024-25300,0,0,d141ffefe6a37cb8a456f69fa3c7ba560306491e628c2d7a7b071533ed1e6176,2024-02-15T06:23:39.303000 CVE-2024-25301,0,0,b4b5481a9b0e00a54080436fba120c53bf8ba9ed9e17566157a8266c481e9604,2024-02-15T06:23:39.303000 CVE-2024-25302,0,0,ecc19fbd05e49a18009047767e692d79274fe3c3eff09a17e5e0ee19370e34df,2024-02-22T03:37:51.937000 @@ -240980,6 +240981,7 @@ CVE-2024-25306,0,0,742a9d583e6e80a9720b35649aad7345e542977a9ef7d0e1b077fc85ae685 CVE-2024-25307,0,0,dc134a5ea95c85b6feee1f3feeba9a2085d371b9d1dff34e8b9da05c9a77cd4c,2024-02-12T14:25:11.867000 CVE-2024-25308,0,0,787c02b106c1b76086cc4f72c8cb4ff80829854c40d8b5ca58cbdd5874ae725d,2024-02-12T14:28:27.823000 CVE-2024-25309,0,0,364beedac3b8c0a707d05905783d8f4d2d35eec3d9f3af5615c0b353f1d38efa,2024-02-12T14:28:15.157000 +CVE-2024-2531,1,1,7d28adf27e4ee4a15bd98780dc24dd55b8f72eec5fb5ac29c9bf5c29f4366944,2024-03-16T22:15:07.400000 CVE-2024-25310,0,0,0ab410d99cb28e84a76115741a395a753e492a99ce014e2f2a3b11cffb2bc989,2024-02-12T14:24:40.230000 CVE-2024-25312,0,0,7eafde0d86c03dab799a0b24a98577edbab950f62505c0ea65dae615759bca3a,2024-02-12T14:27:37.243000 CVE-2024-25313,0,0,85a8fd6cf7933afa08704918b864405b4b8578a78dc664c46bbe2f91768ad586,2024-02-12T14:27:16.007000 @@ -240987,6 +240989,7 @@ CVE-2024-25314,0,0,a8146d259a8c8d8bb5dc62b92157e3a166018c6c2f85898d75d4177dda7a6 CVE-2024-25315,0,0,136f14dd76f8699fd29eef34984e013f6cdb8770a204b6452b0d939ebb290f2d,2024-02-12T14:23:41.613000 CVE-2024-25316,0,0,dccaf090a474bca51fc0821682da4c5c2112d945aeae3ef07f57e1e971411620,2024-02-12T14:23:16.537000 CVE-2024-25318,0,0,e87647abcdb6f28062346e5c03e3ffb63c878809c19788b614db3d2291a96d12,2024-02-12T21:37:44.753000 +CVE-2024-2532,1,1,013aa8b1a5f40605fbb77eb675e3ca9912f6b77d001a82390db4d070e3189688,2024-03-16T22:15:07.613000 CVE-2024-25320,0,0,56ee093beb049b07518afee56858a8d8ace3b9803f6562a14fef92d8b7d67178,2024-02-16T19:26:55.393000 CVE-2024-25325,0,0,8bc90d1a62ad4d34bac08e20579a9a62b335b7a18a1a28110fe5bb69acbf6c97,2024-03-12T12:40:13.500000 CVE-2024-25327,0,0,ed53fcf930246e366b75ca3dbc41603185b262291cf82ff3e550f2ed4e97b776,2024-03-08T14:02:57.420000