diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25591.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25591.json new file mode 100644 index 00000000000..484d5d52048 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25591.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25591", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-17T17:15:06.133", + "lastModified": "2024-03-17T17:15:06.133", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Benjamin Rojas WP Editor.This issue affects WP Editor: from n/a through 1.2.7.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-editor/wordpress-wp-editor-plugin-1-2-7-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25903.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25903.json new file mode 100644 index 00000000000..d78ecdfa828 --- /dev/null +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25903.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25903", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-17T17:15:06.323", + "lastModified": "2024-03-17T17:15:06.323", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in N-Media Frontend File Manager.This issue affects Frontend File Manager: from n/a through 22.7.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/nmedia-user-file-uploader/wordpress-frontend-file-manager-plugin-plugin-22-7-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27957.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27957.json new file mode 100644 index 00000000000..9a4f9e8e163 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27957.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27957", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-17T17:15:06.517", + "lastModified": "2024-03-17T17:15:06.517", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Pie Register.This issue affects Pie Register: from n/a through 3.8.3.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/pie-register/wordpress-pie-register-plugin-3-8-3-1-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27958.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27958.json new file mode 100644 index 00000000000..eb28fbe5ef0 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27958.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27958", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-17T17:15:06.707", + "lastModified": "2024-03-17T17:15:06.707", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeisle Visualizer allows Reflected XSS.This issue affects Visualizer: from n/a through 3.10.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/visualizer/wordpress-visualizer-plugin-3-10-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27959.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27959.json new file mode 100644 index 00000000000..16baa9db4e6 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27959.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27959", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-17T17:15:06.897", + "lastModified": "2024-03-17T17:15:06.897", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wpexpertsio WC Shop Sync \u2013 Integrate Square and WooCommerce for Seamless Shop Management allows Reflected XSS.This issue affects WC Shop Sync \u2013 Integrate Square and WooCommerce for Seamless Shop Management: from n/a through 4.2.9.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/woosquare/wordpress-apiexperts-square-for-woocommerce-plugin-4-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27960.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27960.json new file mode 100644 index 00000000000..5b9b013b363 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27960.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27960", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-17T17:15:07.103", + "lastModified": "2024-03-17T17:15:07.103", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in I Thirteen Web Solution Email Subscription Popup allows Stored XSS.This issue affects Email Subscription Popup: from n/a through 1.2.20.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/email-subscribe/wordpress-email-subscription-popup-plugin-1-2-20-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27961.