From 16234e03ede20d1cda061111f691ae771e526d90 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 13 Mar 2024 03:03:20 +0000 Subject: [PATCH] Auto-Update: 2024-03-13T03:00:30.459372+00:00 --- CVE-2022/CVE-2022-367xx/CVE-2022-36763.json | 8 +++- CVE-2022/CVE-2022-367xx/CVE-2022-36764.json | 8 +++- CVE-2022/CVE-2022-367xx/CVE-2022-36765.json | 8 +++- CVE-2023/CVE-2023-452xx/CVE-2023-45230.json | 6 ++- CVE-2023/CVE-2023-452xx/CVE-2023-45231.json | 6 ++- CVE-2023/CVE-2023-452xx/CVE-2023-45232.json | 6 ++- CVE-2023/CVE-2023-452xx/CVE-2023-45233.json | 6 ++- CVE-2023/CVE-2023-452xx/CVE-2023-45234.json | 6 ++- CVE-2023/CVE-2023-452xx/CVE-2023-45235.json | 6 ++- CVE-2023/CVE-2023-45xx/CVE-2023-4522.json | 8 +++- CVE-2023/CVE-2023-48xx/CVE-2023-4839.json | 47 +++++++++++++++++++++ CVE-2024/CVE-2024-15xx/CVE-2024-1582.json | 47 +++++++++++++++++++++ CVE-2024/CVE-2024-220xx/CVE-2024-22099.json | 8 +++- CVE-2024/CVE-2024-266xx/CVE-2024-26622.json | 6 ++- CVE-2024/CVE-2024-275xx/CVE-2024-27507.json | 6 ++- README.md | 30 +++++++++---- _state.csv | 34 ++++++++------- 17 files changed, 203 insertions(+), 43 deletions(-) create mode 100644 CVE-2023/CVE-2023-48xx/CVE-2023-4839.json create mode 100644 CVE-2024/CVE-2024-15xx/CVE-2024-1582.json diff --git a/CVE-2022/CVE-2022-367xx/CVE-2022-36763.json b/CVE-2022/CVE-2022-367xx/CVE-2022-36763.json index 7e472dc8d64..380eff857bf 100644 --- a/CVE-2022/CVE-2022-367xx/CVE-2022-36763.json +++ b/CVE-2022/CVE-2022-367xx/CVE-2022-36763.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36763", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-09T16:15:43.053", - "lastModified": "2024-01-16T17:22:15.790", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-13T02:15:49.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -106,6 +106,10 @@ "Mitigation", "Vendor Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/", + "source": "infosec@edk2.groups.io" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-367xx/CVE-2022-36764.json b/CVE-2022/CVE-2022-367xx/CVE-2022-36764.json index dc02302882c..3d279b7cad0 100644 --- a/CVE-2022/CVE-2022-367xx/CVE-2022-36764.json +++ b/CVE-2022/CVE-2022-367xx/CVE-2022-36764.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36764", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-09T16:15:43.327", - "lastModified": "2024-01-16T18:04:14.283", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-13T02:15:49.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -105,6 +105,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/", + "source": "infosec@edk2.groups.io" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-367xx/CVE-2022-36765.json b/CVE-2022/CVE-2022-367xx/CVE-2022-36765.json index f6ab44911a2..6a7bce6ce7b 100644 --- a/CVE-2022/CVE-2022-367xx/CVE-2022-36765.json +++ b/CVE-2022/CVE-2022-367xx/CVE-2022-36765.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36765", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-09T16:15:43.500", - "lastModified": "2024-01-16T18:21:33.387", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-13T02:15:50.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -105,6 +105,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/", + "source": "infosec@edk2.groups.io" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45230.