From 2e95ec83492644bfc1c3dce15f93c08a863608c2 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 15 Mar 2024 17:03:25 +0000 Subject: [PATCH] Auto-Update: 2024-03-15T17:00:37.940924+00:00 --- CVE-2021/CVE-2021-389xx/CVE-2021-38938.json | 59 +++++++++++ CVE-2023/CVE-2023-365xx/CVE-2023-36554.json | 78 +++++++++++++- CVE-2023/CVE-2023-427xx/CVE-2023-42789.json | 109 +++++++++++++++++++- CVE-2023/CVE-2023-427xx/CVE-2023-42790.json | 106 ++++++++++++++++++- CVE-2023/CVE-2023-461xx/CVE-2023-46179.json | 59 +++++++++++ CVE-2023/CVE-2023-461xx/CVE-2023-46181.json | 59 +++++++++++ CVE-2023/CVE-2023-461xx/CVE-2023-46182.json | 59 +++++++++++ CVE-2023/CVE-2023-471xx/CVE-2023-47147.json | 59 +++++++++++ CVE-2023/CVE-2023-471xx/CVE-2023-47162.json | 59 +++++++++++ CVE-2023/CVE-2023-475xx/CVE-2023-47534.json | 90 +++++++++++++++- CVE-2023/CVE-2023-476xx/CVE-2023-47699.json | 59 +++++++++++ CVE-2023/CVE-2023-508xx/CVE-2023-50861.json | 4 +- CVE-2023/CVE-2023-508xx/CVE-2023-50886.json | 59 +++++++++++ CVE-2023/CVE-2023-508xx/CVE-2023-50898.json | 55 ++++++++++ CVE-2023/CVE-2023-513xx/CVE-2023-51369.json | 55 ++++++++++ CVE-2023/CVE-2023-515xx/CVE-2023-51522.json | 55 ++++++++++ CVE-2023/CVE-2023-515xx/CVE-2023-51525.json | 4 +- CVE-2023/CVE-2023-523xx/CVE-2023-52322.json | 8 +- CVE-2023/CVE-2023-67xx/CVE-2023-6725.json | 4 +- CVE-2024/CVE-2024-24xx/CVE-2024-2495.json | 4 +- CVE-2024/CVE-2024-255xx/CVE-2024-25592.json | 4 +- CVE-2024/CVE-2024-255xx/CVE-2024-25593.json | 4 +- CVE-2024/CVE-2024-255xx/CVE-2024-25596.json | 4 +- CVE-2024/CVE-2024-255xx/CVE-2024-25597.json | 4 +- CVE-2024/CVE-2024-255xx/CVE-2024-25598.json | 4 +- CVE-2024/CVE-2024-259xx/CVE-2024-25916.json | 4 +- CVE-2024/CVE-2024-259xx/CVE-2024-25919.json | 4 +- CVE-2024/CVE-2024-259xx/CVE-2024-25921.json | 4 +- CVE-2024/CVE-2024-259xx/CVE-2024-25934.json | 4 +- CVE-2024/CVE-2024-259xx/CVE-2024-25936.json | 4 +- CVE-2024/CVE-2024-271xx/CVE-2024-27189.json | 4 +- CVE-2024/CVE-2024-271xx/CVE-2024-27192.json | 4 +- CVE-2024/CVE-2024-271xx/CVE-2024-27193.json | 4 +- CVE-2024/CVE-2024-271xx/CVE-2024-27196.json | 4 +- CVE-2024/CVE-2024-283xx/CVE-2024-28318.json | 20 ++++ CVE-2024/CVE-2024-283xx/CVE-2024-28319.json | 20 ++++ CVE-2024/CVE-2024-284xx/CVE-2024-28403.json | 24 +++++ README.md | 75 ++++++++------ _state.csv | 80 ++++++++------ 39 files changed, 1203 insertions(+), 116 deletions(-) create mode 100644 CVE-2021/CVE-2021-389xx/CVE-2021-38938.json create mode 100644 CVE-2023/CVE-2023-461xx/CVE-2023-46179.json create mode 100644 CVE-2023/CVE-2023-461xx/CVE-2023-46181.json create mode 100644 CVE-2023/CVE-2023-461xx/CVE-2023-46182.json create mode 100644 CVE-2023/CVE-2023-471xx/CVE-2023-47147.json create mode 100644 CVE-2023/CVE-2023-471xx/CVE-2023-47162.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47699.json create mode 100644 CVE-2023/CVE-2023-508xx/CVE-2023-50886.json create mode 100644 CVE-2023/CVE-2023-508xx/CVE-2023-50898.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51369.json create mode 100644 CVE-2023/CVE-2023-515xx/CVE-2023-51522.json create mode 100644 CVE-2024/CVE-2024-283xx/CVE-2024-28318.json create mode 100644 CVE-2024/CVE-2024-283xx/CVE-2024-28319.json create mode 100644 CVE-2024/CVE-2024-284xx/CVE-2024-28403.json diff --git a/CVE-2021/CVE-2021-389xx/CVE-2021-38938.json b/CVE-2021/CVE-2021-389xx/CVE-2021-38938.json new file mode 100644 index 00000000000..ac52c56391a --- /dev/null +++ b/CVE-2021/CVE-2021-389xx/CVE-2021-38938.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2021-38938", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-03-15T16:15:07.327", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Host Access Transformation Services (HATS) 9.6 through 9.6.1.4 and 9.7 through 9.7.0.3 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 210989." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/210989", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/6832964", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36554.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36554.json index 486e1b79469..3846807e4ce 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36554.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36554.json @@ -2,16 +2,40 @@ "id": "CVE-2023-36554", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-03-12T15:15:45.693", - "lastModified": "2024-03-12T16:02:33.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T15:23:53.407", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A improper access control in Fortinet FortiManager version 7.4.0, version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.10, version 6.4.0 through 6.4.13, 6.2 all versions allows attacker to execute unauthorized code or commands via specially crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en Fortinet FortiManager versi\u00f3n 7.4.0, versi\u00f3n 7.2.0 a 7.2.3, versi\u00f3n 7.0.0 a 7.0.10, versi\u00f3n 6.4.0 a 6.4.13, 6.2 todas las versiones permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes HTTP especialmente manipuladas." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -46,10 +70,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndIncluding": "6.2.12", + "matchCriteriaId": "09105C5B-378F-4E1A-B395-F43573983A26" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.13", + "matchCriteriaId": "B632AF2E-739B-4EBA-8780-8AE999C62F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.10", + "matchCriteriaId": "7A615E88-FCB3-48F4-A6F3-5EDA0F67FE52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.3", + "matchCriteriaId": "7C7C73B7-2AE1-4FC2-A37A-89A085796D19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DBBF7219-D15F-43C9-9A90-1A4B062431E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-103", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42789.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42789.json index ecd9c280988..1a72932f06c 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42789.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42789.json @@ -2,16 +2,40 @@ "id": "CVE-2023-42789", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-03-12T15:15:46.107", - "lastModified": "2024-03-12T16:02:33.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T15:22:17.107", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A out-of-bounds write in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una escritura fuera de l\u00edmites en Fortinet FortiOS 7.4.0 a 7.4.1, 7.2.0 a 7.2.5, 7.0.0 a 7.0.12, 6.4.0 a 6.4.14, 6.2.0 a 6.2.15, FortiProxy 7.4.0, 7.2.0 a 7.2.6, 7.0.0 a 7.0.12, 2.0.0 a 2.0.13 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes HTTP especialmente manipuladas." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -46,10 +70,89 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndIncluding": "2.0.13", + "matchCriteriaId": "10E4FB93-7111-4F2A-8D5A-F276261D0E67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.12", + "matchCriteriaId": "E5E2C1A7-AF13-4DBB-8EB4-49BE54EDABAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.6", + "matchCriteriaId": "3F8AA932-A965-4345-8151-9CACDEE114F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9010968B-B839-4B7C-BFB5-6BD9CBCEC166" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndIncluding": "6.2.15", + "matchCriteriaId": "7916D6BB-838E-40A0-9C7F-FBE9ECBA0D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.14", + "matchCriteriaId": "A2B52E22-C64D-4142-885E-6C44FA670574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.12", + "matchCriteriaId": "BA582D59-C740-4AE7-83CA-C09A1D0EDA88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.5", + "matchCriteriaId": "A6E44123-995C-4E08-84B5-FF8C76B67B29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "61540F5B-080A-4D44-8BE0-75D7A0DCCB53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:7.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "17FE168A-0EA4-467C-91D2-87EB6D83917A" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-328", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42790.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42790.json index cc1fc558dba..c6a001766cd 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42790.