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27961.json new file mode 100644 index 00000000000..c7de3155457 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27961.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27961", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-17T17:15:07.297", + "lastModified": "2024-03-17T17:15:07.297", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codekraft AntiSpam for Contact Form 7 allows Reflected XSS.This issue affects AntiSpam for Contact Form 7: from n/a through 0.6.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/cf7-antispam/wordpress-antispam-for-contact-form-7-plugin-0-6-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0e29addd9b3..b3bbe22d133 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-17T17:00:38.003515+00:00 +2024-03-17T19:00:37.887953+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-17T16:15:08.390000+00:00 +2024-03-17T17:15:07.297000+00:00 ``` ### Last Data Feed Release @@ -29,17 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -241735 +241742 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `7` -* [CVE-2024-24867](CVE-2024/CVE-2024-248xx/CVE-2024-24867.json) (`2024-03-17T16:15:08.157`) -* [CVE-2024-2565](CVE-2024/CVE-2024-25xx/CVE-2024-2565.json) (`2024-03-17T15:15:07.187`) -* [CVE-2024-2566](CVE-2024/CVE-2024-25xx/CVE-2024-2566.json) (`2024-03-17T15:15:07.420`) -* [CVE-2024-25933](CVE-2024/CVE-2024-259xx/CVE-2024-25933.json) (`2024-03-17T16:15:08.390`) +* [CVE-2024-25591](CVE-2024/CVE-2024-255xx/CVE-2024-25591.json) (`2024-03-17T17:15:06.133`) +* [CVE-2024-25903](CVE-2024/CVE-2024-259xx/CVE-2024-25903.json) (`2024-03-17T17:15:06.323`) +* [CVE-2024-27957](CVE-2024/CVE-2024-279xx/CVE-2024-27957.json) (`2024-03-17T17:15:06.517`) +* [CVE-2024-27958](CVE-2024/CVE-2024-279xx/CVE-2024-27958.json) (`2024-03-17T17:15:06.707`) +* [CVE-2024-27959](CVE-2024/CVE-2024-279xx/CVE-2024-27959.json) (`2024-03-17T17:15:06.897`) +* [CVE-2024-27960](CVE-2024/CVE-2024-279xx/CVE-2024-27960.json) (`2024-03-17T17:15:07.103`) +* [CVE-2024-27961](CVE-2024/CVE-2024-279xx/CVE-2024-27961.json) (`2024-03-17T17:15:07.297`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 72f87522deb..3dd226486c5 100644 --- a/_state.csv +++ b/_state.csv @@ -240780,7 +240780,7 @@ CVE-2024-24861,0,0,6b40afdcfeaef4379ad19505bbc3196ca9bd79cff347b2f5b0473b639a002 CVE-2024-24864,0,0,cb2feb3346fb11cc5b4be9ff84c56cdf4de4a5045cdc4255bc9349b2b8259736,2024-02-10T04:05:22.843000 CVE-2024-24865,0,0,69d1d9e6b7dcdc1a41fcca26c5c38135753d56b8f5d02ca0d16d1408ab64d3a6,2024-02-07T23:30:50.313000 CVE-2024-24866,0,0,7234eb10c2179098475da368126463933a93e4c44ee1e87fac56ce5cbea64b85,2024-02-13T19:48:45.207000 -CVE-2024-24867,1,1,d02bce7c277904138b788c066bcad1d13e3a0e013e95636c243e6971e42b21a1,2024-03-17T16:15:08.157000 +CVE-2024-24867,0,0,d02bce7c277904138b788c066bcad1d13e3a0e013e95636c243e6971e42b21a1,2024-03-17T16:15:08.157000 CVE-2024-24868,0,0,e7f14abb86f06eb8a849fd232ff7f12dc608d17b75bfc6f64f2c0bbfd51ed1c7,2024-02-28T14:06:45.783000 CVE-2024-2487,0,0,4ca5472da55e03928f48be008f61a5daee2051808522c475d1ce22687edd2999,2024-03-15T12:53:06.423000 CVE-2024-24870,0,0,b39acdcce0711487a9081cc9665d4882378e31aa9603afc2ce7a407d6eacb9c6,2024-02-13T19:48:35.953000 @@ -241060,6 +241060,7 @@ CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c CVE-2024-25579,0,0,91953a88eab65ef3b6eb3b0fbea08ce09211ffa83ae8783d4b439f2092b924fc,2024-02-29T13:49:47.277000 CVE-2024-2558,0,0,8050607ac23e65960674849c352be5db1907b1d534dc2d541c620caa66cdb423,2024-03-17T09:15:07.253000 CVE-2024-2559,0,0,6201292f4311a87cf81b00e3f119f7b5b1d2f3fd530328ce8bf64628b2483016,2024-03-17T10:15:06.923000 +CVE-2024-25591,1,1,bd400b4786fbf652dd1fc649a6de99d111326d0e0d5dbbbde25f5765fd90d685,2024-03-17T17:15:06.133000 CVE-2024-25592,0,0,0412b365f90f8498f043e36695d62af9e4613ca29af17a99e02dba80f6454731,2024-03-15T16:26:49.320000 CVE-2024-25593,0,0,1b575b30fd4fb0e3fa8c9a56cd48628f4c588b446b23deb90120a47d669ff1d9,2024-03-15T16:26:49.320000 CVE-2024-25594,0,0,041a8f1098ea8eb68537c88dc97c5b5bc81f29a13cfba102c394bd754ead05ca,2024-02-29T13:49:29.390000 @@ -241108,12 +241109,12 @@ CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e CVE-2024-25644,0,0,cad748db94c87605f745ac8efbb54ef36e9bf866e1bcdbdf96bff9a05dfcf738,2024-03-12T12:40:13.500000 CVE-2024-25645,0,0,611af6391fb4617a6b65e5d2ff91bac5a4003873b65f133d0cd2495d911bd094,2024-03-12T12:40:13.500000 