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45230.json index dae6d9fa991..82134677470 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45230.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45230.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45230", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:11.727", - "lastModified": "2024-03-07T17:15:10.133", + "lastModified": "2024-03-13T02:15:50.157", "vulnStatus": "Modified", "descriptions": [ { @@ -121,6 +121,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/", + "source": "infosec@edk2.groups.io" + }, { "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", "source": "infosec@edk2.groups.io" diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45231.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45231.json index 370b039adca..1928441195c 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45231.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45231.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45231", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:11.910", - "lastModified": "2024-03-07T17:15:10.247", + "lastModified": "2024-03-13T02:15:50.267", "vulnStatus": "Modified", "descriptions": [ { @@ -121,6 +121,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/", + "source": "infosec@edk2.groups.io" + }, { "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", "source": "infosec@edk2.groups.io" diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45232.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45232.json index e8583f9f431..b4474f94604 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45232.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45232.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45232", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:12.090", - "lastModified": "2024-03-07T17:15:10.340", + "lastModified": "2024-03-13T02:15:50.347", "vulnStatus": "Modified", "descriptions": [ { @@ -121,6 +121,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/", + "source": "infosec@edk2.groups.io" + }, { "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", "source": "infosec@edk2.groups.io" diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45233.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45233.json index 10ea8deb47c..ab98aba2379 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45233.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45233.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45233", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:12.277", - "lastModified": "2024-03-07T17:15:10.427", + "lastModified": "2024-03-13T02:15:50.430", "vulnStatus": "Modified", "descriptions": [ { @@ -121,6 +121,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/", + "source": "infosec@edk2.groups.io" + }, { "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", "source": "infosec@edk2.groups.io" diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45234.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45234.json index 9439f194a9f..5825c17aff7 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45234.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45234.