From 266568b1d01ae15c4f9f36989794cd1ac99b2d01 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 12 Mar 2024 03:03:19 +0000 Subject: [PATCH] Auto-Update: 2024-03-12T03:00:31.743604+00:00 --- CVE-2024/CVE-2024-221xx/CVE-2024-22127.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-221xx/CVE-2024-22133.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-256xx/CVE-2024-25644.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-256xx/CVE-2024-25645.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-279xx/CVE-2024-27900.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-279xx/CVE-2024-27902.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-281xx/CVE-2024-28163.json | 59 +++++++++++++++++++++ README.md | 19 ++++--- _state.csv | 11 +++- 9 files changed, 434 insertions(+), 9 deletions(-) create mode 100644 CVE-2024/CVE-2024-221xx/CVE-2024-22127.json create mode 100644 CVE-2024/CVE-2024-221xx/CVE-2024-22133.json create mode 100644 CVE-2024/CVE-2024-256xx/CVE-2024-25644.json create mode 100644 CVE-2024/CVE-2024-256xx/CVE-2024-25645.json create mode 100644 CVE-2024/CVE-2024-279xx/CVE-2024-27900.json create mode 100644 CVE-2024/CVE-2024-279xx/CVE-2024-27902.json create mode 100644 CVE-2024/CVE-2024-281xx/CVE-2024-28163.json diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22127.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22127.json new file mode 100644 index 00000000000..329373a69b3 --- /dev/null +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22127.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22127", + "sourceIdentifier": "cna@sap.com", + "published": "2024-03-12T01:15:49.060", + "lastModified": "2024-03-12T01:15:49.060", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SAP NetWeaver Administrator AS Java (Administrator Log Viewer plug-in) - version 7.50, allows an attacker with high privileges to upload potentially dangerous files\u00a0which leads to command injection vulnerability. This would enable the attacker to run commands which can cause high impact on confidentiality, integrity and availability of the application.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3433192", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22133.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22133.json new file mode 100644 index 00000000000..7af9a618934 --- /dev/null +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22133.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22133", + "sourceIdentifier": "cna@sap.com", + "published": "2024-03-12T01:15:49.293", + "lastModified": "2024-03-12T01:15:49.293", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SAP Fiori Front End Server - version 605, allows altering of approver details on the read-only field when sending leave request information. This could lead to creation of request with incorrect approver causing low impact on Confidentiality and Integrity with no impact on\u00a0Availability of the application.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3417399", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25644.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25644.json new file mode 100644 index 00000000000..7ff593e3449 --- /dev/null +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25644.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-25644", + "sourceIdentifier": "cna@sap.com", + "published": "2024-03-12T01:15:49.567", + "lastModified": "2024-03-12T01:15:49.567", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Under certain conditions SAP NetWeaver\u00a0WSRM\u00a0- version 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3425682", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25645.