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42790.json @@ -2,16 +2,40 @@ "id": "CVE-2023-42790", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-03-12T15:15:46.293", - "lastModified": "2024-03-12T16:02:33.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T15:16:00.440", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en Fortinet FortiOS 7.4.0 a 7.4.1, 7.2.0 a 7.2.5, 7.0.0 a 7.0.12, 6.4.0 a 6.4.14, 6.2.0 a 6.2.15, FortiProxy 7.4.0, 7.2.0 a 7.2.6, 7.0.0 a 7.0.12, 2.0.0 a 2.0.13 permiten al atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes HTTP especialmente manipuladas." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -46,10 +70,86 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndIncluding": "2.0.13", + "matchCriteriaId": "10E4FB93-7111-4F2A-8D5A-F276261D0E67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.12", + "matchCriteriaId": "E5E2C1A7-AF13-4DBB-8EB4-49BE54EDABAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.6", + "matchCriteriaId": "3F8AA932-A965-4345-8151-9CACDEE114F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9010968B-B839-4B7C-BFB5-6BD9CBCEC166" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndIncluding": "6.2.15", + "matchCriteriaId": "7916D6BB-838E-40A0-9C7F-FBE9ECBA0D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.14", + "matchCriteriaId": "A2B52E22-C64D-4142-885E-6C44FA670574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.12", + "matchCriteriaId": "BA582D59-C740-4AE7-83CA-C09A1D0EDA88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.5", + "matchCriteriaId": "A6E44123-995C-4E08-84B5-FF8C76B67B29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndIncluding": "7.4.1", + "matchCriteriaId": "2E2A5347-D536-4D43-A163-5B5A3AFE742C" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-327", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46179.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46179.json new file mode 100644 index 00000000000..4037528330f --- /dev/null +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46179.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-46179", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-03-15T15:15:07.440", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling Secure Proxy 6.0.3 and 6.1.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 269683." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-614" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269683", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7142038", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46181.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46181.json new file mode 100644 index 00000000000..4f2189b0f9a --- /dev/null +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46181.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-46181", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-03-15T16:15:07.840", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling Secure Proxy 6.0.3 and 6.1.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 269686." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-525" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269686", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7142038", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46182.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46182.json new file mode 100644 index 00000000000..0efe10e3164 --- /dev/null +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46182.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-46182", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-03-15T15:15:07.667", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling Secure Proxy 6.0.3 and 6.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 269692." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269692", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7142038", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47147.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47147.json new file mode 100644 index 00000000000..d0f4cb79d21 --- /dev/null +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47147.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-47147", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-03-15T16:15:08.070", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling Secure Proxy 6.0.3 and 6.1.0 could allow an attacker to overwrite a log message under specific conditions. IBM X-Force ID: 270598." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270598", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7142038", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47162.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47162.json new file mode 100644 index 00000000000..358bedb9f40 --- /dev/null +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47162.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-47162", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-03-15T15:15:07.893", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling Secure Proxy 6.0.3 and 6.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 270973." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270973", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7142038", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47534.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47534.json index 9151fcfd440..6607b2c7d8b 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47534.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47534.json @@ -2,16 +2,40 @@ "id": "CVE-2023-47534", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-03-12T15:15:46.770", - "lastModified": "2024-03-12T16:02:33.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T15:10:36.233", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A improper neutralization of formula elements in a csv file in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, 7.0.0 through 7.0.10, 6.4.0 through 6.4.9, 6.2.0 through 6.2.9, 6.0.0 through 6.0.8 allows attacker to execute unauthorized code or commands via specially crafted packets." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n inadecuada de elementos de f\u00f3rmula en un archivo csv en Fortinet FortiClientEMS versi\u00f3n 7.2.0 hasta 7.2.2, 7.0.0 hasta 7.0.10, 6.4.0 hasta 6.4.9, 6.2.0 hasta 6.2.9, 6.0.0 hasta 6.0.8 permite al atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de paquetes especialmente manipulados." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1236" + } + ] + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -46,10 +80,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient_endpoint_management_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndIncluding": "6.0.8", + "matchCriteriaId": "AEDE19DC-94DB-4BEB-8439-C2BE06EF0625" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient_endpoint_management_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndIncluding": "6.2.9", + "matchCriteriaId": "D16D1BDE-ED3A-472B-AE5D-9A22B330AD82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient_endpoint_management_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.9", + "matchCriteriaId": "C4FE4D98-C047-4A51-BFD2-99ADB9C18BCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient_endpoint_management_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.10", + "matchCriteriaId": "BFFE2A11-EE49-46A4-A5C5-4D575CF40C02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient_endpoint_management_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.2", + "matchCriteriaId": "62920FE9-2E6A-48BB-A8F7-C57595C862C4" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-390", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47699.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47699.json new file mode 100644 index 00000000000..0aac8e5b538 --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47699.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-47699", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-03-15T16:15:08.293", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling Secure Proxy 6.0.3 and 6.