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45234", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:12.460", - "lastModified": "2024-03-07T17:15:10.510", + "lastModified": "2024-03-13T02:15:50.513", "vulnStatus": "Modified", "descriptions": [ { @@ -121,6 +121,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/", + "source": "infosec@edk2.groups.io" + }, { "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", "source": "infosec@edk2.groups.io" diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45235.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45235.json index fa028ee6a62..55eb9a04a7f 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45235.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45235.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45235", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:12.643", - "lastModified": "2024-03-07T17:15:10.590", + "lastModified": "2024-03-13T02:15:50.617", "vulnStatus": "Modified", "descriptions": [ { @@ -121,6 +121,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/", + "source": "infosec@edk2.groups.io" + }, { "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", "source": "infosec@edk2.groups.io" diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4522.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4522.json index a81660337c1..209822abc87 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4522.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4522.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4522", "sourceIdentifier": "cve@gitlab.com", "published": "2023-08-30T08:15:52.673", - "lastModified": "2023-12-28T14:50:15.647", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-13T02:15:50.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -108,6 +108,10 @@ "tags": [ "Permissions Required" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/", + "source": "cve@gitlab.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4839.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4839.json new file mode 100644 index 00000000000..d61662f06cb --- /dev/null +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4839.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2023-4839", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-03-13T02:15:50.827", + "lastModified": "2024-03-13T02:15:50.827", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The WP Go Maps for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 9.0.32 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3045434/wp-google-maps/trunk/legacy-core.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/208c5ed1-879f-45ea-833e-d2e54c4f063f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1582.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1582.json new file mode 100644 index 00000000000..aaa1c4fbb68 --- /dev/null +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1582.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-1582", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-03-13T02:15:51.000", + "lastModified": "2024-03-13T02:15:51.000", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpgmza' shortcode in all versions up to, and including, 9.0.32 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3045434/wp-google-maps/trunk/includes/class.shortcodes.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/67f405d0-7139-4b5c-ab3c-cd1de5592866?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22099.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22099.json index f85efe1c9c5..ee835ebf975 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22099.