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25645.json new file mode 100644 index 00000000000..e18dd60cebc --- /dev/null +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25645.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-25645", + "sourceIdentifier": "cna@sap.com", + "published": "2024-03-12T01:15:49.780", + "lastModified": "2024-03-12T01:15:49.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Under certain condition\u00a0SAP\u00a0NetWeaver (Enterprise Portal) - version 7.50\u00a0allows an attacker to access information which would otherwise be restricted causing low impact on confidentiality of the application and with no impact on Integrity and Availability of the application.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3428847", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27900.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27900.json new file mode 100644 index 00000000000..7f0e78effae --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27900.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-27900", + "sourceIdentifier": "cna@sap.com", + "published": "2024-03-12T01:15:49.980", + "lastModified": "2024-03-12T01:15:49.980", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Due to missing authorization check, attacker with business user account in SAP ABAP Platform - version 758, 795, can change the privacy setting of job templates from shared to private. As a result, the selected template would only be accessible to the owner.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3419022", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27902.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27902.json new file mode 100644 index 00000000000..77975ef7b26 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27902.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-27902", + "sourceIdentifier": "cna@sap.com", + "published": "2024-03-12T01:15:50.193", + "lastModified": "2024-03-12T01:15:50.193", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Applications based on SAP GUI for HTML in SAP NetWeaver AS ABAP - versions 7.89, 7.93, do not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.\u00a0A successful attack can allow a malicious attacker to access and modify data through their ability to execute code in a user\u2019s browser. There is no impact on the availability of the system\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3377979", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28163.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28163.json new file mode 100644 index 00000000000..44dec4ed5f1 --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28163.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-28163", + "sourceIdentifier": "cna@sap.com", + "published": "2024-03-12T01:15:50.390", + "lastModified": "2024-03-12T01:15:50.390", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration\u00a0(PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3434192", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 85f111f665b..330485d9c08 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-12T00:55:31.278967+00:00 +2024-03-12T03:00:31.743604+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-12T00:15:26.383000+00:00 +2024-03-12T01:15:50.390000+00:00 ``` ### Last Data Feed Release @@ -23,21 +23,26 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-03-11T01:00:20.244629+00:00 +2024-03-12T01:00:20.250337+00:00 ``` ### Total Number of included CVEs ```plain -241067 +241074 