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 270974." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270974", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7142038", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json index d4441e2413d..befe3dee6cb 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50861", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T14:15:07.207", - "lastModified": "2024-03-15T14:15:07.207", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50886.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50886.json new file mode 100644 index 00000000000..fab13474ff7 --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50886.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50886", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T15:15:08.107", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF), Incorrect Authorization vulnerability in wpWax Legal Pages.This issue affects Legal Pages: from n/a through 1.3.7.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/legal-pages/wordpress-legal-pages-plugin-1-3-7-broken-access-control-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50898.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50898.json new file mode 100644 index 00000000000..28473d1a3bc --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50898.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-50898", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T15:15:08.330", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in sirv.Com Sirv.This issue affects Sirv: from n/a through 7.1.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/sirv/wordpress-image-optimizer-resizer-and-cdn-sirv-plugin-7-1-2-broken-access-control-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51369.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51369.json new file mode 100644 index 00000000000..ada8a67e4cb --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51369.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-51369", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T15:15:08.533", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SysBasics Customize My Account for WooCommerce.This issue affects Customize My Account for WooCommerce: from n/a through 1.8.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/customize-my-account-for-woocommerce/wordpress-customize-my-account-for-woocommerce-plugin-1-8-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51522.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51522.json new file mode 100644 index 00000000000..78dcb57565e --- /dev/null +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51522.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-51522", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T15:15:08.783", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Cozmoslabs Paid Member Subscriptions.This issue affects Paid Member Subscriptions: from n/a through 2.10.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/paid-member-subscriptions/wordpress-paid-membership-subscriptions-plugin-2-10-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51525.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51525.json index 2b5353ce42b..53098bf836a 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51525.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51525.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51525", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T14:15:07.457", - "lastModified": "2024-03-15T14:15:07.457", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52322.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52322.json index e6486d1c25c..7f5b2f68099 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52322.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52322.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52322", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-04T07:15:09.170", - "lastModified": "2024-02-02T16:33:43.153", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-15T16:15:08.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -89,6 +89,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00014.html", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6725.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6725.json index 3728827281a..2726a552c6c 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6725.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6725.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6725", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-15T13:15:06.857", - "lastModified": "2024-03-15T13:15:06.857", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2495.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2495.json index 0900459eecf..8b9ae6843ec 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2495.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2495.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2495", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-15T13:15:09.500", - "lastModified": "2024-03-15T13:15:09.500", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25592.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25592.json index 828c1f61a36..33cc26d80b3 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25592.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25592.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25592", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T14:15:07.550", - "lastModified": "2024-03-15T14:15:07.550", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25593.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25593.json index 1e9f6ef0f54..59062363454 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25593.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25593.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25593", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T14:15:07.787", - "lastModified": "2024-03-15T14:15:07.787", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25596.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25596.json index 4ddb3d1672f..1f261ce0a22 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25596.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25596.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25596", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T14:15:07.990", - "lastModified": "2024-03-15T14:15:07.990", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25597.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25597.json index 38a94ab6310..4d2534b340a 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25597.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25597.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25597", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T14:15:08.220", - "lastModified": "2024-03-15T14:15:08.220", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25598.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25598.json index 8cccf39be0b..b99de24cec2 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25598.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25598.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25598", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:07.087", - "lastModified": "2024-03-15T13:15:07.087", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25916.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25916.json index 98369530f3c..62692ea2146 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25916.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25916.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25916", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:07.323", - "lastModified": "2024-03-15T13:15:07.323", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25919.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25919.json index c99a1b09989..d985fb00570 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25919.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25919.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25919", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:07.563", - "lastModified": "2024-03-15T13:15:07.563", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25921.