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22099.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22099", "sourceIdentifier": "security@openanolis.org", "published": "2024-01-25T07:15:08.697", - "lastModified": "2024-01-31T20:32:02.720", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-13T02:15:51.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -105,6 +105,10 @@ "Issue Tracking", "Permissions Required" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/", + "source": "security@openanolis.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26622.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26622.json index f3e8a793978..33409566d78 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26622.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26622.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26622", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T07:15:11.063", - "lastModified": "2024-03-11T18:15:19.673", + "lastModified": "2024-03-13T02:15:51.293", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -39,6 +39,10 @@ { "url": "https://git.kernel.org/stable/c/a23ac1788e2c828c097119e9a3178f0b7e503fee", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27507.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27507.json index ff43cbfd2d0..e790f61f5aa 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27507.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27507.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27507", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T15:15:07.883", - "lastModified": "2024-02-28T14:07:00.563", + "lastModified": "2024-03-13T02:15:51.353", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -19,6 +19,10 @@ { "url": "https://github.com/LuMingYinDetect/libLAS_defects/blob/main/libLAS_detect_1.md", "source": "cve@mitre.org" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVOY7E2QWQRVXZTJGI7Z4KXGSU6BGEKH/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/README.md b/README.md index f0cf5baa4f4..4a1f9fc3426 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-13T00:55:30.447618+00:00 +2024-03-13T03:00:30.459372+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-12T23:15:46.667000+00:00 +2024-03-13T02:15:51.353000+00:00 ``` ### Last Data Feed Release @@ -23,28 +23,40 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-03-12T01:00:20.250337+00:00 +2024-03-13T01:00:20.248557+00:00 ``` ### Total Number of included CVEs ```plain -241245 +241247 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `2` -* [CVE-2023-7072](CVE-2023/CVE-2023-70xx/CVE-2023-7072.json) (`2024-03-12T23:15:46.267`) -* [CVE-2024-1397](CVE-2024/CVE-2024-13xx/CVE-2024-1397.json) (`2024-03-12T23:15:46.480`) -* [CVE-2024-1421](CVE-2024/CVE-2024-14xx/CVE-2024-1421.json) (`2024-03-12T23:15:46.667`) +* [CVE-2023-4839](CVE-2023/CVE-2023-48xx/CVE-2023-4839.json) (`2024-03-13T02:15:50.827`) +* [CVE-2024-1582](CVE-2024/CVE-2024-15xx/CVE-2024-1582.json) (`2024-03-13T02:15:51.000`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `13` +* [CVE-2022-36763](CVE-2022/CVE-2022-367xx/CVE-2022-36763.json) (`2024-03-13T02:15:49.857`) +* [CVE-2022-36764](CVE-2022/CVE-2022-367xx/CVE-2022-36764.json) (`2024-03-13T02:15:49.983`) +* [CVE-2022-36765](CVE-2022/CVE-2022-367xx/CVE-2022