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `7` -* [CVE-2023-49785](CVE-2023/CVE-2023-497xx/CVE-2023-49785.json) (`2024-03-12T00:15:26.383`) -* [CVE-2024-28199](CVE-2024/CVE-2024-281xx/CVE-2024-28199.json) (`2024-03-11T23:15:47.333`) +* [CVE-2024-22127](CVE-2024/CVE-2024-221xx/CVE-2024-22127.json) (`2024-03-12T01:15:49.060`) +* [CVE-2024-22133](CVE-2024/CVE-2024-221xx/CVE-2024-22133.json) (`2024-03-12T01:15:49.293`) +* [CVE-2024-25644](CVE-2024/CVE-2024-256xx/CVE-2024-25644.json) (`2024-03-12T01:15:49.567`) +* [CVE-2024-25645](CVE-2024/CVE-2024-256xx/CVE-2024-25645.json) (`2024-03-12T01:15:49.780`) +* [CVE-2024-27900](CVE-2024/CVE-2024-279xx/CVE-2024-27900.json) (`2024-03-12T01:15:49.980`) +* [CVE-2024-27902](CVE-2024/CVE-2024-279xx/CVE-2024-27902.json) (`2024-03-12T01:15:50.193`) +* [CVE-2024-28163](CVE-2024/CVE-2024-281xx/CVE-2024-28163.json) (`2024-03-12T01:15:50.390`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index bf2fdca3b65..21fde1f9d10 100644 --- a/_state.csv +++ b/_state.csv @@ -234441,7 +234441,7 @@ CVE-2023-49779,0,0,d369cdfbc3bf56a03ea959dc573bcc4f04f2dcce947797eaedce433cb11d4 CVE-2023-4978,0,0,e1da00e8851a82cb3dddca5e097cec8ce26d83de005e828893848ec9fe1f9871,2023-09-20T13:12:24.480000 CVE-2023-49782,0,0,76dff6e72827ea16b18b4fccddb0eda93f2c18601fd06d9018796d708edd15fd,2023-12-13T18:05:03.240000 CVE-2023-49783,0,0,6f16d1d768feb18e360904dc76b5c2ab173cb90b14bc06f6becf8953a196f38a,2024-02-02T05:07:08.153000 -CVE-2023-49785,1,1,b36db5e367bea759355dbeb508b0fa069353157b92ef626a32bea1361582a4a3,2024-03-12T00:15:26.383000 +CVE-2023-49785,0,0,b36db5e367bea759355dbeb508b0fa069353157b92ef626a32bea1361582a4a3,2024-03-12T00:15:26.383000 CVE-2023-49786,0,0,2d1b72213706d72224982a495bff5fdec7a8c59072d467de9fe743b7222280ff,2023-12-29T00:15:50.043000 CVE-2023-49787,0,0,685ad70bdefba8e6fd26a208af1cc6645856b2d35b81de7c098834b32522e28d,2023-12-07T18:15:08.447000 CVE-2023-49788,0,0,28bcb055e6aeb679bce67192439355faa6e9a57081d44ebf8f3390c9212896e4,2023-12-13T18:11:14.110000 @@ -239320,11 +239320,13 @@ CVE-2024-22119,0,0,d25acc4f5f2224943f2feaeb837e6d77f51fb63d8c6b5945b3415b9f2d10b CVE-2024-22124,0,0,35999c882bc6d44ddc45a9b1e3e882ba4227533058bc07c120048ab393e82eb5,2024-01-22T19:17:13.050000 CVE-2024-22125,0,0,09efd17c32a694e6a723ff7a2a9eaeeb4bc062e9a25db0f7cad8d3d4b4874464,2024-01-12T19:42:36.637000 CVE-2024-22126,0,0,21fbc349f898f1250de5f7f39ca68cc7afccec8ff42d81c72dbf786571fc9040,2024-02-13T14:01:40.577000 +CVE-2024-22127,1,1,b8a1cfad23a1fc2e1e2b86bb0c6c6808495e6a2c75605d3a3146b69acd166360,2024-03-12T01:15:49.060000 CVE-2024-22128,0,0,0c5c439d18342819d7315b4a32a2bc4f41f858a1b21ef0fe06f84b34bb1db3d7,2024-02-13T14:01:40.577000 CVE-2024-22129,0,0,1464fd5d3308b792309b3cf96e4bac49b075b6a9da557a03d691691205ee62e4,2024-02-13T14:01:40.577000 CVE-2024-22130,0,0,ffff0cd5d2c7e1f26e5d22605c42aef119a3c1241fbbfb15485c0a6afd37c199,2024-02-13T14:01:40.577000 CVE-2024-22131,0,0,9eecd7b9a60271346c23c546cd86562dda5496cea369ce333688ec53c9899639,2024-02-13T14:01:40.577000 CVE-2024-22132,0,0,189c6c67b188cde4f4668ee97447e9e45ee679904d7ce8e743444e6ffa1377ac,2024-02-13T14:01:40.577000 +CVE-2024-22133,1,1,d395c79d33c64622696800ab2c50648a85f5ada671e5aa003b0a4d9c6d286678,2024-03-12T01:15:49.293000 CVE-2024-22134,0,0,3be6b7702224117203e25cf98307e352d45c22327a969b8a5d10317e76a95679,2024-01-30T17:07:24.310000 CVE-2024-22135,0,0,7025eeb4417e68d70b1ebd56dbf2904b38773b2370d9f15dd4e72daa19dcfb0c,2024-01-30T17:34:58.917000 CVE-2024-22136,0,0,ffae1822b85f323446ecd7154230713998c5b43341d8cf75c26e20b18cf0dd08,2024-02-05T22:08:24.077000 @@ -240617,6 +240619,8 @@ CVE-2024-25636,0,0,25ca08d2d7942010a89cee168f33ec13089ab5d688be0f620a303dd1bdaf7 