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25921.json index 1ced279c1ae..59da139735e 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25921.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25921.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25921", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:07.807", - "lastModified": "2024-03-15T13:15:07.807", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25934.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25934.json index e50d264a2f1..7408c66a416 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25934.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25934.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25934", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:08.070", - "lastModified": "2024-03-15T13:15:08.070", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25936.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25936.json index 792babaddb6..03f7a7aaec2 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25936.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25936.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25936", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:08.287", - "lastModified": "2024-03-15T13:15:08.287", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27189.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27189.json index e7d2ff03179..7109dc7a432 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27189.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27189.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27189", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:08.500", - "lastModified": "2024-03-15T13:15:08.500", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27192.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27192.json index c1a2b2b0d5d..e306bea678c 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27192.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27192.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27192", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:08.737", - "lastModified": "2024-03-15T13:15:08.737", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27193.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27193.json index 6ea940f4dab..8e60befbc7f 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27193.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27193", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:09.043", - "lastModified": "2024-03-15T13:15:09.043", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27196.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27196.json index 0ac34e7893e..fe2a6b0b286 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27196.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27196.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27196", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:09.277", - "lastModified": "2024-03-15T13:15:09.277", - "vulnStatus": "Received", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28318.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28318.json new file mode 100644 index 00000000000..6c29464952e --- /dev/null +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28318.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-28318", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-15T15:15:08.977", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "gpac 2.3-DEV-rev921-g422b78ecf-master was discovered to contain a out of boundary write vulnerability via swf_get_string at scene_manager/swf_parse.c:325" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/gpac/gpac/issues/2764", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28319.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28319.json new file mode 100644 index 00000000000..c6a6715f25f --- /dev/null +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28319.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-28319", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-15T15:15:09.020", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "gpac 2.3-DEV-rev921-g422b78ecf-master was discovered to contain an out of boundary read vulnerability via gf_dash_setup_period media_tools/dash_client.c:6374" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/gpac/gpac/issues/2763", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28403.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28403.json new file mode 100644 index 00000000000..72b01341c86 --- /dev/null +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28403.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-28403", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-15T16:15:08.583", + "lastModified": "2024-03-15T16:26:49.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK X2000R V1.0.0-B20221128.1033 is vulnerable to Cross Site Scripting (XSS) via the VPN Page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_5_VPN/XSS.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ef233ee9d72..32f35562fad 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-15T15:00:38.131917+00:00 +2024-03-15T17:00:37.940924+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-15T14:52:23.887000+00:00 +2024-03-15T16:26:49.320000+00:00 ``` ### Last Data Feed Release @@ -29,47 +29,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -241591 +241605 ``` ### CVEs added in the last Commit -Recently added CVEs: `18` +Recently added CVEs: `14` -* [CVE-2023-50861](CVE-2023/CVE-2023-508xx/CVE-2023-50861.json) (`2024-03-15T14:15:07.207`) -* [CVE-2023-51525](CVE-2023/CVE-2023-515xx/CVE-2023-51525.json) (`2024-03-15T14:15:07.457`) -* [CVE-2023-6725](CVE-2023/CVE-2023-67xx/CVE-2023-6725.json) (`2024-03-15T13:15:06.857`) -* [CVE-2024-2495](CVE-2024/CVE-2024-24xx/CVE-2024-2495.json) (`2024-03-15T13:15:09.500`) -* [CVE-2024-25592](CVE-2024/CVE-2024-255xx/CVE-2024-25592.json) (`2024-03-15T14:15:07.550`) -* [CVE-2024-25593](CVE-2024/CVE-2024-255xx/CVE-2024-25593.json) (`2024-03-15T14:15:07.787`) -* [CVE-2024-25596](CVE-2024/CVE-2024-255xx/CVE-2024-25596.json) (`2024-03-15T14:15:07.990`) -* [CVE-2024-25597](CVE-2024/CVE-2024-255xx/CVE-2024-25597.json) (`2024-03-15T14:15:08.220`) -* [CVE-2024-25598](CVE-2024/CVE-2024-255xx/CVE-2024-25598.json) (`2024-03-15T13:15:07.087`) -* [CVE-2024-25916](CVE-2024/CVE-2024-259xx/CVE-2024-25916.json) (`2024-03-15T13:15:07.323`) -* [CVE-2024-25919](CVE-2024/CVE-2024-259xx/CVE-2024-25919.json) (`2024-03-15T13:15:07.563`) -* [CVE-2024-25921](CVE-2024/CVE-2024-259xx/CVE-2024-25921.json) (`2024-03-15T13:15:07.807`) -* [CVE-2024-25934](CVE-2024/CVE-2024-259xx/CVE-2024-25934.json) (`2024-03-15T13:15:08.070`) -* [CVE-2024-25936](CVE-2024/CVE-2024-259xx/CVE-2024-25936.json) (`2024-03-15T13:15:08.287`) -* [CVE-2024-27189](CVE-2024/CVE-2024-271xx/CVE-2024-27189.json) (`2024-03-15T13:15:08.500`) -* [CVE-2024-27192](CVE-2024/CVE-2024-271xx/CVE-2024-27192.json) (`2024-03-15T13:15:08.737`) -* [CVE-2024-27193](CVE-2024/CVE-2024-271xx/CVE-2024-27193.json) (`2024-03-15T13:15:09.043`) -* [CVE-2024-27196](CVE-2024/CVE-2024-271xx/CVE-2024-27196.json) (`2024-03-15T13:15:09.277`) +* [CVE-2021-38938](CVE-2021/CVE-2021-389xx/CVE-2021-38938.json) (`2024-03-15T16:15:07.327`) +* [CVE-2023-46179](CVE-2023/CVE-2023-461xx/CVE-2023-46179.json) (`2024-03-15T15:15:07.440`) +* [CVE-2023-46181](CVE-2023/CVE-2023-461xx/CVE-2023-46181.json) (`2024-03-15T16:15:07.840`) +* [CVE-2023-46182](CVE-2023/CVE-2023-461xx/CVE-2023-46182.json) (`2024-03-15T15:15:07.667`) +* [CVE-2023-47147](CVE-2023/CVE-2023-471xx/CVE-2023-47147.json) (`2024-03-15T16:15:08.070`) +* [CVE-2023-47162](CVE-2023/CVE-2023-471xx/CVE-2023-47162.json) (`2024-03-15T15:15:07.893`) +* [CVE-2023-47699](CVE-2023/CVE-2023-476xx/CVE-2023-47699.json) (`2024-03-15T16:15:08.293`) +* [CVE-2023-50886](CVE-2023/CVE-2023-508xx/CVE-2023-50886.json) (`2024-03-15T15:15:08.107`) +* [CVE-2023-50898](CVE-2023/CVE-2023-508xx/CVE-2023-50898.json) (`2024-03-15T15:15:08.330`) +* [CVE-2023-51369](CVE-2023/CVE-2023-513xx/CVE-2023-51369.json) (`2024-03-15T15:15:08.533`) +* [CVE-2023-51522](CVE-2023/CVE-2023-515xx/CVE-2023-51522.json) (`2024-03-15T15:15:08.783`) +* [CVE-2024-28318](CVE-2024/CVE-2024-283xx/CVE-2024-28318.json) (`2024-03-15T15:15:08.977`) +* [CVE-2024-28319](CVE-2024/CVE-2024-283xx/CVE-2024-28319.json) (`2024-03-15T15:15:09.020`) +* [CVE-2024-28403](CVE-2024/CVE-2024-284xx/CVE-2024-28403.json) (`2024-03-15T16:15:08.583`) ### CVEs