-36765.json) (`2024-03-13T02:15:50.063`) +* [CVE-2023-4522](CVE-2023/CVE-2023-45xx/CVE-2023-4522.json) (`2024-03-13T02:15:50.700`) +* [CVE-2023-45230](CVE-2023/CVE-2023-452xx/CVE-2023-45230.json) (`2024-03-13T02:15:50.157`) +* [CVE-2023-45231](CVE-2023/CVE-2023-452xx/CVE-2023-45231.json) (`2024-03-13T02:15:50.267`) +* [CVE-2023-45232](CVE-2023/CVE-2023-452xx/CVE-2023-45232.json) (`2024-03-13T02:15:50.347`) +* [CVE-2023-45233](CVE-2023/CVE-2023-452xx/CVE-2023-45233.json) (`2024-03-13T02:15:50.430`) +* [CVE-2023-45234](CVE-2023/CVE-2023-452xx/CVE-2023-45234.json) (`2024-03-13T02:15:50.513`) +* [CVE-2023-45235](CVE-2023/CVE-2023-452xx/CVE-2023-45235.json) (`2024-03-13T02:15:50.617`) +* [CVE-2024-22099](CVE-2024/CVE-2024-220xx/CVE-2024-22099.json) (`2024-03-13T02:15:51.193`) +* [CVE-2024-26622](CVE-2024/CVE-2024-266xx/CVE-2024-26622.json) (`2024-03-13T02:15:51.293`) +* [CVE-2024-27507](CVE-2024/CVE-2024-275xx/CVE-2024-27507.json) (`2024-03-13T02:15:51.353`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a17a4942522..c89bd50d89b 100644 --- a/_state.csv +++ b/_state.csv @@ -202824,9 +202824,9 @@ CVE-2022-36757,0,0,99b2457e22242a51f120243c054b207129f684a9e5103e265e48622466ad1 CVE-2022-36759,0,0,987ab3e2934d36391ec887186be11227f1f9de0dc58eabaccc00782239c2465d,2023-11-07T03:49:40.650000 CVE-2022-3676,0,0,7c244257592a5da04a938c2bf7ebf52dbfa71500de6ad436865e08c1a0d06dc8,2022-10-25T14:28:27.270000 CVE-2022-36760,0,0,78c5cd086a5921fa10a24eb45b4574e7f49359511281666cb03d664e1a3acd04,2023-09-08T22:15:10.133000 -CVE-2022-36763,0,0,204ac919fc3446902823dbb109d75555f747ee17889ad1bfdda69f44bb9a25c9,2024-01-16T17:22:15.790000 -CVE-2022-36764,0,0,cabe2474d78c15d37bb8bf7e4ce39399b33f557a22f94d094c7647087e2ec024,2024-01-16T18:04:14.283000 -CVE-2022-36765,0,0,828ff023a89a96c19935854992d263420d4dc6f0964affd3ea31666e5ae8574e,2024-01-16T18:21:33.387000 +CVE-2022-36763,0,1,58e28fe745417e1c07e5d15be2175a9c585bfaad59c2ab8e944f3321e4b565c4,2024-03-13T02:15:49.857000 +CVE-2022-36764,0,1,d1b5eff2741c0fcdd05c75033dcf8c60ae25cc92ff1cb26c5eb81efcde6ac521,2024-03-13T02:15:49.983000 +CVE-2022-36765,0,1,3c345cab626fb44223b4c789dc5a993f6ebbe31670dbf45f1926e146eb1c5291,2024-03-13T02:15:50.063000 CVE-2022-36768,0,0,56e6e9f2a3adbd5e2e9a22aa337e26f469ba6753dc76a819d340832312ea1fec,2022-09-16T02:57:50.677000 CVE-2022-36769,0,0,7c8f08c8ca8c03a8549a88fff51c53796c31c9bf95e4335a57fe099b73ff2860,2023-05-04T17:38:26.667000 CVE-2022-3677,0,0,e846c14847121ba33c269f73a53a22410c84e7131401dac364ed0264047a9aec,2023-11-07T03:51:37.927000 @@ -231441,7 +231441,7 @@ CVE-2023-4521,0,0,b688f7ebb4a8ae05081b90dfc2d3e5aa63110c07fe8f0a8aec7d54e7490212 CVE-2023-45210,0,0,015445c8d46db4b328a64a863b4689dd675056770aa7f333e4d9c645a082f231,2023-12-11T17:28:08.023000 CVE-2023-45213,0,0,5e5f8b44ec699e511eefc924e74594a2ac49c3945938127d75baae964d9387a9,2024-02-12T16:44:57.010000 CVE-2023-45219,0,0,270bb0600a3f55378c55b5ea38799f305c6eb8bb95c5b79f810dab4de3af729a,2023-10-18T01:32:45.897000 -CVE-2023-4522,0,0,0674b611dfdb94341815c24c525474f742f34ed4bc39082bcf1680814dd77cde,2023-12-28T14:50:15.647000 +CVE-2023-4522,0,1,21c51931efbb0b6a933132cf5b91fe4ef9967ce64c453416b56e884701256728,2024-03-13T02:15:50.700000 CVE-2023-45220,0,0,89f02225b08d53cf6d2310d9295828baf1a8becf9542b9fbe85548c6da689aab,2023-11-06T14:42:32.330000 