CVE-2024-25649,0,0,ff4005c5bc448d78f7be592b75e982f7bf99b3c972c3f93072e448020f36c7cd,2024-03-14T12:52:09.877000 -CVE-2024-2565,1,1,bd3c624874ffd2ed7cfdce46a424723ffe46928b98908fbb1c72f6299559aeec,2024-03-17T15:15:07.187000 +CVE-2024-2565,0,0,bd3c624874ffd2ed7cfdce46a424723ffe46928b98908fbb1c72f6299559aeec,2024-03-17T15:15:07.187000 CVE-2024-25650,0,0,86db7f9cd2961887ed39c6b63b2949a71fabae22076ac99000118f6e3ecf601e,2024-03-14T12:52:16.723000 CVE-2024-25651,0,0,4935c44deda83694ae7a33c550d78c8ec02d262dfb7e7f44dbd503c93d5109ae,2024-03-14T12:52:09.877000 CVE-2024-25652,0,0,1684edbbe6a032e904cd3d9da8c2e3b5d162c7d94708a30170c5b1a8fdc4de06,2024-03-14T12:52:09.877000 CVE-2024-25653,0,0,cf0ab93d3f68bfc65ae7a6e2836e0f599b295638c5107d23ca26fba04d235e4d,2024-03-14T12:52:09.877000 -CVE-2024-2566,1,1,445585f1cd08efde7542890fc279dbf8691de9ca80bbe4da90217abd121415cc,2024-03-17T15:15:07.420000 +CVE-2024-2566,0,0,445585f1cd08efde7542890fc279dbf8691de9ca80bbe4da90217abd121415cc,2024-03-17T15:15:07.420000 CVE-2024-25674,0,0,880844ace2ad9fa6a214f1eff7f46e3beaded8f86ef202dfc09585e1e07ca21c,2024-02-12T14:30:40.343000 CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d233,2024-02-12T14:30:28.640000 CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000 @@ -241188,6 +241189,7 @@ CVE-2024-25896,0,0,f55c9c64ad19121e3ab1aebe6a3a8ad1fcc3aea7c8b133b7d4dba349936cf CVE-2024-25897,0,0,7355967a2f8f961b6aae905351229b3a4b9981e5096de187d75a24765f83e9fb,2024-02-22T19:07:27.197000 CVE-2024-25898,0,0,5b2e5226b41d7df3ce618999c326ef88c4768b8f6b35f7a08f013e6657bc527c,2024-02-22T19:07:27.197000 CVE-2024-25902,0,0,236bf8debc0ae08f316e50d56ce86f0bb5b477845b162f0db1d908c2d82ec6a6,2024-02-28T14:06:45.783000 +CVE-2024-25903,1,1,e07b97238fc6d162ad0658422374db1030e122ba6b15e788217c0ddb6a721525,2024-03-17T17:15:06.323000 CVE-2024-25904,0,0,23057eb868fb6ef813adb121f092708ae4c9eb590cc6f60a0c49f9da8fc586df,2024-02-22T19:07:27.197000 CVE-2024-25905,0,0,de6faa22e80faff2b843a7c54255948d4a317197f60d39a73386687f34e33de1,2024-02-22T19:07:27.197000 CVE-2024-25909,0,0,3ba2f9224c25e528dd9baa9d19b1b5a4c57f72f3b7732d1df9cf0400b370fd04,2024-02-26T16:32:25.577000 @@ -241204,7 +241206,7 @@ CVE-2024-25928,0,0,a6060327df403c3c616b275f710271564f7f2534d45ed96b3571c5b2e5121 CVE-2024-25930,0,0,0ab8711195d4ca59bae23faf5b938c4832c53808527b8c4f0842867494c69bd3,2024-02-29T13:49:29.390000 CVE-2024-25931,0,0,cced732a62b8661206eb106d5ae979a2d16189f2911f7eaa9ca025496e8df531,2024-02-29T13:49:29.390000 CVE-2024-25932,0,0,b47ba5ecf2a19427a2d0c7404d84cf9b82c7d738bc913534568255e83139261d,2024-02-29T13:49:29.390000 -CVE-2024-25933,1,1,9a19a70e8ccf2de812b06af79bef2fea24d149ddfc7ffcadd406cea0f3ab65f3,2024-03-17T16:15:08.390000 +CVE-2024-25933,0,0,9a19a70e8ccf2de812b06af79bef2fea24d149ddfc7ffcadd406cea0f3ab65f3,2024-03-17T16:15:08.390000 CVE-2024-25934,0,0,abf29b2c8bd2941b97b5a50ee19174b7389e9c0ccc1df25f4fdb8e591190b306,2024-03-15T16:26:49.320000 CVE-2024-25936,0,0,8effd82663b8db2d960ef33e023d14a22fda9a759a9ee34ebfd84341bfced171,2024-03-15T16:26:49.320000 CVE-2024-25940,0,0,81faf8084be28ad3443bfad1349de788b40c215e318cb61e901b3079aac1c24e,2024-02-15T06:23:39.303000 @@ -241598,6 +241600,11 @@ CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5 CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000 CVE-2024-27952,0,0,184c933cd3d4f7d9f291de87daadba6c6d2dcb57a0cab449b4798a27658d2d98,2024-03-13T18:15:58.530000 CVE-2024-27953,0,0,9606a5ea342585cc8ea605f674c63e8d870327e37e1ba285dba38be6126632a2,2024-03-13T18:15:58.530000 +CVE-2024-27957,1,1,1283de7a7a5e1f840ac508a929bc4f3ce00bcb3561a0bcc54c4785a4f3cb850d,2024-03-17T17:15:06.517000 +CVE-2024-27958,1,1,44f0f26aa999bfa32c1f4a16e94c28e04115346ecaca18d448115946002af25f,2024-03-17T17:15:06.707000 +CVE-2024-27959,1,1,2e742a669a99c0e376940ede7d8c169c994f426ca0008d34f73be5c12af65f5b,2024-03-17T17:15:06.897000 +CVE-2024-27960,1,1,d0b3008dd5c3418fd7f73af169f8c85b2a1089916af89fcc1ebd189598e17afd,2024-03-17T17:15:07.103000 +CVE-2024-27961,1,1,85afe48c1e117037ada7caa4604a772c9579744a7117d26141705173dad7aa63,2024-03-17T17:15:07.297000 CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000 CVE-2024-27987,0,0,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000 CVE-2024-28053,0,0,e281ed045d826247c32c0ccef204d2c431b80f755e75c928bfd444d7e8497772,2024-03-15T12:53:06.423000