modified in the last Commit -Recently modified CVEs: `10` +Recently modified CVEs: `23` -* [CVE-2023-48788](CVE-2023/CVE-2023-487xx/CVE-2023-48788.json) (`2024-03-15T14:52:23.887`) -* [CVE-2023-52434](CVE-2023/CVE-2023-524xx/CVE-2023-52434.json) (`2024-03-15T14:21:29.950`) -* [CVE-2023-52435](CVE-2023/CVE-2023-524xx/CVE-2023-52435.json) (`2024-03-15T14:06:17.587`) -* [CVE-2023-52438](CVE-2023/CVE-2023-524xx/CVE-2023-52438.json) (`2024-03-15T14:03:51.503`) -* [CVE-2023-52439](CVE-2023/CVE-2023-524xx/CVE-2023-52439.json) (`2024-03-15T14:21:10.847`) -* [CVE-2023-52440](CVE-2023/CVE-2023-524xx/CVE-2023-52440.json) (`2024-03-15T13:44:59.367`) -* [CVE-2023-52441](CVE-2023/CVE-2023-524xx/CVE-2023-52441.json) (`2024-03-15T13:56:31.710`) -* [CVE-2024-23112](CVE-2024/CVE-2024-231xx/CVE-2024-23112.json) (`2024-03-15T14:51:58.497`) -* [CVE-2024-26582](CVE-2024/CVE-2024-265xx/CVE-2024-26582.json) (`2024-03-15T13:56:41.843`) -* [CVE-2024-26583](CVE-2024/CVE-2024-265xx/CVE-2024-26583.json) (`2024-03-15T13:05:03.220`) +* [CVE-2023-36554](CVE-2023/CVE-2023-365xx/CVE-2023-36554.json) (`2024-03-15T15:23:53.407`) +* [CVE-2023-42789](CVE-2023/CVE-2023-427xx/CVE-2023-42789.json) (`2024-03-15T15:22:17.107`) +* [CVE-2023-42790](CVE-2023/CVE-2023-427xx/CVE-2023-42790.json) (`2024-03-15T15:16:00.440`) +* [CVE-2023-47534](CVE-2023/CVE-2023-475xx/CVE-2023-47534.json) (`2024-03-15T15:10:36.233`) +* [CVE-2023-50861](CVE-2023/CVE-2023-508xx/CVE-2023-50861.json) (`2024-03-15T16:26:49.320`) +* [CVE-2023-51525](CVE-2023/CVE-2023-515xx/CVE-2023-51525.json) (`2024-03-15T16:26:49.320`) +* [CVE-2023-52322](CVE-2023/CVE-2023-523xx/CVE-2023-52322.json) (`2024-03-15T16:15:08.497`) +* [CVE-2023-6725](CVE-2023/CVE-2023-67xx/CVE-2023-6725.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-2495](CVE-2024/CVE-2024-24xx/CVE-2024-2495.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-25592](CVE-2024/CVE-2024-255xx/CVE-2024-25592.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-25593](CVE-2024/CVE-2024-255xx/CVE-2024-25593.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-25596](CVE-2024/CVE-2024-255xx/CVE-2024-25596.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-25597](CVE-2024/CVE-2024-255xx/CVE-2024-25597.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-25598](CVE-2024/CVE-2024-255xx/CVE-2024-25598.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-25916](CVE-2024/CVE-2024-259xx/CVE-2024-25916.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-25919](CVE-2024/CVE-2024-259xx/CVE-2024-25919.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-25921](CVE-2024/CVE-2024-259xx/CVE-2024-25921.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-25934](CVE-2024/CVE-2024-259xx/CVE-2024-25934.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-25936](CVE-2024/CVE-2024-259xx/CVE-2024-25936.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-27189](CVE-2024/CVE-2024-271xx/CVE-2024-27189.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-27192](CVE-2024/CVE-2024-271xx/CVE-2024-27192.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-27193](CVE-2024/CVE-2024-271xx/CVE-2024-27193.json) (`2024-03-15T16:26:49.320`) +* [CVE-2024-27196](CVE-2024/CVE-2024-271xx/CVE-2024-27196.json) (`2024-03-15T16:26:49.320`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 008d916a32d..c97dc958baf 100644 --- a/_state.csv +++ b/_state.csv @@ -180825,6 +180825,7 @@ CVE-2021-38934,0,0,5c4651767cce25d2e372acfac64ccd30eda150144a9db8a8d518736c586b3 CVE-2021-38935,0,0,575abaed3f018c8fdd2c65124a81d774333d1aa7533586c5a20732679aa80733,2022-02-25T18:51:42.807000 CVE-2021-38936,0,0,40c5047b44539131b819652acf8dddfcaefac0f01b1c2cfbbb0b1a3a705598fa,2022-07-26T12:30:42.857000 CVE-2021-38937,0,0,5a051a585583d3ef84edd134a33df7368420b5ea6d042e67acfa5617bd81ce98,2021-12-14T13:37:38.367000 +CVE-2021-38938,1,1,3eacdc52c2788dd4c13bcf2782e793f5793887d339985c5e171b882779c978a3,2024-03-15T16:26:49.320000 CVE-2021-38939,0,0,f8086a4ea49328da035466ace0cb2b81d508d53ef1d10b0922ee4013b38b3c0f,2022-05-04T14:55:59.987000 CVE-2021-3894,0,0,b9f8e1197dc294148d24308efa5eba1c42f97b4c119e0cae72c8baf8d12d63b3,2023-11-07T03:38:23.590000 CVE-2021-38941,0,0,9796f25c0e537eda17dab10f6f56c14a1cdc3173f316b79e169a1ada9bc9035b,2022-07-08T16:40:13.703000 @@ -225804,7 +225805,7 @@ CVE-2023-3655,0,0,f2be07685fff6bfb4d484a7b6e97d1b4e36feb962c6856d1556205e1e802f0 CVE-2023-36550,0,0,a603dc11d7d281ade9b5e67ca02066f7c7b1983aae8d7fc58ebb00477a397f36,2023-11-07T04:16:37.370000 CVE-2023-36551,0,0,60e89d0b52e16cd08c6d6d87793848a2a896bc2469af4dc5a7a06c71c9bcb884,2023-11-07T04:16:37.487000 CVE-2023-36553,0,0,532e682a81cbec4e5371bf44fe0e61124d97a09c9b3b4aa70e68048521dfda15,2023-11-20T20:06:00.710000 -CVE-2023-36554,0,0,beb75ae0f0b2e90ecce0c4948866902684d228e006117e4b9762fc8535d0fce9,2024-03-12T16:02:33.900000 +CVE-2023-36554,0,1,d489e6233744891c3fb793289a951413ca53f343b9ed3fd2fe2a6e7859257c24,2024-03-15T15:23:53.407000 CVE-2023-36555,0,0,1fd779249cb181376f860462cd44ca357af8b64b49479f27029ec56f67dd03c0,2023-11-07T04:16:37.650000 CVE-2023-36556,0,0,a9f1c0852543c1785fffa077428c046fbadf70096846de8e93f539f6ebb6cda1,2023-11-07T04:16:37.820000 CVE-2023-36557,0,0,ec5998193d14e84da250bf797dd4d5f7b1bdaa748c0995786b19280790d30387,2023-10-13T18:57:09.347000 @@ -230078,9 +230079,9 @@ CVE-2023-42782,0,0,a5f3a00d5ade7c181a664994be168f825df0ad97faadf9c15cec4fc27442f CVE-2023-42783,0,0,bbdd64a3e7f0e36e682e9dec81907fd7e43173e278c032f0294cbf5bbbb58c1d,2023-11-18T03:28:03.087000 CVE-2023-42787,0,0,d2e32fdcaebd006eadd533ba8a29ed23caf0307fff995ed88db2c58ae20470d9,2023-12-21T01:37:15.917000 CVE-2023-42788,0,0,5bef1975ed59cd6701a5c6bbed8dda53f3f68505397a976a2b099f108b659070,2024-01-12T22:15:12.640000 -CVE-2023-42789,0,0,ebf5e31595f15b504841267d6df47b1a8e2b169ed0f12b0aae746a185fb96b73,2024-03-12T16:02:33.900000 +CVE-2023-42789,0,1,101c12081a96ef778c9fc9158a10f90ca213e4c68e8c0907ff6d5043d6752d06,2024-03-15T15:22:17.107000 CVE-2023-4279,0,0,c2e3019450af55a07054d390380759c5e0fa2e34b465501d298cd74551d5e5d2,2023-11-07T04:22:24.490000 -CVE-2023-42790,0,0,3b8483b1b644e52d5314a830325790fc78a5122edd8e3269a93282e61d53858f,2024-03-12T16:02:33.900000 +CVE-2023-42790,0,1,8ec0e6c729fb9530eeef3fc79fc86a0b893f17e58ca199352996d6f10f50d8f8,2024-03-15T15:16:00.440000 CVE-2023-42791,0,0,27d45cceba3e4562352c7ede0404756c9d01f4154ce9e1abec4867c04764897a,2024-02-20T19:50:53.960000 CVE-2023-42792,0,0,dd24ffcdecd6ee52b22199ebd3870422060275bcb8dab633695cea3f8caa0706,2023-12-21T15:15:08.710000 CVE-2023-42793,0,0,543dfe1f320b6b248a7d52a1f9b64c360f3b0bdf054225947761bc8900ed87e1,2023-10-03T15:44:06.660000 @@ -232087,6 +232088,9 @@ CVE-2023-46172,0,0,343742b0164ac9659c9a7f831bc1aaa4a54e2fd602e2f56722f402c7f2e97 CVE-2023-46174,0,0,4568911af9ccb061bb66e2fce492a740fceffcf111db5c74874e312a0aad8e81,2023-12-04T18:31:04.347000 CVE-2023-46176,0,0,c5d1c81e6b3b82488f732d559afdfaa621c77138da26628f916e5626c32353b4,2023-11-09T16:55:00.637000 CVE-2023-46177,0,0,954a2ba3d9e32e7915fdae0885a0413fe7a147cb1442079ab62f24c11824db60,2023-12-22T18:46:12.510000 +CVE-2023-46179,1,1,27a166e60e97cf2be6ea8d471d2d5cedcc01d0b04eeda2380a825e55f68ac2f8,2024-03-15T16:26:49.320000 +CVE-2023-46181,1,1,273bf392eec9bd9f3f8e884d0326a84b4ef66e5cfe031fba37729a8c04c1dddb,2024-03-15T16:26:49.320000 +CVE-2023-46182,1,1,58ebad01d29c30a604cb15e30931053ae848b77ba824697f31622eb99de3cb41,2024-03-15T16:26:49.320000 CVE-2023-46183,0,0,020448b49e5a9ad26deeac6243bb0b73231181fd5e6be50b7dbb78fd648fd5a2,2024-02-15T14:21:14.870000 CVE-2023-46186,0,0,465b1b6b622710e229e427da42c24e128ace1a4c55b11e3d59d3d94d7a04fbc3,2024-02-14T16:13:22.177000 CVE-2023-46189,0,0,a6512e67be3a12a048912140b6461fb5db6df06fd0c398c688de7df8ecc3a8df,2023-11-01T17:00:55.353000 @@ -232788,11 +232792,13 @@ CVE-2023-47143,0,0,7acc48a2d5a4570d6f29396faeecc738d3ff93f287fe7f2c4731eabceb6dd