CVE-2023-45222,0,0,54b7f389d9cdd14569950f307f88751c99f6c6155f7b671a74e1fb663cddd2c5,2024-02-12T16:45:27.167000 CVE-2023-45223,0,0,6cbdf0069fab914c7609294f4a9579d32a8555dcc6cf247cd7b7f82694e9e004,2023-12-01T21:22:56.440000 @@ -231452,12 +231452,12 @@ CVE-2023-45227,0,0,4ffb0311b26c436ba20e67f324124acf224981c7f480b51fbf58a45a4e0a7 CVE-2023-45228,0,0,d3ce09fbc0053d966a1c84575fc054963cc930f15296e011428d43b06e7ca000,2023-11-07T19:55:08.333000 CVE-2023-45229,0,0,ba7df8658c821bb3ec61211859d4f1196e179fdd3ba514897a74ae64ee8462c4,2024-03-07T17:15:10 CVE-2023-4523,0,0,7594ef971654e5b13b747bcbe0f6a98b28a2c227054ae0ac208549d4afc41901,2023-09-29T15:39:05.767000 -CVE-2023-45230,0,0,d519bd35b3993a3fb458dd365bcc37c4eee106c3eca5668477a2fcc497327eb1,2024-03-07T17:15:10.133000 -CVE-2023-45231,0,0,fbbeb2f22df3db01e4122b1157e36b4d7b87da56bc68a5632f68a25eae66323a,2024-03-07T17:15:10.247000 -CVE-2023-45232,0,0,05a1f11780c48729e8d559758265e57c5f802167eb837ee96a29259517e4a12d,2024-03-07T17:15:10.340000 -CVE-2023-45233,0,0,d6c63a70c57013bb00e0d0afb4aa82975835477d09cfbb9be6bd0718f2d7987b,2024-03-07T17:15:10.427000 -CVE-2023-45234,0,0,188a4ad340934a8970ceb47bfbb4e2e4ce2cb81c7a2e2832ff0b7a273b3407dd,2024-03-07T17:15:10.510000 -CVE-2023-45235,0,0,a56b315e0a90e532fb1b31e4bf7b5813e3bc8139eca7adc42725ce5cc5635c3d,2024-03-07T17:15:10.590000 +CVE-2023-45230,0,1,8d1b65601081d9f6a3f48fdd08b5f8f2264303a0239f33e8ee6fb7fc4c14d3ef,2024-03-13T02:15:50.157000 +CVE-2023-45231,0,1,fdca259a90f40bd71ab3892472a32b816f64dda71048091e88ec668a5e408779,2024-03-13T02:15:50.267000 +CVE-2023-45232,0,1,12ed148934a0b0fc802ded4dcae87f84efffca594b629e187b1291c960041747,2024-03-13T02:15:50.347000 +CVE-2023-45233,0,1,935822cd94e0c5da45274ed1b4f00d7b77414dd1f98abdaa637cfbcdd31fc6b2,2024-03-13T02:15:50.430000 +CVE-2023-45234,0,1,dd53231da171773cc705aedd5fa7c50ce14604dc928367345a241744dc2558f5,2024-03-13T02:15:50.513000 +CVE-2023-45235,0,1,4bf0b671c01bc2b38c45b73d852591de63b5fdb5a16c8b3ebfca7e6f0dc4491b,2024-03-13T02:15:50.617000 CVE-2023-45236,0,0,525499e6b39416baf89ff249494efc66f2267491565e0b1d6266bb92beb48bd9,2024-03-07T17:15:10.670000 CVE-2023-45237,0,0,b86309e9c318e2bf34954205b33e4af0526735c885502c1b3ed0bb23eefefa82,2024-03-07T17:15:10.760000 CVE-2023-45239,0,0,ceec829d8bee367996c0f5c7e35bbe30b5631d6dfbec310aeef7b055c317044a,2023-11-07T04:21:43.770000 @@ -233487,6 +233487,7 @@ CVE-2023-48384,0,0,2bab1347f41c2a057fef2f7cd0fcfadd1b98db03fbdfba1cd9ca8cd1165a6 CVE-2023-48387,0,0,9955b3d84b9077be3d2d63e882ec4ddd844a0c84695e65601fb70e69aa47868c,2024-01-31T03:15:08.213000 CVE-2023-48388,0,0,2a26d36b3036fda1db696b612ebf767e25f4d12bf331a58f031651c9f6a05c8b,2023-12-22T16:07:01.780000 CVE-2023-48389,0,0,40f57c393bc441d7534360ceb6491a81918bd1ce4cdf5309d5977cc1fc67037e,2023-12-22T16:12:50.417000 +CVE-2023-4839,1,1,407ccbb02a584246185e9851b2a573f693625fec922b212cfb578853d8b2c1b8,2024-03-13T02:15:50.827000 CVE-2023-48390,0,0,97a1d2591c5c5e82fd35f60aec0cb181513d17049e4e5bae3e50085004531742,2023-12-22T16:05:04.157000 CVE-2023-48392,0,0,8477dfef0ae02c8ac4ae7fb286fa250f75ccfcf4d82395707585be88def83009,2023-12-22T15:46:03.297000 CVE-2023-48393,0,0,eb2be5ce9484bf33d839a19d622d5eddc9bdd71b5929ac2b7d10360261b406c7,2023-12-22T15:43:05.987000 @@ -237427,7 +237428,7 @@ CVE-2023-7068,0,0,ef1408f6c6fd79c5af19d0633c8238c454cea54fd087b8b89da5773f13dad9 