CVE-2024-25640,0,0,e7a5a66e06481c463ef3267e2ad9b6391b00223315aeb71281eb8d63b041ce79,2024-02-20T19:50:53.960000 CVE-2024-25642,0,0,bf91eeb1502dedca60fe6c035b93d7dfc5a440bc6932322c6ae4d128b4c7c145,2024-02-13T14:01:40.577000 CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e910,2024-02-13T14:01:07.747000 +CVE-2024-25644,1,1,78d79784a352fb21edf57e17afc353ddf416b192884d884b149b469d3f3c7a3e,2024-03-12T01:15:49.567000 +CVE-2024-25645,1,1,f383e5e1d140d2087e3b734346e20fee8cc9cccbdb85fa7be0e803c798f628d1,2024-03-12T01:15:49.780000 CVE-2024-25674,0,0,880844ace2ad9fa6a214f1eff7f46e3beaded8f86ef202dfc09585e1e07ca21c,2024-02-12T14:30:40.343000 CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d233,2024-02-12T14:30:28.640000 CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000 @@ -241005,6 +241009,8 @@ CVE-2024-27747,0,0,eda09f2b4b6af0e7dd609f89b3c49bd0b33e897e57a0119562f4261f2003f CVE-2024-27764,0,0,a6da085213081f41482d74001d5b27250ddae1567bc465fa0f4b1023f8322f06,2024-03-06T15:18:08.093000 CVE-2024-27765,0,0,c9283b485df441e5cf44e98a2bcaa6921e6b7ae7825314dc1fd3bb862197fb6e,2024-03-06T15:18:08.093000 CVE-2024-27889,0,0,a24eb09c70fc8e243900497cf84a2002dc9fb9fdcf0cc7381ab2bee2e01200d8,2024-03-05T13:41:01.900000 +CVE-2024-27900,1,1,3dbddeddcb80d3abc8bc72be714a2eaef381db51354a2393f9a881a8da10998f,2024-03-12T01:15:49.980000 +CVE-2024-27902,1,1,9d3ceda02c4908a2828b39e1d8a426c64ed6f51ac94f3df5bee5307b4491f773,2024-03-12T01:15:50.193000 CVE-2024-27905,0,0,c7138ee734428b73e57ef70bc0c3a87d66350c09e2b81d6d3c89882bb51a7608,2024-02-28T14:07:00.563000 CVE-2024-27906,0,0,ae9bda7656d6e7e0689cf95cd57f8618d70aeb9672c7e9157dbd08c58d363490,2024-02-29T13:49:29.390000 CVE-2024-27913,0,0,4ab4f3916b8428dbf6a53f81f4240223329f17f5e9f63a6de1fd6dc690b5ff6a,2024-02-28T14:06:45.783000 @@ -241042,6 +241048,7 @@ CVE-2024-28159,0,0,03ab5419913406dda33ba2555a6f6cb8daff27a74103bcc7559c9bf5674b1 CVE-2024-28160,0,0,56d3ee6a5af0d0e09e6c9aa1c04c5e7191044a0b97474702c1a3af2bea0d6256,2024-03-06T21:42:54.697000 CVE-2024-28161,0,0,a8b5439e973c7cdb8f91b0ae68db3c77b6c3c773d21694d3bca0cd7aa286762f,2024-03-06T21:42:54.697000 CVE-2024-28162,0,0,9f95dea899a301f3d7e776202ce6567032bc57cf37ea2c387cd5d210ccf05a4b,2024-03-06T21:42:54.697000 +CVE-2024-28163,1,1,b003bc050b980d7fa8bde2e9f70a0b9b560b968882bfe1f27a1c997f149e486a,2024-03-12T01:15:50.390000 CVE-2024-28173,0,0,e0fed71b03fa1080cdfc47a71a0b80da5e87b19e624557c11c0e172f4b2c098a,2024-03-06T21:42:54.697000 CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d6b1,2024-03-06T21:42:54.697000 CVE-2024-28176,0,0,5bb6d329167995170bd276a45554624691bdda8cbb6c83c2d08f42eba9f617aa,2024-03-11T01:32:39.697000 @@ -241050,7 +241057,7 @@ CVE-2024-28184,0,0,043b0bc7533d0fc96bb6df4be7b21b8477ffe807b0ac6ed0c4b06cf7d8241 CVE-2024-28187,0,0,6ad3874ba881443f641f39e3a3b8faab086575f93d3871aa198b7b52707f1e2f,2024-03-11T20:15:07.180000 CVE-2024-28197,0,0,81a6695e3f35180411e9e1480d63884dec3c7546044011915077e5a9022c6f52,2024-03-11T20:15:07.420000 CVE-2024-28198,0,0,b69b10822779767b360027621125c34db7967289e82c7e08b708ce0af64114c2,2024-03-11T20:15:07.643000 -CVE-2024-28199,1,1,a3be8fb6ebc7387ff885519fed0f6735e2c51f4746826102d87b5337e44f280f,2024-03-11T23:15:47.333000 +CVE-2024-28199,0,0,a3be8fb6ebc7387ff885519fed0f6735e2c51f4746826102d87b5337e44f280f,2024-03-11T23:15:47.333000 CVE-2024-28211,0,0,c1ed1ddd829861cccd703be6254c437e62099ef974f2a29a31d06b3aa407dda5,2024-03-07T13:52:27.110000 CVE-2024-28212,0,0,5a2751cb50b15d5c440d2b8966e76c727b56c2f7e1085394c9464fe62a449a7f,2024-03-07T13:52:27.110000 CVE-2024-28213,0,0,123dce2bcd1dc69568d6c5cbaff040ae81dbab0468f48456713cfbf9a03f5945,2024-03-07T13:52:27.110000