CVE-2023-47144,0,0,83eb749854fa495bd83421f08126c9a63b91a925c2652c722fd715a8f60c0017,2024-02-08T20:01:15.150000 CVE-2023-47145,0,0,620ae7f5678047a8c4108d9fbdf5fa18578054841b939f4838b425b9745ba933,2024-03-07T17:15:10.943000 CVE-2023-47146,0,0,20e69829653fae8f4b2686a3902570d251dd86f6502cbd24bd7e7bddd7d52e98,2023-12-27T17:50:55.147000 +CVE-2023-47147,1,1,16d434770aa5d9b4f10f5f0bc959bdca42f7f739b7391aa0ab8f17d98480f455,2024-03-15T16:26:49.320000 CVE-2023-47148,0,0,b288941dfe3b1bf420ecb81fb3f06fe48a4281a820ff4a84a19d97a629ab7c25,2024-02-08T19:58:30.023000 CVE-2023-47152,0,0,21eae157a0c14eb599c0d65626b59a59bd4bef9c2fca5d41f60c8cae56283468,2024-03-07T17:15:11.063000 CVE-2023-47158,0,0,846f95a2725be32047541f14ae8c358ff876d7b2eaf417c4327cad289f3b21cd,2024-03-07T17:15:11.147000 CVE-2023-4716,0,0,19a8e4bcfef050287a950063ecd9c6c3a76d47aa7d1ec3543611c805970cc149,2023-11-07T04:22:53.527000 CVE-2023-47161,0,0,aa545c6f0a0ec7887c0d704af140334d0b005fb716fcaee73533e212265aa4ed,2023-12-27T18:41:28.277000 +CVE-2023-47162,1,1,8e66cce8f0c3fb0e3c9a9b9050babf6a742df723c76be25ab6b5d1e4c4b4c1eb,2024-03-15T16:26:49.320000 CVE-2023-47163,0,0,d5ba5c5494cd6dba199f3b95a2f7529c892a015f889691b261aa6e93b0585aa8,2023-11-16T18:16:27.767000 CVE-2023-47164,0,0,45f2ba6b6081cdfa1f2d7f33427c34f352972559346db25f09ad2652d51dd7da,2023-11-16T17:57:24.673000 CVE-2023-47167,0,0,a06991e82de8550749e977b8fbc52f0ae5cb48587b76f556206354774cb0c3b5,2024-02-09T02:10:50.633000 @@ -233008,7 +233014,7 @@ CVE-2023-47530,0,0,2aab713622884e85c725059508708c9cef02147dd34a67e71316542a65ba2 CVE-2023-47531,0,0,bd1c8d004d31ae2323efab39d4fd4793528d44c9fe0101680b094bcc3dc08140,2023-11-24T19:28:13.333000 CVE-2023-47532,0,0,f7cf6572ed9153c9e9a7f5cd23eeb0b6657c93bc6ce2c46ab6944d32c1834d42,2023-11-20T20:30:41.437000 CVE-2023-47533,0,0,64692615372bb5e03c2a36fe4ae8165c87581d210ff48d4d53a7120482b0e240,2023-11-17T15:53:53.267000 -CVE-2023-47534,0,0,6396ec3b64624cd6db6d47927eb5f9ee20ff1ef5d71af92355444ca620508a05,2024-03-12T16:02:33.900000 +CVE-2023-47534,0,1,81a5c657381b573d19aa39a0b2a9c5cefb1552d1a7cd2bbc725130b38cdd6d55,2024-03-15T15:10:36.233000 CVE-2023-47536,0,0,c92809299ce994fe002984e3ea770aaca21d26ac58ae60aa42bd9b1f93a95802,2023-12-18T17:19:51.397000 CVE-2023-47537,0,0,e819c54cb454cf4f0620df9dd3d6930b398a1b42288f9e331fa69cbd987badb2,2024-02-22T15:26:01.937000 CVE-2023-4754,0,0,199b4d021ff91932085da8d70d17c47cde1b9bb9b3e5773b31ef5f4da7a7483b,2023-09-06T22:23:47.563000 @@ -233133,6 +233139,7 @@ CVE-2023-47691,0,0,7993c9c62ebbd59a189e56211b2f787618c40de006fd4c8e79b8c894ce023 CVE-2023-47695,0,0,de878f54c761f2301e16c743ddd2cf4904f1b26e9af3aa139b2d294f1e7544da,2023-11-16T23:44:55.597000 CVE-2023-47696,0,0,c101ac3ea8aaa97c969631357b2595ff9ea35a876ea66e0e2cbe2e9d1ed23dd2,2023-11-16T23:44:46.687000 CVE-2023-47697,0,0,4a891b5d96329b6dde4632463c5d8197e67778bf7c04d007b95ea3e78fdc12fd,2023-11-16T23:44:35.717000 +CVE-2023-47699,1,1,d94430b1213b34c4516e5a477fe0fc5148e332210f557fd18c4bda1179b3bf3a,2024-03-15T16:26:49.320000 CVE-2023-4770,0,0,51b873ce10ffbc58dc791ad3778db522d6382e84412f9d35bb8ea4354421177a,2023-12-06T17:31:06.707000 CVE-2023-47700,0,0,4e9afce3ab5d4d0c173b8ba5bda7edff749cf93a00f197bafe8a867d5ddaadf2,2024-02-15T15:09:10.133000 CVE-2023-47701,0,0,f51606943028fc5abe44c5f4ff599ffa0bb5076ab9318ea3d56645c67a225320,2024-01-19T16:15:09.547000 @@ -233899,7 +233906,7 @@ CVE-2023-48780,0,0,81a46aadc83bef693702f0587720fb307d57733c38a40b0e9a0adbf977d5c CVE-2023-48781,0,0,0b8167a5eef8ab6e938308c388d4115607ba3ad1846d34aa073b91ec79ad8a40,2023-12-22T09:47:10.017000 CVE-2023-48782,0,0,88145c135f3d36dc2324e589083cb79dceef7bf357c73c33782a57f9910e4f66,2023-12-15T20:01:55.773000 CVE-2023-48783,0,0,ebc0e9b096de11f5bb2feb6ecedfda87f1114290b6bb005e0f4f19fb8a6d2ef6,2024-01-17T18:24:38.617000 -CVE-2023-48788,0,1,431a30b5a4d2d89a6f19f8c64dd0507c284384eda44196b13aaf49cb79224e2a,2024-03-15T14:52:23.887000 +CVE-2023-48788,0,0,431a30b5a4d2d89a6f19f8c64dd0507c284384eda44196b13aaf49cb79224e2a,2024-03-15T14:52:23.887000 CVE-2023-4879,0,0,fa584d11e9766c316d104762d8e4d48a31923cd7ce617f7440b7a809b8dd63fe,2023-09-18T18:58:43.767000 CVE-2023-48791,0,0,4e7d2cae3ad6ba11c4e276624bedca77887a0ee315b409ddadb10bd81db3bb45,2023-12-15T20:09:24.010000 CVE-2023-48792,0,0,a3c17617afe01ace18242f14c2f591f70a09281fccef1129ab04ab7743ac5ed0,2024-02-09T19:41:33.093000 @@ -235001,7 +235008,7 @@ CVE-2023-50858,0,0,94d07847a491bbe81a54b6db746f38547b8b9460f13c67d1c03ef5493373b CVE-2023-50859,0,0,c55b7ebfdad692c446161665ad7f57d5be4c4ffca139aa2ba69fd933143bb7b0,2024-01-04T19:21:18.457000 CVE-2023-5086,0,0,04cab16ae21da525bc5fa3fc2006574bc61344fe24e236a9fe6b2c57761baec9,2023-11-07T04:23:26.530000 CVE-2023-50860,0,0,06bdd35e56b1857cf3d3ff537b3ce562fb9605a6c9659981d4436040d58ad4f8,2024-01-04T19:21:02.913000 -CVE-2023-50861,1,1,513130f0fadd21816260070491b883f5fe1e9eaeb44544fa43adc7076bb69eb9,2024-03-15T14:15:07.207000 +CVE-2023-50861,0,1,1a44cde5d865dfe3147c7bb5ef663185dd231416918066211f4c841ac41970bc,2024-03-15T16:26:49.320000 CVE-2023-50862,0,0,e4cb32b36db0afa0ad6ef97c99a384298b67a311b9652e286e4e5ff290075969,2024-01-10T01:12:52.360000 CVE-2023-50863,0,0,c77e5226b7e344c7e1e9dd4386edfcafa55161eef35c2134974fbc700d5b668f,2024-01-10T01:12:42.607000 CVE-2023-50864,0,0,dbb8d20e5f36a035c3156fb7a77589dedbf6adf8027e6048f396876e3395893c,2024-01-10T01:12:35.763000 @@ -235020,12 +235027,14 @@ CVE-2023-50879,0,0,e7f635ec835f8af6e68324c638f96c217e373f3a3af9c80d6a7d36cc1662f CVE-2023-5088,0,0,939ef66299af3edb362a7d2c74b0e49564a48ba289fd555d0389350188c0dc0b,2024-03-11T18:15:17.433000 CVE-2023-50880,0,0,45dfc20edf873b6f54c033b90d8b745bc998db6f75a866db44cd1e8a384e14b7,2024-01-05T17:36:02.743000 CVE-2023-50881,0,0,21fc9e5f06f2216fa2395fe2689d924b63b36b0b4cdf8b0f9c5260d788c328af,2024-01-05T17:37:29.017000 +CVE-2023-50886,1,1,891df108837826276b8f87f511883054e9015eb439b8f5e7766963f69b9a9fa7,2024-03-15T16:26:49.320000 CVE-2023-50889,0,0,c1ad7d35b6d5afc074175b11fcf31e66a1f88510cc63a735f12500e424605271,2024-01-05T17:39:22.253000 CVE-2023-5089,0,0,cddae8cd7907847e037d2a072115a2d298d26ef8e69ec53058c1c3b486a685c8,2023-11-07T04:23:26.960000 CVE-2023-50891,0,0,bb600fee959bc0c70bc3812b31f851a727133cb965ac9f397fefe731a21c9727,2024-01-05T18:37:38.957000 CVE-2023-50892,0,0,b0a5df3a0991deeddc21aba073d59e844033efac16fe6402bc12f130e340ebd2,2024-01-05T19:43:06.133000 CVE-2023-50893,0,0,9e2a79008bb70c571f7956df8d783d4f37d38fd17c2b6ce3c5ce4f3a295c4404,2024-01-05T18:33:07.640000 CVE-2023-50896,0,0,32a10544fdac61db8a171df746dccf1d232f13684a47de05af905306e155cf06,2024-01-05T17:32:59.937000 +CVE-2023-50898,1,1,9e73a511974b527c13e6738348ea6b3353008debb9f066eeb82fbaacffe1157d,2024-03-15T16:26:49.320000 CVE-2023-5090,0,0,ada81fac99e019d87a6cff7c251f38065497d67cafeddaf348ee3fa109b9d32b,2023-12-13T08:15:51.483000 CVE-2023-50901,0,0,fa1245dfad58609576f971f16b5ea532f1ca81c051130c99f667ea1205d37921,2024-01-05T17:34:07.947000 CVE-2023-50902,0,0,1513c647ffec3bccc364b057fe7be8ad3f21264b604f6b5475cb44c0c9074864,2024-01-05T16:21:34.563000 @@ -235218,6 +235227,7 @@ CVE-2023-51358,0,0,991bf413d729d852acfcb22a561d128cc06a2b0e585af808f675e35b49ec7 CVE-2023-5136,0,0,542c9990597e005ab5ca65b7a86e27fe0f3f215c1dc42121e44283f07d331415,2023-11-15T18:42:41.643000 CVE-2023-51361,0,0,d203221b2b4576465e000a1694621bcdd79b1ef4d46ebfa7152ed021a51efcac,2024-01-05T04:52:30.367000 CVE-2023-51363,0,0,9533ff938d825e0198bcc4fff1b73b2a06f9f47f9eff24f7fa87983fbfdb5516,2024-02-20T18:52:19.997000 +CVE-2023-51369,1,1,59c4fe84427759dd3a9c13172dcbf318897e1fbe63220e6f5ac02950d12089cd,2024-03-15T16:26:49.320000 CVE-2023-5137,0,0,7f3c0383ef1d05d2eef4009096fce02814b8d397bee277a8b42f9686360cbb03,2023-12-07T20:19:29.557000 CVE-2023-51370,0,0,8106ab0212b026cbbc52f5d21281688134bb00bc9854939812e0590e81afda50,2024-02-12T14:20:03.287000 CVE-2023-51371,0,0,3aedbdd2ebcefdee1d4ecc7e34ad4946769243f5b6156bf507da0f1e10c7af21,2024-01-05T04:52:43.767000 @@ -235328,7 +235338,8 @@ CVE-2023-51517,0,0,1a69e7a8868bb57fe23881af905a555a81020cb04edb85fe9a748430c692e CVE-2023-51518,0,0,82d2f1d17566273e3d96a161b87d4f3f7567388d39e7cb79eb1a426bdc54e536,2024-02-27T14:20:06.637000 