CVE-2023-7069,0,0,76accaf19ff7061689b623859471b6167bfd5be5c4040f161f8f881f1093dc5f,2024-02-07T16:28:40.250000 CVE-2023-7070,0,0,6c8bd2c09a87f95a15301a389b593ff945e70de707293c37e60be3f2a98abc3d,2024-01-17T22:40:43.227000 CVE-2023-7071,0,0,78f74dc912537e618118419b14904618dddacf09709f10c13e8f266737a05610,2024-01-18T17:36:11.930000 -CVE-2023-7072,1,1,a826a87bdece0c861eae1651958161a39eba36d8b53df243cac9b4c32796c8c8,2024-03-12T23:15:46.267000 +CVE-2023-7072,0,0,a826a87bdece0c861eae1651958161a39eba36d8b53df243cac9b4c32796c8c8,2024-03-12T23:15:46.267000 CVE-2023-7074,0,0,8f1ea4c91bbed5f749e5ad5898f652b9d3535e567ecfe0485c584e8d36746192,2024-02-03T00:27:20.647000 CVE-2023-7075,0,0,1e8d50856ed09dc2da0f090e53334c53e66b79bfe72d0c24b008411cda3483d1,2024-02-29T01:42:52.060000 CVE-2023-7076,0,0,c0aa47ffdb1b11be4bad6ee96c7ad56a0a2e836463637688b25aa6c1ae2a5f68,2024-02-29T01:42:52.140000 @@ -238493,7 +238494,7 @@ CVE-2024-1382,0,0,eadf9bcf07f33f456d30153fea1d47c75e560cdef58bba2704e859f9e7013d CVE-2024-1388,0,0,9f4f35daf92433c068c4ad0e3cff9f0fc31d7e6b5e8f690807686322bd29d2ae,2024-02-28T14:06:45.783000 CVE-2024-1389,0,0,62d171117c191cb5fc110201c06be5328bba09160ed0dc883ad2c72ee32b12f1,2024-02-29T13:49:29.390000 CVE-2024-1390,0,0,760bcdaac2db269a3249aaa20e58e1659b2977bdb995748ef5e46a1ecb85447f,2024-02-29T13:49:29.390000 -CVE-2024-1397,1,1,d172b8d4f2cbfd2ed0f268b354eb7f89fac5acac137adde141be4e79233eae29,2024-03-12T23:15:46.480000 +CVE-2024-1397,0,0,d172b8d4f2cbfd2ed0f268b354eb7f89fac5acac137adde141be4e79233eae29,2024-03-12T23:15:46.480000 CVE-2024-1398,0,0,7a7783e481aa897afa83bd125da0d53c431d5a5a9d43f1ade8b1e715449f59a0,2024-03-04T13:58:23.447000 CVE-2024-1400,0,0,295a10f36c3e13d694d09cafc6872c0c48f9e2b4c87da0889327ecdac7abe4ac,2024-03-12T12:40:13.500000 CVE-2024-1402,0,0,f5ee948d1697d1774361c2691c46c88d302c6ae408ab90a865a59173f66ccaae,2024-02-15T18:42:03.397000 @@ -238506,7 +238507,7 @@ CVE-2024-1410,0,0,79f004c8511409262522dfcd75d298b0bd4411c796b0c34ea3a9609af0d4a5 CVE-2024-1411,0,0,030f897eed6e6219f0d1c0b9b3349832bbb4c8ad1dac44c5a94f383da8f08bf9,2024-02-29T13:49:29.390000 CVE-2024-1419,0,0,2c70f60b0f2ce39c1fb701bf4c4f420108cacd5e876318aed7a6153508e9a501,2024-03-07T13:52:27.110000 CVE-2024-1420,0,0,63be6135cf11500708980f0eb6e023d1c00fd2eeb1aa055b1a9dd099f6d1d32a,2024-02-12T15:15:07.733000 -CVE-2024-1421,1,1,179cfea3877e72bd06f3056ed80aecaf7c6819365b5df1df754f3f625c08055c,2024-03-12T23:15:46.667000 +CVE-2024-1421,0,0,179cfea3877e72bd06f3056ed80aecaf7c6819365b5df1df754f3f625c08055c,2024-03-12T23:15:46.667000 CVE-2024-1423,0,0,6e27005a2bc9cac940b744a08e145c97df4169105a5c6ac980f63cd4cfdbe785,2024-02-27T15:15:07.460000 CVE-2024-1425,0,0,7bd23f13ec6e59c9c0cdfb4dd0d18d7583033ed33c6961c2f335253af10e4df9,2024-02-29T13:49:29.390000 CVE-2024-1430,0,0,1f7ad1f1bebbdcb3e1f4fca338921661a7ae2b45ce3f6720731a1be64c4b8668,2024-02-29T01:43:50.420000 @@ -238580,6 +238581,7 @@ CVE-2024-1566,0,0,fae18125d42af6480c1fb49e1e6428a52d2bf4f1074f21a5dfe482b2c8d870 CVE-2024-1568,0,0,03adf0f94bdba0662cb278cdaa3b54a5cd3ae08b3ef89a1e89169605096fa6c9,2024-02-28T14:06:45.783000 CVE-2024-1570,0,0,fa96633d08cf4f7a9a083fffefdd325991610013e77e1890328cb3b85d75e300,2024-02-29T13:49:29.390000 CVE-2024-1580,0,0,6b9c71428a5b96b2b7263dbf5be1dd103862465da9af91a11236ffbbfb0157cf,2024-02-20T19:50:53.960000 +CVE-2024-1582,1,1,fbb5d0750a639e886b92522c9bac2417ac2ed3fbd0663ea481308fd0414db2a6,2024-03-13T02:15:51 CVE-2024-1586,0,0,0f7dcaaedeb3b15eee35c0b1fbce415960454d76b6eae4dff9a3ecfad1011e31,2024-02-29T13:49:29.390000 CVE-2024-1590,0,0,8cf7a30592711c236a58c08f65bffca938f2cb5ec79513db7f6cedfa37d0bfed,2024-02-23T16:14:43.447000 CVE-2024-1591,0,0,813b185516fa7310825023c3e019d8a3dad8db3ac6e030a92367a91ad355f320,2024-02-16T19:26:55.393000 @@ -239406,7 +239408,7 @@ CVE-2024-22088,0,0,754170cc6c96efa135c7c7667ac8c5d4d79d7cd2abcaaf938446792b9a2bc CVE-2024-22093,0,0,0cbc4f486dd2eb1b48ce1c4e9d316887f7d468da5c83d93117f6d1b9d40365f0,2024-02-14T18:04:45.380000 CVE-2024-22096,0,0,330d7fb3350f034a1e0c8805b47a2db6dbe2ceb88846f9ddfaaa7c652ddde766,2024-02-07T17:33:26.800000 CVE-2024-22097,0,0,5fdbd89068c51850a0f66cf0b6ea41858c21ad70e4a6147f1a1147450ab1d4f9,2024-02-20T19:50:53.960000 -CVE-2024-22099,0,0,259bf2d8692df5aa5d39caac39d7aad2ce0920dc8cad6f694c8152bd0134be41,2024-01-31T20:32:02.720000 +CVE-2024-22099,0,1,e28d98dcddc1bbad57110bc31ee0b0986010b8d478f0726ad6cb85e9d2cbda39,2024-03-13T02:15:51.193000 CVE-2024-22100,0,0,a6ff3a70b4f3071cb6edf59573e0a019914b2e075d17d6c1c64c20010521b0fb,2024-03-01T14:04:26.010000 CVE-2024-22107,0,0,e3cca6041ab5ebaddd7412e3f1116f94d2eef4d2646eefe8a425a6cd027599ec,2024-02-09T19:44:32.497000 CVE-2024-22108,0,0,cdaf61a2506aec5c5c15705bb009e8054dc2f9e9fadf39ff642fb65becdf0793,2024-02-09T19:39:12.853000 @@ -241022,7 +241024,7 @@ CVE-2024-26618,0,0,b4ee02e43411773445d9502213c0c8ee13dbb28e9adadb6062e2443b8f287 CVE-2024-26619,0,0,4bc519bd153c025ad692ee69af117d5945ba0b94f5c3e5862c457953e2f5d4bd,2024-03-12T12:40:13.500000 CVE-2024-26620,0,0,80563616408219b46d43eee5ccdc785e61822b56ce7e61a910cff65876874c46,2024-03-12T12:40:13.500000 CVE-2024-26621,0,0,eba0c21ed3ef4cfa6360555e22a44f48e6f6b17a1f446df92f554dd254f62ab7,2024-03-06T23:15:07.297000 -CVE-2024-26622,0,0,0a20ab4397987085009b8061821a95b61d2693e95e945ba93e14b50217e13eb7,2024-03-11T18:15:19.673000 +CVE-2024-26622,0,1,0cfbcbd6e3151edc9130c758be3d89c2594195235582b9059a0e6ada55004a78,2024-03-13T02:15:51.293000 CVE-2024-26623,0,0,5692b1c30d07fd10d73a2d8d099143935e519ebf33db10f9328fbf12228012a8,2024-03-06T15:18:08.093000 CVE-2024-26624,0,0,82cf220baccdfd65eda3a6ccb02db7e03f66b3c3c4d80fe72e86ea4753067c0b,2024-03-06T15:18:08.093000 CVE-2024-26625,0,0,29adc757db465c6ac28ab5a88b8651fe2f2af6ed70ecfb37d6743e85b92b5481,2024-03-06T15:18:08.093000 @@ -241114,7 +241116,7 @@ CVE-2024-27455,0,0,210c217f5a270a479508cb0bc44af7987316dd176b201dd0f52b07234beb3 CVE-2024-27456,0,0,af8b9eeeffd0370c5237af64d481e919abc5d541ec3702413fff35287d9c8d37,2024-02-26T16:32:25.577000 CVE-2024-27497,0,0,424da99af028e8bbc4e145cc3ed13014de56bcd76f9291f295253c8da6722a31,2024-03-01T15:23:36.177000 CVE-2024-27499,0,0,2b5f4a1f9b18ceffc8606355dc4fd2934849f1f56bb5cf7799320a576c6c2b9e,2024-03-01T22:22:25.913000 -CVE-2024-27507,0,0,b5e65a7e92037ff788a080bc892fa0f80c7d9ef29fc4d0a37636022a6244d2a4,2024-02-28T14:07:00.563000 +CVE-2024-27507,0,1,529438be53bff7f57b0734455a84b70898cca3f6f033fcb5095c772a3f8f609c,2024-03-13T02:15:51.353000 CVE-2024-27508,0,0,040c763fe5f3ce1aa685f7456be4b1599a5d1d348a6a3ea3969c861bb92ef9ee,2024-02-28T14:07:00.563000 CVE-2024-27515,0,0,f99f7250526320b1e7250419a5b3dff4ee674d7e75fbaa06a1a665327078fcdc,2024-02-28T14:06:45.783000 CVE-2024-27516,0,0,2f5c68154fe8166b9e5238a930fea497c25719295242fc84aef9deebdee06dfc,2024-02-29T13:49:29.390000