CVE-2023-5152,0,0,2c3f5b0deeae37ff96f4852108cf5d6fc102cc5a9f5bbf14a3b0b902e67c543e,2024-02-29T01:42:12.497000 CVE-2023-51520,0,0,278d7a72857b486e9b0b31b11c49041fe1beb2c693b353f7760792bf09c1e90d,2024-02-06T20:20:11.330000 -CVE-2023-51525,1,1,e9a062d606e10db818cb431361b3f83d07db3dd5f6a3f2cfed46fe786295de82,2024-03-15T14:15:07.457000 +CVE-2023-51522,1,1,e0790a5f0eb3a279bd91b739fbf68ea40d25422bd56460243e09f0f86766f116,2024-03-15T16:26:49.320000 +CVE-2023-51525,0,1,18be365fa2f638e96c476f7bda5d97a0204a8ef04927d2736163dc1fa6d352e9,2024-03-15T16:26:49.320000 CVE-2023-51527,0,0,6cb4ff038359f6e44ffc98cebb0259b94fe40cd1a58bddb18fc1cd2b63f324d3,2024-01-05T18:13:46.270000 CVE-2023-51528,0,0,9dfa54b303eb56104b42c24d77fae5eea4f23b1ed226c56c1b41872b1d7aec3d,2024-02-29T13:49:29.390000 CVE-2023-51529,0,0,f1431d628580aaae90dc3558b09f51395840a04ba474ae8bd49d2f4fca4b448b,2024-02-29T13:49:29.390000 @@ -235759,7 +235770,7 @@ CVE-2023-52312,0,0,47b4f5312af35c461b6cfe1a5252b93225fb11b181da35296b566c7803dbc CVE-2023-52313,0,0,1a1d46eee38fe535533137d3afe0ae92074563da481f05ddd4fbf886a686a102,2024-01-05T12:15:03.560000 CVE-2023-52314,0,0,7b0412c45a880fb9a5e3642a078e2574b20402e62a862bc0ddec9fd7e95b4266,2024-01-05T12:15:05.973000 CVE-2023-5232,0,0,56315295f25df2e0a68312774082faca74f96c60416d1a57c584f165560d08b5,2023-11-07T04:23:38.803000 -CVE-2023-52322,0,0,bc31116fd7651251dec509892393706ad74197295d25b2e3c02e73582be097ed,2024-02-02T16:33:43.153000 +CVE-2023-52322,0,1,e5d0a65f692ac25840b6bb65a152248c831cf567799cfd384a0c36a8ff6b68bb,2024-03-15T16:15:08.497000 CVE-2023-52323,0,0,dbb85cca9f2ef152215abad297e888abbdeaca733ce7af7f2fef941f4a67d42a,2024-01-11T17:06:00.260000 CVE-2023-52324,0,0,be52131f9dcaa56a891778c7ebf892b0225af9820e0dcf0309ff6cb1806fad36,2024-01-30T18:40:32.970000 CVE-2023-52325,0,0,e00f7c22959d48b39b3dd265cfede8fe314a7a3590a20125e557fea672b7e210,2024-01-30T18:45:29.687000 @@ -235825,15 +235836,15 @@ CVE-2023-52430,0,0,d42ac76eff7e870ccd425430baec924966d37450b40a663564ae4a320330f CVE-2023-52431,0,0,c693cbe76127faa54716f414936fa58bc8929839973e4bd5352d442ea2d0fbba,2024-02-13T14:01:07.747000 CVE-2023-52432,0,0,e1d380fbb265614fea5d100f2d4330b94e2c0e2793fb6bfcf16b790141380ced,2024-03-05T13:41:01.900000 CVE-2023-52433,0,0,1a0cb05542d0c79456ce86a71a378df73e7a3f74f8da709b843dc9ea6d882dfa,2024-02-20T19:50:53.960000 -CVE-2023-52434,0,1,5d52612c26fee7b14653aeb9fd0e234de51ea4d52e7c788aef26856ca04a039a,2024-03-15T14:21:29.950000 -CVE-2023-52435,0,1,93ff57cc29918e833611e81b89e4ae0482ae349c7e83a8ab64e2ebbd978f4b55,2024-03-15T14:06:17.587000 +CVE-2023-52434,0,0,5d52612c26fee7b14653aeb9fd0e234de51ea4d52e7c788aef26856ca04a039a,2024-03-15T14:21:29.950000 +CVE-2023-52435,0,0,93ff57cc29918e833611e81b89e4ae0482ae349c7e83a8ab64e2ebbd978f4b55,2024-03-15T14:06:17.587000 CVE-2023-52436,0,0,96f7114e19431af0a0b95791e5cff25753f280edc668cb19fd284740b4aec928,2024-02-20T21:52:55.187000 CVE-2023-52437,0,0,91d3cc3a51673e754e25f139cf45e627b67188a0988727604c925b81f4f0227e,2024-02-22T13:15:08.020000 -CVE-2023-52438,0,1,320b81973417672f06fe062915e89ef0ec0fe09ac9641be89e9ceb9cc678c91e,2024-03-15T14:03:51.503000 -CVE-2023-52439,0,1,1acb61b0653d7d06078084524dd22a72646c2e70fb118450a15ea65c12a46971,2024-03-15T14:21:10.847000 +CVE-2023-52438,0,0,320b81973417672f06fe062915e89ef0ec0fe09ac9641be89e9ceb9cc678c91e,2024-03-15T14:03:51.503000 +CVE-2023-52439,0,0,1acb61b0653d7d06078084524dd22a72646c2e70fb118450a15ea65c12a46971,2024-03-15T14:21:10.847000 CVE-2023-5244,0,0,2d7ccf46570f7a789336019a996859f3eea1c41d32a5a30c878bc5f986cf3b6e,2023-09-29T17:53:12.883000 -CVE-2023-52440,0,1,7f79ecc423520493b7ea33e872fa5ceb47ef15bacc232c9a528905fdc11fa5b2,2024-03-15T13:44:59.367000 -CVE-2023-52441,0,1,29f8dfdafb0665e97721ef99b56f7416e8cc50e990c6b9fd16addab92b75b2de,2024-03-15T13:56:31.710000 +CVE-2023-52440,0,0,7f79ecc423520493b7ea33e872fa5ceb47ef15bacc232c9a528905fdc11fa5b2,2024-03-15T13:44:59.367000 +CVE-2023-52441,0,0,29f8dfdafb0665e97721ef99b56f7416e8cc50e990c6b9fd16addab92b75b2de,2024-03-15T13:56:31.710000 CVE-2023-52442,0,0,f0e32f692f04917f9b44f1a58b9cc67efd1d412e7f16caea29f8d0af9ba07f69,2024-02-22T19:07:27.197000 CVE-2023-52443,0,0,d2cfc476b089f8fdcf50f50719540af45f0af66b06ea096a3e3bdb089d114cc0,2024-03-14T20:16:02.947000 CVE-2023-52444,0,0,e4e74b636a9119fb1430d59aa25d18b36c2089ded63e3a22c77190c88140fba1,2024-03-14T20:13:28.070000 @@ -237214,7 +237225,7 @@ CVE-2023-6721,0,0,2baa6c13f444a73c8fb708ab0933aa43f74442dd83269a4b99012840f04e4f CVE-2023-6722,0,0,d32d2d7ab88d7b27501031c246b7de1d18841f9831592e8928e0295e33c59b6c,2023-12-18T17:33:10.883000 CVE-2023-6723,0,0,0256b9a79fe5fd6a26df76092daabbd127e889141255d3fca4ab7e5083681e37,2023-12-15T20:37:10.720000 CVE-2023-6724,0,0,fe9b9f3e5a0c77767c8fbb38c69fe4abc8f7e517abb9a915da744e7f8cd31e28,2024-02-15T18:44:49.107000 -CVE-2023-6725,1,1,b72eaa5c9c5a0f48abae55eeb9d2df99fb18c06166a591884648f042aa6af1b0,2024-03-15T13:15:06.857000 +CVE-2023-6725,0,1,c069657ed5851ca3d3156ad7d55b948e6af0278e2bf7d28b773d5faf6f0ed8ef,2024-03-15T16:26:49.320000 CVE-2023-6727,0,0,6ec2c8890148313c75d2521ac9dcb5bcdc679ead10a2731713c6e45c491d3e46,2023-12-15T14:43:08.920000 CVE-2023-6730,0,0,daf67cb33b45f797c478299d62236f8fa267c9e9eab404abeacd1583fccd7584,2023-12-28T17:15:33.537000 CVE-2023-6732,0,0,8e995ef87bd85afefe754d26396da496813fb0ec12bab50f6fc0e73c46e5ca77,2024-01-23T14:59:59.107000 @@ -239961,7 +239972,7 @@ CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae502 CVE-2024-23094,0,0,9f79dbaa28554230ecec6bf9c8ebad70b78370379f350d8ce65fe4447a3b2f3f,2024-02-22T19:07:27.197000 CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000 CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000 -CVE-2024-23112,0,1,db97de9e46492b481e52ee1e1883233ddfe5123c1ba448f0e59ac92baa6de68f,2024-03-15T14:51:58.497000 +CVE-2024-23112,0,0,db97de9e46492b481e52ee1e1883233ddfe5123c1ba448f0e59ac92baa6de68f,2024-03-15T14:51:58.497000 CVE-2024-23113,0,0,29903cf0008dd4023f7698dfe9b07a61d8c5e19cfdea1fb0ce14ef659e7383ed,2024-02-22T15:33:00.970000 CVE-2024-23114,0,0,fa8f95e0e83961a881a09cd70451012be00683c9d1e43570d7214d2ff680cc51,2024-02-20T19:50:53.960000 CVE-2024-23120,0,0,1fdd5384a3247451b572eec50acc63b80f4302d338e02a15db81dbcc92866844,2024-03-01T16:15:45.920000 @@ -240756,7 +240767,7 @@ CVE-2024-24941,0,0,3ce7539cc2c00ca21eaf8843bb8dfa494f8daac6c677d25fe85a072b680ae CVE-2024-24942,0,0,98967e5f253d2f0e2d6c9adde01d5feb324664bac3fce3b7b875de585c5550eb,2024-02-09T01:03:13.453000 CVE-2024-24943,0,0,cecde2b734965816be739f7278af2a22cd088f91f77e60d1e6c087126d44acbd,2024-02-09T01:03:03.970000 CVE-2024-24945,0,0,c6e7443a15ad58b887b66a1afc517e5c6d2b064a4aecae431013860646a47dfe,2024-02-07T17:14:48.630000 -CVE-2024-2495,1,1,87240ec1b0a31035f8bd4fe1bcd2e0cfde2010d7e3f27ba6bbd8d27da193c4e4,2024-03-15T13:15:09.500000 +CVE-2024-2495,0,1,704e0eccf79a3eaa1e0904a49ae6e32da1f32f362ded8eff15167b9559341603,2024-03-15T16:26:49.320000 CVE-2024-24964,0,0,3c015ff9319add283b75ba9284dbb0964a9d4ce7edb50d2870b6147733f7e6d5,2024-03-12T12:40:13.500000 CVE-2024-24966,0,0,b8b1142fa7a04127bebdbfe2d935a3fd815c1f2bb5c99e70bfcbb30576800e5e,2024-02-14T18:04:45.380000 CVE-2024-24975,0,0,c403197a52452c60ee17afdfbf9edd4a6993ed059ba65add25a9b2620ac53eb1,2024-03-15T12:53:06.423000 @@ -240951,12 +240962,12 @@ CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199 CVE-2024-25559,0,0,621d2089e4066088e4f2e7151d4c52b797349073e2e5f4d074059dc172fb61d6,2024-02-15T06:23:39.303000 CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000 CVE-2024-25579,0,0,91953a88eab65ef3b6eb3b0fbea08ce09211ffa83ae8783d4b439f2092b924fc,2024-02-29T13:49:47.277000 -CVE-2024-25592,1,1,7e5ba00e5d890182601422469a17f00786fcde9a61c4ed047158b4300fb53b1f,2024-03-15T14:15:07.550000 -CVE-2024-25593,1,1,2c5aacf75208e920cc705d4658f842798fd0dcd2769ee9853582bf3522e31b5f,2024-03-15T14:15:07.787000 +CVE-2024-25592,0,1,0412b365f90f8498f043e36695d62af9e4613ca29af17a99e02dba80f6454731,2024-03-15T16:26:49.320000 +CVE-2024-25593,0,1,1b575b30fd4fb0e3fa8c9a56cd48628f4c588b446b23deb90120a47d669ff1d9,2024-03-15T16:26:49.320000 CVE-2024-25594,0,0,041a8f1098ea8eb68537c88dc97c5b5bc81f29a13cfba102c394bd754ead05ca,2024-02-29T13:49:29.390000 -CVE-2024-25596,1,1,0102c1c56e481b13b8f94e092b0cac510535143dc2a30ace497c59950d3a3ddc,2024-03-15T14:15:07.990000 -CVE-2024-25597,1,1,e152f482a7f15675e369c979d181f58f05e1af4d3a870b7cfbbee56b0ef94e6f,2024-03-15T14:15:08.220000 -CVE-2024-25598,1,1,605fd982754aaa53bea43b6e3f8e58eedfa880e08ab766ba25e9561f0078ef18,2024-03-15T13:15:07.087000 +CVE-2024-25596,0,1,13114d7ee8f79cd717d046d21908c5184e1a5e393e712bad1e319d6228d0994e,2024-03-15T16:26:49.320000 +CVE-2024-25597,0,1,e1e937a2ce2376e555303951d31b92ae54df886e8583dbc9427f46a5c7a19dfc,2024-03-15T16:26:49.320000 +CVE-2024-25598,0,1,fb13eab656ab973b3987c473d0c30d3886e191cae180bf92b8f730aaf3f724ee,2024-03-15T16:26:49.320000 CVE-2024-25601,0,0,81f4fdae91c2e2979380ffdf7201132bd42db70ea50ec659a221655da6bb1b91,2024-02-22T19:07:37.840000 CVE-2024-25602,0,0,6a0412f9e3d86cacfb35a934a8fd793128a0f85212ec26797b187230b94df26a,2024-02-22T19:07:37.840000 CVE-2024-25603,0,0,863f490c7ea22d0d3c701bfeb2e8a36747268d73fdd29bb24261158009a35432,2024-02-22T19:07:37.840000 @@ -241079,17 +241090,17 @@ CVE-2024-25910,0,0,46915ce767477cde79dec327c420fb80a93ebb8584c8668c193e9ec22215e CVE-2024-25913,0,0,adbe1d51d998e7755c9e21c2f8e4899af91a4a0cc057128b5afa1c44996ee3fc,2024-02-26T16:32:25.577000 CVE-2024-25914,0,0,6c21c235c508fdd4e37939a7918e64e3dd4e50979a576bdc305d842a25f11a05,2024-02-13T14:01:07.747000 CVE-2024-25915,0,0,2b3eb3b61519c3cc7ec9c696d86f766a5ba91455b2def2592d7df0099d9b76fa,2024-02-23T16:14:43.447000 -CVE-2024-25916,1,1,a1ddedeea2fdb0b8ad3e81fc4ea7c26fd924816e1c78b9e5d53ea37a82602106,2024-03-15T13:15:07.323000 -CVE-2024-25919,1,1,9bab28643260a56f5c2ee9fc1143f525b51ea40290e4994aa23ebdd669b95ec7,2024-03-15T13:15:07.563000 -CVE-2024-25921,1,1,27d3d64bacf9674f1dd3320dc9193e4217ad3fe3b22e935e2e97d8d8734a058f,2024-03-15T13:15:07.807000 +CVE-2024-25916,0,1,fd67fe38751dcee5e685d1168694fd860012e656006cfe93ceab898ad49c641f,2024-03-15T16:26:49.320000 +CVE-2024-25919,0,1,5218810224fbf56f6083cabf959c1cac12534ba7273f9a4eb37375eb636b2ae1,2024-03-15T16:26:49.320000 +CVE-2024-25921,0,1,aafe4e8b3e8f047fc939e364c43e005d94eff7eb4d8c733629d0e6fc6ded5cba,2024-03-15T16:26:49.320000 CVE-2024-25925,0,0,01bc086e03bbafe0dfede980aebb8a87a98cfcf8d010c13e69a9feac35eb7490,2024-02-26T16:32:25.577000 CVE-2024-25927,0,0,70ec221cb23fdd951e839b39a19a816e5c7a4881399308a30cbec9cd2c6f2d65,2024-02-28T14:06:45.783000 CVE-2024-25928,0,0,a6060327df403c3c616b275f710271564f7f2534d45ed96b3571c5b2e5121575,2024-02-23T16:14:43.447000 CVE-2024-25930,0,0,0ab8711195d4ca59bae23faf5b938c4832c53808527b8c4f0842867494c69bd3,2024-02-29T13:49:29.390000 CVE-2024-25931,0,0,cced732a62b8661206eb106d5ae979a2d16189f2911f7eaa9ca025496e8df531,2024-02-29T13:49:29.390000 CVE-2024-25932,0,0,b47ba5ecf2a19427a2d0c7404d84cf9b82c7d738bc913534568255e83139261d,2024-02-29T13:49:29.390000 -CVE-2024-25934,1,1,c08a19d8da4edbfa5fdf9a4231a783a14abda40d956d1ec9e57d9e1e4dcf6fe6,2024-03-15T13:15:08.070000 -CVE-2024-25936,1,1,41ed61c54a84cbe8ab04f5aaca5987168a76577f1a873a720eb1b23b24c7c463,2024-03-15T13:15:08.287000 +CVE-2024-25934,0,1,abf29b2c8bd2941b97b5a50ee19174b7389e9c0ccc1df25f4fdb8e591190b306,2024-03-15T16:26:49.320000 +CVE-2024-25936,0,1,8effd82663b8db2d960ef33e023d14a22fda9a759a9ee34ebfd84341bfced171,2024-03-15T16:26:49.320000 CVE-2024-25940,0,0,81faf8084be28ad3443bfad1349de788b40c215e318cb61e901b3079aac1c24e,2024-02-15T06:23:39.303000 CVE-2024-25941,0,0,ca1cef65d30f17057b47421c2700ecf50e418e7bf4da35eb3fcc2989f17ef1eb,2024-02-15T06:23:39.303000 CVE-2024-25951,0,0,4cab9db546da1535e7f7aa83987aad28b8aa7aeb3328d636aa2cd78c27a2b2c1,2024-03-11T01:32:39.697000 @@ -241260,8 +241271,8 @@ CVE-2024-26566,0,0,c84607e263dfbb2bafdffa5f1605a228a50fe6eb3d5c21b9f493cf56aab5c CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000 CVE-2024-26580,0,0,716bfe9e7477c84eaf394c6917d0ce79d82ccdb90bad82d0c89b019a7d1ce425,2024-03-06T15:18:08.093000 CVE-2024-26581,0,0,353f24559890ac7b3597bd26d99362ecbfd523a3ec7e2aa7e9d65e75d894e5ee,2024-02-23T09:15:22.563000 -CVE-2024-26582,0,1,3ff5c496d753899c1fc1e8062e53c8f61453498de38167daf1346ce24125ba81,2024-03-15T13:56:41.843000 -CVE-2024-26583,0,1,469df0658e18197ed0356dd7a5240250603137d767287de06ec0167d1ae18c2a,2024-03-15T13:05:03.220000 +CVE-2024-26582,0,0,3ff5c496d753899c1fc1e8062e53c8f61453498de38167daf1346ce24125ba81,2024-03-15T13:56:41.843000 +CVE-2024-26583,0,0,469df0658e18197ed0356dd7a5240250603137d767287de06ec0167d1ae18c2a,2024-03-15T13:05:03.220000 CVE-2024-26584,0,0,628c83749212390e734524e43d20fa678834b7ea9755141f8a3b9cd3762087b8,2024-03-11T18:15:18.503000 CVE-2024-26585,0,0,ab0df1121b4a44ad09abca0cf48007274128e339349339533a7e7946a2e72b52,2024-03-14T20:18:37.957000 CVE-2024-26586,0,0,6adf6fee4513357dce3d48353704f433902e35e2bc7d0ba0f94b639c08b43cd1,2024-02-23T09:15:22.820000 @@ -241329,10 +241340,10 @@ CVE-2024-27135,0,0,dc76c2c208b53579d0bb7d97b6b2e7e902c0fb1c8b5922e51dabb309b530b CVE-2024-27138,0,0,1ec0ded3b41c12b07651e921188be783731716c54fb55c30f65f5b3e8197e8cc,2024-03-01T22:22:25.913000 CVE-2024-27139,0,0,66ddd9efc34252e5e972ac0e5a31e042faa3995b86c5ae6f0f108c10e1d7b562,2024-03-01T22:22:25.913000 CVE-2024-27140,0,0,34daddef6e0d13f2bea16bc1184887cdd01053137a36a3bc5699d2875c449127,2024-03-01T22:22:25.913000 -CVE-2024-27189,1,1,ed3831284f329bc5f163703f390cebd316950a244cf976c69ad19e82e34723c4,2024-03-15T13:15:08.500000 -CVE-2024-27192,1,1,f915a7c19171c5ba9a4b2641b7adb0ec3be67a586fd1ce5e8e09a181b223cea9,2024-03-15T13:15:08.737000 -CVE-2024-27193,1,1,339cbbe22759dc63fcd17ac64c1a8bf67db19f19f49364949cd0c7f54def49d7,2024-03-15T13:15:09.043000 -CVE-2024-27196,1,1,5fd4d306583670efb7e2630190733701ea9e9d18073fcf8735d03382892fdb26,2024-03-15T13:15:09.277000 +CVE-2024-27189,0,1,515e61fa1831b3fd92525b0004dfafde618646c72fb29e4527e0a2fb9466806f,2024-03-15T16:26:49.320000 +CVE-2024-27192,0,1,0ff7a489a9c185cda73564233ae30b76c3279bb0d352bc83dbf6b8e10c6212e5,2024-03-15T16:26:49.320000 +CVE-2024-27193,0,1,1a2f1126258ed9b0f5281770f95fad5056f0f1e4993150f3d871f6ef458a3533,2024-03-15T16:26:49.320000 +CVE-2024-27196,0,1,6fce97c6f4107f378eda089ebc48fb5d5f287df09544c285bd2116fb3c48abb9,2024-03-15T16:26:49.320000 CVE-2024-27198,0,0,e4259fe3d4611134ab5dfb0d4f88f5b563c21b8238f30b4253811838ad004753,2024-03-11T15:15:47.483000 CVE-2024-27199,0,0,3dd3bfb58b796a8c7735f0a6f342852f32998fc13795786d35eb3d4375df0417,2024-03-11T15:15:47.663000 CVE-2024-27204,0,0,2f9f2ac2078c33addc2c698f165f7aff9339fcf3fa26f2cdd29a6de3328c8c2a,2024-03-12T12:40:13.500000 @@ -241540,6 +241551,8 @@ CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000 CVE-2024-28239,0,0,faccbe471f1ae24e1ff85c8426d7d0f8447bb8e496567a24af19b5962ca5e940,2024-03-13T12:33:51.697000 CVE-2024-28251,0,0,19fc23d56f5d00fa3c69d993b0deb280b2d4a1df9b73eb3d828c9ec8b6104ec4,2024-03-14T12:52:16.723000 +CVE-2024-28318,1,1,4464c0d64b943a4f9205011ad1109527e8aa088cb5ff5456cd49e911c2d1f722,2024-03-15T16:26:49.320000 +CVE-2024-28319,1,1,e376890f5ff8761a0926623e9576a5238806c37f36258b3aec951592cbe60412,2024-03-15T16:26:49.320000 CVE-2024-28323,0,0,50ef03c499763d9e671e8f7abe3ff1d91993b3f242ed25d0b2f15c0783d9b2e2,2024-03-14T14:21:20.217000 CVE-2024-28338,0,0,9985a0b99abb928b9c829cb29ecce6039c07964aad6d9841c1477c6680f4f9b5,2024-03-12T17:46:17.273000 CVE-2024-28339,0,0,06a7f15d55f22a965683bef17c82587bc073ddf9fa5edb33c38c4cd82d5f37f7,2024-03-12T17:46:17.273000 @@ -241550,6 +241563,7 @@ CVE-2024-28383,0,0,4ebb5b688ac785b11132be45898bb9d7934c49dcd0ae78bf745a27cbe4cf3 CVE-2024-28388,0,0,f20800f07aee245fbf5408ead00cec9bf5c1f6fde0c58ac0833a4f3740a134d7,2024-03-14T12:52:09.877000 CVE-2024-28390,0,0,c59fe44ce5898e034e8253a1c3bd017a5eae7c1708d584b45d3cdcaf6b6ab3d0,2024-03-14T12:52:09.877000 CVE-2024-28391,0,0,b1444c24f7ecf1ab52e2ae0fbb735e6665eab4acbe77c214aa4859db21cb1963,2024-03-14T12:52:09.877000 +CVE-2024-28403,1,1,53ad84d2b92d0e246b0063ff23c7520f4f61196b1685febf8c8ef71512bac0d9,2024-03-15T16:26:49.320000 CVE-2024-28417,0,0,af00e2b57e718e054f7e08c6b3b0d384a18688d81735bc5de07f53c08e95bb44,2024-03-14T14:21:20.217000 CVE-2024-28418,0,0,ae238b712a12df26411e78ac0a02714475617bc52923967f2dcd5f99fed7ae88,2024-03-14T14:21:20.217000 CVE-2024-28423,0,0,372e672a227c93e4c17b43a656f1688758e71678c55f13573c7b40701da49f01,2024-03-14T20:11:36.180000